Commit graph

1024 commits

Author SHA1 Message Date
Randall Huang
20869d2170
sdm710-common: fstab: data=journal,commit=1 for /metadata
Since Ext4 doesn't implement "-o sync", it commits metadata at every 5 secs.
This may cause /metadata corruption.

Bug: 162883014
Change-Id: Icd38754bad1b1529d01165ea8c703c214d20bb4b
2023-11-21 20:10:25 +02:00
johnmart19
e4fb9c52d3
sdm710-common: Build android.hardware.media.omx
android.hardware.media.omx@1.0-service: Service not available yet

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: popoA3M <pratyayaborborah@gmail.com>
2023-11-21 20:08:01 +02:00
b2a12a6340
sdm710-common: Update fstab, change logdump path 2023-11-21 20:03:48 +02:00
jonerlin
81e3fa278b
sdm710-common: Address avc denials while vendor_init access vendor_bluetooth_prop
* avc:  denied  { set } for  scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_bluetooth_prop:s0 tclass=property_service
* avc:  denied  { set } for  scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_bluetooth_prop:s0 tclass=property_service

Bug: 131149718
Test: Boot up and Turn On/Off Bluetooth
Change-Id: Ifd6bf0a35eafc2513901783b35deed45eed9dac6
2023-11-21 20:00:48 +02:00
Aflaungos
c7fb8c20d2
sdm710-common: sepolicy: Add SELinux policy for flags_health_check
flags_health_ch: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:ab_update_gki_prop:s0 dev=tmpfs ino=14631 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>
2023-11-21 19:57:23 +02:00
Nippon
17e45ddf64
sdm710-common: sepolicy: Label more graphics nodes 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon3/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon2/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon1/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon0/name not found
Signed-off-by: Cykeek <Cykeek@proton.me>
2023-11-21 19:52:12 +02:00
ShevT
a4b84e2a40
sdm710-common: sepolicy: Fix avc denials related to vdc
At reboot:
avc:  denied  { kill } for  comm="vdc" capability=5  scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0

Change-Id: Id9387c43d48192d138370aad2033c5ebb61e2b35
2023-11-21 19:42:55 +02:00
ShevT
791b9834e0
sdm710-common: sepolicy: Fix avc denials related to debugfs_tracing_debug
Change-Id: I07967e3ad7d2b0ebedd2bf2f5b2727c935b67119
2023-11-21 19:42:21 +02:00
ShevT
0a16af1ebf
sdm710-common: sepolicy: Fix avc denials related to fsck
avc:  denied  { kill } for  comm="fsck.f2fs" capability=5  scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0

Change-Id: I8bb2548b6635a58d2bebf0a5f1994188bcf9e3be
2023-11-21 19:40:50 +02:00
LuK1337
52286472cf
sdm710-common: Build libprotobuf-cpp-lite-3.9.1-vendorcompat
Change-Id: I0aac742db9c2b4b3e48ee20158f19405863893c2
2023-11-21 19:33:05 +02:00
iusmac
b77a2922a2
sdm710-common: sepolicy: Address ueventd denials
W ueventd : type=1400 audit(0.0:9): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
W ueventd : type=1400 audit(0.0:6): avc: denied { getattr } for path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=2235 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:7): avc: denied { getattr } for path="/sys/kernel/debug/fault_around_bytes" dev="debugfs" ino=2234 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:8): avc: denied { getattr } for path="/sys/kernel/debug/sleep_time" dev="debugfs" ino=13337 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:9): avc: denied { getattr } for path="/sys/kernel/debug/suspend_stats" dev="debugfs" ino=13336 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:10): avc: denied { getattr } for path="/sys/kernel/debug/sched_features" dev="debugfs" ino=12438 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_sched_features:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/kernel/debug/msm_apr_debug" dev="debugfs" ino=13320 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0

Change-Id: I11ad4ebd0d2d290c5bc601309aad4509d8bd7bc1
Signed-off-by: iusmac <iusico.maxim@libero.it>
2023-11-21 19:31:01 +02:00
baunilla
96c04024e2
sdm710-common: sepolicy: ueventd: Address debugfs denials
avc:  denied  { open } for  pid=412 comm="ueventd" path="/sys/kernel/debug" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { read } for  pid=412 comm="ueventd" name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { relabelfrom } for  pid=412 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=17459 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/wakeup_sources" dev="debugfs" ino=1048 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_wakeup_sources:s0 tclass=file permissive=1

avc: denied  { relabelto } for  pid=411 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:qti_debugfs:s0 tclass=dir permissive=1
Change-Id: Id2f04cc9d65dcc5a47fd5f14379d2630736efc0e
Signed-off-by: NFS86 <jarbull86@gmail.com>
2023-11-14 21:45:43 +02:00
Alessandro Astone
907d7e8b6c
sdm710-common: Build and enable fastbootd mode
Change-Id: I7f4246f3f583dcae7b3bfc0d3ae1cf4d577632cb
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2023-11-12 10:42:15 +02:00
halibw
198d911563
sdm710-common: sepolicy: Allow init to relabelto logdump_partition
Change-Id: I8a3d2c1b0ae6163eb595310e779fa0e74c505da7
2023-11-12 10:37:06 +02:00
Davide Garberi
b0294cf40d
sdm710-common: Reserve size for system partition statically
* With the older flag the system space size was being chosen statically,
  this way only the reserved size for Gapps is static while the whole size
  is being dynamically chosen

Change-Id: Ib9a59ab429f725b2f571c8b1d74cec8bb6ab72dc
2023-11-02 11:30:27 +02:00
5d41efd453
sdm710-common: Drop KProfiles
This reverts commit f8e389999a.
2023-11-02 11:21:05 +02:00
Bruno Martins
a7bcd58d98
sm7325-common: Migrate to restructured sepolicy_vndr
The new folder structure now looks like this:

  device/qcom/sepolicy_vndr
  ├─ legacy-um (meant for sdm845 until sm8350)
  ├─ sm8450
  └─ sm8550

SEPolicy.mk placed in the root automatically redirects devices to the
proper subfolder.

Change-Id: I4ed1a06af779909d64172da294c4a99a3ae9ba0d
2023-11-02 11:21:05 +02:00
Adithya R
6654f22da7
sdm710-common: Switch to full IWLAN mode
[basamaryan: This is needed for Android U to fix RIL]

Signed-off-by: basamaryan <basam.aryan@gmail.com>
Change-Id: Ie3fa610f71077b4ee2af1b4d57bd0c30b34f30fa
2023-11-02 11:21:05 +02:00
COSMIC
f422cc4545
sdm710-common: Remove deleted hals from manifest *Fix: Unable to print HALs from new FCMs: no device HAL manifest. ERROR: No such device: No device manifest file from device or from update package
Co-Authored-by: COSMIC <rayavanindra@gmail.com>
2023-11-02 11:21:05 +02:00
Sakura桜
27ef678a6b
sdm710-common: Use AIDL WiFi service
Fix WiFi issue on Android U
2023-11-02 11:21:03 +02:00
giasen
549291d79f
sdm710-common: permissive selinux 2023-10-29 16:49:20 +02:00
TheStrechh
da66a65c9e
sdm710-common: fstab: add recovery label
* KeyError: '/recovery'
2023-10-29 14:57:50 +02:00
AmeChanRain
3f2c340233
sdm710-common: Drop BOARD_BUILD_SYSTEM_ROOT_IMAGE
* device/lenovo/sdm710-common/BoardConfig.mk:94: error: BOARD_BUILD_SYSTEM_ROOT_IMAGE is obsolete.

* Ref:
  05c0807f2f
2023-10-28 11:23:47 +03:00
bartcubbins
df268abe1a
sdm710-common: Provide android.frameworks.sensorservice@1.0 on vendor
F linker  : CANNOT LINK EXECUTABLE "/vendor/bin/mm-pp-dpps": library "android.frameworks.sensorservice@1.0.so" not found: needed by main executable
2023-10-28 11:17:15 +03:00
mvaisakh
ddbd3a0222
sdm710-common: Copy libprotobuf-cpp-full.so and libprotobuf-cpp-lite.so VNDK prebuilt blobs
* Also Build libprotobuf-cpp-lite-3.9.1-vendorcompat
2023-10-28 11:17:07 +03:00
giasen
945488d2a5
sdm710-common: Enable uncompressed apex 2023-10-28 11:16:54 +03:00
Demon000
63c205630e
sdm710-common: init: Add /boot to fstab
Build process errors out without this.

Traceback (most recent call last):
  File "build/make/tools/releasetools/ota_from_target_files", line 2455, in <module>
    main(sys.argv[1:])
  File "build/make/tools/releasetools/ota_from_target_files", line 2429, in main
    output_file=args[1])
  File "build/make/tools/releasetools/ota_from_target_files", line 1103, in WriteFullOTAPackage
    common.CheckSize(boot_img.data, "boot.img", target_info)
  File "/home/aicp-dev/rom/lineage-17.1/build/make/tools/releasetools/common.py", line 1190, in CheckSize
    p = info_dict["fstab"][mount_point]
KeyError: '/boot'

- also reformat and fix some fstab intendation

Change-Id: I30a396ea62e6e48420c0dd41533c156e90032929
2023-10-27 22:30:21 +03:00
Cyzi7777
e1cc9860f7
sdm710-common: Use fstab.qcom for TARGET_RECOVERY_FSTAB 2023-10-27 22:30:21 +03:00
Chenyang Zhong
30efc06094
sdm710-common: Move super_dummy build to Android.mk
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2023-10-27 22:30:21 +03:00
me-cafebabe
29f1905334
sdm710-common: Use logdump as metadata partition and mount at the first stage
* logdump seems to be only contain factory logs which is of 2017 and useless for us.
* It's required for DSU
2023-10-27 22:30:21 +03:00
Sarthak Roy
deca8b38a0
sdm710-common: We dont build System as root in Retrofit Dynamic partitions
* build/make/core/config.mk:902: error: BOARD_BUILD_SYSTEM_ROOT_IMAGE cannot be true for devices with dynamic partitions.
2023-10-27 22:30:20 +03:00
P-Salik
860fcdd319
sdm710-common: AndroidBoard: Fix image paths
Signed-off-by: P-Salik <peersalik16@gmail.com>
2023-10-27 22:30:20 +03:00
Tim Zimmermann
59eb184cd4
sdm710-common: Flash dummy super image if needed
* Needed because stock does not use dynamic partitions so
  there's no existing metadata that could be used

Change-Id: Icbc828389465f3d4681ca8e4c3adec782540752e
2023-10-27 22:30:20 +03:00
Roker2
05959f652a
Revert "sdm710-common: releasetools: Fix on incremental updates"
This reverts commit 01254bd847.
2023-10-27 22:30:20 +03:00
me-cafebabe
ef2362021f
sdm710-common: Add system_ext product odm partitions 2023-10-27 22:30:20 +03:00
me-cafebabe
2a7017fc7a
sdm710-common: Specify a non-existent dt directory to avoid using dt fstab 2023-10-27 22:30:20 +03:00
me-cafebabe
ade32dd8dd
sdm710-common: Setup Retrofit Dynamic Partitions 2023-10-27 22:30:18 +03:00
Mathieu Chartier
97763d6310
sdm710-common: Always preopt extracted APKs 2023-10-12 19:01:31 +03:00
Nem1xx
7bd37cdae4
sdm710-common: Set correct TARGET_TAP_TO_WAKE_NODE path 2023-10-12 18:57:22 +03:00
Dakkshesh
f5a3af4e1e
sdm710-common: Grand extra permissions to cellboardcast reciver module
* This fixed:

07-03 16:06:56.231  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c98b797 2313:com.android.systemui/u0a149} (pid=2313, uid=10149) requires android.permission.ACCESS_FINE_LOCATION due to sender android (uid 1001)
07-03 16:06:56.231  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.android.cellbroadcastreceiver.module/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires android.permission.READ_PHONE_STATE due to sender android (uid 1001)
07-03 16:06:56.232  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c98b797 2313:com.android.systemui/u0a149} (pid=2313, uid=10149) requires android.permission.ACCESS_FINE_LOCATION due to sender android (uid 1001)
07-03 16:06:56.233  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.android.cellbroadcastreceiver.module/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires android.permission.ACCESS_FINE_LOCATION due to sender android (uid 1001)
07-03 16:06:56.233  1788  2760 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcastMultiplePermissions:1272 android.content.Context.sendBroadcastMultiplePermissions:2272 com.android.server.TelephonyRegistry.broadcastServiceStateChanged:3096 com.android.server.TelephonyRegistry.notifyServiceStateForPhoneId:1616 com.android.internal.telephony.ITelephonyRegistry$Stub.onTransact:492
07-03 16:06:56.233  1788  2760 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcastMultiplePermissions:1272 android.content.Context.sendBroadcastMultiplePermissions:2272 com.android.server.TelephonyRegistry.broadcastServiceStateChanged:3100 com.android.server.TelephonyRegistry.notifyServiceStateForPhoneId:1616 com.android.internal.telephony.ITelephonyRegistry$Stub.onTransact:492
07-03 16:06:56.234  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.android.cellbroadcastreceiver.module/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires android.permission.READ_PHONE_STATE due to sender android (uid 1001)
07-03 16:06:56.235  1788  1981 W BroadcastQueue: Appop Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c98b797 2313:com.android.systemui/u0a149} (pid=2313, uid=10149) excludes appop android:read_phone_state due to sender android (uid 1001)

Signed-off-by: EndCredits <endcredits@crepuscular-aosp.icu>
Signed-off-by: Dakkshesh <dakkshesh5@gmail.com>
2023-10-11 18:25:42 +03:00
--no-edit=Hemant Sachdeva
493734f9b0
sdm710-common: configs: Allow Phone app to READ_PHONE_STATE
* W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.google.android.cellbroadcastreceiver/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires due to sender android (uid 1001) * W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c7b3bd5 2639:com.android.phone/1001} (pid=2639, uid=1001) requires due to sender android (uid 1001)

Signed-off-by: romgharti <romgharti@gmail.com>
2023-10-11 18:25:24 +03:00
Mudit200408
44971233da
sdm710-common: Enable fastcharge config 2023-10-07 21:39:07 +03:00
Adithya R
fee8733f29
sdm710-common: Disable ART debug and optimize dexpreopt
* don't include debug configs in art
 * use everything filter for dexpreopt (AOSPA/android_vendor_pa@ab5061c)
 * use non-debug dex2oat

Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: Jabiyeff <cebiyevanar@gmail.com>
2023-10-07 21:32:07 +03:00
Noah
5814309579
sdm710-common: Build Aperture camera
Signed-off-by: Noah113-Allen <kingfighter2958@gmail.com>
2023-10-07 21:28:55 +03:00
Mayur
2682cc4543
sdm710-common: props: Add sf threshold next vsync from Pixel Google implemented this in source and in Pixels as well since Q. Improves smoothness a little bit.
Signed-off-by: Mayur <ultramayur123@gmail.com>
Signed-off-by: Noah113-Allen <kingfighter2958@gmail.com>
2023-10-07 21:24:07 +03:00
Adithya R
4dd1fed383
sdm710-common: Compile HWUI for better performance
Signed-off-by: Adithya R <gh0strider.2k18.reborn@gmail.com>
Signed-off-by: Noah113-Allen <kingfighter2958@gmail.com>
2023-10-07 21:20:37 +03:00
CrisBal
d4b624fda4
sdm710-common: Build aidl power stats and label it
* Fix for aidl power stats errors.
* New updated legacy-um sepolicy solved the android.hardware.power@1.0::IPower/default error
- Now with this we fixing both errors:
BatteryStatsService: Unable to load Power Hal or power.stats HAL
hwservicemanager: getTransport: Cannot find entry android.hardware.power.stats@1.0::IPowerStats/default in either framework or device manifest.
hwservicemanager: getTransport: Cannot find entry android.hardware.power@1.0::IPower/default in either framework or device manifest.
2023-09-23 17:30:27 +03:00
ghostrider-reborn
ad52c6db78
sdm710-common: device: Optimize ART
* Disable ART debug and optimize dexpreopt
* Disable dexpreopt minidebuginfo
ghostrider-reborn <adithya.r02@outlook.com>
2023-08-15 13:31:52 +03:00
Michael Bestas
28095d1e8a
sdm710-common: ueventd: Remove all permissions from /sys/devices/soc0/serial_number
Change-Id: I688347cfe59f56e4de2e4bf3c3324ca465f7a897
2023-08-15 13:26:52 +03:00
Nolen Johnson
8343044e5d
sdm710-common: Uprev manifests/FCM level
Change-Id: Ia878d488a1e90ec08e562369cb1e1c73a43c2988
2023-08-15 13:22:13 +03:00