Qseecom needs to start at earlier stage for FBE to work properly.
* Wait for prop moved to device as we have still oreo qseecom devices with different prop name
Change-Id: Ie2408f652df291ad6a1b0dee1e4d559ff35c7c45
Signed-off-by: Ramandeep Trehan <rtrehan@codeaurora.org>
This change makes 90DB (interfaces: diag,dun,rmnet,dpl,qdss,adb)
as default usb composition on bengal.
Change-Id: If83a356219f802e8960c7d341296f3a7b3641e68
CDSP subsytem uses rpmsg to send CPU L3 clock requests via cdspl3
governor. Use cdspl3 as the governor for CDSP L3 devfreq node for
serving CDSP L3 clock requests.
Change-Id: I49ad421811affa82458abd34d0a0851e1f1fc423
Adding cases for sdmshrike to enable clocks
for APPS Power collapse.
Change-Id: I089556c1098d60022bdb3de1ec2024858f0d3b30
Signed-off-by: Nitesh Kataria <nkataria@codeaurora.org>
/dev/wigig_sensing is the entry point to an SPI kernel driver which is a
part of a remote sensing solution using 60GHz HW.
Change-Id: I1b538e0c58ae784997407f91a7647c2188ee7d58
0x9020 composition includes DIAG + ADB + DUN + NMEA. Add support
for the same.
Change-Id: I364d4e87b63d7e5dfb394db6e92e650764b7cc96
Signed-off-by: Ajay Agarwal <ajaya@codeaurora.org>
The interface line in hostapd_fst is the same as the
default hostapd service and this can cause the lazy
HAL mechanism to start hostapd_fst instead of the
default hostapd, causing various errors.
This change only fixes the errors with default hostapd
operation. In order to fix FST feature with hostapd_fst,
additional changes are needed such as making it use
the default hostapd service and adding sepolicy rules
to support it.
Change-Id: I133336b1ae18fa823969f240b3e4376989fbf017
/dev_sp_nvm is used by sp_iar_lib to store CMAC values for spu
firmware and application
Change-Id: I2ac5f29b66448a526cdbc6a1ccefd5f80066c170
Signed-off-by: Li Li <liil1@codeaurora.org>
/vendor/firmware_mnt/verinfo/ver_info.txt ownership
is now system,system. Hence need to add system group
for init.class_main.sh
Change-Id: I9c759c22aca7a8c5bc04908748f26916025c7b07
CRs-Fixed: 2534121
Configfs triggers will now be in the core
init.recovery.rc, similar to main system
files.
Test: Usb works in recovery
Bug: 78793464
Change-Id: I26a403425edce1d4947daf2510e28beb026ba5f6
As per treble rules, this is no longer allowed from within
vendor init. At the same time these folders are long deprecated,
so drop them and get rid of the SELinux denials.
Change-Id: I47d25bcf92dcc16b7b112b7b1257cd3e66fee57b
msm_irqbalancer was not starting for many targets. Call to start
irqbalancer was not getting initiated. Fix this by making a
call to start msm_irqbalancer.
Change-Id: I4fbdef032100c91dba7bdb48a3562c5f9ab38e4d
Add iuicc0 and iuicc1 devices that can be opened
by spdaemon to create iuicc0 and iuicc1 channels
respectively and interact with iuicc0 and iuicc1
applications respectively on the Secure Processor.
Change-Id: I2554616073553065416756e23c3e27f2f9c90021
On high RAM targets, due to more anonymous memory availability,
we can improve headroom by increasing ZRAM swap size,
especially under memory pressure, and during background app compact.
Also ZRAM swap size is logical and is used when needed and
shouldn't cause other side effects.
Change-Id: I11949b8bdf16e9b4b8abb1bd633ffa1a1c0b1ad6
-IMS service is no longer using /data/shared path.
-remove unused /data/shared path access.
CRs-Fixed: 2526160
Change-Id: I072d0b922a48880d45f7c85ac3569b2cec3d7250
add wakelock group and BLOCK_SuSPEND capabilities to vendor.sensors
to acess wake-lock sysfs nodes
Change-Id: I193836d097f15f5bfbe1645909ae70f3f870f972
Allows earlier interaction lock release by polling on display updates to
stop happening (becomes idle) for a programmable amount of time.
Bug: 62110101
Test: Ran UiBench, didn't see regressions
susbset of tests - avg-jank:
testInflatingListViewFling: 0.09
testTrivialListViewFling: 0.15
Change-Id: I83c0fc75a3d7ca5bf76910ebbaeddb69343a7ee2
CPU BW is set to 200Mhz in QC MTP, since on Pixel, we also adjust CPU BW
in touch PowerHint, we can relax the setting to 100Mhz.
Bug: 69271302
Test: boot
Change-Id: Iead3634d9c6fb0b3edc24ab0a19d62157a6a1793
Unclear if advantages are worth cumulative power draw.
bug 73364974
Test: boot taimen, memlat is powersave
Change-Id: I7b5eb176d0f22281e687b9577f5eedf311fb4a11
All this does is to disable msm_core and set the
polling_interval to 0, which makes the driver useless.
We can achieve the same result by disabling the driver.
Change-Id: Ic19c505ed74811a3d1b76703255af3aa5cb37bf9
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
Signed-off-by: Subhajeet Muhuri <kenny3fcb@gmail.com>
Make charger binary run as system instead of root. Since it
needs to handle input key events, add input as a supplemental
group in addition to system and graphics.
Change-Id: Id1dc46f335087147b7d8cf674664c26f0b511de1
Add move_wifi_data service from /data/misc/wifi to
/data/vendor/wifi for OTA update.
Change-Id: I134fb663d1f358028eebb80106634d6eb0b87bc0
CRs-Fixed: 2270608
In ueventd support has been added to read firmware path from
vendor.It wil parse /vendor/firmware_mnt/image information
and add in look up path/search path for loading firmware.
Change uid of /venodr/firmware_mnt back to system as kernel
firmware loading is removed. Previouly to support kernel firmware
loading root permissions were required.
Change-Id: I560ed75ee07626094acbc879b615190cf3a9faa3
CarrierSwitch use a new solution from P or later. the new solution
switch carrier by a standalone apk instead of modifing the init.rc
code in old solution.
So, Remove init.rc changes for old carrier switch solution.
Change-Id: I2da9861d71bc73df1b19066d2fad0dd3f4dedb3e
CRs-Fixed: 2377064
VtsTrebleSysProp test cases fail if the
sys.mtp.device_type is unset. Set the property to
value 2 so that the device appears as a phone on the
host PC.
Change-Id: I1123ca808cf027d6d787c58f58133b6ce67af4de
Signed-off-by: PainKiller3 <ninadpatil100@gmail.com>
Grant capabilities and change file permissions to allow the sensors.qcom
daemon to start up as the system user/group, rather than running as
root.
Fixes: 63775281
Test: monitor logcat after reboot, confirm no file open errors. Run
QSensorTest, confirm all sensors provide sane data. Confirm that
IMU calibration can read + write its saved settings. Run sensors CTS.
Change-Id: Ib80ea21900d6af6cd34c82c4a63f50c7e0ac18ff
Move persist entry to fstab and mount at /mnt/vendor/persist
Apply required user, group and permissions once persist
folder is created through __mount and parititon is mounted.
Run restorecon on /mnt/vendor/persist.
Change-Id: I20a16f3669bc7abf9844525c6ba0db1521a5a8e2
core_ctl's enable & disable nodes are differnt on different
kernel versions. Fix Disabling of core_ctl for msm8917.
CRs-Fixed: 2366575
Change-Id: Ide7fc5384b34e9e686fe686f9fd70aaaaffcc278
Currently if targets support ESOC there would almost certainly
only be a single instance of an external modem. Hence we can
simplify the esoc_link check accordingly without needing to do
a loop and grep. Choosing the external modem composition simply
depends on whether esoc_name is present.
Change-Id: Ib47e34fd31c3745a0c7b3568968f6f36681c98e7
Those values seem off. CAF maybe messed them up as those values look possibly wrong.
Those values are used as powerhint values on pixel 2 and 3.
Signed-off-by: Dusan Uveric <dusan.uveric9@gmail.com>
* No matter how hard QC tried to improve these features, they still suffer
from stability issues, mainly due to the unpredictable nature of vmpressure
they rely on.
Change-Id: Icd14c79298a3c268abffa06ed17a79dececf423a
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
This has been deprecated for some time and will throw and
error in Android Q
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
Change-Id: I9e4caaa6f401a051e5edd341112dcc01c8f040b7
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
* Restart HIDL camera provider to cover some edge cases where camera isn't
working on FDE devices with boot pin enabled.
Change-Id: Ia757e9d07de26008f426fca582439d68b6d6fecb
Signed-off-by: Albert I <krascgq@outlook.co.id>
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
* For some reason, booting with headphones plugged in results
in a broken speaker output if FDE secure boot is enabled.
* Restarting audio HAL after decryption seems to resolve the issue.
Change-Id: Ie14b89841bf811f0fb09edb0a04fd28aafecde87
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
Increasing the tcp_rmem is not sufficient to achieve higher rates
for TCP downlink as all sockets in the system are still bounded
by the core socket rmem_max.
CRs-Fixed: 2351198
Change-Id: I198457745a9e48f0098457e86e7d9523c6249cbd
- all vendor init services should be prefixed
with vendor
- radio.atfwd.start -> vendor.radio.atfwd.start
persist.radio.atfwd.start -> persist.vendor.radio.atfwd.start
This property is now qualified as a platform property and is not
whitelisted. Therefore it must be renamed to continue to be
used as a trigger.
Change-Id: Iebb0eed75f7ac6f71085ac12cf2a3e7414defb09
CRs-Fixed: 2223094
As per sepolicy, add vendor prefix to specific properties.
i.e, persist.vendor.sys.ssr.enable_debug,
persist.vendor.sys.mba_boot_timeout,
persist.vendor.sys.modem_auth_timeout,
persist.vendor.sys.pil_proxy_timeout.
Change-Id: Ibeb87194e2ca9b831fc5e721a87764920c21276d
To support end-to-end DRM content playback with SG List feature,
android.hardware.drm@1.0-service needs to have access permission
to /dev/qce to map & unmap ION buffer virtual address with HW Crypto
Engine. So, set /dev/qce device permission 0660 and let it be
accessible by user "system" and group "drmrpc".
Change-Id: If9c0ed70acc2bb063344692374f51441fe84eff6
Creating new directory as persist Bluetooth addr
location is changed from /persist/bluetooth to
mnt/vendor/persist/bluetooth.
Change-Id: Idb30dcd9d0af5f9271955e4c7eeff0bd9afe80ad
CRs-Fixed: 2324749
On android P, vendor persist folder is in /mnt/vendor/persist/.
Change time persist foler to /mnt/vendor/persist/time.
Change-Id: I325dfa2ed336d9ae0a2b5850ec3683db205a513c
* starting rtpd on bootup without waiting for DATA_DAEMON
prop and restarting when property is set
Change-Id: If121089334ef2c0b335320bb561a553163042ba3
Starting imsrcsd on bootup without waiting for DATAD property
which will load libimsrcsbaseimpl and register HAL services
Change-Id: I17c1891583ea99baa31efec0e8ba316e4fbf25f3
hvdcp_opti daemon stores some parameters in
/mnt/vendor/persist/hvdcp_opti directory. Create the directory.
Change-Id: I0cf17467792cc294e6ce1a7f35a356cc0e960e86
Start loc_launcher as gps user and set uid/gid of loc_launcher
to gps and enable SETUID and SETGID caps for loc_launcher, so
that we can start loc_launcher as gps user instead of root and
still have capabilities for SETUID and SETGID. Also remove not
required permissions groups for loc_launcher.
Change-Id: Ie9f1506874b3c3148f9170c8d5db9afd1e70025c
CRs-Fixed: 2192881
To support ODL to read data from QDSS, create a custom group
and set permission of byte-cntr device. And also set
permission to coresight-tmc-etr/block_size to enable
byte-cntr feature.
Change-Id: Ic80156667dd7511392d5970ddcbd0fdc43ffffca
Signed-off-by: Saranya Chidura <schidura@codeaurora.org>
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
c78a463e87
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
* To prevent property name collisions between properties of system and
vendor, 'vendor.' prefix must be added to a vendor HAL service name.
You can see the details in go/treble-sysprop-compatibility documents.
Test: succeeded building and tested on a sailfish device.
Bug: 36796459
Change-Id: I48e6ee0ae3fe401e39efb273256d991fac676357
Treble compliance.
Bug: 70228425
Bug: 70393317
Test: complete wifi test in b/70393317
Test: Test wifi on Taimen and Sailfish
Test: verify sockets exist in /data/vendor/wifi/wpa/sockets
Change-Id: I0bfc3a351419f0a03498e79664949f353369bf1b
-dpmQmiMgr permissions are updated with radio group
to communicate with QMUXD socket.
CRs-Fixed: 2183993
Change-Id: I37195ffc6602d009ac4cace6c742484e70a768ec
Issue: cameraserver or camera-provider service is not able to
write pid's to cpuset/camera-daemon.
Solution:
1) Increased the cpu to 0-7
2) Moved camera-daemon folder creation from on-boot to on-init.
CRs-fixed:2200628
Change-Id: Ifc80c09ae09b353b3c8a0603f14e5ff4206d6796
File based logging is writing to sdcard, this is not supported.
By default qxdm is required, removing the file based logging.
Change-Id: I7fa1748c0ff3eb594dc7d4c59eb69c0ae9ef7756
This will let the wifi hal run as "wifi" user and not need root
permissions to access this path for firmware reloads.
Bug: 33435250
Test: Compiles.
Change-Id: I84a38cea5e0f729147c3191c3485a3738d7838ef
power_off_alarm is a vendor service. Add vendor prefix to it.
Change-Id: Ib4a988467a54bbe4544960180afeeeb5dd0e85f3
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
* This script doesn't do anything useful, since it tries to set a lot of
ro.* properties, which is not allowed anyway.
Change-Id: I408cc17d0d18e81a9cf0e529e6b78622c3017a7f
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
Removed NFC data directory creation to fix
vendor_init access denial issue.
NFC data directoty is already being created
by system core init.rc.
Change-Id: I7ebb88dc7b2df988a8af477baa81fe9253030ffb
To support end-to-end DRM content playback with SG List feature,
android.hardware.drm@1.0-service needs to have access permission
to /dev/qce to map & unmap ION buffer virtual address with HW Crypto
Engine. So, set /dev/qce device permission 0660 and let it be
accessible by user "system" and group "drmrpc".
Change-Id: If9c0ed70acc2bb063344692374f51441fe84eff6
* starting rtpd on bootup without waiting for DATA_DAEMON
prop and restarting when property is set
Change-Id: If121089334ef2c0b335320bb561a553163042ba3
Starting imsrcsd on bootup without waiting for DATAD property
which will load libimsrcsbaseimpl and register HAL services
Change-Id: I17c1891583ea99baa31efec0e8ba316e4fbf25f3
hvdcp_opti daemon stores some parameters in
/mnt/vendor/persist/hvdcp_opti directory. Create the directory.
Change-Id: I0cf17467792cc294e6ce1a7f35a356cc0e960e86
Change fstab to mount dsp and firmware to /vendor/dsp and
/vendor/firmware_mnt.
Add classpath for firmware loading /vendor/firmware_mnt/image in
kernel command line.
Change-Id: I2dd2e7ea6334fb979ad8ff8c755648748de93ab4
Start loc_launcher as gps user and set uid/gid of loc_launcher
to gps and enable SETUID and SETGID caps for loc_launcher, so
that we can start loc_launcher as gps user instead of root and
still have capabilities for SETUID and SETGID. Also remove not
required permissions groups for loc_launcher.
Change-Id: Ie9f1506874b3c3148f9170c8d5db9afd1e70025c
CRs-Fixed: 2192881
To support ODL to read data from QDSS, create a custom group
and set permission of byte-cntr device. And also set
permission to coresight-tmc-etr/block_size to enable
byte-cntr feature.
Change-Id: Ic80156667dd7511392d5970ddcbd0fdc43ffffca
Signed-off-by: Saranya Chidura <schidura@codeaurora.org>
Changing permission for IOP from 0770 to 0700. This is to restrict the
access for iop database file.
Change-Id: Ic3325595521d4e433d0ce9bada564fc599cf858c
Move persist entry to fstab and mount at /mnt/vendor/persist
Apply required user, group and permissions once persist
folder is created through __mount and parititon is mounted.
Run restorecon on /mnt/vendor/persist.
Change-Id: I20a16f3669bc7abf9844525c6ba0db1521a5a8e2
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
c78a463e87
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
* To prevent property name collisions between properties of system and
vendor, 'vendor.' prefix must be added to a vendor HAL service name.
You can see the details in go/treble-sysprop-compatibility documents.
Test: succeeded building and tested on a sailfish device.
Bug: 36796459
Change-Id: I48e6ee0ae3fe401e39efb273256d991fac676357
Wpa_supplicant's random pool is not necessary on Android. Randomness
is already provided by the entropymixer service which ensures
sufficient entropy is maintained across reboots. Commit b410eb1913
'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with
that entropy before either wpa_supplicant or hostapd are run.
Bug: 34980020
Test: Use wifi and wifi tethering on 8996 targets
Change-Id: Ib5caf362bc939911b357db186a274957d3fbf186
(cherry picked from commit 1f2b2f3a780bb7a6ed489bf86e18e77382f37514)
Framework will now add interface to supplicant (via HIDL) when it
needs to control an interface, so don't specify them in the startup
params.
Bug: 69426063
Test: Device boots up and able to connect to wifi.
Change-Id: I817d28093f8b982e3806c212babd888c0f5eb7c0
Treble compliance.
Bug: 70228425
Bug: 70393317
Test: complete wifi test in b/70393317
Test: Test wifi on Taimen and Sailfish
Test: verify sockets exist in /data/vendor/wifi/wpa/sockets
Change-Id: I0bfc3a351419f0a03498e79664949f353369bf1b
* Mounting /system and /vendor partitions is handled in kernel now,
however removing the entries from fstab caused issues building
the OTA. The workaround was to have a separate fstab, but turns out
that simply setting the recoveryonly flag does the trick because
those are then ignored during a normal Android boot.
Change-Id: I2944384d0a1c41bc9f9f51e2e29daff2bed0a0f4