| Commit message (Collapse) | Author | Age |
... | |
|
|
|
| |
Change-Id: Ic9d4ea1e69f0f9e4ccf56917fe96696876a83a42
|
| |
|
|
|
|
| |
Change-Id: I59ff2590c41a7f855586f63c57103280be574b1a
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Example bellow of a failure before one lib was made accessible to
a camera app.
Before exposing:
I CAM_HexagonEnv: Will attempt to load libadsprpc.so from the system partition
I CAM_HexagonEnv: Loading libhalide_hexagon_host.so from the app
I CAM_CamBoxHelper: Computing layout for window: 1080x1920, and preview: 3000x4000, orientation: PORTRAIT, isMultiWindow: false
I CAM_CamBoxHelper: placing extra widgets above the bottom bar
I CAM_CamBoxHelper: Computed layout: CameraLayoutBoxes{window=1080x1920, preview=Rect(0, 106 - 1080, 1546), uncoveredPreview=Rect(0, 173 - 1080, 1546), topBar=Rect(0, 0 - 1080, 106), optionsBar=Rect(0, 0 - 1080, 173), bottomBar=Rect(0, 1546 - 1080, 1920), extraBottomWidgets=Rect(0, 1488 - 1080, 1546)}
W CAM_HexagonEnv: Failed to load Hexagon library: java.lang.UnsatisfiedLinkError: dlopen failed: library "libadsprpc.so" not found
After exposing:
I CAM_HexagonEnv: Will attempt to load libadsprpc.so from the system partition
I CAM_HexagonEnv: Loading libhalide_hexagon_host.so from the app
I CAM_CamBoxHelper: Computed layout: CameraLayoutBoxes{window=1078x1860, preview=Rect(0, 0 - 1078, 808), uncoveredPreview=Rect(0, 173 - 1078, 1437), topBar=Rect(0, 0 - 1078, 106), optionsBar=Rect(0, 0 - 1078, 173), bottomBar=Rect(0, 1437 - 1078, 1860), extraBottomWidgets=Rect(0, 1437 - 1078, 1495)}
I CAM_HexagonEnv: Writing libhalide_hexagon_remote_skel.so to /data/user/0/<package_name_removed>/libhalide_hexagon_remote_skel.so
I CAM_HexagonEnv: ADSP_LIBRARY_PATH=/data/user/0/<package_name_removed>;/dsp
Change-Id: I552dc44a32221d2d3cec48e1c64ed72c470d412e
|
|
|
|
|
|
|
|
|
|
|
|
| |
SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/modem.mdt/power: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/msadp/power: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/soc:qcom,kgsl-hyp/firmware/a530_zap.mdt/power: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/soc:qcom,kgsl-hyp/firmware/a530_zap.b02: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/modem.b09/power: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/modem.b10/power: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/600000.qcom,pcie/pci0000:00/0000:00:00.0/0000:01:00.0/firmware/evicted30.bin: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/600000.qcom,pcie/pci0000:00/0000:00:00.0/0000:01:00.0/firmware/bdwlan30.b00: No such file or directory.\x0a
SELinux: Could not read /sys/devices/soc/600000.qcom,pcie/pci0000:00/0000:00:00.0/0000:01:00.0/firmware/bdwlan30.bin: No such file or directory.\x0a
|
|
|
|
| |
Change-Id: Iad029259b1fcf1e3e38bef575bf65238f1c834b5
|
|
|
|
| |
* Re-apply audio_effects.conf to audio_effects.xml
|
|
|
|
|
| |
* This reverts commit 15ba04fc59087ed297e0506eaa35d8e1d0f2e557
with a higher value.
|
|
|
|
|
|
|
|
| |
* Prior to this change, attention and battery lights weren't handled
in the same way as notification lights. Apply RGB brightness scaling
for all of those and avoid relying on the frameworks.
Change-Id: Ie4983c67e378382985217a47f3fc425045aa8e0f
|
|
|
|
|
|
| |
* From 8.1.0/OPM1.171019.011/04110359
Change-Id: I3930d54898dc10c932732f6c0a054dd2c4f06a12
|
|
|
|
| |
Change-Id: I0e0bbf3863beeacb1c14e687288f507868eef9af
|
|
|
|
|
|
| |
* From 8.1.0/OPM1.171019.011/04110359
Change-Id: Ie0364de4ba6ec10c7bfa230c77160fcf21717031
|
|
|
|
| |
* Now we have "Sharp Shooter" mode on Snap.
|
|
|
|
| |
and config_lowMemoryKillerMinFreeKbytesAbsolute.
|
|
|
|
|
|
|
| |
As part of Wigig support for soft AP, allow tethering of wigig0 interface.
CRs-Fixed: 1016736
Change-Id: I7cb753df1387693fca98f2094eca387c1735fb0c
|
| |
|
| |
|
|
|
|
| |
Change-Id: I63907c20ae174865b28d524c13e6b5d8726e5bec
|
|
|
|
|
|
| |
* The static version is in use now.
Change-Id: Ib684fd390eb9aced0aa08508129f4fd7dcbdb055
|
|
|
|
|
| |
* We have a wakelocks issue with our wcnss_filter
that marlin's one doesn't have.
|
|
|
|
|
| |
* ZUI 3.5.337 (z2_plus) has the same config as ZUI 3.5.344 (z2_row).
* Thanks to @AgustinLorenzo for pointing out this.
|
|
|
|
| |
Change-Id: Ic38bb1acb4d37f90b62679e4420815f49b30fc7f
|
|
|
|
|
|
| |
* All these configs are now being set under vendor/lineage
Change-Id: I965cf216d4234030905d3bc7e0a35d4e02f0493a
|
| |
|
|
|
|
| |
Change-Id: Ie87df1e2eecce3ad624d94024a18525d12a458e4
|
|
|
|
|
|
| |
* Remove all the stuff that is now gone in N or no longer useful
Change-Id: Ic113f331d6b45bfff10ef4d1c66f2cdaf864bbb0
|
|
|
|
|
|
|
| |
* Our devices do not support it and that's the reason why
A2DP does not work at all.
Change-Id: I50cb1fdc6b4ff69594fc0d10fbd043c681178e5c
|
| |
|
|
|
|
|
|
| |
stock doesn't have it and it doesn't seem to have any effect.
This reverts commit c9beb932ba4ab717633aa36b5f19e45c5e36533a.
|
|
|
|
|
|
|
| |
* @faizauthar12 had issues using Soong with libhidl on his buildbot
and I don't mind use one or other build system.
This is a partial revert of 7fc8c30651b2a0889cc6dc84fe76e150167c6cbe.
|
|
|
|
| |
* From: Xiaomi/gemini/gemini:8.0.0/OPR1.170623.032/8.4.10:user/release-keys.
|
|
|
|
|
|
| |
* Based on LineageOS/android_device_xiaomi_msm8996-common@e282ba174b9992842754e2b971b251fb85b9a8af
* Revert most of marlin's blobs at least until I manage to solve an encryption issue
that may be related to them.
|
|
|
|
| |
* z2_row and z2_plus have different thresholds.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
avc: denied { getattr } for pid=1726 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="sda10" ino=1957977 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=1726 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="sda10" ino=1957977 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
|
|
|
|
| |
Change-Id: I4bfac85c64599ced45983a86d98cfd810a97db99
|
|
|
|
| |
Change-Id: I29fb36cfc1c1298f31947bdd2d3cd8d07c22209a
|
|
|
|
|
|
|
|
|
| |
Make service part of 'hal' class.
Install files in vendor partition.
Register instance as 'default' as expected by framework.
Change-Id: I487fad4df872397ab76cea377e5304c956a756da
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL replaces all LOCAL_MODULE_PATH_* definitions for vendor shared
libraries with LOCAL_VENDOR_MODULE := true instead. This appropriately
generates sanitized versions of these libraries to /data/asan/* while
generating the stock versions in /vendor/lib* as desired.
Needed for ASAN builds to work correctly.
Bug: 37740897
Test: m -j40 && SANITIZE_TARGET="address" m -j40 # shared libs in
$ANDROID_PRODUCT_OUT/vendor/lib* do not contain asan symbols, while
the ones in $ANDROID_PRODUCT_OUT/data/asan/vendor/lib* do.
Change-Id: If6a495dd153c47f929de047fd48039b990348720
(cherry picked from commit e872612127cfbf55ceba01e9860e0acc47d64447)
|
|
|
|
|
|
|
|
|
| |
The .rc file should be on the vendor image, or can not boot
with generic system image.
Bug: 63051055
Test: Boot with GSI to home screen
Change-Id: I1e2ebe5d23a6cf5a4176ee33613ef621b4b558cf
|
|
|
|
|
|
|
|
|
|
|
|
| |
One must explicitly include what it need.
time.h for struct tm.
sys/time.h for gettimeofday, etc.
Bug: 37629934
Test: build
Merged-In: Iacd5317d958f61df062fca40fbf2e8992c7fbb44
Change-Id: I19e1043f23dbe85836b73714a4f1440159ebe419
|
|
|
|
|
|
| |
Test: m -j BOARD_VNDK_VERSION=current libgps.utils
Bug: 37342627
Change-Id: Ifcd9344245cf689d4075d34b89faa689647b8b0b
|
|
|
|
| |
* No references were found in system, framework or hardware.
|
|
|
|
| |
* Deprecated
|
| |
|
|
|
|
| |
* avc: denied { set } for property=service.adb.root pid=1892 uid=1000 gid=1000 scontext=u:r:system_app:s0 tcontext=u:object_r:shell_prop:s0 tclass=property_service permissive=1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Stock has this:
# enable mbn file update for SIMTrigger
#[Begin][ZUKMT-162] Enable mbn update
#persist.radio.sw_mbn_update=0
#persist.radio.hw_mbn_update=0
persist.radio.sw_mbn_update=1
persist.radio.hw_mbn_update=1
#[End][ZUKMT-162] Enable mbn update
|
| |
|
|
|
|
| |
* And I was wondering why I couldn't find it anywhere... ಠ_ಠ
|
|
|
|
|
|
|
|
|
|
| |
address denials such as:
avc: denied { module_request } for pid=1 comm="init" kmod="crypto-cts(cbc(aes-ce))-all" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0
which caused by b/35930111
Bug: 36056446
Test: no denials
Change-Id: I2a1fd14a0225a79526f77228bddd299434f075f3
|