| Commit message (Collapse) | Author | Age |
... | |
|
|
|
|
|
|
| |
As part of Wigig support for soft AP, allow tethering of wigig0 interface.
CRs-Fixed: 1016736
Change-Id: I7cb753df1387693fca98f2094eca387c1735fb0c
|
| |
|
| |
|
|
|
|
| |
Change-Id: I63907c20ae174865b28d524c13e6b5d8726e5bec
|
|
|
|
|
|
| |
* The static version is in use now.
Change-Id: Ib684fd390eb9aced0aa08508129f4fd7dcbdb055
|
|
|
|
|
| |
* We have a wakelocks issue with our wcnss_filter
that marlin's one doesn't have.
|
|
|
|
|
| |
* ZUI 3.5.337 (z2_plus) has the same config as ZUI 3.5.344 (z2_row).
* Thanks to @AgustinLorenzo for pointing out this.
|
|
|
|
| |
Change-Id: Ic38bb1acb4d37f90b62679e4420815f49b30fc7f
|
|
|
|
|
|
| |
* All these configs are now being set under vendor/lineage
Change-Id: I965cf216d4234030905d3bc7e0a35d4e02f0493a
|
| |
|
|
|
|
| |
Change-Id: Ie87df1e2eecce3ad624d94024a18525d12a458e4
|
|
|
|
|
|
| |
* Remove all the stuff that is now gone in N or no longer useful
Change-Id: Ic113f331d6b45bfff10ef4d1c66f2cdaf864bbb0
|
|
|
|
|
|
|
| |
* Our devices do not support it and that's the reason why
A2DP does not work at all.
Change-Id: I50cb1fdc6b4ff69594fc0d10fbd043c681178e5c
|
| |
|
|
|
|
|
|
| |
stock doesn't have it and it doesn't seem to have any effect.
This reverts commit c9beb932ba4ab717633aa36b5f19e45c5e36533a.
|
|
|
|
|
|
|
| |
* @faizauthar12 had issues using Soong with libhidl on his buildbot
and I don't mind use one or other build system.
This is a partial revert of 7fc8c30651b2a0889cc6dc84fe76e150167c6cbe.
|
|
|
|
| |
* From: Xiaomi/gemini/gemini:8.0.0/OPR1.170623.032/8.4.10:user/release-keys.
|
|
|
|
|
|
| |
* Based on LineageOS/android_device_xiaomi_msm8996-common@e282ba174b9992842754e2b971b251fb85b9a8af
* Revert most of marlin's blobs at least until I manage to solve an encryption issue
that may be related to them.
|
|
|
|
| |
* z2_row and z2_plus have different thresholds.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
avc: denied { getattr } for pid=1726 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="sda10" ino=1957977 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=1726 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="sda10" ino=1957977 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
|
|
|
|
| |
Change-Id: I4bfac85c64599ced45983a86d98cfd810a97db99
|
|
|
|
| |
Change-Id: I29fb36cfc1c1298f31947bdd2d3cd8d07c22209a
|
|
|
|
|
|
|
|
|
| |
Make service part of 'hal' class.
Install files in vendor partition.
Register instance as 'default' as expected by framework.
Change-Id: I487fad4df872397ab76cea377e5304c956a756da
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL replaces all LOCAL_MODULE_PATH_* definitions for vendor shared
libraries with LOCAL_VENDOR_MODULE := true instead. This appropriately
generates sanitized versions of these libraries to /data/asan/* while
generating the stock versions in /vendor/lib* as desired.
Needed for ASAN builds to work correctly.
Bug: 37740897
Test: m -j40 && SANITIZE_TARGET="address" m -j40 # shared libs in
$ANDROID_PRODUCT_OUT/vendor/lib* do not contain asan symbols, while
the ones in $ANDROID_PRODUCT_OUT/data/asan/vendor/lib* do.
Change-Id: If6a495dd153c47f929de047fd48039b990348720
(cherry picked from commit e872612127cfbf55ceba01e9860e0acc47d64447)
|
|
|
|
|
|
|
|
|
| |
The .rc file should be on the vendor image, or can not boot
with generic system image.
Bug: 63051055
Test: Boot with GSI to home screen
Change-Id: I1e2ebe5d23a6cf5a4176ee33613ef621b4b558cf
|
|
|
|
|
|
|
|
|
|
|
|
| |
One must explicitly include what it need.
time.h for struct tm.
sys/time.h for gettimeofday, etc.
Bug: 37629934
Test: build
Merged-In: Iacd5317d958f61df062fca40fbf2e8992c7fbb44
Change-Id: I19e1043f23dbe85836b73714a4f1440159ebe419
|
|
|
|
|
|
| |
Test: m -j BOARD_VNDK_VERSION=current libgps.utils
Bug: 37342627
Change-Id: Ifcd9344245cf689d4075d34b89faa689647b8b0b
|
|
|
|
| |
* No references were found in system, framework or hardware.
|
|
|
|
| |
* Deprecated
|
| |
|
|
|
|
| |
* avc: denied { set } for property=service.adb.root pid=1892 uid=1000 gid=1000 scontext=u:r:system_app:s0 tcontext=u:object_r:shell_prop:s0 tclass=property_service permissive=1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Stock has this:
# enable mbn file update for SIMTrigger
#[Begin][ZUKMT-162] Enable mbn update
#persist.radio.sw_mbn_update=0
#persist.radio.hw_mbn_update=0
persist.radio.sw_mbn_update=1
persist.radio.hw_mbn_update=1
#[End][ZUKMT-162] Enable mbn update
|
| |
|
|
|
|
| |
* And I was wondering why I couldn't find it anywhere... ಠ_ಠ
|
|
|
|
|
|
|
|
|
|
| |
address denials such as:
avc: denied { module_request } for pid=1 comm="init" kmod="crypto-cts(cbc(aes-ce))-all" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0
which caused by b/35930111
Bug: 36056446
Test: no denials
Change-Id: I2a1fd14a0225a79526f77228bddd299434f075f3
|
|
|
|
| |
* The rules came from marlin's sepolicy.
|
| |
|
| |
|
| |
|
|
|
|
| |
Change-Id: I8fd3e9ef5c97f87b2688b607d983b4b540481b46
|
|
|
|
| |
* ims apk is now in /system.
|
|
|
|
| |
Change-Id: I2fd8a24c29089a92b842aeb2cea564fcca137134
|
|
|
|
|
|
|
|
|
|
| |
* ./out/host/linux-x86/bin/assemble_vintf -m -i system/libhidl/manifest.xml \
-o device/zuk/msm8996-common/compatibility_matrix.xml
* Manual edit:
- Remove comments
- Remove vndk entries
- Set optional="false"
|
|
|
|
|
|
| |
vendor/framework/qti-telephony-common.jar"
This reverts commit 68bfbbc68600f14d7339dfe1ceeb7aa836c70107.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* We renamed 'factory' as 'vendor' on our partition table:
z2_row: sgdisk_static --change-name=9:vendor /dev/block/sda
z2_plus: sgdisk_static --change-name=46:vendor /dev/block/mmcblk0
Note that partition number for z2_plus may not be the same if you came from Indian's stock
or from Chinese's stock.
Check first the output of 'ls -l /dev/block/bootdevice/by-name/factory'
* Thanks to @cryscript for the idea and his work for z2_plus.
|
|
|
|
|
|
| |
libmmcamera2_sensor_modules.so.
* The blob changed after the upgrade to ZUI 3.5.344.
|
|
|
|
| |
* Better to go step by step avoiding breaking things... ;-)
|
|
|
|
|
|
|
| |
* The flag is no longer needed, since the new native binderized
lights HAL is being built in place of the legacy one.
Change-Id: I7dd516d0ac73152082983766b29289479be62af0
|