summaryrefslogtreecommitdiffstats
path: root/common/mm-pp-daemon.te
Commit message (Collapse)AuthorAgeFilesLines
* sepolicy : Allow mm-pp-daemon access to diagNirmal Abraham2016-11-021-0/+3
| | | | | | | | | | | The access to diag was restricted as part of this commit 'sepolicy: Restrict diag access available to domains'. This prevents mm-pp-daemon from accessing diag which results in failure of QDCM PC tool connection with the device/pp-daemon. To resolve this, allow mm-pp-daemon r/w access to diag. CRs-Fixed: 1077354 Change-Id: I10388ef8cf5855d12a7053bbffffdb70a3ba162b
* sepolicy: inital selinux policies for N upgradeBiswajit Paul2016-04-261-1/+1
| | | | | | Add support for inital set of selinux polices for N upgrade Change-Id: I0bccc55db1d32866bb9b622f7c119c89d7e4348f
* sepolicy: allow mm-pp-daemon to set debug propertyKrishna Chaitanya Parimi2015-10-291-0/+3
| | | | | | | | | | mm-pp-daemon needs to set debug.svi.checksum debug property which is being denied. This is needed for checking if checksum is being printed for userdebug and engineering builds. Change-Id: I03bd624168d7922d7eb80b536d32a93eaa4e2669 CRs-Fixed: 862136
* sepolicy: qdcm: Allow service_manager access to ppdaemonZohaib Alam2015-09-011-2/+3
| | | | | | | | Allow pp-daemon to access power manager service for acquiring display wakelock. This is needed only when QDCM tool is connected. Change-Id: I5ce8c5096d53b902d81de8ee46bcddf8548e476f
* sepolicy: Update sepolicy rules for mm-pp-daemonPing Li2015-07-291-1/+8
| | | | | | | | | Some post-processing features in mm-pp-daemon requires sensor info as input. Add new sepolicy rules to allow service manager to find sensor service and permission service and allow connections between sensor manager and mm-pp-daemon. Change-Id: I9b7e7dfaa63d760196b60c8e1d4a57d496e3a96f
* Adding policies to address bootup denialsBiswajit Paul2015-07-221-1/+1
| | | | | | Addressing all the boot-up denials. Change-Id: Ia5c0f44934b935852e10d459c114ba636b94ced9
* Replacing permissions with macrosAvijit Kanti Das2015-06-261-12/+7
| | | | | | | | Replacing all the permissions with macros Allow all domians except untrusted_app to access diag_device Restrict untrusted_app to access diag_device Change-Id: Ibad902746f25a23f10840fae3c0bac65b2ff74e0
* sepolicy: Add sepolicy rules for display clientsNitesh Gupta2015-04-281-3/+6
| | | | | | | Adding rule for '/persist/display/*' in surfaceflinger and mm-pp-daemon. Change-Id: I23626721cadb42ff0ee2b2143d05ff94715049e7
* sepolicy: Add SELinux policy rule for pp daemon socket callsSravan Kumar D.V.N2015-03-301-0/+1
| | | | | | | Add SE Policy rule in mm-pp-daemon for system server socket read/write access. Change-Id: I2a001804030f456473f16a542e94e8c77f1cae75
* Merge "sepolicy: allow mm-pp-daemon to use binders in user variant"Linux Build Service Account2015-02-091-9/+7
|\
| * sepolicy: allow mm-pp-daemon to use binders in user variantKrishna Chaitanya Parimi2015-01-161-9/+7
| | | | | | | | | | | | | | | | | | Binder calls from mm-pp-daemon were only allowed in userdebug variants and were not allowed in user variant builds. Now allowing these binder calls from mm-pp-daemon to system server and surfaceflinger. Also allowing diag to access tempfs. Change-Id: Ia90489ff63d62e0514666be5734fde0a3662a8a2
* | SEAndroid: Allow dumping of frames from SurfaceFlingerTatenda Chipeperekwa2015-01-281-2/+2
| | | | | | | | | | | | | | | | | | 1. Define a common file type to be used by multiple display processes that need access to /data/misc/display to write data e.g. config files, dumped frames, etc. 2. Add policy to enable dumping frames from SurfaceFlinger process Change-Id: I283778e0cf223c8dad8139ea99e19661aeac5d4f
* | Merge tag 'AU_LINUX_ANDROID_LA.BF.1.1.05.00.02.162.248' into HEADBiswajit Paul2015-01-221-0/+2
|\ \ | |/ |/| | | | | | | AU_LINUX_ANDROID_LA.BF.1.1.05.00.02.162.248 based on quic/aosp/LA.BF.1.1 Change-Id: Ifef447c365953fba94c5046a5c641c8a3e6b5a7c
| * Seandroid: Allow mm-pp-deamon access to unix socketJustin Philip2015-01-051-0/+2
| | | | | | | | | | | | | | Modify mm-pp-deaemon policy file to enable access to listen and accept unix socket calls from init to enable CABL. Change-Id: If8621d31d8ae07d17803bb2d152bebf5fffdc51e
| * Seandroid: Allow mm-pp-deamon access to sensor device filesNirmal Abraham2014-12-041-0/+5
| | | | | | | | | | | | | | | | | | | | | | Modify mm-pp-deaemon policy file to enable access to sensors to support features like AD (Assertive Display). 1. Allow read access to sensor_device. 2. Allow read/write access to sensor_socket. 3. Allow 'connecto' socket call to sensors stream socket. Change-Id: I343776eb788f39f95f1202463b5d801fb9103571
| * Seandroid: Add policies to enable all QDCM functionalitiesZohaib Alam2014-12-011-13/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Address all SELinux denial messages related to QDCM tool functionality and the color service SDK application. Add policies to allow: 1- /persist/ read & write for display confid 2- /data/misc/display/ read & write 3- Allow access to colorservice for display sdk from android app. 4- Enable pp-daemon functionalities for the non user-debug and eng builds, since OEMs actively use QDCM tool, and they require full functionality. Change-Id: I43545eaf8e63f0e43f40197cd01cddc8c6a5351a
* | Seandroid: Allow mm-pp-deamon access to sensor device filesNirmal Abraham2014-12-151-0/+5
| | | | | | | | | | | | | | | | | | | | | | Modify mm-pp-deaemon policy file to enable access to sensors to support features like AD (Assertive Display). 1. Allow read access to sensor_device. 2. Allow read/write access to sensor_socket. 3. Allow 'connecto' socket call to sensors stream socket. Change-Id: I343776eb788f39f95f1202463b5d801fb9103571
* | Seandroid: Add policies to enable all QDCM functionalities.Zohaib Alam2014-12-151-13/+17
|/ | | | | | | | | | | | | | | Address all SELinux denial messages related to QDCM tool functionality and the color service SDK application. Add policies to allow: 1- /persist/ read & write for display confid 2- /data/misc/display/ read & write 3- Allow access to colorservice for display sdk from android app. 4- Enable pp-daemon functionalities for the non user-debug and eng builds, since OEMs actively use QDCM tool, and they require full functionality. Change-Id: I43545eaf8e63f0e43f40197cd01cddc8c6a5351a
* Seandroid: Allow mm-pp-daemon to set system.propAvijit Kanti Das2014-10-261-1/+1
| | | | | | Allowing mm-ppd to set system property Change-Id: I8559aded3b70c560ff9eb531bd1762cfef90699f
* sepolicy: policy for bootup denials on 64 bit targetsBiswajit Paul2014-10-251-0/+1
| | | | | | Add policy for bootup issues and other domains Change-Id: I48dc57dcdc0c631e682072f93e2f8fd2751c7a43
* Seandroid: Enable PP daemon at bootAvijit Kanti Das2014-10-221-0/+42
Enables pp-daemon to start at boot and adds the necessary selinux policies for it's operation Change-Id: I450bada4a8f5c5b49e59c2c179897d306a5e8791