Change the user and group ownership and permissions of sensors
device node.
Change-Id: I251af01d4f0204c784667fe92b3998c197f75d8e
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
netutils-wrapper only list a single version x.0 in its
requirement. System manifest might provide a list of
netutils-wrapper versions it supports {x, y, z}.0.
Bug: 64447338
Test: m compatibility_matrix.xml system_manifest.xml -j
(checks compatibility at build time)
Change-Id: I2ec919fd5378aed7160c636cb7f2bd138db1473f
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
Start loc_launcher as gps user and set uid/gid of loc_launcher
to gps and enable SETUID and SETGID caps for loc_launcher, so
that we can start loc_launcher as gps user instead of root and
still have capabilities for SETUID and SETGID. Also remove not
required permissions groups for loc_launcher.
Change-Id: Ie9f1506874b3c3148f9170c8d5db9afd1e70025c
CRs-Fixed: 2192881
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
c78a463e87
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
/data/misc/dhcp
* The creation of /data/misc/wifi and /data/misc/dhcp was moved long ago
to the core init.rc script. Moreover, /data/misc/wifi is deprecated
since wpa_supplicant now relies on /data/vendor/wifi.
Change-Id: Ic0a33af44ffe163d3dd06cebdc1e192dc9bcb11f
Wpa_supplicant's random pool is not necessary on Android. Randomness
is already provided by the entropymixer service which ensures
sufficient entropy is maintained across reboots. Commit b410eb1913
'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with
that entropy before either wpa_supplicant or hostapd are run.
Bug: 34980020
Test: Use wifi and wifi tethering on 8996 targets
Change-Id: Ib5caf362bc939911b357db186a274957d3fbf186
This change sets LOCAL_SDK_VERSION for all packages where
this is possible without breaking the build, and
LOCAL_PRIVATE_PLATFORM_APIS := true otherwise.
Setting one of these two will be made required soon, and this
is a change in preparation for that. Not setting LOCAL_SDK_VERSION
makes the app implicitly depend on the bootclasspath, which is
often not required. This change effectively makes depending on
private apis opt-in rather than opt-out.
Test: make relevant package
Bug: 73535841
Change-Id: I5196e8c7277ff86280782e7b479a499add2e8f9f
New name is config_dozeAfterScreenOffByDefault
Bug: 73178121
Change-Id: Ie3d1ea5a2cc480655592bf6e49b37f5ea07f3f58
Signed-off-by: Alberto97 <albertop2197@gmail.com>
These are directories used by the system so they should be created by
the system.
Test: treehugger
Change-Id: I4c2d381423e002705f4de09d34a63a49ec473688
Signed-off-by: Alberto97 <albertop2197@gmail.com>
To prevent property name collisions between properties of system and
vendor, 'vendor.' prefix must be added to a vendor HAL service name.
You can see the details in http://go/treble-sysprop-compatibility.
Test: succeeded building and tested on a sailfish device.
Bug: 36796459
Change-Id: I48e6ee0ae3fe401e39efb273256d991fac676357
Signed-off-by: Alberto97 <albertop2197@gmail.com>
Sanders is armv8 device. Setting TARGET_2ND_ARCH_VARIANT to armv8-a,
instead of armv7-a-neon, can silence the related warning during build.
Bug: 68012286
Test: lunch aosp_bullhead; make -j
Change-Id: I0989c3d4185334dbfe0a3d79d3595d8dff8abd2b