Nippon
d9cf03682b
sm6375-common: properties: set display power timer to 3s
2024-05-07 21:25:36 +02:00
Adithya R
3461b4827e
sm6375-common: properties: Enable display smooth motion (SmoMo)
...
Change-Id: Ibc9e5c9bc686239dcd4d35fa882081307be0a245
2024-05-07 21:25:17 +02:00
Andrzej Perczak
d3b9dfb895
sm6375-common: properties: Disable redir_party_num
...
Caused incoming caller number not being parsed correctly by Phone app on
VoLTE and VoWiFi. No idea why Lenovo enabled this ancient prop.
2024-05-07 21:24:47 +02:00
Jun Wang
c7a90812f7
sm6375-common: properties: Enable the pre-rendering feature
...
* Pre-rendering feature can improve FPS and reduce the janks
in scrolling cases.
Change-Id: I2152d0a1a8f9e337cb0355c8874e72f0f3c2cb46
2024-05-07 21:24:26 +02:00
Adithya R
be93694478
sm6375-common: properties: Enable QCRIL radio power saving
2024-05-07 21:24:12 +02:00
Andy | アンディ
76a6cd4e5e
sm6375-common: props: ro.config.media_vol_steps is set by default
2024-05-07 21:24:00 +02:00
Andy | アンディ
35957acc82
sm6375-common: props: Make surface flinger separately also tuned some prop
2024-05-07 21:23:52 +02:00
Andy | アンディ
69dfe5f174
sm6375-common: props: Disable audio fluence for voice recorder
2024-05-07 21:23:17 +02:00
Andy | アンディ
61f3c48f82
sm6375-common: Overlay: Fixup! Set preferred refresh rate on keyguard to 60
...
This ensures that the device doesn't switch to hrr while
doze mode is active.
2024-05-07 21:22:55 +02:00
Andy | アンディ
a7cc291ddb
sm6375-common: Compile HWUI for performance
...
* Activates a few optimizing compiler flags for HWUI.
* -fno-omit-frame-pointer, -marm, -mapcs
2024-05-07 21:22:35 +02:00
Andy | アンディ
91bc1c74a1
sm6375-common: properties: Do not set refresh rate when display is off
...
Avoids HWC rendering at 60 Hz after display turning off at 60 Hz
(VRR idle) and then waking up to 120 Hz.
2024-05-07 21:22:25 +02:00
Andy | アンディ
2186f2fb00
sm6375-common: overlay: Drop OEMs Fast Charger path
...
This device doesn't have that
2024-05-07 21:22:16 +02:00
Andy | アンディ
c3f4dcb200
sm6375-common: overlay: Fix fingerprint wake-up animation
2024-05-07 21:21:38 +02:00
Andy | アンディ
d4bafd24b0
sm6375-common: props: Set default vc call volume to 9
2024-05-07 21:21:03 +02:00
Andy | アンディ
e8dc32a405
sm6375-common: dt2w: Optimize Java code
2024-05-07 21:20:44 +02:00
Notkerd69
ab8b55b36d
sm6375-common: props: Fix volume in calls
...
- Setting the prop ro.vendor.audio.sdk.fluencetype=fluence to none
fixes the volume in calls there.
Signed-off-by: Notkerd69 <jerespn@gmail.com >
2024-05-07 21:12:59 +02:00
kamikaonashi
5ab9583545
stone: add stone to board-info
...
we unified now
2024-05-07 21:06:19 +02:00
agathasenpai
e080628fbe
stone: Add board-info.txt in tree
...
* Fixes flashall in fastbootd
2024-05-07 21:05:49 +02:00
kamikaonashi
815477694b
stone: rename BoardConfig
2024-05-07 21:05:44 +02:00
LuK1337
d338c97223
stone: Set SSR restart_level in init script
...
Change-Id: I32fc08c9ad36b9c8ebfc019fc87a19eece18f0b4
Signed-off-by: Adithya R <gh0strider.2k18.reborn@gmail.com >
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com >
2024-05-07 21:02:32 +02:00
Andy | アンディ
947e489d67
stone: Import power_profile from vendor framework
...
The one from system isn't providing battery usage stats
2024-05-07 21:02:01 +02:00
kamikaonashi
2ffcba68c8
stone: unify common and device tree to stone tree
...
also drop veu/peux related stuff while we're at it
2024-05-07 20:57:13 +02:00
Andy | アンディ
716cae6be5
sm6375-common: Add check for lineage trust
...
This will check if the rom hardware interfaces including the packages
2023-09-14 15:20:16 +08:00
Andy | アンディ
9a202f1a3b
sm6375-common: Build Lineage Health
2023-09-14 15:20:14 +08:00
Andy | アンディ
f89889da20
sm6375-common: properties: Correct SoC info
2023-09-12 17:34:51 +08:00
Andy | アンディ
bd7384a45f
sm6375-common: properties: Move specific audio prop to system
2023-09-08 15:50:29 +08:00
Andy | アンディ
3fbc1877d3
Revert "sm6375-common: Allow system_susped to read sysfs"
...
This reverts commit 779e212afd .
2023-09-08 15:44:25 +08:00
Andy | アンディ
ec78e796fa
sm6375-common: Merge device compatibility matrix from ROM vendors
2023-09-08 15:28:55 +08:00
boedhack99
b230ed2943
sm6375-common: wifi: Fix typo hostscan!
...
Change-Id: Ia631f993296ec5447a124359468529d3146dd79f
2023-09-08 15:18:51 +08:00
Andy | アンディ
37c363c2e7
sm6375-common: sepolicy: Remove hal_lineage_health_default & Unused code
...
Lineage Health Hal: This only available in LineageOS based rom, other rom based on AOSP will get sepolicy error while building
2023-09-08 15:17:36 +08:00
Andy | アンディ
6c04d0d309
sm6375-common: sepolicy: Allow to open kernels wakelock stats
...
09-07 08:10:08.332 628 2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup26 (../../devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/wakeup26): Permission denied
09-07 08:10:08.341 628 2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup40 (../../devices/platform/soc/soc:charger-manager/power_supply/battery/wakeup40): Permission denied
2023-09-08 15:13:19 +08:00
Andy | アンディ
8c3b9eb1f1
sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop
2023-09-08 15:12:50 +08:00
Andy | アンディ
039618f721
sm6375-common: sepolicy: Allow hal_fingerprint_default to search sysfs_leds
...
07-08 05:12:25.531 1390 1390 I auditd : type=1400 audit(0.0:48): avc: denied { search } for comm="android.hardwar" name="5c1b000.qcom,cci0:qcom,camera-flash@0" dev="sysfs" ino=22785 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
f4814cc50a
sm6375-common: sepolicy: Allow vendor_sensors to read huaqin_sysfs (file)
...
07-08 05:12:23.639 632 632 I auditd : type=1400 audit(0.0:34): avc: denied { read } for comm="sscrpcd" name="pcba_config" dev="sysfs" ino=18246 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=file permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
3d09a3ae15
sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
...
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010
sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop
2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f
sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop
2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17
sm6375-common: sepolicy: Don't audit odrefresh to killing process
...
07-07 10:07:50.071 754 754 I auditd : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
f3a447da69
sm6375-common: Add DT2W Services
...
DT2W Services feature are finished now
2023-09-07 14:16:18 +08:00
Andy | アンディ
607a67ad90
sm6375-common: Remove unused code
2023-09-07 00:20:58 +08:00
Andy | アンディ
ba7b4bbe64
sm6375-common: sepolicy: Allow system_app
...
09-05 20:48:18.342 6384 6384 W com.android.settings: type=1400 audit(0.0:93): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0
09-05 20:48:18.382 6384 6384 W com.android.settings: type=1400 audit(0.0:94): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:system_suspend:s0 tclass=binder permissive=0
09-05 20:48:18.666 6384 6384 W com.android.settings: type=1400 audit(0.0:96): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:storaged:s0 tclass=binder permissive=0
09-05 20:48:18.673 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=suspend_control scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.674 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=suspend_control_internal scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.695 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=tracing.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:tracingproxy_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.702 6384 6384 W com.android.settings: type=1400 audit(0.0:97): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_lineage_health_default:s0 tclass=binder permissive=0
2023-09-06 09:43:38 +08:00
Andy | アンディ
779e212afd
sm6375-common: Allow system_susped to read sysfs
2023-09-05 22:37:26 +08:00
Andy | アンディ
92da6c66ff
sm6375-common: Reworking on NFC manifest
2023-09-05 22:37:26 +08:00
Andy | アンディ
7ac1c52300
sm6375-common: Set Board Vendor platform
2023-09-05 22:37:26 +08:00
REDGROUL
1c6aede45d
sm6375-common: Update nfc interface
2023-09-05 22:37:26 +08:00
Andy | アンディ
d6dfa2b25f
sm6375-common: Correct Architecture
2023-09-05 22:37:26 +08:00
chrisl7
af745fc21c
sm6375-common: sepolicy: Set stflashtool prop correctly
...
06-22 19:23:59.519 608 608 I auditd : type=1400 audit(0.0:17): avc: denied { read } for comm="STFlashTool" name="u:object_r:nfc_prop:s0" dev="tmpfs" ino=11923 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=file permissive=0
06-22 19:23:59.599 1 1 I auditd : type=1107 audit(0.0:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=nfc.fw.dnld_force pid=608 uid=1027 gid=1027 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=property_service permissive=0'
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:19:57 +07:00
chrisl7
ed5403c49b
sm6375-common: sepolicy: Allow huaqin to search vendor_sensors
...
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:21): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:22): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:23): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:24): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:25): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:26): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:27): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:28): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:29): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:30): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:31): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:32): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:33): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:34): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:35): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:36): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:37): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:38): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:39): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:40): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:41): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:42): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:43): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:44): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:45): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:46): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:47): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:48): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:49): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:50): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:51): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:52): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:53): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:54): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:55): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:56): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:57): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:58): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:59): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:60): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:13:54 +07:00
Akash Srivastava
1fb81e7e84
sm6375-common: rootdir: Chown the cgroup.procs nodes
...
* Perf-hal tries to access the nodes but requires permissions as reflected in the logs
* 11-10 19:25:50.044 1055 1080 E ANDR-PERF-OPTSHANDLER: Cannot open/create foreground cgroup file
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com >
Change-Id: I730f8b8bc7cc2b17595cac6130deacbc346d008f
2023-08-25 23:11:29 +07:00
Vishalcj17
542594f725
sm6375-common: ueventd: Change permissions for /dev/diag
...
[1] - Add override
* Logs spam with error '-13' which basically translates to access
denied/invalid permission.
* Fix this by giving system read and write access.
Before in log:
Diag_Lib: Diag_LSM_Init: Failed to open handle to diag driver, error
= 13
Change-Id: Ic06b0de0a729052593fb3c703362c5c199f9fd0b
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com >
2023-08-25 23:09:51 +07:00