Test: as follows
- built
- flashed
- booted
- "runtest frameworks-net" passes
- started USB tethering and switched upstreams between mobile and wifi
Bug: 63282480
Change-Id: I2b8cd7d56cfe5131df017ec0a437be01bab2b2d8
Also cleanup sepolicy files that was using /data/vendor as they are not
needed and /data is not ready by the time we start time_daemon
Bug: 62184939
Test: walleye boot with correct time in airplane mode
Change-Id: Ic7b025a8c795092a1dd4b1ab1d7497d1440c0a4b
There is no support for FM radio on this line of devices.
Having this HAL impl in place was confusing VTS tests runner
as broadcast radio HAL was present in the output of 'lshal'.
Bug: 33050893
Test: audio works, no impl lib in /vendor/lib[64]/hw,
no broadcastradio in lshal output
Change-Id: I35b4d6329de8b04032b456fb048b0b8728024a64
This folder is used for storing QC slang scripts, which are not used on
this device.
Bug: 38425697
Test: load, sanity check sensors
Change-Id: Ie40e356c57e98355117833df05f59e26c4754e74
Add an entry to init.hardware.rc to create /data/vendor/sensors at
startup, and sepolicy entries that allow the sensors daemon to create
files in that directory. These will be used to persist runtime
calibration across reboot, but not across factory reset.
denied { getattr } for pid=14080 comm="sensors.qcom"
path="/data/vendor/sensors/cal.txt" dev="sda45" ino=2179116
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { write } for pid=14113 comm="sensors.qcom" name="vendor"
dev="sda45" ino=2179073 scontext=u:r:sensors:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
denied { add_name } for pid=14113 comm="sensors.qcom" name="sensors"
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=dir permissive=1
denied { create } for pid=14113 comm="sensors.qcom" name="sensors"
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=dir permissive=1
denied { create } for pid=14113 comm="sensors.qcom" name="cal.bin"
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { write open } for pid=14113 comm="sensors.qcom"
path="/data/vendor/sensors/cal.bin" dev="sda45" ino=2179115
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { read } for pid=14113 comm="sensors.qcom"
path="/data/vendor/sensors/cal.txt" dev="sda45" ino=2179116
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { getattr } for pid=14113 comm="sensors.qcom"
path="/data/vendor/sensors/cal.txt" dev="sda45" ino=2179116
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
Bug: 38425697
Test: confirm folder is created on boot, and calibration files are
created, updated, and read successfully by sensors daemon
Change-Id: Ie23cafe4f43b3335e07cf0d13dde0c5d06b69f80
Enforce correct system as UID/GID on tftp-server used files
Bug: 62544362
Change-Id: I92a346576c4e0af2187317281acc7e53599787eb
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Also add tetheroffload HALs to the manifest.
Bug: 29337859
Bug: 32163131
Test: adb shell getenforce
Enforcing
adb shell dumpsys connectivity tethering
Tethering:
...
Log:
...
06-28 11:46:58.841 - SET master tether settings: ON
06-28 11:46:58.857 - [OffloadController] tethering offload started
And logs show some signs of happiness:
06-28 11:46:58.853 816 947 I IPAHALService: IPACM was provided two FDs (18, 19)
06-28 11:46:58.853 1200 1571 I zygote64: Looking for service android.hardware.tetheroffload.control@1.0::IOffloadControl/default
Change-Id: I40e23c1863901330dfe59e2ea196314c5c7bb52a
(cherry picked from commit c6ecb207d7032bf43e9b39941ff7e47dd127e361)
Wahoo's sepolicy is changed to mirror Marlin's. Marlin's sepolicy can be
found at device/google/marlin/sepolicy/hal_gnss_default.te
BUG: 37409476
Change-Id: Id6f49defd70923c56da2dfd68f55cf3dfc2e62fc
We moved time_daemon without setting its required permission. This CL is
to fix that.
Bug: 62184939
Test: walleye boots
Change-Id: I5e485a4e8a7c3eadde8d9a111c9e1bc33eee3f67
Use 1.1 IUsb in order to make register the service as 1.1 compatible.
This enables lshal to recognize the hal service as 1.1 implementation.
Bug: 62917546
Test: Manually verified lshal output
android.hardware.usb@1.0::IUsb/default 0/1 782 6024 568
android.hardware.usb@1.1::IUsb/default 0/1 782 6024 568
Change-Id: I9b0817841dbcc345a1d854ee4a5193797181ea3f
No change in latency for Taimen
Bug: 62375603
Test: Loopback shows reduction and no glitches on Walleye, no change on Taimen
Change-Id: I6a071ed588a69dacb5be11a5154bd2976444df4f
Devices with an existing /persist/rfs directory need all the subdirs
permissions fixed up to avoid an selinux denial. On new devices
this will already be fixed.
avc: denied { dac_override } scontext=u:r:rfs_access:s0
tcontext=u:r:rfs_access:s0 tclass=capability permissive=0
avc: denied { dac_read_search } scontext=u:r:rfs_access:s0
tcontext=u:r:rfs_access:s0 tclass=capability permissive=0
Bug: 38214174
Test: Device boots with no selinux denials for rfs_access
Change-Id: I4be2c578eecca4f199a0773cfded589f09eb0bd4
CHRE depends on calibration data which is in persist partition.
This reverts commit 69b03ecd63.
Bug: 63066826
Change-Id: Ic7cf3daa227091c211902a945cd5fc4f7f11c814