| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
The access to diag was restricted as part of this commit
'sepolicy: Restrict diag access available to domains'. This
prevents mm-pp-daemon from accessing diag which results in
failure of QDCM PC tool connection with the device/pp-daemon.
To resolve this, allow mm-pp-daemon r/w access to diag.
CRs-Fixed: 1077354
Change-Id: I10388ef8cf5855d12a7053bbffffdb70a3ba162b
|
|
|
|
|
|
| |
Add support for inital set of selinux polices for N upgrade
Change-Id: I0bccc55db1d32866bb9b622f7c119c89d7e4348f
|
|
|
|
|
|
|
|
|
|
| |
mm-pp-daemon needs to set debug.svi.checksum debug
property which is being denied. This is needed for
checking if checksum is being printed for userdebug
and engineering builds.
Change-Id: I03bd624168d7922d7eb80b536d32a93eaa4e2669
CRs-Fixed: 862136
|
|
|
|
|
|
|
|
| |
Allow pp-daemon to access power manager service for acquiring
display wakelock. This is needed only when QDCM tool is
connected.
Change-Id: I5ce8c5096d53b902d81de8ee46bcddf8548e476f
|
|
|
|
|
|
|
|
|
| |
Some post-processing features in mm-pp-daemon requires sensor
info as input. Add new sepolicy rules to allow service manager
to find sensor service and permission service and allow connections
between sensor manager and mm-pp-daemon.
Change-Id: I9b7e7dfaa63d760196b60c8e1d4a57d496e3a96f
|
|
|
|
|
|
| |
Addressing all the boot-up denials.
Change-Id: Ia5c0f44934b935852e10d459c114ba636b94ced9
|
|
|
|
|
|
|
|
| |
Replacing all the permissions with macros
Allow all domians except untrusted_app to access diag_device
Restrict untrusted_app to access diag_device
Change-Id: Ibad902746f25a23f10840fae3c0bac65b2ff74e0
|
|
|
|
|
|
|
| |
Adding rule for '/persist/display/*' in surfaceflinger
and mm-pp-daemon.
Change-Id: I23626721cadb42ff0ee2b2143d05ff94715049e7
|
|
|
|
|
|
|
| |
Add SE Policy rule in mm-pp-daemon for system server socket
read/write access.
Change-Id: I2a001804030f456473f16a542e94e8c77f1cae75
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Binder calls from mm-pp-daemon were only allowed in userdebug
variants and were not allowed in user variant builds. Now
allowing these binder calls from mm-pp-daemon to system server
and surfaceflinger. Also allowing diag to access tempfs.
Change-Id: Ia90489ff63d62e0514666be5734fde0a3662a8a2
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
1. Define a common file type to be used by multiple display processes
that need access to /data/misc/display to write data e.g. config
files, dumped frames, etc.
2. Add policy to enable dumping frames from SurfaceFlinger process
Change-Id: I283778e0cf223c8dad8139ea99e19661aeac5d4f
|
|\ \
| |/
|/|
| |
| |
| | |
AU_LINUX_ANDROID_LA.BF.1.1.05.00.02.162.248 based on quic/aosp/LA.BF.1.1
Change-Id: Ifef447c365953fba94c5046a5c641c8a3e6b5a7c
|
| |
| |
| |
| |
| |
| |
| | |
Modify mm-pp-deaemon policy file to enable access to
listen and accept unix socket calls from init to enable CABL.
Change-Id: If8621d31d8ae07d17803bb2d152bebf5fffdc51e
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Modify mm-pp-deaemon policy file to enable access to sensors to
support features like AD (Assertive Display).
1. Allow read access to sensor_device.
2. Allow read/write access to sensor_socket.
3. Allow 'connecto' socket call to sensors stream socket.
Change-Id: I343776eb788f39f95f1202463b5d801fb9103571
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Address all SELinux denial messages related to QDCM tool
functionality and the color service SDK application.
Add policies to allow:
1- /persist/ read & write for display confid
2- /data/misc/display/ read & write
3- Allow access to colorservice for display sdk from android app.
4- Enable pp-daemon functionalities for the non user-debug and
eng builds, since OEMs actively use QDCM tool, and they require
full functionality.
Change-Id: I43545eaf8e63f0e43f40197cd01cddc8c6a5351a
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Modify mm-pp-deaemon policy file to enable access to sensors to
support features like AD (Assertive Display).
1. Allow read access to sensor_device.
2. Allow read/write access to sensor_socket.
3. Allow 'connecto' socket call to sensors stream socket.
Change-Id: I343776eb788f39f95f1202463b5d801fb9103571
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Address all SELinux denial messages related to QDCM tool
functionality and the color service SDK application.
Add policies to allow:
1- /persist/ read & write for display confid
2- /data/misc/display/ read & write
3- Allow access to colorservice for display sdk from android app.
4- Enable pp-daemon functionalities for the non user-debug and
eng builds, since OEMs actively use QDCM tool, and they require
full functionality.
Change-Id: I43545eaf8e63f0e43f40197cd01cddc8c6a5351a
|
|
|
|
|
|
| |
Allowing mm-ppd to set system property
Change-Id: I8559aded3b70c560ff9eb531bd1762cfef90699f
|
|
|
|
|
|
| |
Add policy for bootup issues and other domains
Change-Id: I48dc57dcdc0c631e682072f93e2f8fd2751c7a43
|
|
Enables pp-daemon to start at boot and adds the necessary selinux
policies for it's operation
Change-Id: I450bada4a8f5c5b49e59c2c179897d306a5e8791
|