• R/O
  • HTTP
  • SSH
  • HTTPS

List of commits

標籤
無標籤

Frequently used words (click to add to your profile)

javac++androidlinuxc#windowsobjective-ccocoa誰得qtpythonphprubygameguibathyscaphec計画中(planning stage)翻訳omegatframeworktwitterdomtestvb.netdirectxゲームエンジンbtronarduinopreviewer

system/corennnnn


RSS
修訂. 時間 作者
a9a41cf 2016-11-09 00:56:25 Ching Tzung Lin

Mount debugfs earlier regardless build variant

ag/835596 can be reverted after this CL is merged.

BUG:26455292
Change-Id: I453b0f1d08d822f8cd2d4d33f1c1b21f0d7f543a

b0e1429 2016-11-09 00:56:25 Chih-Wei Huang

libsuspend: enable earlysuspend for android-x86

96fc347 2016-11-09 00:56:25 Chih-Wei Huang

init: expand variables on mount_all command

This allows mount_all to handle fstab.${ro.hardware} instead
of hardcoding the file name.

8fc2a60 2016-11-09 00:56:25 Chih-Wei Huang

Software-accelerated Pixel Flinger

The typical graphic workloads on VirtualBox are improved 3X.

Supports both x86 and x86_64.

Similar change by HazouPH <jgrharbers@gmail.com>:
http://review.cyanogenmod.org/#/c/70896/

And by Quanganh pham <quanganh2627@gmail.com>:
http://review.cyanogenmod.org/#/c/97125/

2f01e34 2016-11-09 00:56:25 Chih-Wei Huang

init.rc: fix for "add_tid_to_cgroup failed to write" warnings

I still don't understand why only 0660 works.

c472b6a 2016-11-09 00:27:22 Chih-Wei Huang

Merge branch 'android-ia' into nougat-x86

ba377b7 2016-11-09 00:27:15 Chih-Wei Huang

Allow all to execute su

The Superuser app can control how su is used.

8e851cb 2016-11-09 00:27:15 Chih-Wei Huang

init.rc: let some services run as root

The surfaceflinger needs root permission to control vt.

Run the console shell as root to make debugging easier.

b36d841 2016-11-09 00:27:15 Chih-Wei Huang

libutils: fix incorrect calculation in utf8_length() method

The first character of utf-8 could be larger than 128. If use signed char
variable to hold it, it would be treated as negative. That may result in
some unexpected errors.

For example, without this patch, suppose the code is 0xE88888, then
first_char is 0xE8 and converted to int32_t type (0xFFFFFFE8) and
masked with (~to_ignore_mask). The result utf32 is FFF08208
which is incorrect.

Change-Id: I72b355f380865bc375251eb287fc225fd585a115

6da6220 2016-11-09 00:27:15 Chih-Wei Huang

Set correct permission for pppd

The pppd needs setuid root to setup ppp interface.

281a2c9 2016-11-09 00:27:15 Chih-Wei Huang

init: avoid virtual console be set blanked

f960227 2016-11-09 00:27:15 Chih-Wei Huang

init: change firmware_dirs for Android-x86

5fc1a6e 2016-11-09 00:27:14 Chih-Wei Huang

ueventd.rc: remove redundant definitions

Change-Id: Icb4f051abf941052aca9752ca2949386738d94e5

a83c941 2016-11-09 00:24:24 Irina Patru

UPSTREAM_PENDING newfs_msdos: Handle alignment failure

When trying to create a new FAT32 file system using alignment, the resulted
MBR structure is corrupted, because the total sectors reported does not
correspond to the actual available sectors. This is due to the reserved
sectors field which is updated during the alignment.

When fsck_msdos will try to check this file system, it will fail because it
cannot match the reported sectors with the actual available sectors.
Due to the failed check, the file system cannot be mounted by vold.

I/fsck_msdos( 2180): FAT size too small, 242822 entries won't fit into 1897 sectors
I/fsck_msdos( 2180): fsck_msdos terminated by exit(8)
E/Vold ( 2180): Filesystem check failed (unknown exit code 8)
E/Vold ( 2180): /dev/block/vold/179:49 failed FS checks (I/O error)
D/Vold ( 2180): Volume sdcard1 state changing 3 (Checking) -> 1 (Idle-Unmounted)

In order to fix this issue, we will save the initial bpb structure and restore
it if the alignment fails.

Change-Id: I58d5078551c689b28c9070585bb330c45bab9c62
Signed-off-by: Irina Patru <irina.patru@intel.com>
Reviewed-on: https://android.intel.com/256992
Reviewed-by: Dolca, Robert <robert.dolca@intel.com>
Reviewed-by: cactus <cactus@intel.com>
Reviewed-by: Popa, Valentin <valentin.popa@intel.com>

e3e1acc 2016-11-09 00:24:24 Samuel Ortiz

devices: Increase the uevent socket buffer size

Depending on the timing, hald may start while ueventd is not done yet
with its initial coldboot. As hald also independently starts its own
coldboot, ueventd netlink socket buffer could get filled quickly and
thus ueventd could lose some uevents.
This is fixed by increasing the ueventd netlink socket buffer size.

Change-Id: Ie92f77c14099421740b3984f1cc23f813287b78f
Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
Reviewed-on: https://android.intel.com/219843
Reviewed-by: Escande, Thierry <thierry.escande@intel.com>
Reviewed-by: cactus <cactus@intel.com>
Reviewed-by: Ortiz, Samuel <samuel.ortiz@intel.com>
Tested-by: Ortiz, Samuel <samuel.ortiz@intel.com>
Tested-by: cactus <cactus@intel.com>
Reviewed-by: Porlan, Patrick <patrick.porlan@intel.com>
Reviewed-by: Bianti, Sebastien <sebastien.bianti@intel.com>
Reviewed-by: Mahalingam, Ganesh <ganesh.mahalingam@intel.com>
Tested-by: Mahalingam, Ganesh <ganesh.mahalingam@intel.com>

a9bce2e 2016-11-09 00:24:24 Andrew Boie

adb: reserve a wakelock when clients are connected over socket

USB OTG connections already have a wakelock reserved, but if a network
socket connection is made, the device can unexpectedly suspend
in the middle of a session. The lock is released when the client
disconnects.

Change-Id: Id5ac01699fab9350955c9814042259542fc6a694
Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>

6625e27 2016-11-09 00:24:24 Andrew P. Boie

libdiskconfig: Enable Mac OS X host build

Change-Id: Iacc7d5463364d0cd15ca9fabaa58ad05857d9e78
Signed-off-by: Andrew P. Boie <andrew.p.boie@intel.com>

05beefd 2016-11-09 00:24:24 Andrew Boie

diskconfig: Fix disk_layout.conf size parsing

If the user was appending 'K' to their lengths (which is valid
but redundant) it was being treated as megabytes instead of
kilobytes.

Change-Id: I979ec4d01f1342de1f3209b946201ca87bad32a7

3faffd2 2016-11-09 00:24:23 Paul Drews

Use progressive offset in buffer for successive writes

The code for copying from one raw file to another looped
back and tried again with a suitably smaller number of bytes
if the entire buffer was not written on the first try.
However, it failed to advance an offset in the buffer past
the bytes that were written. This could conceivably happen
under rare circumstances, leading to a corrupted disk image.

This fix defines an offset into the buffer, advancing it by
the number of bytes written on each successive retry.

Signed-off-by: Paul Drews <paul.drews@intel.com>

Change-Id: I76b8e0b3c0d3b0c32bd2114d0867ac7489808279

21c5d31 2016-11-09 00:24:23 Andrew Boie

libdiskconfig: HACK Don't do space checks on zero-size images

If an image file is of zero size, assume we just want to expand it
to fit the available images.

Change-Id: If8f22eb12d3a5179960d4359307bb177e3323e8a
Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>

ce7d592 2016-10-26 08:31:53 Steve Kondik

Android 7.1.0 release 4
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEABECAAYFAlgJEpYACgkQ6K0/gZqxDnhSsgCgjuvLFsozCVhJVqBKPSdB9EJt
yVEAn3hqOdgNDMYPTWEMgcvEKG4BU1eu
=cOXi
-----END PGP SIGNATURE-----

Merge tag 'android-7.1.0_r4' of https://android.googlesource.com/platform/system/core into 71

Android 7.1.0 release 4

Change-Id: I30fae1c3b1e764a231b31d478de76c51bf9cf7f9

5cf8bbd 2016-10-25 16:06:52 gitbuildkicker

merge in nyc-mr1-release history after reset to nyc-mr1-dev

ab8ad62 2016-10-24 23:41:05 Mark Salyzyn

logd: mLastWorstPidOFSystem crash

(cherry pick from commit fa07f9dc4b4d101a49fba5dbbf35c88cdfec4433)

mLastWorstPidOfSystem is filled with iterator references
that are not from AID_SYSTEM to aid the performance. But
we only clear entries from the list during erase if they
are from AID_SYSTEM. Remove the filter check in erase so
the stale references will be removed.

The conditions that caused this failure are difficult to
reproduce and are rare.

Test: gTests logd-unit-tests, liblog-unit-tests and logcat-unit-tests
Bug: 32247044
Bug: 31237377
Change-Id: Ie405dd643203b816cac15eef5c97600551cee450

e2796fb 2016-10-23 16:10:21 gitbuildkicker

merge in nyc-mr1-release history after reset to nyc-mr1-dev

a3bd97a 2016-10-22 06:41:29 Tim Murray

Merge "healthd: move binder fd to not use EPOLLWAKEUP" into nyc-mr1-dev

e89ea5e 2016-10-22 01:11:49 Tim Murray

healthd: move binder fd to not use EPOLLWAKEUP

The binder fd doesn't need to use EPOLLWAKEUP and shouldn't; if it does,
it will prevent suspend unnecessarily.

bug 32180327

Change-Id: I292f1ada0c698290f6bd5518b237867ed69ec391

509f099 2016-10-19 03:40:29 Tim Murray

Revert "libsuspend: move to exponential backoff"

This reverts commit fb896944b6a78d951c8442b444af860a28117e5c.

bug 32180327

Change-Id: Ic26bdffac6c56b102348f5393e6eb5d895960d7e
(cherry picked from commit 23c8bab0243bc6e7be8b95702c262c354009d56a)

bfec148 2016-10-19 03:32:16 Tim Murray

Merge "Revert "libsuspend: move to exponential backoff"" into nyc-mr1-dev

23c8bab 2016-10-19 02:05:59 Tim Murray

Revert "libsuspend: move to exponential backoff"

This reverts commit fb896944b6a78d951c8442b444af860a28117e5c.

bug 32180327

Change-Id: Ic26bdffac6c56b102348f5393e6eb5d895960d7e

1dbd176 2016-10-18 13:35:58 Steve Kondik

Merge tag 'LA.UM.5.5.r1-00900-8x96.0' of git://codeaurora.org/platform/system/core into cm-14.0

"LA.UM.5.5.r1-00900-8x96.0"