107 Commits
vic ... udc

Author SHA1 Message Date
Michael Bestas
811212e505 fixup! Disable userdebug diagnostics
Change-Id: I9ec35b51e3414bded1945b7035372d91ef960414
2024-09-07 16:34:17 +03:00
Michael Bestas
9992b27bee Skip gyotaku_app for lineage builds
Change-Id: Id008beef114445506064ed29c5061acd3a59ff40
2024-06-15 22:31:53 +03:00
Michael Bestas
0e948f4412 Merge tag 'android-14.0.0_r50' into staging/lineage-21_merge-android-14.0.0_r50
Android 14.0.0 Release 50 (AP2A.240605.024)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmgAKCRDorT+BmrEO
# eJDEAJ0YGatrj3lBqOKazrdp0XDE1LC14wCaAkRV/x5bLTHYRicXhZkOglIUZRE=
# =2XY/
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Jun 11 00:43:54 2024 EEST
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2542 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Lei Ju (5) and others
# Via Android Build Coastguard Worker (41) and others
* tag 'android-14.0.0_r50': (59 commits)
  [Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet
  Revert "Add betterbug folder to gs-common"
  gps: add policy for partial reset feature
  dumpstate: thermal: update thermal dump script path
  Add betterbug folder to gs-common
  Add PRODUCT_MODULE_BUILD_FROM_SOURCE to fullmte
  Add OWNERS for gs-common/mte.
  Revert "Move sepolicy files from hardware/google/pixel-sepolicy."
  gs-common:thermal: Add thermal owner file
  Move sepolicy files from hardware/google/pixel-sepolicy.
  Allow gnssd set gps property
  gps: Enable Pixel GNSS HAL
  audio: add file_contexts of /dev/acd-mc_headpos
  [Gyotaku] Add the access /data/vendor/gyotaku sepolicy for gyotaku_app domain
  [Gyotaku] Add the dumpLog for gyotaku app
  Give EdgeTpu access to vendor_pcs_app
  Add Gralloc Flags
  Enable MTE workaround for b/324412910
  Set ro.audio.ihaladaptervendorextension_enabled property
  Update policy for ECOService switch to NDK binder
  ...

 Conflicts:
	aoc/aoc.mk
	dauntless/gsc.mk

Change-Id: I38c8a407d90fff523c02a4ebb3b129ed602ebe0c
2024-06-15 22:26:04 +03:00
Michael Bestas
a9d1fe5846 modem: Erase /data/vendor/slog
Free up 2.4GB of space used by leftover modem logs.

Change-Id: If2efcbb9a18a8a945e9620c0df819d0bd82d8ad7
2024-04-25 15:34:27 +03:00
Michael Bestas
682713dca6 fixup! Disable userdebug diagnostics
Change-Id: Ied3208234e16a8b6939e192e4b2f39d589f7a6a7
2024-04-24 20:03:50 +03:00
Michael Bestas
2e79d80e69 Merge tag 'android-14.0.0_r29' into staging/lineage-21_merge-android-14.0.0_r29
Android 14.0.0 release 29

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZWyQAKCRDorT+BmrEO
# eEhlAJ9z+0PuxsobmnGcd76nipBxryfkggCfUbqZG8SEc5zTFPwJdlLvVCWj5Ng=
# =4EhT
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Mar  5 01:18:33 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2371 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Adam Shih (14) and others
# Via Automerger Merge Worker (832) and others
* tag 'android-14.0.0_r29': (122 commits)
  Dumpstate: Remove heap stats
  aoc: add policy to read system property
  dumpstate: add logbuffer support for display
  powerstats: introduce TpuDvfsStateResidencyDataProvider
  [GABC][FATP] Added ProtoCalibGenerator to PRODUCT_PACKAGES_DEBUG
  gs-common: bootctrl: integrate blowAR() for gs101 & zuma
  gs-common: bootctrl: check both properties in setActiveBootSlot
  gs-common: move sepolicy related to bootctrl hal hidl 1.2 to gs-common
  gs-common: create bootctrl_hidl_1.2.mk and include related modules
  gs-common: move bootctrl hal hidl 1.2 implementation to gs-common
  audio: allow hal_audio_default to allocate graphic buffer
  gs-common: move sepolicy related to bootctrl hal aidl to gs-common
  gs-common: create bootctrl_aidl.mk and include related modules
  gs-common: move bootctrl hal aidl implementation to gs-common
  gs-common: add device_google_gs-common_license
  bm: Avoid to use CDT number
  Revert "gs-common: add device_google_gs-common_license"
  Revert "gs-common: move bootctrl hal aidl implementation to gs-c..."
  Revert "gs-common: create bootctrl_aidl.mk and include related m..."
  Revert "gs-common: move sepolicy related to bootctrl hal aidl to..."
  ...

 Conflicts:
	gxp/dump.mk
	soc/soc.mk

Change-Id: Ib2f0bc9419bac6110933855dc90cf2c8a0d5cf15
2024-03-10 07:29:44 +02:00
Android Build Coastguard Worker
698d44854d Merge cherrypicks of ['googleplex-android-review.googlesource.com/25841541'] into 24Q1-release.
Change-Id: I04399bcda8e6d451dc4ff91bd489d5f2a5771693
2024-01-11 01:39:40 +00:00
Ben McGee
6030812881 Dumpstate: Remove heap stats
Bug 315711190 is caused by an issue parsing the heap statistics. A proposed long term fix has been merged in, but is deemed risky for 24Q1. This CL removes heap printing from dumpstate is a low risk approach to working around this bug.

Bug: 315711190
Test: Built and tested on device
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1370b0e33322fb5c18a5cba832fc4d391d96561d)
Merged-In: I6134aeeda6fe74d9bbf966d44a1a98391e03a2f7
Change-Id: I6134aeeda6fe74d9bbf966d44a1a98391e03a2f7
2024-01-11 01:36:14 +00:00
Android Build Coastguard Worker
62ef9bc30c Snap for 11220357 from 477d1dae77 to 24Q1-release
Change-Id: I33ccf2abd6d0928ebbfcaf5ffc8417b5c02137c9
2023-12-15 00:22:03 +00:00
Android Build Coastguard Worker
f59aba6e76 Snap for 11216811 from 24a4d5ebc2 to 24Q1-release
Change-Id: Iccc64b734a337e75e66c1011f25184717c15232a
2023-12-14 00:02:36 +00:00
Android Build Coastguard Worker
586b231ff2 Snap for 11206181 from 175dd9b1b4 to 24Q1-release
Change-Id: I3a9490f5776adc0ba9b130889bf738928eb7893f
2023-12-12 02:02:01 +00:00
Michael Bestas
e91a9c1b48 Merge tag 'android-14.0.0_r17' into staging/lineage-21_merge-android-14.0.0_r17
Android 14.0.0 Release 17 (UQ1A.231205.015)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZXDPIgAKCRDorT+BmrEO
# eJvKAJ9PWdJlNAjVuLmxYCBDL1v6sV+eBwCcDWY8ZehEPSPmL4qYBR7mHIuA/gE=
# =a4OH
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Dec  6 21:44:34 2023 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2202 signatures in the past
#      2 years.  Encrypted 4 messages in the past 23 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Utku Utkan (13) and others
# Via Automerger Merge Worker (138) and others
* tag 'android-14.0.0_r17': (90 commits)
  Revert "Add radio_ext aidl to compatibility matrix"
  Add radio_ext aidl to compatibility matrix
  [SELinux] Add gyotaku_app doamin to gs-common.
  Add missing node_bind permission to SEPolicy.
  touch: Set permissions for interactive_calibration
  Configure SEPolicy to allow PCS to open and use socket connections.
  [SE Policy] Update CCA path and fix wrong directory in call_count
  audio: add radio sepolicy for hidl/aidl
  sepolicy: add permission for call count of pixelstats-vend.
  sepolicy: fix avc denied for sysfs_wakeup
  update gps sdk 147.20.23.576859
  Add SEPolicy config for PCS to act as a media app
  Allow Pixel Camera Services to bind to Lyric for callbacks
  refactor and merge gps build system
  storage: turn off pixel storage debugging code on user builds
  Add new label for stats_reset
  Disable armnn nnapi backend
  Add SePolicy allowances for ICameraIdRemapper
  Associate vendor_pcs_app with PCS services
  update gps sdk 147.20.23.576052
  ...

 Conflicts:
	battery_mitigation/bcl.mk
	gps/brcm/device.mk
	gps/brcm/device_v2.mk
	gps/brcm/prebuilt/SensorHub_A0.patch
	gps/brcm/prebuilt/SensorHub_DebugBuild_A0.patch
	gps/brcm/prebuilt/android.hardware.gnss@2.1-service-brcm
	gps/brcm/prebuilt/flp.default.so
	gps/brcm/prebuilt/gps.default.so
	gps/brcm/prebuilt/gpsd
	gps/brcm/prebuilt/lhd
	gps/brcm/prebuilt/scd

Change-Id: Ifb4df5be2d669d6cf0fa7d652f53561743e0e442
2023-12-10 22:13:38 +02:00
Android Build Coastguard Worker
a18580dbb5 Snap for 11200327 from 37493030cc to 24Q1-release
Change-Id: I00dc1571754058c36dc22904196e3aa685ec03fe
2023-12-09 04:02:22 +00:00
Android Build Coastguard Worker
925347d2a4 Snap for 11192287 from cf1faabf1a to 24Q1-release
Change-Id: Ibc2b4db01e791cf6c9668a4029642d43d35c9167
2023-12-08 00:02:43 +00:00
Android Build Coastguard Worker
85b66936ad Snap for 11180250 from ec2a9a0c7a to 24Q1-release
Change-Id: I6154daa772e384235cf51449b0431bd44c0d1387
2023-12-06 00:04:25 +00:00
Android Build Coastguard Worker
7c2dc442f4 Snap for 11175020 from 39e3b868f2 to 24Q1-release
Change-Id: I08b09c03a613831efe7f3dbb03f67b3b8b3bd6a2
2023-12-05 02:30:32 +00:00
Android Build Coastguard Worker
1aaf45b1ed Snap for 11169761 from 65710c0477 to 24Q1-release
Change-Id: Ib7633a8bb474f1245b1138c19be34cb628545790
2023-12-02 02:01:57 +00:00
Android Build Coastguard Worker
9e0d8cd6b7 Snap for 11157599 from 039b7e6d76 to 24Q1-release
Change-Id: I7575f9a0701ac4f12ecd2bf136de82dd3c653c42
2023-11-30 00:03:31 +00:00
Android Build Coastguard Worker
0c80c4903d Snap for 11135477 from 8996d1b7ee to 24Q1-release
Change-Id: Icf2d91a64eb8286a1d27e21e9bb09fb415298489
2023-11-23 00:02:28 +00:00
Android Build Coastguard Worker
e4589f5ccf Snap for 11130229 from 057e9b0f74 to 24Q1-release
Change-Id: I92190e813936c04c0db2a2b36788508d04106253
2023-11-22 00:03:27 +00:00
Android Build Coastguard Worker
b0e6bce970 Snap for 11117647 from 5464547f2f to 24Q1-release
Change-Id: I7e57e817d98ac044ca1786b5e42aa05cc451881e
2023-11-18 02:01:53 +00:00
Android Build Coastguard Worker
b9ef3fddd1 Snap for 11111096 from e303e26ed6 to 24Q1-release
Change-Id: I67a3f3533782df2618c8c2532f9e70d723822549
2023-11-17 00:01:53 +00:00
Android Build Coastguard Worker
806b6aaee6 Snap for 11104212 from 14b5d03e28 to 24Q1-release
Change-Id: I4bb0fe75ab326783b9f0bbbd18370ccd8f916f58
2023-11-16 00:02:39 +00:00
Android Build Coastguard Worker
4f5fe230f2 Snap for 11097608 from 1720877693 to 24Q1-release
Change-Id: Ia13ec90d11198111e7b41f81c6b7adf8eb9ac2e7
2023-11-15 00:02:22 +00:00
Android Build Coastguard Worker
6bac540c02 Snap for 11078623 from f382fb25df to 24Q1-release
Change-Id: Ie9b3df5de678d0d7afc249fd8514ff082edf1e10
2023-11-10 00:02:04 +00:00
Android Build Coastguard Worker
a584da96f2 Snap for 11065517 from d0e028f175 to 24Q1-release
Change-Id: I156ac3a5380a8231f8c3aae1741810f36a1c30b6
2023-11-08 00:03:46 +00:00
Android Build Coastguard Worker
2e7113927a Snap for 11059422 from fc4015ffd8 to 24Q1-release
Change-Id: I0da4f19066ced8ee221b993d3506172147f3d19f
2023-11-07 02:02:28 +00:00
Android Build Coastguard Worker
df679ed3cf Snap for 11044623 from 5a0785e0ec to 24Q1-release
Change-Id: Ie92468f3e39557a3f978b2f04037f1e929a888df
2023-11-03 01:02:56 +00:00
Android Build Coastguard Worker
f26e0bac02 Snap for 11031655 from c5d1c75378 to 24Q1-release
Change-Id: I511512b3c494cd9e96279868f7a63825255eae3a
2023-11-01 01:02:37 +00:00
Android Build Coastguard Worker
078e72ab9f Snap for 11025555 from 2227da2941 to 24Q1-release
Change-Id: I8310434ba200858972f07350c2ffb9b0c4f0a891
2023-10-31 01:02:14 +00:00
Android Build Coastguard Worker
c987628f27 Snap for 11017726 from 4984f37fe0 to 24Q1-release
Change-Id: Ic8494714a714e64744087e6cb132c4e41bfcec8f
2023-10-28 03:11:53 +00:00
Android Build Coastguard Worker
fdd3c90659 Snap for 11012804 from 440a92fd67 to 24Q1-release
Change-Id: Ibfad165a6f5e5ebf79fadd431a4c9768cd0a5b46
2023-10-27 03:19:01 +00:00
Android Build Coastguard Worker
e82679c455 Snap for 10998418 from c299df119e to 24Q1-release
Change-Id: I261ac0c704f0c62ae9feb2e69b2eaeb0447366d7
2023-10-25 01:05:36 +00:00
Android Build Coastguard Worker
cdd927d8e0 Snap for 10992821 from 59b961ceeb to 24Q1-release
Change-Id: I3abe3caec69ef2be5c3fac8f57a76d35b17870da
2023-10-24 01:05:41 +00:00
Android Build Coastguard Worker
3ab92e37b9 Snap for 10985023 from b9e9138b71 to 24Q1-release
Change-Id: I42d473251e286e72daea66a6aa5887f42f8764ce
2023-10-21 03:05:25 +00:00
Android Build Coastguard Worker
b897e29741 Snap for 10975086 from 049b4fd745 to 24Q1-release
Change-Id: I1a7fcf6b7584053d6a5004ff5fc9aebb22bfb149
2023-10-20 03:10:30 +00:00
Android Build Coastguard Worker
f1fefdc888 Snap for 10970117 from b7f9b4a306 to 24Q1-release
Change-Id: I082ea25282a65ca18a9dc42081d938b19cd34a1a
2023-10-19 01:09:06 +00:00
Michael Bestas
b7ba453284 Always copy init.aoc.daemon.rc to vendor init
We don't have google bsp in tree but we include google's binaries.

Change-Id: I9fbe5b819a46b4500e2d78e65d02dfd1dcfdc8a4
2023-10-19 02:18:37 +03:00
Michael Bestas
c2cc4f62f9 Disable userdebug diagnostics
Change-Id: Icbdc3a61ab7b27f2aa0a6a07181b96edd9ee191a
2023-10-19 02:18:37 +03:00
Michael Bestas
1d25c9c521 Add .gitupstream
Change-Id: I78e398ecf9f4a95707dc0810d6ed8a0133b3fde2
2023-10-19 02:18:37 +03:00
Android Build Coastguard Worker
7efec67260 Snap for 10958510 from ab084a7329 to 24Q1-release
Change-Id: I94fda5904689635b8f7371c1ab7e3065def67127
2023-10-17 02:29:48 +00:00
Android Build Coastguard Worker
8c0965a28c Snap for 10950137 from 95a9e20876 to 24Q1-release
Change-Id: Iff2d5d53b0237029a4bf3520dd30d551a3e0e55e
2023-10-14 05:04:24 +00:00
Android Build Coastguard Worker
0ce9e3d2f1 Snap for 10934304 from c5c4ae5c1f to 24Q1-release
Change-Id: I6d2f30978ec32245e284684303f10d18c52560b7
2023-10-12 01:06:05 +00:00
Android Build Coastguard Worker
d54ca5c7df Snap for 10917888 from 3ab8fbb12d to 24Q1-release
Change-Id: I7881dec959ab4560f7aa67adcd26e9c3900320f2
2023-10-07 23:03:53 +00:00
Android Build Coastguard Worker
794823ecbe Snap for 10903783 from 10783087d3 to 24Q1-release
Change-Id: I76e49ed0a7ec964f934abc17d5cb9c6c21fee161
2023-10-05 03:04:14 +00:00
Android Build Coastguard Worker
1ae1ccbfd2 Snap for 10902624 from e5988c99b7 to udc-qpr1-release
Change-Id: Iabb054b7ab88180c51a3bb0d0f12532f0be0ab5b
2023-10-04 23:04:24 +00:00
Android Build Coastguard Worker
414899f348 Snap for 10897809 from 1ef3e443e6 to 24Q1-release
Change-Id: I14cd63b261566c193d17cb60b3373639920cedba
2023-10-04 02:29:05 +00:00
Android Build Coastguard Worker
858bb94eef Snap for 10889587 from f1f2d0b0f9 to 24Q1-release
Change-Id: I0ae2ad94cebe69c399929fbfbdf3f288753502d0
2023-10-03 03:04:14 +00:00
Android Build Coastguard Worker
9376b65823 Snap for 10884074 from 3eec8aaf0f to 24Q1-release
Change-Id: I8a4c76fd936a178594e0a30b6754ae4f74fc6c35
2023-09-30 03:04:15 +00:00
Android Build Coastguard Worker
9120529f33 Snap for 10872577 from 89796047b8 to 24Q1-release
Change-Id: I45f15d59f3e1d4ee51ee9436c13a5a67e6b4892d
2023-09-28 01:09:02 +00:00
Android Build Coastguard Worker
b359595163 Snap for 10851067 from a0d41f482e to 24Q1-release
Change-Id: I7ddbbac03d436aee21b967cd4aeb2fe1ad3495e0
2023-09-23 03:02:56 +00:00
Android Build Coastguard Worker
5dfee3a28e Snap for 10850711 from 7b9d0c41c3 to udc-qpr1-release
Change-Id: I59f30883a322dd46796bc6e03eb701b80830c9d2
2023-09-23 01:07:05 +00:00
Android Build Coastguard Worker
50097cd5c9 Snap for 10843824 from eec4beedd6 to 24Q1-release
Change-Id: I9bfa89a75fcaa182e118eedca439ed28455e7d30
2023-09-21 21:52:33 +00:00
Android Build Coastguard Worker
09650065e3 Snap for 10838116 from 678fb46c3c to udc-qpr1-release
Change-Id: Id9f7b23d3878db5d2594d08da447ba9901cb9a2d
2023-09-20 23:03:05 +00:00
Android Build Coastguard Worker
42524769ab Snap for 10804332 from f74211330b to udc-qpr1-release
Change-Id: I9747bdf0287b35d5a123c77c80528221872c6bf1
2023-09-13 23:02:33 +00:00
Android Build Coastguard Worker
889573baa3 Snap for 10797983 from 5384214b16 to udc-qpr1-release
Change-Id: I13b4ee5e2f303d3379999effe0d1a9270c4b9639
2023-09-12 23:02:49 +00:00
Android Build Coastguard Worker
32125364bc Snap for 10739918 from 66592f6157 to udc-qpr1-release
Change-Id: I4ddb4dd034d02c6d99c86a73ed3742e207a9a209
2023-08-30 23:03:07 +00:00
Android Build Coastguard Worker
5061169979 Snap for 10719298 from dcde0864df to udc-qpr1-release
Change-Id: I66a261e9f5ca98c790e4e0a482d8d6b253b6935d
2023-08-26 01:02:29 +00:00
Android Build Coastguard Worker
4f5bfe740e Snap for 10712072 from 38cae944c0 to udc-qpr1-release
Change-Id: Ia88ea27a93a2bf820f7d897efaea99b08e4bff9b
2023-08-24 23:02:08 +00:00
Android Build Coastguard Worker
3c38b05eb0 Snap for 10704513 from 327749d8d0 to udc-qpr1-release
Change-Id: Ied7d8f9c6f356be454dc6336f1cc1fc1fba05c6a
2023-08-23 23:03:05 +00:00
Android Build Coastguard Worker
2d30d4b027 Snap for 10662478 from 46d6a88211 to udc-qpr1-release
Change-Id: I2243e4c817378e028004ad3e0ebe625c3379f393
2023-08-15 23:02:08 +00:00
Android Build Coastguard Worker
cba8011730 Snap for 10649958 from 8be8295748 to udc-qpr1-release
Change-Id: I3f951024ea1c58905cecab3242dbf8848cc859db
2023-08-12 03:02:39 +00:00
Android Build Coastguard Worker
9c9900f4b2 Snap for 10643491 from 06f3b1500c to udc-qpr1-release
Change-Id: I78bfdfa7e722412c16cbf07cc0facc61cb9bd8b7
2023-08-11 01:07:56 +00:00
Android Build Coastguard Worker
3061bf4bfe Snap for 10635039 from a8f64567b2 to udc-qpr1-release
Change-Id: I30fbf6908db75786f61c3d7eb5ed602673a2fa47
2023-08-09 23:02:29 +00:00
Android Build Coastguard Worker
f84a1c12f4 Snap for 10628727 from 811c9a9f69 to udc-qpr1-release
Change-Id: I5d8061025e5503595e6a16f63df88f6c6d38e26c
2023-08-08 23:02:27 +00:00
Android Build Coastguard Worker
ca8594108d Snap for 10622798 from 06c6ca63b5 to udc-qpr1-release
Change-Id: I0cfde23fe2bb45069ac88171271f1f17a50e2263
2023-08-07 23:02:44 +00:00
Android Build Coastguard Worker
024e81aedc Snap for 10612918 from 2850ae9e7f to udc-qpr1-release
Change-Id: If3c00127a5a4cc7eaafab1e2d2afa6fe8be4969b
2023-08-05 01:03:20 +00:00
Android Build Coastguard Worker
ff101f820c Snap for 10587196 from 8a384c8371 to udc-qpr1-release
Change-Id: Idf8c16ca2f33821a254341a6befca7bb3bd60268
2023-07-31 23:02:40 +00:00
Android Build Coastguard Worker
2d6d35a8cb Snap for 10580366 from 1d9d8f4c49 to udc-qpr1-release
Change-Id: Ia77539b5ca44236fc0c64a19c67f520012b0cf9c
2023-07-29 01:06:45 +00:00
Android Build Coastguard Worker
cd40f734c3 Snap for 10573083 from b447f04489 to udc-qpr1-release
Change-Id: I2640887d11a81b7fc59e6f1b03ced3f7e139db89
2023-07-27 23:02:24 +00:00
Android Build Coastguard Worker
7fca0a83f3 Snap for 10557896 from 53da5c420d to udc-qpr1-release
Change-Id: Ib13a3a3e7f355147e9321a0605ba8a11cd2dc20b
2023-07-25 23:02:18 +00:00
Android Build Coastguard Worker
a6e604b620 Snap for 10545222 from 188cd6c388 to udc-qpr1-release
Change-Id: I571ec228e8fa4aff1c9ec57ec06a639f039a71af
2023-07-22 23:02:20 +00:00
Android Build Coastguard Worker
16ed198209 Snap for 10542431 from b6185194d3 to udc-qpr1-release
Change-Id: Id83b279f2e856a69ab0cb8a758dccd03a722a1bd
2023-07-22 01:06:52 +00:00
Android Build Coastguard Worker
1ad4c21e49 Snap for 10535291 from 362ecb4487 to udc-qpr1-release
Change-Id: Ibee1153d8414e2405e1a2d8df2619d48c006a1ee
2023-07-20 23:02:32 +00:00
Android Build Coastguard Worker
dd7a17f10d Snap for 10527654 from ab8b16b905 to udc-qpr1-release
Change-Id: Ic484ee2b64c5c7ea5461de5d2ff187990671ecab
2023-07-19 23:02:22 +00:00
Android Build Coastguard Worker
3fdd9f4d0d Snap for 10500749 from 32535854cc to udc-qpr1-release
Change-Id: I07a911310ab5a8252bdb08049c8637893399a9e4
2023-07-15 01:06:48 +00:00
Android Build Coastguard Worker
96408a6a49 Snap for 10492621 from 87ed5259e2 to udc-qpr1-release
Change-Id: Ifc3e765d3846fd096b26d659f17f7dcbeaa7a98e
2023-07-13 23:02:46 +00:00
Android Build Coastguard Worker
f5574ef8b6 Snap for 10486787 from 0e4eb6a744 to udc-qpr1-release
Change-Id: Ia6e0637fcba1c2ae5974923a9af4346b9f9b9ade
2023-07-12 23:02:32 +00:00
Android Build Coastguard Worker
245eda2788 Snap for 10477539 from 7b4794f1fc to udc-qpr1-release
Change-Id: I4d7dc9d44db076bb0f31a5ced7c64b8aa01863f5
2023-07-11 23:02:19 +00:00
Android Build Coastguard Worker
495e45fc44 Snap for 10459084 from cb21cd249e to udc-qpr1-release
Change-Id: I0960f0f84e4b321a5691c6d627cbcc919893c960
2023-07-08 01:06:47 +00:00
Android Build Coastguard Worker
e9b06768dd Snap for 10439448 from 18a8d6140d to udc-qpr1-release
Change-Id: I7966b5162f89b9bc65c54db252f80bb3c8a303ca
2023-07-05 23:02:24 +00:00
Android Build Coastguard Worker
3bead41faf Snap for 10430798 from e400e5c160 to udc-qpr1-release
Change-Id: I9b289bcdee73ff7091700a5363da17a0e26004d7
2023-07-03 23:02:31 +00:00
Android Build Coastguard Worker
b9a968f68f Snap for 10423847 from a1659f837c to udc-qpr1-release
Change-Id: I27a1534e221046fb625d2375b3ea4f395dabad28
2023-07-01 23:02:19 +00:00
Android Build Coastguard Worker
85671ae04b Snap for 10402374 from aa8c447d6d to udc-qpr1-release
Change-Id: I411eada1628af7ba1d438f5238ae5f4b618e269c
2023-06-28 23:02:34 +00:00
Android Build Coastguard Worker
b4cc77e5d1 Snap for 10379371 from bbd4e9e18b to udc-qpr1-release
Change-Id: Ie2b6c51d6a4f58835485275b8cf9443d7da937cf
2023-06-25 23:02:06 +00:00
Android Build Coastguard Worker
5bf11c24ca Snap for 10375461 from 3361ee4b60 to udc-qpr1-release
Change-Id: I5ee5d363a9f684adfdfc51bb65e0251587113c89
2023-06-24 03:02:25 +00:00
Android Build Coastguard Worker
5f86e31fff Snap for 10347638 from 5e6b0cc8d6 to udc-qpr1-release
Change-Id: Ie49c4f2f92f043a7b51dd53bbc424189a8da92f5
2023-06-20 01:06:39 +00:00
Android Build Coastguard Worker
bc3e2ad1fd Snap for 10341497 from 0f638e6e55 to udc-qpr1-release
Change-Id: If87cf2eb142663515367b7eadeb5b16fc9378788
2023-06-17 05:07:04 +00:00
Android Build Coastguard Worker
36f7b99b3e Snap for 10309372 from 3b9b54ef2e to udc-qpr1-release
Change-Id: Ic6af5347d9e329398bb937789175ad1085bdcdab
2023-06-13 03:02:01 +00:00
Android Build Coastguard Worker
8e33fb0f1a Snap for 10296703 from 3dc0702c35 to udc-qpr1-release
Change-Id: I33ef9cd5d42ed65b69445f3bfd55da31f822cc9c
2023-06-10 04:22:02 +00:00
Android Build Coastguard Worker
c942c2e518 Snap for 10289553 from 8e1f9844ba to udc-qpr1-release
Change-Id: I531b6ca9aca640df212863a859490e753561f93a
2023-06-09 03:01:48 +00:00
Android Build Coastguard Worker
06010a506d Snap for 10277391 from 9d4f2afa5f to udc-qpr1-release
Change-Id: Ibce54d1a2036fbbfbf247c023d2408d40fb1ed70
2023-06-08 01:02:28 +00:00
Android Build Coastguard Worker
8554bb1558 Snap for 10255078 from 187a862107 to udc-qpr1-release
Change-Id: I15cc873a0f5f9201de41877b8103ce52f2fc46ad
2023-06-03 05:06:53 +00:00
Android Build Coastguard Worker
a4f51cbe34 Snap for 10245577 from 4ab1c3dae4 to udc-qpr1-release
Change-Id: I8cef4d21972264b38311a674f3408135126e9b8e
2023-06-02 03:01:37 +00:00
Android Build Coastguard Worker
43c1d7c4f2 Snap for 10213992 from 868bd3349a to udc-qpr1-release
Change-Id: I0797e087f4229ffa280785b779feeac8324212eb
2023-05-27 05:07:19 +00:00
Android Build Coastguard Worker
1839dbc346 Snap for 10179466 from 3b7afc5c4f to udc-qpr1-release
Change-Id: I783e3d55dd548ca7efcc5a1869167e2a7d3e8975
2023-05-23 01:06:55 +00:00
Android Build Coastguard Worker
281914698e Snap for 10171934 from a21053e558 to udc-qpr1-release
Change-Id: Ifbcd4537107261d726bf5a6c1d4ac36a12ba41bd
2023-05-20 04:37:13 +00:00
Android Build Coastguard Worker
81be8c2c02 Snap for 10137062 from 0defdacb3b to udc-qpr1-release
Change-Id: I94159679c3151a639408b24c3df4a796032b90db
2023-05-16 03:02:15 +00:00
Android Build Coastguard Worker
63b9be2525 Snap for 10130956 from 922b8d68fe to udc-qpr1-release
Change-Id: Ibcb2b7e256e8bed75e5024cab63a1e8a5e42579e
2023-05-13 05:07:33 +00:00
Android Build Coastguard Worker
2b6074a998 Snap for 10094917 from 8abda521a4 to udc-qpr1-release
Change-Id: Ib47a3820926fe8a2eb1ab3e56218273c1a273e0b
2023-05-10 03:02:55 +00:00
Android Build Coastguard Worker
559c4ef103 Snap for 10088597 from 7378380b9c to udc-qpr1-release
Change-Id: Ic6322556de3128b1f4ee01974b63dcd0532d6ea6
2023-05-09 01:14:57 +00:00
Android Build Coastguard Worker
6c01eae7be Snap for 10080193 from 1527cbf049 to udc-qpr1-release
Change-Id: I639f7955d24d8d98942232ec1b703eacc0b78c53
2023-05-06 03:02:34 +00:00
Android Build Coastguard Worker
b8906beecc Snap for 10071751 from d0b324a081 to udc-qpr1-release
Change-Id: I64ff36f901ffcbc231dd67617920efdab61a0ba3
2023-05-05 01:07:41 +00:00
Android Build Coastguard Worker
e2f2da2364 Snap for 10063449 from 5638b408f2 to udc-qpr1-release
Change-Id: I5a5479d844def6b52cb91670669f491ca54f28d6
2023-05-04 01:04:16 +00:00
Android Build Coastguard Worker
5215a858c8 Snap for 10054401 from 2fe71d70cd to udc-qpr1-release
Change-Id: I068888186fb01090265ae5c8eeb057a0981c5396
2023-05-03 01:07:05 +00:00
Android Build Coastguard Worker
e1fd6efa40 Snap for 10037196 from 47815b3e2a to udc-qpr1-release
Change-Id: I6af790ced9c71ad9f43558032abd527e60a6f215
2023-04-29 03:02:19 +00:00
Android Build Coastguard Worker
8cd4c361f5 Snap for 10017868 from fb8529da4d to udc-qpr1-release
Change-Id: Ie5be7e583eb0ef46cced5820d52f5de18391a333
2023-04-28 01:06:58 +00:00
489 changed files with 387 additions and 4313 deletions

View File

@@ -1,11 +0,0 @@
# NOTE: CHANGE THIS FILE WITH CAUTIOUS
# - this file is referenced by other OWNERS file, e.g. device/google/*/OWNERS
# - changing this file might break the function, check go/gerrit-code-owners-syntax first
jaegeuk@google.com
huangrandall@google.com
bvanassche@google.com
daehojeong@google.com
chullee@google.com
vkon@google.com
thomasyen@google.com

View File

@@ -1,20 +0,0 @@
# NOTE: CHANGE THIS FILE WITH CAUTIOUS
# - this file is referenced by other OWNERS file, e.g. device/google/*/OWNERS
# - changing this file might break the function, check go/gerrit-code-owners-syntax first
#
# Makefile Review Guide for OWNERS: go/pixel-device-mk-owner-checklist
aaronding@google.com
rurumihong@google.com
adamshih@google.com
wilsonsung@google.com
cyanhsieh@google.com
cyuanjen@google.com
robinpeng@google.com
achant@google.com
etam@google.com
pattjin@google.com
bkhalife@google.com
lokeshgoel@google.com
jainne@google.com
pscovanner@google.com

5
OWNERS
View File

@@ -1,5 +1,6 @@
per-file *.te,*_contexts,te_macros,global_macros=set noparent
per-file *.te,*_contexts,te_macros,global_macros=file:/sepolicy/OWNERS
per-file *.mk,{**/,}Android.bp=set noparent
per-file *.mk,{**/,}Android.bp=file:MK_OWNERS
per-file *.mk=set noparent
per-file *.mk=aaronding@google.com,rurumihong@google.com,adamshih@google.com,wilsonsung@google.com,cyanhsieh@google.com,cyuanjen@google.com,robinpeng@google.com,achant@google.com,etam@google.com,pattjin@google.com,bkhalife@google.com,lokeshgoel@google.com,jainne@google.com,pscovanner@google.com

View File

@@ -4,19 +4,22 @@ PRODUCT_PACKAGES += dump_aoc \
aocd \
aocxd
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
# If AoC Daemon is not present on this build, load firmware at boot via rc
PRODUCT_COPY_FILES += \
device/google/gs-common/aoc/conf/init.aoc.daemon.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.aoc.rc
ifneq ($(wildcard vendor/google/whitechapel/aoc/aocx/aidl/aocx/framework_compatibility_matrix.xml),)
DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE += \
vendor/google/whitechapel/aoc/aocx/aidl/aocx/framework_compatibility_matrix.xml
endif
# AoC debug support
PRODUCT_PACKAGES_ENG += \
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
aocdump \
aocutil \
aoc_audio_cfg \
vp_util \
aocx_tool
endif

View File

@@ -29,10 +29,9 @@ int main() {
runCommand("AoC logging wake", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/logging_wakeup");
runCommand("AoC hotword wake", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/hotword_wakeup");
runCommand("AoC memory exception wake", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/memory_exception");
runCommand("AoC memory votes", "timeout 0.5 cat /sys/devices/platform/*.aoc/control/memory_votes_a32");
runCommand("AoC memory votes", "timeout 0.5 cat /sys/devices/platform/*.aoc/control/memory_votes_ff1");
runCommand("AoC memory votes", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/memory_votes_a32");
runCommand("AoC memory votes", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/memory_votes_ff1");
runCommand("clean AoC buffer","echo ' ' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
runCommand("AoC DVFS (A32)", "echo 'dbg info -c 1 DVFSA32' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
runCommand("AoC DVFS (FF1)", "echo 'dbg info -c 2 DVFSFF1' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
runCommand("AoC Monitor Mode Status", "echo 'monitor_mode status' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
return 0;

View File

@@ -26,6 +26,3 @@ add_service(aocxd, aocx);
# allow managing thread priority
allow aocxd self:global_capability_class_set sys_nice;
allow aocxd dumpstate:fd use;
allow aocxd dumpstate:fifo_file write;

View File

@@ -1,2 +0,0 @@
# Allow dumpstate to talk to aocxd over binder
binder_call(dumpstate, aocxd)

View File

@@ -28,15 +28,7 @@
/dev/acd-audio_ap_offload_tx u:object_r:aoc_device:s0
/dev/acd-mel_processor u:object_r:aoc_device:s0
/dev/acd-aocx_control u:object_r:aoc_device:s0
/dev/acd-aocx_inject[0-9]* u:object_r:aoc_device:s0
/dev/acd-aocx_tapout[0-9]* u:object_r:aoc_device:s0
/dev/acd-mc_headpos u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_ctl u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_data_tx u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_data_rx u:object_r:aoc_device:s0
/dev/acd-chre_ctl u:object_r:aoc_device:s0
/dev/acd-chre_data_tx u:object_r:aoc_device:s0
/dev/acd-chre_data_rx u:object_r:aoc_device:s0
# AoC vendor binaries
/vendor/bin/aocd u:object_r:aocd_exec:s0

View File

@@ -1 +0,0 @@
type aocx, service_manager_type;

View File

@@ -1 +0,0 @@
aocx.IAocx/default u:object_r:aocx:s0

View File

@@ -0,0 +1 @@
type aocx, vndservice_manager_type;

View File

@@ -0,0 +1 @@
aocx.IAocx u:object_r:aocx:s0

View File

@@ -6,6 +6,9 @@ PRODUCT_PACKAGES += \
android.hardware.audio.service-aidl.aoc \
vendor.google.whitechapel.audio.hal.parserservice \
# AIDL software effects. These are the effects supporting in all projects.
# For the project-specific effects, such as haptic generator, please add them
# to makefile in the project's device folder.
PRODUCT_PACKAGES += \
libvisualizeraidl \
libbundleaidl \
@@ -13,14 +16,9 @@ PRODUCT_PACKAGES += \
libdynamicsprocessingaidl \
libloudnessenhanceraidl \
libdownmixaidl \
libhapticgeneratoraidl \
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/aidl
ifeq ($(AUDIO_USE_DPTX_SEPOLICY),true)
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio/dptx
else
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio/drmdp
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio
include device/google/gs-common/audio/common.mk
@@ -31,11 +29,4 @@ PRODUCT_PROPERTY_OVERRIDES += \
PRODUCT_SYSTEM_EXT_PROPERTIES += \
ro.audio.ihaladaptervendorextension_enabled=true
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
$(call soong_config_set,aoc_audio_func,dump_usecase_data,true)
$(call soong_config_set,aoc_audio_func,hal_socket_control,true)
$(call soong_config_set,aoc_audio_func,record_tuning_keys,true)
$(call soong_config_set,aoc_audio_func,aidl_command_interface,true)
endif
$(call soong_config_set,pixel_audio_hal_type,aidl_build,true)

View File

@@ -1,7 +1,15 @@
<compatibility-matrix version="1.0" type="framework">
<hal format="hidl">
<name>vendor.google.audiometricext</name>
<version>1.0</version>
<interface>
<name>IAudioMetricExt</name>
<instance>default</instance>
</interface>
</hal>
<hal format="aidl">
<name>vendor.google.whitechapel.audio.extension</name>
<version>4</version>
<version>1</version>
<interface>
<name>IAudioExtension</name>
<instance>default</instance>

View File

@@ -1,2 +1,11 @@
<manifest version="1.0" type="device">
<hal format="hidl">
<name>vendor.google.audiometricext</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IAudioMetricExt</name>
<instance>default</instance>
</interface>
</hal>
</manifest>

View File

@@ -3,15 +3,8 @@ BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/common
#Audio Vendor libraries
PRODUCT_PACKAGES += \
libfvsam_prm_parser \
libmahalcontroller
ifeq ($(USE_MAM_V4_ABOVE),true)
PRODUCT_PACKAGES += \
libMAM_Google_Pixel_Android
else
PRODUCT_PACKAGES += \
libmahalcontroller \
libAlgFx_HiFi3z
endif
ifneq ($(USE_AUDIO_HAL_AIDL),true)
## AudioHAL Configurations

View File

@@ -32,14 +32,8 @@ PRODUCT_PACKAGES += \
libamcsextfile \
audio_amcs_ext \
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hidl
include device/google/gs-common/audio/common.mk
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/audio/hidl/device_framework_matrix_product_gs101.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/audio/hidl/device_framework_matrix_product_gs101.xml

View File

@@ -32,12 +32,6 @@ PRODUCT_PACKAGES += \
audio_spk_35l41 \
sound_trigger.primary.$(TARGET_BOARD_PLATFORM)
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hidl
include device/google/gs-common/audio/common.mk

View File

@@ -35,14 +35,8 @@ PRODUCT_PACKAGES += \
audio_hdmi_aoc \
sound_trigger.primary.$(TARGET_BOARD_PLATFORM)
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hidl
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio/drmdp
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio
include device/google/gs-common/audio/common.mk

View File

@@ -1,4 +1 @@
add_service(hal_audio_default, hal_audio_ext_service)
# Allow audio-hal to register battery_mitigation service
allow hal_audio_default hal_battery_mitigation_service:service_manager find;
binder_call(hal_audio_default, battery_mitigation)

View File

@@ -21,4 +21,3 @@ genfscon sysfs /devices/platform/audiometrics/call_count u:ob
genfscon sysfs /devices/platform/audiometrics/offload_effects_id u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/offload_effects_duration u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/bt_usage u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/speaker_version u:object_r:sysfs_pixelstats:s0

View File

@@ -1,4 +1,3 @@
# allow access to folders
allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms;
allow hal_audio_default audio_vendor_data_file:file create_file_perms;
@@ -13,9 +12,6 @@ allow hal_audio_default aoc_device:chr_file rw_file_perms;
allow hal_audio_default amcs_device:file rw_file_perms;
allow hal_audio_default amcs_device:chr_file rw_file_perms;
allow hal_audio_default sysfs_pixelstats:file rw_file_perms;
allow hal_audio_default sysfs_extcon:dir search;
allow hal_audio_default sysfs_extcon:file r_file_perms;
allow hal_audio_default vendor_usb_debugfs:dir search;
#allow access to aoc and kernel boottime
allow hal_audio_default sysfs_aoc:dir { search };
@@ -25,7 +21,6 @@ allow hal_audio_default sysfs_aoc_boottime:file r_file_perms;
allow hal_audio_default dmabuf_heap_device:chr_file r_file_perms;
set_prop(hal_audio_default, vendor_audio_prop);
set_prop(hal_audio_default, vendor_audio_prop_restricted);
hal_client_domain(hal_audio_default, hal_health);
hal_client_domain(hal_audio_default, hal_thermal);

View File

@@ -1,5 +1,2 @@
# Audio
vendor_internal_prop(vendor_audio_prop)
# The property for Audio App
vendor_restricted_prop(vendor_audio_prop_restricted)

View File

@@ -1,6 +1,3 @@
# for serial no
vendor.audio_hal.device.serialno u:object_r:vendor_audio_prop:s0
# for audio
vendor.audio_hal.period_multiplier u:object_r:vendor_audio_prop:s0
vendor.audiodump.enable u:object_r:vendor_audio_prop:s0
@@ -12,6 +9,3 @@ vendor.audiodump.encode.disable u:object_r:vendor_audio_prop:s0
vendor.audiodump.log.cca.updated u:object_r:vendor_audio_prop:s0
vendor.audiodump.cca.config u:object_r:vendor_audio_prop:s0
vendor.audio_hal.aidl.enable u:object_r:vendor_audio_prop:s0
# for audio app
persist.vendor.app.audio. u:object_r:vendor_audio_prop_restricted:s0

View File

@@ -1,5 +1,2 @@
# Audio property
set_prop(vendor_init, vendor_audio_prop)
# Audio App property
set_prop(vendor_init, vendor_audio_prop_restricted)

View File

@@ -1 +0,0 @@
genfscon sysfs /devices/platform/dwc_dptx-audio/extcon/hdmi_audio u:object_r:sysfs_extcon:s0

View File

@@ -24,8 +24,6 @@ allow battery_mitigation sysfs_bcl:lnk_file r_file_perms;
allow battery_mitigation sysfs_thermal:lnk_file r_file_perms;
allow battery_mitigation mitigation_vendor_data_file:dir rw_dir_perms;
allow battery_mitigation mitigation_vendor_data_file:file create_file_perms;
allow battery_mitigation dumpstate:fd use;
allow battery_mitigation dumpstate:fifo_file rw_file_perms;
# Allow battery_mitigation to use Binder IPC so that service manager can notify it for callbacks
binder_use(battery_mitigation)
@@ -33,6 +31,3 @@ binder_use(battery_mitigation)
wakelock_use(battery_mitigation)
# Allow battery_mitigation to run aidl service
add_service(battery_mitigation, hal_battery_mitigation_service)
# Allow battery_mitigation to run audio mitigation callback
binder_call(battery_mitigation, hal_audio_default)
binder_call(battery_mitigation, servicemanager)

View File

@@ -1,3 +0,0 @@
# To call battery_mitigation hal
allow dumpstate hal_battery_mitigation_service:service_manager find;
binder_call(dumpstate, battery_mitigation);

View File

@@ -1 +1 @@
type hal_battery_mitigation_service, hal_service_type, service_manager_type;
type hal_battery_mitigation_service, protected_service, hal_service_type, service_manager_type;

View File

@@ -1,8 +1,6 @@
PRODUCT_SOONG_NAMESPACES += vendor/broadcom/bluetooth
PRODUCT_PACKAGES += \
android.hardware.bluetooth-V1-ndk.so \
android.hardware.bluetooth.finder-V1-ndk.so \
android.hardware.bluetooth.ranging-V1-ndk.so \
android.hardware.bluetooth-service.bcmbtlinux \
vendor.google.bluetooth_ext-V1-ndk.so \
bt_vendor.conf \
@@ -11,7 +9,6 @@ PRODUCT_PACKAGES += \
BOARD_SEPOLICY_DIRS += device/google/gs-common/bcmbt/sepolicy
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/powerstats
DEVICE_MANIFEST_FILE += device/google/gs-common/bcmbt/manifest_bluetooth.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/bcmbt/compatibility_matrix.xml

View File

@@ -6,6 +6,7 @@
<name>IBluetoothFinder</name>
<instance>default</instance>
</interface>
<fqname>IBluetoothFinder/default</fqname>
<interface>
<name>IBluetoothCcc</name>
<instance>default</instance>

View File

@@ -34,8 +34,7 @@ int main() {
return 0;
}
dumpLogs(BCMBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 4,
BCMBT_SNOOP_LOG_PREFIX);
dumpLogs(BCMBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 2, BCMBT_SNOOP_LOG_PREFIX);
dumpLogs(BCMBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 2, BCMBT_BACKUP_SNOOP_LOG_PREFIX);
dumpLogs(BCMBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, BCMBT_FW_DUMP_LOG_PREFIX);
dumpLogs(BCMBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, BCMBT_CHRE_DUMP_LOG_PREFIX);

View File

@@ -1,3 +1,5 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/bcmbt/dump/sepolicy/
PRODUCT_PACKAGES_ENG += dump_bcmbt
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += dump_bcmbt
endif

View File

@@ -4,16 +4,6 @@
<version>1</version>
<fqname>IBluetoothHci/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.finder</name>
<version>1</version>
<fqname>IBluetoothFinder/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.ranging</name>
<version>1</version>
<fqname>IBluetoothChannelSounding/default</fqname>
</hal>
<hal format="aidl">
<name>vendor.google.bluetooth_ext</name>
<version>1</version>

View File

@@ -1,8 +0,0 @@
# When neither AOSP nor factory targets
ifeq (,$(filter aosp_% factory_% lineage_%, $(TARGET_PRODUCT)))
PRODUCT_PACKAGES += BetterBugStub
PRODUCT_PACKAGES_DEBUG += $(RELEASE_PACKAGE_BETTER_BUG)
endif
PRODUCT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/betterbug/sepolicy/product/public
PRODUCT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/betterbug/sepolicy/product/private

View File

@@ -1,47 +0,0 @@
typeattribute better_bug_app coredomain;
app_domain(better_bug_app)
net_domain(better_bug_app)
allow better_bug_app app_api_service:service_manager find;
allow better_bug_app mediaserver_service:service_manager find;
allow better_bug_app radio_service:service_manager find;
allow better_bug_app system_api_service:service_manager find;
allow better_bug_app privapp_data_file:file execute;
allow better_bug_app privapp_data_file:lnk_file r_file_perms;
allow better_bug_app shell_data_file:file r_file_perms;
allow better_bug_app shell_data_file:dir r_dir_perms;
# Allow traceur to pass file descriptors through a content provider to betterbug
allow better_bug_app trace_data_file:file { getattr read };
# Allow betterbug to read profile reports generated by profcollect.
userdebug_or_eng(`
allow better_bug_app profcollectd_data_file:file r_file_perms;
')
# Allow BetterBug access to WM traces attributes
allow better_bug_app wm_trace_data_file:dir r_dir_perms;
allow better_bug_app wm_trace_data_file:file getattr;
# Allow the bug reporting frontend to read the presence and timestamp of the
# trace attached to the bugreport (but not its contents, which will go in the
# usual bugreport .zip file). This is used by the bug reporting UI to tell if
# the bugreport will contain a system trace or not while the bugreport is still
# in progress.
allow better_bug_app perfetto_traces_bugreport_data_file:dir r_dir_perms;
allow better_bug_app perfetto_traces_bugreport_data_file:file { getattr };
# Allow BetterBug to receive Perfetto traces through the framework
# (i.e. TracingServiceProxy) and sendfile them into their private
# directories for reporting when network and battery conditions are
# appropriate.
allow better_bug_app perfetto:fd use;
allow better_bug_app perfetto_traces_data_file:file { read getattr };
# Allow BetterBug to set property to start vendor.touch_dumpstate
set_prop(better_bug_app, ctl_start_prop)
# Allow BetterBug to read system boot reason
get_prop(better_bug_app, system_boot_reason_prop)

View File

@@ -1,2 +0,0 @@
# BetterBug
user=_app isPrivApp=true name=com.google.android.apps.internal.betterbug domain=better_bug_app type=privapp_data_file levelFrom=user

View File

@@ -1 +0,0 @@
type better_bug_app, domain;

View File

@@ -1,16 +0,0 @@
PRODUCT_SOONG_NAMESPACES += vendor/google/connectivity/bluetooth/common
PRODUCT_PACKAGES += \
android.hardware.bluetooth-V1-ndk.so \
android.hardware.bluetooth.finder-V1-ndk.so \
android.hardware.bluetooth.ranging-V1-ndk.so \
android.hardware.bluetooth-service.pixel \
vendor.google.bluetooth_ext-V1-ndk.so \
bt_vendor.conf \
android.hardware.bluetooth.prebuilt.xml \
android.hardware.bluetooth_le.prebuilt.xml
BOARD_SEPOLICY_DIRS += device/google/gs-common/bluetooth/sepolicy
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/powerstats
DEVICE_MANIFEST_FILE += device/google/gs-common/bluetooth/manifest_bluetooth.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/bluetooth/compatibility_matrix.xml

View File

@@ -1,30 +0,0 @@
<compatibility-matrix version="1.0" type="framework">
<hal format="aidl" optional="true">
<name>vendor.google.bluetooth_ext</name>
<version>1</version>
<interface>
<name>IBluetoothFinder</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothCcc</name>
<instance>default</instance>
</interface>
<interface>
<name>IBTChannelAvoidance</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothSar</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothExt</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothEwp</name>
<instance>default</instance>
</interface>
</hal>
</compatibility-matrix>

View File

@@ -1,20 +0,0 @@
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
cc_binary {
name: "dump_bt",
srcs: ["dump.cpp"],
cflags: [
"-Wall",
"-Wextra",
"-Werror",
],
shared_libs: [
"libbase",
"libdump",
"liblog",
],
vendor: true,
relative_install_path: "dump",
}

View File

@@ -1,44 +0,0 @@
/*
* Copyright 2023 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <dump/pixel_dump.h>
#include <android-base/file.h>
#define PIXELBT_ACTIVITY_LOG_DIRECTORY "/data/vendor/bluetooth"
#define PIXELBT_SNOOP_LOG_DIRECTORY "/data/vendor/bluetooth"
#define PIXELBT_FW_LOG_DIRECTORY "/data/vendor/ssrdump/coredump"
#define PIXELBT_SNOOP_LOG_PREFIX "btsnoop_hci_vnd"
#define PIXELBT_BACKUP_SNOOP_LOG_PREFIX "backup_btsnoop_hci_vnd"
#define PIXELBT_FW_DUMP_LOG_PREFIX "coredump_bt_socdump_"
#define PIXELBT_CHRE_DUMP_LOG_PREFIX "coredump_bt_chredump_"
#define PIXELBT_HAL_DUMP_LOG_PREFIX "coredump_bt_"
#define PIXELBT_ACTIVITY_LOG_PREFIX "bt_activity_"
int main() {
std::string outputDir = concatenatePath(BUGREPORT_PACKING_DIR, "bt");
if (mkdir(outputDir.c_str(), 0777) == -1) {
printf("Unable to create folder: %s\n", outputDir.c_str());
return 0;
}
dumpLogs(PIXELBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 4,
PIXELBT_SNOOP_LOG_PREFIX);
dumpLogs(PIXELBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 2, PIXELBT_BACKUP_SNOOP_LOG_PREFIX);
dumpLogs(PIXELBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_FW_DUMP_LOG_PREFIX);
dumpLogs(PIXELBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_CHRE_DUMP_LOG_PREFIX);
dumpLogs(PIXELBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_HAL_DUMP_LOG_PREFIX);
dumpLogs(PIXELBT_ACTIVITY_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_ACTIVITY_LOG_PREFIX);
return 0;
}

View File

@@ -1,3 +0,0 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/bluetooth/dump/sepolicy/
PRODUCT_PACKAGES_DEBUG += dump_bt

View File

@@ -1,12 +0,0 @@
# pixel bluetooth common hal service
pixel_bugreport(dump_bt)
allow hal_dumpstate_default vendor_bt_data_file:dir { open read search };
allow hal_dumpstate_default vendor_bt_data_file:file read;
allow dump_bt radio_vendor_data_file:dir create_dir_perms;
allow dump_bt radio_vendor_data_file:file create_file_perms;
allow dump_bt vendor_bt_data_file:dir r_dir_perms;
allow dump_bt vendor_bt_data_file:file r_file_perms;
allow dump_bt sscoredump_vendor_data_crashinfo_file:dir search;
allow dump_bt sscoredump_vendor_data_coredump_file:dir r_dir_perms;
allow dump_bt sscoredump_vendor_data_coredump_file:file r_file_perms;

View File

@@ -1,2 +0,0 @@
# bt common hal dump_bt service
/vendor/bin/dump/dump_bt u:object_r:dump_bt_exec:s0

View File

@@ -1,27 +0,0 @@
<manifest version="1.0" type="device">
<hal format="aidl">
<name>android.hardware.bluetooth</name>
<version>1</version>
<fqname>IBluetoothHci/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.finder</name>
<version>1</version>
<fqname>IBluetoothFinder/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.ranging</name>
<version>1</version>
<fqname>IBluetoothChannelSounding/default</fqname>
</hal>
<hal format="aidl">
<name>vendor.google.bluetooth_ext</name>
<version>1</version>
<fqname>IBTChannelAvoidance/default</fqname>
<fqname>IBluetoothCcc/default</fqname>
<fqname>IBluetoothEwp/default</fqname>
<fqname>IBluetoothExt/default</fqname>
<fqname>IBluetoothFinder/default</fqname>
<fqname>IBluetoothSar/default</fqname>
</hal>
</manifest>

View File

@@ -1,3 +0,0 @@
# Bt Wifi Coexistence device
type wb_coexistence_dev, dev_type;

View File

@@ -1,6 +0,0 @@
# Bluetooth
/vendor/bin/hw/android\.hardware\.bluetooth-service\.pixel u:object_r:hal_bluetooth_btlinux_exec:s0
/dev/wbrc u:object_r:wb_coexistence_dev:s0
/dev/ttySAC16 u:object_r:hci_attach_dev:s0

View File

@@ -1,8 +0,0 @@
# Bluetooth pin control device node
genfscon sysfs /devices/platform/odm/odm:btbcm/rfkill/rfkill0/state u:object_r:sysfs_bluetooth_writable:s0
genfscon sysfs /devices/platform/odm/odm:btbcm/rfkill/rfkill2/state u:object_r:sysfs_bluetooth_writable:s0
genfscon proc /bluetooth/sleep/lpm u:object_r:proc_bluetooth_writable:s0
genfscon proc /bluetooth/sleep/btwrite u:object_r:proc_bluetooth_writable:s0
genfscon proc /bluetooth/sleep/btwake u:object_r:proc_bluetooth_writable:s0
genfscon proc /bluetooth/timesync u:object_r:proc_bluetooth_writable:s0

View File

@@ -1,19 +0,0 @@
# coexistence device file node
add_hwservice(hal_bluetooth_btlinux, hal_bluetooth_coexistence_hwservice);
add_service(hal_bluetooth_btlinux, hal_bluetooth_coexistence_service);
allow hal_bluetooth_btlinux wb_coexistence_dev:chr_file rw_file_perms;
# power stats
allow hal_bluetooth_btlinux hal_power_stats_vendor_service:service_manager find;
binder_call(hal_bluetooth_btlinux, hal_power_stats_default)
# bt firmware dump
allow hal_bluetooth_btlinux aconfig_storage_metadata_file:dir search;
allow hal_bluetooth_btlinux sscoredump_vendor_data_crashinfo_file:dir rw_dir_perms;
allow hal_bluetooth_btlinux sscoredump_vendor_data_crashinfo_file:file rw_file_perms;
userdebug_or_eng(`
allow hal_bluetooth_btlinux sscoredump_vendor_data_coredump_file:dir create_dir_perms;
allow hal_bluetooth_btlinux sscoredump_vendor_data_coredump_file:file create_file_perms;
allow hal_bluetooth_btlinux logbuffer_device:chr_file r_file_perms;
')

View File

@@ -1,3 +0,0 @@
# Bluetooth HAL extension
type hal_bluetooth_coexistence_hwservice, hwservice_manager_type, vendor_hwservice_type;

View File

@@ -1,6 +0,0 @@
# Bluetooth HAL extension
hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.sar::IBluetoothSar u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.ccc::IBluetoothCcc u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.ewp::IBluetoothEwp u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.ext::IBluetoothExt u:object_r:hal_bluetooth_coexistence_hwservice:s0

View File

@@ -1,2 +0,0 @@
# Bluetooth HAL extension
type hal_bluetooth_coexistence_service, hal_service_type, service_manager_type;

View File

@@ -1,7 +0,0 @@
# Bluetooth HAL extension
vendor.google.bluetooth_ext.IBTChannelAvoidance/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothSar/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothCcc/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothEwp/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothExt/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothFinder/default u:object_r:hal_bluetooth_coexistence_service:s0

View File

@@ -19,7 +19,6 @@
#include "BootControl.h"
#include <android-base/file.h>
#include <android-base/properties.h>
#include <android-base/unique_fd.h>
#include <bootloader_message/bootloader_message.h>
#include <cutils/properties.h>
@@ -255,15 +254,16 @@ static bool blowAR_gs101() {
}
static bool blowAR() {
const auto& platform = ::android::base::GetProperty("ro.boot.hardware.platform", "");
char platform[PROPERTY_VALUE_MAX];
property_get("ro.boot.hardware.platform", platform, "");
if (platform == "gs101") {
if (std::string(platform) == "gs101") {
return blowAR_gs101();
} else if (platform == "gs201" || platform == "zuma" || platform == "zumapro") {
} else if (std::string(platform) == "gs201" || std::string(platform) == "zuma") {
return blowAR_zuma();
}
return false;
return true;
}
} // namespace

View File

@@ -20,7 +20,6 @@
#include <android-base/file.h>
#include <android-base/logging.h>
#include <android-base/properties.h>
#include <android-base/unique_fd.h>
#include <bootloader_message/bootloader_message.h>
#include <cutils/properties.h>
@@ -252,15 +251,16 @@ static bool blowAR_gs101() {
}
static bool blowAR() {
const auto& platform = ::android::base::GetProperty("ro.boot.hardware.platform", "");
char platform[PROPERTY_VALUE_MAX];
property_get("ro.boot.hardware.platform", platform, "");
if (platform == "gs101") {
if (std::string(platform) == "gs101") {
return blowAR_gs101();
} else if (platform == "gs201" || platform == "zuma" || platform == "zumapro") {
} else if (std::string(platform) == "gs201" || std::string(platform) == "zuma") {
return blowAR_zuma();
}
return false;
return true;
}
static constexpr MergeStatus ToAIDLMergeStatus(HIDLMergeStatus status) {
@@ -384,7 +384,7 @@ ScopedAStatus BootControl::isSlotMarkedSuccessful(int32_t in_slot, bool* _aidl_r
*_aidl_return = true;
return ScopedAStatus::ok();
}
if (in_slot < 0 || in_slot >= slots)
if (in_slot >= slots)
return ScopedAStatus::fromServiceSpecificErrorWithMessage(
INVALID_SLOT, (std::string("Invalid slot ") + std::to_string(in_slot)).c_str());

View File

@@ -12,8 +12,8 @@ cc_binary {
],
shared_libs: [
"libbase",
"libdump",
"liblog",
"libdump",
"liblog",
],
vendor: true,
relative_install_path: "dump",
@@ -26,35 +26,3 @@ prebuilt_etc {
src: "vendor.android.hardware.camera.preview-dis.xml",
sub_dir: "permissions",
}
prebuilt_etc {
name: "concurrent_foldable_dual_front_xml",
vendor: true,
filename: "com.google.pixel.camera.concurrent_foldable_dual_front.xml",
src: "com.google.pixel.camera.concurrent_foldable_dual_front.xml",
sub_dir: "permissions",
}
prebuilt_etc {
name: "libg3a_standalone_gabc_rc",
vendor: true,
proprietary: true,
init_rc: ["libg3a_gabc.rc"],
src: "libg3a_gabc.rc",
}
prebuilt_etc {
name: "libg3a_standalone_gaf_rc",
vendor: true,
proprietary: true,
init_rc: ["libg3a_gaf.rc"],
src: "libg3a_gaf.rc",
}
prebuilt_etc {
name: "libg3a_standalone_ghawb_rc",
vendor: true,
proprietary: true,
init_rc: ["libg3a_ghawb.rc"],
src: "libg3a_ghawb.rc",
}

View File

@@ -1,7 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- The feature on Pixel devices which supports concurrent foldable
dual front streaming -->
<permissions>
<feature name="com.google.pixel.camera.concurrent_foldable_dual_front" />
</permissions>

View File

@@ -2,5 +2,6 @@ BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/vendor
PRODUCT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/product/public
PRODUCT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/product/private
PRODUCT_PACKAGES_ENG += dump_camera
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += dump_camera
endif

View File

@@ -42,15 +42,12 @@ int main() {
// Attach multiple latest sessions (in case the user is running concurrent
// sessions or starts a new session after the one with performance issues).
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 10, "session-ended-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 10, "multicam-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "high-drop-rate-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "watchdog-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "camera-ended-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "fatal-error-");
dumpLogs(kGraphStateDumpDir.data(), cameraDestDir.c_str(), 5,
"hal_graph_state_");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 10,
"fd_state_tracker-");
return 0;
}

View File

@@ -1,28 +0,0 @@
# override default log levels.
on boot
setprop log.tag.GABC E
# backward-compatible system props.
on property:persist.vendor.camera.gabc.debug_level=0
setprop log.tag.GABC S
on property:persist.vendor.camera.gabc.debug_level=1
setprop log.tag.GABC V
on property:persist.vendor.camera.gabc.debug_level=2
setprop log.tag.GABC V
on property:persist.vendor.camera.gabc.debug_level=3
setprop log.tag.GABC D
on property:persist.vendor.camera.gabc.debug_level=4
setprop log.tag.GABC I
on property:persist.vendor.camera.gabc.debug_level=5
setprop log.tag.GABC W
on property:persist.vendor.camera.gabc.debug_level=6
setprop log.tag.GABC E
on property:persist.vendor.camera.gabc.debug_level=7
setprop log.tag.GABC A

View File

@@ -1,83 +0,0 @@
# override default log levels.
on boot
setprop log.tag.GAF E
# backward-compatible system props.
on property:persist.vendor.camera.af.debug_level=0
setprop log.tag.GAF S
on property:persist.vendor.camera.af.debug_level=1
setprop log.tag.GAF V
on property:persist.vendor.camera.af.debug_level=2
setprop log.tag.GAF V
on property:persist.vendor.camera.af.debug_level=3
setprop log.tag.GAF D
on property:persist.vendor.camera.af.debug_level=4
setprop log.tag.GAF I
on property:persist.vendor.camera.af.debug_level=5
setprop log.tag.GAF W
on property:persist.vendor.camera.af.debug_level=6
setprop log.tag.GAF E
on property:persist.vendor.camera.af.debug_level=7
setprop log.tag.GAF A
on property:persist.vendor.camera.af.video_debug_enable=2
setprop vendor.camera.3a.log_level 1
setprop log.tag.3a.gcrd.af.parser.input V
setprop log.tag.3a.gcrd.af.parser.output V
setprop log.tag.3a.gcrd.af.processor V
setprop log.tag.3a.gcrd.af.engine V
setprop log.tag.3a.gcrd.dtm V
on property:persist.vendor.camera.af.video_debug_enable=0
setprop vendor.camera.3a.log_level 6
setprop log.tag.3a.gcrd.af.parser.input E
setprop log.tag.3a.gcrd.af.parser.output E
setprop log.tag.3a.gcrd.af.processor E
setprop log.tag.3a.gcrd.af.engine E
setprop log.tag.3a.gcrd.dtm E
on property:persist.vendor.camera.af.default_focus_only=false
setprop persist.vendor.camera.af.ignore_ctrl_focus_region false
setprop persist.vendor.camera.af.ignore_face 0
setprop persist.vendor.camera.af.force_saliency_consumption ""
on property:persist.vendor.camera.af.default_focus_only=true
setprop persist.vendor.camera.af.ignore_ctrl_focus_region true
setprop persist.vendor.camera.af.ignore_face 1
setprop persist.vendor.camera.af.force_saliency_consumption false
# Reset every related properties
on property:persist.vendor.camera.af.standalone_searchlet=reset
setprop persist.vendor.camera.af.ignore_pd \"\"
setprop persist.vendor.camera.af.ignore_tof \"\"
setprop persist.vendor.camera.af.ignore_cdaf \"\"
setprop persist.vendor.camera.af.ignore_gyro \"\"
setprop persist.vendor.camera.af.ignore_3a \"\"
setprop vendor.camera.debug.enable_saliency \"\"
# Standalone framework: PDAF
on property:persist.vendor.camera.af.standalone_searchlet=pdaf
setprop persist.vendor.camera.af.ignore_tof 1
setprop persist.vendor.camera.af.ignore_gyro 1
setprop persist.vendor.camera.af.ignore_3a 1
setprop vendor.camera.debug.enable_saliency 0
# Standalone framework: LDAF
on property:persist.vendor.camera.af.standalone_searchlet=ldaf
setprop persist.vendor.camera.af.ignore_pd 7
setprop persist.vendor.camera.af.ignore_gyro 1
setprop persist.vendor.camera.af.ignore_3a 1
setprop vendor.camera.debug.enable_saliency 0
# Standalone framework: CDAF
on property:persist.vendor.camera.af.standalone_searchlet=cdaf
setprop persist.vendor.camera.af.ignore_pd 7
setprop persist.vendor.camera.af.ignore_tof 1
setprop vendor.camera.debug.enable_saliency 0

View File

@@ -1,28 +0,0 @@
# override default log levels.
on boot
setprop log.tag.GHAWB E
# backward-compatible system props.
on property:persist.vendor.camera.ghawb.debug_level=0
setprop log.tag.GHAWB S
on property:persist.vendor.camera.ghawb.debug_level=1
setprop log.tag.GHAWB V
on property:persist.vendor.camera.ghawb.debug_level=2
setprop log.tag.GHAWB V
on property:persist.vendor.camera.ghawb.debug_level=3
setprop log.tag.GHAWB D
on property:persist.vendor.camera.ghawb.debug_level=4
setprop log.tag.GHAWB I
on property:persist.vendor.camera.ghawb.debug_level=5
setprop log.tag.GHAWB W
on property:persist.vendor.camera.ghawb.debug_level=6
setprop log.tag.GHAWB E
on property:persist.vendor.camera.ghawb.debug_level=7
setprop log.tag.GHAWB A

View File

@@ -5,35 +5,20 @@ $(call soong_config_set,lyric,use_lyric_camera_hal,true)
$(call soong_config_set,google3a_config,gcam_awb,true)
$(call soong_config_set,google3a_config,ghawb_truetone,true)
# Flag controls whether Lyric apex can be located in the dist-directory.
$(call soong_config_set, lyric, dist_lyric_apex, $(RELEASE_PIXEL_DIST_LYRIC_APEX))
# Select GCH backend.
# TODO(b/192681010): This dependency inversion should be removed.
ifneq ($(wildcard vendor/google/services/LyricCameraHAL/src),)
$(call soong_config_set,gch,hwl_library,lyric)
endif
# Use build-time flag to select whether to build from source
# or ingest prebuilt-apex. We would want the development teams
# using release configuration: (trunk-staging) to build from source.
# All shipping releases will switch to prebuilts (trunk+)
# if this condition is not true, then build from source.
# Fallback if the prebuilts directory does not exist, then we must
# build from source no matter what, so we log a warning
ifeq ($(RELEASE_PIXEL_CAMERA_ENABLE_PREBUILT),true)
ifeq ($(wildcard vendor/google/services/LyricCameraHAL/prebuilt),)
$(warning Lyric prebuilt directory is missing, it will be built from source)
BUILD_LYRIC_FROM_SOURCE := true
else
BUILD_LYRIC_FROM_SOURCE := false
endif
# Check if we're in PDK build
ifeq ($(wildcard vendor/google/camera),)
# If vendor/google/camera doesn't exist, it's a PDK build.
$(call soong_config_set,lyric,pdk_build,true)
else
BUILD_LYRIC_FROM_SOURCE := true
endif # RELEASE_PIXEL_CAMERA_ENABLE_PREBUILT
# Otherwise, it's an internal Google build.
$(call soong_config_set,lyric,pdk_build,false)
ifeq ($(BUILD_LYRIC_FROM_SOURCE),true)
PRODUCT_SOONG_NAMESPACES += \
vendor/google/camera \
vendor/google/camera/google_3a/libs_v4 \
@@ -49,7 +34,12 @@ PRODUCT_SOONG_NAMESPACES += \
vendor/google/camera/google_3a/libs_v4/gAF \
vendor/google/camera/google_3a/libs_v4/gafd \
vendor/google/camera/google_3a/libs_v4/gHAWB/native_coverage
endif # BUILD_LYRIC_FROM_SOURCE
# Calibration tool for debug builds
PRODUCT_PACKAGES_DEBUG += tarasque_test
PRODUCT_PACKAGES_DEBUG += ProtoCalibGenerator
endif # vendor/google/camera check
# Init-time log settings for Google 3A
PRODUCT_PACKAGES += libg3a_standalone_gabc_rc
@@ -69,7 +59,3 @@ DEVICE_MATRIX_FILE += \
# sepolicy dir is added in dump.mk.
# Make doesn't deduplicate sepolicy dirs, so including it here causes build errors.
# Calibration tools for debug builds
PRODUCT_PACKAGES_DEBUG += tarasque_test
PRODUCT_PACKAGES_DEBUG += ProtoCalibGenerator

View File

@@ -44,13 +44,3 @@ Example:
$(call soong_config_set,google3a_config,target_device,oriole)
```
A mixture of `camera_hardware` and `tuning_product` used by 3A.
## `radioext_interface_type`
Example:
```
$(call soong_config_set,lyric,radioext_interface_type,aidl)
```
Specifies which interface type to use in the RadioExt client when communicating
with the RadioExt service. The possible values are "hidl" and "aidl".
Devices launching with Android 15 no longer support HIDL.

View File

@@ -1,5 +1 @@
com.google.pixel.camera.services.binder.IServiceBinder/default u:object_r:camera_binder_service:s0
com.google.pixel.camera.services.cameraidremapper.ICameraIdRemapper/default u:object_r:camera_cameraidremapper_service:s0
com.google.pixel.camera.services.lyricconfigprovider.ILyricConfigProvider/default u:object_r:camera_lyricconfigprovider_service:s0
com.google.pixel.camera.services.binder.IServiceBinder/default u:object_r:camera_binder_service:s0

View File

@@ -9,10 +9,4 @@ allow vendor_pbcs_app app_api_service:service_manager find;
allow vendor_pbcs_app cameraserver_service:service_manager find;
# Allow PBCS to add the ServiceBinder service to ServiceManager.
add_service(vendor_pbcs_app, camera_binder_service);
# Allow PBCS to add the CameraIdRemapper service to ServiceManager.
add_service(vendor_pbcs_app, camera_cameraidremapper_service);
# Allow PBCS to add the LyricConfigProvider service to ServiceManager.
add_service(vendor_pbcs_app, camera_lyricconfigprovider_service);
add_service(vendor_pbcs_app, camera_binder_service);

View File

@@ -8,8 +8,6 @@ allow vendor_pcs_app {
app_api_service
audioserver_service
cameraserver_service
camera_cameraidremapper_service
camera_lyricconfigprovider_service
drmserver_service
mediametrics_service
mediaserver_service

View File

@@ -1,5 +1 @@
type camera_binder_service, hal_service_type, protected_service, service_manager_type;
type camera_cameraidremapper_service, hal_service_type, protected_service, service_manager_type;
type camera_lyricconfigprovider_service, hal_service_type, protected_service, service_manager_type;
type camera_binder_service, hal_service_type, protected_service, service_manager_type;

View File

@@ -1,6 +1,6 @@
allow hal_camera_default camera_binder_service:service_manager find;
# Allow Lyric Hal to find the LyricConfigProvider service through ServiceManager.
allow hal_camera_default camera_lyricconfigprovider_service:service_manager find;
allow hal_camera_default vendor_camera_lyricconfigprovider_service:service_manager find;
allow hal_camera_default hal_pixel_remote_camera_service:service_manager find;
@@ -8,5 +8,5 @@ binder_call(hal_camera_default, vendor_pbcs_app);
binder_call(hal_camera_default, vendor_pcs_app);
# Allow Lyric HAL to start Image Processing HAL
add_service(hal_camera_default, vendor_image_processing_hal_service)
# Allow Lyric HAL to start ISP Service
add_service(hal_camera_default, vendor_camera_isp_service)

View File

@@ -1,3 +1,7 @@
type hal_pixel_remote_camera_service, hal_service_type, protected_service, service_manager_type;
type vendor_image_processing_hal_service, hal_service_type, protected_service, service_manager_type;
type vendor_camera_lyricconfigprovider_service, hal_service_type, protected_service, service_manager_type;
type vendor_camera_isp_service, hal_service_type, protected_service, service_manager_type;
type vendor_camera_cameraidremapper_service, hal_service_type, protected_service, service_manager_type;

View File

@@ -1,3 +1,7 @@
com.google.pixel.camera.connectivity.hal.provider.ICameraProvider/default u:object_r:hal_pixel_remote_camera_service:s0
com.google.android.imageprocessing.hal.IImageProcessingHal/default u:object_r:vendor_image_processing_hal_service:s0
com.google.pixel.camera.services.lyricconfigprovider.ILyricConfigProvider/default u:object_r:vendor_camera_lyricconfigprovider_service:s0
com.google.pixel.camera.isp.IIspService/default u:object_r:vendor_camera_isp_service:s0
com.google.pixel.camera.services.cameraidremapper.ICameraIdRemapper/default u:object_r:vendor_camera_cameraidremapper_service:s0

View File

@@ -1,9 +1,9 @@
# Allow PBCS to add the ServiceBinder service to ServiceManager.
add_service(vendor_pbcs_app, camera_binder_service);
# Allow PBCS to add the LyricConfigProvider service to ServiceManager.
add_service(vendor_pbcs_app, camera_lyricconfigprovider_service);
add_service(vendor_pbcs_app, vendor_camera_lyricconfigprovider_service);
# Allow PBCS to add the CameraIdRemapper service to ServiceManager.
add_service(vendor_pbcs_app, camera_cameraidremapper_service);
add_service(vendor_pbcs_app, vendor_camera_cameraidremapper_service);
# Allow PBCS to read debug system properties of the form vendor.camera.pbcs.debug.*
# and persist.vendor.camera.pbcs.debug.*

View File

@@ -1,6 +1,6 @@
allow vendor_pcs_app {
camera_lyricconfigprovider_service
camera_cameraidremapper_service
vendor_camera_lyricconfigprovider_service
vendor_camera_cameraidremapper_service
edgetpu_app_service
}:service_manager find;

View File

@@ -1,27 +0,0 @@
# Create symlink for bootloader
$(shell rm -f "pixel_current_bootloader")
ifdef BOOTLOADER_FILE_PATH
$(shell ln -sf ${BOOTLOADER_FILE_PATH} "pixel_current_bootloader")
else ifdef BOOTLOADER_RADIO_FILE_PATH
$(shell ln -sf ${BOOTLOADER_RADIO_FILE_PATH} "pixel_current_bootloader")
endif
# Create symlink for kernel
$(shell rm -f "pixel_current_kernel")
ifdef TARGET_KERNEL_DIR
$(shell ln -sf ${TARGET_KERNEL_DIR} "pixel_current_kernel")
endif
# Create symlink for radio
$(shell rm -f "pixel_current_radio")
ifdef RADIO_FILE_PATH
$(shell ln -sf ${RADIO_FILE_PATH} "pixel_current_radio")
else ifdef BOOTLOADER_RADIO_FILE_PATH
$(shell ln -sf ${BOOTLOADER_RADIO_FILE_PATH} "pixel_current_radio")
endif
# Create symlink for radiocfg
$(shell rm -f "pixel_current_radiocfg")
ifdef SRC_MDM_CFG_DIR
$(shell ln -sf ${SRC_MDM_CFG_DIR} "pixel_current_radiocfg")
endif

View File

@@ -35,6 +35,3 @@ allow hal_contexthub_default self:global_capability2_class_set block_suspend;
# Allow binder calls with clients
binder_call(hal_contexthub_default, hal_sensors_default)
# Allow access for AoC properties.
get_prop(hal_contexthub_default, vendor_aoc_prop)

View File

@@ -1,6 +1,6 @@
# Dauntless
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/dauntless/sepolicy
ifneq ($(wildcard vendor/google_nos),)
ifneq ($(wildcard vendor),)
PRODUCT_SOONG_NAMESPACES += vendor/google_nos/init/dauntless
PRODUCT_PACKAGES += \
@@ -9,87 +9,18 @@ PRODUCT_PACKAGES += \
android.hardware.weaver-service.citadel \
android.hardware.authsecret-service.citadel \
android.hardware.oemlock-service.citadel \
android.hardware.identity@1.0-service.citadel \
init_citadel \
android.hardware.strongbox_keystore.xml \
android.hardware.security.keymint-service.citadel \
dump_gsc.sh
# USERDEBUG ONLY: Install test packages
PRODUCT_PACKAGES_ENG += citadel_integration_tests \
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += citadel_integration_tests \
pwntest \
nugget_targeted_tests \
CitadelProvision \
nugget_aidl_test_weaver
# Assign default value for RELEASE_GOOGLE_DAUNTLESS_DIR if no trunk flags support
RELEASE_GOOGLE_DAUNTLESS_DIR ?= vendor/google_nos/prebuilts/dauntless
# The production Dauntless firmware will be of flavors evt and d3m2.
# There are also several flavors of pre-release chips. Each flavor
# (production and pre-release) requires the firmware to be signed differently.
DAUNTLESS_FIRMWARE_SIZE := 1048576
# The nearly-production Dauntless chips are "proto1.1"
ifneq (,$(wildcard $(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" $(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin))
$(error GSC firmware size check fail)
endif
PRODUCT_COPY_FILES += \
$(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/dauntless/proto11.ec.bin
$(call dist-for-goals,droid,$(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin)
else
$(error GSC firmware not found in $(RELEASE_GOOGLE_DAUNTLESS_DIR))
endif
# The production Dauntless chips are "evt"
ifneq (,$(wildcard $(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" $(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin))
$(error GSC firmware size check fail)
endif
PRODUCT_COPY_FILES += \
$(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/dauntless/evt.ec.bin
$(call dist-for-goals,droid,$(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin)
else
$(error GSC firmware not found in $(RELEASE_GOOGLE_DAUNTLESS_DIR))
endif
# New 2023 production Dauntless chips are "d3m2"
ifneq (,$(wildcard $(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" $(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin))
$(error GSC firmware size check fail)
endif
PRODUCT_COPY_FILES += \
$(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/dauntless/d3m2.ec.bin
$(call dist-for-goals,droid,$(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin)
else
$(error GSC firmware not found in $(RELEASE_GOOGLE_DAUNTLESS_DIR))
endif
# Intermediate image artifacts are published, but aren't included in /vendor/firmware/dauntless
# in PRODUCT_COPY_FILES
# This is because intermediate images aren't needed on user devices, but the published artifact
# is useful for flashstation purposes.
# proto11 chips need an intermediate image prior to upgrading to newever versions of the firmware
ifneq (,$(wildcard vendor/google_nos/prebuilts/dauntless/intermediate_images/proto11_intermediate.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" vendor/google_nos/prebuilts/dauntless/intermediate_images/proto11_intermediate.ec.bin))
$(error GSC firmware size check fail)
endif
$(call dist-for-goals,droid,vendor/google_nos/prebuilts/dauntless/intermediate_images/proto11_intermediate.ec.bin)
endif
# evt chips need an intermediate image prior to upgrading to newever versions of the firmware
ifneq (,$(wildcard vendor/google_nos/prebuilts/dauntless/intermediate_images/evt_intermediate.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" vendor/google_nos/prebuilts/dauntless/intermediate_images/evt_intermediate.ec.bin))
$(error GSC firmware size check fail)
endif
$(call dist-for-goals,droid,vendor/google_nos/prebuilts/dauntless/intermediate_images/evt_intermediate.ec.bin)
endif
# d3m2 chips need an intermediate image prior to upgrading to newever versions of the firmware
ifneq (,$(wildcard vendor/google_nos/prebuilts/dauntless/intermediate_images/d3m2_intermediate.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" vendor/google_nos/prebuilts/dauntless/intermediate_images/d3m2_intermediate.ec.bin))
$(error GSC firmware size check fail)
endif
$(call dist-for-goals,droid,vendor/google_nos/prebuilts/dauntless/intermediate_images/d3m2_intermediate.ec.bin)
endif
endif # $(wildcard vendor/google_nos)

View File

@@ -30,6 +30,3 @@ $(call inherit-product, $(SRC_TARGET_DIR)/product/developer_gsi_keys.mk)
PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.software.ipsec_tunnel_migration.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.ipsec_tunnel_migration.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += \
device/google/gs-common/vintf/framework_compatibility_matrix.xml

View File

@@ -1,4 +1,6 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/display/sepolicy
PRODUCT_PACKAGES_ENG += dump_display_userdebug.sh
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += dump_display_userdebug.sh
endif
PRODUCT_PACKAGES += dump_display

View File

@@ -16,15 +16,15 @@
#include <dump/pixel_dump.h>
#include <android-base/file.h>
int main() {
setbuf(stdout, NULL);
dumpFileContent("DECON-0 counters /sys/class/drm/card0/device/decon0/counters", "/sys/class/drm/card0/device/decon0/counters");
dumpFileContent("CRTC-0 event log", "/sys/kernel/debug/dri/0/crtc-0/event");
runCommand("libdisplaycolor", "/vendor/bin/dumpsys displaycolor -v");
dumpFileContent("Primary panel name", "/sys/class/drm/card0/device/primary-panel/panel_name");
dumpFileContent("Primary panel extra info", "/sys/class/drm/card0/device/primary-panel/panel_extinfo");
dumpFileContent("Primary panel power Vreg", "/sys/class/drm/card0/device/primary-panel/panel_pwr_vreg");
dumpFileContent("Primary panel power mode register", "/sys/class/drm/card0/device/primary-panel/power_mode");
dumpFileContent("Primary panel name", "/sys/devices/platform/exynos-drm/primary-panel/panel_name");
dumpFileContent("Primary panel extra info", "/sys/devices/platform/exynos-drm/primary-panel/panel_extinfo");
dumpFileContent("Primary panel power Vreg", "/sys/devices/platform/exynos-drm/primary-panel/panel_pwr_vreg");
return 0;
}

View File

@@ -1,8 +1,4 @@
#!/vendor/bin/sh
display_trace_path="/sys/kernel/tracing/instances/pixel-display/trace"
echo "------ Display Trace ($display_trace_path)------"
cat $display_trace_path
echo "------ HWC Fence States ------"
for f in $(ls /data/vendor/log/hwc/*_hwc_fence_state*.txt)
do

View File

@@ -18,9 +18,8 @@
int main() {
dumpFileContent("DECON-1 counters /sys/class/drm/card0/device/decon1/counters", "/sys/class/drm/card0/device/decon1/counters");
dumpFileContent("CRTC-1 event log", "/sys/kernel/debug/dri/0/crtc-1/event");
dumpFileContent("Secondary panel name", "/sys/class/drm/card0/device/secondary-panel/panel_name");
dumpFileContent("Secondary panel extra info", "/sys/class/drm/card0/device/secondary-panel/panel_extinfo");
dumpFileContent("Secondary panel power mode register", "/sys/class/drm/card0/device/secondary-panel/power_mode");
dumpFileContent("Secondary panel name", "/sys/devices/platform/exynos-drm/secondary-panel/panel_name");
dumpFileContent("Secondary panel extra info", "/sys/devices/platform/exynos-drm/secondary-panel/panel_extinfo");
return 0;
}

View File

@@ -1,4 +1,3 @@
# Display (dump for bugreport)
pixel_bugreport(dump_display)
allow dump_display sysfs_display:file r_file_perms;

View File

@@ -1,4 +1,3 @@
# Display eng/userdebug (dump for bugreport)
pixel_bugreport(dump_display_userdebug)
userdebug_or_eng(`
@@ -6,6 +5,4 @@ userdebug_or_eng(`
allow dump_display_userdebug vendor_log_file:dir search;
allow dump_display_userdebug vendor_hwc_log_file:dir r_dir_perms;
allow dump_display_userdebug vendor_hwc_log_file:file r_file_perms;
allow dump_display_userdebug debugfs_tracing_instances:dir search;
allow dump_display_userdebug debugfs_tracing_instances:file r_file_perms;
')

View File

@@ -1,20 +0,0 @@
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
cc_binary {
name: "dump_chip_info",
srcs: ["dump_chip_info.cpp"],
cflags: [
"-Wall",
"-Wextra",
"-Werror",
],
shared_libs: [
"libbase",
"libdump",
"liblog",
],
vendor: true,
relative_install_path: "dump",
}

View File

@@ -1,3 +0,0 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/dump_chip_info/sepolicy
PRODUCT_PACKAGES += dump_chip_info

View File

@@ -1,28 +0,0 @@
/*
* Copyright 2024 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <dump/pixel_dump.h>
#include <android-base/file.h>
int main() {
dumpFileContent("ap_rom_patch_ver", "/sys/devices/system/goog-chip-info/ap_rom_patch_ver");
dumpFileContent("gpcm_asic_id", "/sys/devices/system/goog-chip-info/gpcm_asic_id");
dumpFileContent("device_table", "/sys/devices/system/goog-chip-info/device_table");
dumpFileContent("dvfs_table", "/sys/devices/system/goog-chip-info/dvfs_table");
dumpFileContent("hw_feature_table", "/sys/devices/system/goog-chip-info/hw_feature_table");
dumpFileContent("ids_table", "/sys/devices/system/goog-chip-info/ids_table");
return 0;
}

View File

@@ -1,3 +0,0 @@
#
pixel_bugreport(dump_chip_info)
allow dump_chip_info sysfs_chip_info:file r_file_perms;

View File

@@ -1,2 +0,0 @@
#
type sysfs_chip_info, sysfs_type, fs_type;

View File

@@ -1 +0,0 @@
/vendor/bin/dump/dump_chip_info u:object_r:dump_chip_info_exec:s0

View File

@@ -1,6 +0,0 @@
genfscon sysfs /devices/system/goog-chip-info/ap_rom_patch_ver u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/gpcm_asic_id u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/device_table u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/dvfs_table u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/hw_feature_table u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/ids_table u:object_r:sysfs_chip_info:s0

View File

@@ -19,6 +19,10 @@ PRODUCT_PACKAGES += \
# TPU TFlite Delegate
PRODUCT_PACKAGES += \
libedgetpu_util
# TPU DBA AIDL HAL service
PRODUCT_PACKAGES += com.google.edgetpu.dba-service
# TPU DBA C API library
PRODUCT_PACKAGES += libedgetpu_dba.google
# TPU Tachyon HAL service
PRODUCT_PACKAGES += com.google.edgetpu.tachyon-service
# TPU Tachyon C API library

View File

@@ -1,2 +1,2 @@
# EdgeTPU device (DarwiNN)
type edgetpu_device, dev_type, mlstrustedobject, isolated_compute_allowed_device;
type edgetpu_device, dev_type, mlstrustedobject;

View File

@@ -38,12 +38,3 @@ binder_call(edgetpu_app_server, edgetpu_vendor_server);
# Allow EdgeTPU service to log to stats service. (metrics)
allow edgetpu_app_server fwk_stats_service:service_manager find;
# Allow mlock without size restriction
allow edgetpu_app_server self:capability ipc_lock;
# Need to effectively read file mapped file when mmap + mlocked.
allow edgetpu_app_server privapp_data_file:file { map read};
# For shell level testing of mlock
allow edgetpu_app_server shell_data_file:file { map read};

View File

@@ -27,9 +27,6 @@ allow edgetpu_tachyon_server gpu_device:chr_file rw_file_perms;
allow edgetpu_tachyon_server gpu_device:dir r_dir_perms;
allow edgetpu_tachyon_server ion_device:chr_file r_file_perms;
# Allow Tachyon service to access camera hal via binder.
binder_call(edgetpu_tachyon_server, hal_camera_default);
# Allow Tachyon service to access dmabuf sysytem.
allow edgetpu_tachyon_server dmabuf_system_heap_device:chr_file r_file_perms;
@@ -42,7 +39,7 @@ allow edgetpu_tachyon_server proc_version:file r_file_perms;
# Allow Tachyon service to send trace packets to Perfetto with SELinux enabled
# under userdebug builds.
perfetto_producer(edgetpu_tachyon_server)
userdebug_or_eng(`perfetto_producer(edgetpu_tachyon_server)')
# Allow Tachyon service to read tflite DarwiNN delegate properties
get_prop(edgetpu_tachyon_server, vendor_tflite_delegate_prop)
@@ -52,17 +49,3 @@ get_prop(edgetpu_tachyon_server, vendor_edgetpu_runtime_prop)
get_prop(edgetpu_tachyon_server, vendor_hetero_runtime_prop)
# Allow Tachyon service to read EdgeTPU CPU scheduler properties
get_prop(edgetpu_tachyon_server, vendor_edgetpu_cpu_scheduler_prop)
# Allow mlock without size restriction
allow edgetpu_tachyon_server self:capability ipc_lock;
# Need to effectively read file mapped file when mmap + mlocked.
allow edgetpu_tachyon_server privapp_data_file:file { map read};
# For shell level testing of mlock
userdebug_or_eng(`
allow edgetpu_tachyon_server shell_data_file:file { map read};
')
# For shell level testing
binder_call(edgetpu_tachyon_server, shell);

View File

@@ -15,10 +15,8 @@
/vendor/lib64/libmetrics_logger\.so u:object_r:same_process_hal_file:s0
/vendor/lib64/libedgetpu_util\.so u:object_r:same_process_hal_file:s0
# EdgeTPU runtime libraries
/vendor/lib64/com\.google\.edgetpu_app_service-V[1-4]-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib64/com\.google\.edgetpu_app_service-V[1-3]-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib64/com\.google\.edgetpu_vendor_service-V[1-2]-ndk\.so u:object_r:same_process_hal_file:s0
# EdgeTPU Tachyon libraries
/vendor/lib64/libedgetpu_tachyon\.google\.so u:object_r:same_process_hal_file:s0
# EdgeTPU data files
/data/vendor/hal_neuralnetworks_darwinn(/.*)? u:object_r:hal_neuralnetworks_darwinn_data_file:s0
@@ -29,6 +27,3 @@
# Tachyon service
/vendor/bin/hw/com\.google\.edgetpu.tachyon-service u:object_r:edgetpu_tachyon_server_exec:s0
# libfmq.so is dynamically loaded by the Tachyon client-side library libedgetpu_tachyon.google.so
/vendor/lib64/libfmq\.so u:object_r:same_process_hal_file:s0

View File

@@ -12,19 +12,7 @@ binder_call(hal_audio_default, edgetpu_app_server)
# Allow audio HAL to read tflite Darwinn delegate properties
get_prop(hal_audio_default, vendor_tflite_delegate_prop)
# Allow audio HAL to read DarwiNN runtime properties
get_prop(hal_audio_default, vendor_edgetpu_runtime_prop)
# Allow audio HAL to read hetero runtime properties
get_prop(hal_audio_default, vendor_hetero_runtime_prop)
# Allow DMA Buf access.
allow hal_audio_default dmabuf_system_heap_device:chr_file r_file_perms;
# Allow audio HAL to connect to the stats service for logging EdgeTpu metrics.
allow hal_audio_default fwk_stats_service:service_manager find;
# Allow audio HAL to send EdgeTpu trace packets to Perfetto.
# Enable for prod devices, see: go/darwinn-perfetto-critical-events
perfetto_producer(hal_audio_default)

View File

@@ -6,10 +6,3 @@ get_prop(hal_camera_default, vendor_edgetpu_runtime_prop)
# Allow camera HAL to read hetero runtime properties
get_prop(hal_camera_default, vendor_hetero_runtime_prop)
# Allow camera HAL to access tachyon HAL
allow hal_camera_default edgetpu_tachyon_service:service_manager find;
# Allow camera HAL to communicate with tachyon hal using binder calls
binder_call(hal_camera_default, edgetpu_tachyon_server);

View File

@@ -1,4 +1,3 @@
# Sepolicies for EdgeTPU
type hal_neuralnetworks_darwinn, domain;
hal_server_domain(hal_neuralnetworks_darwinn, hal_neuralnetworks)
@@ -63,8 +62,3 @@ get_prop(hal_neuralnetworks_darwinn, vendor_hetero_runtime_prop)
# Allow DMA Buf access.
allow hal_neuralnetworks_darwinn dmabuf_system_heap_device:chr_file r_file_perms;
# Allows the NNAPI HAL to access the graphics_allocator_service.
# This is required for shared memory buffer allocation.
# Context:- b/361711471.
hal_client_domain(hal_neuralnetworks_darwinn, hal_graphics_allocator);
allow hal_neuralnetworks_darwinn hal_graphics_allocator_service:service_manager find;

Some files were not shown because too many files have changed in this diff Show More