Andy | アンディ
d4bafd24b0
sm6375-common: props: Set default vc call volume to 9
2024-05-07 21:21:03 +02:00
Andy | アンディ
e8dc32a405
sm6375-common: dt2w: Optimize Java code
2024-05-07 21:20:44 +02:00
Notkerd69
ab8b55b36d
sm6375-common: props: Fix volume in calls
...
- Setting the prop ro.vendor.audio.sdk.fluencetype=fluence to none
fixes the volume in calls there.
Signed-off-by: Notkerd69 <jerespn@gmail.com >
2024-05-07 21:12:59 +02:00
kamikaonashi
5ab9583545
stone: add stone to board-info
...
we unified now
2024-05-07 21:06:19 +02:00
agathasenpai
e080628fbe
stone: Add board-info.txt in tree
...
* Fixes flashall in fastbootd
2024-05-07 21:05:49 +02:00
kamikaonashi
815477694b
stone: rename BoardConfig
2024-05-07 21:05:44 +02:00
LuK1337
d338c97223
stone: Set SSR restart_level in init script
...
Change-Id: I32fc08c9ad36b9c8ebfc019fc87a19eece18f0b4
Signed-off-by: Adithya R <gh0strider.2k18.reborn@gmail.com >
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com >
2024-05-07 21:02:32 +02:00
Andy | アンディ
947e489d67
stone: Import power_profile from vendor framework
...
The one from system isn't providing battery usage stats
2024-05-07 21:02:01 +02:00
kamikaonashi
2ffcba68c8
stone: unify common and device tree to stone tree
...
also drop veu/peux related stuff while we're at it
2024-05-07 20:57:13 +02:00
Andy | アンディ
716cae6be5
sm6375-common: Add check for lineage trust
...
This will check if the rom hardware interfaces including the packages
2023-09-14 15:20:16 +08:00
Andy | アンディ
9a202f1a3b
sm6375-common: Build Lineage Health
2023-09-14 15:20:14 +08:00
Andy | アンディ
f89889da20
sm6375-common: properties: Correct SoC info
2023-09-12 17:34:51 +08:00
Andy | アンディ
bd7384a45f
sm6375-common: properties: Move specific audio prop to system
2023-09-08 15:50:29 +08:00
Andy | アンディ
3fbc1877d3
Revert "sm6375-common: Allow system_susped to read sysfs"
...
This reverts commit 779e212afd .
2023-09-08 15:44:25 +08:00
Andy | アンディ
ec78e796fa
sm6375-common: Merge device compatibility matrix from ROM vendors
2023-09-08 15:28:55 +08:00
boedhack99
b230ed2943
sm6375-common: wifi: Fix typo hostscan!
...
Change-Id: Ia631f993296ec5447a124359468529d3146dd79f
2023-09-08 15:18:51 +08:00
Andy | アンディ
37c363c2e7
sm6375-common: sepolicy: Remove hal_lineage_health_default & Unused code
...
Lineage Health Hal: This only available in LineageOS based rom, other rom based on AOSP will get sepolicy error while building
2023-09-08 15:17:36 +08:00
Andy | アンディ
6c04d0d309
sm6375-common: sepolicy: Allow to open kernels wakelock stats
...
09-07 08:10:08.332 628 2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup26 (../../devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/wakeup26): Permission denied
09-07 08:10:08.341 628 2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup40 (../../devices/platform/soc/soc:charger-manager/power_supply/battery/wakeup40): Permission denied
2023-09-08 15:13:19 +08:00
Andy | アンディ
8c3b9eb1f1
sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop
2023-09-08 15:12:50 +08:00
Andy | アンディ
039618f721
sm6375-common: sepolicy: Allow hal_fingerprint_default to search sysfs_leds
...
07-08 05:12:25.531 1390 1390 I auditd : type=1400 audit(0.0:48): avc: denied { search } for comm="android.hardwar" name="5c1b000.qcom,cci0:qcom,camera-flash@0" dev="sysfs" ino=22785 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
f4814cc50a
sm6375-common: sepolicy: Allow vendor_sensors to read huaqin_sysfs (file)
...
07-08 05:12:23.639 632 632 I auditd : type=1400 audit(0.0:34): avc: denied { read } for comm="sscrpcd" name="pcba_config" dev="sysfs" ino=18246 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=file permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
3d09a3ae15
sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
...
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010
sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop
2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f
sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop
2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17
sm6375-common: sepolicy: Don't audit odrefresh to killing process
...
07-07 10:07:50.071 754 754 I auditd : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
f3a447da69
sm6375-common: Add DT2W Services
...
DT2W Services feature are finished now
2023-09-07 14:16:18 +08:00
Andy | アンディ
607a67ad90
sm6375-common: Remove unused code
2023-09-07 00:20:58 +08:00
Andy | アンディ
ba7b4bbe64
sm6375-common: sepolicy: Allow system_app
...
09-05 20:48:18.342 6384 6384 W com.android.settings: type=1400 audit(0.0:93): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0
09-05 20:48:18.382 6384 6384 W com.android.settings: type=1400 audit(0.0:94): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:system_suspend:s0 tclass=binder permissive=0
09-05 20:48:18.666 6384 6384 W com.android.settings: type=1400 audit(0.0:96): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:storaged:s0 tclass=binder permissive=0
09-05 20:48:18.673 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=suspend_control scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.674 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=suspend_control_internal scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.695 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=tracing.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:tracingproxy_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.702 6384 6384 W com.android.settings: type=1400 audit(0.0:97): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_lineage_health_default:s0 tclass=binder permissive=0
2023-09-06 09:43:38 +08:00
Andy | アンディ
779e212afd
sm6375-common: Allow system_susped to read sysfs
2023-09-05 22:37:26 +08:00
Andy | アンディ
92da6c66ff
sm6375-common: Reworking on NFC manifest
2023-09-05 22:37:26 +08:00
Andy | アンディ
7ac1c52300
sm6375-common: Set Board Vendor platform
2023-09-05 22:37:26 +08:00
REDGROUL
1c6aede45d
sm6375-common: Update nfc interface
2023-09-05 22:37:26 +08:00
Andy | アンディ
d6dfa2b25f
sm6375-common: Correct Architecture
2023-09-05 22:37:26 +08:00
chrisl7
af745fc21c
sm6375-common: sepolicy: Set stflashtool prop correctly
...
06-22 19:23:59.519 608 608 I auditd : type=1400 audit(0.0:17): avc: denied { read } for comm="STFlashTool" name="u:object_r:nfc_prop:s0" dev="tmpfs" ino=11923 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=file permissive=0
06-22 19:23:59.599 1 1 I auditd : type=1107 audit(0.0:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=nfc.fw.dnld_force pid=608 uid=1027 gid=1027 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=property_service permissive=0'
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:19:57 +07:00
chrisl7
ed5403c49b
sm6375-common: sepolicy: Allow huaqin to search vendor_sensors
...
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:21): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:22): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:23): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:24): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:25): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:26): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:27): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:28): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:29): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:30): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:31): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:32): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:33): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:34): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:35): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:36): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:37): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:38): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:39): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:40): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:41): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:42): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:43): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:44): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:45): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:46): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:47): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:48): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:49): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:50): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:51): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:52): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:53): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:54): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:55): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:56): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:57): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:58): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:59): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:60): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:13:54 +07:00
Akash Srivastava
1fb81e7e84
sm6375-common: rootdir: Chown the cgroup.procs nodes
...
* Perf-hal tries to access the nodes but requires permissions as reflected in the logs
* 11-10 19:25:50.044 1055 1080 E ANDR-PERF-OPTSHANDLER: Cannot open/create foreground cgroup file
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com >
Change-Id: I730f8b8bc7cc2b17595cac6130deacbc346d008f
2023-08-25 23:11:29 +07:00
Vishalcj17
542594f725
sm6375-common: ueventd: Change permissions for /dev/diag
...
[1] - Add override
* Logs spam with error '-13' which basically translates to access
denied/invalid permission.
* Fix this by giving system read and write access.
Before in log:
Diag_Lib: Diag_LSM_Init: Failed to open handle to diag driver, error
= 13
Change-Id: Ic06b0de0a729052593fb3c703362c5c199f9fd0b
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com >
2023-08-25 23:09:51 +07:00
Arvind Kumar
ebefc7846e
sm6375-common: rootdir: SoC change to support holi APQ
...
Change-Id: Iee1d338dfbc4475db4269da030ef7c2859fae7c2
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:07:05 +07:00
chrisl7
d0f2061390
sm6375-common: wifi: Update WCNSS to MOONSTONE
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:06:15 +07:00
Adithya R
ed057fb734
sm6375-common: sepolicy: Permissive recovery only in userdebug/eng
...
User builds do not allow permissive domains.
Change-Id: Idbf04be9c83fb2f33ac4c592306d790a7d10a36e
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:05:49 +07:00
chrisl7
c711db278c
sm6375-common: Decommonize neuralnetworks
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: I1d774fd15d92c1963576d259e9d57a3d7b638527
2023-08-25 23:05:30 +07:00
chrisl7
923340df42
sm6375-common: Add missing blobs
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: I37781c92ce94c5ec37d7c24b1862bb5de7bed6cf
2023-08-25 23:01:42 +07:00
chrisl7
30690b8531
sm6375-common: rootdir: Update fstab to MOONSTONE
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: I23a25efb487b6e294164fd1678899444feccb079
2023-08-25 22:57:42 +07:00
chrisl7
9a955b7bd5
sm6375-common: overlay: Fix OEM fast charge sysfs node
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: If261f358d1bcabd544fbd665de1c7c4793d92c9c
2023-08-25 22:56:27 +07:00
chrisl7
67b337afc2
sm6375-common: Add libsoc_helper correctly
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 22:53:24 +07:00
chrisl7
ce285416ad
sm6375-common: Add diag-router
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: I91d18ce5471e637ac846d1ffea8b44f5af84226b
2023-08-25 22:52:58 +07:00
chrisl7
9518ee5985
sm6375-common: sepolicy: Import missing sepolicy rules from MOOONSTONE
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: I4d86e532648c8dc5c6d3d85aeffd3203c5fbaf74
2023-08-25 22:48:22 +07:00
Alexander Koskovich
74f4a3d94e
sm6375-common: init: Fix "Invalid section keyword found" on ueventd
...
Change-Id: I8a3eb3abea82feb5e1a92cc859cd6498ee68666e
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co >
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 22:45:07 +07:00
chrisl7
50080a9032
sm6375-common: sepolicy: Add missing sepolicy rules
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 22:41:37 +07:00
Adithya R
0d8ec8faf3
sm6375-common: Switch to armv8-2a dotprod
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 22:38:59 +07:00