History log of /device/lge/mako/BoardConfig.mk
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
e2e2214be83b74efbebca6eba45adf3690900bf8 11-Aug-2014 Alex Light <allight@google.com> Enable WITH_DEXPREOPT on devices where it is possible

Change-Id: I0ea9768f801865f95f2774b8377cc8f3d75e30bf
(cherry picked from commit ecebdcb6773931f08ee6bb4fbcee2320b06bfb12)
/device/lge/mako/BoardConfig.mk
69c4f825690f9885bc46b6628b03ab53b1cb28f8 11-Aug-2014 Alex Light <allight@google.com> Enable WITH_DEXPREOPT_BOOT_IMG_ONLY to support partial preopting

Bug: 16938924

Change-Id: Iadf3235cbd93375b8c3b89faa07d7d6c42cd6fb0
(cherry picked from commit 5ee6dc2752f887550cde7134d1b94e4264b1bc2a)
/device/lge/mako/BoardConfig.mk
f3b869456e10857a0797b25bf34314f9333ec195 10-Jul-2014 Christopher Ferris <cferris@google.com> Indicate this uses dlmalloc.

Change-Id: Id56ba712bb89df46580e18848a34dcfc17e2b883

Conflicts:
BoardConfig.mk
/device/lge/mako/BoardConfig.mk
5dbc242d60275be8276b4485771e5a6d762e5c61 10-Jul-2014 Raph Levien <raph@google.com> Enable larger selection of fonts on Mako

In particular, we need Sinhala on occam_l10n builds. We can revisit the
decision later of which existing devices should get expanded font
coverage and which should just match K.

Change-Id: I79ac1c9fdc2781b7ce686599a448da788c04bcec
/device/lge/mako/BoardConfig.mk
4561d883f1a205a31e79039eb8188706f256769b 06-Jun-2014 Devin Kim <dojip.kim@lge.com> Create cache image

Change-Id: Iaf4e85be60a972f7ed19730aa8330a95dcb3814f
/device/lge/mako/BoardConfig.mk
26558af67fc0f0b981d507e16b5b730947d090ad 20-Jun-2014 Nick Kralevich <nnk@google.com> am 09a5b6a6: am f3eb2e85: am dab56950: Merge "SELinux: Address new rmt denials"

* commit '09a5b6a6167e8f3b8083ac3ec2c8f78dd88868cc':
SELinux: Address new rmt denials
09a5b6a6167e8f3b8083ac3ec2c8f78dd88868cc 20-Jun-2014 Nick Kralevich <nnk@google.com> am f3eb2e85: am dab56950: Merge "SELinux: Address new rmt denials"

* commit 'f3eb2e85edfaf7ef594c2f2537d52f3d9c07ccbd':
SELinux: Address new rmt denials
e65b1ede3b10c48af9ccd792ea332b4de1f32571 20-Jun-2014 Robert Craig <rpcraig@tycho.ncsc.mil> SELinux: Address new rmt denials

Allow rmt to access property service. This patch fixes the
following denials.

<4>[ 3.747352] type=1400 audit(36625606.601:4): avc: denied { write } for pid=171 comm="rmt_storage" name="property_service" dev="tmpfs" ino=6178 scontext=u:r:rmt:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file
<4>[ 3.747657] type=1400 audit(36625606.601:5): avc: denied { connectto } for pid=171 comm="rmt_storage" path="/dev/socket/property_service" scontext=u:r:rmt:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
<4>[ 3.880878] avc: denied { set } for property=ctl.rmt_storage scontext=u:r:rmt:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=property_service

Change-Id: Iea5dcb405db8b16b69c9851095d8b5666a3c6a22
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
42b272b2842057bde8332b96dff2cd73d508efb1 31-Jan-2014 Stephen Hines <srhines@google.com> DO NOT MERGE: Disable GPU RS driver due to AOSP incompatibility.

This change will necessitate a rebuilt GPU driver:
https://android-review.googlesource.com/80951

Change-Id: I70a0b43165b1166538facf15576d3df7185fda0a
/device/lge/mako/BoardConfig.mk
9519276b72ca1ec5502a56eaf140dd10054b106e 15-Mar-2014 Brian Carlstrom <bdc@google.com> Merge "Revert mako to kernel logging to workaround prebuilt issue DO NOT MERGE"
/device/lge/mako/BoardConfig.mk
8b15fef6ee2caf45be4d9360ec29fc4ef3028220 31-Jan-2014 Stephen Hines <srhines@google.com> DO NOT MERGE: Disable GPU RS driver due to AOSP incompatibility.

This change will necessitate a rebuilt GPU driver:
https://android-review.googlesource.com/80951

Change-Id: I70a0b43165b1166538facf15576d3df7185fda0a
/device/lge/mako/BoardConfig.mk
b5782380446019cb0498da6bc348e27417e0f46a 01-Apr-2014 Doug Zongker <dougz@android.com> remove custom recovery UI for mako

All its functionality is now in the default UI.

Change-Id: I29f23ba51821bc99ed3283f411b4e264dbbb4ff3
/device/lge/mako/BoardConfig.mk
cf6964cb3513eb86f7760015ee55fd72b52ccbf6 10-Mar-2014 Nick Kralevich <nnk@google.com> am 3f7443e8: Merge "SELinux: Allow hostapd to read wifi data files under /persist."

* commit '3f7443e84bf448b0bb95645938b1651692b0e1e9':
SELinux: Allow hostapd to read wifi data files under /persist.
7d74efb6558dd0d1eb60f93488f9ffb384a3a259 06-Mar-2014 Robert Craig <rpcraig@tycho.ncsc.mil> SELinux: Allow hostapd to read wifi data files under /persist.

Addresses the following denials:
avc: denied { search } for pid=9143 comm="hostapd" name="wifi" dev="mmcblk0p16" ino=12 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=dir
avc: denied { getattr } for pid=9143 comm="hostapd" path="/persist/wifi/.macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file
avc: denied { read } for pid=9143 comm="hostapd" name=".macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file
avc: denied { open } for pid=9143 comm="hostapd" name=".macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file

Change-Id: I5d84b3eb7a7d1dada1fa74f111aa6140acb921b6
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
3a178f7ad3af8b4db26536b4f1842e21c427ba94 21-Feb-2014 Nick Kralevich <nnk@google.com> am 41ab406d: Merge "Move SELinux diag_device policy to userdebug/eng."

* commit '41ab406d30620c2a55ae49db7365256fa85c17e8':
Move SELinux diag_device policy to userdebug/eng.
39c769d8f589d7471a76a5b71faaf15878d5384a 21-Feb-2014 Robert Craig <rpcraig@tycho.ncsc.mil> Move SELinux diag_device policy to userdebug/eng.

Also just remove all specific domain access and instead
allow diag_device access for all domains on the
userdebug/user builds.

Change-Id: If41fc97e10243fd53f5fcd9183a3ff3f5142b1c2
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
898668a72de320f1556c3e435ec4969fcca8e27b 31-Jan-2014 Stephen Hines <srhines@google.com> DO NOT MERGE: Disable GPU RS driver due to AOSP incompatibility.

This change will necessitate a rebuilt GPU driver:
https://android-review.googlesource.com/80951

Change-Id: I70a0b43165b1166538facf15576d3df7185fda0a
/device/lge/mako/BoardConfig.mk
955b92050c2908295dcc469575055f05cec3b428 12-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Move gpu_device type and rules to core policy.

Change-Id: I3ce0b4bd25e078698a1c50242aaed414bf5cb517
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/device/lge/mako/BoardConfig.mk
988038ce9e3e5482b4169d9fd506704b0a2cfc01 26-Nov-2013 Nick Kralevich <nnk@google.com> Merge "Resolve new selinux denials."
381b2e0a0d6f33fb7c277f57efdc3a74bfb5c7cc 22-Nov-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Resolve new selinux denials.

* Add tee policy. Label /data/misc/playready and
allow tee access to persist file system.
denied { read } for pid=265 comm="qseecomd" name="/" dev="mmcblk0p23" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { open } for pid=265 comm="qseecomd" name="/" dev="mmcblk0p23" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { write } for pid=265 comm="qseecomd" name="misc" dev="mmcblk0p23" ino=313873 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { add_name } for pid=265 comm="qseecomd" name="playready" scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { create } for pid=265 comm="qseecomd" name="tzdrm.log" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file
denied { read write open } for pid=265 comm="qseecomd" name="tzdrm.log" dev="mmcblk0p23" ino=313909 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file
denied { create } for pid=221 comm="qseecomd" name="playready" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
denied { write } for pid=221 comm="qseecomd" name="playready" dev="mmcblk0p23" ino=313907 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
denied { add_name } for pid=221 comm="qseecomd" name="logs" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
denied { search } for pid=241 comm="qseecomd" name="widevine" dev="mmcblk0p20" ino=13 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=dir
denied { getattr } for pid=241 comm="qseecomd" path="/persist/widevine/5dsokxEEDXgQhkN50bp-Z2K5InM_/RXFABDUxyT6Q+Zwx9ZhPGOq2Bq8_" dev="mmcblk0p20" ino=20 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=file
denied { read } for pid=269 comm="qseecomd" name="RXFABDUxyT6Q+Zwx9ZhPGOq2Bq8_" dev="mmcblk0p20" ino=20 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=file
denied { open } for pid=269 comm="qseecomd" name="RXFABDUxyT6Q+Zwx9ZhPGOq2Bq8_" dev="mmcblk0p20" ino=20 scontext=u:r:tee:s0 tcontext=u:object_r:persist_drm_file:s0 tclass=file

* Allow system_server (ActivityManager) access to radio nodes
denied { read } for pid=656 comm="ActivityManager" name="mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
denied { open } for pid=656 comm="ActivityManager" name="mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
denied { getattr } for pid=656 comm="ActivityManager" path="/dev/mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
denied { ioctl } for pid=656 comm="ActivityManager" path="/dev/mdm" dev="tmpfs" ino=8302 scontext=u:r:system_server:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file

* Allow system_server to create netlink sockets
denied { create } for pid=657 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket
denied { bind } for pid=657 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket
denied { write } for pid=1241 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket
denied { read } for pid=1238 comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_socket

* Allow all apps r/w access to the world writable gpu device by making
the gpu_device a trusted object.
denied { write } for pid=3460 comm="ense_free.menus" name="kgsl-3d0" dev="tmpfs" ino=7606 scontext=u:r:untrusted_app:s0:c92,c256 tcontext=u:object_r:gpu_device:s0 tclass=chr_file

* Add dontaudit for rmt_storage to /dev/mem. The denials
just flood the logs.

Change-Id: Ic4f220a521caa6fa9d4d119f22e0e6d378bbc562
/device/lge/mako/BoardConfig.mk
de17b830150df80ea228ec1691be41013f188536 22-Nov-2013 The Android Open Source Project <initial-contribution@android.com> Merge commit 'f547c30cd56dbd10b7149d9d7d85a6845bf3c08b' into HEAD
e10afca46d00954fc36ad45f86a9b72df41b20db 12-Nov-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Cleanup selinux policy.

Drop rules and labels that are no longer needed
or supported.

* qseecom_device, bcm2079x_device, msm_acdb_device are not used. Each has
already been replaced with a proper label with a prior patch.

* drop bluetooth to smd_device policy. The dev node is actually hci_attach_dev
and generic policy handles it already.

* drop drmserver access to qseecom_device and sdcard_external. qseecom_device
was relabeled as tee_device and the generic policy already handles it.
sdcard_external was used before the /persist filesystem was correctly
labeled.

* drop keystore access to qseecom_device. qseecom_device was relabeled
as tee_device in a prior patch a the generic policy handles it.

* drop mediaserver access to msm_acdb_device. msm_acdb_device was audio_device
in a prior patch and the generic policy handles it.

* drop nfc access to bcm2079x_device. THis was relabeld asd nfc_device
in a prior change and generic policy handles it.

* drop wpa access to devpts. Since we dropped the logwrapper call in
init.mako.rc this access is no longer needed.

* drop init_shell policy.

Change-Id: I31ef4d2fcb07e047c07ebbab9a76df8c2e655271
/device/lge/mako/BoardConfig.mk
5d10f3720ee64b823a75624e3ab97a25847408e3 15-Oct-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Improve bluetooth selinux policy.

Removed the unconfined domain and addressed
the following denials.

* Allow bluetooth to run init.mako.bt.sh
denied { entrypoint } for pid=2812 comm="init" path="/system/bin/mksh" dev="mmcblk0p21" ino=208 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:shell_exec:s0 tclass=file
denied { read } for pid=2812 comm="sh" path="/system/bin/mksh" dev="mmcblk0p21" ino=208 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:shell_exec:s0 tclass=file
denied { open } for pid=2812 comm="sh" name="init.mako.bt.sh" dev="mmcblk0p21" ino=341 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_loader_exec:s0 tclass=file
denied { getattr } for pid=2818 comm="sh" path="/system/bin/bdAddrLoader" dev="mmcblk0p21" ino=126 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_loader_exec:s0 tclass=file
denied { execute_no_trans } for pid=2818 comm="sh" path="/system/bin/bdAddrLoader" dev="mmcblk0p21" ino=126 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_loader_exec:s0 tclass=file

* init.mako.bt.sh needs /system/bin/log access
denied { read write } for pid=2823 comm="logwrapper" name="0" dev="devpts" ino=3 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file
denied { open } for pid=2823 comm="logwrapper" name="0" dev="devpts" ino=3 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file

* Read mac address from persist partition
denied { search } for pid=185 comm="bdAddrLoader" name="bluetooth" dev="mmcblk0p20" ino=12 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:persist_bluetooth_file:s0 tclass=dir
denied { read } for pid=185 comm="bdAddrLoader" name=".bdaddr" dev="mmcblk0p20" ino=16 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:persist_bluetooth_file:s0 tclass=file
denied { open } for pid=185 comm="bdAddrLoader" name=".bdaddr" dev="mmcblk0p20" ino=16 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:persist_bluetooth_file:s0 tclass=file

* Talk to init over the property socket and set persist.service.bdroid.*
and bluetooth.* property values
denied { write } for pid=185 comm="bdAddrLoader" name="property_service" dev="tmpfs" ino=7198 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { set } for property=persist.service.bdroid.bdaddr scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=property_service

* Allow toolboxes getprop/setprop from init.mako.bt.sh script
denied { execute_no_trans } for pid=2813 comm="sh" path="/system/bin/toolbox" dev="mmcblk0p21" ino=287 scontext=u:r:bluetooth_loader:s0 tcontext=u:object_r:system_file:s0 tclass=file

Added a domain_auto_trans to run hci_qcomm_init and
then addressed the following denials.

* denied { use } for pid=1257 comm="hci_qcomm_init" path="/system/bin/linker" dev="mmcblk0p21" ino=192 scontext=u:r:hci_attach:s0 tcontext=u:r:bluetooth_loader:s0 tclass=fd

Lastly, changed hci_qcomm_init's type from hci_exec to hci_attach_exec.
hci_attach_exec already lives out in generic policy for this purpose
and allows us to drop the hci_init.te policy here.

Change-Id: I63b29f0708fd72ec26090f51a3db6c002ecae738
/device/lge/mako/BoardConfig.mk
44b01ababb3c11c31ec04a1990855513348871ce 08-Oct-2013 Nick Kralevich <nnk@google.com> am 20b86b07: Merge "Complete qmux selinux policy."

* commit '20b86b0714a4f757aa86e3e59679c52f4e0840ea':
Complete qmux selinux policy.
5d98167a758eb5d410119d00ab0043d762c9db21 08-Oct-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Complete qmux selinux policy.

First, relabeled qmux socket directories using a common label
which helped reduce the number of labels policy writers had to
follow. Then, introduced a macro to allow domains to easily
create and connect to qmux sockets under each qmux directory.
The macro creates a new type for each domain requesting a
qmux socket independent of the actual directory location.
Having a derived type from the creator of each socket will
slightly increasing the total number of new types, but this
will also ensure that each domain can only delete their own
created socket. The following class of denials are addressed
by this switch.

denied { write } for pid=176 comm="mediaserver" name="qmux_connect_socket" dev="tmpfs" ino=6888 scontext=u:r:mediaserver:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
denied { connectto } for pid=176 comm="mediaserver" path="/dev/socket/qmux_audio/qmux_connect_socket" scontext=u:r:mediaserver:s0 tcontext=u:r:qmux:s0 tclass=unix_stream_socket

Removed the unconfined constraint from qmux policy and
addressed the following denials.

* Allow qmux to create a connect socket under each
/dev/socket/qmux_* directory.
denied { write } for pid=179 comm="qmuxd" name="qmux_radio" dev="tmpfs" ino=7607 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir
denied { add_name } for pid=179 comm="qmuxd" name="qmux_connect_socket" scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir
denied { remove_name } for pid=179 comm="qmuxd" name=716D75785F636C69656E745F736F636B657420202020313730 dev="tmpfs" ino=5261 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir
denied { create } for pid=179 comm="qmuxd" name="qmux_connect_socket" scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
denied { setattr } for pid=179 comm="qmuxd" name="qmux_connect_socket" dev="tmpfs" ino=6656 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
denied { getattr } for pid=179 comm="qmuxd" path=2F6465762F736F636B65742F716D75785F726164696F2F716D75785F636C69656E745F736F636B657420202020313730 dev="tmpfs" ino=5261 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
denied { unlink } for pid=179 comm="qmuxd" name=716D75785F636C69656E745F736F636B657420202020313730 dev="tmpfs" ino=5261 scontext=u:r:qmux:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file

* Node access to radio_device (/dev/hsicctl*)
denied { read write } for pid=179 comm="qmuxd" name="hsicctl0" dev="tmpfs" ino=5227 scontext=u:r:qmux:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
denied { open } for pid=179 comm="qmuxd" name="hsicctl0" dev="tmpfs" ino=5227 scontext=u:r:qmux:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file

* Allow logging diagnostic items to /dev/diag
denied { read write } for pid=179 comm="qmuxd" name="diag" dev="tmpfs" ino=7277 scontext=u:r:qmux:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file
denied { open } for pid=179 comm="qmuxd" name="diag" dev="tmpfs" ino=7277 scontext=u:r:qmux:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file

* Wake lock access
denied { append } for pid=179 comm="qmuxd" name="wake_lock" dev="sysfs" ino=57 scontext=u:r:qmux:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file
denied { open } for pid=180 comm="qmuxd" name="wake_lock" dev="sysfs" ino=57 scontext=u:r:qmux:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file

Change-Id: Icba85b2cc727e6743b32e775a49d29c77fb6dc61
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
036f77ea7585af00a29aa6cf03d58a07434c931a 04-Oct-2013 Iliyan Malchev <malchev@google.com> am 1c59be22: mako: enable kernel user_debug traces

* commit '1c59be22ec10cd1f8549987a07db00c92f8152a6':
mako: enable kernel user_debug traces
1c59be22ec10cd1f8549987a07db00c92f8152a6 03-Oct-2013 Iliyan Malchev <malchev@google.com> mako: enable kernel user_debug traces

To help debugging b/10920955 - N4 runtime crashed in a phone call (twice)

Change-Id: Ifeb9c26a7ca8228bfa82fcd057058c2878014aed
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
39b7ddb4ed03b8c4e7cddd6dd2a989d7c49fa2c4 26-Sep-2013 Nick Kralevich <nnk@google.com> am 6168600e: Merge "Improve sepolicy labeling and domain confinement."

* commit '6168600ef47361aef9d0c522737634a85a34584e':
Improve sepolicy labeling and domain confinement.
3370c7953eb2d1559f5c66a2f6010573d7fe9b9a 26-Sep-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Improve sepolicy labeling and domain confinement.

* Move certain services out of inits domain.
inits domain is unconfined and we should
be limiting those services that need to
run in inits context. For the new domains
introduced, keep them permissive and unconfined
for now until future policy work will individually
drop these constraints.

* Add context option to fstab when mounting
the firmware partition. This will ensure
proper labeling and not use the default vfat
label of sdcard_external.

* Use concatenation versus assignment when making
policy declarations inside BoardConfig.mk. This
will allow sepolicy to exist in the vendor
directory.

Change-Id: I93c7413bf2a8ceb7589f059e754c4b2a787fdbaf
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/device/lge/mako/BoardConfig.mk
0069999821e6933c46790ea7373e68e4fb41e457 18-Sep-2013 Alex Klyubin <klyubin@google.com> Remove the unnecessary compatibility.te.

We are mostly running in per-domain permissive mode right now, so
these compatibility rules are unnecessary.

(cherry picked from 443fe30e313c3f9f0a07d00da63a67d15e0b2f37)

Change-Id: Ic32e1b6d1192ba810b344ef4e1653142cc886bdd
/device/lge/mako/BoardConfig.mk
f77c13ec3ddefe2baed2c879c0bac219589a149d 18-Sep-2013 Alex Klyubin <klyubin@google.com> resolved conflicts for merge of 1357ad8f to klp-dev-plus-aosp

Change-Id: I10227118f9bf82f6f1ddc2ea31b7310ca40a4e41
63eea9a7d31f67dffaec22a61d2cc5e0bfd4a0f9 14-Sep-2013 Alex Klyubin <klyubin@google.com> Rename domain "system" to "system_server".

Now that the "system" domain is just about the system_server, it's
clearer if the domain is called "system_server".

This CL depends on the renaming in external/sepolicy performed in
https://android-review.googlesource.com/#/c/65502/.

Change-Id: I90a6850603dcf60049963462c5572d36de62bc00
/device/lge/mako/BoardConfig.mk
e3c12c4a7af69abe7406c6ba087361f6423d1a84 08-Sep-2013 Iliyan Malchev <malchev@google.com> mako: set OVERRIDE_RS_DRIVER

Change-Id: Id9f4ff1ae6bdc9195f34999a0df6e364a2d25ffa
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
4015ba27d8c87e5a2d445a0d07088a43cbd87109 04-Sep-2013 Iliyan Malchev <malchev@google.com> mako: set HAVE_ADRENO_SOURCE to false

Change-Id: I9e7cb8923bbb827550eed59da3281e16b8edc482
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
5c7f47291f64b72763a70ac1204de84dc1e9d5cb 14-Aug-2013 Todd Poynor <toddpoynor@google.com> mako: dumpstate: switch to HAL static lib

Change-Id: I106d257aadab9c133dfc2991e4b4eace08820581
/device/lge/mako/BoardConfig.mk
443fe30e313c3f9f0a07d00da63a67d15e0b2f37 14-Jul-2013 Nick Kralevich <nnk@google.com> Revert "Add compatibility.te."

We are mostly running in per-domain permissive mode right now,
so these compatibility rules are unnecessary.

This reverts commit 78ae7c8c2fab9c759fef7775770f91c9a2fbc75f.
/device/lge/mako/BoardConfig.mk
b1ddcbeb2285e04694a0d96a33e175303f3042ab 15-May-2013 gcondra@google.com <gcondra@google.com> am 3157f134: am a8c369db: Merge changes I43edfacb,Id609fa85 into jb-mr2-dev

* commit '3157f134f3a1fe712afa375212eb0553016f11f0':
Move domains to permissive.
Add compatibility.te.
78ae7c8c2fab9c759fef7775770f91c9a2fbc75f 14-May-2013 repo sync <gcondra@google.com> Add compatibility.te.

This file is a clearinghouse for autogenerated policy derived from
denials seen in the wild. The goal is to reduce it to 0 over time.

Change-Id: Id609fa8536a190c46cab7c00e6fbb3a3b6215b2f
/device/lge/mako/BoardConfig.mk
e1f32aef38527675c54bd79c47a0d3751e6d969c 11-May-2013 Iliyan Malchev <malchev@google.com> mako: enable USE_DEVICE_SPECIFIC_QCOM_PROPRIETARY

Change-Id: Idfe609ecb3ecfecb5016a7b499dc09eb10cfe7c9
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
b9fd377b68e8026edca9c17b025f4bbed5450c67 09-May-2013 repo sync <gcondra@google.com> Allow read access to the fds handed out by ashmem.

Change-Id: If1df4788dbdf3de5f2d7dd1e9df63fe191494d92
/device/lge/mako/BoardConfig.mk
39f20052a34b9df18a2e2c5d91c51331bf5ffc4c 07-May-2013 repo sync <gcondra@google.com> Last occam denials.

Some of this should be solved in other ways. In particular, in the
future /persist and friends should be labelled appropriately.

Change-Id: I90201d27e42c0f26ebcbea94e1833927f12003c5
/device/lge/mako/BoardConfig.mk
93bbc93c99e356ac5d19d59cf8301623612375be 06-May-2013 repo sync <gcondra@google.com> Resolve remaining occam denials before boot.

Change-Id: Id52d0e57da10c5b7edd77e52e73ac84a874c8064
/device/lge/mako/BoardConfig.mk
591967cf1e699277ad362664e8d2fbbf366a3c26 03-May-2013 repo sync <gcondra@google.com> Add policy for kickstart.

Change-Id: If5712bd8665cccf76d8ca3555ca2906f6ead2d32
/device/lge/mako/BoardConfig.mk
fcebeb3108e93397f7a843e1ac4a5d09233a8289 02-May-2013 Alex Klyubin <klyubin@google.com> SELinux policy for Qualcomm MSM Audio ACDB device.

The device is /dev/msm_acdb.

Change-Id: I6494ab177521aba9f424048b14c32855bdf4b537
/device/lge/mako/BoardConfig.mk
72021bbe4d683f0d271c02580c70cd0a17484133 02-May-2013 repo sync <gcondra@google.com> Add bcm2079x_device policy.

Change-Id: Iff5b2062c0e92c91d6ace8a04510008cbcadfd12
/device/lge/mako/BoardConfig.mk
10076f7999899695f0f6cb97eada8311440f759f 02-May-2013 repo sync <gcondra@google.com> Add policy support for the qmux sockets.

Change-Id: I7f1b1d26693dc5d4ed63f4b32e5538cec1dd9093
/device/lge/mako/BoardConfig.mk
e65bf8d1da1b4a5177869082d0db01c4eaa44f13 01-May-2013 repo sync <gcondra@google.com> Add policy support for /dev/diag

Change-Id: I4f19adec0f5b41051e7cb662f8a182a2fc3f6298
/device/lge/mako/BoardConfig.mk
b00f6d05113828ff21ec73070653e1d4d7f736e1 01-May-2013 repo sync <gcondra@google.com> Add policy to handle errors encountered in testing.

Change-Id: I6854ff74627c1546c7f8c6265b1f55d715d8b2a6
/device/lge/mako/BoardConfig.mk
400bf83d4ec60360952252425431f1ea8e28fea8 26-Apr-2013 Geremy Condra <gcondra@google.com> Merge "Grant Keystrore and DRM services access to /dev/qseecom." into jb-mr2-dev
841326466aa6e87a92d5dadffe05a57952fb1d01 26-Apr-2013 Alex Klyubin <klyubin@google.com> Grant Keystrore and DRM services access to /dev/qseecom.

/dev/qseecom is the Qualcomm Secure Execution Environment
Communicator (QSEECOM) device.

Change-Id: Id4184a02451f2ea6788ad576fe3b6281cf965e72
/device/lge/mako/BoardConfig.mk
c6442fe9e63ab20d354837a5a35be97f0953a779 26-Apr-2013 repo sync <gcondra@google.com> Allow ueventd to read from the sdcard.

Change-Id: I626fe51974528649fb0c39d11ba03a14a341c5b4
/device/lge/mako/BoardConfig.mk
1fc9172689ce05a99e28db15d068588bb437b4b7 26-Apr-2013 Alex Klyubin <klyubin@google.com> SELinux whitelist for GPU (/dev/kgsl-3d0) access on mako.

The GPU appears to be used by most UI-based apps as well as a couple
of UI-less entities, such as PowerManagerService and SurfaceFlinger.

Change-Id: I1060001c226f6a0cfc88a97efd236a3d626e02d1
/device/lge/mako/BoardConfig.mk
bb3ca8d4cd0b53c7b27499d0e5ee826be0c521ce 03-Apr-2013 Geremy Condra <gcondra@google.com> Add base device-specific SELinux policy.

Change-Id: I50da503d6bbf445b4c116104cf00821a0fa4040e
/device/lge/mako/BoardConfig.mk
3d4d689d3ff6006f9c91fba35ba76ba155a7cd15 28-Mar-2013 Iliyan Malchev <malchev@google.com> Revert "Disable device specific camera."

This reverts commit 98536c61b80e2b0c25968d320eb8e69e4ddb8847.

vendor/lge/mako/camera was missing liboemcamera

Bug: 8497780
Change-Id: I715d767f5261766958cd594b207e6822c3f99be6
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
98536c61b80e2b0c25968d320eb8e69e4ddb8847 28-Mar-2013 Vineeta Srivastava <vsrivastava@google.com> Disable device specific camera.

Bug: 8497780
Change-Id: Ibc7e9aebbde5856969c052c13af6fb0262280b7c
/device/lge/mako/BoardConfig.mk
6d01645739c75116d8940772b80d5b7aba5c39d6 28-Mar-2013 Iliyan Malchev <malchev@google.com> mako: move camera HAL from hardware/qcom/camera, DO NOT MERGE

Change-Id: Ib76c01a8ce47dd17c4e5c986e5988c2ad1c61906
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
b7f574cfc1d1db2771684f3bd927dba664b1cecb 23-Mar-2013 Elliott Hughes <enh@google.com> am 7256507c: am 4329cd17: Merge "Remove unused lge/mako ARCH_ARM_HAVE_TLS_REGISTER."

* commit '7256507cd0ca3b472aa307f984da7a7bdf39b580':
Remove unused lge/mako ARCH_ARM_HAVE_TLS_REGISTER.
658692e1ba6ff38e3aa7a6f1c7b81a9870964eae 22-Mar-2013 insup.choi <insup.choi@lge.com> mako: camera: featuring fast autofocus

Change-Id: If920af7bd53dc91d8cebf1baadf47d7f62f109d8
/device/lge/mako/BoardConfig.mk
13e5cd17a13f85f5fed0ab419cc4de340711e970 22-Mar-2013 Elliott Hughes <enh@google.com> Remove unused lge/mako ARCH_ARM_HAVE_TLS_REGISTER.

Change-Id: I7d26582e20a7a0d31613280389bb7d764e279371
/device/lge/mako/BoardConfig.mk
c08d651d17b40bf2e202bd060487ff96dd8e0185 15-Mar-2013 Iliyan Malchev <malchev@google.com> mako: disable LGE's fast AF temporarily

Change-Id: I9055c158711ae84549fe2afb4f0075b2b63f027d
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
a66cdbdea8c4408583f23a9adefd7c284a765761 06-Feb-2013 Christopher Ferris <cferris@google.com> Adding TARGET_CPU_VARIANT to config file.

Merge from internal master.

Change-Id: I67d505f3101ac9397664e879185ecebf13baa3ae
/device/lge/mako/BoardConfig.mk
5197d28bf2e26e861d68d2a9fd8da0a0b55a3f96 06-Feb-2013 Christopher Ferris <cferris@google.com> Adding TARGET_CPU_VARIANT to config file.

Bug: 8005082
Change-Id: I7506a855b8e436fa4bafa2b70a0cb28663d40d56
/device/lge/mako/BoardConfig.mk
872b2ddba321171dd68707dc13abf930ee9ce210 22-Feb-2013 Ken Sumrall <ksumrall@android.com> Merge "Update unified fstab.mako to support recovery"
7edbad54e46792e65b2f80b37ef0767e0744c6f8 20-Feb-2013 Ken Sumrall <ksumrall@android.com> Update unified fstab.mako to support recovery

Add entries to the unified fstab needed by recovery.
Also, copy the unified fstab to /etc/recovery.fstab in the recovery
ramdisk.

Change-Id: I55a122643ef197361ef5308268bfdddf40ed915d
/device/lge/mako/BoardConfig.mk
1eee589393ed63cbcb0760d2e4ac844bfd299b46 09-Feb-2013 Iliyan Malchev <malchev@google.com> mako: switch to the new tinyALSA-based audio HAL

Change-Id: I5648840b93ebc49304fc995e6342ecef1f905c8d
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
60c5716b201470ab81dbb0394aba608f2e34a058 09-Feb-2013 Iliyan Malchev <malchev@google.com> Add BOARD_USES_LEGACY_ALSA_AUDIO, set to true

This switch controls whether the device uses the old (when true) or new audio
HAL (otherwise.)

Change-Id: I8098c1db2db46ea444bcc0e188943335420ade3d
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
d1749a18467a7b85693a1d8d97a4f3ece82aff39 30-Nov-2012 choongryeol.lee <choongryeol.lee@lge.com> mako: allow device to sleep in off-mode charging

In off-mode charging, the device need to go suspend mode
to reduce power consumption after charging completion.
This patch enable suspend mode in off-mode charging.

Bug: 7429504
Change-Id: I915f0d076c34680d2fbfd8e8b92adb65464b1600
/device/lge/mako/BoardConfig.mk
2531dc2baa23b11514be7941805ab6b7382d8020 23-Oct-2012 Iliyan Malchev <malchev@google.com> initial mako-specific dumpstate

Change-Id: I1255cc91817b8a0cdb191d09bc556d1aa086ae25
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
46deaee8efc0939f91b9bbb1e8bbea75a35c4cfc 11-Sep-2012 Devin Kim <dojip.kim@lge.com> mako: relocate ramdisk to avoid overlap with kernel

If some kernel debug features are enabled, ramdisk might be overlapped with
kernel. So increase the ramdisk offset by 1MB.

Bug: 7145409
Change-Id: Icb2d488e41d083ecb4e2e4947bd26b9c8a118e52
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
d6f025102afd73ffd62950de8df298060484b78e 11-Sep-2012 Sungmin Choi <sungmin.choi@lge.com> mako: add fast autofocus configuration

Change-Id: I19e5328f763973fd34c1902d2d90640b01a9b625
/device/lge/mako/BoardConfig.mk
7bd37b89b5a228082804b179a7fef8a653a6246f 11-Sep-2012 Iliyan Malchev <malchev@google.com> mako: wifi driver is no longer a module

Change-Id: Ib630c96476ee6fea823c3682c3481d63ce7d1f05
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
19bd907717410abe1f8b1d3470da1c5e1c0a17c8 10-Sep-2012 Jeff Johnson <jjohnson@codeaurora.org> mako: relocate ramdisk to avoid overlap with kernel

An upcoming change will statically link the Prima WLAN Driver with the
kernel. The current observation is that when this occurs, the kernel
will increase in size to the point that it will overlap with the
ramdisk, preventing the ramdisk from being mounted. In anticipation
of this, increase the ramdisk_offset so that the kernel with the
statically-linked Prima WLAN Driver will not overlap the ramdisk.

Change-Id: If5a0ffe67f6ba044690d602d5f04879a983a52b7
/device/lge/mako/BoardConfig.mk
f1f28ec60d5155338bc1d9970f8a1208fd6a9daa 16-Aug-2012 Sungmin Choi <sungmin.choi@lge.com> mako: add mdm thermal sensor configuration

Change-Id: I7148aae16167511802d1e6b50bc41ae0ea92a49c
/device/lge/mako/BoardConfig.mk
e64faf474d8d6ad9c35be483341b829111aed49f 21-Aug-2012 Jongrak Kwon <jongrak.kwon@lge.com> mako: partition change for 8G eMMC

boot: 22MB, recovery: 22M, system: 840M, user: about 5.9G

Change-Id: I0a64a7d9b2c413ca14829eeb3ece4a150e5e9132

Conflicts:

BoardConfig.mk
/device/lge/mako/BoardConfig.mk
9cb9ff305d8b8a4a9758b76887354b3d84393565 21-Aug-2012 Wink Saville <wink@google.com> Add support for per device bluetooth configuration.

Bug: 6837125
Change-Id: Icfcfa920416b3ddd89b3117505a7a526c438120d
/device/lge/mako/BoardConfig.mk
4d299b079b847177a07dc0ea5695b1c3449ec8bf 14-Aug-2012 Jeff Johnson <jjohnson@codeaurora.org> mako: Switch WLAN to wpa_supplicant_8

Change-Id: Ia61c41d6f600925637e92d013a5a6c3ebbfb6d4d
/device/lge/mako/BoardConfig.mk
0a3bd80d3b327b67e14f507a9feb3b52280ac7f9 15-Aug-2012 Jeonghoon lim <jeonghoon.lim@lge.com> mako: bluetooth: bring up with bluedroid stack

- remove some codes not to be used with bluedroid stack
- add a property to check initialization status of bluetooth
- remove the code to initialize hci_smd driver

Change-Id: I73aa66421ed42bf464f8901b1e0346a9c657c832
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
021796cb174851f5155b50c805b3331b89a84de6 14-Aug-2012 Doug Zongker <dougz@google.com> include bootloader in mako OTA

Bug: 6977989
Change-Id: Ie8b3ba1ad7abdf62891a2f186c98f92e9a498555
/device/lge/mako/BoardConfig.mk
595ae2430e443b89ceb66085cc67e89554976603 10-Aug-2012 Jean-Baptiste Queru <jbq@google.com> fix build - specific TARGET_ARCH

Change-Id: I104c6786c2f4135d77452d9b86e75c50b0a4b300
/device/lge/mako/BoardConfig.mk
25bb1062647ca40208390d68eee8860256a8918b 01-Aug-2012 ty.lee <ty.lee@lge.com> audio: add separate audio Input path feature

- Separate audio input path can be set using input source of audio parameter
1. Voice Recognition
2. Camcording
3. etc.

Change-Id: I7eaf250df98cdfd8a208d243da277756bf5ee36a
/device/lge/mako/BoardConfig.mk
dcb0fdc8191e94ee1742ee663ecbac1695102f8c 01-Aug-2012 ty.lee <ty.lee@lge.com> audio: add Dual MIC scenario in call feature

- Dual MIC solution(Fluence) is used in Built-in MIC used call scenarioes.
1. Handset
2. 3-Pole Headphones

Change-Id: Ic6998bfe94908826a75adb89cf386a0df4ee5256
/device/lge/mako/BoardConfig.mk
a339e742827be76d6d17b2d34af84684aced54e3 02-Aug-2012 Doug Zongker <dougz@google.com> set mako ramdisk location with mkbootimg argument

Bug: 6918260
Change-Id: Ic684ec0552f717b1cb72e39a45edee282d65cae3
/device/lge/mako/BoardConfig.mk
26a573069073a5bd6c995cd8fa2e6c1f5ae00d97 28-Jul-2012 Sungmin Choi <sungmin.choi@lge.com> mako: enable portable WiFi hotspot (AP) feature

Change-Id: I581d17b173b33402044a5f88be979d8eaf0f572a
/device/lge/mako/BoardConfig.mk
4cf2819b00a73c3a488934e3b07b69de4a6cf5e4 19-Jul-2012 Sungmin Choi <sungmin.choi@lge.com> mako: add recovery_ui

- toggle: power + volume up
- up: volume up
- down: volume down
- select: power

Change-Id: Iafc903d7db8678a1953a5984f2881afedebde885
/device/lge/mako/BoardConfig.mk
40cb771b82cfcbcb9e7f012978df7cb6ca872e4e 13-Jul-2012 kibum.lee <kibum.lee@lge.com> mako: change userdata size and system size

Change-Id: Id8ce4f18085df169e4436db8730596385189f9f2
/device/lge/mako/BoardConfig.mk
6a2ca5a2f570d4327c5909332ce584334feb73cf 13-Jul-2012 jeonghoon.lim <jeonghoon.lim@lge.com> mako: bluetooth: bring up

- top-level init.mako.bt.sh script calls hci_qcomm_init to initialize bluetooth
- modified BoardConfig.mk, device.mk, init.mako.rc. ueventd.mako.rc
to add bring up code (remove qcom property for smd)

Change-Id: Id97080655696676c02fea93138eb819b1ee1a4b9
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
ae8ab6facb6db72afd3bcf8240e75164c78a02c7 11-Jul-2012 Devin Kim <dojip.kim@lge.com> mako: update board-info.txt

- fix the name
- add board-info.txt

BUG Issue#: 6809106

Change-Id: I0b65047fe29794a86cf95a430d0b8856d6fd356e
/device/lge/mako/BoardConfig.mk
e11440916444c957794664c6d85852e83e4df823 16-Jun-2012 Ajay Dudani <adudani@codeaurora.org> mako: include GPS hal and supporting libs

Signed-off-by: Iliyan Malchev <malchev@google.com>
Change-Id: I133c6d3bda965c3580c7ceabd98f10f79631d64c
/device/lge/mako/BoardConfig.mk
b3f2b96e9a6cc2a4b939a750b277d0bb635b1c6f 09-Jul-2012 Ajay Dudani <adudani@codeaurora.org> mako: enable camera and include camera hal libs

Change-Id: I5a18bc1990eaa7d90bfcb3c16d6354c40c513c9e
/device/lge/mako/BoardConfig.mk
fd4248f8639b3985ff3df85a011c31908af88837 06-Jul-2012 Iliyan Malchev <malchev@google.com> Revert "mako: increase vmalloc size to 400M"

Problem was tracked down to a PMD kernel bug solved by the following commit:

commit 4c3250d6daee2ff56ee6c23a0c45fed29c2fa86c
Author: Devin Kim <dojip.kim@lge.com>
Date: Thu Jul 5 20:30:53 2012 -0700

ARM: 7438/1: fill possible PMD empty section gaps

cherry-picking from kernel v3.5

On ARM with the 2-level page table format, a PMD entry is represented by
two consecutive section entries covering 2MB of virtual space.

However, static mappings always were allowed to use separate 1MB section
entries. This means in practice that a static mapping may create half
populated PMDs via create_mapping().

Since commit 0536bdf33f (ARM: move iotable mappings within the vmalloc
region) those static mappings are located in the vmalloc area. We must
ensure no such half populated PMDs are accessible once vmalloc() or
ioremap() start looking at the vmalloc area for nearby free virtual
address ranges, or various things leading to a kernel crash will happen.

Change-Id: I4936a18717d9fce5921f0399ef60cfdcd0ba6100
Signed-off-by: Nicolas Pitre <nico@linaro.org>
Reported-by: Santosh Shilimkar <santosh.shilimkar@ti.com>
Tested-by: "R, Sricharan" <r.sricharan@ti.com>
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Cc: stable@vger.kernel.org
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>

This reverts commit 5aff7394029fe4cad493620eb2ac0ec7f5578524.
/device/lge/mako/BoardConfig.mk
5aff7394029fe4cad493620eb2ac0ec7f5578524 05-Jul-2012 Ajay Dudani <adudani@codeaurora.org> mako: increase vmalloc size to 400M

Change-Id: Ib1ef37ce7d50af62ba9e7a4f131ef088e06a5f58
/device/lge/mako/BoardConfig.mk
5d4f9f819b8e8c1c77061b4ca42a7dac83c25b45 21-Jun-2012 Ajay Dudani <adudani@codeaurora.org> mako: enable bluetooth flag again

Checked that builds properly after cleaning.

Change-Id: Iba5c09769e626138b47b99ed0f4935345312ba47
/device/lge/mako/BoardConfig.mk
2a2159c153cba591ac97e75c0a9a01281eee23cc 22-Jun-2012 Iliyan Malchev <malchev@google.com> mako: remove BOARD_USES_GENERIC_AUDIO

Change-Id: I43870de66e5ac03b97baefa50ad887a4ab146858
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
79da7e3e76e4ef7d1a889cbca5a77eb50c5c4a14 21-Jun-2012 Iliyan Malchev <malchev@google.com> Revert "mako: enable bluetooth flag"

This reverts commit 027d62d79ad42fb83e9586a9b1d48a8e93ed0131
/device/lge/mako/BoardConfig.mk
027d62d79ad42fb83e9586a9b1d48a8e93ed0131 21-Jun-2012 Ajay Dudani <adudani@codeaurora.org> mako: enable bluetooth flag

Change-Id: I559f09ac1f8a73e7f835e60bb6b8d3070a7e86fe
/device/lge/mako/BoardConfig.mk
950314ecb693e1af9c9aedad589c91a05d3c2bbc 17-Jun-2012 Ajay Dudani <adudani@codeaurora.org> Add default recovery.fstab and set recovery pixel format to RGBX_8888

Change-Id: Ie4d72a16563affb0ece0187a6f2b46e85b838fc4
/device/lge/mako/BoardConfig.mk
e011ca2818910872ab40002ac8ec09d3a6a70a8e 14-Jun-2012 Iliyan Malchev <malchev@google.com> mako: enable WiFi in STA mode (no AP or P2P)

Change-Id: Icf7cfafaf42450bf80495cadf13cabc3a69e03b7
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
fefe23cb22e507810482bf685c7af343879274c6 08-Jun-2012 Iliyan Malchev <malchev@google.com> initial mako support

Change-Id: I5c364ced5b26c5c6d8f51f87146d5ec4484586ae
Signed-off-by: Iliyan Malchev <malchev@google.com>
/device/lge/mako/BoardConfig.mk
da90dca88922d45da17ca99bf872c5a799668160 06-Jun-2012 Jean-Baptiste Queru <jbq@google.com> Make full_mako "real"

Diverge into the emulator at a lower level

Change-Id: I8ba74b89151f788a9a747473ca8f4935de4f6c03
/device/lge/mako/BoardConfig.mk
f71ec4b9fb967741a53e3c914ba4e388064a2177 06-Jun-2012 Jean-Baptiste Queru <jbq@google.com> Skeleton makefiles

Change-Id: I76685c1659adb1492835e19ce6075b00442ebfe9
/device/lge/mako/BoardConfig.mk