aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* Move android.hardware.gnss@1.0-service-qti.rc to vendorSzuWei Lin2018-04-22
| | | | | | | | | The .rc file should be on the vendor image, or can not boot with generic system image. Bug: 63051055 Test: Boot with GSI to home screen Change-Id: I1e2ebe5d23a6cf5a4176ee33613ef621b4b558cf
* Don't rely on transitively included headersJiyong Park2018-04-22
| | | | | | | | | | | | One must explicitly include what it need. time.h for struct tm. sys/time.h for gettimeofday, etc. Bug: 37629934 Test: build Merged-In: Iacd5317d958f61df062fca40fbf2e8992c7fbb44 Change-Id: I19e1043f23dbe85836b73714a4f1440159ebe419
* Build libgps.utils with VNDK.Steven Moreland2018-04-22
| | | | | | Test: m -j BOARD_VNDK_VERSION=current libgps.utils Bug: 37342627 Change-Id: Ifcd9344245cf689d4075d34b89faa689647b8b0b
* msm8996-common: Drop TARGET_CONTINUOUS_SPLASH_ENABLED.Cosme Domínguez Díaz2018-04-22
| | | | * No references were found in system, framework or hardware.
* msm8996-common: Drop TARGET_USES_NEW_ION_API flagCosme Domínguez Díaz2018-04-22
| | | | * Deprecated
* msm8996-common: Enable ALAC_OFFLOAD and BOARD_SUPPORTS_SOUND_TRIGGER flags.Cosme Domínguez Díaz2018-04-22
|
* msm8996-common: Fixed crash due to an SELinux denial when disabling root in adb.Cosme Domínguez Díaz2018-04-16
| | | | * avc: denied { set } for property=service.adb.root pid=1892 uid=1000 gid=1000 scontext=u:r:system_app:s0 tcontext=u:object_r:shell_prop:s0 tclass=property_service permissive=1
* msm8996-common: Fix priv_app SELinux denials:Cosme Domínguez Díaz2018-04-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
* msm8996-common: Enable persist.radio.sw_mbn_update.Cosme Domínguez Díaz2018-04-15
| | | | | | | | | | | | * Stock has this: # enable mbn file update for SIMTrigger #[Begin][ZUKMT-162] Enable mbn update #persist.radio.sw_mbn_update=0 #persist.radio.hw_mbn_update=0 persist.radio.sw_mbn_update=1 persist.radio.hw_mbn_update=1 #[End][ZUKMT-162] Enable mbn update
* msm8996-common: create qcacld firmware symlinks.Cosme Domínguez Díaz2018-04-15
|
* msm8996-common: Add init.qcom.sh.Cosme Domínguez Díaz2018-04-15
| | | | * And I was wondering why I couldn't find it anywhere... ಠ_ಠ
* seploicy: don't audit module_requestWei Wang2018-04-15
| | | | | | | | | | address denials such as: avc: denied { module_request } for pid=1 comm="init" kmod="crypto-cts(cbc(aes-ce))-all" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0 which caused by b/35930111 Bug: 36056446 Test: no denials Change-Id: I2a1fd14a0225a79526f77228bddd299434f075f3
* msm8996-common: Fix several SELinux denials with firmware loading.Cosme Domínguez Díaz2018-04-15
| | | | * The rules came from marlin's sepolicy.
* msm8996-common: create slpi firmware symlinks.Cosme Domínguez Díaz2018-04-15
|
* msm8996-common: create cpe_9335 firmware symlinks.Cosme Domínguez Díaz2018-04-15
|
* msm8996: create mdtp firmware linkscodeworkx2018-04-15
|
* msm8996: create adsp firmware linkscodeworkx2018-04-15
| | | | Change-Id: I8fd3e9ef5c97f87b2688b607d983b4b540481b46
* msm8996-common: Fix ims symlinks.Cosme Domínguez Díaz2018-04-15
| | | | * ims apk is now in /system.
* msm8996-common: add slpi symlinksDan Pasanen2018-04-14
| | | | Change-Id: I2fd8a24c29089a92b842aeb2cea564fcca137134
* msm8996-common: Regenerate compatibility_matrix.xmlCosme Domínguez Díaz2018-04-13
| | | | | | | | | | * ./out/host/linux-x86/bin/assemble_vintf -m -i system/libhidl/manifest.xml \ -o device/zuk/msm8996-common/compatibility_matrix.xml * Manual edit: - Remove comments - Remove vndk entries - Set optional="false"
* Revert "msm8996-common: Symlink system/framework/qti-telephony-common.jar to ↵Cosme Domínguez Díaz2018-04-13
| | | | | | vendor/framework/qti-telephony-common.jar" This reverts commit 68bfbbc68600f14d7339dfe1ceeb7aa836c70107.
* msm8996-common: Remove context for /factory.Cosme Domínguez Díaz2018-04-13
|
* rootdir: fstab: Use the right label for our vendor partition.Cosme Domínguez Díaz2018-04-12
| | | | | | | | | | | | | | * We renamed 'factory' as 'vendor' on our partition table: z2_row: sgdisk_static --change-name=9:vendor /dev/block/sda z2_plus: sgdisk_static --change-name=46:vendor /dev/block/mmcblk0 Note that partition number for z2_plus may not be the same if you came from Indian's stock or from Chinese's stock. Check first the output of 'ls -l /dev/block/bootdevice/by-name/factory' * Thanks to @cryscript for the idea and his work for z2_plus.
* msm8996-common: proprietary-files.txt: Update hash of ↵Cosme Domínguez Díaz2018-04-10
| | | | | | libmmcamera2_sensor_modules.so. * The blob changed after the upgrade to ZUI 3.5.344.
* Revert move all to vendor.Cosme Domínguez Díaz2018-04-10
| | | | * Better to go step by step avoiding breaking things... ;-)
* msm8996-common: Remove legacy lights HAL flagBruno Martins2018-04-10
| | | | | | | * The flag is no longer needed, since the new native binderized lights HAL is being built in place of the legacy one. Change-Id: I7dd516d0ac73152082983766b29289479be62af0
* msm8996-common: Drop useless CNE related flagBruno Martins2018-04-10
| | | | | | * Nothing in the OSS bits takes it into account. Change-Id: I6f949a12c643810cb1fba764bf13abb30e5dd88c
* msm8996-common: Symlink system/framework/qti-telephony-common.jar to ↵davidevinavil2018-04-09
| | | | vendor/framework/qti-telephony-common.jar
* msm8996-common: Back to stock's netmgrd.Cosme Domínguez Díaz2018-04-09
|
* netmgrd: use netutils_wrappersSandeep Patil2018-04-09
| | | | | | | | | | Add required permissions for netmgrd to use the new netutils wrappers Bug: 36463595 Test: boot sailfish, test LTE, wifi, wifi calling and phone calls work Change-Id: I5894ee2659f97fce4f4f2b16c54c10f42484b454 Signed-off-by: Sandeep Patil <sspatil@google.com>
* msm8996-common: Update bluetooth, gatekeeper, drm, qsee, keystoreCosme Domínguez Díaz2018-04-08
| | | | | | and peripheral manager blobs. * from marlin OPM2.171019.029 release.
* msm8996-common: Doze: Minor code simplification and clean upBruno Martins2018-04-08
| | | | Change-Id: Idff05f2626138c96dccd3ab4c26c4df1be40a606
* [ims-rcs]: Added wake_alarm capabiltiyDevi Sandeep Endluri V V2018-04-08
| | | | | | | - imsrcsd starts alarm timers hence needs WAKE_ALARM capability. Change-Id: I0e72998bab6b17ca6222e5a931d26275fa784e97
* msm8996-common: Add imsrcsd to config.fs.Cosme Domínguez Díaz2018-04-08
|
* config.fs: Add AID_RFS and AID_RFS_SHARED to config.fsAnkit Jain2018-04-08
| | | | Change-Id: I23adbffbe22ff622d0a6fb82290380d86c29d0e4
* msm8996-common: rootdir: /system/vendor/bin/dpmQmiMgr -> /vendor/bin/dpmQmiMgr.Cosme Domínguez Díaz2018-04-08
|
* RILD: Remove copying of QCRIL DB from vendor partitionRavi Kishore R2018-04-08
| | | | | | | | Remove this redundant mechanism of copying DB. QCRIL Daemon already takes care of the copying at runtime Change-Id: I2213c2a8a1c9717c92f3cf5e7873c0ee9e65da35
* msm8996-common: rootdir: Restore init.qcom.sh.Cosme Domínguez Díaz2018-04-08
| | | | | * Imported from ZUI 3.5.315 removing everything that is not useful for our msm8996.
* light service: mark as shutdown criticalSteven Moreland2018-04-08
| | | | | | | | | | | | | | | | | Required because the lights need to be turned off late in boot (e.x. during fsck for disk health), and before, blank_screen accessing light encountered a race condition where if it didn't get scheduled before all of the processes which were getting shutdown were getting killed, the screen wouldn't blank. Bug: 74976325 Test: adjusting brightness continues to work Test: screen blanks during shutdown at the correct time including when an artificial 5s delay is inserted when the phone normally fscks (which can also be quick) Change-Id: I57ebc11d7ecf57ee327c681455712f4b53de6fd3 Merged-In: I57ebc11d7ecf57ee327c681455712f4b53de6fd3
* msm8996-common: Unpin Vulkan blob.Cosme Domínguez Díaz2018-04-08
| | | | | * Believe it or not, we have a more recent build than op3 for these blobs.
* msm8996: Update perf and graphics stacks from LA.UM.6.5.r1-06700-8x96.0Rashed Abdel-Tawab2018-04-08
|
* msm8996-common: time_daemon: use /persist to store offset to RTCEvilHowl2018-04-07
| | | | | Change-Id: Ieaa9c9308a4004eeb92027b71999359ea47e5fd8 Signed-off-by: Wei Wang <wvw@google.com>
* msm8996: Build HVX neuralnetworks HALRashed Abdel-Tawab2018-04-07
| | | | Change-Id: I6dfc2f82393f23e3f11bc813057c9446985d1968
* msm8996-common: sepolicy: Fix more denials found with GSI (Phh-Treble v15).Cosme Domínguez Díaz2018-04-07
|
* msm8996-common: Move Qualcomm configs and permissions to vendor.Cosme Domínguez Díaz2018-04-07
| | | | * And fix the path of android.hardware.audio.pro.xml.
* msm8996-common: sepolicy: Add context for our vendor partition.Cosme Domínguez Díaz2018-04-07
|
* msm8996-common: proprietary-files.txt: Update hash of ↵Cosme Domínguez Díaz2018-04-07
| | | | | | libmmcamera2_sensor_modules.so. * The blob changed after the upgrade to ZUI 3.5.315.
* msm8996-common: Patch libcne.so to load vendor/bin/cnddavidevinavil2018-04-07
|
* msm8996-common: Fix radio SELinux denials.Cosme Domínguez Díaz2018-04-01
| | | | | | | * avc: denied { read } for pid=2288 comm=m.android.phone name=libimsmedia_jni.so dev=sda9 ino=1103 scontext=u:r:radio:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1 * avc: denied { open } for pid=2288 comm=m.android.phone path=/vendor/lib64/libimsmedia_jni.so dev=sda9 ino=1103 scontext=u:r:radio:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1 * avc: denied { getattr } for pid=2288 comm=m.android.phone path=/vendor/lib64/libimsmedia_jni.so dev=sda9 ino=1103 scontext=u:r:radio:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1 * avc: denied { execute } for pid=2288 comm=m.android.phone path=/vendor/lib64/libimsmedia_jni.so dev=sda9 ino=1103 scontext=u:r:radio:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
* msm8996-common: proprietary-files.txt: Move all to vendor.Cosme Domínguez Díaz2018-03-31
| | | | | | * And edit the xml permission files to use /vendor/framework instead of /system/framework. * As I said on the previous commit, we have to pin the linked blobs.