Bug: 62837579
Test: place test files in /persist/elabel, check that they are copied to /data/misc/elabel on boot
Change-Id: Id29e7c7c01ed54bf4d2f488cfa6dba51046bc5bf
Merged-In: Id29e7c7c01ed54bf4d2f488cfa6dba51046bc5bf
Allow init to copy elabel data from /persist/elabel to
/data/misc/elabel. Allow settings app to access elabel data
from /data/misc/elabel.
Bug: 62837579
Change-Id: Ie2241abe8c2384a537b001a90830a3f42c566748
Merged-In: Ie2241abe8c2384a537b001a90830a3f42c566748
Enable ramdump on a live system by enabling the
property debug.htc.ramdump.crash.
This property is protected by selinux policy
with the label ramdump_prop.
Bug: 62437259
Test: forced ramdump from Ramdump Uploader app.
Change-Id: Ifa9b7cf22749c0686e7d01ca2a4fc10dbd4b729c
Wahoo's sepolicy is changed merged to add Marlin permissions
based on compliance test needs. Marlin's sepolicy can be
found at device/google/marlin/sepolicy/hal_gnss_default.te
Bug: 37409476
Test: Boots with no avc denials or crashes. GNSS incl. post XTRA
delete runs well with no denials.
Change-Id: Id51197120d142850fe0d7c97f747818e23c178f8
This reverts commit b5f9e31877. This
commit removes libz.so from /system/lib[64]/vndk-sp.
We have to remove libz.so from vndk-sp because we don't have a good
mechanism to stop "classloader" linker namespace from loading
/system/lib[64]/vndk-sp/libz.so. Other alternatives require significant
changes to dynamic linker or CTS test cases.
Let's temporarily revert the commit to fix b/62195853 for oc-dr1-dev.
The long-term solution will be discussed in b/37617391.
Bug: 62195853
Bug: 37617391
Test: Boot sailfish to home screen.
Change-Id: I8591c153a1159ccfce6591b6cdc75722364e564b
Test: as follows
- built
- flashed
- booted
- "runtest frameworks-net" passes
- started USB tethering and switched upstreams between mobile and wifi
Bug: 63282480
Change-Id: I2b8cd7d56cfe5131df017ec0a437be01bab2b2d8
The version of VNDK that the vendor is built against is recorded in the
vendor partition. The version will be used by the dynamic linker to load
the correct version of ld.config.txt to use.
Bug: 63130475
Test: taimen build and boots
Change-Id: Iee9a87340b90bf618c2d241820820f45f114b9f7
Also cleanup sepolicy files that was using /data/vendor as they are not
needed and /data is not ready by the time we start time_daemon
Bug: 62184939
Test: walleye boot with correct time in airplane mode
Change-Id: Ic7b025a8c795092a1dd4b1ab1d7497d1440c0a4b
Test: Changed the mode using hidden menu multiple times and verified
the device doesn't report roaming.
Bug: 62622461
Change-Id: I51aefef9d574faf3c46e19e07f8c4fe187bf29d2
There is no support for FM radio on this line of devices.
Having this HAL impl in place was confusing VTS tests runner
as broadcast radio HAL was present in the output of 'lshal'.
Bug: 33050893
Test: audio works, no impl lib in /vendor/lib[64]/hw,
no broadcastradio in lshal output
Change-Id: I35b4d6329de8b04032b456fb048b0b8728024a64
This folder is used for storing QC slang scripts, which are not used on
this device.
Bug: 38425697
Test: load, sanity check sensors
Change-Id: Ie40e356c57e98355117833df05f59e26c4754e74
Add an entry to init.hardware.rc to create /data/vendor/sensors at
startup, and sepolicy entries that allow the sensors daemon to create
files in that directory. These will be used to persist runtime
calibration across reboot, but not across factory reset.
denied { getattr } for pid=14080 comm="sensors.qcom"
path="/data/vendor/sensors/cal.txt" dev="sda45" ino=2179116
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { write } for pid=14113 comm="sensors.qcom" name="vendor"
dev="sda45" ino=2179073 scontext=u:r:sensors:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
denied { add_name } for pid=14113 comm="sensors.qcom" name="sensors"
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=dir permissive=1
denied { create } for pid=14113 comm="sensors.qcom" name="sensors"
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=dir permissive=1
denied { create } for pid=14113 comm="sensors.qcom" name="cal.bin"
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { write open } for pid=14113 comm="sensors.qcom"
path="/data/vendor/sensors/cal.bin" dev="sda45" ino=2179115
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { read } for pid=14113 comm="sensors.qcom"
path="/data/vendor/sensors/cal.txt" dev="sda45" ino=2179116
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
denied { getattr } for pid=14113 comm="sensors.qcom"
path="/data/vendor/sensors/cal.txt" dev="sda45" ino=2179116
scontext=u:r:sensors:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
Bug: 38425697
Test: confirm folder is created on boot, and calibration files are
created, updated, and read successfully by sensors daemon
Change-Id: Ie23cafe4f43b3335e07cf0d13dde0c5d06b69f80
Enforce correct system as UID/GID on tftp-server used files
Bug: 62544362
Change-Id: I92a346576c4e0af2187317281acc7e53599787eb
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Also add tetheroffload HALs to the manifest.
Bug: 29337859
Bug: 32163131
Test: adb shell getenforce
Enforcing
adb shell dumpsys connectivity tethering
Tethering:
...
Log:
...
06-28 11:46:58.841 - SET master tether settings: ON
06-28 11:46:58.857 - [OffloadController] tethering offload started
And logs show some signs of happiness:
06-28 11:46:58.853 816 947 I IPAHALService: IPACM was provided two FDs (18, 19)
06-28 11:46:58.853 1200 1571 I zygote64: Looking for service android.hardware.tetheroffload.control@1.0::IOffloadControl/default
Change-Id: I40e23c1863901330dfe59e2ea196314c5c7bb52a
(cherry picked from commit c6ecb207d7032bf43e9b39941ff7e47dd127e361)