Age | Commit message (Collapse) | Author |
|
Change-Id: I69dd459185ccf862ca26b3c7b001386fcf93bf7b
|
|
Change-Id: I2d54078f42ea2682e60f287aa1235f1346e1eb88
|
|
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
https://android.googlesource.com/platform/frameworks/base/+/c78a463e875d91eae2cf256042fd99d130217c38
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
|
|
Change-Id: Id8bf30d72e8a513f09d654c91ccdf22cd4182b2d
|
|
Change-Id: Ie8dd5fc512e6e1e3a33ce0d7907924c05e0bcf43
|
|
Change-Id: I6fe31f784abd08bd4d7ca79e238f10087c16ca69
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
|
|
* This script doesn't do anything useful, since it tries to set a lot of
ro.* properties, which is not allowed anyway.
Change-Id: I408cc17d0d18e81a9cf0e529e6b78622c3017a7f
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
|
|
* jasmine_sprout 9 PKQ1.180904.001 V10.0.9.0.PDIMIXM release-keys
* Graphics SDM from LA.UM.7.4.r1-04100-8x98.0
* Cleanup rootdir a bit
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
Change-Id: I457f9d446b86b856e2cebe85b698403005c58d3e
|
|
Removed NFC data directory creation to fix
vendor_init access denial issue.
NFC data directoty is already being created
by system core init.rc.
Change-Id: I7ebb88dc7b2df988a8af477baa81fe9253030ffb
|
|
init.qcom.sh accesses files owned by groups radio, system and hence
the groups have been added.
Change-Id: I535eeaf42f38532ec6de46eb57f3cc0e1d959a47
|
|
Create new directory for Bluetooth SoC dump/logs
collection for new Android P dump format
Change-Id: I1257518fa12420a6d8d5bb66f15782ab97582f36
|
|
Create swap disks
CRs-Fixed: 2264866
Change-Id: Id57a4e8d413c7dafb49d073980f10010003f616e
|
|
Change-Id: I369e0a858c8fddb4574dad5b54b2a3e0980ea3a6
|
|
Keeping sockets in /data/vendor/location prevents
unmounting of /data partition after build load.
CRs-Fixed: 2175511
Change-Id: Ide726a84b6b5f8df0c18d7d7dcbc1ee469b6d934
|
|
To support end-to-end DRM content playback with SG List feature,
android.hardware.drm@1.0-service needs to have access permission
to /dev/qce to map & unmap ION buffer virtual address with HW Crypto
Engine. So, set /dev/qce device permission 0660 and let it be
accessible by user "system" and group "drmrpc".
Change-Id: If9c0ed70acc2bb063344692374f51441fe84eff6
|
|
Vendor domains can't access files outside of /data/vendor
CRs-Fixed: 2307724
Change-Id: Ied173cc6bfb2a8041c8a0feb016e9efa3b743b7f
|
|
Added a permissions for ODL char devices
Change-Id: I1c74c060c9e9b958307a07a4dbe630d0f28b3a89
|
|
* starting rtpd on bootup without waiting for DATA_DAEMON
prop and restarting when property is set
Change-Id: If121089334ef2c0b335320bb561a553163042ba3
|
|
Starting imsrcsd on bootup without waiting for DATAD property
which will load libimsrcsbaseimpl and register HAL services
Change-Id: I17c1891583ea99baa31efec0e8ba316e4fbf25f3
|
|
Change-Id: Iac3abf0e50d77058548bcd232411ae9d7ff6b235
|
|
hvdcp_opti daemon stores some parameters in
/mnt/vendor/persist/hvdcp_opti directory. Create the directory.
Change-Id: I0cf17467792cc294e6ce1a7f35a356cc0e960e86
|
|
* Oreo sensors.qcom cannot access to persist even with the symlink
Change-Id: Ifc43515c70b51aeb8c1b5db765051fb21fddb80d
|
|
Change fstab to mount dsp and firmware to /vendor/dsp and
/vendor/firmware_mnt.
Add classpath for firmware loading /vendor/firmware_mnt/image in
kernel command line.
Change-Id: I2dd2e7ea6334fb979ad8ff8c755648748de93ab4
|
|
qti name is generic and updating it to dataqti so that no generic
context will not match
Change-Id: I186a642623f1ae46688a44f754fbe7ba421d042c
|
|
Change-Id: I6dbb4e19fd00861b0c50a7df6eab197e878a5d0e
|
|
Change-Id: I57ac8e5583f62ec585723454de4906d83a4e6dfe
|
|
Start loc_launcher as gps user and set uid/gid of loc_launcher
to gps and enable SETUID and SETGID caps for loc_launcher, so
that we can start loc_launcher as gps user instead of root and
still have capabilities for SETUID and SETGID. Also remove not
required permissions groups for loc_launcher.
Change-Id: Ie9f1506874b3c3148f9170c8d5db9afd1e70025c
CRs-Fixed: 2192881
|
|
To support ODL to read data from QDSS, create a custom group
and set permission of byte-cntr device. And also set
permission to coresight-tmc-etr/block_size to enable
byte-cntr feature.
Change-Id: Ic80156667dd7511392d5970ddcbd0fdc43ffffca
Signed-off-by: Saranya Chidura <schidura@codeaurora.org>
|
|
Changing permission for IOP from 0770 to 0700. This is to restrict the
access for iop database file.
Change-Id: Ic3325595521d4e433d0ce9bada564fc599cf858c
|
|
Move persist entry to fstab and mount at /mnt/vendor/persist
Apply required user, group and permissions once persist
folder is created through __mount and parititon is mounted.
Run restorecon on /mnt/vendor/persist.
Change-Id: I20a16f3669bc7abf9844525c6ba0db1521a5a8e2
|
|
Unused when using Qualcomm's bluetooth stack.
Change-Id: I2682e65a85c7b1112a695e851e9b1512a6b3d28c
|
|
* Matches rild.legacy.rc from Pie's RIL
Change-Id: Icdb0a3e4859bc0a4011e34fdd483cef2ca3b8a7f
|
|
* To prevent property name collisions between properties of system and
vendor, 'vendor.' prefix must be added to a vendor HAL service name.
You can see the details in go/treble-sysprop-compatibility documents.
Test: succeeded building and tested on a sailfish device.
Bug: 36796459
Change-Id: I48e6ee0ae3fe401e39efb273256d991fac676357
|
|
* Clean up unused and non-exsistent services
* Clean up invalid commands
Change-Id: I5b991e8770b0ed9a7ba5af3a0fed612015e809a5
|
|
* init.qcom.class_core.sh
* init.qcom.coex.sh
* init.qcom.crashdata.sh
* init.qcom.efs.sync.sh
* init.qcom.sdio.sh
* init.qcom.syspart_fixup.sh
* init.qcom.wifi.sh
* init.qti.ims.sh
* qca6234-service.sh
Change-Id: Ib6ba59acb1f1d6b773aeca3c326944049784887c
|
|
Change-Id: Ice50a9c83a708d7f8300978048cd00c71e88abc8
|
|
Change-Id: I75afecc8909b55467dfde74d40e77007480fe31d
|
|
bug: 78197570
Test: CTS
Change-Id: I6aaac2f3ce9ba886143e3667df2ca044c7f3d3f0
|
|
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
https://android.googlesource.com/platform/frameworks/base/+/c78a463e875d91eae2cf256042fd99d130217c38
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
|
|
Wpa_supplicant's random pool is not necessary on Android. Randomness
is already provided by the entropymixer service which ensures
sufficient entropy is maintained across reboots. Commit b410eb1913
'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with
that entropy before either wpa_supplicant or hostapd are run.
Bug: 34980020
Test: Use wifi and wifi tethering on 8996 targets
Change-Id: Ib5caf362bc939911b357db186a274957d3fbf186
(cherry picked from commit 1f2b2f3a780bb7a6ed489bf86e18e77382f37514)
|
|
Framework will now add interface to supplicant (via HIDL) when it
needs to control an interface, so don't specify them in the startup
params.
Bug: 69426063
Test: Device boots up and able to connect to wifi.
Change-Id: I817d28093f8b982e3806c212babd888c0f5eb7c0
|
|
Bug: 72394251
Test: Able to start supplicant from framework using
ISupplicant.getService()
Change-Id: I19b8434e7241b9028e7dc86316ec9d5512affcca
|
|
Treble compliance.
Bug: 70228425
Bug: 70393317
Test: complete wifi test in b/70393317
Test: Test wifi on Taimen and Sailfish
Test: verify sockets exist in /data/vendor/wifi/wpa/sockets
Change-Id: I0bfc3a351419f0a03498e79664949f353369bf1b
|
|
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
|
|
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
|
|
* Mounting /system and /vendor partitions is handled in kernel now,
however removing the entries from fstab caused issues building
the OTA. The workaround was to have a separate fstab, but turns out
that simply setting the recoveryonly flag does the trick because
those are then ignored during a normal Android boot.
Change-Id: I2944384d0a1c41bc9f9f51e2e29daff2bed0a0f4
|
|
|
|
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
|
|
Change-Id: I211da5781d8c7a16199fd8a18e1b00cfc9e01944
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
|
|
* Clean up unused configs
Change-Id: I0aae320468796a67fc2110aef0b31c06da2314e3
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
|