e2e2214be83b74efbebca6eba45adf3690900bf8 |
|
11-Aug-2014 |
Alex Light <allight@google.com> |
Enable WITH_DEXPREOPT on devices where it is possible Change-Id: I0ea9768f801865f95f2774b8377cc8f3d75e30bf (cherry picked from commit ecebdcb6773931f08ee6bb4fbcee2320b06bfb12)
/device/lge/mako/BoardConfig.mk
|
69c4f825690f9885bc46b6628b03ab53b1cb28f8 |
|
11-Aug-2014 |
Alex Light <allight@google.com> |
Enable WITH_DEXPREOPT_BOOT_IMG_ONLY to support partial preopting Bug: 16938924 Change-Id: Iadf3235cbd93375b8c3b89faa07d7d6c42cd6fb0 (cherry picked from commit 5ee6dc2752f887550cde7134d1b94e4264b1bc2a)
/device/lge/mako/BoardConfig.mk
|
f3b869456e10857a0797b25bf34314f9333ec195 |
|
10-Jul-2014 |
Christopher Ferris <cferris@google.com> |
Indicate this uses dlmalloc. Change-Id: Id56ba712bb89df46580e18848a34dcfc17e2b883 Conflicts: BoardConfig.mk
/device/lge/mako/BoardConfig.mk
|
5dbc242d60275be8276b4485771e5a6d762e5c61 |
|
10-Jul-2014 |
Raph Levien <raph@google.com> |
Enable larger selection of fonts on Mako In particular, we need Sinhala on occam_l10n builds. We can revisit the decision later of which existing devices should get expanded font coverage and which should just match K. Change-Id: I79ac1c9fdc2781b7ce686599a448da788c04bcec
/device/lge/mako/BoardConfig.mk
|
4561d883f1a205a31e79039eb8188706f256769b |
|
06-Jun-2014 |
Devin Kim <dojip.kim@lge.com> |
Create cache image Change-Id: Iaf4e85be60a972f7ed19730aa8330a95dcb3814f
/device/lge/mako/BoardConfig.mk
|
26558af67fc0f0b981d507e16b5b730947d090ad |
|
20-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 09a5b6a6: am f3eb2e85: am dab56950: Merge "SELinux: Address new rmt denials" * commit '09a5b6a6167e8f3b8083ac3ec2c8f78dd88868cc': SELinux: Address new rmt denials
|
09a5b6a6167e8f3b8083ac3ec2c8f78dd88868cc |
|
20-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am f3eb2e85: am dab56950: Merge "SELinux: Address new rmt denials" * commit 'f3eb2e85edfaf7ef594c2f2537d52f3d9c07ccbd': SELinux: Address new rmt denials
|
e65b1ede3b10c48af9ccd792ea332b4de1f32571 |
|
20-Jun-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
SELinux: Address new rmt denials Allow rmt to access property service. This patch fixes the following denials. <4>[ 3.747352] type=1400 audit(36625606.601:4): avc: denied { write } for pid=171 comm="rmt_storage" name="property_service" dev="tmpfs" ino=6178 scontext=u:r:rmt:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file <4>[ 3.747657] type=1400 audit(36625606.601:5): avc: denied { connectto } for pid=171 comm="rmt_storage" path="/dev/socket/property_service" scontext=u:r:rmt:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket <4>[ 3.880878] avc: denied { set } for property=ctl.rmt_storage scontext=u:r:rmt:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=property_service Change-Id: Iea5dcb405db8b16b69c9851095d8b5666a3c6a22 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
|
42b272b2842057bde8332b96dff2cd73d508efb1 |
|
31-Jan-2014 |
Stephen Hines <srhines@google.com> |
DO NOT MERGE: Disable GPU RS driver due to AOSP incompatibility. This change will necessitate a rebuilt GPU driver: https://android-review.googlesource.com/80951 Change-Id: I70a0b43165b1166538facf15576d3df7185fda0a
/device/lge/mako/BoardConfig.mk
|
9519276b72ca1ec5502a56eaf140dd10054b106e |
|
15-Mar-2014 |
Brian Carlstrom <bdc@google.com> |
Merge "Revert mako to kernel logging to workaround prebuilt issue DO NOT MERGE"
/device/lge/mako/BoardConfig.mk
|
8b15fef6ee2caf45be4d9360ec29fc4ef3028220 |
|
31-Jan-2014 |
Stephen Hines <srhines@google.com> |
DO NOT MERGE: Disable GPU RS driver due to AOSP incompatibility. This change will necessitate a rebuilt GPU driver: https://android-review.googlesource.com/80951 Change-Id: I70a0b43165b1166538facf15576d3df7185fda0a
/device/lge/mako/BoardConfig.mk
|
b5782380446019cb0498da6bc348e27417e0f46a |
|
01-Apr-2014 |
Doug Zongker <dougz@android.com> |
remove custom recovery UI for mako All its functionality is now in the default UI. Change-Id: I29f23ba51821bc99ed3283f411b4e264dbbb4ff3
/device/lge/mako/BoardConfig.mk
|
cf6964cb3513eb86f7760015ee55fd72b52ccbf6 |
|
10-Mar-2014 |
Nick Kralevich <nnk@google.com> |
am 3f7443e8: Merge "SELinux: Allow hostapd to read wifi data files under /persist." * commit '3f7443e84bf448b0bb95645938b1651692b0e1e9': SELinux: Allow hostapd to read wifi data files under /persist.
|
7d74efb6558dd0d1eb60f93488f9ffb384a3a259 |
|
06-Mar-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
SELinux: Allow hostapd to read wifi data files under /persist. Addresses the following denials: avc: denied { search } for pid=9143 comm="hostapd" name="wifi" dev="mmcblk0p16" ino=12 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=dir avc: denied { getattr } for pid=9143 comm="hostapd" path="/persist/wifi/.macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file avc: denied { read } for pid=9143 comm="hostapd" name=".macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file avc: denied { open } for pid=9143 comm="hostapd" name=".macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file Change-Id: I5d84b3eb7a7d1dada1fa74f111aa6140acb921b6 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
|
3a178f7ad3af8b4db26536b4f1842e21c427ba94 |
|
21-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am 41ab406d: Merge "Move SELinux diag_device policy to userdebug/eng." * commit '41ab406d30620c2a55ae49db7365256fa85c17e8': Move SELinux diag_device policy to userdebug/eng.
|
39c769d8f589d7471a76a5b71faaf15878d5384a |
|
21-Feb-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Move SELinux diag_device policy to userdebug/eng. Also just remove all specific domain access and instead allow diag_device access for all domains on the userdebug/user builds. Change-Id: If41fc97e10243fd53f5fcd9183a3ff3f5142b1c2 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
|
898668a72de320f1556c3e435ec4969fcca8e27b |
|
31-Jan-2014 |
Stephen Hines <srhines@google.com> |
DO NOT MERGE: Disable GPU RS driver due to AOSP incompatibility. This change will necessitate a rebuilt GPU driver: https://android-review.googlesource.com/80951 Change-Id: I70a0b43165b1166538facf15576d3df7185fda0a
/device/lge/mako/BoardConfig.mk
|
955b92050c2908295dcc469575055f05cec3b428 |
|
12-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Move gpu_device type and rules to core policy. Change-Id: I3ce0b4bd25e078698a1c50242aaed414bf5cb517 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/device/lge/mako/BoardConfig.mk
|
988038ce9e3e5482b4169d9fd506704b0a2cfc01 |
|
26-Nov-2013 |
Nick Kralevich <nnk@google.com> |
Merge "Resolve new selinux denials."
|
381b2e0a0d6f33fb7c277f57efdc3a74bfb5c7cc |
|
22-Nov-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Resolve new selinux denials. * Add tee policy. Label /data/misc/playready and allow tee access to persist file system. denied { read } for pid=265 comm="qseecomd" name="/" dev="mmcblk0p23" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir denied { open } for pid=265 comm="qseecomd" name="/" dev="mmcblk0p23" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir denied { write } for pid=265 comm="qseecomd" name="misc" dev="mmcblk0p23" ino=313873 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir denied { add_name } for pid=265 comm="qseecomd" name="playready" scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir denied { create } for pid=265 comm="qseecomd" name="tzdrm.log" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file denied { read write open } for pid=265 comm="qseecomd" name="tzdrm.log" dev="mmcblk0p23" ino=313909 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file denied { create } for pid=221 comm="qseecomd" name="playready" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir denied { write } for pid=221 comm="qseecomd" name="playready" dev="mmcblk0p23" ino=313907 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir denied { add_name } for pid=221 comm="qseecomd" name="logs" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir denied { search } for pid=241 comm="qseecomd" name="widevine" dev="mmcblk0p20" ino=13 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=dir denied { getattr } for pid=241 comm="qseecomd" path="/persist/widevine/5dsokxEEDXgQhkN50bp-Z2K5InM_/RXFABDUxyT6Q+Zwx9ZhPGOq2Bq8_" dev="mmcblk0p20" ino=20 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=file denied { read } for pid=269 comm="qseecomd" name="RXFABDUxyT6Q+Zwx9ZhPGOq2Bq8_" dev="mmcblk0p20" ino=20 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=file denied { open } for pid=269 comm="qseecomd" name="RXFABDUxyT6Q+Zwx9ZhPGOq2Bq8_" dev="mmcblk0p20" ino=20 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=file * Allow system_server (ActivityManager) access to radio nodes denied { read } for pid=656 comm="ActivityManager" name="mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file denied { open } for pid=656 comm="ActivityManager" name="mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file denied { getattr } for pid=656 comm="ActivityManager" path="/dev/mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file denied { ioctl } for pid=656 comm="ActivityManager" path="/dev/mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file * Allow system_server to create netlink sockets denied { create } for pid=657 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket denied { bind } for pid=657 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket denied { write } for pid=1241 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket denied { read } for pid=1238 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket * Allow all apps r/w access to the world writable gpu device by making the gpu_device a trusted object. denied { write } for pid=3460 comm="ense_free.menus" name="kgsl-3d0" dev="tmpfs" ino=7606 scontext=u:r:untrusted_app:s0:c92,c256 tcontext=u:object_r:gpu_device:s0 tclass=chr_file * Add dontaudit for rmt_storage to /dev/mem. The denials just flood the logs. Change-Id: Ic4f220a521caa6fa9d4d119f22e0e6d378bbc562
/device/lge/mako/BoardConfig.mk
|
de17b830150df80ea228ec1691be41013f188536 |
|
22-Nov-2013 |
The Android Open Source Project <initial-contribution@android.com> |
Merge commit 'f547c30cd56dbd10b7149d9d7d85a6845bf3c08b' into HEAD
|
e10afca46d00954fc36ad45f86a9b72df41b20db |
|
12-Nov-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Cleanup selinux policy. Drop rules and labels that are no longer needed or supported. * qseecom_device, bcm2079x_device, msm_acdb_device are not used. Each has already been replaced with a proper label with a prior patch. * drop bluetooth to smd_device policy. The dev node is actually hci_attach_dev and generic policy handles it already. * drop drmserver access to qseecom_device and sdcard_external. qseecom_device was relabeled as tee_device and the generic policy already handles it. sdcard_external was used before the /persist filesystem was correctly labeled. * drop keystore access to qseecom_device. qseecom_device was relabeled as tee_device in a prior patch a the generic policy handles it. * drop mediaserver access to msm_acdb_device. msm_acdb_device was audio_device in a prior patch and the generic policy handles it. * drop nfc access to bcm2079x_device. THis was relabeld asd nfc_device in a prior change and generic policy handles it. * drop wpa access to devpts. Since we dropped the logwrapper call in init.mako.rc this access is no longer needed. * drop init_shell policy. Change-Id: I31ef4d2fcb07e047c07ebbab9a76df8c2e655271
/device/lge/mako/BoardConfig.mk
|
5d10f3720ee64b823a75624e3ab97a25847408e3 |
|
15-Oct-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Improve bluetooth selinux policy. Removed the unconfined domain and addressed the following denials. * Allow bluetooth to run init.mako.bt.sh denied { entrypoint } for pid=2812 comm="init" path="/system/bin/mksh" dev="mmcblk0p21" ino=208 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:shell_exec:s0 tclass=file denied { read } for pid=2812 comm="sh" path="/system/bin/mksh" dev="mmcblk0p21" ino=208 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:shell_exec:s0 tclass=file denied { open } for pid=2812 comm="sh" name="init.mako.bt.sh" dev="mmcblk0p21" ino=341 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_loader_exec:s0 tclass=file denied { getattr } for pid=2818 comm="sh" path="/system/bin/bdAddrLoader" dev="mmcblk0p21" ino=126 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_loader_exec:s0 tclass=file denied { execute_no_trans } for pid=2818 comm="sh" path="/system/bin/bdAddrLoader" dev="mmcblk0p21" ino=126 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_loader_exec:s0 tclass=file * init.mako.bt.sh needs /system/bin/log access denied { read write } for pid=2823 comm="logwrapper" name="0" dev="devpts" ino=3 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file denied { open } for pid=2823 comm="logwrapper" name="0" dev="devpts" ino=3 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file * Read mac address from persist partition denied { search } for pid=185 comm="bdAddrLoader" name="bluetooth" dev="mmcblk0p20" ino=12 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:persist_bluetooth_file:s0 tclass=dir denied { read } for pid=185 comm="bdAddrLoader" name=".bdaddr" dev="mmcblk0p20" ino=16 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:persist_bluetooth_file:s0 tclass=file denied { open } for pid=185 comm="bdAddrLoader" name=".bdaddr" dev="mmcblk0p20" ino=16 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:persist_bluetooth_file:s0 tclass=file * Talk to init over the property socket and set persist.service.bdroid.* and bluetooth.* property values denied { write } for pid=185 comm="bdAddrLoader" name="property_service" dev="tmpfs" ino=7198 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file denied { set } for property=persist.service.bdroid.bdaddr scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=property_service * Allow toolboxes getprop/setprop from init.mako.bt.sh script denied { execute_no_trans } for pid=2813 comm="sh" path="/system/bin/toolbox" dev="mmcblk0p21" ino=287 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:system_file:s0 tclass=file Added a domain_auto_trans to run hci_qcomm_init and then addressed the following denials. * denied { use } for pid=1257 comm="hci_qcomm_init" path="/system/bin/linker" dev="mmcblk0p21" ino=192 scontext=u:r:hci_attach:s0 tcontext=u:r:bluetooth_loader:s0 tclass=fd Lastly, changed hci_qcomm_init's type from hci_exec to hci_attach_exec. hci_attach_exec already lives out in generic policy for this purpose and allows us to drop the hci_init.te policy here. Change-Id: I63b29f0708fd72ec26090f51a3db6c002ecae738
/device/lge/mako/BoardConfig.mk
|
44b01ababb3c11c31ec04a1990855513348871ce |
|
08-Oct-2013 |
Nick Kralevich <nnk@google.com> |
am 20b86b07: Merge "Complete qmux selinux policy." * commit '20b86b0714a4f757aa86e3e59679c52f4e0840ea': Complete qmux selinux policy.
|
5d98167a758eb5d410119d00ab0043d762c9db21 |
|
08-Oct-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Complete qmux selinux policy. First, relabeled qmux socket directories using a common label which helped reduce the number of labels policy writers had to follow. Then, introduced a macro to allow domains to easily create and connect to qmux sockets under each qmux directory. The macro creates a new type for each domain requesting a qmux socket independent of the actual directory location. Having a derived type from the creator of each socket will slightly increasing the total number of new types, but this will also ensure that each domain can only delete their own created socket. The following class of denials are addressed by this switch. denied { write } for pid=176 comm="mediaserver" name="qmux_connect_socket" dev="tmpfs" ino=6888 scontext=u:r:mediaserver:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file denied { connectto } for pid=176 comm="mediaserver" path="/dev/socket/qmux_audio/qmux_connect_socket" scontext=u:r:mediaserver:s0 tcontext=u:r:qmux:s0 tclass=unix_stream_socket Removed the unconfined constraint from qmux policy and addressed the following denials. * Allow qmux to create a connect socket under each /dev/socket/qmux_* directory. denied { write } for pid=179 comm="qmuxd" name="qmux_radio" dev="tmpfs" ino=7607 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir denied { add_name } for pid=179 comm="qmuxd" name="qmux_connect_socket" scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir denied { remove_name } for pid=179 comm="qmuxd" name=716D75785F636C69656E745F736F636B657420202020313730 dev="tmpfs" ino=5261 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir denied { create } for pid=179 comm="qmuxd" name="qmux_connect_socket" scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file denied { setattr } for pid=179 comm="qmuxd" name="qmux_connect_socket" dev="tmpfs" ino=6656 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file denied { getattr } for pid=179 comm="qmuxd" path=2F6465762F736F636B65742F716D75785F726164696F2F716D75785F636C69656E745F736F636B657420202020313730 dev="tmpfs" ino=5261 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file denied { unlink } for pid=179 comm="qmuxd" name=716D75785F636C69656E745F736F636B657420202020313730 dev="tmpfs" ino=5261 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file * Node access to radio_device (/dev/hsicctl*) denied { read write } for pid=179 comm="qmuxd" name="hsicctl0" dev="tmpfs" ino=5227 scontext=u:r:qmux:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file denied { open } for pid=179 comm="qmuxd" name="hsicctl0" dev="tmpfs" ino=5227 scontext=u:r:qmux:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file * Allow logging diagnostic items to /dev/diag denied { read write } for pid=179 comm="qmuxd" name="diag" dev="tmpfs" ino=7277 scontext=u:r:qmux:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file denied { open } for pid=179 comm="qmuxd" name="diag" dev="tmpfs" ino=7277 scontext=u:r:qmux:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file * Wake lock access denied { append } for pid=179 comm="qmuxd" name="wake_lock" dev="sysfs" ino=57 scontext=u:r:qmux:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file denied { open } for pid=180 comm="qmuxd" name="wake_lock" dev="sysfs" ino=57 scontext=u:r:qmux:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file Change-Id: Icba85b2cc727e6743b32e775a49d29c77fb6dc61 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
|
036f77ea7585af00a29aa6cf03d58a07434c931a |
|
04-Oct-2013 |
Iliyan Malchev <malchev@google.com> |
am 1c59be22: mako: enable kernel user_debug traces * commit '1c59be22ec10cd1f8549987a07db00c92f8152a6': mako: enable kernel user_debug traces
|
1c59be22ec10cd1f8549987a07db00c92f8152a6 |
|
03-Oct-2013 |
Iliyan Malchev <malchev@google.com> |
mako: enable kernel user_debug traces To help debugging b/10920955 - N4 runtime crashed in a phone call (twice) Change-Id: Ifeb9c26a7ca8228bfa82fcd057058c2878014aed Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
39b7ddb4ed03b8c4e7cddd6dd2a989d7c49fa2c4 |
|
26-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 6168600e: Merge "Improve sepolicy labeling and domain confinement." * commit '6168600ef47361aef9d0c522737634a85a34584e': Improve sepolicy labeling and domain confinement.
|
3370c7953eb2d1559f5c66a2f6010573d7fe9b9a |
|
26-Sep-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Improve sepolicy labeling and domain confinement. * Move certain services out of inits domain. inits domain is unconfined and we should be limiting those services that need to run in inits context. For the new domains introduced, keep them permissive and unconfined for now until future policy work will individually drop these constraints. * Add context option to fstab when mounting the firmware partition. This will ensure proper labeling and not use the default vfat label of sdcard_external. * Use concatenation versus assignment when making policy declarations inside BoardConfig.mk. This will allow sepolicy to exist in the vendor directory. Change-Id: I93c7413bf2a8ceb7589f059e754c4b2a787fdbaf Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
|
0069999821e6933c46790ea7373e68e4fb41e457 |
|
18-Sep-2013 |
Alex Klyubin <klyubin@google.com> |
Remove the unnecessary compatibility.te. We are mostly running in per-domain permissive mode right now, so these compatibility rules are unnecessary. (cherry picked from 443fe30e313c3f9f0a07d00da63a67d15e0b2f37) Change-Id: Ic32e1b6d1192ba810b344ef4e1653142cc886bdd
/device/lge/mako/BoardConfig.mk
|
f77c13ec3ddefe2baed2c879c0bac219589a149d |
|
18-Sep-2013 |
Alex Klyubin <klyubin@google.com> |
resolved conflicts for merge of 1357ad8f to klp-dev-plus-aosp Change-Id: I10227118f9bf82f6f1ddc2ea31b7310ca40a4e41
|
63eea9a7d31f67dffaec22a61d2cc5e0bfd4a0f9 |
|
14-Sep-2013 |
Alex Klyubin <klyubin@google.com> |
Rename domain "system" to "system_server". Now that the "system" domain is just about the system_server, it's clearer if the domain is called "system_server". This CL depends on the renaming in external/sepolicy performed in https://android-review.googlesource.com/#/c/65502/. Change-Id: I90a6850603dcf60049963462c5572d36de62bc00
/device/lge/mako/BoardConfig.mk
|
e3c12c4a7af69abe7406c6ba087361f6423d1a84 |
|
08-Sep-2013 |
Iliyan Malchev <malchev@google.com> |
mako: set OVERRIDE_RS_DRIVER Change-Id: Id9f4ff1ae6bdc9195f34999a0df6e364a2d25ffa Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
4015ba27d8c87e5a2d445a0d07088a43cbd87109 |
|
04-Sep-2013 |
Iliyan Malchev <malchev@google.com> |
mako: set HAVE_ADRENO_SOURCE to false Change-Id: I9e7cb8923bbb827550eed59da3281e16b8edc482 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
5c7f47291f64b72763a70ac1204de84dc1e9d5cb |
|
14-Aug-2013 |
Todd Poynor <toddpoynor@google.com> |
mako: dumpstate: switch to HAL static lib Change-Id: I106d257aadab9c133dfc2991e4b4eace08820581
/device/lge/mako/BoardConfig.mk
|
443fe30e313c3f9f0a07d00da63a67d15e0b2f37 |
|
14-Jul-2013 |
Nick Kralevich <nnk@google.com> |
Revert "Add compatibility.te." We are mostly running in per-domain permissive mode right now, so these compatibility rules are unnecessary. This reverts commit 78ae7c8c2fab9c759fef7775770f91c9a2fbc75f.
/device/lge/mako/BoardConfig.mk
|
b1ddcbeb2285e04694a0d96a33e175303f3042ab |
|
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 3157f134: am a8c369db: Merge changes I43edfacb,Id609fa85 into jb-mr2-dev * commit '3157f134f3a1fe712afa375212eb0553016f11f0': Move domains to permissive. Add compatibility.te.
|
78ae7c8c2fab9c759fef7775770f91c9a2fbc75f |
|
14-May-2013 |
repo sync <gcondra@google.com> |
Add compatibility.te. This file is a clearinghouse for autogenerated policy derived from denials seen in the wild. The goal is to reduce it to 0 over time. Change-Id: Id609fa8536a190c46cab7c00e6fbb3a3b6215b2f
/device/lge/mako/BoardConfig.mk
|
e1f32aef38527675c54bd79c47a0d3751e6d969c |
|
11-May-2013 |
Iliyan Malchev <malchev@google.com> |
mako: enable USE_DEVICE_SPECIFIC_QCOM_PROPRIETARY Change-Id: Idfe609ecb3ecfecb5016a7b499dc09eb10cfe7c9 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
b9fd377b68e8026edca9c17b025f4bbed5450c67 |
|
09-May-2013 |
repo sync <gcondra@google.com> |
Allow read access to the fds handed out by ashmem. Change-Id: If1df4788dbdf3de5f2d7dd1e9df63fe191494d92
/device/lge/mako/BoardConfig.mk
|
39f20052a34b9df18a2e2c5d91c51331bf5ffc4c |
|
07-May-2013 |
repo sync <gcondra@google.com> |
Last occam denials. Some of this should be solved in other ways. In particular, in the future /persist and friends should be labelled appropriately. Change-Id: I90201d27e42c0f26ebcbea94e1833927f12003c5
/device/lge/mako/BoardConfig.mk
|
93bbc93c99e356ac5d19d59cf8301623612375be |
|
06-May-2013 |
repo sync <gcondra@google.com> |
Resolve remaining occam denials before boot. Change-Id: Id52d0e57da10c5b7edd77e52e73ac84a874c8064
/device/lge/mako/BoardConfig.mk
|
591967cf1e699277ad362664e8d2fbbf366a3c26 |
|
03-May-2013 |
repo sync <gcondra@google.com> |
Add policy for kickstart. Change-Id: If5712bd8665cccf76d8ca3555ca2906f6ead2d32
/device/lge/mako/BoardConfig.mk
|
fcebeb3108e93397f7a843e1ac4a5d09233a8289 |
|
02-May-2013 |
Alex Klyubin <klyubin@google.com> |
SELinux policy for Qualcomm MSM Audio ACDB device. The device is /dev/msm_acdb. Change-Id: I6494ab177521aba9f424048b14c32855bdf4b537
/device/lge/mako/BoardConfig.mk
|
72021bbe4d683f0d271c02580c70cd0a17484133 |
|
02-May-2013 |
repo sync <gcondra@google.com> |
Add bcm2079x_device policy. Change-Id: Iff5b2062c0e92c91d6ace8a04510008cbcadfd12
/device/lge/mako/BoardConfig.mk
|
10076f7999899695f0f6cb97eada8311440f759f |
|
02-May-2013 |
repo sync <gcondra@google.com> |
Add policy support for the qmux sockets. Change-Id: I7f1b1d26693dc5d4ed63f4b32e5538cec1dd9093
/device/lge/mako/BoardConfig.mk
|
e65bf8d1da1b4a5177869082d0db01c4eaa44f13 |
|
01-May-2013 |
repo sync <gcondra@google.com> |
Add policy support for /dev/diag Change-Id: I4f19adec0f5b41051e7cb662f8a182a2fc3f6298
/device/lge/mako/BoardConfig.mk
|
b00f6d05113828ff21ec73070653e1d4d7f736e1 |
|
01-May-2013 |
repo sync <gcondra@google.com> |
Add policy to handle errors encountered in testing. Change-Id: I6854ff74627c1546c7f8c6265b1f55d715d8b2a6
/device/lge/mako/BoardConfig.mk
|
400bf83d4ec60360952252425431f1ea8e28fea8 |
|
26-Apr-2013 |
Geremy Condra <gcondra@google.com> |
Merge "Grant Keystrore and DRM services access to /dev/qseecom." into jb-mr2-dev
|
841326466aa6e87a92d5dadffe05a57952fb1d01 |
|
26-Apr-2013 |
Alex Klyubin <klyubin@google.com> |
Grant Keystrore and DRM services access to /dev/qseecom. /dev/qseecom is the Qualcomm Secure Execution Environment Communicator (QSEECOM) device. Change-Id: Id4184a02451f2ea6788ad576fe3b6281cf965e72
/device/lge/mako/BoardConfig.mk
|
c6442fe9e63ab20d354837a5a35be97f0953a779 |
|
26-Apr-2013 |
repo sync <gcondra@google.com> |
Allow ueventd to read from the sdcard. Change-Id: I626fe51974528649fb0c39d11ba03a14a341c5b4
/device/lge/mako/BoardConfig.mk
|
1fc9172689ce05a99e28db15d068588bb437b4b7 |
|
26-Apr-2013 |
Alex Klyubin <klyubin@google.com> |
SELinux whitelist for GPU (/dev/kgsl-3d0) access on mako. The GPU appears to be used by most UI-based apps as well as a couple of UI-less entities, such as PowerManagerService and SurfaceFlinger. Change-Id: I1060001c226f6a0cfc88a97efd236a3d626e02d1
/device/lge/mako/BoardConfig.mk
|
bb3ca8d4cd0b53c7b27499d0e5ee826be0c521ce |
|
03-Apr-2013 |
Geremy Condra <gcondra@google.com> |
Add base device-specific SELinux policy. Change-Id: I50da503d6bbf445b4c116104cf00821a0fa4040e
/device/lge/mako/BoardConfig.mk
|
3d4d689d3ff6006f9c91fba35ba76ba155a7cd15 |
|
28-Mar-2013 |
Iliyan Malchev <malchev@google.com> |
Revert "Disable device specific camera." This reverts commit 98536c61b80e2b0c25968d320eb8e69e4ddb8847. vendor/lge/mako/camera was missing liboemcamera Bug: 8497780 Change-Id: I715d767f5261766958cd594b207e6822c3f99be6 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
98536c61b80e2b0c25968d320eb8e69e4ddb8847 |
|
28-Mar-2013 |
Vineeta Srivastava <vsrivastava@google.com> |
Disable device specific camera. Bug: 8497780 Change-Id: Ibc7e9aebbde5856969c052c13af6fb0262280b7c
/device/lge/mako/BoardConfig.mk
|
6d01645739c75116d8940772b80d5b7aba5c39d6 |
|
28-Mar-2013 |
Iliyan Malchev <malchev@google.com> |
mako: move camera HAL from hardware/qcom/camera, DO NOT MERGE Change-Id: Ib76c01a8ce47dd17c4e5c986e5988c2ad1c61906 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
b7f574cfc1d1db2771684f3bd927dba664b1cecb |
|
23-Mar-2013 |
Elliott Hughes <enh@google.com> |
am 7256507c: am 4329cd17: Merge "Remove unused lge/mako ARCH_ARM_HAVE_TLS_REGISTER." * commit '7256507cd0ca3b472aa307f984da7a7bdf39b580': Remove unused lge/mako ARCH_ARM_HAVE_TLS_REGISTER.
|
658692e1ba6ff38e3aa7a6f1c7b81a9870964eae |
|
22-Mar-2013 |
insup.choi <insup.choi@lge.com> |
mako: camera: featuring fast autofocus Change-Id: If920af7bd53dc91d8cebf1baadf47d7f62f109d8
/device/lge/mako/BoardConfig.mk
|
13e5cd17a13f85f5fed0ab419cc4de340711e970 |
|
22-Mar-2013 |
Elliott Hughes <enh@google.com> |
Remove unused lge/mako ARCH_ARM_HAVE_TLS_REGISTER. Change-Id: I7d26582e20a7a0d31613280389bb7d764e279371
/device/lge/mako/BoardConfig.mk
|
c08d651d17b40bf2e202bd060487ff96dd8e0185 |
|
15-Mar-2013 |
Iliyan Malchev <malchev@google.com> |
mako: disable LGE's fast AF temporarily Change-Id: I9055c158711ae84549fe2afb4f0075b2b63f027d Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
a66cdbdea8c4408583f23a9adefd7c284a765761 |
|
06-Feb-2013 |
Christopher Ferris <cferris@google.com> |
Adding TARGET_CPU_VARIANT to config file. Merge from internal master. Change-Id: I67d505f3101ac9397664e879185ecebf13baa3ae
/device/lge/mako/BoardConfig.mk
|
5197d28bf2e26e861d68d2a9fd8da0a0b55a3f96 |
|
06-Feb-2013 |
Christopher Ferris <cferris@google.com> |
Adding TARGET_CPU_VARIANT to config file. Bug: 8005082 Change-Id: I7506a855b8e436fa4bafa2b70a0cb28663d40d56
/device/lge/mako/BoardConfig.mk
|
872b2ddba321171dd68707dc13abf930ee9ce210 |
|
22-Feb-2013 |
Ken Sumrall <ksumrall@android.com> |
Merge "Update unified fstab.mako to support recovery"
|
7edbad54e46792e65b2f80b37ef0767e0744c6f8 |
|
20-Feb-2013 |
Ken Sumrall <ksumrall@android.com> |
Update unified fstab.mako to support recovery Add entries to the unified fstab needed by recovery. Also, copy the unified fstab to /etc/recovery.fstab in the recovery ramdisk. Change-Id: I55a122643ef197361ef5308268bfdddf40ed915d
/device/lge/mako/BoardConfig.mk
|
1eee589393ed63cbcb0760d2e4ac844bfd299b46 |
|
09-Feb-2013 |
Iliyan Malchev <malchev@google.com> |
mako: switch to the new tinyALSA-based audio HAL Change-Id: I5648840b93ebc49304fc995e6342ecef1f905c8d Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
60c5716b201470ab81dbb0394aba608f2e34a058 |
|
09-Feb-2013 |
Iliyan Malchev <malchev@google.com> |
Add BOARD_USES_LEGACY_ALSA_AUDIO, set to true This switch controls whether the device uses the old (when true) or new audio HAL (otherwise.) Change-Id: I8098c1db2db46ea444bcc0e188943335420ade3d Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
d1749a18467a7b85693a1d8d97a4f3ece82aff39 |
|
30-Nov-2012 |
choongryeol.lee <choongryeol.lee@lge.com> |
mako: allow device to sleep in off-mode charging In off-mode charging, the device need to go suspend mode to reduce power consumption after charging completion. This patch enable suspend mode in off-mode charging. Bug: 7429504 Change-Id: I915f0d076c34680d2fbfd8e8b92adb65464b1600
/device/lge/mako/BoardConfig.mk
|
2531dc2baa23b11514be7941805ab6b7382d8020 |
|
23-Oct-2012 |
Iliyan Malchev <malchev@google.com> |
initial mako-specific dumpstate Change-Id: I1255cc91817b8a0cdb191d09bc556d1aa086ae25 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
46deaee8efc0939f91b9bbb1e8bbea75a35c4cfc |
|
11-Sep-2012 |
Devin Kim <dojip.kim@lge.com> |
mako: relocate ramdisk to avoid overlap with kernel If some kernel debug features are enabled, ramdisk might be overlapped with kernel. So increase the ramdisk offset by 1MB. Bug: 7145409 Change-Id: Icb2d488e41d083ecb4e2e4947bd26b9c8a118e52 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
d6f025102afd73ffd62950de8df298060484b78e |
|
11-Sep-2012 |
Sungmin Choi <sungmin.choi@lge.com> |
mako: add fast autofocus configuration Change-Id: I19e5328f763973fd34c1902d2d90640b01a9b625
/device/lge/mako/BoardConfig.mk
|
7bd37b89b5a228082804b179a7fef8a653a6246f |
|
11-Sep-2012 |
Iliyan Malchev <malchev@google.com> |
mako: wifi driver is no longer a module Change-Id: Ib630c96476ee6fea823c3682c3481d63ce7d1f05 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
19bd907717410abe1f8b1d3470da1c5e1c0a17c8 |
|
10-Sep-2012 |
Jeff Johnson <jjohnson@codeaurora.org> |
mako: relocate ramdisk to avoid overlap with kernel An upcoming change will statically link the Prima WLAN Driver with the kernel. The current observation is that when this occurs, the kernel will increase in size to the point that it will overlap with the ramdisk, preventing the ramdisk from being mounted. In anticipation of this, increase the ramdisk_offset so that the kernel with the statically-linked Prima WLAN Driver will not overlap the ramdisk. Change-Id: If5a0ffe67f6ba044690d602d5f04879a983a52b7
/device/lge/mako/BoardConfig.mk
|
f1f28ec60d5155338bc1d9970f8a1208fd6a9daa |
|
16-Aug-2012 |
Sungmin Choi <sungmin.choi@lge.com> |
mako: add mdm thermal sensor configuration Change-Id: I7148aae16167511802d1e6b50bc41ae0ea92a49c
/device/lge/mako/BoardConfig.mk
|
e64faf474d8d6ad9c35be483341b829111aed49f |
|
21-Aug-2012 |
Jongrak Kwon <jongrak.kwon@lge.com> |
mako: partition change for 8G eMMC boot: 22MB, recovery: 22M, system: 840M, user: about 5.9G Change-Id: I0a64a7d9b2c413ca14829eeb3ece4a150e5e9132 Conflicts: BoardConfig.mk
/device/lge/mako/BoardConfig.mk
|
9cb9ff305d8b8a4a9758b76887354b3d84393565 |
|
21-Aug-2012 |
Wink Saville <wink@google.com> |
Add support for per device bluetooth configuration. Bug: 6837125 Change-Id: Icfcfa920416b3ddd89b3117505a7a526c438120d
/device/lge/mako/BoardConfig.mk
|
4d299b079b847177a07dc0ea5695b1c3449ec8bf |
|
14-Aug-2012 |
Jeff Johnson <jjohnson@codeaurora.org> |
mako: Switch WLAN to wpa_supplicant_8 Change-Id: Ia61c41d6f600925637e92d013a5a6c3ebbfb6d4d
/device/lge/mako/BoardConfig.mk
|
0a3bd80d3b327b67e14f507a9feb3b52280ac7f9 |
|
15-Aug-2012 |
Jeonghoon lim <jeonghoon.lim@lge.com> |
mako: bluetooth: bring up with bluedroid stack - remove some codes not to be used with bluedroid stack - add a property to check initialization status of bluetooth - remove the code to initialize hci_smd driver Change-Id: I73aa66421ed42bf464f8901b1e0346a9c657c832 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
021796cb174851f5155b50c805b3331b89a84de6 |
|
14-Aug-2012 |
Doug Zongker <dougz@google.com> |
include bootloader in mako OTA Bug: 6977989 Change-Id: Ie8b3ba1ad7abdf62891a2f186c98f92e9a498555
/device/lge/mako/BoardConfig.mk
|
595ae2430e443b89ceb66085cc67e89554976603 |
|
10-Aug-2012 |
Jean-Baptiste Queru <jbq@google.com> |
fix build - specific TARGET_ARCH Change-Id: I104c6786c2f4135d77452d9b86e75c50b0a4b300
/device/lge/mako/BoardConfig.mk
|
25bb1062647ca40208390d68eee8860256a8918b |
|
01-Aug-2012 |
ty.lee <ty.lee@lge.com> |
audio: add separate audio Input path feature - Separate audio input path can be set using input source of audio parameter 1. Voice Recognition 2. Camcording 3. etc. Change-Id: I7eaf250df98cdfd8a208d243da277756bf5ee36a
/device/lge/mako/BoardConfig.mk
|
dcb0fdc8191e94ee1742ee663ecbac1695102f8c |
|
01-Aug-2012 |
ty.lee <ty.lee@lge.com> |
audio: add Dual MIC scenario in call feature - Dual MIC solution(Fluence) is used in Built-in MIC used call scenarioes. 1. Handset 2. 3-Pole Headphones Change-Id: Ic6998bfe94908826a75adb89cf386a0df4ee5256
/device/lge/mako/BoardConfig.mk
|
a339e742827be76d6d17b2d34af84684aced54e3 |
|
02-Aug-2012 |
Doug Zongker <dougz@google.com> |
set mako ramdisk location with mkbootimg argument Bug: 6918260 Change-Id: Ic684ec0552f717b1cb72e39a45edee282d65cae3
/device/lge/mako/BoardConfig.mk
|
26a573069073a5bd6c995cd8fa2e6c1f5ae00d97 |
|
28-Jul-2012 |
Sungmin Choi <sungmin.choi@lge.com> |
mako: enable portable WiFi hotspot (AP) feature Change-Id: I581d17b173b33402044a5f88be979d8eaf0f572a
/device/lge/mako/BoardConfig.mk
|
4cf2819b00a73c3a488934e3b07b69de4a6cf5e4 |
|
19-Jul-2012 |
Sungmin Choi <sungmin.choi@lge.com> |
mako: add recovery_ui - toggle: power + volume up - up: volume up - down: volume down - select: power Change-Id: Iafc903d7db8678a1953a5984f2881afedebde885
/device/lge/mako/BoardConfig.mk
|
40cb771b82cfcbcb9e7f012978df7cb6ca872e4e |
|
13-Jul-2012 |
kibum.lee <kibum.lee@lge.com> |
mako: change userdata size and system size Change-Id: Id8ce4f18085df169e4436db8730596385189f9f2
/device/lge/mako/BoardConfig.mk
|
6a2ca5a2f570d4327c5909332ce584334feb73cf |
|
13-Jul-2012 |
jeonghoon.lim <jeonghoon.lim@lge.com> |
mako: bluetooth: bring up - top-level init.mako.bt.sh script calls hci_qcomm_init to initialize bluetooth - modified BoardConfig.mk, device.mk, init.mako.rc. ueventd.mako.rc to add bring up code (remove qcom property for smd) Change-Id: Id97080655696676c02fea93138eb819b1ee1a4b9 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
ae8ab6facb6db72afd3bcf8240e75164c78a02c7 |
|
11-Jul-2012 |
Devin Kim <dojip.kim@lge.com> |
mako: update board-info.txt - fix the name - add board-info.txt BUG Issue#: 6809106 Change-Id: I0b65047fe29794a86cf95a430d0b8856d6fd356e
/device/lge/mako/BoardConfig.mk
|
e11440916444c957794664c6d85852e83e4df823 |
|
16-Jun-2012 |
Ajay Dudani <adudani@codeaurora.org> |
mako: include GPS hal and supporting libs Signed-off-by: Iliyan Malchev <malchev@google.com> Change-Id: I133c6d3bda965c3580c7ceabd98f10f79631d64c
/device/lge/mako/BoardConfig.mk
|
b3f2b96e9a6cc2a4b939a750b277d0bb635b1c6f |
|
09-Jul-2012 |
Ajay Dudani <adudani@codeaurora.org> |
mako: enable camera and include camera hal libs Change-Id: I5a18bc1990eaa7d90bfcb3c16d6354c40c513c9e
/device/lge/mako/BoardConfig.mk
|
fd4248f8639b3985ff3df85a011c31908af88837 |
|
06-Jul-2012 |
Iliyan Malchev <malchev@google.com> |
Revert "mako: increase vmalloc size to 400M" Problem was tracked down to a PMD kernel bug solved by the following commit: commit 4c3250d6daee2ff56ee6c23a0c45fed29c2fa86c Author: Devin Kim <dojip.kim@lge.com> Date: Thu Jul 5 20:30:53 2012 -0700 ARM: 7438/1: fill possible PMD empty section gaps cherry-picking from kernel v3.5 On ARM with the 2-level page table format, a PMD entry is represented by two consecutive section entries covering 2MB of virtual space. However, static mappings always were allowed to use separate 1MB section entries. This means in practice that a static mapping may create half populated PMDs via create_mapping(). Since commit 0536bdf33f (ARM: move iotable mappings within the vmalloc region) those static mappings are located in the vmalloc area. We must ensure no such half populated PMDs are accessible once vmalloc() or ioremap() start looking at the vmalloc area for nearby free virtual address ranges, or various things leading to a kernel crash will happen. Change-Id: I4936a18717d9fce5921f0399ef60cfdcd0ba6100 Signed-off-by: Nicolas Pitre <nico@linaro.org> Reported-by: Santosh Shilimkar <santosh.shilimkar@ti.com> Tested-by: "R, Sricharan" <r.sricharan@ti.com> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Cc: stable@vger.kernel.org Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk> This reverts commit 5aff7394029fe4cad493620eb2ac0ec7f5578524.
/device/lge/mako/BoardConfig.mk
|
5aff7394029fe4cad493620eb2ac0ec7f5578524 |
|
05-Jul-2012 |
Ajay Dudani <adudani@codeaurora.org> |
mako: increase vmalloc size to 400M Change-Id: Ib1ef37ce7d50af62ba9e7a4f131ef088e06a5f58
/device/lge/mako/BoardConfig.mk
|
5d4f9f819b8e8c1c77061b4ca42a7dac83c25b45 |
|
21-Jun-2012 |
Ajay Dudani <adudani@codeaurora.org> |
mako: enable bluetooth flag again Checked that builds properly after cleaning. Change-Id: Iba5c09769e626138b47b99ed0f4935345312ba47
/device/lge/mako/BoardConfig.mk
|
2a2159c153cba591ac97e75c0a9a01281eee23cc |
|
22-Jun-2012 |
Iliyan Malchev <malchev@google.com> |
mako: remove BOARD_USES_GENERIC_AUDIO Change-Id: I43870de66e5ac03b97baefa50ad887a4ab146858 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
79da7e3e76e4ef7d1a889cbca5a77eb50c5c4a14 |
|
21-Jun-2012 |
Iliyan Malchev <malchev@google.com> |
Revert "mako: enable bluetooth flag" This reverts commit 027d62d79ad42fb83e9586a9b1d48a8e93ed0131
/device/lge/mako/BoardConfig.mk
|
027d62d79ad42fb83e9586a9b1d48a8e93ed0131 |
|
21-Jun-2012 |
Ajay Dudani <adudani@codeaurora.org> |
mako: enable bluetooth flag Change-Id: I559f09ac1f8a73e7f835e60bb6b8d3070a7e86fe
/device/lge/mako/BoardConfig.mk
|
950314ecb693e1af9c9aedad589c91a05d3c2bbc |
|
17-Jun-2012 |
Ajay Dudani <adudani@codeaurora.org> |
Add default recovery.fstab and set recovery pixel format to RGBX_8888 Change-Id: Ie4d72a16563affb0ece0187a6f2b46e85b838fc4
/device/lge/mako/BoardConfig.mk
|
e011ca2818910872ab40002ac8ec09d3a6a70a8e |
|
14-Jun-2012 |
Iliyan Malchev <malchev@google.com> |
mako: enable WiFi in STA mode (no AP or P2P) Change-Id: Icf7cfafaf42450bf80495cadf13cabc3a69e03b7 Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
fefe23cb22e507810482bf685c7af343879274c6 |
|
08-Jun-2012 |
Iliyan Malchev <malchev@google.com> |
initial mako support Change-Id: I5c364ced5b26c5c6d8f51f87146d5ec4484586ae Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
|
da90dca88922d45da17ca99bf872c5a799668160 |
|
06-Jun-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Make full_mako "real" Diverge into the emulator at a lower level Change-Id: I8ba74b89151f788a9a747473ca8f4935de4f6c03
/device/lge/mako/BoardConfig.mk
|
f71ec4b9fb967741a53e3c914ba4e388064a2177 |
|
06-Jun-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Skeleton makefiles Change-Id: I76685c1659adb1492835e19ce6075b00442ebfe9
/device/lge/mako/BoardConfig.mk
|