Commit Graph

647 Commits

Author SHA1 Message Date
Wileen Chiu
4e79aefebc Fix in-call audio issue
Update instance name of QcRilAudio HAL.
Mutliple (one per SIM) instances of
QcRilAudio HAL is required.

Change-Id: Ied34684509f1db37727880116bab785fddaaded3
2017-05-21 19:32:35 -07:00
Max Bires
2d76a6ac61 Adding vndbinder_use statements to support the new qualcomm patches
Leaving in the binder call until I can independently verify that none of
these domains are running anything through binder, and if they are then
file bug reports on it.

Some of these domains don't seem to use the transfer/call permissions,
so refraining from adding the full vndbinder_use statement until those
are apparent

Denials:

denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:hal_gnss_qti:s0
tclass=process

denied { open } for pid=556 comm="vndservicemanag"
path="/proc/744/attr/current" dev="proc" ino=25957
scontext=u:r:vndservicemanager:s0 tcontext=u:r:hal_gnss_qti:s0
tclass=file

denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=25957 scontext=u:r:vndservicemanager:s0
tcontext=u:r:hal_gnss_qti:s0 tclass=file

denied { call } for pid=744 comm="Loc_hal" scontext=u:r:hal_gnss_qti:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { ioctl open read write } for pid=744 comm="Loc_hal"
path="/dev/vndbinder" dev="tmpfs" ino=19167 ioctlcmd=6209
scontext=u:r:hal_gnss_qti:s0 tcontext=u:object_r:vndbinder_device:s0
tclass=chr_file

denied { ioctl } for pid=770 comm="Binder:770_2" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:per_mgr:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=process

denied { open } for pid=556 comm="vndservicemanag"
path="/proc/770/attr/current" dev="proc" ino=24336
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=file

denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=24336 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_mgr:s0 tclass=file

denied { search } for pid=556 comm="vndservicemanag" name="770"
dev="proc" ino=8315 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_mgr:s0 tclass=dir

denied { transfer } for pid=770 comm="pm-service"
scontext=u:r:per_mgr:s0 tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { call } for pid=770 comm="pm-service" scontext=u:r:per_mgr:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { ioctl open read write } for pid=770 comm="pm-service"
path="/dev/vndbinder" dev="tmpfs" ino=19167 ioctlcmd=6209
scontext=u:r:per_mgr:s0 tcontext=u:object_r:vndbinder_device:s0
tclass=chr_file

denied { read write } for pid=886 comm="cnss-daemon" name="vndbinder"
dev="tmpfs" ino=19167 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { ioctl } for pid=886 comm="cnss-daemon" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { ioctl } for pid=875 comm="rild" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:rild:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { ioctl open read write } for pid=853 comm="pm-proxy"
name="vndbinder" dev="tmpfs" ino=19167 scontext=u:r:per_proxy:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { call } for pid=853 comm="pm-proxy" scontext=u:r:per_proxy:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { search } for pid=556 comm="vndservicemanag" name="853"
dev="proc" ino=28401 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_proxy:s0 tclass=dir

denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=28421 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_proxy:s0 tclass=file

denied { open } for pid=556 comm="vndservicemanag"
path="/proc/853/attr/current" dev="proc" ino=28421
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_proxy:s0 tclass=file

denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_proxy:s0
tclass=process

denied  { add } for interface=vendor.qti.qcril.am::IQcRilAudio pid=875
scontext=u:r:rild:s0 tcontext=u:object_r:default_android_hwservice:s0
tclass=hwservice_manager

denied  { find } for service=vendor.qcom.PeripheralManager pid=774
uid=1001 scontext=u:r:rild:s0
tcontext=u:object_r:default_android_vndservice:s0 tclass=service_manager

denied { call } for pid=792 comm="cnss-daemon"
scontext=u:r:wcnss_service:s0 tcontext=u:r:vndservicemanager:s0
tclass=binder

denied { read write } for pid=1197 comm="rild" name="vndbinder"
dev="tmpfs" ino=19957 scontext=u:r:rild:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { call } for pid=773 comm="rild" scontext=u:r:rild:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

Bug: 34784662
Test: vndbinder functionality for these domains is working
Change-Id: Ife7d4b4734ab4aca1d314b1b6cbac3203b216adc
2017-05-21 19:32:35 -07:00
Max Bires
47e15da9ae Merge "Adding allows and context for dumpstate" 2017-05-22 01:52:35 +00:00
TreeHugger Robot
55b267982a Merge "Fix selinux denial for usb hal" 2017-05-22 00:17:10 +00:00
Max Bires
b1ad57c5a1 Merge "Removing netmgrd from permissive mode and into enforcing" 2017-05-20 23:15:46 +00:00
Max Bires
593581e7d7 Removing netmgrd from permissive mode and into enforcing
Bug: 34784662
Bug: 38261549
Test: netmgrd continues to function properly under enforcing
Change-Id: I763f222ddb9befd9b9e2ae9aff713b5d865c62f7
2017-05-20 23:15:20 +00:00
Max Bires
79a23bb77d Merge "Fixing a qti denial" 2017-05-20 21:49:20 +00:00
TreeHugger Robot
27d06323d6 Merge "Add <interface> / <instance> to dev compat mat" 2017-05-20 04:15:20 +00:00
TreeHugger Robot
f058642f29 Merge "ril: enable ECC customization" 2017-05-20 01:38:00 +00:00
Shawn Yang
ca75a2ced3 Merge "Stop always on logging when external logging enabled" 2017-05-20 01:00:28 +00:00
TreeHugger Robot
0150e2bb2f Merge "Interface callbacks from CHRE interface to the Offload server" 2017-05-19 23:39:31 +00:00
TreeHugger Robot
60775a9f44 Merge "Offload HAL Service: Constant definition" 2017-05-19 23:36:27 +00:00
Shawn Yang
7def19e4be Stop always on logging when external logging enabled
Bug:36691005

Turn off persist.sys.modem.diag.mdlog according the usb.sys.config
state

Test: Manually set usb.sys.config status and check for AOL status

Change-Id: Ia97956cc860173419b264951909890d9e8e60db8
2017-05-19 15:36:19 -07:00
Youhan Wang
6967e3b287 Merge "Grant system_app write access to tel_mon_prop" 2017-05-19 20:29:10 +00:00
Thierry Strudel
970e5b7dce Merge "Ensure usb related .rc is parsed in a defined order" 2017-05-19 20:01:27 +00:00
Yueyao Zhu
9c902b351f Ensure usb related .rc is parsed in a defined order
Loading process:
- rootdir/init.rc
    |- /vendor/etc/init/hw/init.${ro.hardware}.rc
        |- /vendor/etc/init/hw/init.${ro.hardware}.usb.rc
            |- /vendor/etc/init/hw/init.wahoo.usb.rc

This CL moves init.hardware.rc, init.wahoo.usb.rc to /vendor/
etc/init/hw/, and import /vendor/etc/init/hw/init.${ro.hardware}
.usb.rc from init.hardware.rc.

Test: Build with related CLs and USB File Transfer works
Bug: 38301110
Change-Id: I4808a117994374bceac324c60cc47225a8df5970
Signed-off-by: Yueyao Zhu <yueyao@google.com>
2017-05-19 12:01:14 -07:00
Joel Fernandes
8fa14d1102 init: Change default governor to schedutil and set ratelimits
Use rate-limit values: 500us for up, 20ms for down.

Change-Id: Ifc3ebb8e63078ab402080b50b800b6fffb326f97
Signed-off-by: Joel Fernandes <joelaf@google.com>
2017-05-19 18:26:01 +00:00
Max Bires
14f3c709af Adding allows and context for dumpstate
denied  { find } for
service=android.service.gatekeeper.IGateKeeperService pid=14914 uid=2000
scontext=u:r:dumpstate:s0 tcontext=u:object_r:gatekeeper_service:s0
tclass=service_manager

denied { call } for scontext=u:r:dumpstate:s0
tcontext=u:r:update_engine:s0 tclass=binder

denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0
tclass=binder

denied { use } for path="pipe:[231372]" dev="pipefs" ino=231372
scontext=u:r:hal_audio_default:s0 tcontext=u:r:dumpstate:s0 tclass=fd

denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:per_mgr:s0
tclass=binder

denied { read } for name="log" dev="debugfs" ino=32
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=file

denied { read } for name="rpm_master_stats" dev="debugfs" ino=16914
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs_rpm:s0
tclass=file

denied { read } for name="rpm_stats" dev="debugfs" ino=16912
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs_rpm:s0
tclass=file

denied { read } for comm="top" name="stat" dev="proc" ino=4026532075
scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file

Bug: 34784662
Bug: 38292576
Test: The above denials are no longer present in adb bugreport
Change-Id: I1def308765f818c04833e2127df1c9803ed2dc77
2017-05-19 11:22:19 -07:00
Badhri Jagan Sridharan
ddc21e70ac Fix selinux denial for usb hal
Fixes the following denial:
avc: denied { write } for name="current_power_role"
dev="sysfs" ino=50970 scontext=u:r:hal_usb_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
permissive=0

Bug: 38097623
Test: The denial message is not seen anymore.
Change-Id: I961a595a06211214142d3316abf7172f5e500347
2017-05-19 10:28:10 -07:00
tim.tm_lin
d960db5b4f ril: enable ECC customization
Bug: 38402296
Change-Id: I5ecfab75c450a9258d2b95cb7b603c15c8d9b67d
2017-05-19 10:11:14 -07:00
Max Bires
668f76f3fe Fixing a qti denial
denied { read write } for name="smdcntl8" dev="tmpfs" ino=20779
scontext=u:r:qti:s0 tcontext=u:object_r:smd_device:s0 tclass=chr_file

Bug: 34784662
Test: qti has access to the smd_device
Change-Id: I89a6f27c484c8ef6fd3478da8e394d9aec517ae2
2017-05-19 17:04:08 +00:00
Yifan Hong
31f2043b4f Merge "Fix instance name in manifest.xml for keymaster" 2017-05-19 16:36:00 +00:00
Zhijun He
3b8330ec56 Merge "Enable EIS3 and Gzoom by default" 2017-05-19 16:28:25 +00:00
Wei Wang
1fe2d41ec9 Merge "wahoo: all ramdump to set RCU stall property" 2017-05-19 03:41:33 +00:00
Zhijun He
62bae0b32f Enable EIS3 and Gzoom by default
Bug: 38299858
Change-Id: I6e1c252ea547e21680f43edec5c81d8edccfc5fb
2017-05-19 02:15:27 +00:00
Sohani Rao
6d9cd96678 Interface callbacks from CHRE interface to the Offload server
Bug: 32842314
Test: VTS
Change-Id: I58f6f7e403671070dfcd986dccfd0fc44f55f686
2017-05-18 18:32:34 -07:00
Youhan Wang
ef151ac4d7 Grant system_app write access to tel_mon_prop
Define new type tel_mon_prop and matches with
persist.radio.enable_tel_mon

TelephonyMonitor debug switch in Developer Options requires read/write
access to persist.radio.enable_tel_mon.

The feature is only enabled on userdebug/eng devices for Pixel17.

Test: Make, Toggling Developer Options -> Telephony Monitor succeeds

Bug:38351509
Change-Id: I8c68c2bca3040b6a067f83606589ef6f857cf9fc
2017-05-18 17:57:33 -07:00
Ahmed ElArabawy
ea9e809ba7 Merge "Revert "power hal: Add power HAL API 1.1 impl for Wahoo"" 2017-05-18 23:57:27 +00:00
Wei Wang
d977d05b45 wahoo: all ramdump to set RCU stall property
Panic on RCU stall hasn't been enabled on wahoo but we need the
permission in order to make ramdump app do not crash.

Bug: 38423394
Test: ramdump app has proper permission
Change-Id: I9831f2ac3dfbfdd1db099fa04683380e25cbd1ec
2017-05-18 15:50:35 -07:00
Yifan Hong
e25410da1e Fix instance name in manifest.xml for keymaster
Test: m system_compatibility_matrix.xml
Test: device boots with and without data wipe
Change-Id: Ibc75398b8d4c0f751c639d26b92d9736d6401e87
2017-05-18 22:46:49 +00:00
Yifan Hong
fbfba6f554 Add <interface> / <instance> to dev compat mat
Test: m compatibility_matrix.xml -j
Test: m system_manifest.xml -j
Bug: 38395193
Change-Id: Ia75a6ac4b4f8f4380da8707482886df408e60250
2017-05-18 14:37:08 -07:00
Youhan Wang
fe8ca0668e Merge "Set data roaming default false for Wahoo." 2017-05-18 17:37:17 +00:00
Jaesoo Lee
da9eee4c13 Merge "configstore: applied uprev of configstore (1.0 -> 1.1)" 2017-05-18 13:05:41 +00:00
Andrew Scull
5ffefa6084 Merge changes from topic 'ese vintf'
* changes:
  Add OemLock HAL to the manifest.
  Add Weaver HAL to the manifest.
2017-05-18 09:31:42 +00:00
Wei Wang
fa7fff56b6 Merge "wahoo: tune zram performance" 2017-05-18 05:01:29 +00:00
Ajay Dudani
ddfc169363 perfd: Add rule to allow hal_power_default signull denial
[ 1786.071909] type=1400 audit(1495048493.567:602): avc: denied {
signull } for pid=781 comm="perfd" scontext=u:r:perfd:s0
tcontext=u:r:hal_power_default:s0 tclass=process permissive=1

Test: Boot test, verified this selinux denial doesn't show up
Change-Id: I37a4cf45eea84dc3314d235ef21eb7d2c2d8c33e
2017-05-18 04:16:08 +00:00
Ajay Dudani
6a5352b668 Update init.radio.sh path in file_contexts
init.radio.sh has moved from /system to /vendor; update the path in
file_contexts to reflect the same.

Test: Bootup, rild running
Change-Id: Iada7b217272e8b5c0de35252bde95ffe37d144fa
2017-05-17 17:06:56 -07:00
Ajay Dudani
e80ed35837 Update init.power.sh path in file_contexts
init.power.sh has moved from /system to /vendor; update the path in
file_contexts to reflect the same.

Bug: 38317397
Test: Verified interaction and launch hints were handled post bootup
Change-Id: I6c57d9fc06e2f9ca984ea0f357a8b64d5b48d76f
2017-05-17 17:06:42 -07:00
Youhan Wang
cfa36ccf9c Set data roaming default false for Wahoo.
Test: make

Bug:37973320
Change-Id: Ic36c8de8ba87149dfa9ada6660ee893d2beb340b
2017-05-17 16:55:23 -07:00
Sohani Rao
bc8bc52f92 Offload HAL Service: Constant definition
Define constants to be used by Offload Service implementation.

Bug: 32842314
Test: VTS
Change-Id: I95c2c28207f5f6e76a69ea13c79ddc07418ac2c8
2017-05-17 16:48:35 -07:00
Wei Wang
88f424e979 wahoo: tune zram performance
-Switch to LZ4 for better overall performance
-Set max_comp_streams to num of cores since upstream also moves this to
percpu.
-Set page-cluster to 0 as the incremental cost of reading 1 page at a
time is negligible for zram

Bug: 38249616
Test: boot and run zram-perf showing better performance
Change-Id: I0b92b246d773db85aa03d033b2cecee54347cbd1
2017-05-17 16:19:32 -07:00
Ahmed ElArabawy
e9e903f222 Revert "power hal: Add power HAL API 1.1 impl for Wahoo"
This reverts commit c043816b3c.
The reason of the revert is to check for the application start time
regression that may have been caused by the CL

Bug: 38317397
Test: None

Change-Id: I7edaf75eeebcecb848b38a9b7eff2bdb1f233cdb
Signed-off-by: Ahmed ElArabawy <arabawy@google.com>
2017-05-17 15:21:36 -07:00
Chia-kai Liang
bd46d535f7 Merge "Add Hexagon permission to hal_camera" 2017-05-17 21:45:10 +00:00
TreeHugger Robot
2cf4d76a03 Merge "sepolicy: add ese_load and ese data dirs" 2017-05-17 19:26:42 +00:00
Chia-Kai Liang
42f7cf7b4f Add Hexagon permission to hal_camera
Bug: 38353688
Test: Works correctly on signed device.
Change-Id: I040a2bad2c9286aad55b1ca8d1e484ee8dc91bd8
2017-05-17 10:50:54 -07:00
Andrew Scull
099196d5e1 Add OemLock HAL to the manifest.
Bug: 38173042
Test: Build and boot
Change-Id: I44a09ca5c4fdffd262700d385571edc96b4c9059
2017-05-17 15:29:19 +01:00
Andrew Scull
850831bfe6 Add Weaver HAL to the manifest.
Bug: 38173757
Test: Build and boot
Change-Id: Icd76ad270dd4a6e99ca61a62c174cbcaf5542765
2017-05-17 15:26:42 +01:00
Stefano Tommasini
922ee28abc Merge "Add external storage and contact permissions to 2017 google phones." 2017-05-17 12:34:56 +00:00
Stefanot
8db7a09938 Add external storage and contact permissions to 2017 google phones.
Test: manual
BUG:37635903
Change-Id: I6257943e380d6fa90ce042e143a065bb64d51a3c
2017-05-17 11:22:43 +01:00
TreeHugger Robot
94ad4c9beb Merge "lights.$(TARGET_DEVICE): moved to vendor partition" 2017-05-17 09:41:31 +00:00