Wileen Chiu
4e79aefebc
Fix in-call audio issue
...
Update instance name of QcRilAudio HAL.
Mutliple (one per SIM) instances of
QcRilAudio HAL is required.
Change-Id: Ied34684509f1db37727880116bab785fddaaded3
2017-05-21 19:32:35 -07:00
Max Bires
2d76a6ac61
Adding vndbinder_use statements to support the new qualcomm patches
...
Leaving in the binder call until I can independently verify that none of
these domains are running anything through binder, and if they are then
file bug reports on it.
Some of these domains don't seem to use the transfer/call permissions,
so refraining from adding the full vndbinder_use statement until those
are apparent
Denials:
denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:hal_gnss_qti:s0
tclass=process
denied { open } for pid=556 comm="vndservicemanag"
path="/proc/744/attr/current" dev="proc" ino=25957
scontext=u:r:vndservicemanager:s0 tcontext=u:r:hal_gnss_qti:s0
tclass=file
denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=25957 scontext=u:r:vndservicemanager:s0
tcontext=u:r:hal_gnss_qti:s0 tclass=file
denied { call } for pid=744 comm="Loc_hal" scontext=u:r:hal_gnss_qti:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder
denied { ioctl open read write } for pid=744 comm="Loc_hal"
path="/dev/vndbinder" dev="tmpfs" ino=19167 ioctlcmd=6209
scontext=u:r:hal_gnss_qti:s0 tcontext=u:object_r:vndbinder_device:s0
tclass=chr_file
denied { ioctl } for pid=770 comm="Binder:770_2" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:per_mgr:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=process
denied { open } for pid=556 comm="vndservicemanag"
path="/proc/770/attr/current" dev="proc" ino=24336
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=file
denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=24336 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_mgr:s0 tclass=file
denied { search } for pid=556 comm="vndservicemanag" name="770"
dev="proc" ino=8315 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_mgr:s0 tclass=dir
denied { transfer } for pid=770 comm="pm-service"
scontext=u:r:per_mgr:s0 tcontext=u:r:vndservicemanager:s0 tclass=binder
denied { call } for pid=770 comm="pm-service" scontext=u:r:per_mgr:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder
denied { ioctl open read write } for pid=770 comm="pm-service"
path="/dev/vndbinder" dev="tmpfs" ino=19167 ioctlcmd=6209
scontext=u:r:per_mgr:s0 tcontext=u:object_r:vndbinder_device:s0
tclass=chr_file
denied { read write } for pid=886 comm="cnss-daemon" name="vndbinder"
dev="tmpfs" ino=19167 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
denied { ioctl } for pid=886 comm="cnss-daemon" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
denied { ioctl } for pid=875 comm="rild" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:rild:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
denied { ioctl open read write } for pid=853 comm="pm-proxy"
name="vndbinder" dev="tmpfs" ino=19167 scontext=u:r:per_proxy:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
denied { call } for pid=853 comm="pm-proxy" scontext=u:r:per_proxy:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder
denied { search } for pid=556 comm="vndservicemanag" name="853"
dev="proc" ino=28401 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_proxy:s0 tclass=dir
denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=28421 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_proxy:s0 tclass=file
denied { open } for pid=556 comm="vndservicemanag"
path="/proc/853/attr/current" dev="proc" ino=28421
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_proxy:s0 tclass=file
denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_proxy:s0
tclass=process
denied { add } for interface=vendor.qti.qcril.am::IQcRilAudio pid=875
scontext=u:r:rild:s0 tcontext=u:object_r:default_android_hwservice:s0
tclass=hwservice_manager
denied { find } for service=vendor.qcom.PeripheralManager pid=774
uid=1001 scontext=u:r:rild:s0
tcontext=u:object_r:default_android_vndservice:s0 tclass=service_manager
denied { call } for pid=792 comm="cnss-daemon"
scontext=u:r:wcnss_service:s0 tcontext=u:r:vndservicemanager:s0
tclass=binder
denied { read write } for pid=1197 comm="rild" name="vndbinder"
dev="tmpfs" ino=19957 scontext=u:r:rild:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
denied { call } for pid=773 comm="rild" scontext=u:r:rild:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder
Bug: 34784662
Test: vndbinder functionality for these domains is working
Change-Id: Ife7d4b4734ab4aca1d314b1b6cbac3203b216adc
2017-05-21 19:32:35 -07:00
Max Bires
47e15da9ae
Merge "Adding allows and context for dumpstate"
2017-05-22 01:52:35 +00:00
TreeHugger Robot
55b267982a
Merge "Fix selinux denial for usb hal"
2017-05-22 00:17:10 +00:00
Max Bires
b1ad57c5a1
Merge "Removing netmgrd from permissive mode and into enforcing"
2017-05-20 23:15:46 +00:00
Max Bires
593581e7d7
Removing netmgrd from permissive mode and into enforcing
...
Bug: 34784662
Bug: 38261549
Test: netmgrd continues to function properly under enforcing
Change-Id: I763f222ddb9befd9b9e2ae9aff713b5d865c62f7
2017-05-20 23:15:20 +00:00
Max Bires
79a23bb77d
Merge "Fixing a qti denial"
2017-05-20 21:49:20 +00:00
TreeHugger Robot
27d06323d6
Merge "Add <interface> / <instance> to dev compat mat"
2017-05-20 04:15:20 +00:00
TreeHugger Robot
f058642f29
Merge "ril: enable ECC customization"
2017-05-20 01:38:00 +00:00
Shawn Yang
ca75a2ced3
Merge "Stop always on logging when external logging enabled"
2017-05-20 01:00:28 +00:00
TreeHugger Robot
0150e2bb2f
Merge "Interface callbacks from CHRE interface to the Offload server"
2017-05-19 23:39:31 +00:00
TreeHugger Robot
60775a9f44
Merge "Offload HAL Service: Constant definition"
2017-05-19 23:36:27 +00:00
Shawn Yang
7def19e4be
Stop always on logging when external logging enabled
...
Bug:36691005
Turn off persist.sys.modem.diag.mdlog according the usb.sys.config
state
Test: Manually set usb.sys.config status and check for AOL status
Change-Id: Ia97956cc860173419b264951909890d9e8e60db8
2017-05-19 15:36:19 -07:00
Youhan Wang
6967e3b287
Merge "Grant system_app write access to tel_mon_prop"
2017-05-19 20:29:10 +00:00
Thierry Strudel
970e5b7dce
Merge "Ensure usb related .rc is parsed in a defined order"
2017-05-19 20:01:27 +00:00
Yueyao Zhu
9c902b351f
Ensure usb related .rc is parsed in a defined order
...
Loading process:
- rootdir/init.rc
|- /vendor/etc/init/hw/init.${ro.hardware}.rc
|- /vendor/etc/init/hw/init.${ro.hardware}.usb.rc
|- /vendor/etc/init/hw/init.wahoo.usb.rc
This CL moves init.hardware.rc, init.wahoo.usb.rc to /vendor/
etc/init/hw/, and import /vendor/etc/init/hw/init.${ro.hardware}
.usb.rc from init.hardware.rc.
Test: Build with related CLs and USB File Transfer works
Bug: 38301110
Change-Id: I4808a117994374bceac324c60cc47225a8df5970
Signed-off-by: Yueyao Zhu <yueyao@google.com >
2017-05-19 12:01:14 -07:00
Joel Fernandes
8fa14d1102
init: Change default governor to schedutil and set ratelimits
...
Use rate-limit values: 500us for up, 20ms for down.
Change-Id: Ifc3ebb8e63078ab402080b50b800b6fffb326f97
Signed-off-by: Joel Fernandes <joelaf@google.com >
2017-05-19 18:26:01 +00:00
Max Bires
14f3c709af
Adding allows and context for dumpstate
...
denied { find } for
service=android.service.gatekeeper.IGateKeeperService pid=14914 uid=2000
scontext=u:r:dumpstate:s0 tcontext=u:object_r:gatekeeper_service:s0
tclass=service_manager
denied { call } for scontext=u:r:dumpstate:s0
tcontext=u:r:update_engine:s0 tclass=binder
denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0
tclass=binder
denied { use } for path="pipe:[231372]" dev="pipefs" ino=231372
scontext=u:r:hal_audio_default:s0 tcontext=u:r:dumpstate:s0 tclass=fd
denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:per_mgr:s0
tclass=binder
denied { read } for name="log" dev="debugfs" ino=32
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=file
denied { read } for name="rpm_master_stats" dev="debugfs" ino=16914
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs_rpm:s0
tclass=file
denied { read } for name="rpm_stats" dev="debugfs" ino=16912
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs_rpm:s0
tclass=file
denied { read } for comm="top" name="stat" dev="proc" ino=4026532075
scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file
Bug: 34784662
Bug: 38292576
Test: The above denials are no longer present in adb bugreport
Change-Id: I1def308765f818c04833e2127df1c9803ed2dc77
2017-05-19 11:22:19 -07:00
Badhri Jagan Sridharan
ddc21e70ac
Fix selinux denial for usb hal
...
Fixes the following denial:
avc: denied { write } for name="current_power_role"
dev="sysfs" ino=50970 scontext=u:r:hal_usb_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
permissive=0
Bug: 38097623
Test: The denial message is not seen anymore.
Change-Id: I961a595a06211214142d3316abf7172f5e500347
2017-05-19 10:28:10 -07:00
tim.tm_lin
d960db5b4f
ril: enable ECC customization
...
Bug: 38402296
Change-Id: I5ecfab75c450a9258d2b95cb7b603c15c8d9b67d
2017-05-19 10:11:14 -07:00
Max Bires
668f76f3fe
Fixing a qti denial
...
denied { read write } for name="smdcntl8" dev="tmpfs" ino=20779
scontext=u:r:qti:s0 tcontext=u:object_r:smd_device:s0 tclass=chr_file
Bug: 34784662
Test: qti has access to the smd_device
Change-Id: I89a6f27c484c8ef6fd3478da8e394d9aec517ae2
2017-05-19 17:04:08 +00:00
Yifan Hong
31f2043b4f
Merge "Fix instance name in manifest.xml for keymaster"
2017-05-19 16:36:00 +00:00
Zhijun He
3b8330ec56
Merge "Enable EIS3 and Gzoom by default"
2017-05-19 16:28:25 +00:00
Wei Wang
1fe2d41ec9
Merge "wahoo: all ramdump to set RCU stall property"
2017-05-19 03:41:33 +00:00
Zhijun He
62bae0b32f
Enable EIS3 and Gzoom by default
...
Bug: 38299858
Change-Id: I6e1c252ea547e21680f43edec5c81d8edccfc5fb
2017-05-19 02:15:27 +00:00
Sohani Rao
6d9cd96678
Interface callbacks from CHRE interface to the Offload server
...
Bug: 32842314
Test: VTS
Change-Id: I58f6f7e403671070dfcd986dccfd0fc44f55f686
2017-05-18 18:32:34 -07:00
Youhan Wang
ef151ac4d7
Grant system_app write access to tel_mon_prop
...
Define new type tel_mon_prop and matches with
persist.radio.enable_tel_mon
TelephonyMonitor debug switch in Developer Options requires read/write
access to persist.radio.enable_tel_mon.
The feature is only enabled on userdebug/eng devices for Pixel17.
Test: Make, Toggling Developer Options -> Telephony Monitor succeeds
Bug:38351509
Change-Id: I8c68c2bca3040b6a067f83606589ef6f857cf9fc
2017-05-18 17:57:33 -07:00
Ahmed ElArabawy
ea9e809ba7
Merge "Revert "power hal: Add power HAL API 1.1 impl for Wahoo""
2017-05-18 23:57:27 +00:00
Wei Wang
d977d05b45
wahoo: all ramdump to set RCU stall property
...
Panic on RCU stall hasn't been enabled on wahoo but we need the
permission in order to make ramdump app do not crash.
Bug: 38423394
Test: ramdump app has proper permission
Change-Id: I9831f2ac3dfbfdd1db099fa04683380e25cbd1ec
2017-05-18 15:50:35 -07:00
Yifan Hong
e25410da1e
Fix instance name in manifest.xml for keymaster
...
Test: m system_compatibility_matrix.xml
Test: device boots with and without data wipe
Change-Id: Ibc75398b8d4c0f751c639d26b92d9736d6401e87
2017-05-18 22:46:49 +00:00
Yifan Hong
fbfba6f554
Add <interface> / <instance> to dev compat mat
...
Test: m compatibility_matrix.xml -j
Test: m system_manifest.xml -j
Bug: 38395193
Change-Id: Ia75a6ac4b4f8f4380da8707482886df408e60250
2017-05-18 14:37:08 -07:00
Youhan Wang
fe8ca0668e
Merge "Set data roaming default false for Wahoo."
2017-05-18 17:37:17 +00:00
Jaesoo Lee
da9eee4c13
Merge "configstore: applied uprev of configstore (1.0 -> 1.1)"
2017-05-18 13:05:41 +00:00
Andrew Scull
5ffefa6084
Merge changes from topic 'ese vintf'
...
* changes:
Add OemLock HAL to the manifest.
Add Weaver HAL to the manifest.
2017-05-18 09:31:42 +00:00
Wei Wang
fa7fff56b6
Merge "wahoo: tune zram performance"
2017-05-18 05:01:29 +00:00
Ajay Dudani
ddfc169363
perfd: Add rule to allow hal_power_default signull denial
...
[ 1786.071909] type=1400 audit(1495048493.567:602): avc: denied {
signull } for pid=781 comm="perfd" scontext=u:r:perfd:s0
tcontext=u:r:hal_power_default:s0 tclass=process permissive=1
Test: Boot test, verified this selinux denial doesn't show up
Change-Id: I37a4cf45eea84dc3314d235ef21eb7d2c2d8c33e
2017-05-18 04:16:08 +00:00
Ajay Dudani
6a5352b668
Update init.radio.sh path in file_contexts
...
init.radio.sh has moved from /system to /vendor; update the path in
file_contexts to reflect the same.
Test: Bootup, rild running
Change-Id: Iada7b217272e8b5c0de35252bde95ffe37d144fa
2017-05-17 17:06:56 -07:00
Ajay Dudani
e80ed35837
Update init.power.sh path in file_contexts
...
init.power.sh has moved from /system to /vendor; update the path in
file_contexts to reflect the same.
Bug: 38317397
Test: Verified interaction and launch hints were handled post bootup
Change-Id: I6c57d9fc06e2f9ca984ea0f357a8b64d5b48d76f
2017-05-17 17:06:42 -07:00
Youhan Wang
cfa36ccf9c
Set data roaming default false for Wahoo.
...
Test: make
Bug:37973320
Change-Id: Ic36c8de8ba87149dfa9ada6660ee893d2beb340b
2017-05-17 16:55:23 -07:00
Sohani Rao
bc8bc52f92
Offload HAL Service: Constant definition
...
Define constants to be used by Offload Service implementation.
Bug: 32842314
Test: VTS
Change-Id: I95c2c28207f5f6e76a69ea13c79ddc07418ac2c8
2017-05-17 16:48:35 -07:00
Wei Wang
88f424e979
wahoo: tune zram performance
...
-Switch to LZ4 for better overall performance
-Set max_comp_streams to num of cores since upstream also moves this to
percpu.
-Set page-cluster to 0 as the incremental cost of reading 1 page at a
time is negligible for zram
Bug: 38249616
Test: boot and run zram-perf showing better performance
Change-Id: I0b92b246d773db85aa03d033b2cecee54347cbd1
2017-05-17 16:19:32 -07:00
Ahmed ElArabawy
e9e903f222
Revert "power hal: Add power HAL API 1.1 impl for Wahoo"
...
This reverts commit c043816b3c .
The reason of the revert is to check for the application start time
regression that may have been caused by the CL
Bug: 38317397
Test: None
Change-Id: I7edaf75eeebcecb848b38a9b7eff2bdb1f233cdb
Signed-off-by: Ahmed ElArabawy <arabawy@google.com >
2017-05-17 15:21:36 -07:00
Chia-kai Liang
bd46d535f7
Merge "Add Hexagon permission to hal_camera"
2017-05-17 21:45:10 +00:00
TreeHugger Robot
2cf4d76a03
Merge "sepolicy: add ese_load and ese data dirs"
2017-05-17 19:26:42 +00:00
Chia-Kai Liang
42f7cf7b4f
Add Hexagon permission to hal_camera
...
Bug: 38353688
Test: Works correctly on signed device.
Change-Id: I040a2bad2c9286aad55b1ca8d1e484ee8dc91bd8
2017-05-17 10:50:54 -07:00
Andrew Scull
099196d5e1
Add OemLock HAL to the manifest.
...
Bug: 38173042
Test: Build and boot
Change-Id: I44a09ca5c4fdffd262700d385571edc96b4c9059
2017-05-17 15:29:19 +01:00
Andrew Scull
850831bfe6
Add Weaver HAL to the manifest.
...
Bug: 38173757
Test: Build and boot
Change-Id: Icd76ad270dd4a6e99ca61a62c174cbcaf5542765
2017-05-17 15:26:42 +01:00
Stefano Tommasini
922ee28abc
Merge "Add external storage and contact permissions to 2017 google phones."
2017-05-17 12:34:56 +00:00
Stefanot
8db7a09938
Add external storage and contact permissions to 2017 google phones.
...
Test: manual
BUG:37635903
Change-Id: I6257943e380d6fa90ce042e143a065bb64d51a3c
2017-05-17 11:22:43 +01:00
TreeHugger Robot
94ad4c9beb
Merge "lights.$(TARGET_DEVICE): moved to vendor partition"
2017-05-17 09:41:31 +00:00