| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
| |
AOSP introduced POWER_HINT_LAUNCH in 7.1 to indicate the
start-up of a new activity. Use it.
Change-Id: I7835151c962f38b6e603eed232d6ebd3fd39dae6
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
To build TWRP, successively run the following commands from the top of your
LineageOS root / source directory:
* git clone https://github.com/LineageOS/android_external_busybox external/busybox
* git clone https://github.com/OmniROM/android_bootable_recovery bootable/recovery-twrp
* source build/envsetup.sh
* breakfast hammerheadcaf
* export WITH_TWRP=true
* mka recoveryimage
Obviously, the first two commands only need to be executed once. You can also
add both projects to your '.repo/local_manifests/roomservice.xml' file.
Change-Id: I254ba6d94208fd3499e1b382430098fc17cf05d9
|
| |
|
|
| |
Change-Id: I6b31d921c865d42411c851bf416fd0ed7008affe
|
| |
|
|
|
|
|
| |
* Change 159788 removed POWER_HINT_AUDIO.
* Remove it here as well to fix build errors.
Change-Id: I0ffd44cb4f9bc1355be7640bd0f232354c2431fa
|
| |
|
|
| |
Change-Id: Ie1a011a1a8c237a1cf831a7f0fdd8e31e783f72d
|
| |
|
|
|
|
|
|
|
| |
* Also remove gps build targets that either don't exist
or are proprietary blobs or already built from other targets.
(Original commit by razorloves <razorloves@gmail.com>)
Change-Id: I184a7087ff52688182d27468c15569582fe12bd5
|
| |
|
|
|
|
|
| |
* According to change 144944 we should pin via sha1 sum.
* We recently adopted widevine from bullhead. Pinned those files as well.
Change-Id: I6b8b9865deb89ff5cbc230b9ae561ae56ad1f0d1
|
| |
|
|
|
|
|
| |
This reverts commit b492a930b58af68fc812c0a29a5e849367f5099a.
Also make use of the new config_uiBlurEnabled flag
Change-Id: I5c0f9fe483c965df123c6fa81b9fcfaebf708593
|
| |
|
|
|
|
| |
This was added for building QCOM PowerHAL; can be omitted now.
Change-Id: Ic98c02665ea5e2a06657c16ac3e4aeefb13762a0
|
| |
|
|
|
|
| |
Already in device tree. See device.mk#L60
Change-Id: Ibc9219e58ae89e1633c8c7991d6cdd3d4e55aa4a
|
| |
|
|
|
|
|
|
|
| |
* Remove unused values
PS1: Authors original commit. Thanks droidfivex!
PS2: Edit for hammerheadcaf. Thanks eutardigrade!
Change-Id: I3a1b17ce187b591a874fb4cfd18c07e6fe573d96
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
On occasion of the current rebranding:
* Added copyright notes
* Generalized extract-files.sh and setup-makefiles.sh ("CM" -> "ROM").
* Renamed and modified files according to rebranding policy.
Conflicts:
BoardConfig.mk
lineage.dependencies
lineage.mk
Change-Id: Ic6d706ee1a4a1fc1bb8a8fab6396b160b10c74eb
|
| | |
|
| |
|
|
| |
Change-Id: I45a28cc2353073d7d6effd15399613f7ee9a2d16
|
| |
|
|
| |
Change-Id: I4bc12c6f2d38d505f4f6aceac256da2348595777
|
| |
|
|
|
|
|
|
| |
We set this as default now.
This reverts commit e8debe68f191b6ac68ee87205a8b46cd0158dde2.
Change-Id: Id85c6f9a0ca3b7822fc7b47865dac2d6d4590ff4
|
| |
|
|
| |
Change-Id: Ice7bab61d2346ee11b876307950a148d70d1febd
|
| |
|
|
|
|
|
| |
Addresses:
avc: denied { read } for pid=3214 comm="Binder:3202_1" name="/" dev="tmpfs" ino=8193 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir
Change-Id: I104ce7af331a69c7064702cc8121dc7fd643d821
|
| |
|
|
|
|
| |
And start netmgrd as root to fix tethering.
Change-Id: I5f9628fc4f28458ef539d7931cb773cc742a617f
|
| |
|
|
|
|
|
|
|
| |
As stated in ActivityManagerService:
The vast majority of broadcasts sent from system internals
should be protected to avoid security holes
Change-Id: I51fec347f9f8452db01d62ae2c32eec368c09adc
|
| |
|
|
|
|
|
|
| |
* Translations moved to the new project
android_packages_resources_devicesettings
Change-Id: I3d24b7bae5126956dcb204b7146c371aecd9c8cf
Signed-off-by: Adrian DC <radian.dc@gmail.com>
|
| |
|
|
|
|
| |
remove some unnecessary overlays
Change-Id: I090a994ba159973659c05d586fbd2384b30e8002
|
| |
|
|
|
|
|
| |
The old overlays have now been removed in favour
of a single unified and extensible overlay.
Change-Id: I27856ad297beee7c035b37c592278185665ea2a5
|
| |
|
|
|
|
|
|
| |
The underlying issue is now fixed in HWC.
This reverts commit 20a029e5c60b35c70f8d461efd6e178da743eb00.
Change-Id: I276a773e4e40d1ebb6391f88f01229b20409d7ff
|
| |
|
|
|
|
|
|
|
|
| |
Cached and dropped layers with a negative z-order
that appear visible to the user must be filtered
and sent to the GPU as we are unable to draw these
with MDP composition. Handle remaining layers in
FB cache.
Change-Id: If48b81ac550494099bbe16faa5b09db5cb1148d6
|
| |
|
|
| |
Change-Id: I27e2013481a42ec5cb85fa1a0b0ed56be8f17b91
|
| |
|
|
| |
Change-Id: I68bb5740715e94657af176b48b42d9384e249a75
|
| |
|
|
| |
Change-Id: Ib66a28c2cb6965fde746451b566ef2a69573552d
|
| |
|
|
|
|
| |
Won't be added for N, see https://review.cyanogenmod.org/#/c/168362/
Change-Id: I09986aa8a9eded720d2cebdb77f4a7a07d5922b9
|
| |
|
|
| |
Change-Id: Icb4386abebd2569ad8af4c0e46136ea3ada6c909
|
| |
|
|
|
| |
Change-Id: Ibb66cc74ca1a47fb57330f860dfc3c58a30627a8
Signed-off-by: droidfivex <droidfivex@gmail.com>
|
| |
|
|
|
| |
Change-Id: I12313b26e52fcec6d82fc33eb497d37bc7a7cac9
Ticket: -
|
| |
|
|
|
| |
Change-Id: If7b94c334bd0492950a75de9b9aa21417859bb72
Ticket: -
|
| |
|
|
|
|
|
|
| |
Once you know it's there, the lag kills you
and you just can't stop looking for jank.
Stop that, butter trumps battery.
Change-Id: I70886a65d511af8bf09abc6ac0711a19232a583c
|
| |
|
|
|
|
| |
We were too early with our attempt to keep certain files.
Change-Id: Id4a56dc2d499dbc3c96c95d280426227ce98b606
|
| |
|
|
|
|
|
| |
Addresses:
avc: denied { use } for pid=286 comm="mm-qcamera-daem" path="/storage/emulated/0/DCIM/Camera/VID_20161113_141335.mp4" dev="sdcardfs" ino=1368520 scontext=u:r:mm-qcamerad:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=fd
Change-Id: Idbda6a97852609f32cd4c88f8e8c3ebd53f663c4
|
| |
|
|
|
|
| |
And the Darwin Award goes to...?
Change-Id: I7fc0e76f71346c21eb3b64f84401cc07cfdee6d5
|
| |
|
|
| |
Change-Id: I17ae6f161df2b1b23ef792a87a8bf66e7bb22ab9
|
| |
|
|
| |
Change-Id: I93bd754a27af580e170213dd6d04bce36222e808
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Current sepolicy grants excessive access to sysfs when in reality
only a small portion need be exposed to apps. Label this small
portion appropriately with a future goal of removing the general
sysfs access.
Address the following denials:
08-15 01:55:29.061 194 194 W surfaceflinger: type=1400 audit(0.0:7): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 01:55:29.621 365 365 W BootAnimation: type=1400 audit(0.0:8): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:bootanim:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 01:56:23.580 994 994 W Thread-1: type=1400 audit(0.0:11): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 01:56:28.130 1626 1626 W RenderThread: type=1400 audit(0.0:13): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 01:56:28.280 1037 1037 W ndroid.systemui: type=1400 audit(0.0:14): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 04:01:55.481 194 194 W surfaceflinger: type=1400 audit(0.0:7): avc: denied { open } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 04:01:55.871 367 367 W BootAnimation: type=1400 audit(0.0:8): avc: denied { open } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:bootanim:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 04:02:06.030 908 908 W Thread-1: type=1400 audit(0.0:11): avc: denied { open } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 04:02:09.780 1527 1527 W RenderThread: type=1400 audit(0.0:13): avc: denied { open } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 04:02:10.500 943 943 W ndroid.systemui: type=1400 audit(0.0:14): avc: denied { open } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 05:22:56.680 3211 3211 W RenderThread: type=1400 audit(0.0:22): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
08-15 05:23:13.180 3401 3401 W RenderThread: type=1400 audit(0.0:25): avc: denied { read } for name="gpuclk" dev="sysfs" ino=11974 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
Also move radio rule to radio.te from app.te.
Bug: 22032619
Change-Id: I7c2839486ebfaaeaaf34b46125b3dcac5758b882
|
| |
|
|
|
| |
Bug: 25864142
Change-Id: I97628282a23cb7fe0936c69f3a67a81c2afed60c
|
| |
|
|
|
|
|
|
|
| |
We are deprecated by Google and forgotten by the
rest of the world (*sniff*). Let's be productive
and do a lot of house cleaning to get in a better
mood.
Change-Id: I3985ba6ec8cafdd817d3f991aa64cd3408dde7b2
|
| |
|
|
| |
Change-Id: I3f07017df7049c4b58e2426ae94b2162ffc658d3
|
| |
|
|
| |
Change-Id: I90a970cd0e9bd0524419ca5eea84a082f0387926
|
| |
|
|
|
|
| |
It's ugly and must be cleaned up.
Change-Id: I07d1508016747544146085dc1a01cf7be4d42727
|
| |
|
|
| |
Change-Id: Ia6a008476e8a5ed116490bf83262a3c8229004b8
|
| |
|
|
| |
Change-Id: I55b3bd1d8c6a3e105e7db620b874e782689da748
|
| |
|
|
|
|
| |
Kanged from op3 at ea281936
Change-Id: I0cb6db93d51582c4548bcf79b7021f627807c737
|
| |
|
|
| |
Signed-off-by: droidfivex <droidfivex@gmail.com>
|
| |
|
|
|
|
| |
As expected, this lives now in device/qcom/sepolicy.
Change-Id: I7da3ed713e021411a25e7230435dd45c16a1b94d
|