* Perf-hal tries to access the nodes but requires permissions as reflected in the logs
* 11-10 19:25:50.044 1055 1080 E ANDR-PERF-OPTSHANDLER: Cannot open/create foreground cgroup file
* As per the init.qcom.rc service defination has vendor prefix
* This Fixes:
I init : Command 'start rmt_storage' action=boot (/vendor/etc/init/hw/init.target.rc:161) took 0ms and failed: service rmt_storage not found
This patch removed the old writeout policy tune which was never touched since
2009. In the meantime, most of Android devices are equipped with over 4GB DRAM
and very fast flash storages like UFS, which becomes more like desktop or
servers in 2009. So, it'd be worth to go back to use the default kernel configs.
* this service runs from vendor in non-stock roms and enables gsi
mode in order to pass cts/vts, but also has the side effect of
breaking aux cams and more
* since we are not running any cts or vts tests, disable these
services to retain stock behavior of camera hal and other stuff
* retain oppo_version and product mounts while we're at it
Signed-off-by: debdeep199x <debdeep199x@gmail.com>
/dev/hw_random
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
c78a463e87
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
Signed-off-by: debdeep199x <debdeep199x@gmail.com>
To help mitigate data loss potential in the event of an unclean
shutdown. The small performance hit is worth the trade-off for improved
data integrity, especially since custom builds are more susceptible to
unclean shutdowns during development.
Signed-off-by: debdeep199x <debdeep199x@gmail.com>
Define cpu set for audio app. This is to optimize
audio scheduling against lpm exit latencies.
CRs-Fixed: 2588130
Change-Id: If53c569febb0dbf3adf69c5cea2db6d505ba8471
Signed-off-by: debdeep199x <debdeep199x@gmail.com>
Enable mount option and encryption flags to use new file encryption
architecture.
Change-Id: I4a99068baf6830b9e0e86619420be6ab6809db3e
Signed-off-by: default avatarNeeraj Soni <neersoni@codeaurora.org>
Signed-off-by: debdeep199x <debdeep199x@gmail.com>
* CAF added a socket creation to hwcomposer service for post-processing
blobs to work. As AOSP interface does not have this, some display
features such as SVI configuration is broken and hwcomposer will crash
after adding it on boot. Instead of relying on framework fixes, we can
just override service definition and create the socket in this way.
* Reference: 73a427f95e
Signed-off-by: SagarMakhar <sagarmakhar@gmail.com>