Badhri Jagan Sridharan
49e7f44507
USB: HIDL: check the status of registerAsService
...
registerAsService call could fail. Hence check the return value.
Bug: 36704362
Change-Id: I46dcd74dbee6aba72cf344f10854e5d4b1b6de18
2017-04-04 10:38:37 -07:00
TreeHugger Robot
8f6890a219
Merge "Add additional XML files needed for sound trigger hal."
2017-03-30 21:02:22 +00:00
Mikhail Naganov
689da96d32
Bring up binderized Audio and Soundtrigger services on new Pixels
...
Verified: audio in Hangouts, Play Music + EQ, YouTube,
audio over A2DP and USB.
Soundtrigger seems to be working--the device wakes up to lockscreen,
need to dismiss it manually, and then Assistant prompt appears
immediately by itself. Looks to me more like an issue with Assistant
rather than with s/t.
Bug: 35808308
Bug: 36098105
Test: manual
Change-Id: I03c0e04a8f35b7da0bbef9dd32e606a07067ba36
2017-03-30 11:19:37 -07:00
Chris Thornton
120f6d1578
Add additional XML files needed for sound trigger hal.
...
Test: Build and check on device.
Change-Id: I65a43c164fb5e5a9a5d7b19529a7a4b94b613be4
2017-03-30 06:06:58 +00:00
Chris Thornton
c25557a7dd
Set correct permissions for /dev/wcd_dsp0_control on boot.
...
Test: Build and check on device.
Change-Id: I17c7d0619a37973be080b760c128f77c2ac64786
2017-03-30 06:06:21 +00:00
Craig Donner
29a50004fa
Add VR feature flags and HAL.
...
Bug: 36097960
Bug: 36462741
Test: adb shell lshal on device, successfully ran Daydream Home, though I'm
seeing some crashes in various things.
Change-Id: Id1af18701e2021ab8c3de7889ec71c316fe4420c
2017-03-29 21:51:11 -07:00
Thierry Strudel
c8490d4b7f
Merge "power: import and enable binderized power hal"
2017-03-30 04:49:38 +00:00
Adrian Salido
fdfd0407a4
power: import and enable binderized power hal
...
Bug: 36096835
Test: boot, verify hal is loaded and taking power hints
Change-Id: I75d7ef2f378f6d71de1776f78726be4812bf196f
2017-03-29 21:04:32 -07:00
Jie Song
58d80579d9
Add wahoo dumpstate and sepolicy with smlog
...
Bug: 33820081
Test: Verify dumpstate service running
Change-Id: I2dffdb063aa3291b1c9ee95df903977d6a928d1e
2017-03-30 02:53:48 +00:00
Jeff Vander Stoep
0f6882d7c2
annotate vendor components that access core data types am: b7606d8693
...
am: a5f3221410
Change-Id: I525fc904d4d1db845a7460bb83b34e4abf121314
2017-03-29 23:44:12 +00:00
Jeff Vander Stoep
a5f3221410
annotate vendor components that access core data types
...
am: b7606d8693
Change-Id: Ic2f5839eb7ae98068663a58ca6f76ec66a3f4907
2017-03-29 23:38:12 +00:00
Max Bires
3dc6317e58
Merge "Adding allows to handle boot and runtime denials" into oc-dev am: 69c0497447
...
am: c6f2f63c43 -s ours
Change-Id: I89963200a61f5c6a437e1a701a6a091c5495d898
2017-03-29 20:39:00 +00:00
Jeff Vander Stoep
b7606d8693
annotate vendor components that access core data types
...
Grant cnd a temporary exemption to a neverallow rule
asserting vendor processes may not access core data types outside
/data/vendor.
Cherry-picked from ead208b3b3
Bug: 34980020
Bug: 36712542
Test: Muskie builds
Change-Id: I68baee81282343b5627b012ff39d2f038fb99054
2017-03-29 13:13:35 -07:00
Max Bires
c6f2f63c43
Merge "Adding allows to handle boot and runtime denials" into oc-dev
...
am: 69c0497447
Change-Id: If34258c497e4ea9a27cd27bdb98f520b35d31842
2017-03-29 20:01:28 +00:00
TreeHugger Robot
69c0497447
Merge "Adding allows to handle boot and runtime denials" into oc-dev
2017-03-29 19:57:16 +00:00
Max Bires
6dd9019412
Adding allows to handle boot and runtime denials
...
Denials dealt with:
denied { search } for pid=811 comm="cnd" name="soc0" dev="sysfs"
ino=49100 scontext=u:r:cnd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=dir
denied { fsetid } for pid=811 comm="cnd" capability=4
scontext=u:r:cnd:s0 tcontext=u:r:cnd:s0 tclass=capability
denied { chown } for pid=811 comm="cnd" capability=0 scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=capability
denied { read write } for pid=794 comm="android.hardwar" name="video3"
dev="tmpfs" ino=10129 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:video_device:s0 tclass=chr_file
denied { open } for pid=794 comm="android.hardwar" path="/dev/video3"
dev="tmpfs" ino=10129 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:video_device:s0 tclass=chr_file
denied { sendto } for pid=811 comm="cnd" path="/dev/socket/wpa_wlan0"
scontext=u:r:cnd:s0 tcontext=u:r:hal_wifi_supplicant_default:s0
tclass=unix_dgram_socket
denied { sendto } for pid=6516 comm="wpa_supplicant"
path="/data/misc/wifi/sockets/wpa_ctrl_811-1"
scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:cnd:s0
tclass=unix_dgram_socket
denied { ioctl } for pid=811 comm="cnd" path="socket:[108403]"
dev="sockfs" ino=108403 ioctlcmd=8921 scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=udp_socket
denied { create } for pid=811 comm="cnd" scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=udp_socket
denied { create } for pid=811 comm="cnd" name="wpa_ctrl_811-1"
scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0 tclass=sock_file
denied { add_name } for pid=811 comm="cnd" name="wpa_ctrl_811-1"
scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0 tclass=dir
denied { write } for pid=811 comm="cnd" name="sockets" dev="sda45"
ino=638992 scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0
tclass=dir
denied { search } for pid=811 comm="cnd" name="sockets" dev="sda45"
ino=638992 scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0
tclass=dir
denied { search } for pid=811 comm="cnd" name="wifi" dev="sda45"
ino=638991 scontext=u:r:cnd:s0 tcontext=u:object_r:wifi_data_file:s0
tclass=dir
denied { write } for pid=1551 comm="HwBinder:790_1" name="perfd"
dev="tmpfs" ino=23062 scontext=u:r:hal_camera_default:s0
tcontext=u:object_r:perfd_socket:s0 tclass=sock_file
denied { write } for pid=810 comm="imsqmidaemon" name="property_service"
dev="tmpfs" ino=18259 scontext=u:r:ims:s0
tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { connectto } for pid=810 comm="imsqmidaemon"
path="/dev/socket/property_service" scontext=u:r:ims:s0
tcontext=u:r:init:s0 tclass=unix_stream_socket
denied { set } for property=sys.ims.QMI_DAEMON_STATUS pid=810 uid=1000
gid=1001 scontext=u:r:ims:s0 tcontext=u:object_r:system_prop:s0
tclass=property_service
denied { ioctl } for pid=1114 comm="lowi-server" path="socket:[25101]"
dev="sockfs" ino=25101 ioctlcmd=8927 scontext=u:r:location:s0
tcontext=u:r:location:s0 tclass=udp_socket
denied { ioctl } for pid=1114 comm="lowi-server" path="socket:[25101]"
dev="sockfs" ino=25101 ioctlcmd=8be5 scontext=u:r:location:s0
tcontext=u:r:location:s0 tclass=udp_socket
denied { ioctl } for pid=6504 comm="lowi-server" path="socket:[90743]"
dev="sockfs" ino=90743 ioctlcmd=c304 scontext=u:r:location:s0
tcontext=u:r:location:s0 tclass=socket
denied { search } for pid=812 comm="netmgrd" name="soc0" dev="sysfs"
ino=49100 scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=dir
denied { read } for pid=3684 comm="csbootstraputil"
name="u:object_r:ims_prop:s0" dev="tmpfs" ino=10082
scontext=u:r:radio:s0 tcontext=u:object_r:ims_prop:s0 tclass=file
denied { open } for pid=3684 comm="csbootstraputil"
path="/dev/__properties__/u:object_r:ims_prop:s0" dev="tmpfs" ino=10082
scontext=u:r:radio:s0 tcontext=u:object_r:ims_prop:s0 tclass=file
denied { getattr } for pid=3684 comm="csbootstraputil"
path="/dev/__properties__/u:object_r:ims_prop:s0" dev="tmpfs" ino=10082
scontext=u:r:radio:s0 tcontext=u:object_r:ims_prop:s0 tclass=file
denied { write } for pid=669 comm="ramdump" name="property_service"
dev="tmpfs" ino=18259 scontext=u:r:ramdump:s0
tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { connectto } for pid=669 comm="ramdump"
path="/dev/socket/property_service" scontext=u:r:ramdump:s0
tcontext=u:r:init:s0 tclass=unix_stream_socket
denied { set } for property=debug.htc.hrdump pid=669 uid=0 gid=0
scontext=u:r:ramdump:s0 tcontext=u:object_r:debug_prop:s0
tclass=property_service
denied { setattr } for pid=688 comm="tftp_server" name="rfs" dev="sdd3"
ino=17 scontext=u:r:rfs_access:s0 tcontext=u:object_r:persist_file:s0
tclass=dir
denied { search } for pid=931 comm="thermal-engine"
name="0.qcom,rmtfs_sharedmem" dev="sysfs" ino=18392
scontext=u:r:thermal-engine:s0 tcontext=u:object_r:sysfs_rmtfs:s0
tclass=dir
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I6977fc0bf94bc68cdbc081ca7771ff6c91cc9805
2017-03-29 17:47:24 +00:00
Jeff Vander Stoep
ead208b3b3
annotate vendor components that access core data types
...
Grant cnd a temporary exemption to a neverallow rule
asserting vendor processes may not access core data types outside
/data/vendor.
Bug: 34980020
Bug: 36712542
Test: Muskie builds
Change-Id: I68baee81282343b5627b012ff39d2f038fb99054
2017-03-29 08:10:29 -07:00
Jeff Vander Stoep
83256ce993
Mark vendor components that access core data types am: 5182fda3a2
...
am: 3a3c8bdf06
Change-Id: Ibce7df17a968ba488762ab35ecfc5a5e28834922
2017-03-29 14:14:10 +00:00
Jeff Vander Stoep
3a3c8bdf06
Mark vendor components that access core data types
...
am: 5182fda3a2
Change-Id: Ie31c7698cc2ec1e5b32f44691e5c1cc80c56cb0d
2017-03-29 14:12:11 +00:00
Brian Carlstrom
921b1fdad0
Set wahoo default log size to 1M on userdebug/eng builds
...
Test: m -j32
Bug: 36703476
Change-Id: Ia2a8ef5777ede9ce3dbc4c27fb095c905b69ca62
2017-03-29 05:01:46 +00:00
Ruchi Kandoi
50cc0a03c2
Merge "Remove libnfc-nxp.conf"
2017-03-29 01:21:32 +00:00
Max Bires
4e841d2abc
Merge "Removing allow rule."
2017-03-28 23:03:52 +00:00
Max Bires
6a6d8a7e80
Removing allow rule.
...
Allow rule was triggering a neverallow, missed due to a bug.
Test: The device builds
Change-Id: Ie79d15c294d798a0ed65ef4705636dc63576a76d
2017-03-28 16:00:38 -07:00
TreeHugger Robot
6b44fe98ee
Merge "The IUsb interface uses "default" service name"
2017-03-28 22:50:05 +00:00
Ruchi Kandoi
4fd68ab1ff
Remove libnfc-nxp.conf
...
The config files are device specific in terms of the
clock the NFC controller uses.
Test: NFC is enabled on both the devices
Bug: 36163226
Change-Id: I805e4581216d673741777a1aea5baa16d5c96f99
Signed-off-by: Ruchi Kandoi<kandoiruchi@google.com >
2017-03-28 22:43:32 +00:00
Connor O'Brien
314713bf96
Merge "Add binderized memtrack HAL service"
2017-03-28 22:24:27 +00:00
Badhri Jagan Sridharan
dfc1cbd1d9
The IUsb interface uses "default" service name
...
By default, it is expected that the service does not rename itself
unless there is more than one service exposed by the interface. This
CL changes the usb hal service name back to "default" instead of
"usb_hal"
Bug: 36097487
Test: Manually tested role swap and UI behavior
Change-Id: I4a0aa4423c80cd893c578bc58b9276956daba732
2017-03-28 14:28:16 -07:00
Jeff Vander Stoep
5182fda3a2
Mark vendor components that access core data types
...
Grant these components a temporary exemption to a neverallow rule
asserting vendor processes may not access core data types outside
/data/vendor.
Bug: 34980020
Test: Build and boot Muskie.
Change-Id: I1e536fb7c09a3a2907d06db8304279551a6de81e
2017-03-28 14:17:44 -07:00
TreeHugger Robot
7a95e0d0d1
Merge "Adding allows to handle boot and runtime denials"
2017-03-28 21:13:23 +00:00
TreeHugger Robot
ab1e608280
Merge "time_daemon: No longer on device so remove sepolicy"
2017-03-28 17:26:35 +00:00
TreeHugger Robot
626d542203
Merge "Annotate violators of "no sockets between core and vendor" rule"
2017-03-28 00:04:55 +00:00
TreeHugger Robot
23a96c7cb2
Merge "USB HAL: type-c hal for muskie/walleye"
2017-03-27 23:51:16 +00:00
Steven Moreland
d556b43cd0
Merge "liblight: remove button light."
2017-03-27 23:25:30 +00:00
Thierry Strudel
d5dfd2260c
init.hardware.rc: move out non common part
...
Change-Id: If2a580c53da0554748c22afded341c3ea98c6288
Signed-off-by: Thierry Strudel <tstrudel@google.com >
2017-03-27 23:07:24 +00:00
Max Bires
10bb91bd69
Adding allows to handle boot and runtime denials
...
Denials dealt with:
denied { read } for pid=1174 comm="BootAnimation::" name="system"
dev="sda45" ino=3407873 scontext=u:r:bootanim:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { search } for pid=811 comm="cnd" name="soc0" dev="sysfs"
ino=49100 scontext=u:r:cnd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=dir
denied { fsetid } for pid=811 comm="cnd" capability=4
scontext=u:r:cnd:s0 tcontext=u:r:cnd:s0 tclass=capability
denied { chown } for pid=811 comm="cnd" capability=0 scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=capability
denied { read write } for pid=794 comm="android.hardwar" name="video3"
dev="tmpfs" ino=10129 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:video_device:s0 tclass=chr_file
denied { open } for pid=794 comm="android.hardwar" path="/dev/video3"
dev="tmpfs" ino=10129 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:video_device:s0 tclass=chr_file
denied { sendto } for pid=811 comm="cnd" path="/dev/socket/wpa_wlan0"
scontext=u:r:cnd:s0 tcontext=u:r:hal_wifi_supplicant_default:s0
tclass=unix_dgram_socket
denied { sendto } for pid=6516 comm="wpa_supplicant"
path="/data/misc/wifi/sockets/wpa_ctrl_811-1"
scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:cnd:s0
tclass=unix_dgram_socket
denied { ioctl } for pid=811 comm="cnd" path="socket:[108403]"
dev="sockfs" ino=108403 ioctlcmd=8921 scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=udp_socket
denied { create } for pid=811 comm="cnd" scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=udp_socket
denied { create } for pid=811 comm="cnd" name="wpa_ctrl_811-1"
scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0 tclass=sock_file
denied { add_name } for pid=811 comm="cnd" name="wpa_ctrl_811-1"
scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0 tclass=dir
denied { write } for pid=811 comm="cnd" name="sockets" dev="sda45"
ino=638992 scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0
tclass=dir
denied { search } for pid=811 comm="cnd" name="sockets" dev="sda45"
ino=638992 scontext=u:r:cnd:s0 tcontext=u:object_r:wpa_socket:s0
tclass=dir
denied { search } for pid=811 comm="cnd" name="wifi" dev="sda45"
ino=638991 scontext=u:r:cnd:s0 tcontext=u:object_r:wifi_data_file:s0
tclass=dir
denied { write } for pid=1551 comm="HwBinder:790_1" name="perfd"
dev="tmpfs" ino=23062 scontext=u:r:hal_camera_default:s0
tcontext=u:object_r:perfd_socket:s0 tclass=sock_file
denied { write } for pid=810 comm="imsqmidaemon" name="property_service"
dev="tmpfs" ino=18259 scontext=u:r:ims:s0
tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { connectto } for pid=810 comm="imsqmidaemon"
path="/dev/socket/property_service" scontext=u:r:ims:s0
tcontext=u:r:init:s0 tclass=unix_stream_socket
denied { set } for property=sys.ims.QMI_DAEMON_STATUS pid=810 uid=1000
gid=1001 scontext=u:r:ims:s0 tcontext=u:object_r:system_prop:s0
tclass=property_service
denied { ioctl } for pid=1114 comm="lowi-server" path="socket:[25101]"
dev="sockfs" ino=25101 ioctlcmd=8927 scontext=u:r:location:s0
tcontext=u:r:location:s0 tclass=udp_socket
denied { ioctl } for pid=1114 comm="lowi-server" path="socket:[25101]"
dev="sockfs" ino=25101 ioctlcmd=8be5 scontext=u:r:location:s0
tcontext=u:r:location:s0 tclass=udp_socket
denied { ioctl } for pid=6504 comm="lowi-server" path="socket:[90743]"
dev="sockfs" ino=90743 ioctlcmd=c304 scontext=u:r:location:s0
tcontext=u:r:location:s0 tclass=socket
denied { search } for pid=812 comm="netmgrd" name="soc0" dev="sysfs"
ino=49100 scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=dir
denied { read } for pid=3684 comm="csbootstraputil"
name="u:object_r:ims_prop:s0" dev="tmpfs" ino=10082
scontext=u:r:radio:s0 tcontext=u:object_r:ims_prop:s0 tclass=file
denied { open } for pid=3684 comm="csbootstraputil"
path="/dev/__properties__/u:object_r:ims_prop:s0" dev="tmpfs" ino=10082
scontext=u:r:radio:s0 tcontext=u:object_r:ims_prop:s0 tclass=file
denied { getattr } for pid=3684 comm="csbootstraputil"
path="/dev/__properties__/u:object_r:ims_prop:s0" dev="tmpfs" ino=10082
scontext=u:r:radio:s0 tcontext=u:object_r:ims_prop:s0 tclass=file
denied { write } for pid=669 comm="ramdump" name="property_service"
dev="tmpfs" ino=18259 scontext=u:r:ramdump:s0
tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { connectto } for pid=669 comm="ramdump"
path="/dev/socket/property_service" scontext=u:r:ramdump:s0
tcontext=u:r:init:s0 tclass=unix_stream_socket
denied { set } for property=debug.htc.hrdump pid=669 uid=0 gid=0
scontext=u:r:ramdump:s0 tcontext=u:object_r:debug_prop:s0
tclass=property_service
denied { setattr } for pid=688 comm="tftp_server" name="rfs" dev="sdd3"
ino=17 scontext=u:r:rfs_access:s0 tcontext=u:object_r:persist_file:s0
tclass=dir
denied { search } for pid=931 comm="thermal-engine"
name="0.qcom,rmtfs_sharedmem" dev="sysfs" ino=18392
scontext=u:r:thermal-engine:s0 tcontext=u:object_r:sysfs_rmtfs:s0
tclass=dir
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I6977fc0bf94bc68cdbc081ca7771ff6c91cc9805
2017-03-27 20:48:52 +00:00
TreeHugger Robot
5287e34b38
Merge "Add SchedTune configuration"
2017-03-27 20:40:49 +00:00
Badhri Jagan Sridharan
1cf5094895
USB HAL: type-c hal for muskie/walleye
...
Bug: 36097487
Test: Manually tested role swap and UI behavior
Change-Id: I5ce520da521e0714001b60164ac850dddbd644c3
2017-03-27 20:18:35 +00:00
TreeHugger Robot
abd026d8e5
Merge "Enable partitions on loop devices."
2017-03-27 19:50:34 +00:00
TreeHugger Robot
ccfe224b18
Merge "Add SIP feature to makefile"
2017-03-27 19:33:48 +00:00
Connor O'Brien
a202169318
Add binderized memtrack HAL service
...
Test: Boots and passes memtrack VTS with no memtrack-related SELinux
denials; dumpsys meminfo reports reasonable values for graphics memory
usage.
Bug: 36097468
Change-Id: I878bf682a74d479011e0435a427551ec606d032f
Signed-off-by: Connor O'Brien <connoro@google.com >
2017-03-27 11:53:48 -07:00
Jeff Sharkey
485715094f
Enable partitions on loop devices.
...
This is used by the new "virtual disk" feature used by vold to help
debug and test storage code on devices without physical media.
Bug: 34903607
Test: builds, boots
Change-Id: Ifb7653a2100ef40a83b2c663c5dd3114d4b05ab6
2017-03-27 12:05:44 -06:00
TreeHugger Robot
67db39201a
Merge "Set up adb in recovery mode"
2017-03-27 16:50:37 +00:00
Alex Klyubin
6b6e6bc3f4
Annotate violators of "no sockets between core and vendor" rule
...
These vendor domains use communicate with core domains over sockets,
which is not permitted. This commit thus temporarily associates these
domains with socket_between_core_and_vendor_violators attribute which
permits this banned behavior to continue for now. This is a temporary
workaround. The fix is to fix these domains to not communicate with
core domains over sockets.
NOTE: Some of the domains on the list are there for a benign reason:
passthrough HALs. Core domains which host passthrough HAL
implementations may initiate socket connections to vendor domains and
this is completely permitted. I could've whitelisted all HAL client
domains in the neverallow rules (using halclientdomain attribute) but
this increases the risk of not noticing banned communications from
these domains. Thus, as a workaround until we stop using passthrough
HALs (b/34274385), I added the affected vendor domains to the list of
exemptions.
Test: mmm system/sepolicy
Bug: 36577153
Change-Id: I4b1c0dd92b000cd802dfc2eed003ac8e4d7c6000
2017-03-25 15:56:26 -07:00
TreeHugger Robot
e80b60c317
Merge "set_os_desc use to 1 for functions where diag is enabled"
2017-03-25 01:25:12 +00:00
Andres Oportus
cb3ed63677
Add SchedTune configuration
...
Bug: 36367381
Test: Boot and check stune configuration effect on sysfs
Change-Id: I838c31d164684a5d88550c92284b65bb50f2ed56
Signed-off-by: Andres Oportus <andresoportus@google.com >
2017-03-24 17:46:33 -07:00
John Dias
cc89b85d81
Merge "Change the firmware image search path to /vendor/firmware"
2017-03-24 23:15:29 +00:00
Badhri Jagan Sridharan
b23fe6bedc
Merge "usb.rc: separate out common usb scripts"
2017-03-24 23:03:59 +00:00
Badhri Jagan Sridharan
f5d7ba5d43
set_os_desc use to 1 for functions where diag is enabled
...
Test: Manually verify modem overlay functions for usbradio bootmode
Bug: 31947358
Change-Id: I433ca7a574b9535fc0fe470f7d4a5dec169ba683
2017-03-24 15:45:14 -07:00
Hall Liu
e696ee5edf
Add SIP feature to makefile
...
Change-Id: I9feee40d1defce93e4fc7bec997f8fe8af745424
Test: manual
Fixes: 36454749
2017-03-24 15:05:34 -07:00
Alex Klyubin
c0d916e7c5
wcnss_service is using Binder services. sad
...
Test: mmm system/sepolicy
Bug: 36599434
Change-Id: I6d49f5eac823f5ba0a45ab6e548e76e7fc9d2b66
2017-03-24 14:51:42 -07:00