| Commit message (Collapse) | Author | Age |
|
|
|
|
|
|
|
|
| |
binaries
Replaced LOCAL_PROPRIETARY_MODULE with LOCAL_VENDOR_MODULE to set the
output vendor path for hal binaries and libraries
Change-Id: Ib04d80eabc0e17f3863e956db5f2378e426c0687
|
|
|
|
|
|
| |
Moving camera hal and mm-interface binaries to /system/vendor/lib
Change-Id: Ic639b698a8bf4418d51409342ab8f1187362a99b
|
|
|
|
| |
Change-Id: Ib1a490d2d8f23ca832af915b6af783cad6dcdf17
|
|
|
|
| |
Change-Id: Ica769bf4bc058041ae044c6a71464823a92f073d
|
| |
|
| |
|
|
|
|
| |
Change-Id: I95fb9a2f30067c25a9d2ed3a235907959befcd90
|
|
|
|
|
|
| |
* This package is being built globally
Change-Id: I70aaf469acc29ded3cf5bb24ab112a76b36a7835
|
|
|
|
|
|
|
| |
Prefer waker CPU (with 1 runnable task) instead of
an idle CPU in waker cluster.
Change-Id: I174d496cf31bbf8706eaf6ad3740883d1c64b20f
|
| |
|
|
|
|
| |
* See LineageOS/android_vendor_lineage@9f22e538780601bde3754b365ec9899e76f82af8
|
| |
|
|
|
|
|
|
|
| |
pd-mapper needs to be able to write the pd error string to the kmsg
buffer. It runs under the system user.
Change-Id: Ic52682f8151d10c4e6ffdc2b3ed4bc2183ebd6f6
|
| |
|
|
|
|
| |
* Not used anymore.
|
|
|
|
|
|
|
|
|
|
|
| |
.vdex files have been added to allow pre-verified dex. The pinner
service needs to take this in account when pinning. Add pinning of
appropriate system .vdex files on 8996 targets.
Bug 33168521
Test: Tested manually by confirming pinning is successful
Change-Id: Ice2c3f0ec0b314963fb136793d9fa36ecba58490
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Ultra low latency playback is currently broken. Crackling audio
can be well noticed while playing WhatsApp audio messages or even
during some games.
* This patch routes all audio that normally used audio-ull-playback
paths to low-latency-playback paths instead, thus meaning we're
switching from ULL to LL mode.
Change-Id: I7d672f1ff10b984c8096c9c4ca83475e730fd16f
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
| |
* https://github.com/luk1337/aeffects-conf2xml
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
| |
* It's useless and against LineageOS' requirements
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
| |
* Fixup of ee7d7d4737b75ac25b29e98e9af39bfd9a2e17ee
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Also move fingerprint.te to hal_fingerprint_default.te, it helps to track and apply upstream changes.
Fix hal_fingerprint_default sepolicy denials.
* avc: denied { write } for pid=1933 comm=android.hardwar name=/ dev=dm-0 ino=2 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
* avc: denied { add_name } for pid=1946 comm=android.hardwar name=fpc scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
* avc: denied { create } for pid=1981 comm=android.hardwar name=fpc scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
* avc: denied { create } for pid=1935 comm=android.hardwar name=socket scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=sock_file permissive=0
* avc: denied { setattr } for pid=1939 comm="android.hardwar" name="socket" dev="dm-0" ino=2908162 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=sock_file permissive=0
* avc: denied { read } for pid=1939 comm="android.hardwar" name="fpc" dev="dm-0" ino=2908161 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
* avc: denied { remove_name } for pid=1996 comm="android.hardwar" name="socket" dev="dm-0" ino=2908162 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
* avc: denied { unlink } for pid=1949 comm="android.hardwar" name="socket" dev="dm-0" ino=2908162 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_file:s0 tclass=sock_file permissive=0
Fix rild sepolicy denials.
* avc: denied { getattr } for pid=838 comm=sh path=/system/bin/toybox dev=sde18 ino=447 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=0
* avc: denied { execute_no_trans } for pid=838 comm=sh path=/system/vendor/bin/toybox_vendor dev=sde18 ino=2863 scontext=u:r:rild:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=0
* avc: denied { execute } for pid=831 comm=sh name=toybox dev=sde18 ino=444 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=0
* avc: denied { read open } for pid=830 comm="sh" path="/system/bin/toybox" dev="sde18" ino=444 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=0
* avc: denied { execute_no_trans } for pid=1162 comm="sh" path="/system/bin/toybox" dev="sde18" ino=444 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=0
Fix adbd sepolicy denial.
* avc: denied { set } for property=ctl.mdnsd pid=5237 uid=2000 gid=2000 scontext=u:r:adbd:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=property_service permissive=0\x0a
Fix vold sepolicy denial.
* avc: denied { read } for pid=467 comm=vold name=/ dev=sda2 ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
* avc: denied { open } for pid=473 comm="vold" path="/persist" dev="sda2" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
* avc: denied { ioctl } for pid=466 comm="vold" path="/persist" dev="sda2" ino=2 ioctlcmd=5879 scontext=u:r:vold:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
Fix priv_app sepolicy denial.
* avc: denied { read } for pid=4397 comm=Binder:4397_1 name=modules dev=proc ino=4026532515 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_modules:s0 tclass=file permissive=0
* avc: denied { open } for pid=4309 comm="Binder:4309_2" path="/proc/modules" dev="proc" ino=4026532515 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_modules:s0 tclass=file permissive=0
* avc: denied { getattr } for pid=4543 comm="Binder:4543_4" path="/proc/modules" dev="proc" ino=4026532515 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_modules:s0 tclass=file permissive=0
Fix charger sepolicy denials.
I found them booting from offline charging mode.
* avc: denied { read } for pid=444 comm=charger name=/ dev=tmpfs ino=15050 scontext=u:r:charger:s0 tcontext=u:object_r:device:s0 tclass=dir permissive=0
* avc: denied { open } for pid=441 comm=charger path=/dev dev=tmpfs ino=14613 scontext=u:r:charger:s0 tcontext=u:object_r:device:s0 tclass=dir permissive=0
* avc: denied { dac_override } for pid=442 comm="charger" capability=1 scontext=u:r:charger:s0 tcontext=u:r:charger:s0 tclass=capability permissive=0
* avc: denied { dac_read_search } for pid=442 comm="charger" capability=2 scontext=u:r:charger:s0 tcontext=u:r:charger:s0 tclass=capability permissive=0
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
| |
* It's cool, and more importantly... it actually works!
Oh look, it even displays battery level. Wow. :-P
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
| |
* Now expected as an array in Settings package
Change-Id: I92a56abb0fc1379e4482d1889d04d8db6a14ea2b
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
|
|
| |
In bad conditions the radio scan can take
up to 4 seconds, so we choose 5 seconds as
timeout
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
| |
* Tag: LA.UM.6.5.r1-06000-8x96.0
Change-Id: I6e317e043adede343b6ce27cbd76e82f9204fe3d
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: Icff15c4fb5afd227c68c11a48f37d5cf8a765b8a
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: I0245125c26ebfa88d02a38a5ade3cd3125119fe3
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
| |
* Checked on a 64GB z2_plus, but it should be the same for the z2_row 64GB
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
| |
* Update to https://github.com/LineageOS/android_packages_apps_LineageParts/commit/88288e08f86f3ee3240e368632bf12aafd61bcad
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: I2b12d2eed8fecb1cf4779121f8e8f6253eeda57c
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
|
| |
qcoms fantastic libaudiodevarb.so holds an open file handle on /data/misc/audio/aud_devi_arbi
which prevents vold from unmounting tmpfs data and mounting real data after decrypting.
Change-Id: I7d676b38fea9dbca3c2218085802bd20be267c57
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: I5a56d08679b42055bea1ece57b5216dc331c6ed4
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
|
|
|
| |
Incase when sensor-hdr is enabled, need to disable the normal
HDR enabled flag.
Change-Id: Ibd7418d8abaabc03625a65fc228d0bac5528fd5e
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: I76b39dd5329a050d44f126c684edb44b0184f0fc
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: I6b2b98c2708f82cb2178864ab18f71f28570a8d8
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|