This project is mirrored from https://github.com/LineageOS/android_system_core.git.
Pull mirroring updated .
- Feb 14, 2024
-
-
/e/ robot authored
-
- Feb 06, 2024
-
-
Keith Mok authored
Need to seal the buffer size in align with ashmem if set to PROT_READ only to prevent untrusted remote process to shrink the buffer size and crash it. Bug: 294609150 Test: build Ignore-AOSP-First: Security (cherry picked from commit f83c5c8f) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:61a2897733e15a12b7aa2dfd99957e83cbe59351) Merged-In: I9288cf30b41e84ad8d3247c204e20482912bff69 Change-Id: I9288cf30b41e84ad8d3247c204e20482912bff69
-
- Aug 03, 2023
-
-
/e/ robot authored
-
- Aug 01, 2023
-
-
Alessandro Astone authored
* Use different endpoint addresses for sinks and sources * Consider locked only explicitely `green` devices * [npjohnson] Updated for 12's logic Change-Id: If093556e8e839cadf29f9e8f995f09ed3f188ed1
-
Alessandro Astone authored
Change-Id: Ibe8ae5ca8ffd44c3871a8855b06849034c74eb2f
-
- Feb 01, 2023
-
-
Mohammed Althaf Thayyil authored
-
Mohammed Althaf Thayyil authored
This reverts commit a76596a3.
-
- Jan 30, 2023
-
-
Aaron Kling authored
This is to match the changes in post_process_props made in I33ae5c6f2787017a62e679aa0c28d4b909d45935 Change-Id: If521a8abb4810f8b5d4e3164a06969af4fc12374
-
- Jan 24, 2023
-
-
me-cafebabe authored
Needed for using Retrofit Dynamic Partitions on unified targets, which has different partition sizes on different devices. Change-Id: I2b4c05401569ce5fc301ebafa7d130c3b0d87c64
-
- Oct 18, 2022
-
-
Change-Id: I5921d0657004c698046c1fb608802c7fdc193023 Former-commit-id: ce2919b342ef019a30e8094739eefdd1ac824e7b
-
Change-Id: I7f9e3263d900b1af0f323136b298bdb09f218407
-
- Jun 06, 2022
-
-
Michael Bestas authored
Android 12.1.0 Release 7 (SQ3A.220605.009.A1) # -----BEGIN PGP SIGNATURE----- # # iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCYp57OwAKCRDorT+BmrEO # eOwnAJ4nj5xu6b+dn2N00qWM6/qU3mk68ACfaU8gU+EronAgAHMDuITQtTJI/6M= # =S5HZ # -----END PGP SIGNATURE----- # gpg: Signature made Tue Jun 7 01:10:03 2022 EEST # gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78 # gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal] # gpg: initial-contribution@android.com: Verified 1202 signatures in the past # 7 months. Encrypted 4 messages in the past 4 months. # gpg: WARNING: This key is not certified with sufficiently trusted signatures! # gpg: It is not certain that the signature belongs to the owner. # Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78 # By Jaegeuk Kim (5) and others # Via Automerger Merge Worker (10) and others * tag 'android-12.1.0_r7': Backport of Win-specific suppression of potentially rogue construct that can engage in directory traversal on the host. Backport of Win-specific suppression of potentially rogue construct that can engage in directory traversal on the host. init: Wait for snapuserd before starting second stage libprocessgroup: Use WriteStringToFd for WriteFileAction libprocessgroup: Prevent error spam when tests disable all cpus in a cpuset storageproxyd: Use alternate data path if in DSU state init: Wait for snapuserd before starting second stage init.rc: Set permissions to cgroup.procs files libprocessgroup: Add fd caching support for SetProcessProfiles libprocessgroup: Move fd caching code into FdCacheHelper [DO NOT MERGE] Allow to run fsck.f2fs in first_stage_ramdisk [DO NOT MERGE] Mount /mnt/scracth with -o sync,nodiscard [DO NOT MERGE] Run check_fs only /data is mounted [DO NOT MERGE] Don't use FSCK_LOG_FILE used for ext4 only [DO NOT MERGE] Don't try to mount if the disk has no FS magic [DO NOT MERGE] Retry to unmount /data libprocessgroup: Use WriteStringToFd for WriteFileAction libprocessgroup: Prevent error spam when tests disable all cpus in a cpuset Conflicts: libprocessgroup/task_profiles.cpp libprocessgroup/task_profiles.h Change-Id: I7a57400978d11a576f92411224d6338de41004fe
-
- Jun 02, 2022
-
-
Michael Bestas authored
ro.revision defaults to 0 if it's not set in cmdline. Some devices might want to set it in their device specific init files, however it's not possible to override ro properties. Test: Set ro.boot.hardware.revision in device specific init.rc and observe fastboot getvar hw-revision in fastbootd Change-Id: I6e785c3fe3a49409e815af269a9a8db732b80ada
-
- May 26, 2022
-
-
Michael Bestas authored
This allows OEM commands to print messages in fastboot output. Test: run fastboot oem getprop ro.boot.rf_version and observe property value being printed in console Change-Id: Id9bd5a107861a790cd02dc87057600de5bb94d42
-
- May 07, 2022
-
-
Michael Bestas authored
* Prevents users from seeing this message in recovery: `E:recvmsg failed (No buffer space available)` * This is caused by volume_manager (our addition in recovery) and hiding this error does not seem to have any negative side effect. Change-Id: I0d65796961c3036289ed13c0b8949a27b5b97ad6
-
- Apr 26, 2022
-
-
These commits added wrapped key support: https://source.codeaurora.org/quic/la/platform/system/core/commit/?h=LA.UM.8.1.r1-08800-sm8150.0&id=ddd34f7b85ea6701d0c62f1e7c6cb98bbef60738 https://source.codeaurora.org/quic/la/platform/system/core/commit/?h=LA.UM.8.1.r1-08800-sm8150.0&id=98ee612a86f40a862889347a4f3bb6231fcdb0e0 https://source.codeaurora.org/quic/la/platform/system/core/commit/?h=LA.UM.8.1.r1-08800-sm8150.0&id=c69050ee52338339f0eb1a07aa3eeeeeb2e209d9 Although, got either reverted by follow-ups or removed after the big Q merge commit: https://source.codeaurora.org/quic/la/platform/system/core/commit/?h=LA.UM.8.1.r1-08800-sm8150.0&id=dd28b6d7f1f44a529a2262d09834da4ca48937f4 Bring in the relevant bits so that system/vold part compiles. Conflicts: fs_mgr/fs_mgr_fstab.cpp fs_mgr/include_fstab/fstab/fstab.h Change-Id: Ibdf035e548c3f5085401f60df158c9a327947f33 (cherry picked from commit 9f03019b) Signed-off-by: Volodymyr Zhdanov <wight554@gmail.com>
-
- Apr 16, 2022
-
-
Tim Zimmermann authored
Test: Boot DSU on a device without dynamic partitions but first_stage_mount for /system Change-Id: I07f0f40037109aaaf1bce0151d1eac26c971ba9e
-
- Apr 07, 2022
-
-
Android Build Coastguard Worker authored
Change-Id: I0ab15c0688b674775b075d41fec9ee0f2fadc09c
-
Shaju Mathew authored
[automerger skipped] Backport of Win-specific suppression of potentially rogue construct that can engage am: c3483e4c am: 07995227 -s ours am: b446f13c -s ours am: b0bae04b -s ours am skip reason: Merged-In Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d with SHA-1 efe70179 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17586924 Change-Id: If3a24cff2e54cb9ae2465f39c59adbed0aad7d4a Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
Shaju Mathew authored
[automerger skipped] Backport of Win-specific suppression of potentially rogue construct that can engage am: 505eeb76 -s ours am: 568e58c4 -s ours am: 6a1ec982 -s ours am skip reason: Merged-In Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d with SHA-1 efe70179 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17605899 Change-Id: If9fe98541a8504f729dc03b91670709d0342e122 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
- Apr 06, 2022
-
-
Shaju Mathew authored
[automerger skipped] Backport of Win-specific suppression of potentially rogue construct that can engage am: c3483e4c am: 07995227 -s ours am: b446f13c -s ours am skip reason: Merged-In Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d with SHA-1 efe70179 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17586924 Change-Id: I2dc27f6e8b7b78bb5df0ac2fb8489cf2ae2a1d19 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
Shaju Mathew authored
[automerger skipped] Backport of Win-specific suppression of potentially rogue construct that can engage am: 505eeb76 -s ours am: 568e58c4 -s ours am skip reason: Merged-In Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d with SHA-1 efe70179 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17605899 Change-Id: If82200cbb3b6eb282ceb3858a4d8fdf63746da51 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
Shaju Mathew authored
[automerger skipped] Backport of Win-specific suppression of potentially rogue construct that can engage am: c3483e4c am: 07995227 -s ours am skip reason: Merged-In Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d with SHA-1 efe70179 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17586924 Change-Id: I9ceb48007785df3606044cd385034a41f3055796 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
Shaju Mathew authored
[automerger skipped] Backport of Win-specific suppression of potentially rogue construct that can engage am: 505eeb76 -s ours am skip reason: Merged-In Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d with SHA-1 efe70179 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17605899 Change-Id: Ibeafe5fa6802b1d27aeeb7fb60405a834db9988d Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
Shaju Mathew authored
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/17586924 Change-Id: I96edd4b89c33fc2c68a0aa562bca23645fbf9796 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
-
- Apr 05, 2022
-
-
Shaju Mathew authored
in directory traversal on the host. Bug:209438553 Ignore-AOSP-First: Resolution for potential security exploit. Test: Cursory test with adb. Change-Id: Id47c567ad92ae4d9d7325a7a8589825a2ff4232b Merged-In: Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d
-
Shaju Mathew authored
in directory traversal on the host. Bug:209438553 Ignore-AOSP-First: Resolution for potential security exploit. Test: Cursory test with adb. Change-Id: Id47c567ad92ae4d9d7325a7a8589825a2ff4232b Merged-In: Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d
-
- Mar 25, 2022
-
-
LuK1337 authored
Fastboot format fails to wipe any partition that doesn't at least return "raw" partition type. Also both android.hardware.fastboot@1.0-impl.pixel and android.hardware.fastboot@1.1-impl-mock return FileSystemType::RAW so I assume this is fine. Change-Id: I5707bddb1ba32edb6359858853d7b1afbf138b9f
-
- Mar 24, 2022
-
-
Chirayu Desai authored
* For extract-tools Change-Id: I15772394a24c2ff1fdd6eece86548a72a5d4d748
-
- Mar 19, 2022
-
-
Android Build Coastguard Worker authored
Change-Id: I1239969a4da6496ee944b4a1781dc936b7734d07
-
- Mar 18, 2022
-
-
Nolen Johnson authored
* This results in a metric ton of denials on some devices and eats up valuable resources on boot, plus there's 0 need for it, so kill it. Change-Id: Ic52d5b3f06724430e9505345024cf0041b37ca49
-
Armelle Laine authored
-
- Mar 13, 2022
-
-
Alexander Koskovich authored
These aren't actually duplicate interfaces because we are overriding the service so interfaces in the original definition will never be used. Test: Verify 'm dist' works without complaining about duplicate interfaces. Change-Id: Iab5e1d8bb4cb7d5b2608028c3cee73af94c47424
-
- Mar 12, 2022
-
-
dianlujitao authored
* Some (poorly written?) apps are continuously detected as Z state and killed by llkd even though they work just fine, leading to extremely bad UX and false positive bug reports. * llkd is disabled by default but enabled by llkd-debuggable.rc on ro.debuggable=1. Exclude it on userdebug builds to replicate user build behavior. Change-Id: I8365149e7896e03e58808bbead208b8d4fca6a8c
-
Bruno Martins authored
This allows remount to gracefully mount /system when Magisk is installed. As a sidenote, the ro.debuggable property check can safely be removed due to the simple fact that CPP preprocessor flag ALLOW_ADBD_DISABLE_VERITY=1 is passed when building userdebug/eng. Change-Id: Ic10eccbf5d225468c3dc42f8ae3ae7c05b49a699
-
Scott Mertz authored
Change-Id: I7822a2e133a2f326ad2d8da8f79b0064344d59bf debuggerd: Rebrand tombstone header to LineageOS [harryyoud]: Use new props for 15.1 [rashed]: Bah... use GetProperty Change-Id: Idd08c2eb7e395b464b1510742bf52833f465db08
-
Abhijeet Dharmapurikar authored
Booting up the device without usb, the kernel sets the usb power supply type as UNKNOWN. The type of usb power supply changes at run-time as various chargers are plugged in/out. However, healthd initilizes the charger list only at bootup. Change it such that it checks for charger type changes with every battery or usb uevent. While at it, the kernel may have a power supply type which is not known to healthd. This is perfectly fine. Update healthd to not print a warning. Change-Id: I2ec9f9a420ca61814d43c316b418ce94de3691bc
-
Dyneteve authored
Change-Id: I810e2e051329edeec54fc24255d785993066eece
-
Abhijeet Dharmapurikar authored
HVDCP_3 is a high voltage DCP charger where the charger's voltage can be changed by issuing pulses on the D+/D- lines. Add support to recognize it and treat it as an AC power source. Change-Id: Ib719529904e8b7a676bbdc5f5953f0f9da6df3fa
-
Steve Kondik authored
Change-Id: Ie1ca5018c465f6b2c15cbc00bdf3bb866d98ddef
-