Commit Graph

257 Commits

Author SHA1 Message Date
Chris Thornton
8f4fa5158e The sound trigger hal needs to talk to /dev/wcd_dsp0_control for hotword.
Test: Ran on device after modifying policy
Change-Id: I0971a914fd50bcfb7d1823183950c45d2632cc42
2017-04-11 21:31:29 -07:00
TreeHugger Robot
1270be7329 Merge "Replace make file with soong" 2017-04-11 22:15:39 +00:00
Max Bires
31e74b0417 Merge "Setting SELinux to enforcing mode." 2017-04-11 21:55:49 +00:00
Max Bires
4dd28d5902 Merge "Switching some vendor libraries over to same_process_hal_file type" 2017-04-11 19:40:50 +00:00
Tyler Gunn
935d08b5d6 Merge "Enable handover support for Google devices." 2017-04-11 18:35:55 +00:00
Max Bires
723bebb5ce Switching some vendor libraries over to same_process_hal_file type
A lot of app domains were requesting vendor_file read access due to some
mislabeled .so files. This should fix that without granting read access
to vendor_file

Bug: 34784662
Test: .so files are properly labeled
Change-Id: I2aa69d54717af4c9274c979b01a717d991a03449
2017-04-11 11:26:12 -07:00
TreeHugger Robot
c708f9fe23 Merge "Move logging folder from data to data/vendor" 2017-04-11 16:52:20 +00:00
Ramanan Rajeswaran
465d8985b9 Merge "Remove aosp bits." 2017-04-11 16:34:47 +00:00
Tyler Gunn
df22a200ed Enable handover support for Google devices.
Enables support for Telecom handover from Telephony ConnectionService
to another ConnectionService for Google devices.

Test: Manual
Bug: 37102939
Change-Id: I91adc9f3bc2908b5bfc19dca4332cceff18f9fb0
2017-04-11 09:22:10 -07:00
Max Bires
563a0851b2 Fixing the following denials
denied { search } for pid=823 comm="ueventd" name="/" dev="sda7" ino=1
scontext=u:r:ueventd:s0 tcontext=u:object_r:firmware_file:s0 tclass=dir

denied { search } for pid=707 comm="qseecomd" name="/" dev="sda7" ino=1
scontext=u:r:tee:s0 tcontext=u:object_r:firmware_file:s0 tclass=dir

denied { read write open getattr } for pid=711 comm="ramdump"
name="sdd1" dev="tmpfs" ino=20349 scontext=u:r:ramdump:s0
tcontext=u:object_r:misc_block_device:s0 tclass=blk_file

denied { write add_name } for pid=964 comm="perfd" name="perfd"
dev="sda45" ino=3407877 scontext=u:r:perfd:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir

denied { create } for pid=964 comm="perfd" name="default_values"
scontext=u:r:perfd:s0 tcontext=u:object_r:system_data_file:s0
tclass=file

denied { search } for pid=751 comm="android.hardwar" name="c17a000.i2c"
dev="sysfs" ino=22393 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { search } for pid=611 comm="android.hardwar" name="/" dev="sdd3"
ino=2 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:persist_file:s0 tclass=dir

denied { read execute open } for pid=727 comm="main"
name="libadsprpc.so" dev="sda20" ino=840 scontext=u:r:zygote:s0
tcontext=u:object_r:vendor_file:s0 tclass=file

denied { read execute } for pid=4970 comm="main" name="libadsprpc.so"
dev="sda20" ino=499 scontext=u:r:webview_zygote:s0
tcontext=u:object_r:vendor_file:s0 tclass=file

denied { unlink } for pid=8008 comm="rild"
name="uim_remote_client_socket0" dev="tmpfs" ino=26606
scontext=u:r:rild:s0 tcontext=u:object_r:qmuxd_socket:s0
tclass=sock_file

denied { write } for pid=691 comm="ramdump" name="sda45" dev="tmpfs"
ino=20680 scontext=u:r:ramdump:s0
tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file

denied { search } for pid=5098 comm="m.android.phone" name="framework"
dev="sda20" ino=383 scontext=u:r:radio:s0
tcontext=u:object_r:vendor_framework_file:s0 tclass=dir

denied { read write } for pid=1377 comm="Binder:1366_1"
path="socket:[55679]" dev="sockfs" ino=55679
scontext=u:r:folio_daemon:s0 tcontext=u:r:system_server:s0
tclass=unix_stream_socket

denied { use } for pid=1377 comm="Binder:1366_1" path="socket:[55679]"
dev="sockfs" ino=55679 scontext=u:r:folio_daemon:s0
tcontext=u:r:system_server:s0 tclass=fd

denied { call } for pid=847 comm="folio_daemon"
scontext=u:r:folio_daemon:s0 tcontext=u:r:system_server:s0 tclass=binder

denied { getattr read open } for pid=3711 comm="dex2oat"
path="/system/vendor" dev="sda22" ino=2749 scontext=u:r:dex2oat:s0
tcontext=u:object_r:vendor_file:s0 tclass=lnk_file

denied { read } for pid=5338 comm="RenderThread"
name="gralloc.msm8998.so" dev="sda20" ino=793
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:vendor_file:s0
tclass=file

denied { read } for pid=5161 comm="RenderThread"
name="gralloc.msm8998.so" dev="sda20" ino=793
scontext=u:r:platform_app:s0:c512,c768
tcontext=u:object_r:vendor_file:s0 tclass=file

denied  { module_load } for  pid=588 comm="insmod"
path="/vendor/lib/modules/synaptics_dsx_core_htc.ko" dev="sda20" ino=749
scontext=u:r:init-insmod-sh:s0 tcontext=u:object_r:vendor_file:s0
tclass=system

denied { read open } for pid=607 comm="servicemanager" name="current"
dev="proc" ino=45010 scontext=u:r:servicemanager:s0
tcontext=u:r:folio_daemon:s0 tclass=file

denied { getattr } for pid=607 comm="servicemanager"
scontext=u:r:servicemanager:s0 tcontext=u:r:folio_daemon:s0
tclass=process

denied { search } for pid=607 comm="servicemanager" name="871"
dev="proc" ino=45008 scontext=u:r:servicemanager:s0
tcontext=u:r:folio_daemon:s0 tclass=dir

denied { read write } for pid=3642 comm="Binder:1199_3"
path="socket:[45011]" dev="sockfs" ino=45011
scontext=u:r:folio_daemon:s0 tcontext=u:r:system_server:s0
tclass=unix_stream_socket

denied { call } for pid=871 comm="folio_daemon"
scontext=u:r:folio_daemon:s0 tcontext=u:r:servicemanager:s0
tclass=binder

denied { sys_module } for pid=976 comm="tc" capability=16
scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability

denied { sys_module } for pid=645 comm="Binder:645_2" capability=16
scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=capability

denied { open read } for pid=776 comm="ueventd" name="modem.mdt"
dev="sda7" ino=38 scontext=u:r:ueventd:s0
tcontext=u:object_r:firmware_file:s0 tclass=file

denied { write open } for pid=787 comm="perfd"
path="/dev/cpu_dma_latency" dev="tmpfs" ino=19589 scontext=u:r:perfd:s0
tcontext=u:object_r:device:s0 tclass=chr_file

Bug: 34784662
Test: The above denials are no longer present
Change-Id: I2d905d89d3375e5dd4820d34cc11223814514f27
2017-04-11 01:26:29 -07:00
TreeHugger Robot
c37e2c4107 Merge "Enable binderized Thermal HAL." 2017-04-11 08:09:32 +00:00
Sohani Rao
8e2f6a5cdd Replace make file with soong
For WifiOffload HAL, comply with soong format

Test: VTS test
Bug: 32842314
Change-Id: I1af37efd20e3dc75bc40b8a7fa4f19b428c6f232
2017-04-10 18:20:17 -07:00
Jie Song
33e42325ff Move logging folder from data to data/vendor
diag_logs
cnss_diag
ramdump

Bug: 36734870
Test: Capture logs and check no SELinux denial
Change-Id: Iff035c2074d54a454ddd1b9e3c025ddbcf7ae40d
2017-04-10 17:25:14 -07:00
TreeHugger Robot
02519b47d6 Merge "Adding allows to handle the following denials" 2017-04-11 00:05:40 +00:00
Max Bires
bc99e5b908 Adding allows to handle the following denials
denied { write } for pid=10249 comm="secdiscard" name="sda45"
dev="tmpfs" ino=19911 scontext=u:r:vold:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file

denied { create read } for pid=9183 comm="time_daemon" name="ats_2"
scontext=u:r:time_daemon:s0 tcontext=u:object_r:system_data_file:s0
tclass=file

denied { read write open } for pid=9183 comm="time_daemon" name="ats_2"
dev="sdd3" ino=33 scontext=u:r:time_daemon:s0
tcontext=u:object_r:persist_file:s0 tclass=file

denied { write add_name } for pid=9183 comm="time_daemon" name="time"
dev="sda45" ino=851969 scontext=u:r:time_daemon:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir

denied { write } for pid=5959 comm="Binder:1415_9" name="timerslack_ns"
dev="proc" ino=138483 scontext=u:r:system_server:s0
tcontext=u:r:isolated_app:s0:c512,c768 tclass=file

denied { write } for pid=5365 comm="Binder:1415_8" name="timerslack_ns"
dev="proc" ino=123305 scontext=u:r:system_server:s0
tcontext=u:r:logger_app:s0:c112,c256,c512,c768 tclass=file

denied { connectto } for pid=9161 comm="omm.timeservice"
path=0074696D655F67656E6F6666 scontext=u:r:system_app:s0
tcontext=u:r:time_daemon:s0 tclass=unix_stream_socket

denied { read } for pid=5123 comm="m.android.phone" name="vendor"
dev="sda22" ino=2749 scontext=u:r:radio:s0
tcontext=u:object_r:vendor_file:s0 tclass=lnk_file

denied { getattr read open } for pid=5123 comm="m.android.phone"
path="/vendor/framework/qti-vzw-ims-internal.jar" dev="sda20" ino=385
scontext=u:r:radio:s0 tcontext=u:object_r:vendor_framework_file:s0
tclass=file

denied { write } for pid=888 comm="perfd" name="default_pwrlevel"
dev="sysfs" ino=33408 scontext=u:r:perfd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file

denied { read open } for pid=360 comm="kworker/u16:6"
name="synaptics_0.img" dev="sda20" ino=360 scontext=u:r:kernel:s0
tcontext=u:object_r:vendor_file:s0 tclass=file

denied  { read } for  pid=589 comm="init.power.sh" name="soc:qcom,cpubw"
dev="sysfs" ino=44524 scontext=u:r:init_power:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=lnk_file

denied { open read } for pid=668 comm="init.power.sh"
path="/sys/class/devfreq" dev="sysfs" ino=28440
scontext=u:r:init_power:s0 tcontext=u:object_r:sysfs:s0 tclass=dir

denied { write open } for pid=760 comm="android.hardwar" name="wlan"
dev="tmpfs" ino=20256 scontext=u:r:hal_wifi_default:s0
tcontext=u:object_r:wlan_device:s0 tclass=chr_file

denied { open getattr write } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/rtp_input" dev="sysfs"
ino=41310 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file

denied { ioctl } for pid=880 comm="android.hardwar" path="/dev/uinput"
dev="tmpfs" ino=20584 ioctlcmd=5564
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:uhid_device:s0 tclass=chr_file

Bug: 34784662
Test: The above denials are no longer present
Change-Id: Id259bdcbf4cf7a93b8c98b8a06addb99385d7588
2017-04-10 15:39:09 -07:00
Glen Kuhne
b1af8c9d6e Merge "default hotspot ssid prefix to 'Pixel'" 2017-04-10 22:23:03 +00:00
Ramanan Rajeswaran
702f9f4f44 Remove aosp bits.
Test: built muskie.
Change-Id: I30e09d990bb3d4e96f769075f0fb995f71fd35a0
2017-04-10 14:14:11 -07:00
TreeHugger Robot
1602c1cf13 Merge "Refactoring block device labeling and adding allows." 2017-04-08 00:43:29 +00:00
Max Bires
ed261e9c7e Refactoring block device labeling and adding allows.
Denials:
denied { write ioctl open } for pid=847 comm="folio_daemon"
name="uinput" dev="tmpfs" ino=20677 scontext=u:r:folio_daemon:s0
tcontext=u:object_r:uhid_device:s0 tclass=chr_file

denied { search } for pid=1553 comm="rild" name="netmgr" dev="tmpfs"
ino=21012 scontext=u:r:rild:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=dir

denied { read write open } for pid=689 comm="qseecomd" name="sdd2"
dev="tmpfs" ino=18308 scontext=u:r:tee:s0
tcontext=u:object_r:ssd_block_device:s0 tclass=blk_file

denied { read write open } for pid=771 comm="rmt_storage" name="sdd15"
dev="tmpfs" ino=18347 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:modem_block_device:s0 tclass=blk_file

denied { getattr } for comm="android.hardwar" path="/dev/block/sda7"
dev="tmpfs" ino=18138 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:modem_block_device:s0 tclass=blk_file

denied { getattr } for comm="android.hardwar" path="/dev/block/sda22"
dev="tmpfs" ino=18194 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:system_block_device:s0 tclass=blk_file

denied { getattr } for comm="android.hardwar" path="/dev/block/sda3"
dev="tmpfs" ino=18122 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:ab_block_device:s0 tclass=blk_file

denied { getattr } for comm="android.hardwar" path="/dev/block/sda9"
dev="tmpfs" ino=18146 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:boot_block_device:s0 tclass=blk_file

Bug: 34784662
Test: The above denials are no longer present
Change-Id: I0a31ed76665a660e658a1e9000e07a9d312fb985
2017-04-07 16:11:19 -07:00
TreeHugger Robot
78002157cc Merge "Collect modem always on log" 2017-04-07 22:48:58 +00:00
Glen Kuhne
232eb2931f default hotspot ssid prefix to 'Pixel'
Added a device specific overlay that changes the default name prefix
from "AndroidAp" to "Pixel"

Test: Builds, manually verified name change
Bug: 36368950
Change-Id: I38a5f6fb950d6a45342080bae186a8ed276d94bf
2017-04-07 14:54:17 -07:00
Max Bires
8bfe8965a2 Adding allow rules and contexts to handle the following denials
denied  { getattr } for  pid=580 comm="ueventd" name="sda20" dev="tmpfs"
ino=19514 scontext=u:r:ueventd:s0 tcontext=u:object_r:tmpfs:s0
tclass=blk_file

denied  { write } for  pid=580 comm="ueventd" name="uevent" dev="sysfs"
ino=44062 scontext=u:r:ueventd:s0
tcontext=u:object_r:sysfs_bluetooth_writable:s0 tclass=file

denied { search } for pid=826 comm="time_daemon" name="msm_subsys"
dev="sysfs" ino=16858 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { write } for pid=2934 comm="Binder:1189_4" name="timerslack_ns"
dev="proc" ino=38677 scontext=u:r:system_server:s0
tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=file

denied { write } for pid=3936 comm="Binder:1189_C" name="timerslack_ns"
dev="proc" ino=85544 scontext=u:r:system_server:s0
tcontext=u:r:platform_app:s0:c512,c768 tclass=file

denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=83223 scontext=u:r:system_server:s0
tcontext=u:r:system_app:s0 tclass=file

denied { write } for pid=1584 comm="Binder:1189_3" name="timerslack_ns"
dev="proc" ino=81248 scontext=u:r:system_server:s0
tcontext=u:r:audioserver:s0 tclass=file

denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=38795 scontext=u:r:system_server:s0
tcontext=u:r:priv_app:s0:c512,c768 tclass=file

denied { write } for pid=1584 comm="Binder:1189_3" name="timerslack_ns"
dev="proc" ino=86229 scontext=u:r:system_server:s0
tcontext=u:r:untrusted_app:s0:c512,c768 tclass=file

denied { write } for pid=4624 comm="Binder:1189_E" name="timerslack_ns"
dev="proc" ino=105556 scontext=u:r:system_server:s0
tcontext=u:r:radio:s0 tclass=file

denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=26256 scontext=u:r:system_server:s0
tcontext=u:r:hal_audio_default:s0 tclass=file

denied { create } for pid=836 comm="perfd" name="default_values"
scontext=u:r:perfd:s0 tcontext=u:object_r:system_data_file:s0
tclass=file

denied  { find } for service=qti.ims.ext pid=3750 uid=1001
scontext=u:r:radio:s0 tcontext=u:object_r:imscm_service:s0
tclass=service_manager

denied { lock } for comm="ip6tables" path="/system/etc/xtables.lock"
dev="sda22" ino=968 scontext=u:r:netmgrd:s0
tcontext=u:object_r:system_file:s0 tclass=file

denied { getattr } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/leds/vibrator/duration"
dev="sysfs" ino=46884 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file

denied { open } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/leds/vibrator/activate"
dev="sysfs" ino=46883 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file

denied { read } for comm="android.hardwar" name="vibrator" dev="sysfs"
ino=41304 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file

denied { search } for comm="android.hardwar" name="leds" dev="sysfs"
ino=27814 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=dir

denied  { add } for
service=com.fingerprints.extension.IFingerprintNavigation pid=884
uid=1000 scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:fingerprint_service:s0 tclass=service_manager

denied { open } for pid=9391 comm="cat"
path="/sys/devices/virtual/thermal/cooling_device0/type" dev="sysfs"
ino=44002 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file

denied { read } for pid=9391 comm="cat" name="type" dev="sysfs"
ino=44002 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file

denied { search } for pid=9391 comm="cat" name="thermal" dev="sysfs"
ino=28795 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=dir

denied { getattr } for pid=9381 comm="ls"
path="/sys/kernel/debug/ion/heaps/secure_heap" dev="debugfs" ino=10246
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=file

denied { open } for pid=9381 comm="ls"
path="/sys/kernel/debug/ion/heaps" dev="debugfs" ino=9218
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=dir

denied { read } for pid=9381 comm="ls" name="heaps" dev="debugfs"
ino=9218 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:debugfs:s0 tclass=dir

denied { search } for pid=5401 comm="surfaceflinger" name="clients"
dev="debugfs" ino=8429 scontext=u:r:surfaceflinger:s0
tcontext=u:object_r:debugfs_ion:s0 tclass=dir

denied { search } for pid=5294 comm="android.hardwar" name="clients"
dev="debugfs" ino=8429 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:debugfs_ion:s0 tclass=dir

denied { write } for comm="android.hardwar" name="activate" dev="sysfs"
ino=46883 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=file

denied { lock execute_no_trans } for comm="rild" path="/vendor/qcril.db"
dev="sda20" ino=1019 scontext=u:r:rild:s0
tcontext=u:object_r:vendor_file:s0 tclass=file

Bug: 34784662
Test: The above denials are no longer occuring

Change-Id: I7931a8c3ed8bdfb7190d6c5c14a11525dca5be3a
2017-04-07 19:57:13 +00:00
Ed Tam
bfe6ab006c Merge "thermal: specify location to load thermal config" 2017-04-07 03:13:31 +00:00
TreeHugger Robot
2bcd23683f Merge "power: Fix power hal compiler warnings" 2017-04-06 22:19:26 +00:00
John Dias
ce2a1baf2a thermal: specify location to load thermal config
Bug: 35700896
Test: boot, check for thermal-engine messages
Change-Id: I48c296f2751b8a5150dd7d37f89f29a688a6f949
2017-04-06 13:45:21 -07:00
Adrian Salido
4b51c52e7f power: Fix power hal compiler warnings
Bug: 30432975
Test: compile power hal for walleye without warnings
Change-Id: I0d90c26462c662690f8a179250000b9a449a109f
2017-04-06 13:41:04 -07:00
Connor O'Brien
3c7822edf1 Merge "wahoo: use binderized boot HAL" 2017-04-06 20:24:11 +00:00
Jie Song
a8cc3ddf43 Collect modem always on log
Bug: 36820568
Test: Trigger bugreport when always on is enabled
Change-Id: I6d61a7284b5a5035c68398fad629628e4ad3216c
2017-04-06 15:55:11 +00:00
Polina Bondarenko
b58eebe16e Enable binderized Thermal HAL.
Bug: 36097196
Test: vts

Change-Id: I89c154465b57d665932523af907eb72179070281
2017-04-06 16:23:51 +02:00
Yifan Hong
a7e7e26eba Merge "Add type to device manifest." 2017-04-06 06:23:19 +00:00
TreeHugger Robot
265e0dd79a Merge "Add new type and domain for vendor radio" 2017-04-06 04:29:44 +00:00
Ecco Park
8450042263 Merge "Add permissions to access wlan device node" 2017-04-06 03:53:48 +00:00
TreeHugger Robot
f622c29a28 Merge "Add drm hal to wahoo" 2017-04-05 23:19:16 +00:00
Max Bires
db7d8111a2 Merge "Adding file_contexts to fix hal_bluetooth" 2017-04-05 22:35:50 +00:00
Jeff Tinker
ea51adeb28 Add drm hal to wahoo
bug:35808472

Test: compiles, I don't have a device to test
Change-Id: I3839a5335f4fd976a6d668f037756bca00676bb8
2017-04-05 14:56:50 -07:00
Srinivas Girigowda
9f28ebd426 Add permissions to access wlan device node
This changes are added to give permissions to wlan device
node this includes providing required file context and
permissions to device created and control access only to required
systemserver.

Change-Id: I64554c3d4a2543eefc5ec809eaef407502081cf5
CRs-Fixed: 2010702
Bug: 36494467
Signed-off-by: Srinivas Girigowda <sgirigow@codeaurora.org>
2017-04-05 14:56:12 -07:00
TreeHugger Robot
4de588158d Merge "wahoo: Create PDX socket dirs and cpusets for VR services" 2017-04-05 21:27:01 +00:00
Alex Vakulenko
4633df33ed wahoo: Create PDX socket dirs and cpusets for VR services
Recent CL make VR services hard-fail (crash) on failed attempt to
create PDX sockets. Wahoo-based devices don't have socket directories
under /dev/socket/pdx/... to create those sockets, so they now crash
at boot (which includes surfaceflinger). This prevents the device from
even booting. Add init script to create those socket directories.

Also, create necessary cpusets used by VR services, similar to what
was done for marlin/sailfish (see this commit in device/google/marlin:
1cc612c4ee646e8fc6ae69e8837b9b0d0b2119ce).

Bug: 36977281
Test: `lunch walleye-eng && m -j32 && flash` - build succeeds, device boots
Change-Id: Ic458ceabb16917bcf574f6d8e2de864d41a44d96
2017-04-05 14:23:04 -07:00
Badhri Jagan Sridharan
8a8b465970 Merge "USB: HIDL: check the status of registerAsService" 2017-04-05 21:16:06 +00:00
David Lin
971ea5d074 vibrator hal: add support for drv2624 haptics driver on wahoo
This adds the vibrator HAL that implements the new setAmplitude and
perform(Effect) API.

Test done: vibrator_hidl_hal_test
Bug: 36782452

Change-Id: If9988434277790becb469d4dd928e75f7e6af41a
Signed-off-by: David Lin <dtwlin@google.com>
2017-04-05 12:44:20 -07:00
Jie Song
21ec03152e Add new type and domain for vendor radio
1. Add radio_vendor_data_file type
2. Add logger_app domain

Bug: 36859102
Test: Verify no security denial
Change-Id: I6c9236a3b2e0b459bf16b2861e7ddfebca3ed9c6
2017-04-05 10:49:30 -07:00
Max Bires
eb252fd433 Adding file_contexts to fix hal_bluetooth
Handles denials of the following sort where hal_bluetooth didn't have
access to the directories in sysfs that it needed

denied { write } for comm="android.hardwar" name="extldo" dev="sysfs"
ino=44059 scontext=u:r:hal_bluetooth_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file

Bug: 34784662
Test: hal_bluetooth denials are cleaned up
Change-Id: I7cc01fbc1c6414a871e6b0a3b3c95e17a3cd1d99
2017-04-05 09:50:22 -07:00
Wei Wang
df8b9af4a5 Merge "wahoo: improve boot time and pull in bootanim display time" 2017-04-05 14:33:42 +00:00
Yifan Hong
4e21b916bd Add type to device manifest.
Test: pass
Change-Id: I829f074ed3bd5987817fe48138bd365199be58ca
2017-04-04 20:00:49 -07:00
TreeHugger Robot
aa4df693c7 Merge "Add usb service" 2017-04-05 02:45:58 +00:00
Wei Wang
e0fc600245 wahoo: improve boot time and pull in bootanim display time
1) separate fstab mount
2) launch bootanim early
3) boottime cpuset/io tune
4) parallel slow init operations: write sysfs and insmod

After CL:
Boot time saved 330ms, bootanim triggered early before data/ mounted

Bug: 36780513
Test: walleye boots
Change-Id: I02803179746710413f4b1e2372f3550cd95d1581
2017-04-04 19:11:21 -07:00
TreeHugger Robot
b1a2a67cf8 Merge "Adding service_context's and allows to handle the following denials" 2017-04-04 23:49:46 +00:00
Connor O'Brien
2deebd4cb8 wahoo: use binderized boot HAL
Add the binderized boot HAL service to the manifest and grant
necessary SELinux permissions to access block devices.

Bug: 35810130
Test: Device boots & passes boot VTS test
Change-Id: I4df5ec0ff2f170da31e0748e376cda309802b554
Signed-off-by: Connor O'Brien <connoro@google.com>
2017-04-04 16:48:20 -07:00
TreeHugger Robot
5cb55c5e82 Merge "Wifi Offload HAL implementation for V1.0 interface" 2017-04-04 23:10:35 +00:00
Wei Wang
86ca1da571 Merge "wahoo: include missing libwpa_client" 2017-04-04 22:12:49 +00:00