Commit Graph

694 Commits

Author SHA1 Message Date
Steven Moreland
6e8f5ea639 Check handle for nullptr
Test: pass
Bug: 37662706
Change-Id: Ie3ad92a5dc71eeea9aa9a26f0a6f94ae7aca3433
2017-05-23 16:12:32 -07:00
TreeHugger Robot
01f9636200 Merge "remove duplicate entry" 2017-05-23 05:47:27 +00:00
TreeHugger Robot
844391d6de Merge "Move audio relative configs to vendor" 2017-05-23 04:47:39 +00:00
TreeHugger Robot
f4cc84ca29 Merge "Remove duplicated manifest entry" 2017-05-23 04:43:59 +00:00
Joel Fernandes
6875010b65 Merge "lisa: add functions for tuning wahoo touch boosts" 2017-05-23 04:33:35 +00:00
Sooraj Sasindran
153d047631 remove duplicate entry
remove duplicate entry android.hardware.bluetooth.

Change-Id: Ie370906ffeabf7f13d3f3e1403d1d5bea8bf0681
2017-05-23 04:21:58 +00:00
SzuWei Lin
60270793ab Move audio relative configs to vendor
Bug: 37927875
Test: check these files in folder vendor/etc
Test: play sound in settings
Change-Id: I9846b40cdb9ae531ec7fcb316480f92094649da9
2017-05-23 11:01:31 +08:00
Po-Chien Hsueh
fe1c017302 Remove duplicated manifest entry
Fix build error:

"Error when attempting to convert to manifest: Duplicated manifest.hal
entry android.hardware.bluetooth"

Test: built successfully after removing this duplicated entry
Change-Id: I8f2c531806ee3a477b5400bfd0e30f5d3d4da1c8
2017-05-23 10:57:45 +08:00
Connor O'Brien
2d9461841c lisa: add functions for tuning wahoo touch boosts
Automatically change the parameters used by the power HAL's
interaction hint by modifying powerhint.xml on the device.

Test: Ran functions, triggered touch event and confirmed values were
set correctly.
Signed-off-by: Connor O'Brien <connoro@google.com>

Change-Id: Ic8695c576f02e151e1fa038bfbb0f33625942b06
2017-05-22 19:17:47 -07:00
TreeHugger Robot
4f6d089ebb Merge "Fixing the following denials in order to prep ims for enforcing" 2017-05-23 01:26:37 +00:00
TreeHugger Robot
fd9534655b Merge changes I14794981,I9c259ab2
* changes:
  Offload HAL Service: Chre Interface factory
  Offload HAL Service: Implements Offload HAL
2017-05-23 00:29:27 +00:00
TreeHugger Robot
ea8214170e Merge "Add radio related interfaces to manifest." 2017-05-22 23:19:46 +00:00
TreeHugger Robot
fd82f82220 Merge "Offload HAL Service: Interface to CHRE platform" 2017-05-22 22:50:53 +00:00
TreeHugger Robot
5759846436 Merge "Add tango_permissions.xml and libtango jar file" 2017-05-22 21:31:20 +00:00
Sohani Rao
2649db3183 Offload HAL Service: Chre Interface factory
In order to make Offload Server testable, introduce a factory that will
create the Chre Interface object. This is a part of the dependency
injection framework to make OffloadServer testable.

Bug: 32842314
Test: VTS
Change-Id: I14794981a7b75b376462cb3fe8c6fb34df66a1ae
2017-05-22 14:30:31 -07:00
TreeHugger Robot
e57a86cce7 Merge "vibrator: add calibration data loading support" 2017-05-22 21:27:43 +00:00
Sohani Rao
5b1d1672ea Offload HAL Service: Implements Offload HAL
Define OffloadServer class that implements the Offload HAL service and
the callback interface to the CHRE platform. This is where the
communication to the CHRE interface will take place and this class is
created to be testable for unit testing.

Bug: 32842314
Test: VTS
Change-Id: I9c259ab2b721d7d1ac8cb16083c464002c237a16
2017-05-22 14:23:37 -07:00
Sohani Rao
29a90c0b97 Offload HAL Service: Interface to CHRE platform
Wraps around CHRE socket to provide an interface for service
implementation to interact with the CHRE socket. Implements callbacks
and corresponding host specific wrappers to interpret messages send by
the nano app.

Bug: 32842314
Test: VTS
Change-Id: I8f40a6d5aa6fcb946213225ba6bb1ff355b85f06
2017-05-22 13:50:06 -07:00
TreeHugger Robot
a9c05faf65 Merge "sepolicy: enable ese_load to run" 2017-05-22 20:16:54 +00:00
TreeHugger Robot
675f783896 Merge "wahoo: Add supplicant to HIDL manifest" 2017-05-22 18:48:32 +00:00
TreeHugger Robot
f24006c116 Merge "vibrator: update manifest.xml and fix issue with setAmplitude()" 2017-05-22 18:44:55 +00:00
Max Bires
ee434f59f0 Merge "Removing sensors from permissive and into enforcing mode" 2017-05-22 18:18:24 +00:00
Ranjith Kagathi Ananda
d51bc8dd82 Add tango_permissions.xml and libtango jar file
Add permissions/tango_permissions.xml and libtango
jar file to enable playstore updates

Test: Tested by installing signed app

BUG=36063455

Change-Id: I5f03daaadf019a133ec0c1d66af40349bc76b254
2017-05-22 11:16:40 -07:00
Max Bires
b5d9a7a4e0 Merge "Removing ssr_diag from permissive mode into enforcing" 2017-05-22 17:59:55 +00:00
Max Bires
b387500a64 Fixing the following denials in order to prep ims for enforcing
If there is no security issue with having ims write to ims_socket, then
I am fine with granting the permission in order to hurry up the
enforcing status of this domain.

denied { read } for pid=888 comm="imsdatadaemon" name="timestamp_switch"
dev="sysfs" ino=27246 scontext=u:r:ims:s0 tcontext=u:object_r:sysfs:s0
tclass=file

denied { open } for pid=888 comm="imsdatadaemon"
path="/sys/module/diagchar/parameters/timestamp_switch" dev="sysfs"
ino=27246 scontext=u:r:ims:s0 tcontext=u:object_r:sysfs:s0 tclass=file

denied { read } for pid=1326 comm="imsrcsd" name="timestamp_switch"
dev="sysfs" ino=27246 scontext=u:r:hal_rcsservice:s0
tcontext=u:object_r:sysfs:s0 tclass=file

denied { write } for pid=1077 comm="ims_rtp_daemon" name="ims_datad"
dev="tmpfs" ino=27069 scontext=u:r:ims:s0
tcontext=u:object_r:ims_socket:s0 tclass=sock_file

Bug: 34784662
Test: These denials no longer appear
Change-Id: I95d8b62d73fae35fca5e292e6927c4663db76e6f
2017-05-22 10:52:16 -07:00
Max Bires
55217df527 Merge "Removing rmt_storage from permissive and into enforcing" 2017-05-22 17:31:04 +00:00
Max Bires
c63b6fd359 Merge "Fixing a dac_override for perfd" 2017-05-22 17:19:36 +00:00
Max Bires
b9c5ac5b4e Merge "Removing rfs_access from permissive mode" 2017-05-22 16:59:27 +00:00
David Lin
0f959efa6c vibrator: add calibration data loading support
This patch adds the support of loading a calibration file and write it
back to the drv2624 kernel driver. The calibration file contains the
BEMF, GAIN and COMP numbers generated using the auto-calibration feature
of the drv2624 driver IC. The file also contains the per-device resonant
frequency number.

Test: calibrate the device and read back the values from kernel
Change-Id: Ieafe5b317c7544bd8d657168250fb41e2ee0d8fc
Signed-off-by: David Lin <dtwlin@google.com>
2017-05-22 16:36:47 +00:00
David Lin
ed1c9bd230 vibrator: update manifest.xml and fix issue with setAmplitude()
When outputting uint8_t / char to sysfs using ofstream it gets to
stringified to a character instead of string. For example, writing 127
would get converted to "\x7F\0a" in text while sysfs generally only
accept input in dec "127" or "0x7f" in hex format. This patch changes
the rtp_input type to uint32_t instead.

Bug: 36097386
Test done: VtsHalVibratorV1_0TargetTest all passed
Change-Id: Ie98e42584fd32843dec46edde7af54f9cdcbc4cc
Signed-off-by: David Lin <dtwlin@google.com>
2017-05-22 09:35:42 -07:00
Max Bires
6644722995 Merge "Removing system_server from permissive mode" 2017-05-22 16:04:57 +00:00
SzuWei Lin
11656dcc37 Move bluetooth property to vendor
Property 'qcom.bluetooth.soc' is readed by driver.  Moves it to
vendor to use bluetooth on generic AOSP.

Bug: 37927875
Test: switch on/off bluetooth in settings
Change-Id: Ib4dd140b7e9f1b3d6cce098d8527bafcafcff950
2017-05-22 18:28:27 +08:00
TreeHugger Robot
9f64145e0f Merge changes from topic 'merge-msm8998-AU143'
* changes:
  Enable IRTPService
  Fix in-call audio issue
  Adding vndbinder_use statements to support the new qualcomm patches
2017-05-22 10:08:09 +00:00
TreeHugger Robot
c4f618ff35 Merge "Move sec_config to vendor" 2017-05-22 03:51:21 +00:00
Max Bires
5081a8858a Removing sensors from permissive and into enforcing mode
Bug: 34784662
Bug: 38261579
Test: sensors domain is in enforcing and functioning properly
Change-Id: I2be2a411228ceedea2be974c60326efe27ebd43c
2017-05-21 20:18:17 -07:00
Max Bires
c1c03e41ba Removing ssr_diag from permissive mode into enforcing
Cannot find any denials relating to ssr_diag

Bug: 38261725
Bug: 34784662
Test: ssr_diag functions in enforcing mode
Change-Id: I70d64dee94fe2a5236aa28cbe956772c59f8ac42
2017-05-21 19:51:53 -07:00
Max Bires
5b8a6bbbb2 Merge "Removing per_mgr from permissive and into enforcing mode" 2017-05-22 02:44:02 +00:00
Sooraj Sasindran
ae03bcef3c Enable IRTPService
Enable IRTPService

Change-Id: I37dd0e10ff082cae8e32fdedb77774adc9f21af5
2017-05-21 19:32:35 -07:00
Wileen Chiu
4e79aefebc Fix in-call audio issue
Update instance name of QcRilAudio HAL.
Mutliple (one per SIM) instances of
QcRilAudio HAL is required.

Change-Id: Ied34684509f1db37727880116bab785fddaaded3
2017-05-21 19:32:35 -07:00
Max Bires
2d76a6ac61 Adding vndbinder_use statements to support the new qualcomm patches
Leaving in the binder call until I can independently verify that none of
these domains are running anything through binder, and if they are then
file bug reports on it.

Some of these domains don't seem to use the transfer/call permissions,
so refraining from adding the full vndbinder_use statement until those
are apparent

Denials:

denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:hal_gnss_qti:s0
tclass=process

denied { open } for pid=556 comm="vndservicemanag"
path="/proc/744/attr/current" dev="proc" ino=25957
scontext=u:r:vndservicemanager:s0 tcontext=u:r:hal_gnss_qti:s0
tclass=file

denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=25957 scontext=u:r:vndservicemanager:s0
tcontext=u:r:hal_gnss_qti:s0 tclass=file

denied { call } for pid=744 comm="Loc_hal" scontext=u:r:hal_gnss_qti:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { ioctl open read write } for pid=744 comm="Loc_hal"
path="/dev/vndbinder" dev="tmpfs" ino=19167 ioctlcmd=6209
scontext=u:r:hal_gnss_qti:s0 tcontext=u:object_r:vndbinder_device:s0
tclass=chr_file

denied { ioctl } for pid=770 comm="Binder:770_2" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:per_mgr:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=process

denied { open } for pid=556 comm="vndservicemanag"
path="/proc/770/attr/current" dev="proc" ino=24336
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_mgr:s0 tclass=file

denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=24336 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_mgr:s0 tclass=file

denied { search } for pid=556 comm="vndservicemanag" name="770"
dev="proc" ino=8315 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_mgr:s0 tclass=dir

denied { transfer } for pid=770 comm="pm-service"
scontext=u:r:per_mgr:s0 tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { call } for pid=770 comm="pm-service" scontext=u:r:per_mgr:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { ioctl open read write } for pid=770 comm="pm-service"
path="/dev/vndbinder" dev="tmpfs" ino=19167 ioctlcmd=6209
scontext=u:r:per_mgr:s0 tcontext=u:object_r:vndbinder_device:s0
tclass=chr_file

denied { read write } for pid=886 comm="cnss-daemon" name="vndbinder"
dev="tmpfs" ino=19167 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { ioctl } for pid=886 comm="cnss-daemon" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { ioctl } for pid=875 comm="rild" path="/dev/vndbinder"
dev="tmpfs" ino=19167 ioctlcmd=6201 scontext=u:r:rild:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { ioctl open read write } for pid=853 comm="pm-proxy"
name="vndbinder" dev="tmpfs" ino=19167 scontext=u:r:per_proxy:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { call } for pid=853 comm="pm-proxy" scontext=u:r:per_proxy:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

denied { search } for pid=556 comm="vndservicemanag" name="853"
dev="proc" ino=28401 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_proxy:s0 tclass=dir

denied { read } for pid=556 comm="vndservicemanag" name="current"
dev="proc" ino=28421 scontext=u:r:vndservicemanager:s0
tcontext=u:r:per_proxy:s0 tclass=file

denied { open } for pid=556 comm="vndservicemanag"
path="/proc/853/attr/current" dev="proc" ino=28421
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_proxy:s0 tclass=file

denied { getattr } for pid=556 comm="vndservicemanag"
scontext=u:r:vndservicemanager:s0 tcontext=u:r:per_proxy:s0
tclass=process

denied  { add } for interface=vendor.qti.qcril.am::IQcRilAudio pid=875
scontext=u:r:rild:s0 tcontext=u:object_r:default_android_hwservice:s0
tclass=hwservice_manager

denied  { find } for service=vendor.qcom.PeripheralManager pid=774
uid=1001 scontext=u:r:rild:s0
tcontext=u:object_r:default_android_vndservice:s0 tclass=service_manager

denied { call } for pid=792 comm="cnss-daemon"
scontext=u:r:wcnss_service:s0 tcontext=u:r:vndservicemanager:s0
tclass=binder

denied { read write } for pid=1197 comm="rild" name="vndbinder"
dev="tmpfs" ino=19957 scontext=u:r:rild:s0
tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file

denied { call } for pid=773 comm="rild" scontext=u:r:rild:s0
tcontext=u:r:vndservicemanager:s0 tclass=binder

Bug: 34784662
Test: vndbinder functionality for these domains is working
Change-Id: Ife7d4b4734ab4aca1d314b1b6cbac3203b216adc
2017-05-21 19:32:35 -07:00
Max Bires
269000ee1a Removing rfs_access from permissive mode
Bug: 34784662
Bug: 38261486
Test: rfs_access functions normally in enforcing mode
Change-Id: I1d0cddbceb30238ab56e9c959d25c18e9fdbf15b
2017-05-21 19:14:54 -07:00
Max Bires
47e15da9ae Merge "Adding allows and context for dumpstate" 2017-05-22 01:52:35 +00:00
Max Bires
dbfd297594 Removing rmt_storage from permissive and into enforcing
No longer seeing any denials related to rmt_storage

Bug: 34784662
Test: rmt_storage operates properly in enforcing mode
Change-Id: Ib7127b88b5ea35b8e92cdda48ad32a02c66f1c86
2017-05-21 17:18:17 -07:00
TreeHugger Robot
55b267982a Merge "Fix selinux denial for usb hal" 2017-05-22 00:17:10 +00:00
Max Bires
b1ad57c5a1 Merge "Removing netmgrd from permissive mode and into enforcing" 2017-05-20 23:15:46 +00:00
Max Bires
593581e7d7 Removing netmgrd from permissive mode and into enforcing
Bug: 34784662
Bug: 38261549
Test: netmgrd continues to function properly under enforcing
Change-Id: I763f222ddb9befd9b9e2ae9aff713b5d865c62f7
2017-05-20 23:15:20 +00:00
Max Bires
fd351dd0e2 Fixing a dac_override for perfd
Bug: 38182328
Bug: 34784662
Test: perfd no longer requests dac_override privileges
Change-Id: Idc6f2ff2c476327bb4a261b20413e688562ce049
2017-05-20 14:56:11 -07:00
Max Bires
79a23bb77d Merge "Fixing a qti denial" 2017-05-20 21:49:20 +00:00
TreeHugger Robot
27d06323d6 Merge "Add <interface> / <instance> to dev compat mat" 2017-05-20 04:15:20 +00:00
TreeHugger Robot
f058642f29 Merge "ril: enable ECC customization" 2017-05-20 01:38:00 +00:00