Commit graph

322 commits

Author SHA1 Message Date
Michael W
15f38f5521 msm8226-common: wifi: Enable 2.4GHz channel bonding
* Improve WiFi speed

Change-Id: I06501a8d01d8a802fe5dd7a6c9edfa96c51afbce
2019-10-16 12:32:04 +02:00
Bruce Levy
a10c93e70b msm8226-common: init: Mark rmt_storage as shutdown critical
rmt_storage should not be automatically killed by Android during shutdown
since it is needed to actually process the peripheral shutdown
2019-10-16 12:32:04 +02:00
Sahitya Tummala
b6a27cf7a5 msm8226-common: init: Set ioprio for rmt_storage service
Earlier, this used to be set from rmt_storage service with
sys_admin capability. But now, that capability is dropped
off and hence, set it here in init scripts.

Change-Id: Ie8a3895c2b63da35d78fb9e571d74b735c969520
2019-10-16 12:32:04 +02:00
cb
4e61f543da msm8226-common: Lower audioflinger standby delay to reduce power consumption 2019-10-16 12:32:04 +02:00
D. Andrei Măceș
2540653e36 msm8226-common: init: Modify time_daemon to allow settimeofday() fallback
The legacy time_daemon binary relied on the old Android alarm dri-
ver for setting RTC at bootup. Once /dev/alarm support was removed
we found that time cannot be restored properly, unless a data con-
nection was available for NTP sync.

However, the blob already has a fallback mechanism that relies on
settimeofday(), except that it could never work properly. While
time_daemon is started under UID/GID of root, it immediately drops
to system/net_raw, which is required for subsequent socket commu-
ications (e.g., QMI, modem, etc).

The issue was that any UID transition from root triggers the remo-
val of all thread capabilities, including CAP_SYS_TIME, required
for settimeofday() or other RTC adjustments. Thus, time_daemon was
edited to skip the internal set[gu]id() calls altoghether, in order
to use the new capabilities mechanism introduced with Oreo init.

Change-Id: I8a0e220b724234c26b99a09b7f54af7996129d67
Signed-off-by: D. Andrei Măceș <andrei@unlegacy-android.org>
Signed-off-by: RenanQueiroz <queirozrrq@gmail.com>
2019-10-16 12:32:04 +02:00
Sevenrock
f6a6217861 msm8226-common: Set TARGET_KEYMASTER_SKIP_WAITING_FOR_QSEE
Needed after
https://review.lineageos.org/c/LineageOS/android_hardware_qcom_keymaster/+/224951

Change-Id: Ic1bc2ac43e00b90f82ee2f77bb066b5e0029bf66
2019-10-16 12:32:04 +02:00
sb6596
3243b69821 msm8226-common: Add seclabel to hciattach service
Change-Id: I4942c3203e67fa02ba3f93cd2a26f74e11b41753
2019-10-16 12:32:04 +02:00
Ben Romberger
f59cb37284 msm8226-common: init.qcom.rc: Updated audio calibration delta file path
Audio calibration delta files folder created at
/data/misc/audio/acdbdata/delta.
Path changed to provide access to media server.
Added /data/audio/acdbdata/delta path also
for backward compatibility

Change-Id: I53031d1aecd3f12a15d76db417d7a8eafd80cf8b
2019-10-16 12:32:04 +02:00
Ashish Kumar Dhanotiya
821469b3c8 msm8226-common: wlan: Disable fatal logging
Fatal logging feature is not applicable for LA.BR.1.2.9, disable
this feature from ini.

Change-Id: I4188900c1823a5efe466687cd7362ab369c1b4d6
CRs-Fixed: 2044606
2019-10-16 12:32:04 +02:00
Francescodario Cuzzocrea
7a69c9070c HACK: msm8226-common: sensors: make it compile on P 2019-10-16 12:32:04 +02:00
Han Wang
d83b999e4a msm8226-common: Remove creation of /data/misc/wifi and /data/misc/dhcp
* The creation of /data/misc/wifi and /data/misc/dhcp was moved long ago
  to the core init.rc script. Moreover, /data/misc/wifi is deprecated
  since wpa_supplicant now relies on /data/vendor/wifi.

Change-Id: Ic0a33af44ffe163d3dd06cebdc1e192dc9bcb11f
2019-10-16 12:32:04 +02:00
Wang Han
e388f8ce4b msm8226-common: ueventd: Don't modify permissions of /dev/hw_random
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:

W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)

AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.

c78a463e87

Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
2019-10-16 12:32:04 +02:00
Steve Kondik
279742f66e msm8226-common: Increase heap start size to 16m to minimize GC with larger bitmaps
Change-Id: I89af5e94c9aafdc6007c84d3fce60e4db349e967
2019-10-16 12:32:04 +02:00
Francescodario Cuzzocrea
c749d17efe msm8226-common: Configure the p2p_search_delay to 100 msec 2019-10-16 12:32:04 +02:00
Glen Kuhne
4810c16e5b msm8226-common: Add p2p_no_group_iface=1 to p2p_supplicant_overlay
Configures wpa_supplicant to use p2p0 mgmt iface instead of dynamically
created p2p-p2p0-XYZ virtual interfaces for P2P group.

Bug: 65524423
Test: CtsVerifier WifiDirect
Test: Manual verification
Change-Id: I70582f114ab69684424aac41fbeb78fa7cc04847
Merged-In: Id9add59aa122adb7f39c80252061a8f5d3cc55cd
2019-10-16 12:32:04 +02:00
Roshan Pius
e05da8434e msm8226-common: wpa_supplicant(hidl): Add support for starting HAL lazily
Bug: 72394251
Test: Able to start supplicant from framework using
ISupplicant.getService()
Change-Id: I19b8434e7241b9028e7dc86316ec9d5512affcca
2019-10-16 12:32:04 +02:00
Roshan Pius
53358075ee msm8226-common: Don't start supplicant with interfaces
Framework will now add interface to supplicant (via HIDL) when it
needs to control an interface, so don't specify them in the startup
params.

Bug: 69426063
Test: Device boots up and able to connect to wifi.
Change-Id: I817d28093f8b982e3806c212babd888c0f5eb7c0
2019-10-16 12:32:04 +02:00
Jeff Vander Stoep
f8d387d38b msm8226-common: wpa_supplicant: Move control sockets to /data/vendor
Treble compliance.

Bug: 70228425
Bug: 70393317
Test: complete wifi test in b/70393317
Test: verify sockets exist in /data/vendor/wifi/wpa/sockets

Change-Id: I0bfc3a351419f0a03498e79664949f353369bf1b
2019-10-16 12:32:04 +02:00
Jeff Vander Stoep
49f4349027 msm8226-common: wifi_supplicant: deprecate entropy.bin
Wpa_supplicant's random pool is not necessary on Android. Randomness
is already provided by the entropymixer service which ensures
sufficient entropy is maintained across reboots. Commit b410eb1913
'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with
that entropy before either wpa_supplicant or hostapd are run.

Bug: 34980020
Test: Use wifi and wifi tethering on 8974 targets
Change-Id: Iaa2a8a42e4e3fd941c5be0f8fa691245cdb429e9
2019-10-16 12:32:04 +02:00
Jeff Johnson
bd514559fd msm8226-common: wlan: Update supplicant services for new calling sequence
Change-Id: I9a2b5b2c27c8fd0e7b13e78cf02985c1c19db1b6
2019-10-16 12:32:04 +02:00
Michael Bestas
187c23c689 msm8226-common: Move wpa_supplicant overlays to vendor
Change-Id: I42e8994585615c15fb069166a79b86488e8acb25
2019-10-16 12:32:04 +02:00
Nolen Johnson
be0042899e msm8226-common: Set TARGET_RECOVERY_DEVICE_DIRS
* In the previous commit, I failed to note that TWRP
  also needs the AIO property set, so append local path
  to TARGET_RECOVERY_DEVICE_DIRS to make both Lineage
  Recovery and TWRP happy.

Change-Id: Ie1d8dfa252dad02787544a73e9d4ee1d44d30dbf
2019-10-16 12:32:04 +02:00
Nolen Johnson
dd6fece29d msm8226-common: Set sys.usb.ffs.aio_compat in recovery as well
Change-Id: I36d76f74ceae3029f49c3cb564cd876bbb6b5b81
2019-10-16 12:32:04 +02:00
jrior001
3400a74693 msm8226-common: Disable network scan via TelephonyManager
Change-Id: I07ac2eee478d6edbc266447ef3209403a14285f1
2019-10-16 12:32:04 +02:00
LuK1337
89e473a368 msm8226-common: hal_lineage_livedisplay_default -> hal_lineage_livedisplay_sysfs
Change-Id: If8954290c41913b7453a1cba4d67f7a63d08d2dd
2019-10-16 12:32:04 +02:00
maxwen
a3f6581489 msm8226-common: Update overlay to hide sRGB toggle
* Now expected as an array in Settings package

Change-Id: I92a56abb0fc1379e4482d1889d04d8db6a14ea2b
2019-10-16 12:32:04 +02:00
dianlujitao
35700b0003 msm8226-common: Hide sRGB toggle in developer options
* This is only available on Nexus/Pixel devices and we don't even
   support such color space.

Change-Id: I8343e4986d7dd8413bd8d36dfad0309a4c08026e
2019-10-16 12:32:04 +02:00
Kevin F. Haggerty
1e8bba9944 msm8226-common: Build Samsung LiveDisplay service
Change-Id: I74d38aa0df3179bb00b942135e8ff055aa8a5658
2019-10-16 12:32:04 +02:00
Paul Keith
805d4f1785 msm8226-common: Build vendor.lineage.touch HAL from hardware/samsung
Change-Id: I6eca1e9875cb5793a3a45c6e77bc201946ebd897
2019-10-16 12:32:04 +02:00
Bruno Martins
549cb6f5fb msm8226-common: Enable B-services aging propagation
Change-Id: I4ac0525933bb421f7d025c5e4c6a1de0f083c46e
2019-10-16 12:32:04 +02:00
Michael Bestas
d87fe4a395 msm8226-common: add health HAL
Change-Id: Ib934ab27f49bd27ba0285db505d2b5fa198522ef
2019-10-16 12:32:04 +02:00
elektroschmock
483811c628 msm8226-common: manifest: Add OMX media HAL
Change-Id: Iebb280cc1a3f456662a1f4a0a8e95d2a3099b397
2019-10-16 12:32:04 +02:00
Paras Nagda
1c70bf2baf msm8226-common: manifest: Add CAS HAL
Change-Id: I3d26b3c8c57425d2ee596f8efecaa2722b39551c
2019-10-16 12:32:04 +02:00
Ethan Chen
718accfed1 msm8226-common: Drop custom display flags
* TARGET_USES_OVERLAY and USE_OPENGL_RENDERER are largely deprecated
* Don't set triple buffering, it introduces latency
* Don't use custom VSYNC offsets

Change-Id: If2892c83726c3558a96b28a8404f49982ebb9ba0
[haggertk: Only triple offset aspect of this change is relevant to
 this device family]
2019-10-16 12:31:17 +02:00
Kevin F. Haggerty
417dc63a46 msm8226-common: sepolicy: Adapt to global sepolicy merges
* Several items merged globally caused duplicate definition of paths
  that were previously labeled here.

This reverts commit 27afbf1dc6.
This reverts commit 7fb5a8c6cb.
This partially reverts commit bb196ad94b.
This partially reverts commit c39a735ab5.

Change-Id: I901e5aa78058e1a465f110cde31fb7d76eaf3d51
2019-10-16 12:30:58 +02:00
Bruno Martins
d80cb2505f msm8226-common: Allow media UID process to access CameraServiceProxy
* This fixes the following error on camera-in-mediaserver devices:

   E CameraService_proxy: Calling UID: 1013 doesn't match expected  camera service UID!

Change-Id: I185e34e8983b286436bfc0fe36cfdf260ef78170
2019-10-16 12:30:58 +02:00
Kevin F. Haggerty
84ae63a3cb msm8226-common: sepolicy: Eliminate qemu_hw_mainkeys_prop entries
* Specific definition of this is dropped from qcom/sepolicy-legacy

Change-Id: I429abf7dddd2de4443349366b932149f30b87206
2019-10-16 12:30:58 +02:00
Kevin F. Haggerty
a5d5045f45 msm8226-common: sepolicy: Clean up
* Group policy statements better
* Nuke unneeded allows

Change-Id: Ibc1fd4debe8c95005a6dd54e1428d6365248bd80
2019-10-16 12:30:55 +02:00
Kevin F. Haggerty
8c265a347e msm8226-common: sepolicy: Resolve init denials
* avc: denied { write } for name="enable_adaptive_lmk" dev="sysfs"
  ino=6724 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=file permissive=1
* avc: denied { open } for name="enable_adaptive_lmk" dev="sysfs"
  ino=6724 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=file
  permissive=1
* avc: denied { setattr } for name="firmware_path" dev="sysfs"
  ino=6423 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_wifi_writeable:s0 tclass=file
  permissive=1
* avc: denied { write } for name="l2" dev="sysfs" ino=29063
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_power:s0
  tclass=file permissive=1
* avc: denied { open } for name="l2" dev="sysfs" ino=29063
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_power:s0
  tclass=file permissive=1
* avc: denied { write } for name="enabled" dev="sysfs" ino=29716
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_thermal:s0
  tclass=file permissive=1
* avc: denied { write } for name="online" dev="sysfs" ino=5871
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0
  tclass=file permissive=1
* avc: denied { write } for name="boost_ms" dev="sysfs" ino=6652
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_cpu_boost:s0
  tclass=file permissive=1
* avc: denied { open } for name="boost_ms" dev="sysfs" ino=6652
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_cpu_boost:s0
  tclass=file permissive=1
* avc: denied { setattr } for name="min_pwrlevel" dev="sysfs"
  ino=19546 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_kgsl:s0
  tclass=file permissive=0
* avc: denied { setattr } for name="enabled" dev="sysfs" ino=23417
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_hal_pwr:s0
  tclass=file permissive=1
* avc: denied { setattr } for name="rear_camfw" dev="sysfs" ino=24404
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_camera:s0
  tclass=file permissive=1
* avc: denied { check_context } for scontext=u:r:init:s0
  tcontext=u:object_r:kernel:s0 tclass=security permissive=0

Change-Id: Id7f78abedea2209f84527b1b83259574d06a0900
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
db9de76b54 msm8226-common: sepolicy: Label sysfs_usb_storage_gadget, resolve denials
* avc: denied { setattr } for name="file" dev="sysfs" ino=23591
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_usb_storage_gadget:s0
  tclass=file permissive=1

Change-Id: Ia96e3634cbe1a85bb7da3f24ecfa3fbaaa55baad
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
7bdcdf733e msm8226-common: sepolicy: Label sysfs_usb_otg, resolve denials
* avc: denied { setattr } for name="booster" dev="sysfs" ino=23129
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_usb_otg:s0
  tclass=file permissive=1

Change-Id: Iffb33bd7647026107473fb63e82d942ad027f9f9
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
2a303c3bbc msm8226-common: sepolicy: Broaden sysfs_bluetooth_writable, resolve denials
Change-Id: Iff3645e36ece2126f3697bb0389394415be16529
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
8a2f7414d2 msm8226-common: sepolicy: Label sysfs_msmuart_file, resolve denials
* avc: denied { setattr } for name="clock" dev="sysfs" ino=18914
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msmuart_file:s0
  tclass=file permissive=1

Change-Id: Iaf5fe6791344dcf419242599eb6c9272c61cd707
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
d290aaa200 msm8226-common: sepolicy: Label sysfs_mmc_host, resolve denials
* avc: denied { write } for name="control" dev="sysfs" ino=25383
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mmc_host:s0
  tclass=file permissive=1
* avc: denied { open } for name="control" dev="sysfs" ino=25383
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mmc_host:s0
  tclass=file permissive=1

Change-Id: I876d025db9cf1fe67faeccca830ffd53dbf92904
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
695a6ac727 msm8226-common: sepolicy: Label sysfs_socinfo, resolve denials
* avc: denied { setattr } for name="soc_iddq" dev="sysfs" ino=5543
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_socinfo:s0 tclass=file
  permissive=0

Change-Id: Ife248a9cccea19b09b931525606cf4c34344fd9f
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
7973254314 msm8226-common: sepolicy: Label additional sysfs_io_sched_tuneable node
Change-Id: I2b416123c7d925443df20f518cb2a0bd02935229
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
3be1e28b19 msm8226-common: sepolicy: Resolve additional sensors HAL denials
* avc: denied { search } for name="sec-thermistor" dev="sysfs"
  ino=5485 scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=dir permissive=0

Change-Id: I4d77e87b2662bca081cc5b934161347fed6a157d
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
c75b3abe8d msm8226-common: sepolicy: Label sysfs_sensors, resolve denials
* avc: denied { read } for name="ssp_sensor" dev="sysfs" ino=27809
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sensors:s0
  tclass=lnk_file permissive=1
* avc: denied { setattr } for name="temperature" dev="sysfs" ino=10861
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sensors:s0
  tclass=file permissive=0

Change-Id: I2e4a436704ed019af153da880d7becbde4b0ab11
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
5bc5db2267 msm8226-common: sepolicy: Label sysfs_msm_perf, resolve denials
* avc: denied { write } for name="suspend_enabled" dev="sysfs"
  ino=10567 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_perf:s0
  tclass=file permissive=1
* avc: denied { open } for name="suspend_enabled" dev="sysfs"
  ino=10567 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_perf:s0
  tclass=file permissive=1

Change-Id: I23d69f0442d126b2a6ac3aaeda5032856a4483f2
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
3d54b00d4e msm8226-common: sepolicy: Label sysfs_disk_stat nodes
* avc: denied { read } for name="stat" dev="sysfs" ino=26461
  scontext=u:r:storaged:s0 tcontext=u:object_r:sysfs:s0 tclass=file
  permissive=1

Change-Id: I4b7258d069801f542da8c7f5ca8242ea32f12bca
2019-10-16 12:30:30 +02:00