pix106
0cdb83b716
Revert "sdm660-common: Enable TARGET_QTI_USB_SUPPORTS_AUDIO_ACCESSORY"
...
This reverts commit 57aed4aadb
.
Reference: e741d463e9
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
IMMANUEL44
0b3c1bb639
sdm660-common: Remove ro.build.selinux prop
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
Pig
cf62183a37
sdm660-common: Mark WifiOverlay as coreApp
...
Change-Id: I1f272c449823e52a68b7ef23577d2e950745f5f4
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
derfelot
db5bbd5642
sdm660-common: sepolicy: Allow vold to write mmcblk0 read_ahead_kb
...
avc: denied { write } for name="read_ahead_kb" dev="sysfs" ino=51203 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_mmc_host:s0 tclass=file permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
clarencelol
234a6cfeec
sdm660-common: sepolicy: Address more denials
...
* Fixed vibrate level in DeviceSettings
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
2021-11-13 11:31:51 +01:00
pix106
f475ccf892
sdm660-common: sepolicy: dontaudit netutils_wrapper sys_admin denials
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
d05ecaa812
sdm660-common: sepolicy: Address many sys_admin and kill denials
...
sdm660-common: sepolicy: Address qti_init_shell kill denial
avc: denied { kill } for comm="init.class_main" capability=5 scontext=u:r:qti_init_shell:s0 tcontext=u:r:qti_init_shell:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address hal_power_default kill and sys_admin denial
avc: denied { sys_admin } for comm="android.hardwar" capability=21 scontext=u:r:hal_power_default:s0 tcontext=u:r:hal_power_default:s0 tclass=capability permissive=0
avc: denied { kill } for comm="android.hardwar" capability=5 scontext=u:r:hal_power_default:s0 tcontext=u:r:hal_power_default:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address vdc sys_admin denial
avc: denied { sys_admin } for comm="vdc" capability=21 scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address vold_prepare_subdirs sys_admin denial
avc: denied { sys_admin } for comm="vold_prepare_su" capability=21 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address fsck sys_admin denial
avc: denied { sys_admin } for comm="e2fsck" capability=21 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
sdm660-common: sepolicy: address toolbox sys_admin, kill denial
avc: denied { sys_admin } for comm="mkswap" capability=21 scontext=u:r:toolbox:s0 tcontext=u:r:toolbox:s0 tclass=capability permissive=0
avc: denied { kill } for comm="mkswap" capability=5 scontext=u:r:toolbox:s0 tcontext=u:r:toolbox:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address ueventd kill and sys_admin denials
avc: denied { sys_admin } for pid=460 comm="ueventd" capability=21 scontext=u:r:ueventd:s0 tcontext=u:r:ueventd:s0 tclass=capability permissive=0
avc: denied { kill } for comm="ueventd" capability=5 scontext=u:r:ueventd:s0 tcontext=u:r:ueventd:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address irsc_util sys_admin denial
avc: denied { sys_admin } for comm="irsc_util" capability=21 scontext=u:r:irsc_util:s0 tcontext=u:r:irsc_util:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address rfs_access sys_admin denial
avc: denied { sys_admin } for comm="tftp_server" capability=21 scontext=u:r:rfs_access:s0 tcontext=u:r:rfs_access:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address rmt_storage sys_admin denial
avc: denied { sys_admin } for comm="rmt_storage" capability=21 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address vendor_pd_mapper sys_admin denial
sdm660-common: sepolicy: Address vendor_modprobe sys_admin denial
avc: denied { sys_admin } for comm="modprobe" capability=21 scontext=u:r:vendor_modprobe:s0 tcontext=u:r:vendor_modprobe:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address adbd sys_admin denial
avc: denied { sys_admin } for comm="adbd" capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address vendor_dpmd sys_admin denial
avc: denied { sys_admin } for comm="dpmd" capability=21 scontext=u:r:vendor_dpmd:s0 tcontext=u:r:vendor_dpmd:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address thermal-engine sys_admin denial
avc: denied { sys_admin } for comm="thermal-engine" capability=21 scontext=u:r:thermal-engine:s0 tcontext=u:r:thermal-engine:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address usbd sys_admin denial
avc: denied { sys_admin } for comm="usbd" capability=21 scontext=u:r:usbd:s0 tcontext=u:r:usbd:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address vendor_msm_irqbalanced sys_admin denial
avc: denied { sys_admin } for comm="msm_irqbalance" capability=21 scontext=u:r:vendor_msm_irqbalanced:s0 tcontext=u:r:vendor_msm_irqbalanced:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address hal_wifi_supplicant_default sys_admin denial
avc: denied { sys_admin } for comm="wpa_supplicant" capability=21 scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:hal_wifi_supplicant_default:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address boringssl_self_test sys_admin denial
avc: denied { sys_admin } for pid=460 comm="boringssl_self_" capability=21 scontext=u:r:boringssl_self_test:s0 tcontext=u:r:boringssl_self_test:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address vendor_boringssl_self_test sys_admin denial
avc: denied { sys_admin } for pid=462 comm="boringssl_self_" capability=21 scontext=u:r:vendor_boringssl_self_test:s0 tcontext=u:r:vendor_boringssl_self_test:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address linkerconfig sys_admin denial
avc: denied { sys_admin } for pid=459 comm="linkerconfig" capability=21 scontext=u:r:linkerconfig:s0 tcontext=u:r:linkerconfig:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address fsverity_init sys_admin denial
avc: denied { sys_admin } for comm="fsverity_init" capability=21 scontext=u:r:fsverity_init:s0 tcontext=u:r:fsverity_init:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address migrate_legacy_obb_data sys_admin denial
avc: denied { sys_admin } for comm="migrate_legacy_" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="rm" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="mkdir" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="touch" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="rm" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="rmdir" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="log" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address hvdcp sys_admin denial
avc: denied { sys_admin } for comm="hvdcp_opti" capability=21 scontext=u:r:hvdcp:s0 tcontext=u:r:hvdcp:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address netmgrd sys_admin denial
avc: denied { sys_admin } for comm="netmgrd" capability=21 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability permissive=0
sdm660-common: sepolicy: Address adbroot sys_admin denial
avc: denied { sys_admin } for comm="adb_root" capability=21 scontext=u:r:adbroot:s0 tcontext=u:r:adbroot:s0 tclass=capability permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
738dff294a
sdm660-common: sepolicy: Address many denials
...
sdm660-common: sepolicy: Address vendor_init persist_file read denial
avc: denied { read } for comm="init" name="persist" dev="mmcblk0p63" ino=47 scontext=u:r:vendor_init:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0
sdm660-common: sepolicy: Address tee persist_file read denial
avc: denied { read } for comm="qseecomd" name="persist" dev="mmcblk0p63" ino=47 scontext=u:r:tee:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0
sdm660-common: sepolicy: Address installd mnt_user_file denial
avc: denied { search } for comm="Binder:1018_6" name="0" dev="tmpfs" ino=5541 scontext=u:r:installd:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir permissive=0
sdm660-common: sepolicy: Address ssgtzd qipcrtr_socket denial
sdm660-common: sepolicy: Address platform_app denials
avc: denied { read } for comm="emui:screenshot" name="u:object_r:exported_audio_prop:s0" dev="tmpfs" ino=4254 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:exported_audio_prop:s0 tclass=file permissive=0 app=com.android.systemui
sdm660-common: sepolicy: Address init sysfs_graphics denial
avc: denied { read } for comm="init" name="device" dev="sysfs" ino=44569 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=lnk_file permissive=0
sdm660-common: sepolicy: Address system_app sysfs_graphics denials
avc: denied { write } for comm="settings.device" name="max_brightness" dev="sysfs" ino=44572 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
avc: denied { open } for comm="settings.device" path="/sys/devices/platform/soc/800f000.qcom,spmi/spmi-0/spmi0-03/800f000.qcom,spmi:qcom,pm660l@3:qcom,leds@d000/leds/red/max_brightness" dev="sysfs" ino=44572 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
sdm660-common: sepolicy: Address system_server sysfs_rtc denial
avc: denied { read } for comm="system_server" name="hctosys" dev="sysfs" ino=41512 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
sdm660-common: sepolicy: Address gmscore_app getattr denials
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/linkerconfig" dev="tmpfs" ino=3474 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:linkerconfig_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/persist" dev="mmcblk0p63" ino=47 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/init" dev="mmcblk0p63" ino=28 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:init_exec:s0 tclass=lnk_file permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/metadata" dev="mmcblk0p63" ino=32 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/postinstall" dev="mmcblk0p63" ino=48 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:postinstall_mnt_dir:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/vendor/firmware_mnt" dev="mmcblk0p58" ino=1 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:firmware_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/vendor/firmware" dev="mmcblk0p64" ino=1216 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:vendor_firmware_file:s0 tclass=dir permissive=0 app=com.google.android.gms
sdm660-common: sepolicy: Address vendor_mutualex create denial
avc: denied { create } for comm="mutualex" scontext=u:r:vendor_mutualex:s0 tcontext=u:r:vendor_mutualex:s0 tclass=qipcrtr_socket permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
ee3fa3b300
sdm660-common: sepolicy: Label sys.use_fifo_ui and address system_server vendor_video_prop denial
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
5499c4027c
sdm660-common: sepolicy: Label rild.libpath
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
eee54d6e20
sdm660-common: sepolicy: Label some camera props
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
58bbd5db55
sdm660-common: sepolicy: Label sysfs wakeup nodes
...
avc: denied { read } for comm="Binder:514_1" name="event_count" dev="sysfs" ino=53144 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="max_time_ms" dev="sysfs" ino=53149 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="wakeup_count" dev="sysfs" ino=53145 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="total_time_ms" dev="sysfs" ino=53148 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="expire_count" dev="sysfs" ino=53146 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="active_count" dev="sysfs" ino=53143 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="last_change_ms" dev="sysfs" ino=53150 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="prevent_suspend_time_ms" dev="sysfs" ino=53151 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="name" dev="sysfs" ino=53142 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
avc: denied { read } for comm="Binder:514_1" name="active_time_ms" dev="sysfs" ino=53147 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
5de9bdae50
Revert "sdm660-common: sepolicy: Adjust sepolicy for qti thermal"
...
This reverts commit 77c4792ac9
.
2021-11-13 11:31:51 +01:00
pix106
9d53e14cc8
sdm660-common: sepolicy: Remove netmgrd set_prop vendor_data_ko_prop
...
* No need after sepolicy update from LA.UM.9.2.1.r1-07200-sdm660.0
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
Anush02198
6d46319a55
sdm660-common: sepolicy: Remove some wakeup nodes
...
* As we have merged LA.UM.9.2.1.r1-07000-sdm660.0 sepolicy tag to source this is handeld by source
Signed-off-by: Anush02198 <Anush.4376@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
raiyanbinmohsin
d995aabb68
Revert "sdm660-common: Awaken-ify"
...
This reverts commit 635c08ae00
.
* also drop awaken ota sepolicy
2021-11-13 11:31:51 +01:00
Martin Štrobl
256827eaf3
sdm660-common: Flatten APEXes if updatable APEX is not present
...
* Should fix bootloops on ROMs which require APEX to boot, such as EvoX
* If APEX is being flattened, disable it manually as well since some ROMs have it enabled by default, even if we flatten it.
2021-11-13 11:31:51 +01:00
Ratoriku
e9c9caeaa3
sdm660-common: Update fstab flags from CAF
...
* Fixed screen lock issue when using fbe
Co-authored-by: Edwin Moquete <edwinmmoquete@gmail.com>
Signed-off-by: Ratoriku <a1063021545@gmail.com>
Signed-off-by: raiyanbinmohsin <raiyanbinmohsinshishir@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
pix106
0cd5504fe3
sdm660-common: props: remove duplicated drm property
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
OdSazib
082d62dc00
sdm660-common: prop: Disable blur by default
...
- We can enable from settings if we need them
- Forcing blur is just waste of power as it uses EXPENSIVE_RENDERING
This reduces power consumtion and fixes heating issue on sdm660
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
35d819fd51
sdm660-common: Conditionally build IR HIDL
...
Change-Id: I7ebde1c32e2a64c867b7ae26c3aa254432386df2
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
bc7afa0f64
sdm660-common: Import IR HALs
...
Change-Id: Iffd8855f0971997792cb9b0d6db818772c339e24
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
47b8b542c7
sdm660-common: ir: Wire up lirc/spi logic
...
* Before loading the HAL, make sure the device exists
Change-Id: Ice2a1322ef8d7a3a7d7371a3bdd86547dec20bf1
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
fa7fa65ffb
sdm660-common: ir: Rebrand to Xiaomi SDM660
...
Change-Id: I20146c0bc065a460f5a86455ed9a21abce5f9417
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
834610b11c
sdm660-common: ir: Add VINTF fragment
...
Change-Id: I56bd82e77cbde3efc9b038ed2bc3857d119bf090
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
7111774653
sdm660-common: ir: Binderize
...
Change-Id: Ib704750a56eec2e26440bdfee92976776db58812
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
d6907ddb9f
sdm660-common: ir: Move to LOG(*)
...
Change-Id: I7a278b5b9618d3235162a07516dff11ee94e378a
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
0a9a8cbd6a
sdm660-common: ir: Cleanup Android.bp
...
Change-Id: I40e31540144053513e6ed82f51aa5f2655eb710a
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
4f46345273
sdm660-common: ir: Move to SPDX license identifier
...
Change-Id: I686c4356d0bc3d732a8266f6d3c610356e51512b
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
cae26732df
sdm660-common: Import default IR HIDL
...
* From LineageOS/android_hardware_interfaces@1ee53cf
Change-Id: I7116f4becb57e684396ef1e6608f9c760ab82459
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
ddc790ae22
sdm660-common: Use only full qualified name for manifest entries
...
* As recommended by Google for multiple different versions of the same HAL in VINTF manifests
* https://android.googlesource.com/platform/hardware/interfaces/+/master/drm/1.1/README.md#devices-launching-with-android-pie
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: Ie94e1440f7de66502ad2532565ae8d3dd831d1a4
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
93220327e6
sdm660-common: Regen manifest
...
* make vendor_manifest.xml
Change-Id: Ida66af588dc2d66c6cc6f62b573f05e7dd8ba600
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-11-13 11:31:51 +01:00
clarencelol
b0dede4ba6
sdm660-common: power-libperfmgr: Update powerhint
...
* Re-adjust scaling frequency
* Set both "Flipendo" freq to 1401600
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: I4e89982ca17fbceada830a55958d1db7806787f7
2021-11-13 11:31:51 +01:00
Edwin Moquete
d3e2fdbd1e
sdm660-common: Enable vendor ril service
...
Change-Id: I0f0cf1ed92888ed96198ef15bf4d832e0ff561d4
2021-11-13 11:31:51 +01:00
OdSazib
21cbe5db93
sdm660-common: props: Rearrange ril properties
...
- disable iorap as it does nothing
Change-Id: I78b4cc1bda325f141b3fa33897e57c6bbd6ce34f
2021-11-13 11:31:51 +01:00
Felix
b6b1280f80
sdm660-common: biometrics: Add interface info to .rc file
...
Signed-off-by: Felix <google@ix5.org>
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: Iff089dcf6c17a673441d85c70bb7472fbbe85f0c
2021-11-13 11:31:51 +01:00
Bruno Martins
e0bee0605f
sdm660-common: biometrics: Include VINTF fragment
...
Change-Id: Id57a4aa9b6e8c3f44bdf0c7a2dd97cf81b252180
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
3605a9c720
sdm660-common: Move to SPDX license identifier
...
Change-Id: If335a7b83289edf4759d0195a8b065c8dac6631b
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
79b7a9bb81
sdm660-common: Drop MMS user agent overlays
...
* Current profile URL points to a 404 page
Change-Id: I2e06cfbb4611e6dc7892141b5bde186e73014db8
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
1607c907dd
sdm660-common: libhidl: Move to Android.bp
...
Change-Id: Ia046de0c051aa7533d602714c7d882a079973808
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
2ba4aa0b65
sdm660-common: Stop building android.hardware.broadcastradio HIDL impl
...
* Nothing uses it and it isn't even in manifest
Change-Id: I989f68d98f9dbddff0cb151599a4b60e819105d1
2021-11-13 11:31:51 +01:00
Sebastiano Barezzi
caaa0bef4e
sdm660-common: Kill console parameters
...
Change-Id: I7e959d2bdfd6a29961a6fab739a4b112fd2daf9b
2021-11-13 11:31:51 +01:00
ghostrider-reborn
79c64bc007
sdm660-common: Introduce kernelspace battery saver
...
* Needs Kernel side support
* This activates kernelspace battery saver via powerhal whenever
battery saver is enabled in userspace, thereby lowering power
consumption at kernel-level by disabling boosts and such
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Change-Id: I2623503db27d7518de519bcaa3f5af6ab83879d0
2021-11-13 11:31:49 +01:00
clarencelol
efd182dee0
sdm660-common: Switch back to exfat
...
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Change-Id: I926a2300e8aee2b2dc09da9774b2c62c87432f0f
2021-08-12 02:25:42 +06:00
Jorim Jaggi
2945e8b98d
sdm660-common: Disable sdm rotator downscaler
...
Rotator down scaler is causing additional delays that are better
handled by GL composition.
Test: Open app, no jank
Bug: 73640835
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Change-Id: I48ab330b9de0f0567c66544050158dea338c5904
2021-08-12 02:25:37 +06:00
OdSazib
a81f0b99a0
sdm660-common: DeviceSettings: Update notification LED path for K4.19
...
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: I063a776c16dffadf73d7f12f97995f6fad85d57c
2021-07-22 13:21:25 +06:00
OdSazib
b8c814713d
sdm660-common: DeviceSettings: Add earpiece gain
...
- Requires kernel support
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: If28b4dff421cbba5f17cd2ccfab02f2aa616a9f8
2021-07-22 13:21:03 +06:00
fakeyatogod
a36ecc3c98
sdm660-common: Update some radio and telephony blobs from LA.UM.9.6.2.r1-04100-89xx.0
...
- These blobs fixed career video calling and Vilte
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-07-16 16:36:12 +06:00
OdSazib
5351cc35f9
sdm66-common: sepolicy: Fix labeling sysfs nodes for K4.19
...
- Address more denials and label some new nodes
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-07-16 15:56:07 +06:00
StyloGey
4ec9f92ace
sdm660-common: Update RIL from AOSPA
...
- update radio from LA.UM.9.12.r1-10800-SMxx50.0
- update telephony from qcom-common-AOSPA
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-07-15 17:00:40 +06:00