Commit graph

1046 commits

Author SHA1 Message Date
Michael Bestas
1a15183e39
sdm710-common: Inherit common partition reserved sizes
Change-Id: I444ce2fcd37cdfa58d83a7e872dc547fb05a2a89
2024-02-10 20:52:44 +02:00
oshmoun
9b31e5251a
sdm710-common: fstab: add encryptable flag for external sdcards
* Starting from Android P, it is possible to use FBE in combination with adoptable storage.

Change-Id: If12c183b20f1c8197f5282d45e94eea26637e3f1
2023-11-28 10:38:09 +02:00
srfarias
3a0bf13a01
sdm710-common: overlay: Make the UI smoother
Signed-off-by: Unicote <arvogl874@gmail.com>
Signed-off-by: Rizak Kamal <rizakkamal999@gmail.com>
Signed-off-by: fajar <santuyz321@gmail.com>
Signed-off-by: fajar3109 <santuyz321@gmail.com>
Signed-off-by: fajar <santuyz321@gmail.com>
Signed-off-by: RahulGorai0206 <rahulgorai0206@gmail.com>
Signed-off-by: Edwiin Kusuma Jaya <kutemeikito0905@gmail.com>
2023-11-26 10:45:09 +02:00
etylix
30b957083e
sdm710-common: Add radio props to improve battery life
Changed “ro.ril.disable.power.collapse” value to zero.
Seems to be a debate on what value is more effective but after more reading and testing found that a value of “0” shows more improvement.
Have also added “ro.mot.eri.losalert.delay=1000 “ that helps smooth out disconnects and reconnects, saving battery.
Changed “ro.ril.disable.power.collapse” value to zero.

Co-authored by: KARTHIK LAL <karthik.lal558@gmail.com>
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: popoA3M <pratyayaborborah@gmail.com>
Signed-off-by: EndCredits <endcredits@crepuscular-aosp.icu>
2023-11-26 10:39:02 +02:00
Saitama69k
caf58ea362
sdm710-common: overlay: Enable night light and extra dim 2023-11-26 10:35:46 +02:00
6b9dbfe85a
Revert "sdm710-common: sepolicy: Add SELinux policy for flags_health_check"
Output:
neverallow check failed at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_ven>
  (neverallow domain property_type (file (ioctl lock)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33193
      (allow flags_health_check aac_drc_prop (file (ioctl read getattr lock map open watch watch_reads)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33194
      (allow flags_health_check ab_update_gki_prop (file (ioctl read getattr lock map open watch watch_reads)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33195
      (allow flags_health_check adbd_config_prop (file (ioctl read getattr lock map open watch watch_reads)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33196
This reverts commit c7fb8c20d2.
2023-11-25 22:17:59 +02:00
Chenyang Zhong
a6aa3f0e32
sdm710-common: sepolicy: allow rild to call qtidataservices_app
avc: denied { call } for comm="DataModule-Loop" scontext=u:r:rild:s0 tcontext=u:r:qtidataservices_app:s0:c221,c256,c512,c768 tclass=binder permissive=0
Change-Id: Ibec0d6e78a823f3a90ec7e166f58dd6b2797db65
2023-11-25 21:44:07 +02:00
6b3e5c5a10
Revert "sdm710-common: permissive selinux"
No need, enforce working!
This reverts commit 549291d79f.
2023-11-25 20:35:08 +02:00
f8a78253fe
Revert "sdm710-common: Enable LZ4 compression for ramdisks"
Could not decompress initial ramdisk image.

Booting to EDL
You can get dmesg from EDL, dump memory and read any HEX Reader, for example - GHex
This reverts commit c264973aa9.
2023-11-25 20:35:08 +02:00
Hridya Valsaraju
8803ff0740
sdm710-common: Set PRODUCT_SET_DEBUGFS_RESTRICTIONS
Starting with Android R launched devices, debugfs cannot be mounted in
production builds. In order to avoid accidental debugfs dependencies
from creeping in during development with userdebug/eng builds, the
build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to
enforce additional debugfs restrictions for userdebug/eng builds. The
same flag will be used to enable sepolicy neveallow statements to
prevent new permissions added for debugfs access.

Test: build, boot
Bug: 184381659
Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e
2023-11-25 20:35:07 +02:00
Alcatraz323
2549bc87d0
sdm710-common: sepolicy: fix vendor_init prop access denial
* these prop should be accessed by init process from /system partition
I /system/bin/init: type=1107 audit(0.0:3): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc:  denied  { set } for property=persist.vendor.bt.a2dp_offload_cap pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=property_service permissive=1'
I /system/bin/init: type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc:  denied  { set } for property=ro.hwui.render_ahead pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1'
2023-11-25 20:34:25 +02:00
Amit Kushwaha
c20eba7afa
sdm710-common: init.qcom.rc: Removing unused setprop persist.camera.gyro.disable
Addressing error :
 avc:  denied  { set } for property=persist.camera.gyro.disable pid=377 uid=0 gid=0
 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0
 tclass=property_service permissive=0\x0a

CRs-Fixed: 2662429

Change-Id: Ibd0ed4646d52d67248ea33940c4463ecdbdefc36
2023-11-25 20:34:13 +02:00
giasen
72a3c37dc1
sdm710-common: Require files to be included 2023-11-21 23:47:17 +02:00
mvaisakh
7f627da9f6
sdm710-common: Copy libprotobuf-cpp-full.so and libprotobuf-cpp-lite.so VNDK prebuilt blobs
* Also Build libprotobuf-cpp-lite-3.9.1-vendorcompat
2023-11-21 23:46:17 +02:00
ShevT
f7d3923f07
sdm710-common: selinux: Resolve mediacodec denials
avc:  denied  { read } for  comm="android.hardwar" name="u:object_r:vendor_audio_prop:s0" dev="tmpfs" ino=11552 scontext=u:r:mediacodec:s0 tcontext=u:object_r:vendor_audio_prop:s0 tclass=file permissive=0
 avc:  denied  { open } for  comm="android.hardwar" path="/dev/__properties__/u:object_r:vendor_audio_prop:s0" dev="tmpfs" ino=9526 scontext=u:r:mediacodec:s0 tcontext=u:object_r:vendor_audio_prop:s0 tclass=file permissive=0
 avc:  denied  { getattr } for  comm="android.hardwar" path="/dev/__properties__/u:object_r:vendor_audio_prop:s0" dev="tmpfs" ino=11574 scontext=u:r:mediacodec:s0 tcontext=u:object_r:vendor_audio_prop:s0 tclass=file permissive=0
 avc:  denied  { map } for  comm="android.hardwar" path="/dev/__properties__/u:object_r:vendor_audio_prop:s0" dev="tmpfs" ino=11574 scontext=u:r:mediacodec:s0 tcontext=u:object_r:vendor_audio_prop:s0 tclass=file permissive=0

Change-Id: I38c24e2ea5bb211f8cc379d7f7dfe2c003c6a8f1
2023-11-21 23:43:05 +02:00
ManshuTyagi
d9a4ac54df
sdm710-common: init: Fix trace error * E cutils-trace: Error opening trace file: No such file or directory 2023-11-21 23:41:07 +02:00
Mukul Dhir
854c54400c
sdm710-common: sepolicy: Allow init to write to proc
01-01 02:13:02.803   344   344 I hwservicemanager: Since android.hardware.keymaster@3.0::IKeymasterDevice/default is not registered, trying to start it as a lazy HAL.
01-01 02:13:02.804   371   371 I HidlServiceManagement: getService: Trying again for android.hardware.keymaster@3.0::IKeymasterDevice/default...
01-01 02:13:02.930     1     1 I init    : type=1400 audit(0.0:37): avc: denied { write } for name="dirty_background_bytes" dev="proc" ino=12937 scontext=u:r:init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
01-01 02:13:02.953     1     1 I init    : type=1400 audit(0.0:38): avc: denied { write } for name="discard_max_bytes" dev="sysfs" ino=20778 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
01-01 02:13:02.953     1     1 I init    : type=1400 audit(0.0:39): avc: denied { open } for path="/sys/devices/soc.0/f9824900.sdhci/mmc_host/mmc0/mmc0:0001/block/mmcblk0/queue/discard_max_bytes" dev="sysfs" ino=20778 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Change-Id: I0283d0744619d82867318879152cd6fbfca094aa
2023-11-21 22:28:33 +02:00
asmallbit
51b24b16b4
sdm710-common: sepolicy: Add SELinux policy for odrefresh
odrefresh: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>

Change-Id: I51eb0f55430673cce7e87882765aa335096c687d
2023-11-21 20:39:52 +02:00
boedhack99
22156aae16
sdm710-common: sepolicy: Allow odrefresh to kill
* avc: denied { kill } for comm=odrefresh capability=5
scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability
permissive=0

Change-Id: Id24f51e8570dcb32a6b35c57c8f4b6c2be626673
2023-11-21 20:38:20 +02:00
Shreedhan003
bc8800d6dc
sdm710-common: props: Move to system init: Do not have permissions to set 'persist.device_config.runtime_native_boot.iorap_readahead_enable' to 'true' in property file '/vendor/build.prop': SELinux permission check failed 2023-11-21 20:31:18 +02:00
tImIbreakdown
e4c27418ef
sdm710-common: sepolicy: allow tee to read persist_file link for qseecomd
* W qseecomd: type=1400 audit(0.0:26131): avc: denied { read } for name="persist" dev="mmcblk0p27" ino=43
  scontext=u:r:tee:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0

Change-Id: If830be30b4f8c64c7d0260c0a009149e3aba8668
2023-11-21 20:20:00 +02:00
SebaUbuntu
60d42efd08
sdm710-common: sepolicy: Label logdump partition in qcom sepolicy
Change-Id: I9c0678257ad21480581b30431dfcf3a5cd215bfd
Signed-off-by: kaderbava <ksbava7325@gmail.com>
2023-11-21 20:13:59 +02:00
Randall Huang
20869d2170
sdm710-common: fstab: data=journal,commit=1 for /metadata
Since Ext4 doesn't implement "-o sync", it commits metadata at every 5 secs.
This may cause /metadata corruption.

Bug: 162883014
Change-Id: Icd38754bad1b1529d01165ea8c703c214d20bb4b
2023-11-21 20:10:25 +02:00
johnmart19
e4fb9c52d3
sdm710-common: Build android.hardware.media.omx
android.hardware.media.omx@1.0-service: Service not available yet

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: popoA3M <pratyayaborborah@gmail.com>
2023-11-21 20:08:01 +02:00
b2a12a6340
sdm710-common: Update fstab, change logdump path 2023-11-21 20:03:48 +02:00
jonerlin
81e3fa278b
sdm710-common: Address avc denials while vendor_init access vendor_bluetooth_prop
* avc:  denied  { set } for  scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_bluetooth_prop:s0 tclass=property_service
* avc:  denied  { set } for  scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_bluetooth_prop:s0 tclass=property_service

Bug: 131149718
Test: Boot up and Turn On/Off Bluetooth
Change-Id: Ifd6bf0a35eafc2513901783b35deed45eed9dac6
2023-11-21 20:00:48 +02:00
Aflaungos
c7fb8c20d2
sdm710-common: sepolicy: Add SELinux policy for flags_health_check
flags_health_ch: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:ab_update_gki_prop:s0 dev=tmpfs ino=14631 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>
2023-11-21 19:57:23 +02:00
Nippon
17e45ddf64
sdm710-common: sepolicy: Label more graphics nodes 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon3/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon2/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon1/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon0/name not found
Signed-off-by: Cykeek <Cykeek@proton.me>
2023-11-21 19:52:12 +02:00
ShevT
a4b84e2a40
sdm710-common: sepolicy: Fix avc denials related to vdc
At reboot:
avc:  denied  { kill } for  comm="vdc" capability=5  scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0

Change-Id: Id9387c43d48192d138370aad2033c5ebb61e2b35
2023-11-21 19:42:55 +02:00
ShevT
791b9834e0
sdm710-common: sepolicy: Fix avc denials related to debugfs_tracing_debug
Change-Id: I07967e3ad7d2b0ebedd2bf2f5b2727c935b67119
2023-11-21 19:42:21 +02:00
ShevT
0a16af1ebf
sdm710-common: sepolicy: Fix avc denials related to fsck
avc:  denied  { kill } for  comm="fsck.f2fs" capability=5  scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0

Change-Id: I8bb2548b6635a58d2bebf0a5f1994188bcf9e3be
2023-11-21 19:40:50 +02:00
LuK1337
52286472cf
sdm710-common: Build libprotobuf-cpp-lite-3.9.1-vendorcompat
Change-Id: I0aac742db9c2b4b3e48ee20158f19405863893c2
2023-11-21 19:33:05 +02:00
iusmac
b77a2922a2
sdm710-common: sepolicy: Address ueventd denials
W ueventd : type=1400 audit(0.0:9): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
W ueventd : type=1400 audit(0.0:6): avc: denied { getattr } for path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=2235 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:7): avc: denied { getattr } for path="/sys/kernel/debug/fault_around_bytes" dev="debugfs" ino=2234 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:8): avc: denied { getattr } for path="/sys/kernel/debug/sleep_time" dev="debugfs" ino=13337 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:9): avc: denied { getattr } for path="/sys/kernel/debug/suspend_stats" dev="debugfs" ino=13336 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:10): avc: denied { getattr } for path="/sys/kernel/debug/sched_features" dev="debugfs" ino=12438 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_sched_features:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/kernel/debug/msm_apr_debug" dev="debugfs" ino=13320 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0

Change-Id: I11ad4ebd0d2d290c5bc601309aad4509d8bd7bc1
Signed-off-by: iusmac <iusico.maxim@libero.it>
2023-11-21 19:31:01 +02:00
baunilla
96c04024e2
sdm710-common: sepolicy: ueventd: Address debugfs denials
avc:  denied  { open } for  pid=412 comm="ueventd" path="/sys/kernel/debug" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { read } for  pid=412 comm="ueventd" name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { relabelfrom } for  pid=412 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=17459 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/wakeup_sources" dev="debugfs" ino=1048 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_wakeup_sources:s0 tclass=file permissive=1

avc: denied  { relabelto } for  pid=411 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:qti_debugfs:s0 tclass=dir permissive=1
Change-Id: Id2f04cc9d65dcc5a47fd5f14379d2630736efc0e
Signed-off-by: NFS86 <jarbull86@gmail.com>
2023-11-14 21:45:43 +02:00
Alessandro Astone
907d7e8b6c
sdm710-common: Build and enable fastbootd mode
Change-Id: I7f4246f3f583dcae7b3bfc0d3ae1cf4d577632cb
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2023-11-12 10:42:15 +02:00
halibw
198d911563
sdm710-common: sepolicy: Allow init to relabelto logdump_partition
Change-Id: I8a3d2c1b0ae6163eb595310e779fa0e74c505da7
2023-11-12 10:37:06 +02:00
Davide Garberi
b0294cf40d
sdm710-common: Reserve size for system partition statically
* With the older flag the system space size was being chosen statically,
  this way only the reserved size for Gapps is static while the whole size
  is being dynamically chosen

Change-Id: Ib9a59ab429f725b2f571c8b1d74cec8bb6ab72dc
2023-11-02 11:30:27 +02:00
5d41efd453
sdm710-common: Drop KProfiles
This reverts commit f8e389999a.
2023-11-02 11:21:05 +02:00
Bruno Martins
a7bcd58d98
sm7325-common: Migrate to restructured sepolicy_vndr
The new folder structure now looks like this:

  device/qcom/sepolicy_vndr
  ├─ legacy-um (meant for sdm845 until sm8350)
  ├─ sm8450
  └─ sm8550

SEPolicy.mk placed in the root automatically redirects devices to the
proper subfolder.

Change-Id: I4ed1a06af779909d64172da294c4a99a3ae9ba0d
2023-11-02 11:21:05 +02:00
Adithya R
6654f22da7
sdm710-common: Switch to full IWLAN mode
[basamaryan: This is needed for Android U to fix RIL]

Signed-off-by: basamaryan <basam.aryan@gmail.com>
Change-Id: Ie3fa610f71077b4ee2af1b4d57bd0c30b34f30fa
2023-11-02 11:21:05 +02:00
COSMIC
f422cc4545
sdm710-common: Remove deleted hals from manifest *Fix: Unable to print HALs from new FCMs: no device HAL manifest. ERROR: No such device: No device manifest file from device or from update package
Co-Authored-by: COSMIC <rayavanindra@gmail.com>
2023-11-02 11:21:05 +02:00
Sakura桜
27ef678a6b
sdm710-common: Use AIDL WiFi service
Fix WiFi issue on Android U
2023-11-02 11:21:03 +02:00
giasen
549291d79f
sdm710-common: permissive selinux 2023-10-29 16:49:20 +02:00
TheStrechh
da66a65c9e
sdm710-common: fstab: add recovery label
* KeyError: '/recovery'
2023-10-29 14:57:50 +02:00
AmeChanRain
3f2c340233
sdm710-common: Drop BOARD_BUILD_SYSTEM_ROOT_IMAGE
* device/lenovo/sdm710-common/BoardConfig.mk:94: error: BOARD_BUILD_SYSTEM_ROOT_IMAGE is obsolete.

* Ref:
  05c0807f2f
2023-10-28 11:23:47 +03:00
bartcubbins
df268abe1a
sdm710-common: Provide android.frameworks.sensorservice@1.0 on vendor
F linker  : CANNOT LINK EXECUTABLE "/vendor/bin/mm-pp-dpps": library "android.frameworks.sensorservice@1.0.so" not found: needed by main executable
2023-10-28 11:17:15 +03:00
mvaisakh
ddbd3a0222
sdm710-common: Copy libprotobuf-cpp-full.so and libprotobuf-cpp-lite.so VNDK prebuilt blobs
* Also Build libprotobuf-cpp-lite-3.9.1-vendorcompat
2023-10-28 11:17:07 +03:00
giasen
945488d2a5
sdm710-common: Enable uncompressed apex 2023-10-28 11:16:54 +03:00
Demon000
63c205630e
sdm710-common: init: Add /boot to fstab
Build process errors out without this.

Traceback (most recent call last):
  File "build/make/tools/releasetools/ota_from_target_files", line 2455, in <module>
    main(sys.argv[1:])
  File "build/make/tools/releasetools/ota_from_target_files", line 2429, in main
    output_file=args[1])
  File "build/make/tools/releasetools/ota_from_target_files", line 1103, in WriteFullOTAPackage
    common.CheckSize(boot_img.data, "boot.img", target_info)
  File "/home/aicp-dev/rom/lineage-17.1/build/make/tools/releasetools/common.py", line 1190, in CheckSize
    p = info_dict["fstab"][mount_point]
KeyError: '/boot'

- also reformat and fix some fstab intendation

Change-Id: I30a396ea62e6e48420c0dd41533c156e90032929
2023-10-27 22:30:21 +03:00
Cyzi7777
e1cc9860f7
sdm710-common: Use fstab.qcom for TARGET_RECOVERY_FSTAB 2023-10-27 22:30:21 +03:00