Commit Graph

28 Commits

Author SHA1 Message Date
Kyle Harrison
54b7e7c527 mondrianwifi: Move ueventd.qcom.rc to /vendor/etc
In Android 12, the search path for the ueventd vendor config is now /vendor/etc.
2022-08-20 13:33:41 +02:00
f3ebb03588 mondrianwifi: disable qmuxd no modem 2022-03-20 10:52:17 +01:00
ef2420ba0b mondrianwifi: Define properties for LMKD
Change-Id: Ie8748a46ce39f3c8c629d8862e767876f0c4c99f
2022-03-19 14:53:16 +01:00
6a033b4c18 mondrianwifi: touchscreen: Allow capacitive buttons to be disabled 2021-08-27 22:19:17 +02:00
60e0a7dcb6 mondrianwifi: cleanup inherit from msm8974-common 2021-08-26 17:22:16 +02:00
54dd274635 mondrianwifi: Move supplicant service init to wpa_supplicant
Bug: 138790309
Test: boot and wifi function is ok
Change-Id: I35cf3e03566443e20799623045eacd423fd7f5c4
2021-08-25 15:47:55 +02:00
13fae377f8 mondrianwifi: ueventd: Don't modify permissions of /dev/hw_random
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:

W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)

AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.

c78a463e87

Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
2021-08-24 18:47:45 +02:00
5c5f6614a9 mondrianwifi: Increase zram size to 50% 2021-08-24 15:44:07 +02:00
Valera1978
949d22db81 remove netmgrd service 2020-05-26 11:25:10 +03:00
Valera1978
ba47993bbc update interfaces 2020-05-26 11:25:10 +03:00
Valera1978
b0acb38d06 Use sdfat for exfat and vfat 2020-05-26 11:25:10 +03:00
Valera1978
838c760d4f Add /dev/alarm rule to device ueventd.qcom.rc
* AOSP removed this as a platform-wide rule since it is "...not
  present on Pixel devices". As it turns out, our RIL gets grumpy
  and won't latch a data connection if it cannot open the device.
* own/mode aligned to AOSP values from before the change

* E RILD    : ElapsedRealTime() Cannot open file /dev/alarm

* ref: LineageOS/android_system_core@16cdffe

Change-Id: Ib369e4b76653a412d75a3c8c37ee283f8c8e9239
2020-05-26 11:16:32 +03:00
Valera1978
3896a8816e add ld.config.txt 2020-05-26 11:13:15 +03:00
Valera1978
36f9329923 add netmgrd service 2019-12-10 14:48:35 +03:00
Valera1978
12373b8956 init q 2019-12-05 12:22:07 +03:00
Valera1978
e2e2acc2e3 init mondrianwifi 2019-10-28 12:00:21 +03:00
Valera1978
c2a7d00994 init lineage 16.0 2019-02-17 11:43:20 +03:00
Valera1978
3a4b0a93d2 update init scripts 2018-07-06 20:36:40 +03:00
Valera1978
290660ff55 move libs to vendor 2018-01-01 22:26:43 +03:00
Valera1978
22e1bcc46a init Oreo 2018-01-01 00:53:06 +03:00
Valera1978
0fc33c1533 Update and move to msm8974 kernel 2017-10-10 20:03:00 +03:00
Valera1978
d728a0fd67 clean-up 2016-11-30 18:23:16 +03:00
Valera1978
1412ac943f Fix ril 2016-11-17 14:12:29 +03:00
Valera1978
2711cc97da Init for cm14 2016-10-08 09:53:08 +03:00
Valera
af355d5c7a Clean-up (reverted from commit 54ddb2a22c) 2016-02-18 14:49:20 +03:00
Valera
54ddb2a22c Clean-up 2016-02-13 01:00:52 +03:00
Valera1978
e1eb725f65 Init cm13.0 2016-01-10 17:55:38 +03:00
Valera1978
bf2e0c8c76 Init 2016-01-10 17:51:48 +03:00