summaryrefslogtreecommitdiff
path: root/rootdir
AgeCommit message (Collapse)Author
2019-08-13wayne-common: Remove NFC data directory creationRohit Rangwani
Removed NFC data directory creation to fix vendor_init access denial issue. NFC data directoty is already being created by system core init.rc. Change-Id: I7ebb88dc7b2df988a8af477baa81fe9253030ffb
2019-08-13wayne-common: Address dac_override and dac_read_search issues in init.qcom.shSridhar Parasuram
init.qcom.sh accesses files owned by groups radio, system and hence the groups have been added. Change-Id: I535eeaf42f38532ec6de46eb57f3cc0e1d959a47
2019-08-13wayne-common: Create new directory for Bluetooth SoC dumpRAJATH R
Create new directory for Bluetooth SoC dump/logs collection for new Android P dump format Change-Id: I1257518fa12420a6d8d5bb66f15782ab97582f36
2019-08-13wayne-common: Swap disk creationKarthik Gopalan
Create swap disks CRs-Fixed: 2264866 Change-Id: Id57a4e8d413c7dafb49d073980f10010003f616e
2019-08-13wayne-common: Change /data/misc/fm to /data/vendor/fmhimta ram
Change-Id: I369e0a858c8fddb4574dad5b54b2a3e0980ea3a6
2019-08-13wayne-common: Moving location sockets from /data to /devSaurabh Srivastava
Keeping sockets in /data/vendor/location prevents unmounting of /data partition after build load. CRs-Fixed: 2175511 Change-Id: Ide726a84b6b5f8df0c18d7d7dcbc1ee469b6d934
2019-08-13wayne-common: ueventd.qcom.rc: Set permissions of /dev/qce deviceZhen Kong
To support end-to-end DRM content playback with SG List feature, android.hardware.drm@1.0-service needs to have access permission to /dev/qce to map & unmap ION buffer virtual address with HW Crypto Engine. So, set /dev/qce device permission 0660 and let it be accessible by user "system" and group "drmrpc". Change-Id: If9c0ed70acc2bb063344692374f51441fe84eff6
2019-08-13wayne-common: Remove creating and accessing /data/media from vendor domainMahesh Lanka
Vendor domains can't access files outside of /data/vendor CRs-Fixed: 2307724 Change-Id: Ied173cc6bfb2a8041c8a0feb016e9efa3b743b7f
2019-08-13wayne-common: rootdir: Added a permissions for ODL char devicesMohammed Javid
Added a permissions for ODL char devices Change-Id: I1c74c060c9e9b958307a07a4dbe630d0f28b3a89
2019-08-13wayne-common: Starting imsrtpd on bootupSauvik Saha
* starting rtpd on bootup without waiting for DATA_DAEMON prop and restarting when property is set Change-Id: If121089334ef2c0b335320bb561a553163042ba3
2019-08-13wayne-common: Starting imsrcsd on bootupDevi Sandeep Endluri V V
Starting imsrcsd on bootup without waiting for DATAD property which will load libimsrcsbaseimpl and register HAL services Change-Id: I17c1891583ea99baa31efec0e8ba316e4fbf25f3
2019-08-13wayne-common: Update prefix of hwcomposer serviceRamakant Singh
Change-Id: Iac3abf0e50d77058548bcd232411ae9d7ff6b235
2019-08-13wayne-common: init: Create persist directory for hvdcp_optiSubbaraman Narayanamurthy
hvdcp_opti daemon stores some parameters in /mnt/vendor/persist/hvdcp_opti directory. Create the directory. Change-Id: I0cf17467792cc294e6ce1a7f35a356cc0e960e86
2019-08-13wayne-common: Bind mount /mnt/vendor/persist to /persist for sensorsdianlujitao
* Oreo sensors.qcom cannot access to persist even with the symlink Change-Id: Ifc43515c70b51aeb8c1b5db765051fb21fddb80d
2019-08-13wayne-common: Mount dsp and firmware in vendorVinay Verma
Change fstab to mount dsp and firmware to /vendor/dsp and /vendor/firmware_mnt. Add classpath for firmware loading /vendor/firmware_mnt/image in kernel command line. Change-Id: I2dd2e7ea6334fb979ad8ff8c755648748de93ab4
2019-08-13wayne-common: Change qti service name to dataqtiMohammed Javid
qti name is generic and updating it to dataqti so that no generic context will not match Change-Id: I186a642623f1ae46688a44f754fbe7ba421d042c
2019-08-13wayne-common: Move /bt_firmware mount point to /vendor/bt_firmwareVinay Verma
Change-Id: I6dbb4e19fd00861b0c50a7df6eab197e878a5d0e
2019-08-13wayne-common: Add vendor prefix to data connectivityDevi Sandeep Endluri V V
Change-Id: I57ac8e5583f62ec585723454de4906d83a4e6dfe
2019-08-13wayne-common: Start loc_launcher as gps userHarikrishnan Hariharan
Start loc_launcher as gps user and set uid/gid of loc_launcher to gps and enable SETUID and SETGID caps for loc_launcher, so that we can start loc_launcher as gps user instead of root and still have capabilities for SETUID and SETGID. Also remove not required permissions groups for loc_launcher. Change-Id: Ie9f1506874b3c3148f9170c8d5db9afd1e70025c CRs-Fixed: 2192881
2019-08-13wayne-common: Set permissions of /dev/byte-cntr deviceSaranya Chidura
To support ODL to read data from QDSS, create a custom group and set permission of byte-cntr device. And also set permission to coresight-tmc-etr/block_size to enable byte-cntr feature. Change-Id: Ic80156667dd7511392d5970ddcbd0fdc43ffffca Signed-off-by: Saranya Chidura <schidura@codeaurora.org>
2019-08-13wayne-common: rootdir: Changing iop directory permissionAbhimanyu Garg
Changing permission for IOP from 0770 to 0700. This is to restrict the access for iop database file. Change-Id: Ic3325595521d4e433d0ce9bada564fc599cf858c
2019-08-13wayne-common: Moving persist mount point to /mnt/vendor/persistVinay Verma
Move persist entry to fstab and mount at /mnt/vendor/persist Apply required user, group and permissions once persist folder is created through __mount and parititon is mounted. Run restorecon on /mnt/vendor/persist. Change-Id: I20a16f3669bc7abf9844525c6ba0db1521a5a8e2
2019-08-13wayne-common: Remove wcnss_filterDemon Singur
Unused when using Qualcomm's bluetooth stack. Change-Id: I2682e65a85c7b1112a695e851e9b1512a6b3d28c
2019-08-13wayne-common: Remove oem_2901 group for second RIL daemon serviceWang Han
* Matches rild.legacy.rc from Pie's RIL Change-Id: Icdb0a3e4859bc0a4011e34fdd483cef2ca3b8a7f
2019-08-13wayne-common: rootdir: Add 'vendor.' prefix to a vendor HAL service nameJaekyun Seok
* To prevent property name collisions between properties of system and vendor, 'vendor.' prefix must be added to a vendor HAL service name. You can see the details in go/treble-sysprop-compatibility documents. Test: succeeded building and tested on a sailfish device. Bug: 36796459 Change-Id: I48e6ee0ae3fe401e39efb273256d991fac676357
2019-08-13wayne-common: rootdir: Clean up init scriptsguaiyihu
* Clean up unused and non-exsistent services * Clean up invalid commands Change-Id: I5b991e8770b0ed9a7ba5af3a0fed612015e809a5
2019-08-13wayne-common: rootdir: Clean up unused init scriptsguaiyihu
* init.qcom.class_core.sh * init.qcom.coex.sh * init.qcom.crashdata.sh * init.qcom.efs.sync.sh * init.qcom.sdio.sh * init.qcom.syspart_fixup.sh * init.qcom.wifi.sh * init.qti.ims.sh * qca6234-service.sh Change-Id: Ib6ba59acb1f1d6b773aeca3c326944049784887c
2019-08-13wayne-common: rootdir: Remove sensors init shell scriptBruno Martins
Change-Id: Ice50a9c83a708d7f8300978048cd00c71e88abc8
2019-08-13wayne-common: rootdir: Remove insmod for non-existent moduleguaiyihu
Change-Id: I75afecc8909b55467dfde74d40e77007480fe31d
2019-08-13wayne-common: rootdir: Add restricted cpusetTim Murray
bug: 78197570 Test: CTS Change-Id: I6aaac2f3ce9ba886143e3667df2ca044c7f3d3f0
2019-08-13wayne-common: ueventd: Don't modify permissions of /dev/hw_randomWang Han
This addresses an underlying problem since /dev/hw_random is used. The issue is that EntropyMixer, which runs in system_server, needs to read from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer can never accress this node, resulting in warnings like this: W EntropyMixer: Failed to add HW RNG output to entropy pool W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied) AOSP ueventd handles this well, so just remove this line to get things back to stage. This issue was never exposed because Google derps the logging here, which is already fixed on Pie. https://android.googlesource.com/platform/frameworks/base/+/c78a463e875d91eae2cf256042fd99d130217c38 Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
2019-07-29wayne-common: wifi_supplicant: Deprecate entropy.binJeff Vander Stoep
Wpa_supplicant's random pool is not necessary on Android. Randomness is already provided by the entropymixer service which ensures sufficient entropy is maintained across reboots. Commit b410eb1913 'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with that entropy before either wpa_supplicant or hostapd are run. Bug: 34980020 Test: Use wifi and wifi tethering on 8996 targets Change-Id: Ib5caf362bc939911b357db186a274957d3fbf186 (cherry picked from commit 1f2b2f3a780bb7a6ed489bf86e18e77382f37514)
2019-07-29wayne-common: Don't start supplicant with interfacesRoshan Pius
Framework will now add interface to supplicant (via HIDL) when it needs to control an interface, so don't specify them in the startup params. Bug: 69426063 Test: Device boots up and able to connect to wifi. Change-Id: I817d28093f8b982e3806c212babd888c0f5eb7c0
2019-07-29wayne-common: wpa_supplicant(hidl): Add support for starting HAL lazilyRoshan Pius
Bug: 72394251 Test: Able to start supplicant from framework using ISupplicant.getService() Change-Id: I19b8434e7241b9028e7dc86316ec9d5512affcca
2019-07-29wayne-common: wpa_supplicant: Move control sockets to /data/vendorJeff Vander Stoep
Treble compliance. Bug: 70228425 Bug: 70393317 Test: complete wifi test in b/70393317 Test: Test wifi on Taimen and Sailfish Test: verify sockets exist in /data/vendor/wifi/wpa/sockets Change-Id: I0bfc3a351419f0a03498e79664949f353369bf1b
2018-12-02wayne-common: rootdir: Support A/B fstabIsaac Chen
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-19wayne: Decleare dt2w nodeIsaac Chen
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-19wayne: Get rid of recovery-only fstabMichael Bestas
* Mounting /system and /vendor partitions is handled in kernel now, however removing the entries from fstab caused issues building the OTA. The workaround was to have a separate fstab, but turns out that simply setting the recoveryonly flag does the trick because those are then ignored during a normal Android boot. Change-Id: I2944384d0a1c41bc9f9f51e2e29daff2bed0a0f4
2018-07-13wayne: Delete goodix data if other slot is taking up spaceTheScarastic
2018-07-13wayne: Import HIDL fingerprint wrapper serviceIsaac Chen
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-13wayne: Initial bringupIsaac Chen
Change-Id: I211da5781d8c7a16199fd8a18e1b00cfc9e01944 Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-03wayne: Move ramdisk configs to rootdir dirGuaiYiHu
* Clean up unused configs Change-Id: I0aae320468796a67fc2110aef0b31c06da2314e3 Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>