Skip to content

Instantly share code, notes, and snippets.

View jro1979oliver's full-sized avatar

Jeferson Rodrigo de Oliveira jro1979oliver

  • Brazil
View GitHub Profile
@jro1979oliver
jro1979oliver / moto_build_fingerprint.sh
Created November 30, 2023 10:35 — forked from ThEMarD/moto_build_fingerprint.sh
Get Motorola build fingerprint
#!/bin/bash
SOURCE=$1
PRODUCT_MANUFACTURER=$(cat $SOURCE/system/system/build.prop | grep ro.product.system.manufacturer= | cut -c 32-)
SYSTEM_NAME=$(cat $SOURCE/system/system/build.prop | grep ro.product.system.name= | cut -c 24-)
SYSTEM_DEVICE=$(cat $SOURCE/system/system/build.prop | grep ro.product.system.device= | cut -c 26-)
VERSION_RELEASE=$(cat $SOURCE/system/system/build.prop | grep ro.system.build.version.release= | cut -c 33-)
VENDOR_BUILD_ID=$(cat $SOURCE/vendor/build.prop | grep ro.vendor.build.id= | cut -c 20-)
VENDOR_VERSION_INCREMENTAL=$(cat $SOURCE/vendor/build.prop | grep ro.vendor.build.version.incremental= | cut -c 37-)
@jro1979oliver
jro1979oliver / README.md
Created October 25, 2023 13:53 — forked from SebaUbuntu/README.md
Generate framework compatibility matrix from fqnames

Generate framework compatibility matrix from fqnames

  • Download these 2 files
  • Compile AOSP without fcm from stock and wait for check_vintf to error out
  • Delete Python prefix from all lines (e.g. checkvintf E 06-24 00:30:22 49120 49120 check_vintf.cpp:554])
  • Paste the result in fqnames.txt
  • Launch the script
@jro1979oliver
jro1979oliver / README.md
Created July 17, 2023 12:00 — forked from liitfr/README.md
[how to revert 100644 → 100755 commits ?] #git #chmod

how to revert 100644 → 100755 commits

  • on your repo's root, run : find . -type f | xargs chmod -x
  • commit this change on files : commit -n -m 'fix: files permission from 100755 to 100644'
  • then with vim .git/config, set filemode option to false
[core]
        filemode = false
This file has been truncated, but you can view the full file.
--------- beginning of main
10-12 04:54:12.448 611 611 I lowmemorykiller: Using in-kernel low memory killer interface
10-12 04:54:12.450 611 611 I lowmemorykiller: Process polling is not supported
10-12 04:54:12.451 611 611 I lowmemorykiller: Process reaping is not supported
10-12 04:54:12.480 614 614 I SELinux : SELinux: Loaded service_contexts from:
10-12 04:54:12.480 614 614 I SELinux : /vendor/etc/selinux/vndservice_contexts
10-12 04:54:12.483 612 612 I SELinux : SELinux: Loaded service_contexts from:
10-12 04:54:12.483 612 612 I SELinux : /system/etc/selinux/plat_service_contexts
10-12 04:54:12.483 612 612 I SELinux : /system_ext/etc/selinux/system_ext_service_contexts
10-12 04:54:12.483 612 612 I SELinux : /product/etc/selinux/product_service_contexts
Make sure the device's and/or commonized device proprietary-files are updated with the same blobs that you want in your proprietary vendor repo.
Next, to use the kang and section mode we need the switches "-k -s". -k tells extract-files to only kang/pull updated blobs without deleting any blobs. -s tells it to only update ones from a commented section of your proprietary-files.
for example, if i have this in my proprietary-files
# ADSP - from oneplus3t - OnePlus/OnePlus3/OnePlus3T:9/PKQ1.181203.001/1911042108 - OOS 9.0.6
vendor/lib/libadsp_hvx_callback_skel.so
vendor/lib/libadsp_hvx_stub.so
@jro1979oliver
jro1979oliver / gist:33f8d37d7847d9079375f1e360dbf9f0
Created January 20, 2020 00:24 — forked from DD3Boh/gist:6c51fd3c5f91b1042e956771483714de
How to merge a newer CAF tag in an android kernel
First go here:
https://wiki.codeaurora.org/xwiki/bin/QAEP/release
This site gives information about all msm soc release details with tag + android version
Search your msm here.. Check the latest one and look for correct android version and mark that tag.
Now open one of the following links (dependent on your linux kernel version)
@jro1979oliver
jro1979oliver / audit2allow-sepolicy-android
Created October 16, 2019 13:05 — forked from Nihhaar/audit2allow-sepolicy-android
Addressing selinux denials using audit2allow for android using logcat
# Goto android source code root and then execute following commands
# Keep the logcat.log in the root
export ANDROID_BUILD_TOP=$(pwd)
./external/selinux/prebuilts/bin/audit2allow -p out/target/product/{devicename}/root/sepolicy < logcat.log
# Copy the generated rules in respective files in the device tree