Chris Thornton
8f4fa5158e
The sound trigger hal needs to talk to /dev/wcd_dsp0_control for hotword.
...
Test: Ran on device after modifying policy
Change-Id: I0971a914fd50bcfb7d1823183950c45d2632cc42
2017-04-11 21:31:29 -07:00
TreeHugger Robot
1270be7329
Merge "Replace make file with soong"
2017-04-11 22:15:39 +00:00
Max Bires
31e74b0417
Merge "Setting SELinux to enforcing mode."
2017-04-11 21:55:49 +00:00
Max Bires
4dd28d5902
Merge "Switching some vendor libraries over to same_process_hal_file type"
2017-04-11 19:40:50 +00:00
Tyler Gunn
935d08b5d6
Merge "Enable handover support for Google devices."
2017-04-11 18:35:55 +00:00
Max Bires
723bebb5ce
Switching some vendor libraries over to same_process_hal_file type
...
A lot of app domains were requesting vendor_file read access due to some
mislabeled .so files. This should fix that without granting read access
to vendor_file
Bug: 34784662
Test: .so files are properly labeled
Change-Id: I2aa69d54717af4c9274c979b01a717d991a03449
2017-04-11 11:26:12 -07:00
TreeHugger Robot
c708f9fe23
Merge "Move logging folder from data to data/vendor"
2017-04-11 16:52:20 +00:00
Ramanan Rajeswaran
465d8985b9
Merge "Remove aosp bits."
2017-04-11 16:34:47 +00:00
Tyler Gunn
df22a200ed
Enable handover support for Google devices.
...
Enables support for Telecom handover from Telephony ConnectionService
to another ConnectionService for Google devices.
Test: Manual
Bug: 37102939
Change-Id: I91adc9f3bc2908b5bfc19dca4332cceff18f9fb0
2017-04-11 09:22:10 -07:00
Max Bires
563a0851b2
Fixing the following denials
...
denied { search } for pid=823 comm="ueventd" name="/" dev="sda7" ino=1
scontext=u:r:ueventd:s0 tcontext=u:object_r:firmware_file:s0 tclass=dir
denied { search } for pid=707 comm="qseecomd" name="/" dev="sda7" ino=1
scontext=u:r:tee:s0 tcontext=u:object_r:firmware_file:s0 tclass=dir
denied { read write open getattr } for pid=711 comm="ramdump"
name="sdd1" dev="tmpfs" ino=20349 scontext=u:r:ramdump:s0
tcontext=u:object_r:misc_block_device:s0 tclass=blk_file
denied { write add_name } for pid=964 comm="perfd" name="perfd"
dev="sda45" ino=3407877 scontext=u:r:perfd:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { create } for pid=964 comm="perfd" name="default_values"
scontext=u:r:perfd:s0 tcontext=u:object_r:system_data_file:s0
tclass=file
denied { search } for pid=751 comm="android.hardwar" name="c17a000.i2c"
dev="sysfs" ino=22393 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir
denied { search } for pid=611 comm="android.hardwar" name="/" dev="sdd3"
ino=2 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:persist_file:s0 tclass=dir
denied { read execute open } for pid=727 comm="main"
name="libadsprpc.so" dev="sda20" ino=840 scontext=u:r:zygote:s0
tcontext=u:object_r:vendor_file:s0 tclass=file
denied { read execute } for pid=4970 comm="main" name="libadsprpc.so"
dev="sda20" ino=499 scontext=u:r:webview_zygote:s0
tcontext=u:object_r:vendor_file:s0 tclass=file
denied { unlink } for pid=8008 comm="rild"
name="uim_remote_client_socket0" dev="tmpfs" ino=26606
scontext=u:r:rild:s0 tcontext=u:object_r:qmuxd_socket:s0
tclass=sock_file
denied { write } for pid=691 comm="ramdump" name="sda45" dev="tmpfs"
ino=20680 scontext=u:r:ramdump:s0
tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file
denied { search } for pid=5098 comm="m.android.phone" name="framework"
dev="sda20" ino=383 scontext=u:r:radio:s0
tcontext=u:object_r:vendor_framework_file:s0 tclass=dir
denied { read write } for pid=1377 comm="Binder:1366_1"
path="socket:[55679]" dev="sockfs" ino=55679
scontext=u:r:folio_daemon:s0 tcontext=u:r:system_server:s0
tclass=unix_stream_socket
denied { use } for pid=1377 comm="Binder:1366_1" path="socket:[55679]"
dev="sockfs" ino=55679 scontext=u:r:folio_daemon:s0
tcontext=u:r:system_server:s0 tclass=fd
denied { call } for pid=847 comm="folio_daemon"
scontext=u:r:folio_daemon:s0 tcontext=u:r:system_server:s0 tclass=binder
denied { getattr read open } for pid=3711 comm="dex2oat"
path="/system/vendor" dev="sda22" ino=2749 scontext=u:r:dex2oat:s0
tcontext=u:object_r:vendor_file:s0 tclass=lnk_file
denied { read } for pid=5338 comm="RenderThread"
name="gralloc.msm8998.so" dev="sda20" ino=793
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:vendor_file:s0
tclass=file
denied { read } for pid=5161 comm="RenderThread"
name="gralloc.msm8998.so" dev="sda20" ino=793
scontext=u:r:platform_app:s0:c512,c768
tcontext=u:object_r:vendor_file:s0 tclass=file
denied { module_load } for pid=588 comm="insmod"
path="/vendor/lib/modules/synaptics_dsx_core_htc.ko" dev="sda20" ino=749
scontext=u:r:init-insmod-sh:s0 tcontext=u:object_r:vendor_file:s0
tclass=system
denied { read open } for pid=607 comm="servicemanager" name="current"
dev="proc" ino=45010 scontext=u:r:servicemanager:s0
tcontext=u:r:folio_daemon:s0 tclass=file
denied { getattr } for pid=607 comm="servicemanager"
scontext=u:r:servicemanager:s0 tcontext=u:r:folio_daemon:s0
tclass=process
denied { search } for pid=607 comm="servicemanager" name="871"
dev="proc" ino=45008 scontext=u:r:servicemanager:s0
tcontext=u:r:folio_daemon:s0 tclass=dir
denied { read write } for pid=3642 comm="Binder:1199_3"
path="socket:[45011]" dev="sockfs" ino=45011
scontext=u:r:folio_daemon:s0 tcontext=u:r:system_server:s0
tclass=unix_stream_socket
denied { call } for pid=871 comm="folio_daemon"
scontext=u:r:folio_daemon:s0 tcontext=u:r:servicemanager:s0
tclass=binder
denied { sys_module } for pid=976 comm="tc" capability=16
scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability
denied { sys_module } for pid=645 comm="Binder:645_2" capability=16
scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=capability
denied { open read } for pid=776 comm="ueventd" name="modem.mdt"
dev="sda7" ino=38 scontext=u:r:ueventd:s0
tcontext=u:object_r:firmware_file:s0 tclass=file
denied { write open } for pid=787 comm="perfd"
path="/dev/cpu_dma_latency" dev="tmpfs" ino=19589 scontext=u:r:perfd:s0
tcontext=u:object_r:device:s0 tclass=chr_file
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I2d905d89d3375e5dd4820d34cc11223814514f27
2017-04-11 01:26:29 -07:00
TreeHugger Robot
c37e2c4107
Merge "Enable binderized Thermal HAL."
2017-04-11 08:09:32 +00:00
Sohani Rao
8e2f6a5cdd
Replace make file with soong
...
For WifiOffload HAL, comply with soong format
Test: VTS test
Bug: 32842314
Change-Id: I1af37efd20e3dc75bc40b8a7fa4f19b428c6f232
2017-04-10 18:20:17 -07:00
Jie Song
33e42325ff
Move logging folder from data to data/vendor
...
diag_logs
cnss_diag
ramdump
Bug: 36734870
Test: Capture logs and check no SELinux denial
Change-Id: Iff035c2074d54a454ddd1b9e3c025ddbcf7ae40d
2017-04-10 17:25:14 -07:00
TreeHugger Robot
02519b47d6
Merge "Adding allows to handle the following denials"
2017-04-11 00:05:40 +00:00
Max Bires
bc99e5b908
Adding allows to handle the following denials
...
denied { write } for pid=10249 comm="secdiscard" name="sda45"
dev="tmpfs" ino=19911 scontext=u:r:vold:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file
denied { create read } for pid=9183 comm="time_daemon" name="ats_2"
scontext=u:r:time_daemon:s0 tcontext=u:object_r:system_data_file:s0
tclass=file
denied { read write open } for pid=9183 comm="time_daemon" name="ats_2"
dev="sdd3" ino=33 scontext=u:r:time_daemon:s0
tcontext=u:object_r:persist_file:s0 tclass=file
denied { write add_name } for pid=9183 comm="time_daemon" name="time"
dev="sda45" ino=851969 scontext=u:r:time_daemon:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { write } for pid=5959 comm="Binder:1415_9" name="timerslack_ns"
dev="proc" ino=138483 scontext=u:r:system_server:s0
tcontext=u:r:isolated_app:s0:c512,c768 tclass=file
denied { write } for pid=5365 comm="Binder:1415_8" name="timerslack_ns"
dev="proc" ino=123305 scontext=u:r:system_server:s0
tcontext=u:r:logger_app:s0:c112,c256,c512,c768 tclass=file
denied { connectto } for pid=9161 comm="omm.timeservice"
path=0074696D655F67656E6F6666 scontext=u:r:system_app:s0
tcontext=u:r:time_daemon:s0 tclass=unix_stream_socket
denied { read } for pid=5123 comm="m.android.phone" name="vendor"
dev="sda22" ino=2749 scontext=u:r:radio:s0
tcontext=u:object_r:vendor_file:s0 tclass=lnk_file
denied { getattr read open } for pid=5123 comm="m.android.phone"
path="/vendor/framework/qti-vzw-ims-internal.jar" dev="sda20" ino=385
scontext=u:r:radio:s0 tcontext=u:object_r:vendor_framework_file:s0
tclass=file
denied { write } for pid=888 comm="perfd" name="default_pwrlevel"
dev="sysfs" ino=33408 scontext=u:r:perfd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
denied { read open } for pid=360 comm="kworker/u16:6"
name="synaptics_0.img" dev="sda20" ino=360 scontext=u:r:kernel:s0
tcontext=u:object_r:vendor_file:s0 tclass=file
denied { read } for pid=589 comm="init.power.sh" name="soc:qcom,cpubw"
dev="sysfs" ino=44524 scontext=u:r:init_power:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=lnk_file
denied { open read } for pid=668 comm="init.power.sh"
path="/sys/class/devfreq" dev="sysfs" ino=28440
scontext=u:r:init_power:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
denied { write open } for pid=760 comm="android.hardwar" name="wlan"
dev="tmpfs" ino=20256 scontext=u:r:hal_wifi_default:s0
tcontext=u:object_r:wlan_device:s0 tclass=chr_file
denied { open getattr write } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/rtp_input" dev="sysfs"
ino=41310 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
denied { ioctl } for pid=880 comm="android.hardwar" path="/dev/uinput"
dev="tmpfs" ino=20584 ioctlcmd=5564
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:uhid_device:s0 tclass=chr_file
Bug: 34784662
Test: The above denials are no longer present
Change-Id: Id259bdcbf4cf7a93b8c98b8a06addb99385d7588
2017-04-10 15:39:09 -07:00
Glen Kuhne
b1af8c9d6e
Merge "default hotspot ssid prefix to 'Pixel'"
2017-04-10 22:23:03 +00:00
Ramanan Rajeswaran
702f9f4f44
Remove aosp bits.
...
Test: built muskie.
Change-Id: I30e09d990bb3d4e96f769075f0fb995f71fd35a0
2017-04-10 14:14:11 -07:00
TreeHugger Robot
1602c1cf13
Merge "Refactoring block device labeling and adding allows."
2017-04-08 00:43:29 +00:00
Max Bires
ed261e9c7e
Refactoring block device labeling and adding allows.
...
Denials:
denied { write ioctl open } for pid=847 comm="folio_daemon"
name="uinput" dev="tmpfs" ino=20677 scontext=u:r:folio_daemon:s0
tcontext=u:object_r:uhid_device:s0 tclass=chr_file
denied { search } for pid=1553 comm="rild" name="netmgr" dev="tmpfs"
ino=21012 scontext=u:r:rild:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=dir
denied { read write open } for pid=689 comm="qseecomd" name="sdd2"
dev="tmpfs" ino=18308 scontext=u:r:tee:s0
tcontext=u:object_r:ssd_block_device:s0 tclass=blk_file
denied { read write open } for pid=771 comm="rmt_storage" name="sdd15"
dev="tmpfs" ino=18347 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:modem_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda7"
dev="tmpfs" ino=18138 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:modem_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda22"
dev="tmpfs" ino=18194 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:system_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda3"
dev="tmpfs" ino=18122 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:ab_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda9"
dev="tmpfs" ino=18146 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:boot_block_device:s0 tclass=blk_file
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I0a31ed76665a660e658a1e9000e07a9d312fb985
2017-04-07 16:11:19 -07:00
TreeHugger Robot
78002157cc
Merge "Collect modem always on log"
2017-04-07 22:48:58 +00:00
Glen Kuhne
232eb2931f
default hotspot ssid prefix to 'Pixel'
...
Added a device specific overlay that changes the default name prefix
from "AndroidAp" to "Pixel"
Test: Builds, manually verified name change
Bug: 36368950
Change-Id: I38a5f6fb950d6a45342080bae186a8ed276d94bf
2017-04-07 14:54:17 -07:00
Max Bires
8bfe8965a2
Adding allow rules and contexts to handle the following denials
...
denied { getattr } for pid=580 comm="ueventd" name="sda20" dev="tmpfs"
ino=19514 scontext=u:r:ueventd:s0 tcontext=u:object_r:tmpfs:s0
tclass=blk_file
denied { write } for pid=580 comm="ueventd" name="uevent" dev="sysfs"
ino=44062 scontext=u:r:ueventd:s0
tcontext=u:object_r:sysfs_bluetooth_writable:s0 tclass=file
denied { search } for pid=826 comm="time_daemon" name="msm_subsys"
dev="sysfs" ino=16858 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir
denied { write } for pid=2934 comm="Binder:1189_4" name="timerslack_ns"
dev="proc" ino=38677 scontext=u:r:system_server:s0
tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=file
denied { write } for pid=3936 comm="Binder:1189_C" name="timerslack_ns"
dev="proc" ino=85544 scontext=u:r:system_server:s0
tcontext=u:r:platform_app:s0:c512,c768 tclass=file
denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=83223 scontext=u:r:system_server:s0
tcontext=u:r:system_app:s0 tclass=file
denied { write } for pid=1584 comm="Binder:1189_3" name="timerslack_ns"
dev="proc" ino=81248 scontext=u:r:system_server:s0
tcontext=u:r:audioserver:s0 tclass=file
denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=38795 scontext=u:r:system_server:s0
tcontext=u:r:priv_app:s0:c512,c768 tclass=file
denied { write } for pid=1584 comm="Binder:1189_3" name="timerslack_ns"
dev="proc" ino=86229 scontext=u:r:system_server:s0
tcontext=u:r:untrusted_app:s0:c512,c768 tclass=file
denied { write } for pid=4624 comm="Binder:1189_E" name="timerslack_ns"
dev="proc" ino=105556 scontext=u:r:system_server:s0
tcontext=u:r:radio:s0 tclass=file
denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=26256 scontext=u:r:system_server:s0
tcontext=u:r:hal_audio_default:s0 tclass=file
denied { create } for pid=836 comm="perfd" name="default_values"
scontext=u:r:perfd:s0 tcontext=u:object_r:system_data_file:s0
tclass=file
denied { find } for service=qti.ims.ext pid=3750 uid=1001
scontext=u:r:radio:s0 tcontext=u:object_r:imscm_service:s0
tclass=service_manager
denied { lock } for comm="ip6tables" path="/system/etc/xtables.lock"
dev="sda22" ino=968 scontext=u:r:netmgrd:s0
tcontext=u:object_r:system_file:s0 tclass=file
denied { getattr } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/leds/vibrator/duration"
dev="sysfs" ino=46884 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
denied { open } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/leds/vibrator/activate"
dev="sysfs" ino=46883 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
denied { read } for comm="android.hardwar" name="vibrator" dev="sysfs"
ino=41304 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file
denied { search } for comm="android.hardwar" name="leds" dev="sysfs"
ino=27814 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=dir
denied { add } for
service=com.fingerprints.extension.IFingerprintNavigation pid=884
uid=1000 scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:fingerprint_service:s0 tclass=service_manager
denied { open } for pid=9391 comm="cat"
path="/sys/devices/virtual/thermal/cooling_device0/type" dev="sysfs"
ino=44002 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file
denied { read } for pid=9391 comm="cat" name="type" dev="sysfs"
ino=44002 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file
denied { search } for pid=9391 comm="cat" name="thermal" dev="sysfs"
ino=28795 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=dir
denied { getattr } for pid=9381 comm="ls"
path="/sys/kernel/debug/ion/heaps/secure_heap" dev="debugfs" ino=10246
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=file
denied { open } for pid=9381 comm="ls"
path="/sys/kernel/debug/ion/heaps" dev="debugfs" ino=9218
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=dir
denied { read } for pid=9381 comm="ls" name="heaps" dev="debugfs"
ino=9218 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:debugfs:s0 tclass=dir
denied { search } for pid=5401 comm="surfaceflinger" name="clients"
dev="debugfs" ino=8429 scontext=u:r:surfaceflinger:s0
tcontext=u:object_r:debugfs_ion:s0 tclass=dir
denied { search } for pid=5294 comm="android.hardwar" name="clients"
dev="debugfs" ino=8429 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:debugfs_ion:s0 tclass=dir
denied { write } for comm="android.hardwar" name="activate" dev="sysfs"
ino=46883 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=file
denied { lock execute_no_trans } for comm="rild" path="/vendor/qcril.db"
dev="sda20" ino=1019 scontext=u:r:rild:s0
tcontext=u:object_r:vendor_file:s0 tclass=file
Bug: 34784662
Test: The above denials are no longer occuring
Change-Id: I7931a8c3ed8bdfb7190d6c5c14a11525dca5be3a
2017-04-07 19:57:13 +00:00
Ed Tam
bfe6ab006c
Merge "thermal: specify location to load thermal config"
2017-04-07 03:13:31 +00:00
TreeHugger Robot
2bcd23683f
Merge "power: Fix power hal compiler warnings"
2017-04-06 22:19:26 +00:00
John Dias
ce2a1baf2a
thermal: specify location to load thermal config
...
Bug: 35700896
Test: boot, check for thermal-engine messages
Change-Id: I48c296f2751b8a5150dd7d37f89f29a688a6f949
2017-04-06 13:45:21 -07:00
Adrian Salido
4b51c52e7f
power: Fix power hal compiler warnings
...
Bug: 30432975
Test: compile power hal for walleye without warnings
Change-Id: I0d90c26462c662690f8a179250000b9a449a109f
2017-04-06 13:41:04 -07:00
Connor O'Brien
3c7822edf1
Merge "wahoo: use binderized boot HAL"
2017-04-06 20:24:11 +00:00
Jie Song
a8cc3ddf43
Collect modem always on log
...
Bug: 36820568
Test: Trigger bugreport when always on is enabled
Change-Id: I6d61a7284b5a5035c68398fad629628e4ad3216c
2017-04-06 15:55:11 +00:00
Polina Bondarenko
b58eebe16e
Enable binderized Thermal HAL.
...
Bug: 36097196
Test: vts
Change-Id: I89c154465b57d665932523af907eb72179070281
2017-04-06 16:23:51 +02:00
Yifan Hong
a7e7e26eba
Merge "Add type to device manifest."
2017-04-06 06:23:19 +00:00
TreeHugger Robot
265e0dd79a
Merge "Add new type and domain for vendor radio"
2017-04-06 04:29:44 +00:00
Ecco Park
8450042263
Merge "Add permissions to access wlan device node"
2017-04-06 03:53:48 +00:00
TreeHugger Robot
f622c29a28
Merge "Add drm hal to wahoo"
2017-04-05 23:19:16 +00:00
Max Bires
db7d8111a2
Merge "Adding file_contexts to fix hal_bluetooth"
2017-04-05 22:35:50 +00:00
Jeff Tinker
ea51adeb28
Add drm hal to wahoo
...
bug:35808472
Test: compiles, I don't have a device to test
Change-Id: I3839a5335f4fd976a6d668f037756bca00676bb8
2017-04-05 14:56:50 -07:00
Srinivas Girigowda
9f28ebd426
Add permissions to access wlan device node
...
This changes are added to give permissions to wlan device
node this includes providing required file context and
permissions to device created and control access only to required
systemserver.
Change-Id: I64554c3d4a2543eefc5ec809eaef407502081cf5
CRs-Fixed: 2010702
Bug: 36494467
Signed-off-by: Srinivas Girigowda <sgirigow@codeaurora.org >
2017-04-05 14:56:12 -07:00
TreeHugger Robot
4de588158d
Merge "wahoo: Create PDX socket dirs and cpusets for VR services"
2017-04-05 21:27:01 +00:00
Alex Vakulenko
4633df33ed
wahoo: Create PDX socket dirs and cpusets for VR services
...
Recent CL make VR services hard-fail (crash) on failed attempt to
create PDX sockets. Wahoo-based devices don't have socket directories
under /dev/socket/pdx/... to create those sockets, so they now crash
at boot (which includes surfaceflinger). This prevents the device from
even booting. Add init script to create those socket directories.
Also, create necessary cpusets used by VR services, similar to what
was done for marlin/sailfish (see this commit in device/google/marlin:
1cc612c4ee646e8fc6ae69e8837b9b0d0b2119ce).
Bug: 36977281
Test: `lunch walleye-eng && m -j32 && flash` - build succeeds, device boots
Change-Id: Ic458ceabb16917bcf574f6d8e2de864d41a44d96
2017-04-05 14:23:04 -07:00
Badhri Jagan Sridharan
8a8b465970
Merge "USB: HIDL: check the status of registerAsService"
2017-04-05 21:16:06 +00:00
David Lin
971ea5d074
vibrator hal: add support for drv2624 haptics driver on wahoo
...
This adds the vibrator HAL that implements the new setAmplitude and
perform(Effect) API.
Test done: vibrator_hidl_hal_test
Bug: 36782452
Change-Id: If9988434277790becb469d4dd928e75f7e6af41a
Signed-off-by: David Lin <dtwlin@google.com >
2017-04-05 12:44:20 -07:00
Jie Song
21ec03152e
Add new type and domain for vendor radio
...
1. Add radio_vendor_data_file type
2. Add logger_app domain
Bug: 36859102
Test: Verify no security denial
Change-Id: I6c9236a3b2e0b459bf16b2861e7ddfebca3ed9c6
2017-04-05 10:49:30 -07:00
Max Bires
eb252fd433
Adding file_contexts to fix hal_bluetooth
...
Handles denials of the following sort where hal_bluetooth didn't have
access to the directories in sysfs that it needed
denied { write } for comm="android.hardwar" name="extldo" dev="sysfs"
ino=44059 scontext=u:r:hal_bluetooth_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
Bug: 34784662
Test: hal_bluetooth denials are cleaned up
Change-Id: I7cc01fbc1c6414a871e6b0a3b3c95e17a3cd1d99
2017-04-05 09:50:22 -07:00
Wei Wang
df8b9af4a5
Merge "wahoo: improve boot time and pull in bootanim display time"
2017-04-05 14:33:42 +00:00
Yifan Hong
4e21b916bd
Add type to device manifest.
...
Test: pass
Change-Id: I829f074ed3bd5987817fe48138bd365199be58ca
2017-04-04 20:00:49 -07:00
TreeHugger Robot
aa4df693c7
Merge "Add usb service"
2017-04-05 02:45:58 +00:00
Wei Wang
e0fc600245
wahoo: improve boot time and pull in bootanim display time
...
1) separate fstab mount
2) launch bootanim early
3) boottime cpuset/io tune
4) parallel slow init operations: write sysfs and insmod
After CL:
Boot time saved 330ms, bootanim triggered early before data/ mounted
Bug: 36780513
Test: walleye boots
Change-Id: I02803179746710413f4b1e2372f3550cd95d1581
2017-04-04 19:11:21 -07:00
TreeHugger Robot
b1a2a67cf8
Merge "Adding service_context's and allows to handle the following denials"
2017-04-04 23:49:46 +00:00
Connor O'Brien
2deebd4cb8
wahoo: use binderized boot HAL
...
Add the binderized boot HAL service to the manifest and grant
necessary SELinux permissions to access block devices.
Bug: 35810130
Test: Device boots & passes boot VTS test
Change-Id: I4df5ec0ff2f170da31e0748e376cda309802b554
Signed-off-by: Connor O'Brien <connoro@google.com >
2017-04-04 16:48:20 -07:00
TreeHugger Robot
5cb55c5e82
Merge "Wifi Offload HAL implementation for V1.0 interface"
2017-04-04 23:10:35 +00:00
Wei Wang
86ca1da571
Merge "wahoo: include missing libwpa_client"
2017-04-04 22:12:49 +00:00