This repository contains hardware configurations commonly needed for building Android for MT6753 SoCs. This also includes MT6735 and its variants (MT6735p and m).
Just include all makefiles and your device is mostly set up already :)
Common Hardware Configuration for Mediatek MT6753 SoC
License: GNU General Public License v2.0
Well it's a good thing I'm following borring classes cuz the best I have to do is ssh back home to find some joy.
I'm implementing a few (secret for now) stuff and, huh, let's put that in easy to understand words, SELinux made me salty af.
But ! There's so many shizzle going on, this might be the reason why Bluetooth is not properly working (
W/bt_hc_worker( 2572): type=1400 audit(0.0:11): avc: denied { search } for name="block" dev="tmpfs" ino=7274 scontext=u:r:bluetooth:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:12): avc: denied { search } for name="block" dev="tmpfs" ino=7274 scontext=u:r:bluetooth:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:13): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:14): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:15): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:16): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:17): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:18): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:19): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:20): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:21): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:22): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:23): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:24): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:25): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
W/bt_hc_worker( 2572): type=1400 audit(0.0:26): avc: denied { read } for name="nvram" dev="mmcblk0p25" ino=4401 scontext=u:r:bluetooth:s0 tcontext=u:object_r:nvram_data_file:s0 tclass=lnk_file permissive=0
I'll make this huge and boring issue a "101 sepolicy ok fuk awf and work" :
$ adb shell su root dmesg | grep avc
$ adb shell su root dmesg | audit2allow -p out/target/product/-DEVICE-/root/sepolicy
This will output a "fix" as follow :
allow system_app sysfs_keypad_file:file open;
But it's usually a good practice to read the output and "fix" it, as in, some files simply don't have a context, and allowing an app to read/write/open/ioctl all unlabeled_files is as good as disabling selinux (sort of)
(ps: you can feel the distress from the dev who made audit2WHY and audit2ALLOW, coming upgrade will introduce audit2PLEASE)
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.