galaxy-msm8916 / android_device_samsung_msm8916-common Goto Github PK
View Code? Open in Web Editor NEWCommon MSM8916 tree for Samsung devices
Common MSM8916 tree for Samsung devices
I guess we're need to change color calibration cmhw
Currently there are the main problems:
By accessing https://github.com/Galaxy-MSM8916/releases/releases No release has a change log, it is through a file, which is something different, yes, no one can distinguish such changes.
Unlike: https://github.com/fork-maintainers/iceraven-browser/releases where if there is a changelog per release
, here There is also no way to send any issue or error report, since the button does not exist.
None of the builds can be tested for different problems, the most common being errors in the typical "updater-script" file. Moderators are required to discard or approve a new build
From the mobile version it is impossible to go immediately to the last existing compilation, in fact you have to navigate page by page until you reach the desired file, another problem is that they are out of order (if you want to find a build of LineageOS 17 for Grand Prime, you have to check the file name one by one)
hardware/qcom/display-caf/msm8916/libhwcomposer/../common.mk: error: hwcomposer.msm8916 (SHARED_LIBRARIES android-arm) missing libskia (SHARED_LIBRARIES android-arm)
Available variants:
libskia (STATIC_LIBRARIES android-arm)
You can set ALLOW_MISSING_DEPENDENCIES=true in your environment if this is intentional, but that may defer real problems until later in the build.
build/make/core/main.mk:850: error: exiting from previous errors.
13:01:06 ckati failed with: exit status 1
also we're need to check hardware/samsung, maybe it is already exists and need to do nothing
It seems that the former configs in these variables(DEVICE_PACKAGE_OVERLAYS, PRODUCT_COPY_FILES and PRODUCT_PROPERTY_OVERRIDES) overrides the latter configs. for example:
PRODUCT_PROPERTY_OVERRIDES += ro.config.zram.enabled=true ro.config.zram.enabled=false
will get ro.config.zram.enabled=true in the build.
So we need to put these these variables before inherit-product to override the configs in inherited files instead of letting inherited files override our configs.
I used this common tree in conjunction with your gt510wifi and gte-common tree to create an android build. It's an android 7.1.2 RR build without root. The hwcomposer driver (hwcomposer.msm8916.so) is in the system/lib/hw folder. The two gralloc drivers (which seem to be working) are in the same directory as the hwcomposer driver. I picked the hwcomposer from a working rom, it is definitely a working driver.
---- SurfaceFlinger log ----
11-20 13:26:58.464 1319 1319 I SurfaceFlinger: SurfaceFlinger is starting
11-20 13:26:58.466 1319 1319 I SurfaceFlinger: SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
11-20 13:26:58.468 1319 1319 D libEGL : loaded /vendor/lib/egl/libEGL_adreno.so
11-20 13:26:58.493 1319 1319 D libEGL : loaded /vendor/lib/egl/libGLESv1_CM_adreno.so
11-20 13:26:58.518 1319 1319 D libEGL : loaded /vendor/lib/egl/libGLESv2_adreno.so
11-20 13:26:58.537 1319 1319 I Adreno-EGL: <qeglDrvAPI_eglInitialize:379>: EGL 1.4 QUALCOMM build: Nondeterministic_AU_msm8916_64_LA.BR.1.2.9_RB1__release_AU (I38fdb1353f)
11-20 13:26:58.537 1319 1319 I Adreno-EGL: OpenGL ES Shader Compiler Version: XE031.09.00.03
11-20 13:26:58.537 1319 1319 I Adreno-EGL: Build Date: 10/24/16 Mon
11-20 13:26:58.537 1319 1319 I Adreno-EGL: Local Branch: mybranch22985090
11-20 13:26:58.537 1319 1319 I Adreno-EGL: Remote Branch: quic/LA.BR.1.2.9_rb1.8
11-20 13:26:58.537 1319 1319 I Adreno-EGL: Local Patches: NONE
11-20 13:26:58.537 1319 1319 I Adreno-EGL: Reconstruct Branch: NOTHING
11-20 13:26:58.540 1319 1319 I gralloc : using (fd=12)
11-20 13:26:58.540 1319 1319 I gralloc : id = mdssfb_80000
11-20 13:26:58.540 1319 1319 I gralloc : xres = 768 px
11-20 13:26:58.540 1319 1319 I gralloc : yres = 1024 px
11-20 13:26:58.540 1319 1319 I gralloc : xres_virtual = 768 px
11-20 13:26:58.540 1319 1319 I gralloc : yres_virtual = 2048 px
11-20 13:26:58.540 1319 1319 I gralloc : bpp = 32
11-20 13:26:58.540 1319 1319 I gralloc : r = 0:8
11-20 13:26:58.540 1319 1319 I gralloc : g = 8:8
11-20 13:26:58.540 1319 1319 I gralloc : b = 16:8
11-20 13:26:58.540 1319 1319 I gralloc : width = 148 mm (131.805405 dpi)
11-20 13:26:58.540 1319 1319 I gralloc : height = 197 mm (132.028427 dpi)
11-20 13:26:58.540 1319 1319 I gralloc : refresh rate = 2.31 Hz
11-20 13:26:58.544 1319 1319 E SurfaceFlinger: hwcomposer module not found
11-20 13:26:58.548 1319 1319 I SurfaceFlinger: EGL information:
11-20 13:26:58.548 1319 1319 I SurfaceFlinger: vendor : Android
11-20 13:26:58.548 1319 1319 I SurfaceFlinger: version : 1.4 Android META-EGL
11-20 13:26:58.548 1319 1319 I SurfaceFlinger: extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_swap_buffers_with_damage EGL_ANDROID_create_native_client_buffer EGL_ANDROID_front_buffer_auto_refresh EGL_KHR_image EGL_KHR_image_base EGL_KHR_lock_surface EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_3D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_KHR_create_context EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buff11-20 13:26:58.548 1319 1319 I SurfaceFlinger: Client API: OpenGL_ES
11-20 13:26:58.548 1319 1319 I SurfaceFlinger: EGLSurface: 8-8-8-8, config=0x5
11-20 13:26:58.549 1319 1319 I SurfaceFlinger: OpenGL ES informations:
11-20 13:26:58.549 1319 1319 I SurfaceFlinger: vendor : Qualcomm
11-20 13:26:58.549 1319 1319 I SurfaceFlinger: renderer : Adreno (TM) 306
11-20 13:26:58.549 1319 1319 I SurfaceFlinger: version : OpenGL ES 3.0 [email protected] AU@ (GIT@I38fdb1353f)
11-20 13:26:58.549 1319 1319 I SurfaceFlinger: extensions: GL_AMD_compressed_ATC_texture GL_AMD_performance_monitor GL_AMD_program_binary_Z400 GL_EXT_debug_label GL_EXT_debug_marker GL_EXT_discard_framebuffer GL_EXT_robustness GL_EXT_texture_format_BGRA8888 GL_EXT_texture_type_2_10_10_10_REV GL_NV_fence GL_OES_compressed_ETC1_RGB8_texture GL_OES_depth_texture GL_OES_depth24 GL_OES_EGL_image GL_OES_EGL_sync GL_OES_EGL_image_external GL_OES_element_index_uint GL_OES_fbo_render_mipmap GL_OES_fragment_precis11-20 13:26:58.549 1319 1319 I SurfaceFlinger: GL_MAX_TEXTURE_SIZE = 4096
11-20 13:26:58.549 1319 1319 I SurfaceFlinger: GL_MAX_VIEWPORT_DIMS = 4096
11-20 13:26:58.556 1319 1319 I SurfaceFlinger: EGL information:
11-20 13:26:58.556 1319 1319 I SurfaceFlinger: vendor : Android
11-20 13:26:58.556 1319 1319 I SurfaceFlinger: version : 1.4 Android META-EGL
11-20 13:26:58.556 1319 1319 I SurfaceFlinger: extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_swap_buffers_with_damage EGL_ANDROID_create_native_client_buffer EGL_ANDROID_front_buffer_auto_refresh EGL_KHR_image EGL_KHR_image_base EGL_KHR_lock_surface EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_3D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_KHR_create_context EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buff11-20 13:26:58.556 1319 1319 I SurfaceFlinger: Client API: OpenGL_ES
11-20 13:26:58.556 1319 1319 I SurfaceFlinger: EGLSurface: 8-8-8-8, config=0x5
Hello,
im trying to grant notification access to an app, but am instead greeted with "This feature is not available on this device".
On other Lineage devices this is working fine (could only test on Note Pro 12.2).
Android version: 9
LineageOS-Version: 16.0-20190102-NIGHTLY-j5nlte
Build-Number: lineage_j5nlte-userdebug 9 PQ1A
Kernel-Version: 3.10.108-gb16e5db74e4-04757-gfef3eaa9d80 (#1 Wed Jan 2 15:24:32 UTC 2019)
The MediaCodecsXmlParser can't read the codecs in /system/etc/
04-28 18:52:36.057 373-373/? E/MediaCodecsXmlParser: addMediaCodecFromAttributes: updating non-existing codec
04-28 18:52:36.057 373-373/? W/MediaCodecsXmlParser: parseTopLevelXMLFile(/etc/media_codecs_performance.xml) failed
unable to open media codecs configuration xml file: /data/misc/media/media_codecs_profiling_results.xml
parseTopLevelXMLFile(/data/misc/media/media_codecs_profiling_results.xml) failed
Are there any seccomp filters missing?
The media_codecs_performance.xml file is well formed xml and present in /system/etc.
The omx drivers are broken because of this behaviour.
I'm using gtelwifiue + msm8916-common drivers.
Update with reworked sysfs interface resembling this:
/sys/class
└── touch_disabler
├── touch_key
│ ├── enabled
│ └── mode
└── touch_panel
├── enabled
└── mode
For separate control of tk/ts.
Can we also see if its possible to use the sources at hardware/qcom instead?
This especially:
avc: denied { execmod } for pid=1031 comm="mm-qcamera-daem" path="/system/vendor/lib/libmmcamera_faceproc.so" dev="mmcblk0p25" ino=2484 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1
cm-13.0:
Try these:
allow system_app sysfs:file { write };
allow init system_file:file { execute_no_trans };
allow mediaserver mediaserver_tmpfs:file { execute };
allow mediaserver system_file:file { execmod };
allow qti_init_shell sysfs:file { relabelfrom };
allow qti_init_shell sysfs_devices_system_cpu:file { relabelto };
allow qti_init_shell sysfs_devices_system_cpu:dir { relabelto };
avc: denied { execmod } comm="mediaserver" path="/system/lib/lib_Samsung_AudioZoom_v102.so" dev="mmcblk0p25" scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1
avc: denied { execute } comm="Binder_2" dev="tmpfs" scontext=u:r:mediaserver:s0 tcontext=u:object_r:mediaserver_tmpfs:s0 tclass=file permissive=1
avc: denied { execute_no_trans } comm="init" path="/system/bin/perfd" dev="mmcblk0p25" scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { execute_no_trans } comm="init" path="/system/bin/thermal-engine" dev="mmcblk0p25" scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1
avc: denied { getattr } comm="ps" path="/proc/1" dev="proc" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=0
avc: denied { getattr } comm="ps" path="/proc/8" dev="proc" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=0
avc: denied { relabelfrom } comm="restorecon" name="interactive" dev="sysfs" scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
avc: denied { relabelfrom } comm="restorecon" name="min_sample_time" dev="sysfs" scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
avc: denied { relabelto } comm="restorecon" name="interactive" dev="sysfs" scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir permissive=1
avc: denied { relabelto } comm="restorecon" name="min_sample_time" dev="sysfs" scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1
avc: denied { search } comm="ps" name="1" dev="proc" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=0
avc: denied { write } comm="s.inputdisabler" name="enabled" dev="sysfs" scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
These are inextricably intertwined. So hopefully reversing the stock ril and fixing up the sim detection on the oss ril will fix in call audio on the oss audio stack as well.
This should be a minor modification on the stock VibratorHW cmhw class.
In a similar style to http://github.com/LineageOS/android_device_cyanogen_msm8916-common init
Remove unneeded adreno firmware from proprietary-files.txt and from vendor blobs (+PR to Muppets and associated commit to gerrit)
Same as the issue on a3-common.
After successfully compiling a working Nougat operating system for my tablet, I encountered another issue while building LineageOS 15.1 for my gt510wifi. gt510wifi, gte-common and msm8916-common device trees are my setup.
Stacktrace:
hardware/qcom/audio-caf/msm8916/policy_hal/AudioPolicyManager.cpp:1025:45: error: no member named 'getActiveInput' in 'android::AudioInputCollection'
audio_io_handle_t activeInput = mInputs.getActiveInput();
~~~~~~~ ^
hardware/qcom/audio-caf/msm8916/policy_hal/AudioPolicyManager.cpp:1877:48: error: too many arguments to function call, expected 9, have 10
inputType);
^~~~~~~~~
frameworks/av/services/audiopolicy/managerdefault/AudioPolicyManager.h:130:9: note: 'getInputForAttr' declared here
virtual status_t getInputForAttr(const audio_attributes_t *attr,
^
hardware/qcom/audio-caf/msm8916/policy_hal/AudioPolicyManager.cpp:1900:49: error: no member named 'getActiveInput' in 'android::AudioInputCollection'
audio_io_handle_t activeInput = mInputs.getActiveInput();
~~~~~~~ ^
hardware/qcom/audio-caf/msm8916/policy_hal/AudioPolicyManager.cpp:1910:69: error: no member named 'getActiveAudioSessions' in 'android::AudioInputDescriptor'
AudioSessionCollection activeSessions = activeDesc->getActiveAudioSessions();
~~~~~~~~~~ ^
hardware/qcom/audio-caf/msm8916/policy_hal/AudioPolicyManager.cpp:1993:52: error: reference to type 'const sp<android::AudioInputDescriptor>' could not bind to an lvalue of type 'audio_io_handle_t' (aka 'int')
audio_devices_t device = getNewInputDevice(input);
Is the audio policy incomplete?
please turn selinux on by default in msm8916
wpa_supplicant.conf can be made from sources
PRODUCT_PACKAGES +=
wpa_supplicant.conf
The branch cm-14.1-sepolicy
is specifically for that.
com.qualcomm.location not used on 7.x
I guess we're need to add ril-shim building
los14:
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:userinit_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:userinit_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:userinit_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:userinit_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:adbsecure_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:adbsecure_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:adbsecure_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:adbsecure_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:recovery_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:recovery_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:recovery_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:recovery_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:adbtcp_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:adbtcp_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:adbtcp_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:adbtcp_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:media_msm8939hw_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:media_msm8939hw_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:media_msm8939hw_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:media_msm8939hw_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:boot_mode_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:boot_mode_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:boot_mode_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:boot_mode_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:sys_usb_tethering_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:sys_usb_tethering_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:sys_usb_tethering_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:sys_usb_tethering_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:sys_usb_configfs_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:sys_usb_configfs_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:sys_usb_configfs_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:sys_usb_configfs_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:sys_usb_controller_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:sys_usb_controller_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:sys_usb_controller_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:sys_usb_controller_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:mpdecision_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:mpdecision_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:mpdecision_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:mpdecision_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:spcomlib_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:spcomlib_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:spcomlib_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:spcomlib_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:safemode_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:safemode_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:safemode_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:safemode_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:mmc_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:mmc_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1
avc: denied { open } comm="getprop" path="/dev/properties/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1
avc: denied { getattr } comm="getprop" path="/dev/properties/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" scontext=u:r:sudaemon:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1
avc: denied { read } comm="IntentService[D" name="/" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { open } comm="IntentService[D" path="/dev" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { read } comm="Binder:5460_3" name="/" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { open } comm="Binder:5460_3" path="/dev" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { read } comm="Binder:5460_3" name="/" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { open } comm="Binder:5460_3" path="/dev" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { write } comm="s.inputdisabler" name="enabled" dev="sysfs" scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
avc: denied { read } comm="Binder:5460_1" name="/" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
avc: denied { open } comm="Binder:5460_1" path="/dev" dev="tmpfs" scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=1
04-04 22:38:11.624 5211 5211 I s.inputdisabler: type=1400 audit(0.0:365): avc: denied { write } for name="enabled" dev="sysfs" ino=20484 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_input:s0 tclass=file permissive=1
04-04 22:38:11.624 5211 5211 I s.inputdisabler: type=1400 audit(0.0:365): avc: denied { open } for path="/sys/devices/soc.0/78b9000.i2c/i2c-5/5-0020/input/input2/enabled" dev="sysfs" ino=20484 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_input:s0 tclass=file permissive=1
04-04 22:38:11.624 5211 5211 I s.inputdisabler: type=1400 audit(0.0:366): avc: denied { getattr } for path="/sys/devices/soc.0/78b9000.i2c/i2c-5/5-0020/input/input2/enabled" dev="sysfs" ino=20484 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_input:s0 tclass=file permissive=1
01-04 00:00:11.089 1 1 I init : type=1400 audit(0.0:16): avc: denied { write } for name="tracing_on" dev="debugfs" ino=2063 scontext=u:r:init:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1
01-04 00:00:14.139 426 426 I rfs_access: type=1400 audit(0.0:20): avc: denied { write } for name="rfsa" dev="debugfs" ino=6380 scontext=u:r:rfs_access:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1
01-04 00:00:14.139 426 426 I rfs_access: type=1400 audit(0.0:20): avc: denied { open } for path="/sys/kernel/debug/rmt_storage/rfsa" dev="debugfs" ino=6380 scontext=u:r:rfs_access:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1
01-04 00:00:14.179 426 426 I rfs_access: type=1400 audit(0.0:21): avc: denied { net_raw } for capability=13 scontext=u:r:rfs_access:s0 tcontext=u:r:rfs_access:s0 tclass=capability permissive=1
01-04 00:00:14.179 426 426 W rfs_access: type=1300 audit(0.0:21): arch=40000028 syscall=282 per=800008 success=yes exit=0 a0=9 a1=bee496e8 a2=14 a3=1 items=0 ppid=1 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=4294967295 tty=(none) exe="/system/bin/rfs_access" subj=u:r:rfs_access:s0 key=(null)
01-04 00:00:14.179 437 437 I rmt_storage: type=1400 audit(0.0:22): avc: denied { dac_override } for capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=1
01-04 00:00:14.179 437 437 W rmt_storage: type=1300 audit(0.0:22): arch=40000028 syscall=322 per=800008 success=yes exit=4 a0=ffffff9c a1=ad3a0985 a2=20401 a3=0 items=0 ppid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) exe="/system/bin/rmt_storage" subj=u:r:rmt_storage:s0 key=(null)
01-04 00:00:14.199 437 437 I rmt_storage: type=1400 audit(0.0:23): avc: denied { net_raw } for capability=13 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=1
01-04 00:00:15.359 505 505 I audiod : type=1400 audit(0.0:29): avc: denied { dac_override } for capability=1 scontext=u:r:audiod:s0 tcontext=u:r:audiod:s0 tclass=capability permissive=1
type=1400 audit(0.0:128): avc: denied { sys_nice } for capability=23 scontext=u:r:zygote:s0 tcontext=u:r:zygote:s0 tclass=capability permissive=1
04-13 01:17:18.541 5802 5802 I codec_looper: type=1400 audit(0.0:332): avc: denied { read write } for name="msm_aac_in" dev="tmpfs" ino=8981 scontext=u:r:mediaserver:s0 tcontext=u:object_r:audio_device:s0 tclass=chr_file permissive=1
04-13 01:17:18.541 5802 5802 I codec_looper: type=1400 audit(0.0:332): avc: denied { open } for path="/dev/msm_aac_in" dev="tmpfs" ino=8981 scontext=u:r:mediaserver:s0 tcontext=u:object_r:audio_device:s0 tclass=chr_file permissive=1
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.