Commit graph

11 commits

Author SHA1 Message Date
Michael Bestas
757b8c471e
sm6225-common: Update rootdir to devon_g T2SN33.73-22-3
Change-Id: I00acebe92cf52b76991d5d53acbbcbfbc9b069bb
2024-01-05 11:41:06 +02:00
Suren Baghdasaryan
fde8c98ecb
sm6225-common: Replace direct pid writes with setting task profiles for audio interfaces
For easy transition from SchedTune to UtilClamp, direct access to these
cgroups should be abstracted by using task profiles. Replace writepid
commands with new task_profiles command.

Bug: 155419956
Test: change .rc file and confirm task profile is applied
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: Ide373c283359cf4b73af4cb0813d8c0306942595
2023-11-22 19:13:17 +02:00
Bruno Martins
e6633b270e
sm6225-common: Move to QTI health AIDL service
The health AIDL HAL service provides functionalities of charger,
therefore system charger at /system/bin/charger is deprecated.
On top of that, QTI health AIDL HAL service enables suspend by
default, the equivalent of setting ro.charger.enable_suspend
for legacy charger.

Change-Id: I59c23e7974cea1174b0161f31a535fa3afa1e5c9
2023-11-22 17:53:38 +02:00
LuK1337
4b0fcbf205 sm6225-common: Drop SSR services and set SSR restart_level in init.qcom.rc
Change-Id: I32fc08c9ad36b9c8ebfc019fc87a19eece18f0b4
2023-07-26 23:33:02 +05:30
Dhina17
0da2e505af sm6225-common: Add charger service
- Taken from CodeLinaro.
- Fixes offline charging.

Change-Id: I614caefc4a7318e833247a20344f9b9efdcbeea4
2023-07-20 17:06:53 +02:00
Michael Bestas
2ff59b0506
sm6225-common: Implement xtra-daemon control via property
Default to false if the property is not set.
Device init scripts will need to be adapted to restart
loc_launcher service when property change is detected.

Change-Id: Icbda789cd2a9a3391f437af2c07fc5127f2f09ab
2023-06-09 14:53:20 +03:00
Jimmy Chen
c2e0639266
sm6225-common: Move WiFi supplicant service definition to dedicated RC
Change-Id: I7c448ecb511a738903ebe3702fefdf2cb13c3be3
2023-04-14 05:04:29 +03:00
Hridya Valsaraju
a108236cca
sm6225-common: Set PRODUCT_SET_DEBUGFS_RESTRICTIONS
Starting with Android R launched devices, debugfs cannot be mounted in
production builds. In order to avoid accidental debugfs dependencies
from creeping in during development with userdebug/eng builds, the
build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to
enforce additional debugfs restrictions for userdebug/eng builds. The
same flag will be used to enable sepolicy neveallow statements to
prevent new permissions added for debugfs access.

Test: build, boot
Bug: 184381659
Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e
2023-04-14 05:01:50 +03:00
Alexander Koskovich
9b4c50d809
sm6225-common: init: Don't mount TraceFS twice
* AOSP already mounts TraceFS in system init, so mounting it twice
   causes SEPolicy denials. See the comments in this change.

   https://android-review.googlesource.com/c/platform/system/sepolicy/+/1294195

Change-Id: Ic5d9ac2dbd36e404a93a8d48aa0ea933fd7fa701
2023-04-10 19:18:18 +03:00
Dhina17
cae638f112 sm6225-common: Build QTI USB 1.3
Change-Id: Ic5be4a49c8b31099820b46a95026221f411b45de
2023-03-30 22:51:57 +05:30
Dhina17
c5327f4fe1 sm6225-common: Import rootdir from hawao S2SE32.28-41-1
Change-Id: I99ed9854b90396e594714124719ecb37d6cf5eae
2023-02-17 00:18:46 +05:30