| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Update sensor and contexthub SELinux rule to conform to Treble
HAL sandbox and allow dynamic sensor driver to access hidraw
devices.
Bug: 34980308
Bug: 36576923
Bug: 31026607
Test: no selinux violation after flashall -w; sensor cal files
correctly created and updated; nanohub_lock is created after boot;
dynamic sensor feature is able to detect with usb sensor devices
connection and is able to receive sensor events; nanohub lock
is able to halt sensor hal thread.
Change-Id: I773f88207483fbf12321fc9f52fc0b909f38cc65
marlin: ueventd.rc & file_context change for dynamic sensor
Test: works with usb device without trigger security exception
Change-Id: Icf2248a19a3ad533264ef44cf662129347b401bc
|
| |
|
|
|
| |
Bug: 29253550
Change-Id: I3e42a06f05f633e7e347a08a49d7746fdcac12fa
|
| |
|
|
|
|
|
|
|
| |
Change permissions on the following files to give group write access.
crw-r----- 1 system system 220, 0 1970-01-18 14:37 /dev/nanohub
crw-r----- 1 system system 220, 1 1970-01-18 14:37 /dev/nanohub_comms
Change-Id: I18429d3bd3bf545f538e19b82860d674a9bf8eec
|
| |
|
|
|
|
|
| |
Bug: 27610992
Change-Id: I9cbd3fec4c68d5de693c72cf1b8b28dfbe28bed3
Signed-off-by: Ed Tam <etam@google.com>
|
| |
|
|
|
|
| |
It's for enable factory reset protect.
Change-Id: I835867b02a9c4c3a1a8bb2a9fae776517f617d20
|
| |
|
|
|
|
|
|
| |
if build type is userdebug
Bug: 28304598
Change-Id: I78fb856198020017c18676e7592e60438ab0aadd
Signed-off-by: gary_tseng <gary_tseng@htc.com>
|
| |
|
|
|
| |
Change-Id: I9399a303381c89a652f0e80279813ae755bedbea
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
| |
|
|
|
|
|
| |
BUG: 27548688
Change-Id: I581ee7fb4cf565efee118b7a278ef1f4ceec6fba
Signed-off-by: joner_lin <joner_lin@htc.com>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Addresses:
avc: denied { read write } for pid=1121 comm="system_server"
name="nanohub" dev="tmpfs" ino=16391 scontext=u:r:system_server:s0
tcontext=u:object_r:device:s0 tclass=chr_file
avc: denied { open } for pid=1121 comm="system_server"
path="/dev/nanohub" dev="tmpfs" ino=16391 scontext=u:r:system_server:s0
tcontext=u:object_r:device:s0 tclass=chr_file
Bug: 27798204
Change-Id: I7349aa0262f1ab99e65bba99a14487879b33b09f
|
| |
|
|
|
|
|
|
| |
- Add fingerprintd
- Add android.hardware.fingerprint.xml
- Set permissions on fingerprint sysfs attributes
Change-Id: I310f3957a66dcb6951d07dbf43ddfdc4a3ca4b74
|
| |
|
|
| |
Change-Id: Id9e2aacfb92d2a8d2d166f96805688d74e40654b
|
| |
|
|
| |
Change-Id: Ia82d70f7d6e6fbd1433c8ece41efaa8b10af57ec
|
| |
|
|
| |
Change-Id: I1fbdb0f181b164a097aa18a2a996fbacc307eafd
|
|
|
1) Disable SELinux until the policies are updated (b/26984551)
2) move some files to top level, eventually common/ will be removed
3) start moving lines from common/*mk to the appropriate top level makefile
4) start removing unused directories and files
Bug: 26984551
Change-Id: Ic8b9226a6e9506b2655906ab1550679394b5b43c
|