503 Commits
udc ... vic

Author SHA1 Message Date
a767abb133 gs201: Initialize for Evolution X 10.x
Change-Id: Iffb170290bb1742a5dc0d2809a61543d9230443f
Signed-off-by: AnierinB <anierin@evolution-x.org>
2025-05-12 03:51:27 +00:00
Bruno Martins
134179699f gs201: Migrate Lineage Health to soong_config_set
Change-Id: I2eff39e83b9673aa2989d05de65c646241ba61da
2025-05-06 09:54:30 +03:00
Oliver Scott
4f9c60dffd Implement charge limit mode
Change-Id: I61d317756ae1b985a47c23c9611396428a39045b
2025-03-31 11:58:41 +00:00
Michael Bestas
a770b611a1 Merge tag 'android-15.0.0_r20' into staging/lineage-22.2_merge-android-15.0.0_r20
Android 15.0.0 Release 20 (BP1A.250305.019)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8eo7QAKCRDorT+BmrEO
# eN4GAJ4zBTRmknJtiHTlKaXFFCxh6RaE0QCfVZMelWDtp9SyAoTrojuN1flREII=
# =d0db
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Mar  5 03:29:17 2025 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [ultimate]

# By Nina Chen (9) and others
# Via Android Build Coastguard Worker (22) and others
* tag 'android-15.0.0_r20': (22 commits)
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Update SELinux error
  Allow tachyon service to make binder calls to GCA
  Update SELinux error
  Update SELinux error
  Revert "modem_svc: move shared_modem_platform related sepolicy t..."
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Update ldaf sensor device filename
  Update SELinux error
  Update SELinux error
  sepolicy: allow dump_power to read battery_history_device
  Update SELinux error
  sepolicy: allow dump_power to read debugfs
  Remove duplicate service entries
  Revert "Update SELinux error"
  Update SELinux error
  convert-to-ext4-sh.te: use su domain instead
  modem_svc: use shared_modem_platform to replace all modem_svc_sit
  Update SELinux error
  sepolicy: allow dumpstate to execute dump_power
  ...

 Conflicts:
	sepolicy/gs201-sepolicy.mk

Change-Id: Ie0faabb66c73c2e4da10f9f8f0a65fa49e68a7dc
2025-03-09 11:06:21 +02:00
Michael Bestas
29d946776c Merge tag 'android-15.0.0_r20' into staging/lineage-22.2_merge-android-15.0.0_r20
Android 15.0.0 Release 20 (BP1A.250305.019)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8eo7QAKCRDorT+BmrEO
# eL2HAJ9GJqXQ084waJriZMG+pKW+8L7hAgCeLGKh/diCM8fFbNP6nFkjxriBLTQ=
# =zXv6
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Mar  5 03:29:17 2025 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [ultimate]

# By Herbert Xue (3) and others
# Via Android Build Coastguard Worker (32) and others
* tag 'android-15.0.0_r20': (36 commits)
  Enable WIFI_FEATURE_HOSTAPD_11AX
  dump_power: add battery caretaker dump into bugreport
  [Pixel VPN] Apply reviewed default permissions
  update health HAL dependency
  Add sched qos support
  Change TARGET_RECOVERY_UI_LIB to use fully qualified names in gs201
  Change TARGET_RECOVERY_UI_LIB to use fully qualified names in gs201
  Clean up unnecessary data_connection_5g_plus overlay
  init: gs201: move sched rate limit to late init
  Add soong config use_google_qns to device/google/gs201/device.mk
  Set soong config variables for libExynosC2H263Dec and libExynosC2H263Enc
  init: make pmu_poll_enable node readable
  Set soong config variable "board_use_dec_sw_csc" for libExynosVideoCodec
  Update ldaf sensor device filename
  dump_power: gs201: correct dump path
  Move video_codec soong config variables into board config
  Use full namespace path for BOARD_WPA_SUPPLICANT_PRIVATE_LIB
  dumpstate: gs201: fix dump path
  Revert "Add IGoodixFingerprintDaemon aidl interface"
  Add IGoodixFingerprintDaemon aidl interface
  ...

Change-Id: I10f7876808a08741e1f15c8182f82ce6fb8af513
2025-03-09 11:05:56 +02:00
Android Build Coastguard Worker
f1e845cec8 Merge cherrypicks of ['googleplex-android-review.googlesource.com/31289557'] into 25Q1-release.
Change-Id: Ib441f6efcb2632283b40def47480421773c7c11b
2025-01-15 07:23:23 -08:00
Hsiu-Chang Chen
515504beba Enable WIFI_FEATURE_HOSTAPD_11AX
In the past, the WIFI_FEATURE_HOSTAPD_11AX flag was ineffective.
Because hostapd takes the value of CONFIG_IEEE80211AX to enable
11ax mode on hotspot, the unset flag WIFI_FEATURE_HOSTAPD_11AX
went unnoticed.

However, after wpa_supplicant migrated from Android.mk to Android.bp,
it correctly evaluates WIFI_FEATURE_HOSTAPD_11AX to determine 11ax hotspot support. We need to set WIFI_FEATURE_HOSTAPD_11AX as true to
re-enable the 11ax mode on hotspot.

Bug: 389824755
Test: Hotspot is enabled in 11ax mode
Flag: EXEMPT bugfix
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:4dd8c64713f9f004c2678e2a65f815e994dfcb12)
Merged-In: I635575b77a5f149605eaeb22046fbabe71955952
Change-Id: I635575b77a5f149605eaeb22046fbabe71955952
2025-01-15 07:16:47 -08:00
Android Build Coastguard Worker
de43cfab9f Merge cherrypicks of ['googleplex-android-review.googlesource.com/31034785'] into 25Q1-release.
Change-Id: Iaa517304d463d2f56880b4f0dc501e32ac4f25a6
2025-01-09 11:37:53 -08:00
Jack Wu
26545503d7 dump_power: add battery caretaker dump into bugreport
logging for AACR(+H), AAFV, AACT, AACC and AACP Version

Bug: 384737509
Test: adb bugreport
Flag: EXEMPT bugfix
Signed-off-by: Jack Wu <wjack@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7270e65cfd2386802f8290e05133662fe8959468)
Merged-In: I366adec774866a9561067e1a3e42f9c794d3ccb8
Change-Id: I366adec774866a9561067e1a3e42f9c794d3ccb8
2025-01-09 11:35:15 -08:00
LuK1337
8f5dc0095f gs201: overlay: Provide tethering configuration
Matches PixelTetheringOverlay2021.

Change-Id: I90ef9cd9c89b1bfacf5680cb1e42bb61ad275393
2025-01-08 17:55:09 +00:00
LuK1337
6ca3d7c61a fixup! overlay: Enable call recording
Fixes: https://gitlab.com/LineageOS/issues/android/-/issues/8024
Change-Id: I00f3c26f63dc3f45657543dba0ee91cca3a081be
2025-01-08 12:21:25 +01:00
Android Build Coastguard Worker
6a46a7ec0e Merge cherrypicks of ['googleplex-android-review.googlesource.com/30748240'] into 25Q1-release.
Change-Id: I5f0d689d163dee4448327211b1352799d2b7bc8b
2024-12-20 14:12:56 -08:00
Daniel Lowe
a13d935f2e [Pixel VPN] Apply reviewed default permissions
Pregrantting below permissions:
READ_PHONE_STATE

Flag: EXEMPT add permission pregranted in b/337725984
Bug: 373686360
Test: presubmit, manual install
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:796a10b44014235cc7632e56febc3fbb4bfdded7)
Merged-In: I2f2cf9e1bd2e60dd04afac8fdf6d1c7f5f654778
Change-Id: I2f2cf9e1bd2e60dd04afac8fdf6d1c7f5f654778
2024-12-20 14:09:34 -08:00
Michael Bestas
0b81dc1878 gs201: Update linker.config from AP4A.241205.013
These libraries are used in camera HAL APEX.

Change-Id: I40a7ff722ae55a4ca9fd77f97a2b5e73af1898e2
2024-12-11 04:15:15 +02:00
Michael Bestas
cedb4b1232 Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6
Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eDIZAJwMTYIKjIAnt4/EG98sVijowfb+9ACeO1gMsXc1bg4Dls3HunIrfCM+sOM=
# =ctpR
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Wilson Sung (7) and others
# Via Android Build Coastguard Worker (27) and others
* tag 'android-15.0.0_r6': (27 commits)
  sepolicy: allow dumpstate to execute dump_power
  Make android.framework.stats-v2-ndk app reachable
  Change vendor_fingerprint_prop to vendor_restricted_prop
  Update SELinux error
  [BT] Define vendor_bluetooth_prop
  storage: move storage related device type to common folder
  Storage: label ufs firmware upgrade script
  Label sysfs node power_mode as sysfs_display.
  sepolicy: gs201: fix bm selinux
  sepolicy: remove dump_power_gs201.sh
  Update SELinux error
  Revert "Revert "gs201: update shared_modem_platform sepolicy for..."
  Revert "gs201: update shared_modem_platform sepolicy for UMI"
  Update SELinux error
  Update SELinux error
  Update SELinux error
  gs201: update shared_modem_platform sepolicy for UMI
  Update SELinux error
  Allow camera HAL to access power_state sysfs
  Add kernel vendor_fw_file dir read permission
  ...

Change-Id: Id50470e50ccd1afb2550f89eff242a99cbbb386b
2024-12-11 03:54:25 +02:00
Michael Bestas
9b043a3e94 Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6
Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eO5/AJ9rMGAZO6hpWnAQeLFKjKwpbj1qiACfVRU7e0KtnSmXfn00k3wEc2acjpo=
# =pIC7
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Krzysztof Kosiński (3) and others
# Via Android Build Coastguard Worker (29) and others
* tag 'android-15.0.0_r6': (30 commits)
  Delete TARGET_CPU_VARIANT_RUNTIME.
  Add input event profile to mitigate input latency of input threads
  gs201: avoid vector<const T>
  Delete PRODUCT_FULL_TREBLE_OVERRIDE.
  bcl: remove charging debugfs data logging
  Switch from the BFQ to the mq-deadline I/O scheduler
  extended_log: update directory permissions for gs201
  Revert "Add soong config use_google_qns in device/google/gs201/d..."
  Add soong config use_google_qns in device/google/gs201/device.mk
  Delete mapper4 manifest
  usb: correct sys.usb.controller sysprop
  The "messaging" package is being removed.
  Migrate dump_power_gs201.sh contents into cpp for improved speed
  Remove BCL from thermal
  Add FSTAB_OWNERS and update OWNERS to include Android.bp
  Limit hub tuning when enable_hub is enabled
  init: gs201: Mask VDROOP1 for GPU CLK Divider
  Upgrade IDisplay to V13
  BoardConfig-common.mk: Enable Lazy RCU
  Add soong config variable for PowerAnomalySitril
  ...

 Conflicts:
	device.mk
	dumpstate/dump_power_gs201.sh

Change-Id: I2b565f07529d250f57286faaba3bb694c0551222
2024-12-11 03:54:17 +02:00
Android Build Coastguard Worker
79bbac0ae7 Snap for 12770256 from d1f806c78b to 25Q1-release
Change-Id: Id45a9e068f089832fd57f2fc6df63a1a24d401c1
2024-12-10 00:32:22 +00:00
Eileen Lai
d1f806c78b modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I3e19432ab7cf6b18b277a877d1cdbc9ebf687af9
Flag: NONE local testing only
2024-12-09 15:09:16 +00:00
Nina Chen
438a3edc88 Update SELinux error
copy bug_map entry from gs201

Test: SELinuxUncheckedDenialBootTest
Bug: 383013727
Flag: EXEMPT sepolicy
Change-Id: I78e6c558e24cc0c444143510470151ebb3c258af
2024-12-09 11:40:41 +08:00
Android Build Coastguard Worker
2b6c75c57c Snap for 12765415 from cadf608f92 to 25Q1-release
Change-Id: I5b49ab3cf0ad491b1ac088d5b9acf96775a4d4e3
2024-12-07 23:04:55 +00:00
Daniel Zheng
cadf608f92 update health HAL dependency
Bug: 381926253
Test: th
Change-Id: I55424b1ce6672b532a83dd9349c5265d31f279b2
2024-12-07 06:50:51 +00:00
Android Build Coastguard Worker
6c1c4cf009 Snap for 12763142 from a3d0621213 to 25Q1-release
Change-Id: I60c578b4ece437697bb2dfc2e68771a13490f105
2024-12-07 02:04:34 +00:00
Android Build Coastguard Worker
b1cd2f10c6 Snap for 12763142 from 6eded858fc to 25Q1-release
Change-Id: I474cffd1b594f796994c467b49862d6333faa2bc
2024-12-07 02:04:33 +00:00
Dinesh Yadav
a3d0621213 Allow tachyon service to make binder calls to GCA
This permission is needed for tachyon service to call callbacks.

AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212  6987  6987 W com.google.edge: type=1400 audit(0.0:17): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424  4166  4166 W com.google.edge: type=1400 audit(0.0:254): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0

Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: I0913bafb24f02de9090e2d02011287e4deab0d4f
2024-12-06 16:20:35 +00:00
Rick Yiu
6eded858fc Add sched qos support
Add task profiles and set permissions.

Bug: 355612114
Flag: NONE init rc file does not support flag
Test: build pass
Change-Id: I04d2f7af89fe3b1425962a5a5ab01e42f09fc19d
2024-12-06 08:19:59 +00:00
Nelson Li
8ff9d17a35 [automerger skipped] Change TARGET_RECOVERY_UI_LIB to use fully qualified names in gs201 am: 81a804eab6 am: 33da5a379e -s ours
am skip reason: Merged-In I1a41a48feb26771127f9603ae5ae226d2de61065 with SHA-1 a477bea5e2 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3393979

Change-Id: Ie3526667c1a4bab7d7a6e44064bf5a8c6167d3a7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-06 01:46:50 +00:00
Nelson Li
33da5a379e Change TARGET_RECOVERY_UI_LIB to use fully qualified names in gs201 am: 81a804eab6
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3393979

Change-Id: I588cbdcf4795cfe47273cab32b9cf0dada96c5cb
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-06 01:35:50 +00:00
Android Build Coastguard Worker
929a36b8b0 Snap for 12755599 from 8059774fe7 to 25Q1-release
Change-Id: I36649f6d494c69394f54420c756ae59f124bf271
2024-12-06 00:03:10 +00:00
Android Build Coastguard Worker
1b6bce6b32 Snap for 12755599 from a477bea5e2 to 25Q1-release
Change-Id: I719b1a666522ada32d83075cbada59b42d56191d
2024-12-06 00:03:09 +00:00
Nina Chen
8059774fe7 Update SELinux error
Flag: EXEMPT sepolicy
Test: SELinuxUncheckedDenialBootTest
Bug: 382362323
Bug: 360057889
Change-Id: Ic2a2c36368039b4d95ddb9b58b630267c33660a1
2024-12-05 06:44:08 +00:00
Nelson Li
81a804eab6 Change TARGET_RECOVERY_UI_LIB to use fully qualified names in gs201
Since the TARGET_RECOVERY_UI_LIB for each device is not exactly the
same, and most of the modules in it contain `soong_namespace{}` to
avoid conflicts between different devices, after converting
`librecovery_ui_ext` from Android.mk to Android.bp, it needs to be
changed to a `fully qualified name` in order to correctly use the
corresponding module.

Flag: EXEMPT refactor

Bug: 339143524
Test: m -j librecovery_ui_ext

Merged-In: I1a41a48feb26771127f9603ae5ae226d2de61065
Change-Id: I1a41a48feb26771127f9603ae5ae226d2de61065
2024-12-05 03:34:41 +00:00
Nelson Li
a477bea5e2 Change TARGET_RECOVERY_UI_LIB to use fully qualified names in gs201
Since the TARGET_RECOVERY_UI_LIB for each device is not exactly the
same, and most of the modules in it contain `soong_namespace{}` to
avoid conflicts between different devices, after converting
`librecovery_ui_ext` from Android.mk to Android.bp, it needs to be
changed to a `fully qualified name` in order to correctly use the
corresponding module.

Flag: EXEMPT refactor

Bug: 339143524
Test: m -j librecovery_ui_ext
Change-Id: I1a41a48feb26771127f9603ae5ae226d2de61065
2024-12-05 02:39:03 +00:00
Android Build Coastguard Worker
130352990e Snap for 12748980 from fac8b49c5a to 25Q1-release
Change-Id: I758001e0b9e9944c3238246fbeb30ce22ae4a286
2024-12-05 00:03:30 +00:00
Android Build Coastguard Worker
0d5fc73635 Snap for 12742097 from 06d7b10018 to 25Q1-release
Change-Id: I294f41627d0ba340a60249ed951549d2f358ec64
2024-12-04 00:03:27 +00:00
Xin Li
06d7b10018 [automerger skipped] Merge ab/AP4A.241205.013 into aosp-main-future am: 43ea2028f4 -s ours
am skip reason: Merged-In Ie4637b1295975c716f50333ad6635b9694a624b8 with SHA-1 315cc63557 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/30626047

Change-Id: I91846bad8f7fb9fe540e8651f7700b694bdb7247
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-03 18:22:03 +00:00
Chaohui Wang
fac8b49c5a Clean up unnecessary data_connection_5g_plus overlay
This string is not device specific, and already set at,
frameworks/base/packages/SettingsLib/res/values-mcc311-mnc480/strings.xml
frameworks/base/packages/SettingsLib/res/values-mcc310-mnc004/strings.xml

Bug: 377907543
Flag: EXEMPT clean up
Test: m
Change-Id: I3391ec3d0a45e70ef3a96005961f7060da25e997
2024-12-03 17:29:53 +08:00
Android Build Coastguard Worker
4f644bba4c Snap for 12727401 from 0c22beaf9c to 25Q1-release
Change-Id: I7bcdf68744741d72fcd4a5b30b78be7568e513bd
2024-11-29 00:03:13 +00:00
Nina Chen
0c22beaf9c Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 381326452
Flag: EXEMPT sepolicy
Change-Id: I02cc7a8054c274c7d487c42366270b815b7a759f
2024-11-28 02:58:59 +00:00
Android Build Coastguard Worker
63de89569a Snap for 12722466 from d817c86300 to 25Q1-release
Change-Id: I8f098f16b26191f1e5eea57a7751d68f06875c0c
2024-11-28 00:03:13 +00:00
Xin Li
43ea2028f4 Merge ab/AP4A.241205.013 into aosp-main-future
Bug: 370570306
Merged-In: Ie4637b1295975c716f50333ad6635b9694a624b8
Change-Id: I68e81282aa22934dbd33ac5c9d751954e09bca17
2024-11-27 12:53:10 -08:00
Will Song
d817c86300 init: gs201: move sched rate limit to late init
Since pixel performance has a shared configuration,
we need to move override values into late init.

Bug: 381100494
Test: Boot
Flag: EXEMPT bug fix
Change-Id: Ia0ec769ff8996d66a4355f20de884fcb05728c3f
2024-11-27 14:58:10 +00:00
kellyhung
f5e3505bc9 Add soong config use_google_qns to device/google/gs201/device.mk
Bug: 360757079
Test: lunch cheetah-trunk_staging-userdebug; m grilservice
Flag: EXEMPT bugfix
Change-Id: I114d13b8e610a289b3c2df60630a14241c93eb28
2024-11-27 02:04:28 +00:00
Android Build Coastguard Worker
7f5e53740f Snap for 12710726 from e89e33a63c to 25Q1-release
Change-Id: I72951d24910973db1956e44cef7b45799da47243
2024-11-26 02:03:22 +00:00
Herbert Xue
e89e33a63c Set soong config variables for libExynosC2H263Dec and libExynosC2H263Enc
Flag: EXEMPT bugfix
Bug: 375111251
Test: m libExynosC2H263Dec libExynosC2H263Enc
Change-Id: Ifd1a768baa7aab356f37922c017a65e95f083232
2024-11-25 06:27:19 +00:00
Android Build Coastguard Worker
a211e0b460 Snap for 12695596 from 2c027c6288 to 25Q1-release
Change-Id: If52830785d3acfedb35113a33a74b1a8062a4bf4
2024-11-22 00:03:09 +00:00
Liana Kazanova (xWF)
2c027c6288 Revert "modem_svc: move shared_modem_platform related sepolicy t..."
Revert submission 30519089-move_modem_sepolicy

Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:30519089-move_modem_sepolicy

Change-Id: I90d720b8bf396f3785c00e9cfa67f55a62a020b2
2024-11-21 17:53:59 +00:00
Eileen Lai
1b9fcdf1af modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955 

Change-Id: Ibcdc907b7fe4e8efcbd3217700b4c62873cd124d
Flag: NONE local testing only
2024-11-20 08:20:38 +00:00
Android Build Coastguard Worker
85c73e12dc Snap for 12680993 from f48f2625e6 to 25Q1-release
Change-Id: I8e3137de83f38e2cb92e8f24939a5db60cf411d6
2024-11-20 00:04:03 +00:00
Paulsu Su
f48f2625e6 init: make pmu_poll_enable node readable
Bug: 378509589
Flag: EXEMPT init config for read permission
Change-Id: I226aa1a9801bdbb2630c7583180495752c9002e1
2024-11-19 11:41:43 +00:00
Herbert Xue
2451f7afe4 Set soong config variable "board_use_dec_sw_csc" for libExynosVideoCodec
Flag: EXEMPT bugfix
Bug: 375522783
Test: m libExynosVideoCodec
Change-Id: I23e96ea7ece291562c3ad959c84cc6f95f587e1c
2024-11-19 06:26:48 +00:00
Android Build Coastguard Worker
6ac639c545 Snap for 12673321 from cde7e1417d to 25Q1-release
Change-Id: I4e3d0997ad73258c06fc6cc31d39101dea30c9f2
2024-11-19 00:07:07 +00:00
Android Build Coastguard Worker
b9c61ddea2 Snap for 12673321 from ba05fccd6d to 25Q1-release
Change-Id: I9401d8f5226af5985de46fb4111381fbdab73772
2024-11-19 00:07:06 +00:00
Boon Jun
cde7e1417d Update ldaf sensor device filename
LDAF sensor device filename changed after kernel upgrade
from v5.10 to v6.1 in some of our in-market devices.
We need to update the device filename to access the LDAF
with this new kernel version.

Bug: 378045567
Test: Open camera, and observe available LDAF sensor in logs
Flag: EXEMPT bugfix
Change-Id: I92313633fc31928ae4f3485c7e49cdd257e1c7bc
2024-11-18 03:36:18 +00:00
Boon Jun
ba05fccd6d Update ldaf sensor device filename
LDAF sensor device filename changed after kernel upgrade
from v5.10 to v6.1 in some of our in-market devices.
We need to update the device filename to access the LDAF
with this new kernel version.

Bug: 378045567
Test: Open camera, and observe available LDAF sensor in logs
Flag: EXEMPT bugfix
Change-Id: I9ecdeb73e6787409e02eae3c699d2d9817249bc4
2024-11-18 03:36:18 +00:00
Android Build Coastguard Worker
db917a459b Snap for 12664851 from 4f11538015 to 25Q1-release
Change-Id: Ie7d5f928a644690c103a72dee27f01907fe7e1f6
2024-11-16 02:03:50 +00:00
Nina Chen
edc0829d75 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379246129
Bug: 379245515
Bug: 379245738
Flag: EXEMPT NDK
Change-Id: I20793d45a89b56ecea82f425f90800d66eacfb42
2024-11-15 11:01:56 +00:00
Nina Chen
4f11538015 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379206608
Bug: 379206941
Flag: EXEMPT NDK
Change-Id: Ib636252a3a8eb38a56099b4e6ea14a5a4e341b4d
2024-11-15 06:54:06 +00:00
Android Build Coastguard Worker
91ce37d9e5 Snap for 12658558 from 43841a5ac7 to 25Q1-release
Change-Id: I2585ea193bd97cb61208fc68c26950525806330b
2024-11-15 00:03:18 +00:00
Android Build Coastguard Worker
87e646b285 Snap for 12658558 from 135dcb87ba to 25Q1-release
Change-Id: I07524c21f40313cb6adde5609b08bea257658809
2024-11-15 00:03:17 +00:00
Xin Li
135dcb87ba [automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: c6c5aa6608 -s ours
am skip reason: Merged-In Ia05fc4592ebe3946a52e10e435bc8f8cef7becc9 with SHA-1 f0733782af is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/30283694

Change-Id: Ie16ca9ad24009fb2d83a3bf7f9bbf38226dc6cbf
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-14 01:15:11 +00:00
Android Build Coastguard Worker
8e24eb7c81 Snap for 12651823 from 8b6e654781 to 25Q1-release
Change-Id: I8f2c69708f695b0a5db0398a4ac926acffd196e4
2024-11-14 00:03:02 +00:00
Android Build Coastguard Worker
e8607fb69e Snap for 12651823 from 7d140022ff to 25Q1-release
Change-Id: I6d0e22446c62aee40126ebb1b9d480229ec4de2e
2024-11-14 00:03:01 +00:00
Xin Li
43841a5ac7 [automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: b51482ba59 -s ours
am skip reason: Merged-In If78bc951a9a4cfc223d01970ca6819fe2b5c6335 with SHA-1 077e59c64f is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/30285389

Change-Id: I04bdd83048f45546e42be187d10433d2a17a62d7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-13 23:27:05 +00:00
Spade Lee
7d140022ff dump_power: gs201: correct dump path
- fix dual fg path
- fix pmic path
- add logbuffer_dual_batt
- move fg registers dump from debugfs to sysfs
- remove max77779fg path

Bug: 377895720
Flag: EXEMPT bugfix
Change-Id: Ie5c8fe188fa0426617fc481cd8d38b2dfeca1e07
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-13 17:00:00 +00:00
Android Build Coastguard Worker
4253dd2f4e Snap for 12630846 from 837de89c13 to 25Q1-release
Change-Id: Ie58b8d9ee415097af354ded9f53d50c4415c633f
2024-11-09 02:03:33 +00:00
Android Build Coastguard Worker
18706610bb Snap for 12623742 from d2f8dde307 to 25Q1-release
Change-Id: I5ea11bbb2c8d20f853d0897290f9d9515cb1587c
2024-11-08 00:03:23 +00:00
Spade Lee
8b6e654781 sepolicy: allow dump_power to read battery_history_device
avc:  denied  { open } for  path="/dev/maxfg_history" dev="tmpfs" ino=1235 scontext=u:r:dump_power:s0 tcontext=u:object_r:battery_history_device:s0 tclass=chr_file permissive=0
avc:  denied  { read } for  name="maxfg_history" dev="tmpfs" ino=1250 scontext=u:r:dump_power:s0 tcontext=u:object_r:battery_history_device:s0 tclass=chr_file permissive=0

Bug: 377895720
Flag: EXEMPT bugfix
Test: /dev/maxfg_history correctly dumped
Change-Id: I766f8a21468370e69a7c11b028b2326434ad2380
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-07 17:41:04 +00:00
Nina Chen
d2f8dde307 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 377811773
Flag: EXEMPT NDK
Bug: 377781394
Change-Id: I6e2361b6b3500773a5cd8e5c98905a3f50513472
2024-11-07 06:39:10 +00:00
Xin Li
c6c5aa6608 Merge 24Q4 (ab/12406339) into aosp-main-future
Bug: 370570306
Merged-In: Ia05fc4592ebe3946a52e10e435bc8f8cef7becc9
Change-Id: I856c6cb88142711f2d8d25240c3176b05f8edfdb
2024-11-06 10:31:19 -08:00
Xin Li
b51482ba59 Merge 24Q4 (ab/12406339) into aosp-main-future
Bug: 370570306
Merged-In: If78bc951a9a4cfc223d01970ca6819fe2b5c6335
Change-Id: I83107cc2d5b9ee104b9a5a3bf2c15c3e5f1fa3e2
2024-11-06 10:31:19 -08:00
Herbert Xue
837de89c13 Move video_codec soong config variables into board config
Flag: EXEMPT bugfix
Bug: 370663515
Test: m libExynosC2OSAL
Change-Id: Iff6a4e9c5cbadf0eb7711cb9d1ad971f0ec365db
2024-11-06 11:08:36 +08:00
Android Build Coastguard Worker
85b8c3461a Snap for 12609205 from 12dd9e39f2 to 25Q1-release
Change-Id: Ic8e5cce2b43aa86300754a9c4a78a1efabf1412e
2024-11-06 00:03:51 +00:00
Android Build Coastguard Worker
3fffcdec49 Snap for 12609205 from 491a1ccb19 to 25Q1-release
Change-Id: I75834bd3263141cbc286893cb4746ef03baa871e
2024-11-06 00:03:51 +00:00
Bill Yang
12dd9e39f2 Use full namespace path for BOARD_WPA_SUPPLICANT_PRIVATE_LIB
There are several different version lib_driver_cmd_qcwcn control by
different soong_namespace and it will be used as static lib of hostapd
and wpa_supplicant and due to these wlan modules are in global namespace
and in order to read static lib from other namespace, will need to set
full namespace path instead.

Bug: 359745733
Test: lunch lynx-trunk_staging-userdebug; \
      m hostapd_cli hostapd libhostapd_aidl wpa_cli wpa_supplicant \
        wpa_supplicant_macsec libwpa_client libwpa_aidl libpasn
Flag: EXEMPT refactor
Change-Id: I747026b7ac5711ed0d450edf79e1fa24da9ac3b6
2024-11-05 19:51:22 +00:00
Spade Lee
8202fc2818 dumpstate: gs201: fix dump path
- Add missing change ag/25268925
- Correct FG reg dump path in sysfs
- Correct battery EEPROM dump path
- Correct main/dc charger dump path in sysfs
- Correct tcpm dump path
- Add charger dump path in debugfs
- Add swelling data dump in dumpBatteryHealth
- Remove function not for gs201

Bug: 376080915
Test: all paths were correctly dumped, but debugfs need sepolicy
Flag: EXEMPT bugfix
Change-Id: Ida288b94f19c3d49843a2944c323486980587779
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-05 13:36:13 +00:00
Spade Lee
491a1ccb19 sepolicy: allow dump_power to read debugfs
11-01 11:59:42.836 11781 11781 W dump_power: type=1400 audit(0.0:46): avc:  denied  { search } for  name="usb" dev="debugfs" ino=2059 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_usb_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:47): avc:  denied  { search } for  name="google_battery" dev="debugfs" ino=18509 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_battery_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:48): avc:  denied  { read } for  name="maxfg" dev="debugfs" ino=16428 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:49): avc:  denied  { read } for  name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:50): avc:  denied  { read } for  name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:51): avc:  denied  { read } for  name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0

Bug: 376080915
Test: adb bugreport without audit
Flag: EXEMPT bugfix
Change-Id: Ib0a81269edf683428720e6e380f7d7959d71decf
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-01 18:04:05 +00:00
Android Build Coastguard Worker
fa7f25c2f0 Snap for 12580585 from e4f334fece to 25Q1-release
Change-Id: Ifc5b3e7f8b7736b877f6c0d9bf3dd6ac33d3c399
2024-10-30 23:03:18 +00:00
Priyanka Advani (xWF)
e4f334fece Revert "Add IGoodixFingerprintDaemon aidl interface"
Revert submission 30066446-goodix-ext-service-aidl

Reason for revert: Droidmonitor created revert due to b/376465180. Will be verifying through ABTD before submission.

Reverted changes: /q/submissionid:30066446-goodix-ext-service-aidl

Change-Id: If0f21a8cfe11d9caad55defb963c961b7c16d284
2024-10-30 16:33:03 +00:00
chenkris
aed4820ab2 Add IGoodixFingerprintDaemon aidl interface
Flag: EXEMPT NDK
Bug: 370671685
Test: authenticate fingerprint.
Change-Id: Ib8871f722d2afca769494c047d098629e53ff2aa
2024-10-30 08:45:29 +00:00
Android Build Coastguard Worker
2e2ab018f8 Snap for 12573674 from 266c4f896c to 25Q1-release
Change-Id: Id1dcec29e264c64d3e06d0f6a128c3af94860916
2024-10-29 23:03:57 +00:00
Bill Yang
3e644ee455 Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong
Set the full module path of libacryl_hdr_plugin and the include dir for
lobacryl conversion to soong. It will take effect after aosp/3286932 and
aosp/3287183 merged.

Bug: 370414334
Test: lunch aosp_panther-trunk_staging-userdebug ; m libacryl_hdr_plugin libacryl
Change-Id: I77d3e23d2c8fd956d7207e2aa486577646a18763
2024-10-30 00:47:22 +02:00
Bill Yang
266c4f896c Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong am: d764715871 am: 196e62305c
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3286784

Change-Id: I0b27a9a01682c0238e7da343a6793740902e92d3
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-29 03:12:00 +00:00
Bill Yang
196e62305c Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong am: d764715871
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3286784

Change-Id: I3e2adec627e78596f0499e5e8dd0a37abf11220b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-29 02:50:15 +00:00
Bill Yang
d764715871 Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong
Set the full module path of libacryl_hdr_plugin and the include dir for
lobacryl conversion to soong. It will take effect after aosp/3286932 and
aosp/3287183 merged.

Bug: 370414334
Test: lunch aosp_panther-trunk_staging-userdebug ; m libacryl_hdr_plugin libacryl
Change-Id: I77d3e23d2c8fd956d7207e2aa486577646a18763
2024-10-25 03:31:42 +00:00
Android Build Coastguard Worker
75140f7aa6 Snap for 12551711 from 33f3bf6e45 to 25Q1-release
Change-Id: I899ba6a53c08349c3ecf3fba2026469363e4ceb2
2024-10-24 23:03:14 +00:00
kellyhung
33f3bf6e45 Add a soong config variable for CitadelProvision
Bug: 373235487
Test: Presubmits
Flag: EXEMPT bugfix

Change-Id: Ia7ba2ccd292c536379120e57ed27f76f03fa2798
2024-10-24 12:34:13 +00:00
Kostya Yarmash
9826c8d092 init.gs201.rc: change permission of SJTAG writable files
On userdebug & eng builds, change permission of SJTAG writable sysfs files that need to be written to 'system'. This became necessary after HSUM separated main user from the SYSTEM user

Bug: 374645181
Flag: EXEMPT bugfix
Test: Ensure that there is "Privileged Debugging" item in BetterBug settings.

Signed-off-by: Kostya Yarmash <kyarmash@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:cfde8e50cc66c22ca44da58f4a35c0b3e055646f)
Change-Id: I12857abcb94b4a7e6a068ea712c7f21c3de205ff
2024-10-24 09:48:55 +00:00
Richard Chang
08cc782e85 gs201: MCP: Set the vendor customized max cached processes to 1024.
Bug: 374891496
Change-Id: I657ea431a33003b0cc3310589e9b8fa359a66fae
Test: adb shell dumpsys activity | grep CUR_MAX_CACHED_PROCESSES
Flag: EXEMPT config XML change
2024-10-23 04:10:13 +00:00
Michael Bestas
c3ff0a8a54 gs201: Ignore missing system_dlkm.modules.load warning
This spams the build output

Change-Id: I0532a25800bd2bd4df6a3c7d49e636d9ed39ff05
2024-10-20 05:14:20 +03:00
Ethan Chen
c6b2f7fb80 Disable userdebug diagnostics
* We can't make use of most of the debug features on userdebug builds.

Change-Id: I31df2090b31243b742c4e82dc08cd8491dada54f
2024-10-20 05:14:20 +03:00
basamaryan
3789c85525 gs201: Drop unnecessary BOARD_USERDATAIMAGE_FILE_SYSTEM_TYPE flag
Change-Id: Ibb96c529ac64239d7bb919e46f5a625a6deebf98
2024-10-20 05:14:20 +03:00
Michael Bestas
b72271ce22 gs201: overlay: Enable battery cycle count
Change-Id: I92bc8363e1c9e2ad54c29a0a30dce992e25f697d
2024-10-20 05:14:19 +03:00
Michael Bestas
022111932c Add lineage.dependencies
Change-Id: I69ea95e240cca3f3b700ae68a4853e5a4d4fd5bc
2024-10-20 05:14:19 +03:00
Michael Bestas
e5c9856801 gs201: Inherit common partition reserved sizes
Change-Id: I444ce2fcd37cdfa58d83a7e872dc547fb05a2a89
2024-10-20 05:14:19 +03:00
Rashed Abdel-Tawab
ec0bf096e9 gs201: Build a disabled vbmeta image
Squashed with:
Author: Nolen Johnson <johnsonnolen@gmail.com>
Date:   Sun May 9 16:04:34 2021 -0400

    Simplify AVB flag logic

    * AVB's `--flags 3` argument builds a disabled VBMeta with
      disabled hashtree, so no need to set both flags individually.

    Change-Id: Ibe9ee322a5af58f13e76d53e18dee49451fe8838

Change-Id: Ie8f1e0929b037b35b5e45c2e31be9253fa0bb097
2024-10-20 05:14:19 +03:00
Neel Chauhan
aaf6b69dd2 Revert "Enable compressed snapshots/VABc."
Virtual AB compression prevents GApps from being installed to
cheetah/panther.

This reverts commit 2bfa6d3ba01856d99c6ffdb64627c6e9391c4a41.

Change-Id: I119b8e042e4cdeec27a19ab5dd4f0666cc115ae1
2024-10-20 05:14:19 +03:00
Michael Bestas
d9d8e045c8 Label vendor.dolby.media.c2@1.0-service
Change-Id: I89fb4c149aed94cf2f7c3d34f7fde5877175b1e2
2024-10-20 05:14:19 +03:00
Michael Bestas
28b69b2ff9 Include missing vendor sepolicy
Change-Id: Id35fb4b22e2ee8dfafdfb8ae601ab823435d2b94
2024-10-20 05:14:19 +03:00
Chirayu Desai
ed47c869b2 Allow radio access to IOemSlsiRadioExternal
Change-Id: Ib5d57b199b3e8288cd3de0c12898f0c1d679be4a
2024-10-20 05:14:19 +03:00
Danny Lin
be8ad86ddd Update seapp certificates to match stock presigned apps
Certificates extracted from stock vendor_mac_permissions.xml using
adevtool: https://github.com/kdrag0n/adevtool

Change-Id: Iaf59f1548905d16fe7ad231c039ba43941c15710
2024-10-20 05:14:19 +03:00
Michael Bestas
31b416b009 Revert "Bypass build time check for users-libs"
This reverts commit a8a4ca2748.

Change-Id: I6f61d58e2dd419cb11f2aeb4f0faf54145c6a5ce
2024-10-20 05:14:18 +03:00
ReallySnow
9d031d1f3a Add AiAi allowlist
* In Android 12, Android System Intelligence (com.google.android.as) uses
  some of the Private Compute Service (com.google.android.as.oss) services.
  The absence of these Allowlists will cause Android System Intelligence
  to fail to connect to the network and cause collapse.
* We don't need to extract google.xml to fix it, just extract the AiAi part

Change-Id: I446ae5d243cff134901094f82c90a0bbf3bb4381
2024-10-20 05:14:18 +03:00
Danny Lin
cdad22a643 overlay: Import AiAi configs
Extracted from stock cheetah AP3A.241005.015

Co-authored-by: Alessandro Astone <ales.astone@gmail.com>
Co-authored-by: Michael Bestas <mkbestas@lineageos.org>
Change-Id: I78bd7d04cbd0b35f6a8c01df3a8c1013d99bbf42
2024-10-20 05:14:11 +03:00
razorloves
af0177015c overlay: Hide user facing crash dialog for EUICC app
The GoogleParts app disables the EUICC app when there's no GMS, but it
doesn't happen quick enough. The crash dialog pops up a few times right
after initial boot up. There's no need to alarm the user, so hide it.

Change-Id: Ia06b336b30a8886bae522c6e8a76a1ca15da5edd
2024-10-20 05:06:19 +03:00
Peter Cai
ae6b90da3b Disable Euicc when GMS and GSF are not installed
* This avoids EuiccGoogle / GoogleCarrierServices crashing, taking the
  whole telephony stack with them when no GMS or GSF is installed.
* Compared to change 274251, this approach is no-op when GAPPS add-on is
  flashed before the first boot, and thus should not cause issues with
  eSIM when GAPPS is flashed.
* With microG, this also works after installing the microG GMS & GSF
  packages and rebooting, although manual activation of the eSIM is
  needed via Settings - Network.
* The only downside is that users will still see one or two crashes
  during the first boot because our application only starts after the
  device is booted.

Change-Id: I4a11c93e855978abbf8d84fdbe4ffc8b2aedc27c
2024-10-20 05:06:19 +03:00
Michael Bestas
00a959194e Include missing ConnectivityThermalPowerManager sepolicy
Change-Id: I1e0f05159a6797251ed85360966aa45246005bbd
2024-10-20 05:06:19 +03:00
Danny Lin
46a9657228 overlay: Allow ConnectivityThermalPowerManager to request thermal mitigation
ConnectivityThermalPowerManager mainly exists to manage thermal
mitigation.

Change-Id: I7d1ad7cb45a24697e444ac1f85ccfb507cb1ce49
2024-10-20 05:06:19 +03:00
Danny Lin
570ab7d77c overlay: Configure ConnectivityThermalPowerManager
Extracted from stock cheetah AP3A.241005.015

Change-Id: I71ad5adf9bf64bb1e30354446220d5769a9d44ca
2024-10-20 05:06:04 +03:00
Android Build Coastguard Worker
4e4effcd17 Snap for 12517605 from 1b64d05d93 to 25Q1-release
Change-Id: I2b24de1e7cd67313e5d244d958e3d3515894c0d8
2024-10-18 01:02:59 +00:00
Thiébaud Weksteen
1b64d05d93 Remove duplicate service entries
These entries are defined in the platform policy.

Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I9e06b0c95330afa22da324e3669121d4477baa2f
2024-10-17 02:58:49 +00:00
Android Build Coastguard Worker
be16523d9a Snap for 12508860 from 5000f8a8f9 to 25Q1-release
Change-Id: I37ca1fe7b3e7e32f95e194b2dd028312d2cfd113
2024-10-16 23:02:59 +00:00
Android Build Coastguard Worker
45880eb6ae Snap for 12508860 from c40d53b69b to 25Q1-release
Change-Id: I58306a71f74ce69d93e08e88d1c00a51f6cdd8cd
2024-10-16 23:02:58 +00:00
Krzysztof Kosiński
6497d42557 Revert "Update SELinux error"
This reverts commit ce5420fdf4.

Reason for revert: Caused by b/372347927, relevant CL was reverted

Change-Id: Ifa42eb30ad3baa1b9f4b94c191bdce4901f9a135
Fix: 372360090
2024-10-16 19:51:08 +00:00
Robert Luo
c40d53b69b [Pixel RR] Apply reviewed default permissions
Pregrantting below permission(s):
CALL_PHONE

Flag: EXEMPT add pregranted permission in b/371912006
Bug: 336203918
Test: presubmit
Change-Id: I6ef16e5571706cd865d9083ebc363a181473eea9
2024-10-16 08:42:30 +00:00
Nina Chen
5000f8a8f9 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Flag: EXEMPT NDK
Bug: 373755350
Change-Id: I3b317eb87c60d150a6cd76a5218808146de5cccd
2024-10-16 04:00:05 +00:00
Android Build Coastguard Worker
68f8325c91 Merge cherrypicks of ['googleplex-android-review.googlesource.com/29699057'] into 24Q4-release.
Change-Id: I10f3511aa18c7dfda95eecfc0820afb25a110314
2024-10-15 23:38:20 +00:00
samou
3f3827410c sepolicy: allow dumpstate to execute dump_power
10-04 19:36:47.308  7141  7141 I android.hardwar: type=1400 audit(0.0:6974): avc:  denied  { execute_no_trans } for  path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6975): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6976): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6977): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6978): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6979): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6980): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336  7141  7141 I dump_power: type=1400 audit(0.0:6981): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:29): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:30): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:31): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:32): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:33): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc:  denied  { open } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc:  denied  { getattr } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc:  denied  { search } for  name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc:  denied  { read } for  name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc:  denied  { read } for  name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc:  denied  { open } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6191): avc:  denied  { search } for  name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6192): avc:  denied  { read } for  name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6193): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6194): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6195): avc:  denied  { search } for  name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6196): avc:  denied  { read } for  name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6197): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6198): avc:  denied  { read } for  name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:875): avc:  denied  { read } for  name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:876): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:877): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:878): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:879): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:880): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:881): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:882): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:883): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:884): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:885): avc:  denied  { open } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1

Flag: EXEMPT refactor
Bug: 364989823
Signed-off-by: samou <samou@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:315cc63557dfd4367f8aed06858531b21b9ee073)
Merged-In: Ie4637b1295975c716f50333ad6635b9694a624b8
Change-Id: Ie4637b1295975c716f50333ad6635b9694a624b8
2024-10-15 23:37:24 +00:00
Nick Kralevich
10dbaa11ca convert-to-ext4-sh.te: use su domain instead am: 588e82af38 am: a37bde70e7
Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3308857

Change-Id: I37726c7b54dd6ce65828bfb8cbe18f31bd8c7dd7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-15 23:25:27 +00:00
Nick Kralevich
a37bde70e7 convert-to-ext4-sh.te: use su domain instead am: 588e82af38
Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3308857

Change-Id: Id2d0ae24894dee7321bbfe5f3ee232acf083a652
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-15 23:06:48 +00:00
Android Build Coastguard Worker
c2a343ed70 Snap for 12502765 from 0bfc85475d to 25Q1-release
Change-Id: Ic9a181921c3ce05dd3192e913b4ef157fe9db77c
2024-10-15 23:03:36 +00:00
Nick Kralevich
588e82af38 convert-to-ext4-sh.te: use su domain instead
07af2808d5 (b/239632964) added
security policy support for /system_ext/bin/convert_to_ext4.sh.
This shell script converts f2fs filesystems into ext4 filesystems
on debuggable builds (userdebug or eng) only. Ever since 2022,
the security policy for this shell script has been in permissive
mode, meaning no SELinux rules were being enforced.

  # convert-to-ext4-sh.te
  permissive convert-to-ext4-sh;

In the intervening 2 years, there has been no attempt to move
this domain into enforcing mode. And by now, this script has
likely served its purpose, by converting f2fs /persist filesystems
on engineering builds to ext4, and is probably no longer needed.

This change eliminates the use of the unenforced convert-to-ext4-sh
security domain, preferring instead to use the "su" security domain.
Like convert-to-ext4-sh, the su security domain enforces no rules
on debuggable builds, and is equivalent to traditional root on
desktop Linux systems, or running /system/xbin/su. This change
eliminates unnecessary technical complexity, and unblocks other
hardening changes, such as WIP commit
https://android-review.googlesource.com/c/platform/system/sepolicy/+/3308856

Moving from one permissive domain ("convert-to-ext4-sh") to another
permissive domain ("su") should be a no-op from a security and
functionality perspective.

Test: compiles and builds, passes treehugger.
Bug: 239632964
Change-Id: Ifd628310a923926d1a57b568c7703cb857f0871b
2024-10-15 10:30:19 -07:00
Android Build Coastguard Worker
f7726e76a5 Snap for 12496712 from f906b69f95 to 25Q1-release
Change-Id: I5ad244ca398072d961abcf0e6bd7ed542738cc56
2024-10-14 23:03:17 +00:00
Eileen Lai
f906b69f95 modem_svc: use shared_modem_platform to replace all modem_svc_sit
Bug: 368257019

Flag: NONE local testing only
Change-Id: Icc258ce297b5e7ea51fa60aa2ffb09ce99b7ef18
2024-10-14 07:27:41 +00:00
Robin Hsu
0bfc85475d gs201: Disable kmem cgroup accounting
Disable cgroup kernel memory accounting to avoid unnecessary overhead

similar change ag/22891292 but now back-port to gs201

Flag: NONE kernel config
Bug: 373232814
Test: pts-tradefed run commandAndExit pts -m PtsPerfWbsTestCases
          -t com.google.android.perfwbs.pts.KernelModuleTest
          and alternative tests on forrest.

Change-Id: I306b3e608655dc9e5f868a1f1a79e60e5b9b40fd
2024-10-14 03:01:04 +00:00
Android Build Coastguard Worker
1e5163043c Snap for 12477291 from f22f21191b to 25Q1-release
Change-Id: I75e6dd47949bac08f90bee9bccb3ce87f98752f2
2024-10-09 21:02:48 +00:00
Android Build Coastguard Worker
d1bc52d45c Snap for 12477291 from ce5420fdf4 to 25Q1-release
Change-Id: Iade6074e262271a2cd9c2592ea1685576a1a24c9
2024-10-09 21:02:48 +00:00
Kuen-Han Tsai
f22f21191b Usb: Add status check to prevent NPE
This patch prevents a Null Pointer Exception in
queryMoistureDetectionStatus() when getPortStatusHelper() fails to open
the /sys/class/typec file. The failure results in an empty
currentPortStatus vector, causing the NPE when accessing its first
element.

Bug: 361097811
Flag: EXEMPT bugfix
Test: NPE does not occur when getPortStatusHelper() fails
Change-Id: I61c9f7647aafca28b777e53f170764ddd02c060f
Signed-off-by: Kuen-Han Tsai <khtsai@google.com>
2024-10-09 15:15:56 +08:00
Nina Chen
ce5420fdf4 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 372360090
Bug: 372359823
Bug: 372360278
Flag: EXEMPT NDK
Change-Id: I9d195d35cc58503fc7c17a8fac5fabe66026c24b
2024-10-09 05:09:08 +00:00
Android Build Coastguard Worker
704c66128e Snap for 12465365 from 617251a80a to 25Q1-release
Change-Id: I5f751965d93cb10f992e2efd56ef488aff0890e4
2024-10-07 23:03:12 +00:00
Android Build Coastguard Worker
cf53f3ae99 Snap for 12465365 from 315cc63557 to 25Q1-release
Change-Id: Id55a34550d8bea9cd311f87643e03eb3bff32760
2024-10-07 23:03:12 +00:00
Jim Tang
617251a80a Relocate modem_svc_sit to proper places
Flag: EXEMPT refactor
Bug: 358485346
Test: m modem_svc_sit
Change-Id: Ib47ac55c504eafd32340e66a7286be48f2ea7b48
2024-10-07 08:45:10 +00:00
Danny Lin
fdb38c807c overlay: Enable Adaptive Connectivity setting
This feature is provided by the ConnectivityThermalPowerManager app that
we extract as a proprietary blob, so we can expose it.

Change-Id: I407e9e2235531fbca0b2c0e48b68105b1e77ad1f
2024-10-07 00:36:06 +03:00
Michael Bestas
204cdd4252 overlay: Set default screen brightness
Extracted from stock.

Change-Id: I8a5e2c8717c145e66aaa0e926ceefc7e117b04c2
2024-10-07 00:36:06 +03:00
razorloves
ac00f552ab overlay: Set auto brightness mode on by default
* Stock sets this on by default, mirror that behavior.

Change-Id: I5cb8e3db27849ebd90459a6d70e053158c05bcc9
2024-10-07 00:36:06 +03:00
razorloves
f4ae68dae7 Set OPA property to enable google assistant
Change-Id: I741171219d64a28d56531f063f95f3f6f6cf81e6
2024-10-07 00:36:06 +03:00
razorloves
175b99bb14 overlay: Use CarrierSettings app instead of CarrierConfig
The CarrierSettings app enables/disables carrier apps based on sim
inserted, so use it instead of CarrierConfig.

Change-Id: I163dd615e9d8268c5f94a28ae234a30f74c7e83b
2024-10-07 00:36:06 +03:00
Michael Bestas
6a4af33716 Build Lineage Health HAL
Change-Id: I70cc903a03ac9fa3303bb8fa039c9de4806449bf
2024-10-07 00:36:06 +03:00
Alessandro Astone
8c9342bff9 Build pixel touch HAL
Change-Id: I45cff81e1159613094440dd7b2b73b53519c9de6
2024-10-07 00:36:03 +03:00
LuK1337
65f27efe24 gs201: don't inherit aosp_product.mk
This includes some unnecessary telephony bits and overrides.

Change-Id: Id75d9fd584a9981e756bb65a668ed526b4d1cd05
2024-10-06 22:15:20 +03:00
LuK1337
d001117f2d gs201: add 'tablet' to product characteristics when needed
Change-Id: I20105565a1b313fe6ff8499b49d3691f776f9267
2024-10-06 22:15:20 +03:00
LuK1337
9c99765f12 gs201: don't explicitly build messaging
It's included via aosp_base_telephony.mk.

Change-Id: Ic260cc12fb63cf804fab1f842fad7d68b622785d
2024-10-06 22:15:20 +03:00
Michael Bestas
bf3b0099b1 gs201: exclude telephony components if BOARD_WITHOUT_RADIO
Change-Id: I0298d04c1ca814417aef275d3f6a144101d2f7a6
2024-10-06 22:15:19 +03:00
Michael Bestas
6568956564 Disable modem logging on userdebug builds
Change-Id: Ib8ebf5926ed0bcdcbb06d5b9de3a7e3409b5779c
2024-10-06 22:15:19 +03:00
Michael Bestas
4267cf4543 Add lib_aion_buffer.so to vendor linker config
This lets com.google.pixel.camera.hal.apex access it.

Change-Id: Ic01ce043eeecbc3bcc71c04f49a7c348e2b10886
2024-10-06 22:15:19 +03:00
LuK1337
c0c5e09794 Add liboemcrypto.so to vendor linker config
This lets com.google.android.widevine.apex access it.

Change-Id: I4e9654fe6317b722f5fbf43b92abb367c18640ce
2024-10-06 22:15:19 +03:00
Nolen Johnson
3e1ba7ada5 Set camera extension package to Google package
Change-Id: I519ebf8a1e2a9d06561471206c91c01b352ebd47
2024-10-06 22:15:19 +03:00
LuK1337
1301e1fcd8 overlay: Add reboot to fastbootd
Change-Id: I733b4d29129f85b92222e292af46602310b9f29f
2024-10-06 22:15:18 +03:00
Android Build Coastguard Worker
94ea55535c Snap for 12458821 from 3ab1329966 to 25Q1-release
Change-Id: I5c76fef4df3f1d9dd202c2895513f09114fb525c
2024-10-05 01:03:10 +00:00
Brian Norris
3ab1329966 gs201: Copy insmod configs from kernel to vendor_dlkm
We're going to transition to using the kernel copy, not the HLOS copy.

Bug: 369686096
Test: build, flash, check /vendor_dlkm/etc/ (may or may not exist,
      depending on kernel contents)
Flag: build.RELEASE_KERNEL_CHEETAH_DIR
Flag: build.RELEASE_KERNEL_FELIX_DIR
Flag: build.RELEASE_KERNEL_LYNX_DIR
Flag: build.RELEASE_KERNEL_PANTHER_DIR
Flag: build.RELEASE_KERNEL_TANGORPRO_DIR
Change-Id: I4c4350b8f77017902b75c8c077fcefbff6012d83
2024-10-04 18:37:23 +00:00
samou
315cc63557 sepolicy: allow dumpstate to execute dump_power
10-04 19:36:47.308  7141  7141 I android.hardwar: type=1400 audit(0.0:6974): avc:  denied  { execute_no_trans } for  path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6975): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6976): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6977): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6978): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6979): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6980): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336  7141  7141 I dump_power: type=1400 audit(0.0:6981): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:29): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:30): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:31): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:32): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:33): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc:  denied  { open } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc:  denied  { getattr } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc:  denied  { search } for  name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc:  denied  { read } for  name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc:  denied  { read } for  name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc:  denied  { open } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6191): avc:  denied  { search } for  name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6192): avc:  denied  { read } for  name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6193): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6194): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6195): avc:  denied  { search } for  name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6196): avc:  denied  { read } for  name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6197): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6198): avc:  denied  { read } for  name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:875): avc:  denied  { read } for  name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:876): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:877): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:878): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:879): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:880): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:881): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:882): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:883): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:884): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:885): avc:  denied  { open } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1

Flag: EXEMPT refactor
Bug: 364989823
Change-Id: Ie4637b1295975c716f50333ad6635b9694a624b8
Signed-off-by: samou <samou@google.com>
2024-10-04 16:07:07 +00:00
Ocean Chen
2fef0def24 gs201: Remove unused BFQ I/O scheduler configuration
The I/O scheduler was changed to mq-deadline in ag/29073420,
making the previous BFQ configuration obsolete.

This commit removes the following lines which no longer
have any effect.

Bug: 186902601
Test: forrest build
Change-Id: I5d662e9762809f2d0598a7e980ef0468ac8aff38
2024-10-04 04:18:42 +00:00
Android Build Coastguard Worker
433333df66 Snap for 12445464 from 28382ce693 to 25Q1-release
Change-Id: Iff42b69e0500ea8efe5b933e81354e9b12477bf4
2024-10-02 23:03:27 +00:00
Danny Baumann
81a7408c3b overlay: Enable call recording
Change-Id: I1b4478b330b13cf5d0fe1ed0d40f43e4b3825f33
2024-10-02 09:10:33 +03:00
Michael Bestas
a052325dbf overlay: Remove quick_qs_{offset,total}_height overlays
Commit 49895bb361e74ffe92a3c0b76f988c8e4697b5c1 in device/google/gs101
failed to remove these overlays. Since this tree was created from
device/google/gs101, this results in the following issue on pantah:
* Pull down status bar
* Try to adjust brightness, network settings open instead

This is caused by the 171px offset that causes the status bar
to overlap the brightness slider.

Test: Reliably adjust brightness, confirm with "Show layout bounds"
      from developer settings.
Change-Id: I1b97a28c257cb5b0faba830f29e9058d2dbe50fa
2024-10-02 09:10:29 +03:00
Michael Bestas
c65db776b9 overlay: Set config_nightDisplayColorTemperatureCoefficients
Extracted from stock.

Change-Id: I5d69d01204b0dd86a7205eb3b16e02f97a7f3db2
2024-10-02 09:10:24 +03:00
Danny Lin
cf7c743a58 overlay: Enable USB and skin temperature warnings
Extracted from stock.

Change-Id: I951f60579a4b7fa2dcc270b5acd433ad1ecb083c
2024-10-02 09:10:01 +03:00
Dan Pasanen
17338f0563 overlay: enable config_vibrateOnIconAnimation
* need those sexy vibes

Change-Id: If5671135879f6f4069d0ed881b41b0a243890349
2024-10-02 09:09:53 +03:00
Danny Lin
d89e10a3a0 overlay: Settings: Enable multiple vibration strength levels
All production GS201 devices have CS40L2x haptic driver ICs that support
multiple intensities, so expose the Off/Low/Medium/High vibration
strength options like stock.

Co-authored-by: Michael Bestas <mkbestas@gmail.com>
Change-Id: I72645b5bd5772e182592a630df86f9b6166b4923
2024-10-02 08:58:55 +03:00
Danny Lin
01b55065b6 overlay: Don't pin camera app in memory
The default camera app can be *huge* in some cases, e.g. when the app in
question is Google Camera. The system will only pin up to the first 80
MiB of the APK file, as well as the first 80 MiB of its odex. There are
several problems with this:

  - We could easily end up with 160 MiB of camera app files pinned,
    which is a tall order with the 6 GiB of usable RAM that we have
  - The data that gets pinned may not even be the most critical data for
    launching the camera

Let's disable pinning of the camera app to save RAM.

Change-Id: I745e39b6ff212dfaf9213517d2a2be8ff7384e24
2024-10-02 08:58:36 +03:00
Bruno Martins
85c5ab61c4 overlay: Pin standard SystemUI instead of Google's
Change-Id: If96bb13d6cc2c2156d8df111a1037247c96c6e0f
2024-10-02 08:58:25 +03:00
Chirayu Desai
e4a5949626 Add device manifest for radio & keymint
Change-Id: Ib6c4b28d33fb64cb05c715d86a96a829a498beac
2024-10-02 08:57:19 +03:00
Chirayu Desai
6ecd83c43d Build vbmeta_vendor
Change-Id: I74c028a2e5ade8830526e95f8ec90b1a1da35afb
2024-10-02 08:57:12 +03:00
Chirayu Desai
d359aa0aee Build vendor
Change-Id: I08dff42223ae54386a5ed050b51aa4a39e08bdb6
2024-10-02 08:57:03 +03:00
Chirayu Desai
538b6bb734 Build vendor_dlkm
Change-Id: Ic2a0e4cdfdcc448a73bef41e0d2140e9d0aefcf0
2024-10-02 08:56:57 +03:00
mydongistiny
f09cb17b35 gs201: Use Google's wifi_ext service
* Use vendor.google.wifi_ext@1.0-service
  that is in the vendor partition instead
  of the AOSP WiFi service.

Change-Id: Ia0fff6ffc532cc6b5e41f8ac242d00e64627cee8
2024-10-02 08:56:44 +03:00
Chirayu Desai
986d113d5b gs201: Add initial Lineage common makefiles
Change-Id: I8136e9f0df40ca3bf96dbfd2453275481178cdaa
2024-10-02 08:56:07 +03:00
Jimmy Shiu
28382ce693 [task_profiles]Add MaxPerformance and PreferIdle to InputPolicy profile.
Flag: com.android.input.flags.enable_input_policy_profile
Bug: 369574417
Change-Id: Ia79a88addeddbada1d92d7623a7f9b3e7764c016
2024-10-02 03:13:49 +00:00
Michael Bestas
e11647575d gs201: Update sepolicy path
Change-Id: I428e79c2c49f27a1245f21876b916aee513db06b
2024-10-01 20:26:30 +03:00
Michael Bestas
e910fc4eb6 Add .gitupstream
Change-Id: I79747ef989659c069386a6ed34a59bba2e8ea860
2024-10-01 20:24:29 +03:00
Michael Bestas
fd31c0c64a Add 'sepolicy/' from tag 'android-15.0.0_r1'
git-subtree-dir: sepolicy
git-subtree-mainline: 5cd89d8075
git-subtree-split: 4a08341dea
Change-Id: I48384ddf513f6de75e77a5c55ff848498a5e88b6
2024-10-01 20:19:02 +03:00
Android Build Coastguard Worker
c0439ad1fa Snap for 12433810 from 169b08ddfc to 25Q1-release
Change-Id: I10a6ccf2922aba5258066e7579e8798fb1af59db
2024-09-30 23:03:17 +00:00
Nishant Panwar
169b08ddfc Set dexpreopt and dexopt filter for SystemUI
Bug: 271887637
Test: Built and flashed on local device
Flag: build.RELEASE_SYSTEMUI_USE_SPEED_PROFILE
Change-Id: I49900d45a60f9f4b3bc15a4027751be30f63e272
2024-09-30 04:40:41 +00:00
Android Build Coastguard Worker
c1be6f3704 Snap for 12426030 from 991aeb89c6 to 25Q1-release
Change-Id: Ia732710085def40ba6e2c8b603bd48b4ab70c642
2024-09-28 01:03:09 +00:00
Android Build Coastguard Worker
6fbf2010f6 Snap for 12420652 from 14885d60f7 to 25Q1-release
Change-Id: I999cb12f112090c3f7460256e09be1883e7d7ff7
2024-09-26 23:02:25 +00:00
Zhengyuan Cui
991aeb89c6 Change any use case of folder name apis to tachyon_apis to avoid api review
Bug: 364390678

Change-Id: I1e8b92c694a0f5991c51a7ade623d5066a29eccf
Flag: EXEMPT refactor
2024-09-26 21:00:49 +00:00
Android Build Coastguard Worker
614874e791 Snap for 12415101 from eb84e9c0a4 to 25Q1-release
Change-Id: I238d37ceedd2add90f1fb360a14e8897fd31c8be
2024-09-25 23:02:59 +00:00
Android Build Coastguard Worker
7a7bdbdf0a Snap for 12415101 from 44855fc359 to 25Q1-release
Change-Id: Ic50c3c0b1e0be408fc4e464b3ac105f5912131ea
2024-09-25 23:02:58 +00:00
Les Lee
14885d60f7 wifi: Upgrade vendor hal version
Bug: 362355566
Flag: EXEMPT HAL interface change
Test: Build
Change-Id: Ifd0045beb52d2e88bb3b5526472f2864de91ded8
2024-09-25 21:36:03 +00:00
Wilson Sung
eb84e9c0a4 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 369540701
Flag: EXEMPT NDK
Change-Id: Ib5edeaac550562b6bbb5ec35bfce1d6838245c6b
2024-09-25 12:46:16 +00:00
Nina Chen
3aeae9b99f Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 369475655
Flag: EXEMPT NDK
Change-Id: Ic8d895b33d24e998faa00b128cad4bc4fd1e14bf
2024-09-25 06:30:59 +00:00
Kyle Tso
44855fc359 dumpstate: Modify dumpTcpc path and content
Ported from I248fb250b94cbd4078e7f3c44da83f62002b53fb with some
modifications.

Bug: 369474465
Test: checked the content in dumpstate
Flag: EXEMPT bugfix
Change-Id: I405c15db38f084017599c465e8c3d49e0e1b2f3e
Signed-off-by: Kyle Tso <kyletso@google.com>
2024-09-25 11:51:07 +08:00
Android Build Coastguard Worker
7c38ed12d4 Snap for 12410317 from 077e59c64f to 25Q1-release
Change-Id: I0346658cb91717317d12fd633188b602135aeb2b
2024-09-24 23:02:39 +00:00
Kyle Tso
24d312d190 dumpstate: Dump logbuffer_pogo_transport
Bug: 336665682
Test: check dumpstate in bugreport
Flag: EXEMPT bugfix
Change-Id: I2be3638efad870e83c3f36bb759d3b3be50c0f45
Signed-off-by: Kyle Tso <kyletso@google.com>
2024-09-24 09:11:33 +00:00
Android Build Coastguard Worker
db20648f4a Snap for 12404440 from 077e59c64f to 24Q4-release
Change-Id: Ic2ca6c000614a4473851aa6fec5ac0e29a84fc61
2024-09-23 23:02:29 +00:00
Android Build Coastguard Worker
d3f5c2e649 Snap for 12399304 from 0caaaaedd7 to 25Q1-release
Change-Id: I5ef3ee8d04759b091fee73ce56123554605d2856
2024-09-21 23:01:21 +00:00
Android Build Coastguard Worker
447cc19829 Snap for 12399304 from a5eb284c4a to 25Q1-release
Change-Id: Ic518fbe3cd47a05f3fc97f2f8a315e619e550bc7
2024-09-21 23:01:21 +00:00
Tej Singh
077e59c64f Make android.framework.stats-v2-ndk app reachable
For libedgetpu

Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: If78bc951a9a4cfc223d01970ca6819fe2b5c6335
2024-09-20 21:34:56 -07:00
Android Build Coastguard Worker
9003dabf97 Snap for 12397640 from 0caaaaedd7 to 24Q4-release
Change-Id: Icef8b321aabf57f8f2aa46cb9547bad1e1c97306
2024-09-21 01:01:57 +00:00
Krzysztof Kosiński
0caaaaedd7 Delete TARGET_CPU_VARIANT_RUNTIME. am: b22dab1117 am: e5d3affa5b
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3272802

Change-Id: I7907de98ca4a7b865cec807dfb33d50a9b3898af
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-20 21:26:13 +00:00
Krzysztof Kosiński
e5d3affa5b Delete TARGET_CPU_VARIANT_RUNTIME. am: b22dab1117
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3272802

Change-Id: I258a124649dd33a8828438e46308bdcbd50036fb
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-20 20:43:52 +00:00
Krzysztof Kosiński
b22dab1117 Delete TARGET_CPU_VARIANT_RUNTIME.
This variable only does something when it differs from
TARGET_CPU_VARIANT. Setting it to the same values doesn't do
anything.

Bug: 368635026
Test: presubmit
Change-Id: I15a3b367df0a5be2de23f535f9f9df0866dd306a
2024-09-20 19:19:24 +00:00
Android Build Coastguard Worker
62ebb653f9 Snap for 12391343 from f0733782af to 24Q4-release
Change-Id: Ie7d3782d2b61487def1b5c51774d1fc3a1c404c8
2024-09-19 23:01:50 +00:00
Android Build Coastguard Worker
281f31591f Snap for 12385180 from a5eb284c4a to 24Q4-release
Change-Id: I39e01825d37f92b2c14e01a6c108e263b5d1847b
2024-09-18 23:02:01 +00:00
Jerry Chang
f0733782af Add input event profile to mitigate input latency of input threads
Bug: 347122505
Test: check the priority and latency of input thread in Perffeto
Flag: NONE early device setting updates
Change-Id: Ia05fc4592ebe3946a52e10e435bc8f8cef7becc9
2024-09-18 12:09:37 +00:00
Android Build Coastguard Worker
51b05d8974 Snap for 12373988 from 6328876ea2 to 24Q4-release
Change-Id: I1f9603316412ef6c1ce6b957cc4b41b14589c254
2024-09-16 23:01:44 +00:00
Ryan Prichard
6328876ea2 gs201: avoid vector<const T> am: c92b81622d am: d1604426b8
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3265798

Change-Id: I58e87d471346b565d1e5b1bcfc77dcb7673c0c22
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-16 20:13:39 +00:00
Ryan Prichard
d1604426b8 gs201: avoid vector<const T> am: c92b81622d
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3265798

Change-Id: I0a4ac942083232e6065ce746a1d26b5f0c5dee01
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-16 19:53:10 +00:00
Prochin Wang
a5eb284c4a Change vendor_fingerprint_prop to vendor_restricted_prop
This is to allow the fingerprint HAL to access the property.

Bug: 366105474
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Test: mm
Change-Id: I5b07acfd7599b099997d46b297e1f7400a9fe478
2024-09-16 01:45:44 +00:00
Android Build Coastguard Worker
00e25eb130 Snap for 12370120 from c841b33df0 to 25Q1-release
Change-Id: I410635f2fb27329db36467a0bac3a2918a0fe237
2024-09-14 23:01:23 +00:00
Android Build Coastguard Worker
c314ec14e4 Snap for 12370120 from 7cb22ac5f6 to 25Q1-release
Change-Id: I6890038f9655e469029283a9083158714b61ccf5
2024-09-14 23:01:22 +00:00
Android Build Coastguard Worker
6d21a59566 Snap for 12368321 from c841b33df0 to 24Q4-release
Change-Id: Ifef90fce78a191b98ec3eca277fc985df5544448
2024-09-14 01:01:59 +00:00
Nina Chen
c841b33df0 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Flag: EXEMPT NDK
Bug: 366116786
Change-Id: I6d17ac72f8bdcc3fc54d08b7c23a0f5e0fd83d23
2024-09-13 06:44:56 +00:00
Ryan Prichard
c92b81622d gs201: avoid vector<const T>
std::vector<const T> uses std::allocator<const T>, which is an
undocumented libc++ extension to the C++ standard library. The extension
was removed in llvm.org/PR96319. Use an ordinary non-const T instead.

Bug: http://b/349681543
Test: m android.hardware.power.stats-impl.gs201
Flag: EXEMPT, refactor to fix build failure
Change-Id: Ic355f68c4ebb09e204ea3fb4822940aad07ccd7b
2024-09-12 13:18:03 -07:00
Android Build Coastguard Worker
67dfc514bb Snap for 12342105 from bd7fbe9a02 to 24Q4-release
Change-Id: I3ba91c871900f02054e824c943fb560e478e7226
2024-09-09 23:02:01 +00:00
Android Build Coastguard Worker
152d0c385c Snap for 12342105 from 7cb22ac5f6 to 24Q4-release
Change-Id: I1a6b9faa9475a334eb26ccdb157e398f8b8f7a12
2024-09-09 23:01:59 +00:00
Vic Huang
bd7fbe9a02 [BT] Define vendor_bluetooth_prop
avc:  denied  { set } for property=persist.vendor.service.bdroid.bdaddr pid=860 uid=1002 gid=1002 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0

Bug: 359428216
Test: Forest build
Flag: EXEMPT N/A
Change-Id: I1aeb04e32620b2815db02f34ee40eae94deeed3c
2024-09-09 05:47:01 +00:00
Treehugger Robot
7cb22ac5f6 Merge "Delete PRODUCT_FULL_TREBLE_OVERRIDE." into main am: 5d21fda779 am: 933ef530c9
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3258674

Change-Id: I78b26aa9cd31ef542ad14526f678a7653cdb3ff7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-09 03:01:06 +00:00
Treehugger Robot
933ef530c9 Merge "Delete PRODUCT_FULL_TREBLE_OVERRIDE." into main am: 5d21fda779
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3258674

Change-Id: Ib802235d264813831cac53cc25cd02841c811ca1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-09 02:51:06 +00:00
Treehugger Robot
5d21fda779 Merge "Delete PRODUCT_FULL_TREBLE_OVERRIDE." into main 2024-09-09 02:46:24 +00:00
Android Build Coastguard Worker
1d92a4c086 Snap for 12337407 from 5df951e8fd to 25Q1-release
Change-Id: I6f75d2a96e7537366fcce7ea07032850dec9c2c7
2024-09-07 23:01:34 +00:00
Android Build Coastguard Worker
84f779929e Snap for 12337407 from 03644ec631 to 25Q1-release
Change-Id: I90ef92e266d2b0e487ddeba938ad83f80338b9fd
2024-09-07 23:01:31 +00:00
Android Build Coastguard Worker
bf97c8adf1 Snap for 12337246 from 5df951e8fd to 24Q4-release
Change-Id: I71172906db30760ec11073d3cdb98054fdeb7155
2024-09-07 21:01:42 +00:00
Android Build Coastguard Worker
edc4fa94ae Snap for 12337246 from 03644ec631 to 24Q4-release
Change-Id: I19bdaa387cfb1b881b0077162d017bfd8850c881
2024-09-07 21:01:41 +00:00
Xin Li
03644ec631 [automerger skipped] Merge 24Q3 to AOSP main am: 1096924af1 -s ours am: 58665d84e8 -s ours
am skip reason: Merged-In Ib3cc0c6ad576e7cda26b7f50cdc61d52e6349c78 with SHA-1 cb51a640f4 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3258434

Change-Id: Iace0355cab3fa84d65aa835aecb5cc2c7b528d50
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 03:40:51 +00:00
Xin Li
58665d84e8 [automerger skipped] Merge 24Q3 to AOSP main am: 1096924af1 -s ours
am skip reason: Merged-In Ib3cc0c6ad576e7cda26b7f50cdc61d52e6349c78 with SHA-1 cb51a640f4 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3258434

Change-Id: Ifaed61f09391c67f23f8bf0d4a15bdf2e9177644
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 03:14:09 +00:00
Xin Li
5df951e8fd [automerger skipped] Merge 24Q3 to AOSP main am: 06ca871143 -s ours am: 63111cc957 -s ours
am skip reason: Merged-In I65790202886298f9862d68d65cf794e67db5a878 with SHA-1 9d3f39622c is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3257934

Change-Id: I0cc5ce5d8db326cabb0c0a7944eea178541df2af
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 02:37:35 +00:00
Xin Li
63111cc957 [automerger skipped] Merge 24Q3 to AOSP main am: 06ca871143 -s ours
am skip reason: Merged-In I65790202886298f9862d68d65cf794e67db5a878 with SHA-1 9d3f39622c is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3257934

Change-Id: Ib784443204b69a0e9275081636e2ce72f046d531
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 02:11:42 +00:00
Krzysztof Kosiński
2a814d7aab Delete PRODUCT_FULL_TREBLE_OVERRIDE.
This variable doesn't do anything for devices launching with
API level 26 or later, and the initial gs201 devices (Pixel 7)
launched with API level 33.

Bug: 307369186
Test: presubmit
Flag: EXEMPT trivial build cleanup
Change-Id: I35bdec5d9e21abb25f12c0ad9681d3dee01aee67
2024-09-06 22:27:24 +00:00
Xin Li
06ca871143 Merge 24Q3 to AOSP main
Bug: 357762254
Merged-In: I65790202886298f9862d68d65cf794e67db5a878
Change-Id: I733204cdf91a8f8355c79450373501fb34c47b54
2024-09-05 17:02:37 -07:00
Xin Li
1096924af1 Merge 24Q3 to AOSP main
Bug: 357762254
Merged-In: Ib3cc0c6ad576e7cda26b7f50cdc61d52e6349c78
Change-Id: Icc7a517d0cb2b6688ecc25d5af3a3c11e16e7c09
2024-09-05 17:02:37 -07:00
Android Build Coastguard Worker
71bb36c14a Snap for 12327203 from 8d194cb38c to 24Q4-release
Change-Id: I4e81e69ee1c37701d346325cde55a27aafa1e947
2024-09-05 23:01:46 +00:00
samou
8d194cb38c bcl: remove charging debugfs data logging
Flag: EXEMPT refactor
Bug: 362322242
Change-Id: Ibdd3df9c7a2dfeab36a43d32dc092fefdec9d77d
Signed-off-by: samou <samou@google.com>
2024-09-05 10:02:21 +00:00
Ocean Chen
a664dadaa8 Switch from the BFQ to the mq-deadline I/O scheduler
The mq-deadline I/O scheduler is more stable than BFQ. Additionally, the
boot time is shorter with the mq-deadline I/O scheduler. It only changes the scheduler on new kernel.

Bug: 186902601
Test: forrest build

Change-Id: I5d336b3f146ca673c83c03304773d0ccf4c01e77
Signed-off-by: Ocean Chen <oceanchen@google.com>
2024-09-05 06:37:21 +00:00
carmenyip
541efd2ce2 extended_log: update directory permissions for gs201
Bug: 336638376

Test: $ cd data/vendor/radio
$ ls -la
Flag: NONE changing directory permissions only

Change-Id: I972634ab85eb8416b43183712394c27d4d0340ee
2024-09-05 04:02:07 +00:00
Android Build Coastguard Worker
6860313588 Snap for 12319997 from b67284dc2f to 24Q4-release
Change-Id: I2ec5773a1bb025950b19477e5111d57795bf645e
2024-09-04 23:02:18 +00:00
Android Build Coastguard Worker
c4b7b8d260 Snap for 12319997 from fcc8f3875f to 24Q4-release
Change-Id: I7a19ebcf093499b38301e88d131bcbf1195f2fd0
2024-09-04 23:02:17 +00:00
Charlie Yang
fcc8f3875f Revert "Add soong config use_google_qns in device/google/gs201/d..."
Revert submission 28947244-grilservice

Reason for revert: b/363911795

Reverted changes: /q/submissionid:28947244-grilservice

Change-Id: I81e58d0f1190a592f388ab1031275e6f2656217b
2024-09-04 11:03:21 +00:00
Randall Huang
b67284dc2f storage: move storage related device type to common folder
Bug: 364225000
Test: forrest build
Change-Id: Iaed5b07a1d9823ebf3c7210921784d81bf6207a5
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:13 +08:00
Android Build Coastguard Worker
31e0aae94a Snap for 12313714 from 5e8b0722d0 to 24Q4-release
Change-Id: Ic37dd4cee8a7998ee74625ee1fac0cf1cdb6a06c
2024-09-03 23:01:53 +00:00
Android Build Coastguard Worker
cbbda2ee92 Snap for 12309590 from 150634f087 to 24Q4-release
Change-Id: I6c19c573381bcc0a7cb3f94955fba46a9e073b60
2024-09-02 23:01:47 +00:00
Randall Huang
5e8b0722d0 Storage: label ufs firmware upgrade script
Bug: 361093041
Test: local build
Change-Id: I312d071ecaaedb09b54976e6b3bfe05e7bc6cdea
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-02 22:22:44 +00:00
attis
150634f087 Label sysfs node power_mode as sysfs_display.
Label power_mode to sysfs_panel to let it be allowed in dumpstate.

avc log:
08-26 13:07:49.660 12467 12467 W dump_display: type=1400 audit(0.0:19): avc:  denied  { read } for  name="power_mode" dev="sysfs" ino=89753 scontext=u:r:dump_display:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 bug=b/350831939

Test: ls -Z, adb bugreport.
Flag: EXEMPT bugfix
Bug: 358505990
Change-Id: I9feeb2a8270f89d214f7d765893364d0e73f7d39
Signed-off-by: attis <attis@google.com>
2024-09-02 04:54:13 +00:00
Android Build Coastguard Worker
d006df8b11 Snap for 12304452 from 646cc8fdcf to 24Q4-release
Change-Id: Ia99c2b71ff5eda510a3db79d34bdd6ffa8a62f5c
2024-08-31 01:01:57 +00:00
kellyhung
646cc8fdcf Add soong config use_google_qns in device/google/gs201/device.mk
Bug: 360757079
Test: lunch r11-trunk_staging-userdebug; m grilservice
Flag: EXEMPT bugfix

Change-Id: Ia10d6d73f7349b6a5de5046236c8498f54962036
2024-08-30 07:22:52 +00:00
Ankit Goyal
fe86e10394 Delete mapper4 manifest
Bug: 362183626
Flag: EXEMPT manifest update
Test: Boot to home on shiba
Change-Id: I828ee34e1de2fb0ac228688517d4be89e43247d1
2024-08-28 22:54:00 -07:00
Android Build Coastguard Worker
2e3d883d5d Snap for 12289667 from f13115f44c to 24Q4-release
Change-Id: I074708139487881f6a31be8e8a734e741fe39bfc
2024-08-28 23:02:13 +00:00
Roy Luo
f13115f44c usb: correct sys.usb.controller sysprop
system/core/init/init.cpp SetUsbController picks the first udc device if
there're multiple udc devices present on the system to populate
sys.usb.controller system property.
CONFIG_USB_DUMMY_HCD enabled in kernel-5.10 GKI would introduce a
dummy udc device named "dummy_udc.0". Depends on timing, the dummy
device might be picked up by the init process and incorrectly populate
sys.usb.controller.
This issue only applies to devices on kernel-5.10 GKI, the WAR is to
overwrite the sysprop if it's incorrectly populated by the dummy udc.

Bug: 333778731
Test: tested on Cheetah
Flag: EXEMPT bugfix
Change-Id: I7555dda7f0bb436200ef7cd8a46b785232187cfd
2024-08-27 23:39:24 +00:00
Android Build Coastguard Worker
54ecda6fdf Snap for 12283639 from 6afa4bc6d1 to 24Q4-release
Change-Id: Icc6b0d1bcfb0926b779a4119d99b801d304429e6
2024-08-27 23:02:09 +00:00
Elliott Hughes
6afa4bc6d1 The "messaging" package is being removed. am: 69bd3c07ab am: 053f552fae
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3241482

Change-Id: I4ef97d4b9a979aa5e242f34d7bf4b459c0b730b0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-27 16:15:47 +00:00
Elliott Hughes
053f552fae The "messaging" package is being removed. am: 69bd3c07ab
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3241482

Change-Id: Iab4c5f6f9b720ae5147025644b22766e2291fe7b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-27 15:39:41 +00:00
Elliott Hughes
69bd3c07ab The "messaging" package is being removed.
Change-Id: Ibbd134ec0f695ac9fbdb2831e81a6502729c96db
2024-08-26 16:03:18 +00:00
Android Build Coastguard Worker
dd5bbaf3ef Snap for 12272146 from a8d35041b3 to 24Q4-release
Change-Id: I4913d23ea28f8c11b53b1ca88d0ae6372b69bb72
2024-08-24 01:01:47 +00:00
Android Build Coastguard Worker
c3a37f41b3 Snap for 12272146 from 11938381ec to 24Q4-release
Change-Id: Ibae62fc08768390f2d7f17e7db2814a09a9f34a5
2024-08-24 01:01:46 +00:00
samou
a8d35041b3 sepolicy: gs201: fix bm selinux
- add odpm scale value path
- add gpu cur_freq

Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ie053ead11eae4abdd0a30f74117d9c3e00eedf53
Signed-off-by: samou <samou@google.com>
2024-08-23 10:58:20 +00:00
samou
11938381ec Migrate dump_power_gs201.sh contents into cpp for improved speed
Flag: EXEMPT refactor
Bug: 349935208
Test: ./dump_power
Change-Id: I7799487b0f88cf59cb46f050d87528d535f7e788
Signed-off-by: samou <samou@google.com>
2024-08-23 10:58:20 +00:00
samou
5e0dca971a sepolicy: remove dump_power_gs201.sh
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: I3c0f48d00d312ef19677fe5ef9f080f063408667
Signed-off-by: samou <samou@google.com>
2024-08-23 10:58:20 +00:00
Wilson Sung
7fd99e1b1b Update SELinux error
Test: scanBugreport
Bug: 359428317
Bug: 361726277
Test: scanAvcDeniedLogRightAfterReboot
Bug: 359428317
Flag: EXEMPT bugFix
Change-Id: I2ce66f1431a2644076ff29b2337a97b366851d17
2024-08-23 09:48:21 +00:00
Android Build Coastguard Worker
833150b694 Snap for 12241618 from e8d359e8d4 to 24Q4-release
Change-Id: I20e1c8f427d99f45a877a18ef690de95887affb6
2024-08-17 01:01:57 +00:00
Android Build Coastguard Worker
cade9a597f Snap for 12235414 from 4f8e79e4e5 to 24Q4-release
Change-Id: I74e181958d4fbeb58568a5543a8713b8601e96a0
2024-08-15 23:02:01 +00:00
Xiaofan Jiang
e8d359e8d4 Revert "Revert "gs201: update shared_modem_platform sepolicy for..."
Revert submission 28822848-revert-28762313-SAYUORWKVG

Reason for revert: issue identify and fix is ready

Reverted changes: /q/submissionid:28822848-revert-28762313-SAYUORWKVG

Change-Id: Iae3ca282426fca573b4c42355e1b46eaa74d3c58
2024-08-15 19:25:28 +00:00
Priyanka Advani (xWF)
e1a2549168 Revert "gs201: update shared_modem_platform sepolicy for UMI"
Revert submission 28762313

Reason for revert: Droidmonitor created revert due to b/360059249.

Reverted changes: /q/submissionid:28762313

Change-Id: I0fc3d7d99b999eedf7e3948afb58fd962045f1e1
2024-08-15 18:30:25 +00:00
Wilson Sung
4f8e79e4e5 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 360057889
Test: scanBugreport
Bug: 359428317
Test: scanAvcDeniedLogRightAfterReboot
Bug: 359428317
Flag: EXEMPT bugFix
Change-Id: I3d4a7bfbaab36136fbde6bbd56239e43cc9b012d
2024-08-15 10:45:51 +00:00
Wilson Sung
0eae05186f Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 360057889
Test: scanBugreport
Bug: 359428317
Test: scanAvcDeniedLogRightAfterReboot
Bug: 359428317
Flag: EXEMPT bugFix
Change-Id: Iaec87b719446dbef5dc3d8d8d563cf3f47a2a584
2024-08-15 10:28:57 +00:00
Wilson Sung
84725d0c7a Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 360057889
Test: scanBugreport
Bug: 359428317
Test: scanAvcDeniedLogRightAfterReboot
Bug: 359428317
Flag: EXEMPT bugFix
Change-Id: I9d573610f24054bd6ea8bb3307d0102da077dc55
2024-08-15 09:25:42 +00:00
Xiaofan Jiang
b958dd13ad gs201: update shared_modem_platform sepolicy for UMI
Bug: 357139752

Flag: EXEMPT sepolicy

[   68.189198] type=1400 audit(1722986580.568:59): avc:  denied  { unlink } for  comm="binder:892_2" name="modem_svc_socket" dev="dm-52" ino=20239 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
[   68.189448] type=1400 audit(1722986580.568:60): avc:  denied  { create } for  comm="binder:892_2" name="modem_svc_socket" scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1

Change-Id: I0bbef83a3915e4c0e284296bc5b59e0ce6cf6f15
2024-08-15 04:01:03 +00:00
Android Build Coastguard Worker
61ddb2155e Snap for 12224018 from 2b177e8120 to 24Q4-release
Change-Id: I4f67897a68e25f6006fcd7e34cdcbc24152ea5c9
2024-08-13 23:02:24 +00:00
Wilson Sung
2b177e8120 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 359428005
Test: scanBugreport
Bug: 359427666
Test: scanAvcDeniedLogRightAfterReboot
Bug: 359428317
Flag: EXEMPT bugFix
Change-Id: Ib4a909b4f6e2bbad977ae66b722ad0de055ef5b5
2024-08-13 08:50:52 +00:00
Android Build Coastguard Worker
7358d8186e Snap for 12217053 from c62a6b812d to 24Q4-release
Change-Id: I3fc6617e8699fc3884a40fd9fab8368974f869cd
2024-08-12 23:06:41 +00:00
samou
c62a6b812d Remove BCL from thermal
Flag: EXEMPT tuning changes
Bug: 349935208
Change-Id: I43b37dc596c799927868c0c546d30ed8e51c17c5
Signed-off-by: samou <samou@google.com>
2024-08-12 12:32:21 +00:00
Android Build Coastguard Worker
cdf86dded9 Snap for 12210778 from 3c082cdefd to 24Q4-release
Change-Id: Ic70fcf0b468841d2d1f886832ef391cbf39c24c5
2024-08-10 01:06:42 +00:00
Android Build Coastguard Worker
dd19313160 Snap for 12210778 from 44ae6ffad2 to 24Q4-release
Change-Id: Ie841f23129397143427de244552b5c6ea5e08009
2024-08-10 01:06:41 +00:00
Kevin Ying
3c082cdefd Allow camera HAL to access power_state sysfs
08-03 01:41:34.444   791   791 W TaskPool: type=1400 audit(0.0:178): avc:  denied  { read } for  name="power_state" dev="sysfs" ino=86770 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 339690296
Test: Open camera under SELinux enforcing mode, no display avc error
Flag: EXEMPT resource update only
Change-Id: Ic0f2d149cbcd8a3da5035f6d2788b4548523bbd6
Signed-off-by: Kevin Ying <kevinying@google.com>
2024-08-09 17:40:00 +00:00
Cyan_Hsieh
44ae6ffad2 Add FSTAB_OWNERS and update OWNERS to include Android.bp am: 8c9f1f1663 am: 874a2b07cb
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3214297

Change-Id: Ie37ab68bca27259034f34d009463111caaeb2f36
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-09 11:07:34 +00:00
Cyan_Hsieh
874a2b07cb Add FSTAB_OWNERS and update OWNERS to include Android.bp am: 8c9f1f1663
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3214297

Change-Id: Ie0461f7ba8bbaf4f747fa9b82ec4bc567af38d9b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-09 10:49:03 +00:00
Cyan_Hsieh
8c9f1f1663 Add FSTAB_OWNERS and update OWNERS to include Android.bp
Flag: EXEMPT only changing OWNERS
Bug: 357036384
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b3b56408e146d323e55767be770a5b37cb1c298f)
Merged-In: I2a5813f8436dd2d36b35b790aaebc00df13c5196
Change-Id: I2a5813f8436dd2d36b35b790aaebc00df13c5196
2024-08-09 08:33:39 +00:00
Android Build Coastguard Worker
2dc1bff8c2 Snap for 12199973 from 0c1f69415f to 24Q4-release
Change-Id: I30a6abcb4d0e4a1886ed3247ffdee6930db79e5e
2024-08-08 01:01:58 +00:00
Kuen-Han Tsai
0c1f69415f Limit hub tuning when enable_hub is enabled
Some external hubs have the same VID and PID as the internal hub,
causing unintended hub tuning and compatibility issues.

This patch restricts hub tuning to only the internal hub located on
bus 1, port 1 when enable_hub is set to 1.

Bug: 353650207
Test: Verified an external GL852G speakerphone dock works when docked.
Test: adb shell cmd android.hardware.usb.IUsb/default hub-vendor-cmd
<hex wValue> <hex wIndex>
Flag: EXEMPT bugfix
Change-Id: If2cfe6684e4f5fafaab34bf7a4e4b4cd464d6575
Signed-off-by: Kuen-Han Tsai <khtsai@google.com>
2024-08-07 12:27:59 +08:00
Android Build Coastguard Worker
d2ef9a56c1 Snap for 12185670 from fa514f6781 to 24Q4-release
Change-Id: Iff5c28662f736a5802644c223dbada5be66e3139
2024-08-05 23:01:55 +00:00
George Lee
fa514f6781 init: gs201: Mask VDROOP1 for GPU CLK Divider
Bug: 337613046
Test: Confirm divider is configured
Flag: EXEMPT bugfix
Change-Id: Id143431a6d63c4915ab0c0e97207eca1be4ea171
Signed-off-by: George Lee <geolee@google.com>
2024-08-05 15:06:01 +00:00
Android Build Coastguard Worker
6fc2c1bc8d Snap for 12177962 from 3e1197bafb to 24Q4-release
Change-Id: I804f0bebcf7adf4021383b6a6e1eb5a0f3e3e66b
2024-08-03 03:01:47 +00:00
Android Build Coastguard Worker
586b564049 Snap for 12177962 from 0386e9b22f to 24Q4-release
Change-Id: I457dc3cb7c09c84a8892d0feffa0bbf7ecc07934
2024-08-03 03:01:46 +00:00
Wilson Sung
3e1197bafb Add kernel vendor_fw_file dir read permission
07-31 05:35:39.208 885 885 W binder:885_5: type=1400 audit(0.0:125): avc: denied { read } for name="firmware" dev="dm-7" ino=48 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_fw_file:s0 tclass=dir

Fix: 356530883
Flag: EXEMPT bugfix
Change-Id: I1bb8fcfc952c69c991fd978a617eb92558817267
2024-08-02 09:18:50 +00:00
Chris Lu
0386e9b22f Upgrade IDisplay to V13
Bug: 315496839
Test: build pass
Change-Id: I9bf92af08fd21d834ca538d79bd906ca9e4fab2a
2024-08-02 08:08:26 +00:00
Android Build Coastguard Worker
294b897e70 Snap for 12158986 from 6566e47574 to 24Q4-release
Change-Id: Icdb43a6213db700ad72342c03cc5bf8c44a0327a
2024-07-30 23:02:27 +00:00
Qais Yousef
6566e47574 BoardConfig-common.mk: Enable Lazy RCU
Bug: 340860065
Flag: EXEMPT this is a boot time parameter
Signed-off-by: Qais Yousef <qyousef@google.com>
Change-Id: Id8ce33fac746f3a873c69461f7f9054b274603d9
2024-07-30 18:04:04 +00:00
Android Build Coastguard Worker
a920b63226 Snap for 12147630 from 01383d9603 to 24Q4-release
Change-Id: If8eeddd3ee371fc552da8994d86b71cc629015da
2024-07-27 01:02:00 +00:00
Herbert Xue
01383d9603 Add soong config variable for PowerAnomalySitril
Set the variable is true when USE_LASSEN_OEMHOOK is true and
BOARD_WITHOUT_RADIO is not true.

Flag: EXEMPT bugfix
Bug: 325857852
Test: m ConnectivityMonitor
Change-Id: I10d1b9b198db960d1d6af0a69044907c8043c4e6
2024-07-26 02:57:15 +00:00
Android Build Coastguard Worker
cd43308716 Snap for 12140224 from e825da7d84 to 24Q4-release
Change-Id: I5e5bcedb7de396747e611623bbfb9ccd22baa58e
2024-07-25 23:02:01 +00:00
Android Build Coastguard Worker
549c76f8e2 Merge cherrypicks of ['googleplex-android-review.googlesource.com/28469514'] into 24Q4-release.
Change-Id: I189d11f525050e2f56d171e5d47a9a5026bdfab4
2024-07-25 00:33:40 +00:00
Daniel Chapin
9b5919e9e7 Revert "trusty: storageproxy: add fs_ready_rw property context"
Revert submission 28318041-rw_storage

Reason for revert: Droidfood blocking bug b/355163562

Reverted changes: /q/submissionid:28318041-rw_storage
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e825da7d84d42cea498dae3f031825739212bd26)
Merged-In: Ifa22c1551e75dd5161a19c5fb5cb372fe669921c
Change-Id: Ifa22c1551e75dd5161a19c5fb5cb372fe669921c
2024-07-25 00:32:20 +00:00
Android Build Coastguard Worker
b69b9c0d44 Snap for 12135134 from 27df5480c4 to 24Q4-release
Change-Id: I6c1a0859c1e869854df81b9425b7030795c9592a
2024-07-24 23:02:07 +00:00
Android Build Coastguard Worker
f45e467184 Merge cherrypicks of ['googleplex-android-review.googlesource.com/28469514'] into 24Q4-release.
Change-Id: I9d1e713ca466a3ab3189a480425dc46049616c10
2024-07-24 21:02:20 +00:00
Daniel Chapin
4a8ab113b8 Revert "trusty: storageproxy: add fs_ready_rw property context"
Revert submission 28318041-rw_storage

Reason for revert: Droidfood blocking bug b/355163562

Reverted changes: /q/submissionid:28318041-rw_storage
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e825da7d84d42cea498dae3f031825739212bd26)
Merged-In: Ifa22c1551e75dd5161a19c5fb5cb372fe669921c
Change-Id: Ifa22c1551e75dd5161a19c5fb5cb372fe669921c
2024-07-24 21:01:14 +00:00
Daniel Chapin
e825da7d84 Revert "trusty: storageproxy: add fs_ready_rw property context"
Revert submission 28318041-rw_storage

Reason for revert: Droidfood blocking bug b/355163562

Reverted changes: /q/submissionid:28318041-rw_storage

Change-Id: Ifa22c1551e75dd5161a19c5fb5cb372fe669921c
2024-07-24 20:17:20 +00:00
Android Build Coastguard Worker
c73f9efb35 Snap for 12129055 from 27df5480c4 to 24Q4-release
Change-Id: Iefe810ade230aac3ddac63af08edf6901bd90c6b
2024-07-23 23:02:17 +00:00
Mike McTernan
27df5480c4 trusty: storageproxy: add fs_ready_rw property context
Flag: EXEMPT bug fix
Bug: 350362101
Test: ABTD
Change-Id: I2d6d1ab8dbd60c21a16cadc26c5e4d5d290df42d
2024-07-23 10:02:20 +00:00
Android Build Coastguard Worker
749137a068 Snap for 12116631 from 06118f1b53 to 24Q4-release
Change-Id: I69d077f3d7834bb54d01f6d56d0dd2314118a0c0
2024-07-20 01:02:00 +00:00
Robert Luo
06118f1b53 [Pixel RR] Apply reviewed default permissions
Pregrantting below permissions:
READ_CONTACTS
WRITE_CONTACTS
READ_CALL_LOG

Flag: EXEMPT add pregranted permission in b/337725984, b/337802920
Bug: 337725984, 337802920
Test: presubmit
Change-Id: I611bedf6f05acc3f80ccc021fb534869e131dba1
2024-07-19 06:25:00 +00:00
Android Build Coastguard Worker
9f3d407807 Snap for 12110738 from 338008193e to 24Q4-release
Change-Id: Iaaaacd95894bb17ead15d91d477a15116872d263
2024-07-18 23:01:58 +00:00
Jerry Huang
338008193e gs201: video: change to use c2 "default" AIDL service
Bug: 322920559
Change-Id: Ia2e6cac052bc0ee417e179f61804eada9ae87bf5
2024-07-18 07:08:49 +00:00
Android Build Coastguard Worker
dc3d4bccbb Snap for 12098010 from e1d272f6c9 to 24Q4-release
Change-Id: Id756862a4a1c618510ecdc9d53a89b3bbbbabeb6
2024-07-16 23:02:34 +00:00
Carl Tsai
e1d272f6c9 Add to allocate a security context for panel_pwr_vreg
type=1400 audit(1719903781.812:18): avc:  denied  { read } for  comm="dump_display" name="panel_pwr_vreg" dev="sysfs" ino=87631 scontext=u:r:dump_display:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 350831939
Test: run pts -m PtsSELinuxTestCases -t com.google.android.selinux.pts.SELinuxTest#scanBugreport to check the test is Pass
Flag: EXEMPT bugfix
Change-Id: Ib03479bece87f26f48d6998dfd9b2dd84d439204
2024-07-16 08:02:09 +00:00
Android Build Coastguard Worker
e9c87ae095 Snap for 12091711 from b05833237c to 24Q4-release
Change-Id: I520594b858b2f3d7145baecf6d880b70c43c8d94
2024-07-15 23:01:58 +00:00
Android Build Coastguard Worker
8dd2eb5c13 Snap for 12078078 from 9bbd539930 to 24Q4-release
Change-Id: I1ab5fe2c6330a4227a3ff860ce241903ad73fa0a
2024-07-11 23:02:04 +00:00
Jörg Wagner
9bbd539930 Increase the max core index for protected TLS allocations to 4
Pixel has removed unnecessary allocation padding, and we now pass
dEQP with a maximum physical core index setting of 4, which allows
the driver to utilize 4 GPU cores (1111b) in the extreme tests.

Bug: 221255664
Test: L10 atest CtsDeqpTestCases -- --module-arg 'CtsDeqpTestCases:include-filter:dEQP-VK.protected_memory.*'
Flag: EXEMPT bugfix
Change-Id: Iee15ed0d929f648ad45f7d5fe708e8cb14296e6f
2024-07-11 12:07:49 +00:00
Krzysztof Kosiński
a1ad16fd77 Delete PDX sockets for legacy VR services.
Remove irrelevant copy and paste content. None of the gs201
devices ever included these services and these sockets are
not doing anything.

Bug: 234559097
Test: presubmit
Flag: EXEMPT dead code removal
Change-Id: I60698b026c2e456296943adc8c2a2f03fe3dd867
2024-07-11 04:41:53 +00:00
Android Build Coastguard Worker
368a1decdc Snap for 12072601 from 22e3c7a721 to 24Q4-release
Change-Id: I865894f5a66854b12c4a1e265793297fcae9bc7b
2024-07-11 01:02:26 +00:00
Roy Luo
22e3c7a721 [automerger skipped] Use absolute path for udc device am: 57f74afaf7 am: 748e2c804a -s ours
am skip reason: Merged-In Iad74cae0d6ad6887d79d705dc8478f1b44532503 with SHA-1 7c074a6c3c is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3164468

Change-Id: I4a8458dd98dc1760be8cc18ded776fe5c37eb7d5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-07-10 20:12:23 +00:00
Roy Luo
748e2c804a Use absolute path for udc device am: 57f74afaf7
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3164468

Change-Id: Ide43eebaeca97cd42051f0dfac6e312cda35353e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-07-10 19:46:43 +00:00
Roy Luo
57f74afaf7 Use absolute path for udc device
Avoid search in /sys/class/udc directory

Bug: 339241080
Test: tested on gs201
Flag: EXEMPT bugfix
Change-Id: Iad74cae0d6ad6887d79d705dc8478f1b44532503
Merged-In: Iad74cae0d6ad6887d79d705dc8478f1b44532503
2024-07-10 18:16:53 +00:00
Qais Yousef
082d87f959 init.gs201.rc: Apply sched tuning to improve sched latencies
Bug: 340860065
Flag: NONE not supported for init.rc scripts
Signed-off-by: Qais Yousef <qyousef@google.com>
Change-Id: Iea2a75de69815c5fd812f2e65b8a018a9c396d9e
2024-07-10 11:51:11 +00:00
Android Build Coastguard Worker
5480ebc139 Snap for 12065372 from 7136214409 to 24Q4-release
Change-Id: I9c31b242d9df9c6d24dae0633c67bb546c326bd3
2024-07-09 23:07:05 +00:00
Jeremy Kemp
7136214409 Add Mali OpenCL ICD to PRODUCT_PACKAGES
Bug: 324057328
Test: clpeak
Change-Id: Ied865d4149569b90b400b876ab29441ea2d09c06
2024-07-09 10:51:38 +00:00
Roy Luo
7c074a6c3c Use absolute path for udc device
Avoid search in /sys/class/udc directory

Bug: 339241080
Test: tested on gs201
Flag: EXEMPT bugfix
Change-Id: Iad74cae0d6ad6887d79d705dc8478f1b44532503
2024-07-09 03:03:33 +00:00
Android Build Coastguard Worker
617434347f Snap for 12058995 from 32b03d0ac3 to 24Q4-release
Change-Id: Ib7a88ba439bf3e88013b94aa3845b532a2aee937
2024-07-08 23:07:16 +00:00
Aaron Tsai
b05833237c Add permission for setting gril property
05-22 18:00:40.443   948   948 I auditd  : type=1400 audit(0.0:854): avc:  denied  { write } for  comm="radioext@1.0-se" name="property_service" dev="tmpfs" ino=851 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0

Bug: 343012301
Bug: 203824024
Test: manual test
Flag: EXEMPT bugfix
Change-Id: Ie873e186d3eda618ba832164d9c9713b410977d2
2024-07-05 08:05:01 +00:00
Mike McTernan
32b03d0ac3 APC/TUI: remove support for APC
Flag: EXEMPT build file change
Bug: 351151445
Test: m && test on device
Change-Id: Id777192d0aff8847b28aede2e95413de6a17b3af
2024-07-04 14:55:31 +00:00
Android Build Coastguard Worker
223c27aaf6 Snap for 12048319 from e3ae25faca to 24Q4-release
Change-Id: Ie4c43dc3e0902392c75fc56959d4e1c0d1907871
2024-07-03 23:02:16 +00:00
Wilson Sung
e3ae25faca Update SELinux error
Test: scanBugreport
Bug: 350831939
Bug: 350832009
Change-Id: Ib8cee5cf5cb6acc734c2334e91b49aa4b7a02863
2024-07-03 02:04:37 +00:00
Android Build Coastguard Worker
96d62e1446 Snap for 12002618 from 0f55bf0d03 to 24Q4-release
Change-Id: Ie823d27b05603783e6b2c92fd56da24e0e706175
2024-06-22 01:02:09 +00:00
YiKai Peng
0f55bf0d03 gs201: wlc: add authstart permission
Bug: 348272247
Test: Build/Flash
Flag: EXEMPT bugfix
Change-Id: I1bba5e3d25dd3d062faf11a1a92e254de4de78e5
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-06-21 04:05:38 +00:00
Android Build Coastguard Worker
f5096da9ee Snap for 11996894 from 548222aa57 to 24Q4-release
Change-Id: Ie755dc1be36642609184289323a26fe1240f4d99
2024-06-20 23:02:14 +00:00
Android Build Coastguard Worker
69e90054aa Snap for 11996894 from d33cfcd5ac to 24Q4-release
Change-Id: I6a786f290e76c77b5dbd6f3bc978276584bc40f9
2024-06-20 23:02:13 +00:00
Xin Li
548222aa57 [automerger skipped] Merge 24Q3 (ab/11976889) to aosp-main-future am: 88b5690472 -s ours
am skip reason: Merged-In I65790202886298f9862d68d65cf794e67db5a878 with SHA-1 9d3f39622c is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/27908796

Change-Id: I6b8be580827f70f07b80f05b9ca9dcea00c131ef
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-20 21:09:07 +00:00
Xin Li
d33cfcd5ac [automerger skipped] Merge 24Q3 (ab/11976889) to aosp-main-future am: 1faaa29a4a -s ours
am skip reason: Merged-In Ib3cc0c6ad576e7cda26b7f50cdc61d52e6349c78 with SHA-1 cb51a640f4 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27908815

Change-Id: I4472d7d83181059704ff6c0524d02f42f6626ca5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-20 19:56:50 +00:00
Android Build Coastguard Worker
bfce6e8201 Snap for 11987757 from db2e61924e to 24Q4-release
Change-Id: Ia336def9ebb83915a72b5a35e648c1cb8b428d04
2024-06-18 23:02:15 +00:00
Android Build Coastguard Worker
d5720c19a3 Snap for 11987757 from ec3edc779e to 24Q4-release
Change-Id: Ia214aaf9a5d6db51d23aaaa406f76b965438af3f
2024-06-18 23:02:14 +00:00
Xin Li
88b5690472 Merge 24Q3 (ab/11976889) to aosp-main-future
Bug: 347831320
Merged-In: I65790202886298f9862d68d65cf794e67db5a878
Change-Id: I807edd294c09ad0af1d37bb6e01f8b500062fdee
2024-06-18 14:13:23 -07:00
Xin Li
1faaa29a4a Merge 24Q3 (ab/11976889) to aosp-main-future
Bug: 347831320
Merged-In: Ib3cc0c6ad576e7cda26b7f50cdc61d52e6349c78
Change-Id: I2f69d475d47beaf2647d45a22cdd9e4b16f7adf8
2024-06-18 14:13:23 -07:00
Xin Li
ec3edc779e [automerger skipped] Merge Android 14 QPR3 to AOSP main am: 2a281b76bd -s ours am: fee6b77cbc -s ours
am skip reason: Merged-In I16dcd1267407af7e9f899de1cb665e0ad7c25a47 with SHA-1 d85477e3f3 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3132254

Change-Id: I6dc3dab64502f3d33b113b3a2b31f68220939b18
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-18 05:55:57 +00:00
Xin Li
db2e61924e [automerger skipped] Merge Android 14 QPR3 to AOSP main am: 04b32a1035 -s ours am: b7616414ad -s ours
am skip reason: Merged-In I2543b8c140628545d367aeff42010369e3359cf7 with SHA-1 958d751956 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3132294

Change-Id: I816ede9a7a2c65cace5f1a23b44e394905a1289c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-18 05:55:20 +00:00
Android Build Coastguard Worker
0d6c05668f Snap for 11981331 from cb51a640f4 to 24Q4-release
Change-Id: I47931e1798c82390ffe591bb0335b03314bebb98
2024-06-17 23:01:50 +00:00
Xin Li
fee6b77cbc [automerger skipped] Merge Android 14 QPR3 to AOSP main am: 2a281b76bd -s ours
am skip reason: Merged-In I16dcd1267407af7e9f899de1cb665e0ad7c25a47 with SHA-1 d85477e3f3 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3132254

Change-Id: Ib1911905237097ad9de97e411f7dfd1c1809802d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-17 20:42:05 +00:00
Xin Li
b7616414ad [automerger skipped] Merge Android 14 QPR3 to AOSP main am: 04b32a1035 -s ours
am skip reason: Merged-In I2543b8c140628545d367aeff42010369e3359cf7 with SHA-1 958d751956 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3132294

Change-Id: Ibe4946b0330c461d66abbf6ec4eaf44932e73690
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-17 20:41:49 +00:00
Android Build Coastguard Worker
5cd89d8075 Snap for 11973804 from cb51a640f4 to 24Q3-release
Change-Id: I28d9b5204972734074d7a8b2d33d62774504a024
2024-06-15 01:02:09 +00:00
Xin Li
04b32a1035 Merge Android 14 QPR3 to AOSP main
Bug: 346855327
Merged-In: I2543b8c140628545d367aeff42010369e3359cf7
Change-Id: I79097f05ad471c387d5d62b6d31f3ef390e43f94
2024-06-13 10:48:23 -07:00
Xin Li
2a281b76bd Merge Android 14 QPR3 to AOSP main
Bug: 346855327
Merged-In: I16dcd1267407af7e9f899de1cb665e0ad7c25a47
Change-Id: I6e333f075ffca7444f737d87521e8d79b170c2ec
2024-06-13 10:48:23 -07:00
Kyle Tso
cb51a640f4 usb: Log for retry on role switch
Add a log for the retry. Also define the sleep time in the header file.

Bug: 341996696
Change-Id: Ib3cc0c6ad576e7cda26b7f50cdc61d52e6349c78
Signed-off-by: Kyle Tso <kyletso@google.com>
(cherry picked from commit d17fdff5f81cff76adaa75d50f26318be8048123)
2024-06-13 17:09:11 +08:00
Kyle Tso
d8fffffda4 usb: Add retry on role switch
Bug: 341996696
Change-Id: I8caa65288af1588d24fea4aa6c5768d45d69bbd5
Signed-off-by: Kyle Tso <kyletso@google.com>
(cherry picked from commit ef5856a4474002cc35a51377adffddd4cb239796)
2024-06-13 17:07:23 +08:00
Android Build Coastguard Worker
4ca9ebf1e7 Snap for 11959661 from 76de5fed8d to 24Q3-release
Change-Id: I84006a86a034ad52c29ba02018b8242c2b29354a
2024-06-12 23:02:26 +00:00
David Drysdale
76de5fed8d Reapply "Enable Secretkeeper HAL service on gs201"
(This reverts commit 9922a0fc12, ag/26704327.)

This requires that prebuilts on `main` have been updated to include the
April updates to the Secretkeeper TA (which includes fixes needed to
cope with larger and more realistic DICE chains).  Relevant devices:
- pantah
- felix
- lynx
- tangorpro

Bug: 291228655
Bug: 306364873
Bug: 341708664
Test: VtsSecretkeeperTargetTest on cheetah
Flag: build.RELEASE_AVF_ENABLE_LLPVM_CHANGES
Change-Id: I251a14221915fa8b2aaf3f1611c8c9f698596552
2024-06-12 11:28:57 +00:00
Jerry Huang
724b28eebf gs201: update c2.android.vp8.decoder performance point
Align performance point with the Pixel family of devices.

Bug: 343004271
Test: run cts -m MctsMediaDecoderTestCases
-t android.media.decoder.cts.VideoDecoderPerfTest
Change-Id: I06abe0d6d2387792a1492a4fd551549ca3bdfa49

Change-Id: Ib98ea9116e7280cd420502a2f1968e46faa26066
2024-06-12 06:54:20 +00:00
chenkris
c3eec0f7de gs201: build fingerprint dump
Bug: 346450599
Test: adb bugreport
Change-Id: I988649841bf915b9af12a1b628930dc0ee80f186
2024-06-12 04:39:27 +00:00
Leo Chen
f3985dc52f Update IDisplay to V12
Test: trigger test build
Bug: 309897479
Change-Id: I86b6117e10249165b6c2b8c534b86cd7f3549fb0
Signed-off-by: Leo Chen <yinchiuan@google.com>
2024-06-12 03:20:53 +00:00
Android Build Coastguard Worker
733aa728f4 Snap for 11944020 from cab0d60115 to 24Q3-release
Change-Id: I85654901aaa74dd9169e3d222e3e458416bb91fd
2024-06-08 01:02:30 +00:00
Dennis Shen
cab0d60115 switch over to use new storage read api instead of
server_configurable_flags, this new read api lib will be needed for new
codegened aconfig flag lib.

Bug: 321077378
Test m and avd

Change-Id: I908ccf51b59ef4f475d8680003cb4aec61bdd12c
2024-06-07 14:16:50 +00:00
Android Build Coastguard Worker
2fec9c1f78 Snap for 11938003 from 6d16ee061c to 24Q3-release
Change-Id: Ie615ff4976e2948eec94a4b0e0e96eda3c20e64a
2024-06-06 23:02:12 +00:00
Xin Li
0a6360ec13 [automerger skipped] Merge 2024-06 Release (ab/AP2A.240605.024) to aosp-main-future am: d85477e3f3 -s ours
am skip reason: Merged-In Ib57dbaf32c2198e755e123cd894514bce5fb212e with SHA-1 1d318e584a is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27550763

Change-Id: Ide86a79783cbfb2b8d91b516bc2749af7bf4c1b1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 21:36:23 +00:00
Xin Li
d85477e3f3 Merge 2024-06 Release (ab/AP2A.240605.024) to aosp-main-future
Bug: 343100748
Merged-In: Ib57dbaf32c2198e755e123cd894514bce5fb212e
Change-Id: I16dcd1267407af7e9f899de1cb665e0ad7c25a47
2024-06-06 20:51:05 +00:00
Treehugger Robot
6d16ee061c Merge "explicit 'user root'" into main am: dd4d390489 am: d7434d32a3
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3102021

Change-Id: I12a342d536edfedc1284dfa33aa742ae8a96beed
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 18:46:31 +00:00
Treehugger Robot
d7434d32a3 Merge "explicit 'user root'" into main am: dd4d390489
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3102021

Change-Id: I2dfb059b1e680237fe402c53410299efa0089863
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 18:23:22 +00:00
Treehugger Robot
dd4d390489 Merge "explicit 'user root'" into main 2024-06-06 18:01:55 +00:00
Utku Utkan
0a14f4d4aa Remove ACCESS_FINE_LOCATION permission pregrant for PCS on G2
FLAG: EXEMPT Cleanup of obsolete permission pregrant

Bug: 345021501
Test: m && flashall
Change-Id: I856f2d84eedf70bfa007a66c141b09c1f3c2930a
2024-06-06 17:36:57 +00:00
Jim Tang
cdb406e1b6 Make SUPPORT_MULTI_SIM recognizable in bp am: 10cd38d16e am: acfcabc8e9
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3115563

Change-Id: I675023e60a3b8e343f27fdb82f56caa872183416
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 08:35:35 +00:00
Jim Tang
acfcabc8e9 Make SUPPORT_MULTI_SIM recognizable in bp am: 10cd38d16e
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3115563

Change-Id: Iad9f16ed55040555187d8d05039b615a72b8add7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 08:16:02 +00:00
Jim Tang
10cd38d16e Make SUPPORT_MULTI_SIM recognizable in bp
This commit establishes a soong config variable `sim_count` for
easier converting Android.mk to Android.bp when dealing with multiple
SIMs.

Bug: 343823190
Test: presubmit
Change-Id: Idbd52236b95e8d69516226a71a848d591f181d94
2024-06-06 15:00:28 +08:00
Android Build Coastguard Worker
696c10c065 Snap for 11915075 from d279e5fbfd to 24Q4-release
Change-Id: I60b59aa4f8b102fce44f2ec2b7a2807d5428c0b1
2024-06-01 01:02:09 +00:00
Android Build Coastguard Worker
f5c3320403 Snap for 11915075 from 2a0c178a14 to 24Q4-release
Change-Id: Iaf6fffa16e36d4b1f3375c9db72a8748d5dc0dc7
2024-06-01 01:02:08 +00:00
Android Build Coastguard Worker
4a08341dea Snap for 11908474 from d279e5fbfd to 24Q3-release
Change-Id: I5b02be29601677a2decb7621227cef117ef3d32d
2024-05-30 23:02:19 +00:00
Android Build Coastguard Worker
2b56c50789 Snap for 11908474 from 2a0c178a14 to 24Q3-release
Change-Id: I37c896e84dad05a54ee0c3437011c8e1cc94f71b
2024-05-30 23:02:18 +00:00
jiangzining
2a0c178a14 [Scone] add BLUETOOTH_CONNECT to SCONE default permission
MBA Approval: b/330640278
Bug: b/343608940
Test: Build and Flash

Change-Id: I5fd9306599e58e9adb51aeea62b5de11c9147217
2024-05-30 08:58:50 +00:00
Cyan_Hsieh
b6cdb99079 Switch makefile owners to MK_OWNERS am: 702e14bdcf am: 294b00117e
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3107249

Change-Id: Ifc8f04b7a43161b98f39bf2fc2d527d9e7809afd
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 22:00:00 +00:00
Xin Li
d279e5fbfd [automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: 958d751956 -s ours
am skip reason: Merged-In Ifcf73176620f44743a8aa252f8afed85c3af475c with SHA-1 1c7d8f80f2 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/27273660

Change-Id: I629080ea20475918f6c7b4efdf12b6754b4be4a8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 21:59:13 +00:00
Xin Li
da3c13f4e2 [automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: 64fedf02c7 -s ours
am skip reason: Merged-In I065f8e844d13d1d6d36c36ef689ff6c34b3e3fa6 with SHA-1 85b26e93cc is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27272719

Change-Id: Ie32740f5ff12809c39fe3aa5eacc8d4aba21eb8f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 20:49:11 +00:00
Xin Li
57a28fc4fb [automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: 958d751956 -s ours
am skip reason: Merged-In Ifcf73176620f44743a8aa252f8afed85c3af475c with SHA-1 1c7d8f80f2 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/27273660

Change-Id: Ib8ab6854fd050ae94bc197debbce33b11345f03b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 19:45:56 +00:00
Cyan_Hsieh
294b00117e Switch makefile owners to MK_OWNERS am: 702e14bdcf
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3107249

Change-Id: If2200e9a5f35fe64ee76e5a26e27ca2481ae67bf
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 14:29:14 +00:00
Cyan_Hsieh
702e14bdcf Switch makefile owners to MK_OWNERS
Bug: 278167548
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e72b281d89f769d2cf5000538cd6e9f3793b983c)
Merged-In: I6259f2fb9e561ce0ee5a61c9b6abbb745ace9d25
Change-Id: I6259f2fb9e561ce0ee5a61c9b6abbb745ace9d25
2024-05-29 10:00:19 +00:00
Steven Moreland
8ba12e3caa explicit 'user root'
Bug: 340953047
Test: N/A
Change-Id: I3cfa4844916973c12ed9cff54361070cc091551f
2024-05-25 00:38:44 +00:00
Android Build Coastguard Worker
ccb633dd38 Snap for 11859356 from 17975d9a6b to 24Q3-release
Change-Id: I1fa31d4baf375b34b827fc5040ad81afe081d7f4
2024-05-18 03:02:08 +00:00
Sungtak Lee
17975d9a6b Remove codec2 hidl fragments
Bug: 321808716
Change-Id: Ibf440b28881e2e51e142299bd07ba2e19322883e
2024-05-17 06:25:24 +00:00
Android Build Coastguard Worker
758e72691d Snap for 11853201 from a75c6750da to 24Q3-release
Change-Id: I6b8eefe8b35bed5bc0d8c41d96283666eccfe768
2024-05-17 01:02:01 +00:00
Android Build Coastguard Worker
f9823e70d4 Snap for 11840485 from 9d3f39622c to 24Q3-release
Change-Id: I477aa614a0de18418ec642ee22f1a29d6da07695
2024-05-14 23:02:25 +00:00
Android Build Coastguard Worker
f98a0a14f9 Snap for 11840485 from 23691f7a02 to 24Q3-release
Change-Id: I109a0783928e889d80e5eb5b45787d6c00e36072
2024-05-14 23:02:24 +00:00
Chaitanya Cheemala
9d3f39622c Revert "SELinux: fix avc denials"
This reverts commit d1fe9f8f80.

Reason for revert: Likely culprit for b/340511525  - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Change-Id: I65790202886298f9862d68d65cf794e67db5a878
2024-05-14 15:07:58 +00:00
Jerry Huang
a75c6750da gs201: update performance point based on AP3A.240513.001
Bug: 335350051
Test: CtsMediaDecoderTestCases android.media.decoder.cts.VideoDecoderPerfTest
Change-Id: I06abe0d6d2387792a1492a4fd551549ca3bdfa49
2024-05-14 09:25:05 +00:00
Jörg Wagner
23691f7a02 Use 2024-03-01 deqp levels for GLES and Vulkan
Bug: 327589279
Change-Id: I68aa5d2ee438739c80f2e7b3e54ad96f435d515a
2024-05-14 08:55:03 +00:00
Ken Yang
d1fe9f8f80 SELinux: fix avc denials
Bug: 338332877
Change-Id: I5fb0a73cdc0d276ec14e55906c9bbd9c6875c786
Signed-off-by: Ken Yang <yangken@google.com>
2024-05-14 05:14:55 +00:00
Edgar Arriaga
03c2cdb7ae Set default pin amount for home app
Bug: 288900050
Test: dumpsys pinner
Flag: EXEMPT refactor

Change-Id: Ieed912786ce51f420da9b0e96ea5d93c22244176
2024-05-13 23:05:16 +00:00
Android Build Coastguard Worker
646fe3ea09 Snap for 11816316 from 5a1bb0df6e to 24Q3-release
Change-Id: I69c6b434a460c817506ceccaccf850ae20ab257e
2024-05-08 23:02:20 +00:00
Android Build Coastguard Worker
ccb1a837f6 Snap for 11816316 from 3cabae8619 to 24Q3-release
Change-Id: I0b697f39febbf7079883f545e0a83d4d6e71ed6b
2024-05-08 23:02:20 +00:00
chenkris
5a1bb0df6e Allow fingerprint to access the folder /data/vendor/fingerprint
Fix the following avc denial:
android.hardwar: type=1400 audit(0.0:20): avc:  denied  { write } for  name="fingerprint" dev="dm-56" ino=36703 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:vendor_data_file:s0 tclass=dir permissive=0

Bug: 267766859
Test: Tested fingerprint under enforcing mode
Change-Id: I11c465fe89fcbfa7d9132ccee1c7666d1cd75a24
2024-05-08 08:46:26 +00:00
Leo Chen
3cabae8619 Update IDisplay to V11-V12
V12 is not frozen yet. We should still allow V11 for `next` build.

Test: trigger test build
Bug: 309897479
Bug: 303162192
Change-Id: Iea9df905efd6bf131d178dcb483e76a0f9d58a14
Signed-off-by: Leo Chen <yinchiuan@google.com>
2024-05-08 08:40:39 +00:00
Xin Li
958d751956 Merge Android 24Q2 Release (ab/11526283) to aosp-main-future
Bug: 337098550
Merged-In: Ifcf73176620f44743a8aa252f8afed85c3af475c
Change-Id: I2543b8c140628545d367aeff42010369e3359cf7
2024-05-06 12:18:07 -07:00
Xin Li
64fedf02c7 Merge Android 24Q2 Release (ab/11526283) to aosp-main-future
Bug: 337098550
Merged-In: I065f8e844d13d1d6d36c36ef689ff6c34b3e3fa6
Change-Id: I3e04f83e98e907febe6820c0a1f5abd18a3bd91a
2024-05-06 12:09:15 -07:00
Android Build Coastguard Worker
bde46da6be Snap for 11800966 from d18c314472 to 24Q3-release
Change-Id: If91b2cfc468ff5de4cf09e699f7e4343b5b18072
2024-05-04 01:02:29 +00:00
Spade Lee
d18c314472 pixelstats: gs201: add all logbuffer paths am: 3ed14a059f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27121095

Change-Id: If4d6eefac1b106bab3838ac361a28880ce0b954a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-03 05:24:16 +00:00
Android Build Coastguard Worker
df3ab501d4 Snap for 11784291 from a7a56a898e to 24Q3-release
Change-Id: Ie39eee4d37b372666f35696561b25c3348db43f7
2024-04-30 23:03:04 +00:00
SaiChand Duppala
a7a56a898e Disable dumpstate strict-run flag in gs201
The change disables the dumpstate strict-run flag in gs201 devices, which is enabled by default. Disabling this flag increases the timeout for capturing incident report to 120 seconds, from the default 20 seconds. This is done because 20s isn't enough to capture incident report proto in some cases, especially when device is throttling.

Bug: 330400782

Test: Booted a gs201 device with the change. Then manually thermal throttled the device and captured bugreports. In some tests Incident report took a lot more more than 20s, and in all these cases it was succesfully captured.
Change-Id: I177bd4aebc550ade855a8abf46ce261eea94d352
2024-04-29 23:09:07 +00:00
Android Build Coastguard Worker
4605fe9c32 Snap for 11778614 from fb954bbaab to 24Q3-release
Change-Id: I9194d98622ca17f84fec12360b0b909a85552031
2024-04-29 23:02:16 +00:00
Herbert Xue
fb954bbaab Update USES_LASSEN_MODEM soong config settings for aosp projects. am: 6cef6b07d1 am: c30b81b447
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3038856

Change-Id: Ice4ba90f3b9e5fd722e53d53c01f5c04b084143c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-29 09:59:33 +00:00
Herbert Xue
c30b81b447 Update USES_LASSEN_MODEM soong config settings for aosp projects. am: 6cef6b07d1
Original change: https://android-review.googlesource.com/c/device/google/gs201/+/3038856

Change-Id: I32c470db09c8ee5ff2278816c1020579468dd73f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-29 09:42:17 +00:00
Herbert Xue
6cef6b07d1 Update USES_LASSEN_MODEM soong config settings for aosp projects.
Add the flag "use_lassen_modem" for bp to do the same checking like
"USES_LASSEN_MODEM" in mk.

Bug: 330654744
Test: 1. lunch aosp_cheetah-trunk_staging-userdebug
      2. m RilConfigService
Change-Id: Icb99b639837237b2afeea858de14669d583bf385
2024-04-29 16:23:22 +08:00
Qian-Hao Huang
a140670b7a gs201: Change the path of prebuilt fips140.ko
Placing the fips140.ko at the same level as other kernel modules makes
it easier for automation tools to handle all of them.

Bug: 331791671
Change-Id: I7d69226d594fe068a6ccb99bb5a29620468f4aed
Signed-off-by: Qian-Hao Huang <qhhuang@google.com>
2024-04-29 06:50:18 +00:00
Spade Lee
3ed14a059f pixelstats: gs201: add all logbuffer paths
Bug: 335934710
Change-Id: I20c24578a1e6ed08ad27cd9f4d37a55338ee8f73
Signed-off-by: Spade Lee <spadelee@google.com>
2024-04-29 01:40:51 +00:00
Android Build Coastguard Worker
2d8eb423ca Snap for 11772614 from a4536fa426 to 24Q3-release
Change-Id: Ic1b989030256ea24ecf73ffb81b47b282b01a9a0
2024-04-27 01:02:15 +00:00
Android Build Coastguard Worker
3c864ba683 Snap for 11772614 from 6d1c23b2ee to 24Q3-release
Change-Id: I4d20b8850e14b6ac93226a30754a73af0cddc1c3
2024-04-27 01:02:14 +00:00
Enzo Liao
a4536fa426 [automerger skipped] Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common. am: ceab5d1740 -s ours
am skip reason: Merged-In I57f9b8b77aa070ad2216cae1e84630a26a03618d with SHA-1 66254ad14d is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/27046444

Change-Id: Ic36d68f2a6402a9d8c16b12fb0157b7c591000e4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-26 08:08:35 +00:00
Enzo Liao
6d1c23b2ee [automerger skipped] Apply common SELinux policies related to ramdumps and coredumps to gs201. am: 0e14fcb53e -s ours
am skip reason: Merged-In If0f1f42dfe074bdc211e538f0aa4eb7e7494abe0 with SHA-1 1ae8911a2b is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27046362

Change-Id: I0c7d04fc2c997141869f042f1464f2f5e4ef4935
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-26 08:08:35 +00:00
Enzo Liao
0e14fcb53e Apply common SELinux policies related to ramdumps and coredumps to gs201.
Refer: ag/26620507

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1ae8911a2b7444aea0eb1e30564fb67c8bfef661)
Merged-In: If0f1f42dfe074bdc211e538f0aa4eb7e7494abe0
Change-Id: If0f1f42dfe074bdc211e538f0aa4eb7e7494abe0
2024-04-26 07:54:29 +00:00
Enzo Liao
ceab5d1740 Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common.
New paths (ag/26620507):
  RamdumpService: device/google/gs-common/ramdump_app
  SSRestartDetector: device/google/gs-common/ssr_detector_app

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:66254ad14d1401cb3992b64352efa5c243203bc3)
Merged-In: I57f9b8b77aa070ad2216cae1e84630a26a03618d
Change-Id: I57f9b8b77aa070ad2216cae1e84630a26a03618d
2024-04-26 07:54:29 +00:00
Android Build Coastguard Worker
c630a18c35 Snap for 11766482 from c5ef94d21e to 24Q3-release
Change-Id: Ic60009046c44edb304b39aab00b2a318f154d4e6
2024-04-25 23:02:21 +00:00
Android Build Coastguard Worker
9fd8f31853 Snap for 11766482 from 5fbe725c85 to 24Q3-release
Change-Id: I54a66441362fb1482126585e6078d8a29f191f92
2024-04-25 23:02:20 +00:00
Spade Lee
5fbe725c85 [automerger skipped] pixelstats: gs201: add history validation path am: 3d06665d25 -s ours
am skip reason: Merged-In I8830d4a7532d8900abdcf78ba7ab1c141b47c1b4 with SHA-1 9a1ff5f804 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27096095

Change-Id: I53936ac14575ef92caf47410dd3c5f837714a26c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-25 08:20:34 +00:00
Spade Lee
c5ef94d21e [automerger skipped] pixelstats_vendor: add logbuffer_device r_file_perms am: 9a131d961b -s ours
am skip reason: Merged-In Ia591a091fe470c2c367b80b8f1ef9eea6002462c with SHA-1 596f6ab199 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/27095520

Change-Id: I09614fa5b620f5fc95d98f7d4edad19d0241939d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-25 08:20:29 +00:00
Chungro Lee
d04be8fafd [automerger skipped] pixelstats: move learning/model load path to sysfs am: 0d11a6641d -s ours
am skip reason: Merged-In I91039ce3a8ee4630a76113ef7ae6be3bc6908f64 with SHA-1 5dc71cfae1 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/27095274

Change-Id: I1dbd6163b902fd3222ebeb7455fb70d0ecd4fb44
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-25 08:20:29 +00:00
Spade Lee
9a131d961b pixelstats_vendor: add logbuffer_device r_file_perms
avc: denied { read } for name="logbuffer_maxfg_monitor" dev="tmpfs" ino=1034 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0

Bug: 329174074
Test: no denied log, and able to read logbuffer in pixelstats_vendor
Signed-off-by: Spade Lee <spadelee@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:596f6ab1998c584fc2a223831f6f59202e9ad4c5)
Merged-In: Ia591a091fe470c2c367b80b8f1ef9eea6002462c
Change-Id: Ia591a091fe470c2c367b80b8f1ef9eea6002462c
2024-04-25 06:10:52 +00:00
Spade Lee
3d06665d25 pixelstats: gs201: add history validation path
Bug: 329174074
Signed-off-by: Spade Lee <spadelee@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:9a1ff5f8041e4532481a1f7c6c168965d813fc53)
Merged-In: I8830d4a7532d8900abdcf78ba7ab1c141b47c1b4
Change-Id: I8830d4a7532d8900abdcf78ba7ab1c141b47c1b4
2024-04-25 06:10:42 +00:00
Chungro Lee
0d11a6641d pixelstats: move learning/model load path to sysfs
Reporting learning(relaxation) and model loading once a day
 * learning and model loading path moved from uevent to
   sysfs collector.

Bug: 329124192
Signed-off-by: Chungro Lee <chungro@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:5dc71cfae1304564ccb2861109e9e1451032f0e7)
Merged-In: I91039ce3a8ee4630a76113ef7ae6be3bc6908f64
Change-Id: I91039ce3a8ee4630a76113ef7ae6be3bc6908f64
2024-04-25 06:10:32 +00:00
Android Build Coastguard Worker
41e4bef097 Snap for 11753769 from b826a9bf8e to 24Q3-release
Change-Id: I75905f76fe7f717edd245f7b40884b0b3d40adff
2024-04-23 23:02:42 +00:00
Android Build Coastguard Worker
8c5818c2db Snap for 11753769 from 396792798c to 24Q3-release
Change-Id: Ic73ebd508d8057143aec79aa5153b35cbb1111e1
2024-04-23 23:02:42 +00:00
Sungtak Lee
396792798c Reapply "Enable AIDL media.c2"
This reverts commit 9517110d28.

Bug: 321808716
Test: adb shell dumpsys android.hardware.media.c2.IComponentStore/default
Test: adb shell dumpsys android.hardware.media.c2.IComponentStore/default1
Change-Id: If295d690134a6fb28bb865d9f7659343ef2ec50b
2024-04-23 08:36:13 +00:00
Wilson Sung
b826a9bf8e Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 336451433
Bug: 336451874
Bug: 336451113
Bug: 336451787
Change-Id: I5124448d8e35615da861011235a45ce890297564
2024-04-23 06:53:55 +00:00
Android Build Coastguard Worker
90b4911869 Snap for 11740859 from 9517110d28 to 24Q3-release
Change-Id: I721a288a12c4b4b318c826e8c55ceefe6891b795
2024-04-20 01:02:09 +00:00
Priyanka Advani
9517110d28 Revert "Enable AIDL media.c2"
Revert submission 26384060-c2aidl-pixel-enable

Reason for revert: Culprit for b/335892284. Will be verifying through ABTD for confirmation and before submitting the revert.

Reverted changes: /q/submissionid:26384060-c2aidl-pixel-enable

Change-Id: I4acee85037309e699e82c8f378b72381be7de316
2024-04-19 20:44:25 +00:00
Wonsik Kim
9b76510c86 Enable AIDL media.c2
Bug: 321808716
Test: adb shell dumpsys android.hardware.media.c2.IComponentStore/default
Test: adb shell dumpsys android.hardware.media.c2.IComponentStore/default1
Change-Id: If3cd57d4ac1e04503015e7c8dd6b69ab3c9163b5
2024-04-19 19:09:49 +00:00
Android Build Coastguard Worker
7393039a7d Snap for 11733120 from 355b8bd76d to 24Q3-release
Change-Id: I463cb9dc7dfb665ea95f9718faf37a02272121b1
2024-04-18 23:02:02 +00:00
Android Build Coastguard Worker
1e8a73942f Snap for 11728787 from b4ab2815a5 to 24Q3-release
Change-Id: Ia3fe1f8dac5eac9ac10a9f1c645f9e25593e5027
2024-04-17 23:03:35 +00:00
Shashwat Razdan
355b8bd76d Revert "Adding android.software.contextualsearch to gs-201 devices."
Revert submission 26467635-feature_cs

Reason for revert: b/329350496 - Introducing new config with `android.*` namespace is not allowed in 24Q2.

Reverted changes: /q/submissionid:26467635-feature_cs

Change-Id: I36c1408c09a3fa73e2958216e996a8d1e0d94487
2024-04-17 22:44:00 +00:00
Hongyang Jiao
b4ab2815a5 Add betterbug.mk to gs201 am: 5e7a737f11
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/26987117

Change-Id: I8bc00ab617bfbaf22970e47de1d18ab3458d8eff
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-17 18:10:56 +00:00
Daniel Chapin
da826a8393 Revert "Add betterbug mk to gs201" am: 1bd83d8170
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/26631204

Change-Id: Id4d8722efeb9a9bf7ae7be0746eb59553b7f4606
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-17 18:08:41 +00:00
Hongyang Jiao
5e7a737f11 Add betterbug.mk to gs201
Test: manual test
Bug: 322543833
Change-Id: Ie1b8157c8687bc4ec9bb00feb47cbcc130d59ee0
2024-04-16 22:57:07 +00:00
Daniel Chapin
1bd83d8170 Revert "Add betterbug mk to gs201"
Revert submission 26348985-bb-sepolicy-poc

Reason for revert: Droidfood blocking bug: b/327991669

Bug: 327991669

Reverted changes: /q/submissionid:26348985-bb-sepolicy-poc
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:3f5c12abada31befa0d9f869bf6628d06ee05aa4)
Merged-In: Id77188dd9f6f5acaed1506a9489f5d6f9874dde9
Change-Id: Id77188dd9f6f5acaed1506a9489f5d6f9874dde9
24D1-dev is based on 24Q2-release. Therefore, we merged this CL to 24D1-dev.
2024-04-16 22:47:39 +00:00
Android Build Coastguard Worker
0bbef9a436 Snap for 11710546 from 0095106594 to 24Q3-release
Change-Id: I5469bfc8f89226f22dcfc7cdce9267da451d0cdf
2024-04-13 01:02:30 +00:00
Wilson Sung
0095106594 [automerger skipped] Update SELinux error am: 768c83d78c -s ours
am skip reason: Merged-In I604c091a24f3f13f7a354c08c210deeaa9ac9cb1 with SHA-1 2747579f1e is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/26926463

Change-Id: I95252fcc33f74640531163720b0ea768e80b414e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-11 23:35:19 +00:00
Wilson Sung
4f4241e64c [automerger skipped] Update SELinux error am: db99d33eb7 am: 8379633fd2 -s ours
am skip reason: Merged-In I604c091a24f3f13f7a354c08c210deeaa9ac9cb1 with SHA-1 2747579f1e is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3038851

Change-Id: I2a0eef20fe26eeaf50bfc9a6a4c64c0740fabfc6
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-11 23:35:05 +00:00
Wilson Sung
768c83d78c Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 329380891
Test: scanBugreport
Bug: 329381126
Test: scanAvcDeniedLogRightAfterReboot
Bug: 329380363
Merged-In: I604c091a24f3f13f7a354c08c210deeaa9ac9cb1
Change-Id: I604c091a24f3f13f7a354c08c210deeaa9ac9cb1
2024-04-11 23:27:38 +00:00
Wilson Sung
8379633fd2 Update SELinux error am: db99d33eb7
Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/3038851

Change-Id: I594e8d4c0c404a3d5af25ea98d6e56db88171b6f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-11 23:18:29 +00:00
Android Build Coastguard Worker
913d892eb4 Snap for 11704135 from 1ae8911a2b to 24Q3-release
Change-Id: I910c44e0b2a9cf38fef1cab482ef57c6c137a018
2024-04-11 23:02:16 +00:00
Android Build Coastguard Worker
6eb2cfbd4a Snap for 11704135 from 66254ad14d to 24Q3-release
Change-Id: I733a6e86a3dd10ec59e4937ed313f6f2234805d1
2024-04-11 23:02:16 +00:00
Wilson Sung
db99d33eb7 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 329380891
Test: scanBugreport
Bug: 329381126
Test: scanAvcDeniedLogRightAfterReboot
Bug: 329380363
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7f8de02b7c75ddc3fa0a5873b3b36128cde15d6f)
Merged-In: I604c091a24f3f13f7a354c08c210deeaa9ac9cb1
Change-Id: I604c091a24f3f13f7a354c08c210deeaa9ac9cb1
2024-04-11 22:29:08 +00:00
Enzo Liao
1ae8911a2b Apply common SELinux policies related to ramdumps and coredumps to gs201.
Refer: ag/26620507

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Change-Id: If0f1f42dfe074bdc211e538f0aa4eb7e7494abe0
2024-04-11 02:03:11 +00:00
Enzo Liao
66254ad14d Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common.
New paths (ag/26620507):
  RamdumpService: device/google/gs-common/ramdump_app
  SSRestartDetector: device/google/gs-common/ssr_detector_app

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Change-Id: I57f9b8b77aa070ad2216cae1e84630a26a03618d
2024-04-11 02:03:11 +00:00
Android Build Coastguard Worker
e137aa6a69 Snap for 11697857 from fd583d1d11 to 24Q3-release
Change-Id: I0be34f2ea367b5e2ec337bbaa18dc6321c253d80
2024-04-10 23:02:12 +00:00
wenchangliu
fd583d1d11 update odd resolution support in vpx and av1 codecs
[VSR-4.2.004.001] MUST support the smallest width/height alignment allowed
by the video standard. For AVC/HEVC/VCC, this requires 2x2 pixel alignment
for YUV 4:2:0 profiles, and 2x1 pixel alignment for YUV 4:2:2 profiles.
For VP8/VP9/AV1, this requires 1x1 pixel alignment for any profiles.
Note: This is usually stored as the crop rectangle in the bitstream.

Bug: 329378524
Test: CtsMediaV2TestCases
Change-Id: I0e84a342bf1093c74c712d2c811b37eca9c7908c
2024-04-10 11:20:32 +00:00
Android Build Coastguard Worker
0bf0cdfeaf Snap for 11685790 from cf16a40663 to 24Q3-release
Change-Id: I71b78b9994753707f3c591b73fece784d8d6f575
2024-04-08 23:02:12 +00:00
Dinesh Yadav
cf16a40663 TPU Janeiro Tachyon Migration
This change includes tachyon targets for edgetpu in the final image

TESTED:
Create a private build with this change and verified that the tachyon targets were present after flashing on a local device.

Bug: 307591410
Change-Id: Id584ee4ad626e28b7093e6df9a14c3e19dbe51ea
2024-04-08 16:11:19 +00:00
Android Build Coastguard Worker
585c01604c Snap for 11666018 from 8d9a941f43 to 24Q3-release
Change-Id: Ia2183042796e20b45f4719938f141c94e966f09d
2024-04-03 23:02:09 +00:00
Android Build Coastguard Worker
b919c196bf Snap for 11666018 from f1558f0cc8 to 24Q3-release
Change-Id: I76f746715784e63345f712e4aa317994c34fe6fc
2024-04-03 23:02:08 +00:00
Spade Lee
8d9a941f43 sepolicy: allow kernel to search vendor debugfs am: 17ab68a5ac
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/26793540

Change-Id: Iebcb71b3121e90acb4c1744f6b3eb6ca1db7206f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-03 04:24:44 +00:00
Spade Lee
17ab68a5ac sepolicy: allow kernel to search vendor debugfs
audit: type=1400 audit(1710259012.824:4): avc:  denied  { search } for  pid=128 comm="kworker/3:1" name="max77779fg" dev="debugfs" ino=24204 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
audit: type=1400 audit(1710427790.680:2): avc:  denied  { search } for  pid=10 comm="kworker/u16:1" name="gvotables" dev="debugfs" ino=10582 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_votable_debugfs:s0 tclass=dir permissive=1
audit: type=1400 audit(1710427790.680:3): avc:  denied  { search } for  pid=211 comm="kworker/u16:4" name="google_charger" dev="debugfs" ino=16673 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_charger_debugfs:s0 tclass=dir permissive=1

Bug: 328016570
Bug: 329317898
Test: check all debugfs folders are correctly mounted
Change-Id: I7ca3804056bbfd8459bac2c029a494767f3ae1a6
Signed-off-by: Spade Lee <spadelee@google.com>
2024-04-02 07:35:39 +00:00
Android Build Coastguard Worker
53ec29b4ab Snap for 11654651 from 60c66448ef to 24Q3-release
Change-Id: Ia3e4a4de979d4794a88cda931795d17eb8f0be6d
2024-04-01 23:02:00 +00:00
kadirpili
60c66448ef gs201: telephony property for cbd
Bug: 315104803
Change-Id: I2560871e9477a5f8dcd9519b6c60353e89c5df82
2024-04-01 05:12:58 +00:00
Android Build Coastguard Worker
1aa2f88531 Snap for 11648291 from f2b7e75b56 to 24Q3-release
Change-Id: I6f52d030b067ea05c16fea0892317124f07bfb85
2024-03-30 01:02:17 +00:00
Ziyi Yang
f1558f0cc8 Adding post notification to gca default permissions
Bug: 331677590
Test: Build and flash. Permission was pregranted to gca.
Change-Id: Id38a1cfebaed37fe82f01c4116967a867e026309
2024-03-30 00:08:36 +00:00
Android Build Coastguard Worker
e9ca733f1d Snap for 11641371 from 6008aad40e to 24Q3-release
Change-Id: Ia78bc007c595b72dea1b08bac28bb9f2be1c39dd
2024-03-28 23:02:05 +00:00
Chris Lu
f2b7e75b56 gs201: upgrade IDisplay to V11 am: ecef8c5764
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/26488327

Change-Id: I9a4b1cab09700d14f4d2e170782415263a4d2828
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-28 21:37:16 +00:00
Herbert Xue
6008aad40e Update SOONG_NAMESPACES to include power-anomaly-sitril folder
Bug: 326175117
Test: 1. lunch lynx-trunk_staging-userdebug
      2. m PowerAnomalySitril
Change-Id: I97eb94f85ae2ab164fe0fc6b9d3429ebca5b0db5
2024-03-28 04:59:25 +00:00
Android Build Coastguard Worker
36db05055b Snap for 11629448 from 9922a0fc12 to 24Q3-release
Change-Id: Ib9c78e7cb38189b8f81feab47fd9584dbf58f0d7
2024-03-27 01:03:25 +00:00
David Drysdale
9922a0fc12 Revert "Enable Secretkeeper HAL service on gs201"
This reverts commit a929e8bc02.

Reason for revert: disable until gs201/main prebuilts get updated

The gs201/main prebuilts are a couple of weeks old, which means that some heap size fixes for the Secretkeeper TA are not present for these devices.

This in turn blocks:
- aosp/2997056: re-enable SK in pVMs
- aosp/3000947: add large DICE chain VTS tests

So revert for now, so we can submit those two CLs and have Secretkeeper test coverage happening on shusky.  

Then when gs201/main prebuilts are updated to something more recent (i.e. that includes aosp/3005090), we can re-enable the HAL service.

Bug: 291228655
Bug: 306364873
Change-Id: I543310092ad6430a2dee30ae0b950fadbe869e15
2024-03-25 16:39:53 +00:00
Android Build Coastguard Worker
1d6a2716bf Snap for 11619294 from 2b9b7cc688 to 24Q3-release
Change-Id: I8a4ca7264b820802acb74b8c3b4c247922d7cb84
2024-03-23 21:01:54 +00:00
Android Build Coastguard Worker
4a08590c62 Snap for 11617975 from 596f6ab199 to 24Q3-release
Change-Id: Ib8ecb6cac024d03a91615e5b4ace5e66d9dc4230
2024-03-23 01:01:54 +00:00
Android Build Coastguard Worker
e72ab8a2e6 Snap for 11617975 from a929e8bc02 to 24Q3-release
Change-Id: Ibced24b9a07c22f4e56a1fd7fba53583aeffee74
2024-03-23 01:01:53 +00:00
Hungyen Weng
2b9b7cc688 Allow modem_svc to access modem files and perfetto
Bug: 330730987

Test: Confirmed that modem_svc is able to access token db files in modem partition
Test: Confiemed that modem_svc can send traces to perfetto

Change-Id: Id50a1fc3b343be9eec834418638c689d8ea56b35
2024-03-22 23:53:34 +00:00
David Drysdale
a929e8bc02 Enable Secretkeeper HAL service on gs201
The prebuilts on `main` have been updated to include:
- the Secretkeeper TA in Trusty (in ab/11346410)
- the ABL changes to retrieve the Secretkeeper identity pub key.

for the relevant devices:
- pantah (http://ag/26396674 to Trusty ab/11498491)
- felix (http://ag/26385511 to Trusty ab/11498491)
- lynx (http://ag/26395689 to Trusty ab/11498491)
- tangorpro (http://ag/26396492 to Trusty ab/11498491)

So enable the corresponding HAL service for Secretkeeper when the
relevant build flag is enabled.

Bug: 291228655
Bug: 306364873
Test: VtsSecretkeeperTargetTest on cheetah
Change-Id: I42804579ab4ff5a8ac0edd48fead8631f580dc37
2024-03-22 14:22:46 +00:00
Spade Lee
596f6ab199 pixelstats_vendor: add logbuffer_device r_file_perms
avc: denied { read } for name="logbuffer_maxfg_monitor" dev="tmpfs" ino=1034 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0

Bug: 329174074
Test: no denied log, and able to read logbuffer in pixelstats_vendor
Change-Id: Ia591a091fe470c2c367b80b8f1ef9eea6002462c
Signed-off-by: Spade Lee <spadelee@google.com>
2024-03-22 07:30:26 +00:00
Spade Lee
9a1ff5f804 pixelstats: gs201: add history validation path
Bug: 329174074
Change-Id: I8830d4a7532d8900abdcf78ba7ab1c141b47c1b4
Signed-off-by: Spade Lee <spadelee@google.com>
2024-03-22 07:30:26 +00:00
Android Build Coastguard Worker
c9b03707e2 Snap for 11610847 from 269f1640d8 to 24Q3-release
Change-Id: I9448601862609ae9c1d729a7d376a7e02a9c3313
2024-03-21 23:02:01 +00:00
Chris Lu
ecef8c5764 gs201: upgrade IDisplay to V11
Bug: 307787644
Test: build pass
Change-Id: Ia845a41693fb33748425b8ac753c665b8f85d954
2024-03-21 07:30:30 +00:00
Android Build Coastguard Worker
f19310d140 Snap for 11603317 from 66f9bd483b to 24Q3-release
Change-Id: I7f26e2dba271f55106d2e9e346719027773d01e2
2024-03-20 23:02:27 +00:00
Spade Lee
269f1640d8 sepolicy: allow kernel to search vendor debugfs
audit: type=1400 audit(1710259012.824:4): avc:  denied  { search } for  pid=128 comm="kworker/3:1" name="max77779fg" dev="debugfs" ino=24204 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
audit: type=1400 audit(1710427790.680:2): avc:  denied  { search } for  pid=10 comm="kworker/u16:1" name="gvotables" dev="debugfs" ino=10582 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_votable_debugfs:s0 tclass=dir permissive=1
audit: type=1400 audit(1710427790.680:3): avc:  denied  { search } for  pid=211 comm="kworker/u16:4" name="google_charger" dev="debugfs" ino=16673 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_charger_debugfs:s0 tclass=dir permissive=1

Bug: 328016570
Bug: 329317898
Test: check all debugfs folders are correctly mounted
Change-Id: I7ca3804056bbfd8459bac2c029a494767f3ae1a6
Signed-off-by: Spade Lee <spadelee@google.com>
2024-03-20 18:17:15 +00:00
Vinay Kalia
66f9bd483b gs201: bigocean: Enable width-height swap am: 1d318e584a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/26588493

Change-Id: I6292e2b41217739593a270e807c7a924ab161297
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-20 09:35:55 +00:00
Vinay Kalia
1d318e584a gs201: bigocean: Enable width-height swap
bug: 328331219
Test: android.mediav2.cts.CodecInfoTest#testResolutionSupport
      [29_video/av01_c2.google.av1.decoder]

Change-Id: Ib57dbaf32c2198e755e123cd894514bce5fb212e
Signed-off-by: Vinay Kalia <vinaykalia@google.com>
(cherry picked from commit dbec97c34f)
2024-03-20 09:14:34 +00:00
Android Build Coastguard Worker
c4db19375f Snap for 11597038 from b579c61002 to 24Q3-release
Change-Id: Ibffa549f052ebe9aa0aa88d16af80bca2110f476
2024-03-19 23:02:24 +00:00
Shashwat Razdan
b579c61002 [automerger skipped] Adding android.software.contextualsearch to gs-201 devices. am: 465d16d0d3 -s ours
am skip reason: Merged-In Iad8cd8a859299a5a60e0bdc569f7da4756bb95eb with SHA-1 e9e4f853a6 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/26574028

Change-Id: I54b87136cb358118a98b0b81e2ce3744f08a2a84
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-19 08:29:05 +00:00
Shashwat Razdan
465d16d0d3 Adding android.software.contextualsearch to gs-201 devices.
Bug: 326143814
Test: Built and tested on device
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e9e4f853a6847a55f2bedc8fc37c17f44c1fa743)
Merged-In: Iad8cd8a859299a5a60e0bdc569f7da4756bb95eb
Change-Id: Iad8cd8a859299a5a60e0bdc569f7da4756bb95eb
CP feature CLs to 24d1-dev
2024-03-13 23:58:28 +00:00
Android Build Coastguard Worker
4be3c5082f Snap for 11571437 from 2747579f1e to 24Q3-release
Change-Id: I36fd5548fa045008aca2579f23919b11648c3457
2024-03-13 23:02:06 +00:00
Android Build Coastguard Worker
77f474f321 Snap for 11571437 from 5efe68a502 to 24Q3-release
Change-Id: I76dd81e880ff8c2725158c7fdd99d305e8f96f89
2024-03-13 23:02:05 +00:00
Wilson Sung
2747579f1e Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 329380891
Test: scanBugreport
Bug: 329381126
Test: scanAvcDeniedLogRightAfterReboot
Bug: 329380363
Change-Id: I604c091a24f3f13f7a354c08c210deeaa9ac9cb1
2024-03-13 09:28:36 +00:00
Hongyang Jiao
5efe68a502 Add betterbug.mk to gs201
Test: manual test
Bug: 322543833
Change-Id: Ie1b8157c8687bc4ec9bb00feb47cbcc130d59ee0
2024-03-13 04:29:58 +00:00
Chungro Lee
5dc71cfae1 pixelstats: move learning/model load path to sysfs
Reporting learning(relaxation) and model loading once a day
 * learning and model loading path moved from uevent to
   sysfs collector.

Bug: 329124192
Change-Id: I91039ce3a8ee4630a76113ef7ae6be3bc6908f64
Signed-off-by: Chungro Lee <chungro@google.com>
2024-03-13 01:29:30 +00:00
Android Build Coastguard Worker
fb3267e969 Snap for 11565217 from d01ca34870 to 24Q3-release
Change-Id: Ice5f115a9a32c94c5b58b1785afabfc7e0616160
2024-03-12 23:02:22 +00:00
Android Build Coastguard Worker
a50d837954 Snap for 11565217 from dbec97c34f to 24Q3-release
Change-Id: I380f2df7ce86bef9a64cc36f43e3456a1ced13a1
2024-03-12 23:02:21 +00:00
Thiébaud Weksteen
d01ca34870 [automerger skipped] Remove persist.bootanim.color property definitions am: ece5909d1c am: e1d9702dad -s ours
am skip reason: Merged-In I9d92456d7e790398a79a941738e3290975f7b659 with SHA-1 4baa59a176 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/2995061

Change-Id: Ifb107af725886c5c99d4c4d37224e712bdb87913
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-12 06:40:18 +00:00
Thiébaud Weksteen
e1d9702dad Remove persist.bootanim.color property definitions am: ece5909d1c
Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/2995061

Change-Id: I63f41da6a07965a0a4584a27a386fd736e42721d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-12 05:57:14 +00:00
Vinay Kalia
dbec97c34f gs201: bigocean: Enable width-height swap
bug: 328331219
Test: android.mediav2.cts.CodecInfoTest#testResolutionSupport
      [29_video/av01_c2.google.av1.decoder]

Change-Id: Ib57dbaf32c2198e755e123cd894514bce5fb212e
Signed-off-by: Vinay Kalia <vinaykalia@google.com>
2024-03-12 03:17:54 +00:00
Android Build Coastguard Worker
bdc57b8c11 Snap for 11558480 from d0d4a07d3a to 24Q3-release
Change-Id: I2aa9dd6f8335a2bac85b49e2a8126e522debdd3b
2024-03-11 23:02:00 +00:00
Poompatai Puntitpong
d0d4a07d3a bt: set rfkill device nodes permission setting on early_boot stage
move the rfkill permission setting from post-fs-data to early_boot
stage because the kernel/net/rfkill/rfkill.ko may not be loaded on
post-fs-data stage and cause the permission setting failed.

Test: m
Bug: 323377234
Change-Id: Ibf3862a5e0f4554e8df5c2ed1c76d460bbd5e543
2024-03-11 09:04:43 +00:00
Android Build Coastguard Worker
76c2947ce6 Snap for 11551442 from 2db6be5503 to 24Q3-release
Change-Id: I63d4a73b275af8e549523f8c568db83d25ff7181
2024-03-09 02:02:19 +00:00
George Lee
2db6be5503 bcl: Adjust GPU LIGHT clk divider ratio am: 59c673f376
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201/+/26514115

Change-Id: I09753bd0e7a523cf632b2bcb1d85bc8ea574e086
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-08 18:03:19 +00:00
George Lee
59c673f376 bcl: Adjust GPU LIGHT clk divider ratio
Set GPU LIGHT clk divider ratios to /2.

Bug: 327700285
Test: Confirm no prints like:
"28000000.mali: Ctx 8349_23 Group 0 CSG 3 CSI: 3"
while running GFXBench under LIGHT MITIGATION
Change-Id: I4b62b33c0b72e5a053f477943379727d58f7298e
Signed-off-by: George Lee <geolee@google.com>
(cherry picked from commit 43d42739b5)
2024-03-08 15:18:11 +00:00
Thiébaud Weksteen
ece5909d1c Remove persist.bootanim.color property definitions
These now belong to the platform policy.

Bug: 321088135
Test: build
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:4baa59a176f6c4d287871f297b1d6481c8882379)
Merged-In: I9d92456d7e790398a79a941738e3290975f7b659
Change-Id: I9d92456d7e790398a79a941738e3290975f7b659
2024-03-08 01:38:12 +00:00
Android Build Coastguard Worker
8c9b7435e5 Snap for 11545716 from 002d891a05 to 24Q3-release
Change-Id: I1e9bd99e914a6b99204e0859bf8b90f179d27b79
2024-03-08 00:01:56 +00:00
Android Build Coastguard Worker
5720ce62cf Snap for 11545716 from 4626bffc89 to 24Q3-release
Change-Id: If46a22515c7d1e5049dd6f8ab6422b1345ca8405
2024-03-08 00:01:55 +00:00
Xin Li
4626bffc89 [automerger skipped] Merge Android 14 QPR2 to AOSP main am: 755f7b7f51 -s ours am: df968605a9 -s ours
am skip reason: Merged-In I6d87c71b72050405370a19801b9e49ef46c5d3e0 with SHA-1 25172cefce is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/2989997

Change-Id: Ie15c4c3c9d2fc1bf83b29a3348f6367adff531be
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-07 10:46:45 +00:00
Xin Li
002d891a05 [automerger skipped] Merge Android 14 QPR2 to AOSP main am: a4ca12105a -s ours am: 5fc9504894 -s ours
am skip reason: Merged-In I75fb73fcb7f1adbcc511fec0e64c9fbd311e5e0c with SHA-1 0395eebcad is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/2989097

Change-Id: I28dd491e45593d69fa8a4679bd4905bb76980731
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-07 10:46:21 +00:00
Xin Li
df968605a9 [automerger skipped] Merge Android 14 QPR2 to AOSP main am: 755f7b7f51 -s ours
am skip reason: Merged-In I6d87c71b72050405370a19801b9e49ef46c5d3e0 with SHA-1 25172cefce is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201/+/2989997

Change-Id: I66d6d793a69616b202f4c08022a1eba411623fbc
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-07 09:55:20 +00:00
Xin Li
5fc9504894 [automerger skipped] Merge Android 14 QPR2 to AOSP main am: a4ca12105a -s ours
am skip reason: Merged-In I75fb73fcb7f1adbcc511fec0e64c9fbd311e5e0c with SHA-1 0395eebcad is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs201-sepolicy/+/2989097

Change-Id: I3978083a92f1c630eedbf1d293fc19c0485dac0c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-07 09:54:55 +00:00
Android Build Coastguard Worker
0045db85d6 Snap for 11540345 from e9e4f853a6 to 24Q3-release
Change-Id: I9641c84f1ca6c3414d7e487c8682d01b3aefa3ad
2024-03-07 01:51:48 +00:00
Xin Li
755f7b7f51 Merge Android 14 QPR2 to AOSP main
Bug: 319669529
Merged-In: I6d87c71b72050405370a19801b9e49ef46c5d3e0
Change-Id: Ib1cfef81086152f78f1cc9514ba9ef581d1d9d6b
2024-03-06 09:29:48 -08:00
Xin Li
a4ca12105a Merge Android 14 QPR2 to AOSP main
Bug: 319669529
Merged-In: I75fb73fcb7f1adbcc511fec0e64c9fbd311e5e0c
Change-Id: I1f1180e489bba5e4f74339bc7b1f076c4efb52e3
2024-03-06 09:29:48 -08:00
Shashwat Razdan
e9e4f853a6 Adding android.software.contextualsearch to gs-201 devices.
Bug: 326143814
Test: Built and tested on device
Change-Id: Iad8cd8a859299a5a60e0bdc569f7da4756bb95eb
2024-03-06 16:32:59 +00:00
Android Build Coastguard Worker
88f1ffda41 Snap for 11533280 from 9088b1a9be to 24Q3-release
Change-Id: I48154565ccdce3ce0db7b98d8b9823d07f9961e0
2024-03-06 00:02:05 +00:00
Android Build Coastguard Worker
e11d690454 Snap for 11533280 from 3f5c12abad to 24Q3-release
Change-Id: I2326ccb6eb4a56edb3b38e76816d5bd3c0991b97
2024-03-06 00:02:04 +00:00
Daniel Chapin
3f5c12abad Revert "Add betterbug mk to gs201"
Revert submission 26348985-bb-sepolicy-poc

Reason for revert: Droidfood blocking bug: b/327991669

Bug: b/327991669

Reverted changes: /q/submissionid:26348985-bb-sepolicy-poc

Change-Id: Id77188dd9f6f5acaed1506a9489f5d6f9874dde9
2024-03-05 20:38:07 +00:00
George Lee
43d42739b5 bcl: Adjust GPU LIGHT clk divider ratio
Set GPU LIGHT clk divider ratios to /2.

Bug: 327700285
Test: Confirm no prints like:
"28000000.mali: Ctx 8349_23 Group 0 CSG 3 CSI: 3"
while running GFXBench under LIGHT MITIGATION
Change-Id: I4b62b33c0b72e5a053f477943379727d58f7298e
Signed-off-by: George Lee <geolee@google.com>
2024-03-05 15:41:46 +00:00
Sungtak Lee
9088b1a9be Add AIDL media.c2 into service_contexts
Bug: 321808716
Change-Id: Ib2426b1997517b23d1301f3a1a30d9029d129971
2024-03-05 06:16:54 +00:00
Sungtak Lee
16d25d07b2 Add media.c2 aidl fragments on gs201 based devices
Bug: 321808716
Change-Id: If0f73c6151127ac5cc786a5580446313f9640025
2024-03-05 06:16:54 +00:00
Mark Chang
739450ad3a Add sepolicy include to gs201.
Bug: 325422902
Test: Manual, system booted without sepolicy denied error.

Change-Id: Id0cd182117340159aed00ad55988323bd45ba840
Signed-off-by: Mark Chang <changmark@google.com>
2024-03-05 05:31:39 +00:00
Android Build Coastguard Worker
7a6395dde5 Snap for 11526283 from 1c7d8f80f2 to 24Q3-release
Change-Id: Ia8ee5c75f662e087055fe161d28e8098252b3d87
2024-03-05 00:26:05 +00:00
Devika Krishnadas
e0fbd0d764 Move Gralloc packages to gs-common
Bug: 275906497
Test: Boot succeeds

Change-Id: I879a5ef8365abe018c501cdb0b06c9753e0e5902
Signed-off-by: Devika Krishnadas <kdevika@google.com>
2024-03-04 22:13:50 +00:00
Android Build Coastguard Worker
a5964e3a75 Snap for 11520864 from 85b26e93cc to 24Q3-release
Change-Id: I03a8604280f2de528198731632b344122411a2e2
2024-03-02 02:02:28 +00:00
Android Build Coastguard Worker
a94b81f42a Snap for 11504269 from 1e0e9963e3 to 24Q3-release
Change-Id: Ic15394d37eefad92f0bdc9143119684f946102e1
2024-02-28 00:02:51 +00:00
Android Build Coastguard Worker
49f3ee0e59 Snap for 11504269 from 5e9bc66da0 to 24Q3-release
Change-Id: I8af0f9d7396247101efa7f08547232da9827d6d3
2024-02-28 00:02:50 +00:00
Android Build Coastguard Worker
cec3e4ccf3 Snap for 11492556 from d9b51a61ce to 24Q3-release
Change-Id: If2b481ec36dcb7a1efd9e35c3b7bcbfe3172e991
2024-02-24 02:16:48 +00:00
Android Build Coastguard Worker
eb50eb567f Snap for 11486189 from 9be1081f00 to 24Q3-release
Change-Id: Iab3d35a07bb437b4824012e9322205fe0679947a
2024-02-23 00:02:45 +00:00
Android Build Coastguard Worker
45aef7afe1 Snap for 11479750 from 3edeae32e0 to 24Q3-release
Change-Id: Ifb1a15ecf32bf28efdf5dfbae902593163b18f4b
2024-02-22 00:03:02 +00:00
Android Build Coastguard Worker
2fab474142 Snap for 11479750 from 967204e373 to 24Q3-release
Change-Id: I7b9be722eedbba4061a912126c1eb79c4a56fdcb
2024-02-22 00:03:02 +00:00
Android Build Coastguard Worker
7a10b815fb Merge "Snap for 11455877 from 49a63dad63 to 24Q3-release" into 24Q3-release 2024-02-16 01:24:28 +00:00
Android Build Coastguard Worker
c029d4b5e7 Snap for 11455877 from 49a63dad63 to 24Q3-release
Change-Id: I3c86115920d69125df87d52c34f8130d0f99e1b7
2024-02-16 00:23:17 +00:00
Android Build Coastguard Worker
b4795294f5 Snap for 11455651 from 49a63dad63 to 24Q3-release
Change-Id: Ib6149339a22b83d9a3059bbefbd3909612736b2a
2024-02-16 00:14:10 +00:00
Android Build Coastguard Worker
eaa7db12e7 Snap for 11438798 from ba206cfef1 to 24Q3-release
Change-Id: I9f104b34ce17857a066b64d099071e09a2302908
2024-02-13 00:03:17 +00:00
Android Build Coastguard Worker
c2881df361 Snap for 11434705 from 0e6bc4fd5c to 24Q3-release
Change-Id: I32474329a5df3aead8fd1c11b8f3522f832d8aba
2024-02-10 22:02:24 +00:00
Android Build Coastguard Worker
5039d77bd7 Snap for 11426397 from bef1509d6c to 24Q3-release
Change-Id: Ia2f8c554e8220f029eb9a4d1e8eed7b09107e72f
2024-02-09 00:03:04 +00:00
79 changed files with 1843 additions and 797 deletions

View File

@@ -16,21 +16,18 @@
include build/make/target/board/BoardConfigMainlineCommon.mk
include build/make/target/board/BoardConfigPixelCommon.mk
# Should be uncommented after fixing vndk-sp violation is fixed.
PRODUCT_FULL_TREBLE_OVERRIDE := true
# HACK : To fix up after bring up multimedia devices.
TARGET_SOC := gs201
TARGET_SOC_NAME := google
USES_DEVICE_GOOGLE_GS201 := true
$(call soong_config_set,CitadelProvision,target_soc,gs201)
TARGET_ARCH := arm64
TARGET_ARCH_VARIANT := armv8-2a
TARGET_CPU_ABI := arm64-v8a
TARGET_CPU_VARIANT := cortex-a55
TARGET_CPU_VARIANT_RUNTIME := cortex-a55
# Enable 64-bit for non-zygote.
ZYGOTE_FORCE_64 := true
@@ -50,9 +47,10 @@ BOARD_KERNEL_CMDLINE += dyndbg=\"func alloc_contig_dump_pages +p\"
BOARD_KERNEL_CMDLINE += earlycon=exynos4210,0x10A00000 console=ttySAC0,115200 androidboot.console=ttySAC0 printk.devkmsg=on
BOARD_KERNEL_CMDLINE += cma_sysfs.experimental=Y
BOARD_KERNEL_CMDLINE += cgroup_disable=memory
BOARD_KERNEL_CMDLINE += rcupdate.rcu_expedited=1 rcu_nocbs=all
BOARD_KERNEL_CMDLINE += rcupdate.rcu_expedited=1 rcu_nocbs=all rcutree.enable_rcu_lazy
BOARD_KERNEL_CMDLINE += stack_depot_disable=off page_pinner=on
BOARD_KERNEL_CMDLINE += swiotlb=1024
BOARD_KERNEL_CMDLINE += cgroup.memory=nokmem
BOARD_KERNEL_CMDLINE += disable_dma32=on
BOARD_BOOTCONFIG += androidboot.boot_devices=14700000.ufs
@@ -77,7 +75,7 @@ TARGET_RECOVERY_FSTAB_GENRULE := gen_fstab.gs201
TARGET_RECOVERY_PIXEL_FORMAT := ABGR_8888
TARGET_RECOVERY_UI_MARGIN_HEIGHT := 165
TARGET_RECOVERY_UI_LIB := \
librecovery_ui_pixel \
//hardware/google/pixel/recovery:librecovery_ui_pixel \
libfstab
AB_OTA_UPDATER := true
@@ -197,7 +195,16 @@ BOARD_SUPPORT_MFC_ENC_RGB := true
BOARD_USE_BLOB_ALLOCATOR := false
BOARD_SUPPORT_MFC_ENC_BT2020 := true
BOARD_SUPPORT_FLEXIBLE_P010 := true
$(call soong_config_set,video_codec,target_soc_name,$(TARGET_SOC_NAME))
$(call soong_config_set_bool,video_codec,board_use_codec2_hidl_1_2,$(BOARD_USE_CODEC2_HIDL_1_2))
$(call soong_config_set_bool,video_codec,board_use_csc_filter,$(BOARD_USE_CSC_FILTER))
$(call soong_config_set_bool,video_codec,board_use_dec_sw_csc,$(BOARD_USE_DEC_SW_CSC))
$(call soong_config_set_bool,video_codec,board_use_enc_sw_csc,$(BOARD_USE_ENC_SW_CSC))
$(call soong_config_set_bool,video_codec,board_support_mfc_enc_rgb,$(BOARD_SUPPORT_MFC_ENC_RGB))
$(call soong_config_set_bool,video_codec,board_use_blob_allocator,$(BOARD_USE_BLOB_ALLOCATOR))
$(call soong_config_set_bool,video_codec,board_support_mfc_enc_bt2020,$(BOARD_SUPPORT_MFC_ENC_BT2020))
$(call soong_config_set_bool,video_codec,board_support_flexible_p010,$(BOARD_SUPPORT_FLEXIBLE_P010))
$(call soong_config_set_bool,video_codec,board_use_codec2_aidl,$(if $(BOARD_USE_CODEC2_AIDL),true,false))
########################
BOARD_SUPER_PARTITION_SIZE := 8531214336
@@ -270,6 +277,8 @@ BOARD_USES_EXYNOS_AFBC_FEATURE := true
BOARD_LIBACRYL_DEFAULT_COMPOSITOR := fimg2d_gs201
BOARD_LIBACRYL_G2D_HDR_PLUGIN := libacryl_hdr_plugin
$(call soong_config_set,acryl,libacryl_g2d_hdr_plugin,//hardware/google/graphics/gs201/libacryl_plugins:libacryl_hdr_plugin)
$(call soong_config_set,acryl,libacryl_c_include,hardware/google/graphics/$(TARGET_BOARD_PLATFORM)/libcap)
# HWCServices
BOARD_USES_HWC_SERVICES := true
@@ -386,9 +395,8 @@ endif
BOARD_VENDOR_KERNEL_MODULES_BLOCKLIST_FILE := $(KERNEL_MODULE_DIR)/vendor_dlkm.modules.blocklist
# Prebuilt kernel modules that are *not* listed in vendor_kernel_boot.modules.load
BOARD_PREBUILT_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES = fips140/fips140.ko
BOARD_PREBUILT_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES = fips140.ko
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_EXTRA = $(foreach k,$(BOARD_PREBUILT_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES),$(if $(wildcard $(KERNEL_MODULE_DIR)/$(k)), $(k)))
KERNEL_MODULES += $(addprefix $(KERNEL_MODULE_DIR)/, $(BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_EXTRA))
# Kernel modules that are listed in vendor_kernel_boot.modules.load
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_FILE := $(strip $(shell cat $(KERNEL_MODULE_DIR)/vendor_kernel_boot.modules.load))
@@ -404,9 +412,17 @@ BOARD_VENDOR_KERNEL_MODULES_LOAD := $(strip $(shell cat $(KERNEL_MODULE_DIR)/ven
ifndef BOARD_VENDOR_KERNEL_MODULES_LOAD
$(error vendor_dlkm.modules.load not found or empty)
endif
BOARD_VENDOR_KERNEL_MODULES := $(KERNEL_MODULES)
BOARD_SYSTEM_KERNEL_MODULES_LOAD := $(strip $(shell cat $(KERNEL_MODULE_DIR)/system_dlkm.modules.load))
# staging kernels might have modules split between system/vendor_dlkm. If
# the target defined modules on the system_dlkm image, honor the split.
# Otherwise, assume all modules are stored on the vendor_dlkm image.
ifneq ($(BOARD_SYSTEM_KERNEL_MODULES),)
BOARD_VENDOR_KERNEL_MODULES := $(addprefix $(KERNEL_MODULE_DIR)/, $(notdir $(BOARD_VENDOR_KERNEL_MODULES_LOAD)))
else
BOARD_VENDOR_KERNEL_MODULES := $(KERNEL_MODULES)
endif
BOARD_SYSTEM_KERNEL_MODULES_LOAD := $(strip $(shell cat $(KERNEL_MODULE_DIR)/system_dlkm.modules.load 2>/dev/null))
BOARD_SYSTEM_KERNEL_MODULES := $(addprefix $(KERNEL_MODULE_DIR)/, $(notdir $(BOARD_SYSTEM_KERNEL_MODULES_LOAD)))
# Using BUILD_COPY_HEADERS

View File

@@ -4,6 +4,8 @@
# SPDX-License-Identifier: Apache-2.0
#
BUILD_BROKEN_DUP_RULES := true
DISABLE_ARTIFACT_PATH_REQUIREMENTS := true
SPOOF_FIRST_API_LEVEL_32 := true

View File

@@ -1,13 +1,9 @@
#
# Copyright (C) 2022 The LineageOS Project
#
# SPDX-FileCopyrightText: 2021-2024 The LineageOS Project
# SPDX-FileCopyrightText: 2021-2024 The Calyx Institute
# SPDX-License-Identifier: Apache-2.0
#
# Lineage Health
TARGET_HEALTH_CHARGING_CONTROL_SUPPORTS_DEADLINE := true
TARGET_HEALTH_CHARGING_CONTROL_SUPPORTS_TOGGLE := false
# Manifests
DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE += vendor/lineage/config/device_framework_matrix.xml
DEVICE_MANIFEST_FILE += device/google/gs201/android.hardware.security.rkp-service.citadel.xml

2
OWNERS
View File

@@ -1,2 +1,2 @@
# per-file for Pixel device makefiles, see go/pixel-device-mk-owner-checklist for details.
per-file *.mk=file:device/google/gs-common:main:/OWNERS
per-file *.mk,{**/,}Android.bp=file:device/google/gs-common:main:/MK_OWNERS

2
conf/OWNERS Normal file
View File

@@ -0,0 +1,2 @@
# per-file for Pixel fstab
per-file fstab.*=file:device/google/gs-common:main:/FSTAB_OWNERS

View File

@@ -15,6 +15,15 @@ on init
chown system system /sys/devices/platform/sjtag_gsa/interface/end
chown system system /sys/devices/platform/sjtag_gsa/interface/pubkey
# HSUM separated main user from the SYSTEM user, granting write permissions
# for write only SJTAG sysfs files
chmod 220 /sys/devices/platform/sjtag_ap/interface/auth
chmod 220 /sys/devices/platform/sjtag_ap/interface/begin
chmod 220 /sys/devices/platform/sjtag_ap/interface/end
chmod 220 /sys/devices/platform/sjtag_gsa/interface/auth
chmod 220 /sys/devices/platform/sjtag_gsa/interface/begin
chmod 220 /sys/devices/platform/sjtag_gsa/interface/end
on property:vendor.debug.ramdump.force_crash=true
write /sys/kernel/pixel_debug/trigger "null"

View File

@@ -1,3 +1,4 @@
import /vendor/etc/init/hw/init.gs201.storage.rc
import /vendor/etc/init/hw/init.gs201.usb.rc
import android.hardware.drm@1.2-service.widevine.rc
import init.exynos.sensorhub.rc
@@ -18,10 +19,6 @@ on init
# Disable util-awareness
write /proc/vendor_sched/teo_util_threshold "1024 1024 1024"
# Boot time fs tuning
write /sys/block/sda/queue/scheduler bfq
write /sys/block/sda/queue/iosched/slice_idle 0
chown system system /proc/vendor_sched/groups/bg/set_task_group
chown system system /proc/vendor_sched/groups/cam/set_task_group
chown system system /proc/vendor_sched/groups/fg/set_task_group
@@ -50,6 +47,8 @@ on init
chown system system /proc/vendor_sched/prefer_idle_clear
chown system system /proc/vendor_sched/pmu_poll_enable
chown system system /proc/vendor_sched/pmu_poll_time
chown system system /proc/vendor_sched/uclamp_fork_reset_clear
chown system system /proc/vendor_sched/uclamp_fork_reset_set
chown system system /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/lcpi_threshold
chown system system /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/spc_threshold
chown system system /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/limit_frequency
@@ -97,11 +96,90 @@ on init
chmod 0220 /proc/vendor_sched/groups/ota/set_proc_group
chmod 0220 /proc/vendor_sched/prefer_idle_set
chmod 0220 /proc/vendor_sched/prefer_idle_clear
chmod 0220 /proc/vendor_sched/pmu_poll_enable
chmod 0660 /proc/vendor_sched/pmu_poll_enable
chmod 0220 /proc/vendor_sched/pmu_poll_time
chmod 0220 /proc/vendor_sched/uclamp_fork_reset_clear
chmod 0220 /proc/vendor_sched/uclamp_fork_reset_set
start vendor.keymaster-4-0
# Change permission of sched qos nodes
chown system system /proc/vendor_sched/sched_qos/adpf_set
chown system system /proc/vendor_sched/sched_qos/adpf_clear
chown system system /proc/vendor_sched/sched_qos/auto_uclamp_max_set
chown system system /proc/vendor_sched/sched_qos/auto_uclamp_max_clear
chown system system /proc/vendor_sched/sched_qos/boost_prio_set
chown system system /proc/vendor_sched/sched_qos/boost_prio_clear
chown system system /proc/vendor_sched/sched_qos/preempt_wakeup_set
chown system system /proc/vendor_sched/sched_qos/preempt_wakeup_clear
chown system system /proc/vendor_sched/sched_qos/prefer_fit_set
chown system system /proc/vendor_sched/sched_qos/prefer_fit_clear
chown system system /proc/vendor_sched/sched_qos/prefer_high_cap_set
chown system system /proc/vendor_sched/sched_qos/prefer_high_cap_clear
chown system system /proc/vendor_sched/sched_qos/prefer_idle_set
chown system system /proc/vendor_sched/sched_qos/prefer_idle_clear
chown system system /proc/vendor_sched/sched_qos/rampup_multiplier_set
chown system system /proc/vendor_sched/sched_qos/rampup_multiplier_clear
chmod 0220 /proc/vendor_sched/sched_qos/adpf_set
chmod 0220 /proc/vendor_sched/sched_qos/adpf_clear
chmod 0220 /proc/vendor_sched/sched_qos/auto_uclamp_max_set
chmod 0220 /proc/vendor_sched/sched_qos/auto_uclamp_max_clear
chmod 0220 /proc/vendor_sched/sched_qos/boost_prio_set
chmod 0220 /proc/vendor_sched/sched_qos/boost_prio_clear
chmod 0220 /proc/vendor_sched/sched_qos/preempt_wakeup_set
chmod 0220 /proc/vendor_sched/sched_qos/preempt_wakeup_clear
chmod 0220 /proc/vendor_sched/sched_qos/prefer_fit_set
chmod 0220 /proc/vendor_sched/sched_qos/prefer_fit_clear
chmod 0220 /proc/vendor_sched/sched_qos/prefer_high_cap_set
chmod 0220 /proc/vendor_sched/sched_qos/prefer_high_cap_clear
chmod 0220 /proc/vendor_sched/sched_qos/prefer_idle_set
chmod 0220 /proc/vendor_sched/sched_qos/prefer_idle_clear
chmod 0220 /proc/vendor_sched/sched_qos/rampup_multiplier_set
chmod 0220 /proc/vendor_sched/sched_qos/rampup_multiplier_clear
# Enable sched_qos for some groups
write /proc/vendor_sched/groups/ta/qos_adpf_enable 1
write /proc/vendor_sched/groups/ta/qos_auto_uclamp_max_enable 1
write /proc/vendor_sched/groups/ta/qos_boost_prio_enable 1
write /proc/vendor_sched/groups/ta/qos_preempt_wakeup_enable 1
write /proc/vendor_sched/groups/ta/qos_prefer_fit_enable 1
write /proc/vendor_sched/groups/ta/qos_prefer_high_cap_enable 1
write /proc/vendor_sched/groups/ta/qos_prefer_idle_enable 1
write /proc/vendor_sched/groups/ta/qos_rampup_multiplier_enable 1
write /proc/vendor_sched/groups/fg/qos_adpf_enable 1
write /proc/vendor_sched/groups/fg/qos_auto_uclamp_max_enable 1
write /proc/vendor_sched/groups/fg/qos_boost_prio_enable 1
write /proc/vendor_sched/groups/fg/qos_preempt_wakeup_enable 1
write /proc/vendor_sched/groups/fg/qos_prefer_fit_enable 1
write /proc/vendor_sched/groups/fg/qos_prefer_high_cap_enable 1
write /proc/vendor_sched/groups/fg/qos_prefer_idle_enable 1
write /proc/vendor_sched/groups/fg/qos_rampup_multiplier_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_adpf_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_auto_uclamp_max_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_boost_prio_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_preempt_wakeup_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_prefer_fit_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_prefer_high_cap_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_prefer_idle_enable 1
write /proc/vendor_sched/groups/fg_wi/qos_rampup_multiplier_enable 1
write /proc/vendor_sched/groups/cam/qos_adpf_enable 1
write /proc/vendor_sched/groups/cam/qos_auto_uclamp_max_enable 1
write /proc/vendor_sched/groups/cam/qos_prefer_fit_enable 1
write /proc/vendor_sched/groups/cam/qos_prefer_high_cap_enable 1
write /proc/vendor_sched/groups/cam/qos_prefer_idle_enable 1
write /proc/vendor_sched/groups/cam/qos_rampup_multiplier_enable 1
write /proc/vendor_sched/groups/cam_power/qos_adpf_enable 1
write /proc/vendor_sched/groups/cam_power/qos_auto_uclamp_max_enable 1
write /proc/vendor_sched/groups/cam_power/qos_prefer_fit_enable 1
write /proc/vendor_sched/groups/cam_power/qos_prefer_high_cap_enable 1
write /proc/vendor_sched/groups/cam_power/qos_prefer_idle_enable 1
write /proc/vendor_sched/groups/cam_power/qos_rampup_multiplier_enable 1
write /proc/vendor_sched/groups/rt/qos_adpf_enable 1
write /proc/vendor_sched/groups/rt/qos_rampup_multiplier_enable 1
write /proc/vendor_sched/groups/sf/qos_adpf_enable 1
write /proc/vendor_sched/groups/sf/qos_rampup_multiplier_enable 1
# ZRAM setup
write /sys/block/zram0/comp_algorithm lz77eh
write /proc/sys/vm/page-cluster 0
@@ -140,16 +218,6 @@ on init
write /sys/class/net/rmnet6/queues/rx-0/rps_cpus fe
write /sys/class/net/rmnet7/queues/rx-0/rps_cpus fe
# Create UDS structure for base VR services.
mkdir /dev/socket/pdx 0775 system system
mkdir /dev/socket/pdx/system 0775 system system
mkdir /dev/socket/pdx/system/buffer_hub 0775 system system
mkdir /dev/socket/pdx/system/performance 0775 system system
mkdir /dev/socket/pdx/system/vr 0775 system system
mkdir /dev/socket/pdx/system/vr/display 0775 system system
mkdir /dev/socket/pdx/system/vr/pose 0775 system system
mkdir /dev/socket/pdx/system/vr/sensors 0775 system system
# Boot time 183626384
write /proc/vendor_sched/groups/ta/uclamp_min 159
write /proc/vendor_sched/groups/ta/prefer_idle 1
@@ -161,14 +229,11 @@ on init
# governor setting
write /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor sched_pixel
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/up_rate_limit_us 500
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/down_rate_limit_us 5000
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/down_rate_limit_scale_pow 2
write /sys/devices/system/cpu/cpu4/cpufreq/scaling_governor sched_pixel
write /sys/devices/system/cpu/cpu4/cpufreq/sched_pixel/up_rate_limit_us 500
write /sys/devices/system/cpu/cpu4/cpufreq/sched_pixel/down_rate_limit_us 20000
write /sys/devices/system/cpu/cpu6/cpufreq/scaling_governor sched_pixel
write /sys/devices/system/cpu/cpu6/cpufreq/sched_pixel/up_rate_limit_us 500
write /sys/devices/system/cpu/cpu6/cpufreq/sched_pixel/down_rate_limit_us 20000
# memlat cpuidle awareness setting
write /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu0_memlat@17000010/memlat_cpuidle_state_aware 2
@@ -260,6 +325,7 @@ on init
chown system system /sys/class/power_supply/wireless/device/version
chown system system /sys/class/power_supply/wireless/device/features
chown system system /sys/class/power_supply/wireless/device/authtype
chown system system /sys/class/power_supply/wireless/device/authstart
# Adaptive charge
chown system system /sys/class/power_supply/battery/charge_deadline
@@ -339,6 +405,11 @@ on late-fs
# Mount RW partitions which need run fsck
mount_all --late
on late-init
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/down_rate_limit_us 5000
write /sys/devices/system/cpu/cpu4/cpufreq/sched_pixel/down_rate_limit_us 20000
write /sys/devices/system/cpu/cpu6/cpufreq/sched_pixel/down_rate_limit_us 20000
on post-fs-data
# Log data folder
mkdir /data/vendor 0771 radio system
@@ -377,8 +448,8 @@ on post-fs-data
restorecon /sys/kernel/debug/tracing/trace_marker
# ranging sensor
chown system system /dev/stmvl53l1_ranging
chmod 0660 /dev/stmvl53l1_ranging
chown system system /dev/ispolin_ranging
chmod 0660 /dev/ispolin_ranging
# Factory calibration files
chmod 0771 /mnt/vendor/persist/camera
@@ -687,6 +758,12 @@ on property:sys.boot_completed=1
write /dev/cpuset/camera-daemon/cpus ${persist.device_config.vendor_system_native.camera-daemon_cpuset:-0-7}
setprop vendor.powerhal.init 1
# Setup scheduler parameters
write /proc/vendor_sched/min_granularity_ns 1000000
write /proc/vendor_sched/latency_ns 8000000
write /proc/vendor_sched/max_load_balance_interval 1
write /proc/vendor_sched/enable_hrtick 1
# Setup final cpu.uclamp
write /proc/vendor_sched/groups/ta/uclamp_min 1
write /proc/vendor_sched/groups/fg/uclamp_min 0
@@ -847,6 +924,7 @@ service init_display /vendor/bin/init.display.sh
# bugreport is triggered by holding down volume down, volume up and power
service bugreport /system/bin/dumpstate -d -p -z
class main
user root
disabled
oneshot
keycodes 114 115 116
@@ -875,10 +953,12 @@ on property:ro.build.fingerprint=*
write /sys/module/debug_kinfo/parameters/build_info ${ro.build.fingerprint}
# Bluetooth
on post-fs-data
on early-boot
chown bluetooth system /sys/devices/platform/175b0000.serial/serial0/serial0-0/bluetooth/hci0/rfkill0/state
chown bluetooth system /sys/devices/platform/odm/odm:btbcm/rfkill/rfkill0/state
chown bluetooth system /sys/devices/platform/odm/odm:btbcm/rfkill/rfkill2/state
on post-fs-data
chown bluetooth system /proc/bluetooth/sleep/btwake
chown bluetooth system /proc/bluetooth/sleep/lpm
chown bluetooth system /proc/bluetooth/sleep/btwrite
@@ -905,39 +985,11 @@ on property:vendor.brownout.mitigation.ready=1
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/uvlo2_lvl 3000
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/soft_ocp_cpu2_lvl 12000
write /sys/devices/virtual/pmic/mitigation/clock_div/tpu_clk_div 0x1
write /sys/devices/virtual/pmic/mitigation/clock_div/gpu_clk_div 0x1
write /sys/devices/virtual/pmic/mitigation/clock_div/gpu_clk_div 0x81 #mask VDROOP1
write /sys/devices/virtual/pmic/mitigation/clock_div/cpu1_clk_div 0x381
write /sys/devices/virtual/pmic/mitigation/clock_div/cpu2_clk_div 0x1
on property:vendor.thermal.link_ready=1
# BCL
chown system system /dev/thermal/tz-by-name/soc/mode
chown system system /dev/thermal/tz-by-name/vdroop2/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/vdroop2/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/vdroop1/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/vdroop1/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/smpl_gm/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/smpl_gm/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_cpu1/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_cpu1/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_cpu2/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_cpu2/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_tpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_tpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_gpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_gpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu1/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu1/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu2/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu2/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_tpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_tpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_gpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_gpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soc/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soc/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/batoilo/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/batoilo/trip_point_0_hyst
# Thermal
chown system system /dev/thermal/tz-by-name/skin_therm/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/skin_therm/trip_point_0_hyst

View File

@@ -417,3 +417,7 @@ on property:ro.bootmode=usbuwb
on property:vendor.usb.contaminantdisable=true
exec /vendor/bin/hw/disable_contaminant_detection.sh
# WAR for kernel 5.10 with CONFIG_USB_DUMMY_HCD enabled
on property:sys.usb.controller=dummy_udc.0
setprop sys.usb.controller "11210000.dwc3"

View File

@@ -11,7 +11,7 @@ on post-fs-data
mkdir /data/vendor/slog 0771 system system
# Modem extended log folder
mkdir /data/vendor/radio/extended_logs 0770 radio system
mkdir /data/vendor/radio/extended_logs 0771 radio system
# Modem MDS log folder
mkdir /data/vendor/radio/mds 0771 radio system

View File

@@ -41,12 +41,15 @@
</exception>
-->
<exception package="com.google.android.GoogleCamera">
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
</exception>
<exception
package="com.google.android.apps.camera.services">
<!-- Camera -->
<permission name="android.permission.CAMERA" fixed="false"/>
<!-- Camera Connectivity -->
<permission name="android.permission.ACCESS_FINE_LOCATION" fixed="false"/>
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
<permission name="android.permission.BLUETOOTH_CONNECT" fixed="false"/>
<permission name="android.permission.BLUETOOTH_SCAN" fixed="false"/>
@@ -76,6 +79,8 @@
<permission name="android.permission.ACTIVITY_RECOGNITION" fixed="false"/>
<!-- Notifications -->
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
<!-- Used by Bluetooth Module to collect bluetooth info -->
<permission name="android.permission.BLUETOOTH_CONNECT" fixed="false"/>
</exception>
<exception
@@ -173,5 +178,16 @@
<!-- Notifications -->
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
</exception>
<exception package="com.google.android.apps.pixel.relationships">
<permission name="android.permission.CALL_PHONE" fixed="false"/>
<permission name="android.permission.READ_CALL_LOG" fixed="false"/>
<permission name="android.permission.READ_CONTACTS" fixed="false"/>
<permission name="android.permission.WRITE_CONTACTS" fixed="false"/>
</exception>
<exception
package="com.google.android.apps.privacy.wildlife">
<permission name="android.permission.READ_PHONE_STATE" fixed="false"/>
</exception>
</exceptions>

127
device.mk
View File

@@ -16,7 +16,7 @@
include device/google/gs-common/device.mk
include device/google/gs-common/gs_watchdogd/watchdog.mk
include device/google/gs-common/ramdump/ramdump.mk
include device/google/gs-common/ramdump_and_coredump/ramdump_and_coredump.mk
include device/google/gs-common/soc/soc.mk
include device/google/gs-common/soc/freq.mk
include device/google/gs-common/modem/modem.mk
@@ -37,9 +37,11 @@ include device/google/gs-common/sota_app/factoryota.mk
include device/google/gs-common/misc_writer/misc_writer.mk
include device/google/gs-common/gyotaku_app/gyotaku.mk
include device/google/gs-common/bootctrl/bootctrl_aidl.mk
include device/google/gs-common/betterbug/betterbug.mk
ifneq ($(filter cheetah felix panther, $(TARGET_PRODUCT)),)
include device/google/gs-common/bcmbt/dump/dumplog.mk
endif
include device/google/gs-common/fingerprint/fingerprint.mk
TARGET_BOARD_PLATFORM := gs201
@@ -74,13 +76,17 @@ PRODUCT_SOONG_NAMESPACES += \
vendor/google_devices/common/chre/host/hal \
vendor/google/whitechapel/tools \
vendor/google/interfaces \
vendor/google_devices/common/proprietary/confirmatioui_hal \
vendor/google_nos/host/android \
vendor/google_nos/test/system-test-harness \
vendor/google/camera
LOCAL_KERNEL := $(TARGET_KERNEL_DIR)/Image.lz4
ifeq ($(RELEASE_AVF_ENABLE_LLPVM_CHANGES),true)
# Set the environment variable to enable the Secretkeeper HAL service.
SECRETKEEPER_ENABLED := true
endif
# OEM Unlock reporting
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += \
ro.oem_unlock_supported=1
@@ -203,9 +209,19 @@ PRODUCT_PROPERTY_OVERRIDES += \
telephony.active_modems.max_count=2
USE_LASSEN_OEMHOOK := true
# The "power-anomaly-sitril" is added into PRODUCT_SOONG_NAMESPACES when
# $(USE_LASSEN_OEMHOOK) is true and $(BOARD_WITHOUT_RADIO) is not true.
ifneq ($(BOARD_WITHOUT_RADIO),true)
PRODUCT_SOONG_NAMESPACES += vendor/google/tools/power-anomaly-sitril
$(call soong_config_set,sitril,use_lassen_oemhook_with_radio,true)
endif
# Use for GRIL
USES_LASSEN_MODEM := true
$(call soong_config_set, vendor_ril_google_feature, use_lassen_modem, true)
ifneq ($(BOARD_WITHOUT_RADIO),true)
$(call soong_config_set_bool,grilservice,use_google_qns,true)
endif
ifeq ($(USES_GOOGLE_DIALER_CARRIER_SETTINGS),true)
USE_GOOGLE_DIALER := true
@@ -242,15 +258,23 @@ PRODUCT_PACKAGES += \
csffw_image_prebuilt__firmware_prebuilt_todx_mali_csffw.bin \
libGLES_mali \
vulkan.mali \
libOpenCL \
libgpudataproducer \
# Install the OpenCL ICD Loader
PRODUCT_SOONG_NAMESPACES += external/OpenCL-ICD-Loader
PRODUCT_PACKAGES += \
libOpenCL \
mali_icd__customer_pixel_opencl-icd_ARM.icd
ifeq ($(DEVICE_IS_64BIT_ONLY),false)
PRODUCT_PACKAGES += \
mali_icd__customer_pixel_opencl-icd_ARM32.icd
endif
# Mali Configuration Properties
# b/221255664 prevents setting PROTECTED_MAX_CORE_COUNT=2
PRODUCT_VENDOR_PROPERTIES += \
vendor.mali.platform.config=/vendor/etc/mali/platform.config \
vendor.mali.debug.config=/vendor/etc/mali/debug.config \
vendor.mali.base_protected_max_core_count=1 \
vendor.mali.base_protected_max_core_count=4 \
vendor.mali.base_protected_tls_max=67108864 \
vendor.mali.platform_agt_frequency_khz=24576
@@ -259,9 +283,8 @@ PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.hardware.vulkan.version-1_3.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.vulkan.version.xml \
frameworks/native/data/etc/android.hardware.vulkan.level-1.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.vulkan.level.xml \
frameworks/native/data/etc/android.hardware.vulkan.compute-0.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.vulkan.compute.xml \
frameworks/native/data/etc/android.software.vulkan.deqp.level-2023-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.vulkan.deqp.level.xml \
frameworks/native/data/etc/android.software.contextualsearch.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.contextualsearch.xml \
frameworks/native/data/etc/android.software.opengles.deqp.level-2023-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.opengles.deqp.level.xml
frameworks/native/data/etc/android.software.vulkan.deqp.level-2024-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.vulkan.deqp.level.xml \
frameworks/native/data/etc/android.software.opengles.deqp.level-2024-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.opengles.deqp.level.xml
ifeq ($(USE_SWIFTSHADER),true)
PRODUCT_PACKAGES += \
@@ -298,6 +321,7 @@ PRODUCT_VENDOR_PROPERTIES += ro.surface_flinger.prime_shader_cache.ultrahdr=1
DEVICE_MANIFEST_FILE := \
device/google/gs201/manifest.xml
BOARD_USE_CODEC2_AIDL := V1
ifneq (,$(filter aosp_%,$(TARGET_PRODUCT)))
DEVICE_MANIFEST_FILE += \
device/google/gs201/manifest_media_aosp.xml
@@ -337,6 +361,14 @@ PRODUCT_COPY_FILES += \
PRODUCT_COPY_FILES += \
device/google/gs201/conf/init.gs201.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.gs201.rc
ifneq (,$(filter 5.%, $(TARGET_LINUX_KERNEL_VERSION)))
PRODUCT_COPY_FILES += \
device/google/gs201/storage/5.10/init.gs201.storage.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.gs201.storage.rc
else
PRODUCT_COPY_FILES += \
device/google/gs201/storage/6.1/init.gs201.storage.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.gs201.storage.rc
endif
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_COPY_FILES += \
device/google/gs201/conf/init.debug.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.debug.rc \
@@ -364,6 +396,10 @@ PRODUCT_COPY_FILES += \
include device/google/gs-common/insmod/insmod.mk
# Insmod config files
PRODUCT_COPY_FILES += \
$(call find-copy-subdir-files,init.insmod.*.cfg,$(TARGET_KERNEL_DIR),$(TARGET_COPY_OUT_VENDOR_DLKM)/etc)
# For creating dtbo image
PRODUCT_HOST_PACKAGES += \
mkdtimg
@@ -513,10 +549,6 @@ PRODUCT_PROPERTY_OVERRIDES += aaudio.hw_burst_min_usec=2000
PRODUCT_PACKAGES += \
com.android.future.usb.accessory
PRODUCT_PACKAGES += \
android.hardware.graphics.mapper@4.0-impl \
android.hardware.graphics.allocator-V1-service
PRODUCT_PACKAGES += \
android.hardware.memtrack-service.pixel \
libion_exynos \
@@ -572,13 +604,11 @@ PRODUCT_PACKAGES += \
PRODUCT_PACKAGES += \
ConnectivityOverlay
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
f2fs_io \
check_f2fs \
f2fs.fibmap \
dump.f2fs
endif
# Storage dump
include device/google/gs-common/storage/storage.mk
@@ -605,10 +635,8 @@ ifeq (,$(filter true, $(BOARD_WITHOUT_DTLS)))
include device/google/gs-common/dauntless/gsc.mk
endif
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
WvInstallKeybox
endif
# Copy Camera HFD Setfiles
#PRODUCT_COPY_FILES += \
@@ -760,16 +788,25 @@ PRODUCT_COPY_FILES += \
device/google/gs201/media_codecs_performance_c2.xml:$(TARGET_COPY_OUT_VENDOR)/etc/media_codecs_performance_c2.xml \
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2-poolmask=458752 \
debug.c2.use_dmabufheaps=1 \
media.c2.dmabuf.padding=512 \
debug.stagefright.ccodec_delayed_params=1 \
ro.vendor.gpu.dataspace=1
ifneq ($(BOARD_USE_CODEC2_AIDL), )
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2-poolmask=1507328
else
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2-poolmask=458752
endif
# Create input surface on the framework side
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2inputsurface=-1 \
PRODUCT_PROPERTY_OVERRIDES += media.c2.hal.selection=aidl
# 2. OpenMAX IL
PRODUCT_COPY_FILES += \
device/google/gs201/media_codecs.xml:$(TARGET_COPY_OUT_VENDOR)/etc/media_codecs.xml \
@@ -806,15 +843,11 @@ $(call inherit-product, system/core/trusty/trusty-base.mk)
include device/google/gs-common/trusty/trusty.mk
# Trusty unit test and code coverage tool
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
trusty-ut-ctrl \
tipc-test \
trusty_stats_test \
trusty-coverage-controller
endif
include device/google/gs101/confirmationui/confirmationui.mk
trusty-coverage-controller \
# Trusty Secure DPU Daemon
PRODUCT_PACKAGES += \
@@ -905,10 +938,8 @@ $(call inherit-product-if-exists, vendor/samsung_slsi/telephony/$(BOARD_USES_SHA
PRODUCT_PACKAGES += ShannonIms
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
preinstalled-packages-product-gs201-device-debug.xml
endif
PRODUCT_PACKAGES += ShannonRcs
endif
@@ -916,6 +947,7 @@ endif
# Exynos RIL and telephony
# Multi SIM(DSDS)
SIM_COUNT := 2
$(call soong_config_set,sim,sim_count,$(SIM_COUNT))
SUPPORT_MULTI_SIM := true
# Support NR
SUPPORT_NR := true
@@ -934,9 +966,6 @@ USE_EARLY_SEND_DEVICE_INFO := true
ifneq ($(BOARD_WITHOUT_RADIO),true)
$(call inherit-product-if-exists, vendor/samsung_slsi/telephony/$(BOARD_USES_SHARED_VENDOR_TELEPHONY)/common/device-vendor.mk)
# modem_svc_sit daemon
PRODUCT_PACKAGES += modem_svc_sit
# modem logging binary/configs
PRODUCT_PACKAGES += modem_logging_control
@@ -994,13 +1023,11 @@ PRODUCT_COPY_FILES += \
device/google/$(TARGET_BOARD_PLATFORM)/radio/config/Pixel_stability.nprf:$(TARGET_COPY_OUT_VENDOR)/etc/modem/Pixel_stability.nprf \
# Vibrator Diag
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
diag-vibrator \
diag-vibrator-cs40l25a \
diag-vibrator-drv2624 \
$(NULL)
endif
PRODUCT_PACKAGES += \
android.hardware.health-service.gs201 \
@@ -1080,7 +1107,9 @@ PRODUCT_SOONG_NAMESPACES += \
vendor/google_devices/gs201/proprietary/gchips/tpu/darwinn_logging_service \
vendor/google_devices/gs201/proprietary/gchips/tpu/nnapi_stable_aidl \
vendor/google_devices/gs201/proprietary/gchips/tpu/aidl \
vendor/google_devices/gs201/proprietary/gchips/tpu/hal
vendor/google_devices/gs201/proprietary/gchips/tpu/hal \
vendor/google_devices/gs201/proprietary/gchips/tpu/tachyon/tachyon_apis \
vendor/google_devices/gs201/proprietary/gchips/tpu/tachyon/service
# TPU firmware
PRODUCT_PACKAGES += edgetpu-janeiro.fw
@@ -1128,9 +1157,6 @@ include hardware/google/pixel/common/pixel-common-device.mk
# Pixel Logger
include hardware/google/pixel/PixelLogger/PixelLogger.mk
# sscoredump
include hardware/google/pixel/sscoredump/device.mk
# RadioExt Version
USES_RADIOEXT_V1_5 = true
@@ -1138,10 +1164,8 @@ USES_RADIOEXT_V1_5 = true
include hardware/google/pixel/wifi_ext/device.mk
# Battery Stats Viewer
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += BatteryStatsViewer
endif
PRODUCT_PACKAGES += dump_power_gs201.sh
PRODUCT_PACKAGES_ENG += BatteryStatsViewer
include device/google/gs201/dumpstate/item.mk
# Install product specific framework compatibility matrix
# (TODO: b/169535506) This includes the FCM for system_ext and product partition.
@@ -1149,12 +1173,19 @@ PRODUCT_PACKAGES += dump_power_gs201.sh
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs201/device_framework_matrix_product.xml
# Preopt SystemUI
ifneq ($(RELEASE_SYSTEMUI_USE_SPEED_PROFILE), true)
PRODUCT_DEXPREOPT_SPEED_APPS += SystemUIGoogle # For internal
PRODUCT_DEXPREOPT_SPEED_APPS += SystemUI # For AOSP
PRODUCT_DEXPREOPT_SPEED_APPS += SystemUI # For AOSP
endif
# Compile SystemUI on device with `speed`.
# Set on-device compilation mode for SystemUI.
ifeq ($(RELEASE_SYSTEMUI_USE_SPEED_PROFILE), true)
PRODUCT_PROPERTY_OVERRIDES += \
dalvik.vm.systemuicompilerfilter=speed-profile
else
PRODUCT_PROPERTY_OVERRIDES += \
dalvik.vm.systemuicompilerfilter=speed
endif
# Keymint configuration
PRODUCT_COPY_FILES += \
@@ -1172,3 +1203,11 @@ PRODUCT_PACKAGES += ufs_firmware_update.sh
# Touch service
include device/google/gs-common/touch/twoshay/aidl_gs101.mk
include device/google/gs-common/touch/twoshay/twoshay.mk
# Allow longer timeout for incident report generation in bugreport
# Overriding in /product partition instead of /vendor intentionally,
# since it can't be overridden from /vendor.
PRODUCT_PRODUCT_PROPERTIES += \
dumpstate.strict_run=false

View File

@@ -78,7 +78,7 @@
</hal>
<hal format="aidl" optional="true">
<name>com.google.hardware.pixel.display</name>
<version>10</version>
<version>13</version>
<interface>
<name>IDisplay</name>
<instance>default</instance>
@@ -118,7 +118,7 @@
</hal>
<hal format="aidl" optional="true">
<name>vendor.google.wifi_ext</name>
<version>2-3</version>
<version>2-4</version>
<interface>
<name>IWifiExt</name>
<instance>default</instance>

View File

@@ -2,9 +2,19 @@ package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
sh_binary {
name: "dump_power_gs201.sh",
src: "dump_power_gs201.sh",
cc_binary {
name: "dump_power",
srcs: ["dump_power.cpp"],
cflags: [
"-Wall",
"-Wextra",
"-Werror",
],
shared_libs: [
"libbase",
"libdump",
"libdumpstateutil",
],
vendor: true,
sub_dir: "dump",
}
relative_install_path: "dump",
}

819
dumpstate/dump_power.cpp Normal file
View File

@@ -0,0 +1,819 @@
/*
* Copyright 2023 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <cstring>
#include <dirent.h>
#include <dump/pixel_dump.h>
#include <fstream>
#include <stdio.h>
#include <stdlib.h>
#include <sys/sysinfo.h>
#include <time.h>
#include <vector>
#include <android-base/file.h>
#include <android-base/strings.h>
#include "DumpstateUtil.h"
void printTitle(const char *msg) {
printf("\n------ %s ------\n", msg);
}
int getCommandOutput(const char *cmd, std::string *output) {
char buffer[1024];
FILE *pipe = popen(cmd, "r");
if (!pipe) {
return -1;
}
while (fgets(buffer, sizeof buffer, pipe) != NULL) {
*output += buffer;
}
pclose(pipe);
if (output->back() == '\n')
output->pop_back();
return 0;
}
bool isValidFile(const char *file) {
FILE *fp = fopen(file, "r");
if (fp != NULL) {
fclose(fp);
return true;
}
return false;
}
bool isValidDir(const char *directory) {
DIR *dir = opendir(directory);
if (dir == NULL)
return false;
closedir(dir);
return true;
}
bool isUserBuild() {
return ::android::os::dumpstate::PropertiesHelper::IsUserBuild();
}
int getFilesInDir(const char *directory, std::vector<std::string> *files) {
std::string content;
struct dirent *entry;
DIR *dir = opendir(directory);
if (dir == NULL)
return -1;
files->clear();
while ((entry = readdir(dir)) != NULL)
files->push_back(entry->d_name);
closedir(dir);
sort(files->begin(), files->end());
return 0;
}
void dumpPowerStatsTimes() {
const char *title = "Power Stats Times";
char rBuff[128];
struct timespec rTs;
struct sysinfo info;
int ret;
printTitle(title);
sysinfo(&info);
const time_t boottime = time(NULL) - info.uptime;
ret = clock_gettime(CLOCK_REALTIME, &rTs);
if (ret)
return;
struct tm *nowTime = std::localtime(&rTs.tv_sec);
std::strftime(rBuff, sizeof(rBuff), "%m/%d/%Y %H:%M:%S", nowTime);
printf("Boot: %s", ctime(&boottime));
printf("Now: %s\n", rBuff);
}
int readContentsOfDir(const char* title, const char* directory, const char* strMatch,
bool useStrMatch = false, bool printDirectory = false) {
std::vector<std::string> files;
std::string content;
std::string fileLocation;
int ret;
ret = getFilesInDir(directory, &files);
if (ret < 0)
return ret;
printTitle(title);
for (auto &file : files) {
if (useStrMatch && std::string::npos == std::string(file).find(strMatch)) {
continue;
}
fileLocation = std::string(directory) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
if (printDirectory) {
printf("\n\n%s\n", fileLocation.c_str());
}
if (content.back() == '\n')
content.pop_back();
printf("%s\n", content.c_str());
}
return 0;
}
void dumpAcpmStats() {
const char* acpmDir = "/sys/devices/platform/acpm_stats/";
const char* statsSubStr = "_stats";
const char* acpmTitle = "ACPM stats";
readContentsOfDir(acpmTitle, acpmDir, statsSubStr, true, true);
}
void dumpPowerSupplyStats() {
const char* dumpList[][2] = {
{"CPU PM stats", "/sys/devices/system/cpu/cpupm/cpupm/time_in_state"},
{"Power supply property battery", "/sys/class/power_supply/battery/uevent"},
{"Power supply property dc", "/sys/class/power_supply/dc/uevent"},
{"Power supply property gcpm", "/sys/class/power_supply/gcpm/uevent"},
{"Power supply property gcpm_pps", "/sys/class/power_supply/gcpm_pps/uevent"},
{"Power supply property main-charger", "/sys/class/power_supply/main-charger/uevent"},
{"Power supply property pca94xx-mains", "/sys/class/power_supply/pca94xx-mains/uevent"},
{"Power supply property tcpm", "/sys/class/power_supply/tcpm-source-psy-i2c-max77759tcpc/uevent"},
{"Power supply property usb", "/sys/class/power_supply/usb/uevent"},
{"Power supply property wireless", "/sys/class/power_supply/wireless/uevent"},
};
for (const auto &row : dumpList) {
dumpFileContent(row[0], row[1]);
}
}
void dumpMaxFg() {
const char *maxfgLoc = "/sys/class/power_supply/maxfg";
const char *maxfgDualLoc = "/sys/class/power_supply/maxfg_base";
const char *maxfg [][2] = {
{"Power supply property maxfg", "/sys/class/power_supply/maxfg/uevent"},
{"m5_state", "/sys/class/power_supply/maxfg/m5_model_state"},
{"maxfg registers", "/sys/class/power_supply/maxfg/registers_dump"},
{"maxfg logbuffer", "/dev/logbuffer_maxfg"},
{"maxfg_monitor logbuffer", "/dev/logbuffer_maxfg_monitor"},
};
const char *maxfgDual [][2] = {
{"Power supply property maxfg_base", "/sys/class/power_supply/maxfg_base/uevent"},
{"Power supply property maxfg_secondary", "/sys/class/power_supply/maxfg_secondary/uevent"},
{"maxfg_base registers", "/sys/class/power_supply/maxfg_base/registers_dump"},
{"maxfg_secondary registers", "/sys/class/power_supply/maxfg_secondary/registers_dump"},
{"m5_state", "/sys/class/power_supply/maxfg_base/m5_model_state"},
{"maxfg_base logbuffer", "/dev/logbuffer_maxfg_base"},
{"maxfg_secondary logbuffer", "/dev/logbuffer_maxfg_secondary"},
{"maxfg_base logbuffer", "/dev/logbuffer_maxfg_base_monitor"},
{"maxfg_secondary logbuffer", "/dev/logbuffer_maxfg_secondary_monitor"},
{"dual_batt logbuffer", "/dev/logbuffer_dual_batt"},
};
const char *maxfgHistoryName = "Maxim FG History";
const char *maxfgHistoryDir = "/dev/maxfg_history";
std::string content;
if (isValidDir(maxfgLoc)) {
for (const auto &row : maxfg) {
dumpFileContent(row[0], row[1]);
}
} else if (isValidDir(maxfgDualLoc)){
for (const auto &row : maxfgDual) {
dumpFileContent(row[0], row[1]);
}
if (isValidFile(maxfgHistoryDir)) {
dumpFileContent(maxfgHistoryName, maxfgHistoryDir);
}
}
}
void dumpPowerSupplyDock() {
const char* powerSupplyPropertyDockTitle = "Power supply property dock";
const char* powerSupplyPropertyDockFile = "/sys/class/power_supply/dock/uevent";
dumpFileContent(powerSupplyPropertyDockTitle, powerSupplyPropertyDockFile);
}
void dumpLogBufferTcpm() {
const char* logbufferTcpmTitle = "Logbuffer TCPM";
const char* logbufferTcpmFile = "/dev/logbuffer_tcpm";
const char* debugTcpmFile = "/sys/kernel/debug/tcpm";
const char* tcpmLogTitle = "TCPM logs";
const char* tcpmFile = "/sys/kernel/debug/tcpm";
const char* tcpmFileAlt = "/sys/kernel/debug/usb/tcpm";
int retCode;
dumpFileContent(logbufferTcpmTitle, logbufferTcpmFile);
retCode = readContentsOfDir(tcpmLogTitle, isValidFile(debugTcpmFile) ? tcpmFile : tcpmFileAlt,
NULL);
if (retCode < 0)
printTitle(tcpmLogTitle);
}
void dumpTcpc() {
const char* max77759TcpcHead = "TCPC Device Attributes";
const char* directory = "/sys/class/typec/port0/device";
const char* max77759Tcpc [] {
"auto_discharge",
"bc12_enabled",
"cc_toggle_enable",
"contaminant_detection",
"contaminant_detection_status",
"frs",
"irq_hpd_count",
"manual_disable_vbus",
"non_compliant_reasons",
"sbu_pullup",
"update_sdp_enum_timeout",
"usb_limit_accessory_current",
"usb_limit_accessory_enable",
"usb_limit_sink_current",
"usb_limit_sink_enable",
"usb_limit_source_enable",
};
std::string content;
std::string tcpcRegistersPath(std::string(directory) + "/registers");
dumpFileContent("TCPC Registers", tcpcRegistersPath.c_str());
printTitle(max77759TcpcHead);
for (auto& tcpcVal : max77759Tcpc) {
std::string filename = std::string(directory) + "/" + std::string(tcpcVal);
printf("%s: ", tcpcVal);
android::base::ReadFileToString(filename, &content);
if (!content.empty() && (content.back() == '\n' || content.back() == '\r'))
content.pop_back();
printf("%s\n", content.c_str());
}
printf("\n");
}
void dumpPdEngine() {
const char* pdEngine [][3] {
{"TCPC logbuffer", "/dev/logbuffer_usbpd"},
{"pogo_transport logbuffer", "/dev/logbuffer_pogo_transport"},
{"PPS-google_cpm logbuffer", "/dev/logbuffer_cpm"},
{"PPS-pca9468 logbuffer", "/dev/logbuffer_pca9468"},
};
for (const auto &row : pdEngine) {
dumpFileContent(row[0], row[1]);
}
}
void dumpBatteryHealth() {
const char* batteryHealth [][2] {
{"Battery Health", "/sys/class/power_supply/battery/health_index_stats"},
{"Battery Health SoC Residency", "/sys/class/power_supply/battery/swelling_data"},
{"BMS", "/dev/logbuffer_ssoc"},
{"TTF", "/dev/logbuffer_ttf"},
{"TTF details", "/sys/class/power_supply/battery/ttf_details"},
{"TTF stats", "/sys/class/power_supply/battery/ttf_stats"},
{"aacr_state", "/sys/class/power_supply/battery/aacr_state"},
{"maxq", "/dev/logbuffer_maxq"},
{"TEMP/DOCK-DEFEND", "/dev/logbuffer_bd"},
};
for (const auto &row : batteryHealth) {
dumpFileContent(row[0], row[1]);
}
}
void dumpBatteryDefend() {
const char* defendConfig [][3] {
{"TRICKLE-DEFEND Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "bd_"},
{"DWELL-DEFEND Config", "/sys/devices/platform/google,charger/", "charge_s"},
{"TEMP-DEFEND Config", "/sys/devices/platform/google,charger/", "bd_"},
};
std::vector<std::string> files;
struct dirent *entry;
std::string content;
std::string fileLocation;
for (auto &config : defendConfig) {
DIR *dir = opendir(config[1]);
if (dir == NULL)
continue;
printTitle(config[0]);
while ((entry = readdir(dir)) != NULL) {
if (std::string(entry->d_name).find(config[2]) != std::string::npos &&
strncmp(config[2], entry->d_name, strlen(config[2])) == 0) {
files.push_back(entry->d_name);
}
}
closedir(dir);
sort(files.begin(), files.end());
for (auto &file : files) {
fileLocation = std::string(config[1]) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content) || content.empty()) {
content = "\n";
}
printf("%s: %s", file.c_str(), content.c_str());
if (content.back() != '\n')
printf("\n");
}
files.clear();
}
}
void dumpBatteryCaretaker() {
const char* aacpConfig [][3] {
{"AACP Version",
"/sys/devices/platform/google,battery/power_supply/battery/", "aacp_"},
{"AACR Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "aacr_"},
{"AAFV Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "aafv_"},
{"AACT Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "aact_"},
{"AACC",
"/sys/devices/platform/google,battery/power_supply/battery/", "aacc"},
};
std::vector<std::string> files;
struct dirent *entry;
std::string content;
std::string fileLocation;
for (auto &config : aacpConfig) {
DIR *dir = opendir(config[1]);
if (dir == NULL)
continue;
printTitle(config[0]);
while ((entry = readdir(dir)) != NULL) {
if (std::string(entry->d_name).find(config[2]) != std::string::npos &&
strncmp(config[2], entry->d_name, strlen(config[2])) == 0) {
files.push_back(entry->d_name);
}
}
closedir(dir);
sort(files.begin(), files.end());
for (auto &file : files) {
fileLocation = std::string(config[1]) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content) || content.empty()) {
content = "\n";
}
printf("%s: %s", file.c_str(), content.c_str());
if (content.back() != '\n')
printf("\n");
}
files.clear();
}
}
void printValuesOfDirectory(const char *directory, std::string debugfs, const char *strMatch) {
std::vector<std::string> files;
auto info = directory;
std::string content;
struct dirent *entry;
DIR *dir = opendir(debugfs.c_str());
if (dir == NULL)
return;
printTitle((debugfs + std::string(strMatch) + "/" + std::string(info)).c_str());
while ((entry = readdir(dir)) != NULL)
if (std::string(entry->d_name).find(strMatch) != std::string::npos)
files.push_back(entry->d_name);
closedir(dir);
sort(files.begin(), files.end());
for (auto &file : files) {
std::string fileDirectory = debugfs + file;
std::string fileLocation = fileDirectory + "/" + std::string(info);
if (!android::base::ReadFileToString(fileLocation, &content)) {
content = "\n";
}
printf("%s:\n%s", fileDirectory.c_str(), content.c_str());
if (content.back() != '\n')
printf("\n");
}
files.clear();
}
void dumpChg() {
const std::string pmic_bus = "/sys/devices/platform/10d60000.hsi2c/i2c-13/13-0066";
const char* chg_reg_dump_file = "/sys/class/power_supply/main-charger/device/registers_dump";
const std::string chg_name_cmd = "/sys/class/power_supply/main-charger/device/name";
const std::string pmic_name_cmd = pmic_bus + "/name";
const std::string pmic_reg_dump_file = pmic_bus + "/registers_dump";
const std::string reg_dump_str = " registers dump";
const char* chgConfig [][2] {
{"DC_registers dump", "/sys/class/power_supply/pca94xx-mains/device/registers_dump"},
};
std::string chg_name;
std::string pmic_name;
printf("\n");
int ret = android::base::ReadFileToString(chg_name_cmd, &chg_name);
if (ret && !chg_name.empty()) {
chg_name.erase(chg_name.length() - 1); // remove new line
const std::string chg_reg_dump_title = chg_name + reg_dump_str;
/* CHG reg dump */
dumpFileContent(chg_reg_dump_title.c_str(), chg_reg_dump_file);
}
ret = android::base::ReadFileToString(pmic_name_cmd, &pmic_name);
if (ret && !pmic_name.empty()) {
pmic_name.erase(pmic_name.length() - 1); // remove new line
const std::string pmic_reg_dump_title = pmic_name + reg_dump_str;
/* PMIC reg dump */
dumpFileContent(pmic_reg_dump_title.c_str(), pmic_reg_dump_file.c_str());
}
for (auto &config : chgConfig) {
dumpFileContent(config[0], config[1]);
}
}
void dumpChgUserDebug() {
const std::string debugfs = "/d/";
const char *maxFgDir = "/d/maxfg";
const char *maxFgStrMatch = "maxfg";
const char *maxBaseFgDir = "/d/maxfg_base";
const char *maxBaseFgStrMatch = "maxfg_base";
const char *chgTblName = "Charging table dump";
const char *chgTblDir = "/d/google_battery/chg_raw_profile";
const char *maxFgInfo [] {
"fg_model",
"algo_ver",
"model_ok",
};
if (isUserBuild())
return;
dumpFileContent(chgTblName, chgTblDir);
if (isValidDir(maxFgDir)) {
for (auto & directory : maxFgInfo) {
printValuesOfDirectory(directory, debugfs, maxFgStrMatch);
}
} else if (isValidDir(maxBaseFgDir)) {
for (auto & directory : maxFgInfo) {
printValuesOfDirectory(directory, debugfs, maxBaseFgStrMatch);
}
}
}
void dumpBatteryEeprom() {
const char *title = "Battery EEPROM";
const char *files[] {
"/sys/devices/platform/10da0000.hsi2c/i2c-15/15-0050/eeprom",
};
std::string result;
std::string xxdCmd;
printTitle(title);
for (auto &file : files) {
if (!isValidFile(file))
continue;
xxdCmd = "xxd " + std::string(file);
int ret = getCommandOutput(xxdCmd.c_str(), &result);
if (ret < 0)
return;
printf("%s\n", result.c_str());
}
}
void dumpChargerStats() {
const char *chgStatsTitle = "Charger Stats";
const char *chgStatsLocation = "/sys/class/power_supply/battery/charge_details";
const char *chargerStats [][3] {
{"Google Charger", "/sys/kernel/debug/google_charger/", "pps_"},
{"Google Battery", "/sys/kernel/debug/google_battery/", "ssoc_"},
};
std::vector<std::string> files;
std::string content;
struct dirent *entry;
dumpFileContent(chgStatsTitle, chgStatsLocation);
if (isUserBuild())
return;
for (auto &stat : chargerStats) {
DIR *dir = opendir(stat[1]);
if (dir == NULL)
return;
printTitle(stat[0]);
while ((entry = readdir(dir)) != NULL)
if (std::string(entry->d_name).find(stat[2]) != std::string::npos)
files.push_back(entry->d_name);
closedir(dir);
sort(files.begin(), files.end());
for (auto &file : files) {
std::string fileLocation = std::string(stat[1]) + file;
if (!android::base::ReadFileToString(fileLocation, &content)) {
content = "\n";
}
printf("%s: %s", file.c_str(), content.c_str());
if (content.back() != '\n')
printf("\n");
}
files.clear();
}
}
void dumpWlcLogs() {
const char *dumpWlcList [][2] {
{"WLC Logs", "/dev/logbuffer_wireless"},
{"WLC VER", "/sys/class/power_supply/wireless/device/version"},
{"WLC STATUS", "/sys/class/power_supply/wireless/device/status"},
{"WLC FW Version", "/sys/class/power_supply/wireless/device/fw_rev"},
{"RTX", "/dev/logbuffer_rtx"},
};
for (auto &row : dumpWlcList) {
if (!isValidFile(row[1]))
printTitle(row[0]);
dumpFileContent(row[0], row[1]);
}
}
void dumpGvoteables() {
const char *directory = "/sys/kernel/debug/gvotables/";
const char *statusName = "/status";
const char *title = "gvotables";
std::string content;
std::vector<std::string> files;
int ret;
if (isUserBuild())
return;
ret = getFilesInDir(directory, &files);
if (ret < 0)
return;
printTitle(title);
for (auto &file : files) {
std::string fileLocation = std::string(directory) + file + std::string(statusName);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
printf("%s: %s", file.c_str(), content.c_str());
if (content.back() != '\n')
printf("\n");
}
files.clear();
}
void dumpMitigation() {
const char *mitigationList [][2] {
{"Lastmeal" , "/data/vendor/mitigation/lastmeal.txt"},
{"Thismeal" , "/data/vendor/mitigation/thismeal.txt"},
};
for (auto &row : mitigationList) {
if (!isValidFile(row[1]))
printTitle(row[0]);
dumpFileContent(row[0], row[1]);
}
}
void dumpMitigationStats() {
int ret;
const char *directory = "/sys/devices/virtual/pmic/mitigation/last_triggered_count/";
const char *capacityDirectory = "/sys/devices/virtual/pmic/mitigation/last_triggered_capacity/";
const char *timestampDirectory =
"/sys/devices/virtual/pmic/mitigation/last_triggered_timestamp/";
const char *voltageDirectory = "/sys/devices/virtual/pmic/mitigation/last_triggered_voltage/";
const char *capacitySuffix = "_cap";
const char *timeSuffix = "_time";
const char *voltageSuffix = "_volt";
const char *countSuffix = "_count";
const char *title = "Mitigation Stats";
std::vector<std::string> files;
std::string content;
std::string fileLocation;
std::string source;
std::string subModuleName;
int count;
int soc;
int time;
int voltage;
ret = getFilesInDir(directory, &files);
if (ret < 0)
return;
printTitle(title);
printf("Source\t\tCount\tSOC\tTime\tVoltage\n");
for (auto &file : files) {
fileLocation = std::string(directory) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
ret = atoi(android::base::Trim(content).c_str());
if (ret == -1)
continue;
count = ret;
subModuleName = std::string(file);
subModuleName.erase(subModuleName.find(countSuffix), strlen(countSuffix));
fileLocation = std::string(capacityDirectory) + std::string(subModuleName) +
std::string(capacitySuffix);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
ret = atoi(android::base::Trim(content).c_str());
if (ret == -1)
continue;
soc = ret;
fileLocation = std::string(timestampDirectory) + std::string(subModuleName) +
std::string(timeSuffix);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
ret = atoi(android::base::Trim(content).c_str());
if (ret == -1)
continue;
time = ret;
fileLocation = std::string(voltageDirectory) + std::string(subModuleName) +
std::string(voltageSuffix);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
ret = atoi(android::base::Trim(content).c_str());
if (ret == -1)
continue;
voltage = ret;
printf("%s \t%i\t%i\t%i\t%i\n", subModuleName.c_str(), count, soc, time, voltage);
}
}
void dumpMitigationDirs() {
const int paramCount = 4;
const char *titles[] = {
"Clock Divider Ratio",
"Clock Stats",
"Triggered Level",
"Instruction",
};
const char *directories[] = {
"/sys/devices/virtual/pmic/mitigation/clock_ratio/",
"/sys/devices/virtual/pmic/mitigation/clock_stats/",
"/sys/devices/virtual/pmic/mitigation/triggered_lvl/",
"/sys/devices/virtual/pmic/mitigation/instruction/",
};
const char *paramSuffix[] = {"_ratio", "_stats", "_lvl", ""};
const char *titleRowVal[] = {
"Source\t\tRatio",
"Source\t\tStats",
"Source\t\tLevel",
"",
};
const int eraseCnt[] = {6, 6, 4, 0};
const bool useTitleRow[] = {true, true, true, false};
std::vector<std::string> files;
std::string content;
std::string fileLocation;
std::string source;
std::string subModuleName;
std::string readout;
for (int i = 0; i < paramCount; i++) {
printTitle(titles[i]);
if (useTitleRow[i]) {
printf("%s\n", titleRowVal[i]);
}
getFilesInDir(directories[i], &files);
for (auto &file : files) {
fileLocation = std::string(directories[i]) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
readout = android::base::Trim(content);
subModuleName = std::string(file);
subModuleName.erase(subModuleName.find(paramSuffix[i]), eraseCnt[i]);
if (useTitleRow[i]) {
printf("%s \t%s\n", subModuleName.c_str(), readout.c_str());
} else {
printf("%s=%s\n", subModuleName.c_str(), readout.c_str());
}
}
}
}
void dumpIrqDurationCounts() {
const char *title = "IRQ Duration Counts";
const char *colNames = "Source\t\t\t\tlt_5ms_cnt\tbt_5ms_to_10ms_cnt\tgt_10ms_cnt\tCode"
"\tCurrent Threshold (uA)\tCurrent Reading (uA)\n";
const int nonOdpmChannelCnt = 9;
const int odpmChCnt = 12;
enum Duration {
LT_5MS,
BT_5MS_10MS,
GT_10MS,
DUR_MAX,
};
const char *irqDurDirectories[] = {
"/sys/devices/virtual/pmic/mitigation/irq_dur_cnt/less_than_5ms_count",
"/sys/devices/virtual/pmic/mitigation/irq_dur_cnt/between_5ms_to_10ms_count",
"/sys/devices/virtual/pmic/mitigation/irq_dur_cnt/greater_than_10ms_count",
};
enum PowerWarn {
MAIN,
SUB,
PWRWARN_MAX,
};
const char *pwrwarnDirectories[] = {
"/sys/devices/virtual/pmic/mitigation/main_pwrwarn/",
"/sys/devices/virtual/pmic/mitigation/sub_pwrwarn/",
};
const char *lpfCurrentDirs[] = {
"/sys/devices/platform/acpm_mfd_bus@15500000/i2c-1/1-001f/s2mpg14-meter/"
"s2mpg14-odpm/iio:device1/lpf_current",
"/sys/devices/platform/acpm_mfd_bus@15510000/i2c-0/0-002f/s2mpg15-meter/"
"s2mpg15-odpm/iio:device0/lpf_current",
};
bool titlesInitialized = false;
std::vector<std::string> channelNames;
std::vector<std::string> channelData[DUR_MAX];
std::vector<std::string> pwrwarnThreshold[PWRWARN_MAX];
std::vector<std::string> pwrwarnCode[PWRWARN_MAX];
std::vector<std::string> lpfCurrentVals[PWRWARN_MAX];
std::vector<std::string> files;
std::string content;
std::string token;
std::string tokenCh;
std::string fileLocation;
for (int i = 0; i < DUR_MAX; i++) {
if (!android::base::ReadFileToString(irqDurDirectories[i], &content)) {
return;
}
std::istringstream tokenStream(content);
while (std::getline(tokenStream, token, '\n')) {
if (!titlesInitialized) {
tokenCh = token;
tokenCh.erase(tokenCh.find(':'), tokenCh.length());
channelNames.push_back(tokenCh);
}
// there is a space after the ':' which needs to be removed
token.erase(0, token.find(':') + 1);
channelData[i].push_back(token);
}
if (!titlesInitialized)
titlesInitialized = true;
}
for (int i = 0; i < PWRWARN_MAX; i++) {
getFilesInDir(pwrwarnDirectories[i], &files);
for (auto &file : files) {
fileLocation = std::string(pwrwarnDirectories[i]) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content)) {
continue;
}
std::string readout;
readout = android::base::Trim(content);
std::string readoutThreshold = readout;
readoutThreshold.erase(0, readoutThreshold.find('=') + 1);
std::string readoutCode = readout;
readoutCode.erase(readoutCode.find('='), readoutCode.length());
pwrwarnThreshold[i].push_back(readoutThreshold);
pwrwarnCode[i].push_back(readoutCode);
}
}
for (int i = 0; i < PWRWARN_MAX; i++) {
if (!android::base::ReadFileToString(lpfCurrentDirs[i], &content)) {
continue;
}
std::istringstream tokenStream(content);
bool first = true;
while (std::getline(tokenStream, token, '\n')) {
token.erase(0, token.find(' '));
if (first) {
first = false;
continue;
}
lpfCurrentVals[i].push_back(token);
}
}
printTitle(title);
printf("%s", colNames);
for (uint i = 0; i < channelNames.size(); i++) {
std::string code = "";
std::string threshold = "";
std::string current = "";
std::string ltDataMsg = "";
std::string btDataMsg = "";
std::string gtDataMsg = "";
int pmicSel = 0;
int offset = 0;
std::string channelNameSuffix = " \t";
if (i >= nonOdpmChannelCnt) {
offset = nonOdpmChannelCnt;
if (i >= (odpmChCnt + nonOdpmChannelCnt)) {
pmicSel = 1;
offset = odpmChCnt + nonOdpmChannelCnt;
}
channelNameSuffix = "";
code = pwrwarnCode[pmicSel][i - offset];
threshold = pwrwarnThreshold[pmicSel][i - offset];
current = lpfCurrentVals[pmicSel][i - offset];
}
if (i < channelData[0].size())
ltDataMsg = channelData[0][i];
if (i < channelData[1].size())
btDataMsg = channelData[1][i];
if (i < channelData[2].size())
gtDataMsg = channelData[2][i];
std::string adjustedChannelName = channelNames[i] + channelNameSuffix;
printf("%s \t%s\t\t%s\t\t\t%s\t\t%s \t%s \t\t%s\n",
adjustedChannelName.c_str(),
ltDataMsg.c_str(),
btDataMsg.c_str(),
gtDataMsg.c_str(),
code.c_str(),
threshold.c_str(),
current.c_str());
}
}
int main() {
dumpPowerStatsTimes();
dumpAcpmStats();
dumpPowerSupplyStats();
dumpMaxFg();
dumpPowerSupplyDock();
dumpLogBufferTcpm();
dumpTcpc();
dumpPdEngine();
dumpBatteryHealth();
dumpBatteryDefend();
dumpBatteryCaretaker();
dumpChg();
dumpChgUserDebug();
dumpBatteryEeprom();
dumpChargerStats();
dumpWlcLogs();
dumpGvoteables();
dumpMitigation();
dumpMitigationStats();
dumpMitigationDirs();
dumpIrqDurationCounts();
}

View File

@@ -1,315 +0,0 @@
#!/vendor/bin/sh
build_type="$(getprop ro.build.type)"
echo "\n------ Power Stats Times ------"
echo -n "Boot: " && /vendor/bin/uptime -s && echo -n "Now: " && date;
echo "\n------ ACPM stats ------"
for f in /sys/devices/platform/acpm_stats/*_stats ; do
echo "\n\n$f"
cat $f
done
echo "\n------ CPU PM stats ------"
cat "/sys/devices/system/cpu/cpupm/cpupm/time_in_state"
echo "\n------ GENPD summary ------"
cat "/d/pm_genpd/pm_genpd_summary"
echo "\n------ Power supply property battery ------"
cat "/sys/class/power_supply/battery/uevent"
echo "\n------ Power supply property dc ------"
cat "/sys/class/power_supply/dc/uevent"
echo "\n------ Power supply property gcpm ------"
cat "/sys/class/power_supply/gcpm/uevent"
echo "\n------ Power supply property gcpm_pps ------"
cat "/sys/class/power_supply/gcpm_pps/uevent"
echo "\n------ Power supply property main-charger ------"
cat "/sys/class/power_supply/main-charger/uevent"
if [ -d "/sys/class/power_supply/pca9468-mains/uevent" ]
then
echo "\n------ Power supply property pca9468-mains ------"
cat "/sys/class/power_supply/pca9468-mains/uevent"
else
echo "\n------ Power supply property pca94xx-mains ------"
cat "/sys/class/power_supply/pca94xx-mains/uevent"
fi
echo "\n------ Power supply property tcpm ------"
cat /sys/class/power_supply/tcpm-source-psy-*/uevent
echo "\n------ Power supply property usb ------"
cat "/sys/class/power_supply/usb/uevent"
echo "\n------ Power supply property wireless ------"
cat "/sys/class/power_supply/wireless/uevent"
if [ -d "/sys/class/power_supply/maxfg" ]
then
echo "\n------ Power supply property maxfg ------"
cat "/sys/class/power_supply/maxfg/uevent"
echo "\n------ m5_state ------"
cat "/sys/class/power_supply/maxfg/m5_model_state"
echo "\n------ maxfg ------"
cat "/dev/logbuffer_maxfg"
echo "\n------ maxfg_monitor ------"
cat "/dev/logbuffer_maxfg_monitor"
else
echo "\n------ Power supply property maxfg_base ------"
cat "/sys/class/power_supply/maxfg_base/uevent"
echo "\n------ Power supply property maxfg_secondary ------"
cat "/sys/class/power_supply/maxfg_secondary/uevent"
echo "\n------ m5_state ------"
cat "/sys/class/power_supply/maxfg_base/m5_model_state"
echo "\n------ maxfg_base ------"
cat "/dev/logbuffer_maxfg_base"
echo "\n------ maxfg_secondary ------"
cat "/dev/logbuffer_maxfg_secondary"
echo "\n------ maxfg_base_monitor ------"
cat "/dev/logbuffer_maxfg_base_monitor"
echo "\n------ maxfg_secondary_monitor ------"
cat "/dev/logbuffer_maxfg_secondary_monitor"
echo "\n------ google_dual_batt ------"
cat "/dev/logbuffer_dual_batt"
fi
if [ -e "/dev/maxfg_history" ]
then
echo "\n------ Maxim FG History ------"
xxd "/dev/maxfg_history"
fi
if [ -d "/sys/class/power_supply/dock" ]
then
echo "\n------ Power supply property dock ------"
cat "/sys/class/power_supply/dock/uevent"
fi
if [ -e "/dev/logbuffer_tcpm" ]
then
echo "\n------ Logbuffer TCPM ------"
cat "/dev/logbuffer_tcpm"
elif [ $build_type = "eng" ]
then
echo "\n------ TCPM logs ------"
if [ -d "/sys/kernel/debug/tcpm" ]
then
cat /sys/kernel/debug/tcpm/*
else
cat /sys/kernel/debug/usb/tcpm*
fi
fi
echo "\n------ TCPC ------"
max77759tcpc_path="/sys/devices/platform/10d60000.hsi2c/i2c-13/13-0025"
echo "registers:"
cat $max77759tcpc_path/registers
echo "frs:"
cat $max77759tcpc_path/frs
echo "auto_discharge:"
cat $max77759tcpc_path/auto_discharge
echo "bc12_enabled:"
cat $max77759tcpc_path/bc12_enabled
echo "cc_toggle_enable:"
cat $max77759tcpc_path/cc_toggle_enable
echo "contaminant_detection:"
cat $max77759tcpc_path/contaminant_detection
echo "contaminant_detection_status:"
cat $max77759tcpc_path/contaminant_detection_status
echo "\n------ PD Engine ------"
cat "/dev/logbuffer_usbpd"
echo "\nPOGO Transport"
cat "/dev/logbuffer_pogo_transport"
echo "\n------ PPS-google_cpm ------"
cat "/dev/logbuffer_cpm"
echo "\n------ PPS-dc ------"
cat "/dev/logbuffer_pca9468"
echo "\n------ Battery Health ------"
cat "/sys/class/power_supply/battery/health_index_stats"
echo "\n------ Battery Health SoC Residency ------"
cat "/sys/class/power_supply/battery/swelling_data"
echo "\n------ BMS ------"
cat "/dev/logbuffer_ssoc"
echo "\n------ TTF ------"
cat "/dev/logbuffer_ttf"
echo "\n------ TTF details ------"
cat "/sys/class/power_supply/battery/ttf_details"
echo "\n------ TTF stats ------"
cat "/sys/class/power_supply/battery/ttf_stats"
echo "\n------ aacr_state ------"
cat "/sys/class/power_supply/battery/aacr_state"
echo "\n------ maxq ------"
cat "/dev/logbuffer_maxq"
echo "\n------ TEMP/DOCK-DEFEND ------"
cat "/dev/logbuffer_bd"
echo "\n------ TRICKLE-DEFEND Config ------"
cd /sys/devices/platform/google,battery/power_supply/battery/
for f in `ls bd_*`
do
echo $f: `cat $f`
done
echo "\n------ DWELL-DEFEND Config ------"
cd /sys/devices/platform/google,charger/
for f in `ls charge_s*`
do
echo "$f: `cat $f`"
done
echo "\n------ TEMP-DEFEND Config ------"
cd /sys/devices/platform/google,charger/
for f in `ls bd_*`
do
echo "$f: `cat $f`"
done
echo "\n------ DC_registers dump ------"
cat "/sys/class/power_supply/pca94xx-mains/device/registers_dump"
echo "\n------ max77759_chg registers dump ------"
cat "/sys/class/power_supply/main-charger/device/registers_dump"
echo "\n------ max77729_pmic registers dump ------"
cat /sys/devices/platform/*.hsi2c/i2c-*/*-0066/registers_dump
if [ $build_type = "eng" ]
then
echo "\n------ Charging table dump ------"
cat "/d/google_battery/chg_raw_profile"
echo "\n------ fg_model ------"
for f in /d/maxfg*
do
regs=`cat $f/fg_model`
echo $f:
echo "$regs"
done
echo "\n------ fg_alo_ver ------"
for f in /d/maxfg*
do
regs=`cat $f/algo_ver`
echo $f:
echo "$regs"
done
echo "\n------ fg_model_ok ------"
for f in /d/maxfg*
do
regs=`cat $f/model_ok`
echo $f:
echo "$regs"
done
echo "\n------ fg registers ------"
for f in /d/maxfg*
do
regs=`cat $f/registers`
echo $f:
echo "$regs"
done
echo "\n------ Maxim FG NV RAM ------"
for f in /d/maxfg*
do
regs=`cat $f/nv_registers`
echo $f:
echo "$regs"
done
fi
echo "\n------ Battery EEPROM ------"
if [ -e "/sys/devices/platform/10da0000.hsi2c/i2c-15/15-0050/eeprom" ]
then
xxd /sys/devices/platform/10da0000.hsi2c/i2c-15/15-0050/eeprom
fi
echo "\n------ Charger Stats ------"
cat "/sys/class/power_supply/battery/charge_details"
if [ $build_type = "eng" ]
then
echo "\n------ Google Charger ------"
cd /sys/kernel/debug/google_charger/
for f in `ls pps_*`
do
echo "$f: `cat $f`"
done
echo "\n------ Google Battery ------"
cd /sys/kernel/debug/google_battery/
for f in `ls ssoc_*`
do
echo "$f: `cat $f`"
done
fi
echo "\n------ WLC logs ------"
cat "/dev/logbuffer_wireless"
echo "\n------ WLC VER ------"
cat "/sys/class/power_supply/wireless/device/version"
echo "\n------ WLC STATUS ------"
cat "/sys/class/power_supply/wireless/device/status"
echo "\n------ WLC FW Version ------"
cat "/sys/class/power_supply/wireless/device/fw_rev"
echo "\n------ RTX ------"
cat "/dev/logbuffer_rtx"
if [ $build_type = "eng" ]
then
echo "\n------ gvotables ------"
cat /sys/kernel/debug/gvotables/*/status
fi
echo "\n------ Lastmeal ------"
cat "/data/vendor/mitigation/lastmeal.txt"
echo "\n------ Thismeal ------"
cat "/data/vendor/mitigation/thismeal.txt"
echo "\n------ Mitigation Stats ------"
echo "Source\t\tCount\tSOC\tTime\tVoltage"
for f in `ls /sys/devices/virtual/pmic/mitigation/last_triggered_count/*`
do
count=`cat $f`
a=${f/\/sys\/devices\/virtual\/pmic\/mitigation\/last_triggered_count\//}
b=${f/last_triggered_count/last_triggered_capacity}
c=${f/last_triggered_count/last_triggered_timestamp/}
d=${f/last_triggered_count/last_triggered_voltage/}
cnt=`cat $f`
cap=`cat ${b/count/cap}`
ti=`cat ${c/count/time}`
volt=`cat ${d/count/volt}`
echo "${a/_count/} \t$cnt\t$cap\t$ti\t$volt"
done
echo "\n------ Clock Divider Ratio ------"
echo \"Source\t\tRatio\"
for f in `ls /sys/devices/virtual/pmic/mitigation/clock_ratio/*`
do ratio=`cat $f`
a=${f/\/sys\/devices\/virtual\/pmic\/mitigation\/clock_ratio\//}
echo "${a/_ratio/} \t$ratio"
done
echo "\n------ Clock Stats ------"
echo "Source\t\tStats"
for f in `ls /sys/devices/virtual/pmic/mitigation/clock_stats/*`
do
stats=`cat $f`
a=${f/\/sys\/devices\/virtual\/pmic\/mitigation\/clock_stats\//};
echo "${a/_stats/} \t$stats"
done
echo "\n------ Triggered Level ------"
echo "Source\t\tLevel"
for f in `ls /sys/devices/virtual/pmic/mitigation/triggered_lvl/*`
do
lvl=`cat $f`
a=${f/\/sys\/devices\/virtual\/pmic\/mitigation\/triggered_lvl\//}
echo "${a/_lvl/} \t$lvl"
done
echo "\n------ Instruction ------"
for f in `ls /sys/devices/virtual/pmic/mitigation/instruction/*`
do
val=`cat $f`
a=${f/\/sys\/devices\/virtual\/pmic\/mitigation\/instruction\//}
echo "$a=$val"
done

1
dumpstate/item.mk Normal file
View File

@@ -0,0 +1 @@
PRODUCT_PACKAGES += dump_power

View File

@@ -81,5 +81,5 @@ PRODUCT_SYSTEM_DEFAULT_PROPERTIES += \
persist.device_config.configuration.disable_rescue_party=true
# PixelLogger for RF testing
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
PixelLogger \

View File

@@ -1,7 +1,7 @@
<manifest version="1.0" type="device">
<hal format="aidl">
<name>android.hardware.health</name>
<version>3</version>
<version>4</version>
<fqname>IHealth/default</fqname>
</hal>
</manifest>

View File

@@ -1,6 +1,6 @@
#
# Copyright (C) 2022 The LineageOS Project
#
# SPDX-FileCopyrightText: 2021-2024 The LineageOS Project
# SPDX-FileCopyrightText: 2021-2024 The Calyx Institute
# SPDX-License-Identifier: Apache-2.0
#
@@ -22,6 +22,10 @@ PRODUCT_PRODUCT_PROPERTIES += ro.opa.eligible_device=true
# Lineage Health
include hardware/google/pixel/lineage_health/device.mk
$(call soong_config_set,lineage_health,charging_control_supports_deadline,true)
$(call soong_config_set,lineage_health,charging_control_supports_limit,true)
$(call soong_config_set,lineage_health,charging_control_supports_toggle,false)
# Linker config
PRODUCT_VENDOR_LINKER_CONFIG_FRAGMENTS += \
device/google/gs201/linker.config.json
@@ -30,5 +34,9 @@ PRODUCT_VENDOR_LINKER_CONFIG_FRAGMENTS += \
PRODUCT_PACKAGES += \
GoogleParts
# Tethering
PRODUCT_PACKAGES += \
TetheringOverlay
# Touch
include hardware/google/pixel/touch/device.mk

View File

@@ -1,5 +1,10 @@
{
"provideLibs": [
"liboemcrypto.so"
"liboemcrypto.so",
"lib_aion_buffer.so",
"libedgetpu_client.google.so",
"libedgetpu_tachyon.google.so",
"libedgetpu_util.so",
"libgxp.so"
]
}

View File

@@ -1,13 +1,4 @@
<manifest version="1.0" type="device" target-level="7">
<hal format="hidl">
<name>android.hardware.graphics.mapper</name>
<transport arch="32+64">passthrough</transport>
<version>4.0</version>
<interface>
<name>IMapper</name>
<instance>default</instance>
</interface>
</hal>
<hal format="aidl">
<name>android.hardware.boot</name>
<fqname>IBootControl/default</fqname>

View File

@@ -1,20 +1,13 @@
<manifest version="1.0" type="device">
<hal format="hidl">
<name>android.hardware.media.c2</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IComponentStore</name>
<instance>default1</instance>
</interface>
<!-- AIDL fragment -->
<hal format="aidl">
<name>android.hardware.media.c2</name>
<version>1</version>
<fqname>IComponentStore/default1</fqname>
</hal>
<hal format="hidl">
<name>android.hardware.media.c2</name>
<transport>hwbinder</transport>
<version>1.2</version>
<interface>
<name>IComponentStore</name>
<instance>default</instance>
</interface>
<hal format="aidl">
<name>android.hardware.media.c2</name>
<version>1</version>
<fqname>IComponentStore/default</fqname>
</hal>
</manifest>

View File

@@ -1,4 +1,5 @@
<manifest version="1.0" type="device">
<!-- HIDL fragment -->
<hal format="hidl">
<name>android.hardware.media.c2</name>
<transport>hwbinder</transport>
@@ -8,4 +9,10 @@
<instance>default</instance>
</interface>
</hal>
<!-- AIDL fragment -->
<hal format="aidl">
<name>android.hardware.media.c2</name>
<version>1</version>
<fqname>IComponentStore/default</fqname>
</hal>
</manifest>

View File

@@ -106,7 +106,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp8.decoder" type="video/x-vnd.on2.vp8" >
<Limit name="size" min="32x32" max="3840x2160" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="1-32400" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -120,7 +120,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp9.decoder" type="video/x-vnd.on2.vp9" >
<Limit name="size" min="64x64" max="3840x2176" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="1-2040" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -134,7 +134,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp9.decoder.secure" type="video/x-vnd.on2.vp9" >
<Limit name="size" min="64x64" max="3840x2176" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="1-2040" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -217,7 +217,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp8.encoder" type="video/x-vnd.on2.vp8" >
<Limit name="size" min="32x32" max="3840x2160" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="1-32400" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -233,7 +233,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp9.encoder" type="video/x-vnd.on2.vp9" >
<Limit name="size" min="64x64" max="3840x2176" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="1-2040" />
<Limit name="blocks-per-second" min="1" max="243000" />

View File

@@ -19,7 +19,7 @@
<Decoders>
<MediaCodec name="c2.google.av1.decoder" type="video/av01">
<Limit name="size" min="96x96" max="3840x2160" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="36-32400" />
<Limit name="blocks-per-second" min="24" max="1944000" />
@@ -34,7 +34,7 @@
</MediaCodec>
<MediaCodec name="c2.google.av1.decoder.secure" type="video/av01">
<Limit name="size" min="96x96" max="3840x2160" />
<Limit name="alignment" value="2x2" />
<Limit name="alignment" value="1x1" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="36-32400" />
<Limit name="blocks-per-second" min="24" max="1944000" />

View File

@@ -117,24 +117,24 @@
</MediaCodec>
<MediaCodec name="c2.android.avc.decoder" type="video/avc" update="true">
<!-- measured 90%:342-360 med:343 N=2 -->
<Limit name="measured-frame-rate-320x240" range="342-351" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-320x240" range="558-1084" /> <!-- v90%=1.0 -->
<!-- measured 90%:142-147 med:143 N=2 -->
<Limit name="measured-frame-rate-720x480" range="142-145" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-720x480" range="193-357" /> <!-- v90%=1.0 -->
<!-- measured 90%:54-56 med:55 N=2 -->
<Limit name="measured-frame-rate-1280x720" range="54-55" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1280x720" range="73-125" /> <!-- v90%=1.0 -->
<!-- measured 90%:25-26 med:26 N=2 -->
<Limit name="measured-frame-rate-1920x1080" range="25-26" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1920x1080" range="25-41" /> <!-- v90%=1.0 -->
</MediaCodec>
<MediaCodec name="c2.android.hevc.decoder" type="video/hevc" update="true">
<Limit name="measured-frame-rate-352x288" range="583-674" />
<Limit name="measured-frame-rate-352x288" range="583-1019" />
<!-- measured 90%:196-207 med:196 N=2 -->
<Limit name="measured-frame-rate-640x360" range="196-201" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-640x360" range="196-608" /> <!-- v90%=1.0 -->
<!-- measured 90%:177-180 med:178 N=2 -->
<Limit name="measured-frame-rate-720x480" range="177-178" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-720x480" range="177-495" /> <!-- v90%=1.0 -->
<!-- measured 90%:81-82 med:82 N=2 -->
<Limit name="measured-frame-rate-1280x720" range="81-82" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1280x720" range="81-165" /> <!-- v90%=1.0 -->
<!-- measured 90%:45-47 med:46 N=2 -->
<Limit name="measured-frame-rate-1920x1080" range="45-46" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1920x1080" range="45-87" /> <!-- v90%=1.0 -->
</MediaCodec>
<MediaCodec name="c2.android.mpeg4.decoder" type="video/mp4v-es" update="true">
<Limit name="measured-frame-rate-176x144" range="1215-1823" />
@@ -145,7 +145,7 @@
<Limit name="measured-frame-rate-320x180" range="847-1271" />
<Limit name="measured-frame-rate-640x360" range="412-618" />
<Limit name="measured-frame-rate-1280x720" range="119-178" />
<Limit name="measured-frame-rate-1920x1080" range="47-70" />
<Limit name="measured-frame-rate-1920x1080" range="28-55" />
</MediaCodec>
<MediaCodec name="c2.android.vp9.decoder" type="video/x-vnd.on2.vp9" update="true">
<Limit name="measured-frame-rate-320x180" range="622-934" />

View File

@@ -20,28 +20,33 @@
<item>connectivity_thermal_power_manager/apply_action_time_seconds=10</item>
<item>connectivity_thermal_power_manager/atm_power_threshold_mw=800</item>
<item>connectivity_thermal_power_manager/cellular_thermal_adaptive_thermal_status_adaptive_action_list=</item>
<item>connectivity_thermal_power_manager/criteria_1_enabled=true</item>
<item>connectivity_thermal_power_manager/criteria_4_enabled=true</item>
<item>connectivity_thermal_power_manager/criteria_4_lte_pref_mode=3</item>
<item>connectivity_thermal_power_manager/wifi_disconnected_time_seconds=180</item>
<item>connectivity_thermal_power_manager/wifi_internet_driven_endc_product_carrier_id_set=shiba,husky,akita,komodo,tokay,caiman,comet@1,1989,2023,2576,2067,2071,2073,2577,2522,2075,2578,2083,2433,1949</item>
<!-- Live Caption (Pixel 2017 + OEM) -->
<item>device_personalization_services/Captions__allow_box_x_axis_movement=true</item>
<item>device_personalization_services/Captions__allow_use_public_speech_recognition=true</item>
<item>device_personalization_services/Captions__allow_voip_call_without_audio_recording=false</item>
<item>device_personalization_services/Captions__available_for_download=en-US;en-GB;en-CA;en-IE;en-AU;en-SG;en-IN;fr-FR;fr-CA;fr-BE;fr-CH;it-IT;it-CH;de-DE;de-AT;de-BE;de-CH;ja-JP;es-ES;es-US;cmn-Hant-TW;hi-IN</item>
<item>device_personalization_services/Captions__allow_voip_call_without_audio_recording=true</item>
<item>device_personalization_services/Captions__available_for_download=en-US;en-GB;en-CA;en-IE;en-AU;en-SG;en-IN;fr-FR;fr-CA;fr-BE;fr-CH;it-IT;it-CH;de-DE;de-AT;de-BE;de-CH;ja-JP;es-ES;es-US;cmn-Hant-TW;hi-IN;pt-BR;tr-TR;pl-PL;cmn-Hans-CN;ko-KR;ru-RU;vi-VN</item>
<item>device_personalization_services/Captions__disable_prod=false</item>
<!-- <item>device_personalization_services/Captions__enable=false</item> -->
<item>device_personalization_services/Captions__enable_activation_boost=true</item>
<item>device_personalization_services/Captions__enable_adaptive_box_width=true</item>
<item>device_personalization_services/Captions__enable_augmented_modality=true</item>
<item>device_personalization_services/Captions__enable_augmented_modality_input=true</item>
<item>device_personalization_services/Captions__enable_augmented_modality_language_detection=true</item>
<item>device_personalization_services/Captions__enable_augmented_music=true</item>
<!-- <item>device_personalization_services/Captions__enable_clearcut_logging=true</item> -->
<item>device_personalization_services/Captions__enable_drag_and_double_tap_to_resize=false</item>
<item>device_personalization_services/Captions__enable_drag_and_double_tap_to_resize=true</item>
<item>device_personalization_services/Captions__enable_ec_integration=false</item>
<item>device_personalization_services/Captions__enable_language_detection=true</item>
<item>device_personalization_services/Captions__enable_one_caption_experiment=false</item>
<item>device_personalization_services/Captions__enable_punctuations=true</item>
<item>device_personalization_services/Captions__enable_setting_page=false</item>
<item>device_personalization_services/Captions__enable_survey=false</item>
<item>device_personalization_services/Captions__enable_text_transform=true</item>
<item>device_personalization_services/Captions__enable_westworld_logging=false</item>
<item>device_personalization_services/Captions__enable_zero_day=false</item>
@@ -51,7 +56,9 @@
<item>device_personalization_services/Captions__new_model_version=20210623</item>
<item>device_personalization_services/Captions__new_model_version_advanced_2022=20230807</item>
<item>device_personalization_services/Captions__speech_threshold=0.2</item>
<item>device_personalization_services/Captions__supported_languages=en-US;fr-FR;it-IT;de-DE;ja-JP;es-ES;cmn-Hant-TW;hi-IN</item>
<item>device_personalization_services/Captions__support_lang_id_disabled_after_dismissals=true</item>
<item>device_personalization_services/Captions__supported_languages=en-US;fr-FR;it-IT;de-DE;ja-JP;es-ES;cmn-Hant-TW;hi-IN;pt-BR;tr-TR;pl-PL;cmn-Hans-CN;ko-KR;ru-RU;vi-VN</item>
<item>device_personalization_services/Captions__supported_languages_beta_quality=ja-JP;pt-BR;tr-TR;pl-PL;cmn-Hans-CN;ko-KR;ru-RU;vi-VN</item>
<item>device_personalization_services/Captions__surface_sound_events=true</item>
<item>device_personalization_services/Captions__text_transform_augmented_input=true</item>
<item>device_personalization_services/Captions__visibility_playing_duration_millis=5000</item>
@@ -59,12 +66,23 @@
<!-- Now Playing (Pixel 2017) -->
<item>device_personalization_services/NowPlaying__ambient_music_apk_music_detector_min_score=0.45</item>
<item>device_personalization_services/NowPlaying__ambient_music_download_album_art_via_astrea=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_enable_resource_download_logging=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_enhanced_metadata_shards_manifest=4003:https://storage.googleapis.com/music-iq-db/updatable_db_v4/20241015-000033/manifest.json</item>
<item>device_personalization_services/NowPlaying__ambient_music_get_model_state_cooldown_seconds_cloud_search=9</item>
<item>device_personalization_services/NowPlaying__ambient_music_index_manifest_17_09_02=3082:https://storage.googleapis.com/music-iq-db/updatable_db_v3/20240421-030101/manifest.json</item>
<item>device_personalization_services/NowPlaying__ambient_music_index_manifest_17_09_02=3105:https://storage.googleapis.com/music-iq-db/updatable_db_v3/20241013-030037/manifest.json</item>
<item>device_personalization_services/NowPlaying__ambient_music_matcher_match_threshold_17_09_02=1.0E-6</item>
<item>device_personalization_services/NowPlaying__ambient_music_on_demand_enabled=true</item>
<item>device_personalization_services/NowPlaying__ambient_music_on_demand_music_confidence=0.48</item>
<item>device_personalization_services/NowPlaying__ambient_music_on_demand_search_use_new_opt_in_flow=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_show_album_art=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_support_dsp_model_tflite_p6=true</item>
<item>device_personalization_services/NowPlaying__ambient_music_use_enhanced_matches_database=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_use_metadata_shards_database=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_use_yt_domain_fife_urls=false</item>
<item>device_personalization_services/NowPlaying__cloud_api_allowed=true</item>
<item>device_personalization_services/NowPlaying__create_shortcut_on_np_enabled=false</item>
<item>device_personalization_services/NowPlaying__default_music_player_setting=false</item>
<item>device_personalization_services/NowPlaying__dsp_model_checksum_enabled=true</item>
<!-- <item>device_personalization_services/NowPlaying__enable_usage_fa=true</item> -->
<item>device_personalization_services/NowPlaying__favorites_enabled=true</item>
@@ -73,11 +91,12 @@
<item>device_personalization_services/NowPlaying__handle_ambient_music_results_with_history=true</item>
<item>device_personalization_services/NowPlaying__min_training_interval_millis=86400000</item>
<item>device_personalization_services/NowPlaying__nnfp_v3_model_enabled=true</item>
<item>device_personalization_services/NowPlaying__on_demand_enable_eager_prompt=true</item>
<item>device_personalization_services/NowPlaying__on_demand_enable_eager_prompt=false</item>
<item>device_personalization_services/NowPlaying__on_demand_fingerprinter_being_setup_warning=true</item>
<item>device_personalization_services/NowPlaying__on_demand_hide_if_fingerprinter_install_not_confirmed=true</item>
<item>device_personalization_services/NowPlaying__on_demand_min_supported_aga_version=12.35.17</item>
<item>device_personalization_services/NowPlaying__on_demand_retry_fingerprinter_install=true</item>
<item>device_personalization_services/NowPlaying__shortcut_direct_create_enabled=false</item>
<item>device_personalization_services/NowPlaying__youtube_export_enabled=true</item>
<!-- Adaptive Sound (Pixel 2020) -->
@@ -102,11 +121,13 @@
<item>device_personalization_services/Translate__differentiate_simplified_and_traditional_chinese=true</item>
<item>device_personalization_services/Translate__disable_translate_without_system_animation=false</item>
<item>device_personalization_services/Translate__enable_chronicle_migration=true</item>
<item>device_personalization_services/Translate__enable_default_langid_model=false</item>
<item>device_personalization_services/Translate__enable_default_langid_model=true</item>
<item>device_personalization_services/Translate__enable_dictionary_langid_detection=true</item>
<item>device_personalization_services/Translate__enable_opmv4_service=true</item>
<item>device_personalization_services/Translate__enable_settings_backup_restore=false</item>
<item>device_personalization_services/Translate__enable_setup_wizard_dialog_v2=false</item>
<item>device_personalization_services/Translate__enable_spa_setting=false</item>
<item>device_personalization_services/Translate__enable_translate_kit_api_migration=false</item>
<item>device_personalization_services/Translate__interpreter_source_languages=de,en,ja,es,fr,it</item>
<item>device_personalization_services/Translate__interpreter_target_languages=de,en,ja,es,fr,it</item>
<item>device_personalization_services/Translate__replace_auto_translate_copied_text_enabled=true</item>

View File

@@ -241,8 +241,8 @@
<item>"/system_ext/priv-app/SystemUI/SystemUI.apk"</item>
</string-array>
<!-- Should the pinner service pin the Home application? -->
<bool name="config_pinnerHomeApp">true</bool>
<!-- Bytes that the PinnerService will pin for Home app -->
<integer name="config_pinnerHomePinBytes">6291456</integer>
<!-- Bytes that the PinnerService will pin for WebView -->
<integer name="config_pinnerWebviewPinBytes">20971520</integer>
@@ -276,6 +276,9 @@
<!-- Enable Zram writeback feature to allow unused pages in zram be written to flash. -->
<bool name="config_zramWriteback">true</bool>
<!-- the number of the max cached processes in the system. -->
<integer name="config_customizedMaxCachedProcesses">1024</integer>
<!-- List of system components which are allowed to receive ServiceState entries in an
un-sanitized form, even if the location toggle is off. This is intended ONLY for system
components, such as the telephony stack, which require access to the full ServiceState for

View File

@@ -1,22 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright (c) 2020, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Content description of the data connection type 5G UW. [CHAR LIMIT=NONE] -->
<string name="data_connection_5g_plus" translatable="false">5G UW</string>
</resources>

View File

@@ -1,22 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright (c) 2020, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Content description of the data connection type 5G UW. [CHAR LIMIT=NONE] -->
<string name="data_connection_5g_plus" translatable="false">5G UW</string>
</resources>

View File

@@ -92,21 +92,23 @@ const struct SysfsCollector::SysfsPaths sysfs_paths = {
"/sys/class/power_supply/maxfg/gmsr",
"/sys/class/power_supply/maxfg_base/gmsr",
},
.FGModelLoadingPath = {
"/sys/class/power_supply/maxfg/m5_model_state",
"/sys/class/power_supply/maxfg_base/m5_model_state"
},
.FGLogBufferPath = {
"/dev/logbuffer_maxfg_monitor",
"/dev/logbuffer_max77779fg_monitor",
"/dev/logbuffer_maxfg_base_monitor",
"/dev/logbuffer_maxfg_secondary_monitor"
},
.TotalCallCountPath = "/sys/devices/platform/audiometrics/call_count"
};
const struct UeventListener::UeventPaths ueventPaths = {
.AudioUevent = "/devices/virtual/amcs/amcs",
.TypeCPartnerUevent = "PRODUCT_TYPE=",
.FGLearningPath = {
"/sys/class/power_supply/maxfg/fg_learning_events",
"/sys/class/power_supply/maxfg_base/fg_learning_events"
},
.FwUpdatePath = "",
.FGModelLoadingPath = {
"/sys/class/power_supply/maxfg/m5_model_state",
"/sys/class/power_supply/maxfg_base/m5_model_state"
}
.FwUpdatePath = ""
};
int main() {

View File

@@ -274,7 +274,7 @@ void addSoC(std::shared_ptr<PowerStats> p) {
}
void setEnergyMeter(std::shared_ptr<PowerStats> p) {
std::vector<const std::string> deviceNames { "s2mpg12-odpm", "s2mpg13-odpm" };
std::vector<std::string> deviceNames { "s2mpg12-odpm", "s2mpg13-odpm" };
p->setEnergyMeterDataProvider(std::make_unique<IioEnergyMeterDataProvider>(deviceNames, true));
}

View File

@@ -0,0 +1,9 @@
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
runtime_resource_overlay {
name: "TetheringOverlay",
sdk_version: "current",
product_specific: true
}

View File

@@ -0,0 +1,27 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2021 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<!-- Pixel specific tethering overlays -->
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.android.networkstack.tethering.overlay"
android:versionCode="1"
android:versionName="1.0">
<application android:hasCode="false" />
<overlay
android:targetPackage="com.android.networkstack.tethering"
android:targetName="TetheringConfig"
android:isStatic="true"
android:priority="0" />
</manifest>

View File

@@ -0,0 +1,46 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/*
* Copyright (C) 2021 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources>
<!-- List of regexpressions describing the interface (if any) that represent tetherable
USB interfaces. If the device doesn't want to support tethering over USB this should
be empty. An example would be "usb.*" -->
<string-array translatable="false" name="config_tether_usb_regexs">
<item>rndis\\d</item>
</string-array>
<!-- List of regexpressions describing the interface (if any) that represent tetherable
NCM interfaces. If the device doesn't want to support tethering over NCM this should
be empty. -->
<string-array translatable="false" name="config_tether_ncm_regexs">
<item>ncm\\d</item>
</string-array>
<!-- List of regexpressions describing the interface (if any) that represent tetherable
Wifi P2P interfaces. If the device doesn't want to support tethering over Wifi P2p this
should be empty. An example would be "p2p-p2p\\d-.*" -->
<string-array translatable="false" name="config_tether_wifi_p2p_regexs">
<item>p2p-p2p\\d-.*</item>
<item>p2p\\d</item>
<item>p2p-wlan\\d-.*</item>
</string-array>
<!-- Which USB function should be enabled when TETHERING_USB is requested. 0: RNDIS, 1: NCM.
-->
<integer translatable="false" name="config_tether_usb_functions">1</integer>
</resources>

View File

@@ -1,9 +1,6 @@
# ConnectivityThermalPowerManager
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/connectivity_thermal_power_manager
# ramdump
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/ramdump
# twoshay
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/input
@@ -11,7 +8,7 @@ BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/input
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/googlebattery
# sepolicy that are shared among devices using whitechapel
BOARD_SEPOLICY_DIRS += device/google/gs201/sepolicy/whitechapel_pro
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs201/sepolicy/whitechapel_pro
# unresolved SELinux error log with bug tracking
BOARD_SEPOLICY_DIRS += device/google/gs201/sepolicy/tracking_denials

View File

@@ -0,0 +1,5 @@
typeattribute pixelntnservice_app coredomain;
app_domain(pixelntnservice_app);
allow pixelntnservice_app app_api_service:service_manager find;
set_prop(pixelntnservice_app, telephony_modem_prop)

View File

@@ -2,4 +2,5 @@
persist.fingerprint.ghbm u:object_r:fingerprint_ghbm_prop:s0 exact bool
# Telephony
telephony.TnNtn.image_switch u:object_r:telephony_modem_prop:s0 exact enum ntn tn
telephony.ril.silent_reset u:object_r:telephony_ril_prop:s0 exact bool

View File

@@ -8,3 +8,5 @@ user=_app seinfo=platform name=com.android.hbmsvmanager domain=hbmsvmanager_app
# TODO(b/222204912): Should this run under uwb user?
user=_app isPrivApp=true seinfo=uwb name=com.qorvo.uwb.vendorservice domain=uwb_vendor_app type=uwb_vendor_data_file levelFrom=all
# PixelNtnService
user=system seinfo=platform name=com.google.android.satellite domain=pixelntnservice_app type=app_data_file levelFrom=all

View File

@@ -0,0 +1 @@
type pixelntnservice_app, domain;

View File

@@ -3,7 +3,8 @@ system_vendor_config_prop(fingerprint_ghbm_prop)
# Telephony
system_public_prop(telephony_ril_prop)
system_restricted_prop(telephony_modem_prop)
userdebug_or_eng(`
set_prop(shell, telephony_ril_prop)
')
')

View File

@@ -0,0 +1,2 @@
# b/382362323
dontaudit bluetooth default_android_service:service_manager { find };

View File

@@ -1,13 +1,40 @@
aconfigd apex_info_file file b/381326452
bluetooth audio_config_prop file b/379245738
dump_display sysfs file b/350831939
dump_modem sscoredump_vendor_data_coredump_file dir b/361726277
dump_modem sscoredump_vendor_data_logcat_file dir b/361726277
dumpstate unlabeled file b/350832009
hal_camera_default aconfig_storage_metadata_file dir b/383013727
hal_face_default traced_producer_socket sock_file b/305600808
hal_power_default hal_power_default capability b/237492146
hal_sensors_default property_socket sock_file b/373755350
hal_sensors_default sysfs file b/336451433
incidentd debugfs_wakeup_sources file b/282626428
incidentd incidentd anon_inode b/282626428
init init capability b/379206608
insmod-sh insmod-sh key b/336451874
kernel dm_device blk_file b/319403445
kernel kernel capability b/336451113
kernel tmpfs chr_file b/321731318
pixelstats_vendor block_device dir b/369540701
platform_app vendor_fw_file dir b/377811773
platform_app vendor_rild_prop file b/377811773
priv_app audio_config_prop file b/379246129
ramdump ramdump capability b/369475655
rfsd vendor_cbd_prop file b/317734397
shell sysfs_net file b/329380891
ssr_detector_app default_prop file b/359428005
surfaceflinger selinuxfs file b/315104594
system_server vendor_default_prop file b/366116786
untrusted_app audio_config_prop file b/379245515
vendor_init debugfs_trace_marker file b/336451787
vendor_init default_prop file b/315104479
vendor_init default_prop file b/315104803
vendor_init default_prop file b/323086703
vendor_init default_prop file b/323086890
vendor_init default_prop file b/329380363
vendor_init default_prop file b/329381126
vendor_init default_prop property_service b/315104803
vendor_init default_prop property_service b/359427666
vendor_init default_prop property_service b/359428317
zygote zygote capability b/379206941

View File

@@ -0,0 +1,2 @@
# b/360057889
dontaudit hal_vibrator_default default_android_service:service_manager { find };

View File

@@ -5,6 +5,7 @@ init_daemon_domain(cbd)
set_prop(cbd, vendor_modem_prop)
set_prop(cbd, vendor_cbd_prop)
set_prop(cbd, vendor_rild_prop)
get_prop(cbd, telephony_modem_prop)
# Allow cbd to set gid/uid from too to radio
allow cbd self:capability { setgid setuid };

View File

@@ -1,33 +1,28 @@
-----BEGIN CERTIFICATE-----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MIIFxjCCA66gAwIBAgIURH+ESClecwsP2Et2gQ1RAHxabWcwDQYJKoZIhvcNAQELBQAwdDELMAkGA
1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBg
NVBAoTC0dvb2dsZSBJbmMuMRAwDgYDVQQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMB4XDTE
5MDIyODE5MjIxNloXDTQ5MDIyODE5MjIxNlowdDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlm
b3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBgNVBAoTC0dvb2dsZSBJbmMuMRAwDgYDV
QQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCg
KCAgEA5AVOe4SKiCOnR4DQ2V3sIo5LNpGtmdzZ54MnHIrsSX8n43xtCTpfQWDWnDZFCIHSmR8KAOQ
0BNxL8ajtr66gU6tFzD5Vlistwl9P9uUlYWgGaeyEoOUqtiN2HtsJDpcCLYKOz6oH2c5NeruDp5n/
Z49xpXXXLgoOTlsoS65tsTcWFrcSuuOE40UyFJ+Rwhh1EiXGPvT99gaXNnDq5WIsPNNe39jV7f01l
Zs/g5iUn4dVA/DxLMam/CQh7qQkh6qWkDL8koQ21N9xEZYTR8qvGvgz3Zd1yfT0P1HsgJaPXK5Fqb
2vLV1NP8KoYIlB2KqadCn+HJjIgH8UIbB+R8o6KuWCYzLb5vPs87HkXG5/Y+GB7HrCIC+6a8BJ4UU
yjUkg/HtBd7GlEixZKLtbcJ3erdfL7uigjCJEqAYDXr2Zes31898ePcl3YQO5/rHobB7f4w3iF/Tw
IAAyRRlOceoskCEa/vCbmb7I8HQIJthSNedWcBiKUneohCtfLT3qS0JUVZewiFRMOVD8mwcZFr4o/
UfVslEe8DpBp0WXs/83OeEJdtfRc861jdOJ7EIyfDmBX91iWgLCBgv6aXtMvP7CwgZV7y+C+Wbbsj
YTYSjsNVSA1uexVPozsSkIjxote0aAiu6+b8LAq9bq2c6Yc6MoldgBqlfcwvFzlKqlm966q6UCAwE
AAaNQME4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUuH5K2ov/9L++x+8UhrCDhNdJm6EwHwYDVR0j
BBgwFoAUuH5K2ov/9L++x+8UhrCDhNdJm6EwDQYJKoZIhvcNAQELBQADggIBAIV1Wx+iwchzxx+gg
bWlmJx+oPya2axvj8cgbLGujxI+nmtY2b7UvzazggubioxJJW7rzemLMDwfKPlfiZkIeQmBe2YJhH
iwIPaRAB2juZTfQARsEkd4qYvcIDui6PbbgitLWOh3lYNDcVe/c8+EwbJuNNSqjPwIZvj2lodTQNI
7uUy1ff5hytHsznObr/rh+MeJlKKY56JL6VEzsD694iVFxJ7f4FXK5Y0pjqYmGj1krcfMFoxHPAmj
57yf3VVzeGKx5re+5WIMe5K0RZB9IWxfvx1DsxXvzVeaHYW/c6VF7TVT/RUV+iLtst+1A1RJbeXDu
3uLHxPAC44WUb3FQOUKPRP2cIul70ifJSbvu+qLuyfgwltXyYIeQMSrUw4WK6NMNYaIPgEq1BX4rL
UlKxlH4xaNwT5ZCWLTRdWozYP5FFSMdQhhOb1Ki81wKmr1f9EkXoW9eGRZBj3tAg90k0qltel30eL
pW6gmnNg+la84nyaXfBF3vQAbaAuW5D3TAMWR/Wl6nHoPItdrXHkyMRvQkzx2ezKz61ZP3uDfEZvM
LXR0lle8s6pTZB3GLS4mY9LFQdDwPlc1xk8yEcdnUAZs+9U6zZF1+FKSgb3UNy81g2DHUMp0FCBXT
y+kLm0LQVYU91kLd+fTkmgkWl4xSyXeV5g3FFuiv9ahl7//vvCG
-----END CERTIFICATE-----

View File

@@ -1,30 +1,28 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFyTCCA7GgAwIBAgIVAOIyhgQLgi+rUO4eSQQXtNRbmCkxMA0GCSqGSIb3DQEBCwUAMHQxCzAJB
gNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MRQwEg
YDVQQKEwtHb29nbGUgSW5jLjEQMA4GA1UECxMHQW5kcm9pZDEQMA4GA1UEAxMHQW5kcm9pZDAgFw0
yMTA2MzAyMzI2MTJaGA8yMDUxMDYzMDIzMjYxMlowdDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNh
bGlmb3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBgNVBAoTC0dvb2dsZSBJbmMuMRAwD
gYDVQQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMI
ICCgKCAgEAyd6adlL+Lz1Cik4amNBKJ9tRXchwrvn3xN5Cap8hpVkM0LsY/jqPEEKamZnR4rb22tl
G6r6nINAvsG/Umre1daWiR+nfYNPu3yAvT+88KfqR4nq2RHEuap/EceB4CzgrWFtSYewNFiiT5yNT
+GKCXq6MSu2MVS7tL8l9130rL5Y7MSCYdbd99JvfcqHz8h0yaTvCq0Kk1Vc/vjpxmAVxc8WWFH6x0
3ibLK95rAy3Gbvxg+xevUhRFZYH/pOLY0U6V4D++ChV8dcbxeYCscW7wY5HSHel79XsZXVkiTtfmd
H/KXsc6XGVC9x61/TvXC+VwzwXcQgfAtDDsy+LI/O11fv/vw01LY/JpxocvV5IjyMcQiG3ExGx2FS
nkIvYyzS8thBuQtOkpTk19zmmjG6HtUdol449I4X4P7SFAhdvah+WQ6Bt5BEyAt+0gqTl+P8GqeUF
Gv3Zgm73ic4Y3G41FbKDPlXU4+bH+j442GuvJfPIV++N9FnxhEb9Dg+6ZHab1RlBPzY1ElubgGef7
xOIygfBmThnsoeWzldT8ov/+RRPu4dM5xm3qzZl7kbgnE7zCsTbklhIdU1Cux/aujcDfawqENbQSI
BctnUoQCPIUmsHYy3It/tYemCk5bJA/ljQLl683IeoatydHeYBE2SAkeVzP2ZjQPTJJPO6SP7lzlM
CAwEAAaNQME4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUWGDcf/UfEzceEZquM9YwNiimSqIwHwYD
VR0jBBgwFoAUWGDcf/UfEzceEZquM9YwNiimSqIwDQYJKoZIhvcNAQELBQADggIBAIe/ANIkuEZnL
vYTP2+wlKSQvSZAMKStNZRhxmrjFrpeWTL1biX4We8soepNNRLUx3UunPnSvr6dDHksmk3l9b65EI
CmpDJs5YiPAf2aLLcWA2XAZ6P2QDHM+xAwMF8OWlLLSPASwrJSxUsnKfQfTO/Aq9kgHP4nNQ5p5G3
I6svZ+YSauh1+giGql+hkN27KAZfnIwjQJ8MQo8R7aHkIpIwCYB7GL0JyLf6uvNdJeKzW6/mNEEYD
XwPu4zTVILMLfWjRkPl1XEHbAM3a3ROb24faez45wJDqGg6N4BAwXeYH3eBoVRNrAfWhg+291fZQw
fDus1lHbs5rDSxeCCfdyHSSVhcRWL8evE9S4Rtu9YRrxHoZ5gPAJB3xD9dJXKj/cXwZFIl7wiFxuT
NbESSzIfq7TVZ+iCjZbJbrfy5Dt9Q/PnxU2DLxgUt+wja0C4+GyOMvVBnGMxaklVPYi5O+1rsvfok
uK1rFFSuDF9qbPyfKtHvoXM5hX6poPV2hCTIwaPn33z2huNAk56MtAb5U04FALE+HWnsIKXbRq4ys
nH66x9lfj+uIWCkBm+wc//CkERC1ttwi78aQVtEv2w3tvMV9t+ZtxMW6oRJry9Hbs1WFI4J9sU8qQ
3iiSqjdfgp35+eAGFWuYB2lPuSGLH9UinvgkDyqsFXhUcfjj3TJRR18
-----END CERTIFICATE-----

View File

@@ -1,29 +1,28 @@
-----BEGIN CERTIFICATE-----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B
gNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MRQwEg
YDVQQKEwtHb29nbGUgSW5jLjEQMA4GA1UECxMHQW5kcm9pZDEXMBUGA1UEAwwOY29tX2dvb2dsZV9
tZHMwHhcNMTkwNDIyMTQ1NzA1WhcNNDkwNDIyMTQ1NzA1WjB7MQswCQYDVQQGEwJVUzETMBEGA1UE
CBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEUMBIGA1UEChMLR29vZ2xlIEluY
y4xEDAOBgNVBAsTB0FuZHJvaWQxFzAVBgNVBAMMDmNvbV9nb29nbGVfbWRzMIICIjANBgkqhkiG9w
0BAQEFAAOCAg8AMIICCgKCAgEAqgNC0hhI3NzaPUllJfe01hCTuEpl35D02+DKJ5prPFxv6KGTk6s
kjZOwV87Zf2pyj/cbnv28ioDjwvqMBe4ntFdKtH9gl2tTAVl69HMKXF4Iny/wnrt2mxzhWxFUd5Pu
W+mWug+UQw/NGUuaf5d/yys/RrchHKM1+zBV6aOzH6BXiwDoOF2i43d5GlNQ/tFuMySWLJftJN0QU
LFelxNDFFJZhw2P3c4opxjmF2yCoIiDfBEIhTZFKUbHX6YDLXmtUpXl35q+cxK4TCxPURyzwdfiyh
eF3TTxagfzhvXNg/ifrY67S4qCGfzoEMPxrTz02gS0u3D6r/2+hl9vAJChLKDNdIs6TqIw+YnABrE
LiZLLFnaABnjQ7xC3xv1s3W6dWxaxnoVMtC1YvdgwhC5gSpJ4A+AGcCLv96hoeB1IIoGV9Yt0Z97M
FpXeHFpAxFZ1F9feBqwOCDbu50dmdKZvqGHZ4Ts3uy7ukDQ08dquHpT+NmqkmmW5GGhkuyZS3HHpU
/QeVsZiyJCJBbDe5lz6NGXK56ruuF9ILeGHtldjQm40oYRc01ESScyVjSU0kpMOC7hn1B7rKAm8xx
G7eH04ieQrNnbbee7atOO4C3157W5CqujfLMeo6OCRVtcYkYIuSi8hIPNySu/qOaEtEP4owVNZR0H
6mCHy5pANsyBofMkCAwEAAaNQME4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUgk8pmLx8yP3RILwR
5am1G10PBEowHwYDVR0jBBgwFoAUgk8pmLx8yP3RILwR5am1G10PBEowDQYJKoZIhvcNAQELBQADg
gIBAC9iQ1huo6CzjcsB1IIw3WYPYVfHtvG7fiB49QO6cjth8fxM36YOxnMzK9Zh89cnFx7BeXG4Md
bR3lAWO+wTbEpM/5azAQfqHB/ZEEAo1THtqS58C1bTwJ5zxkA+wL/x1ucTEV0QZtPHC1K5nIV5FuI
CiJjui5FHfj2HYu2A5a5729rdZ7sL8Vgx6TUFKpEPs5iCrlx5X/E+/wJaDM5iIjVvrGJJq0VWHHeD
JEE+Sw1CDxWYRzvu1WvCvhk149hf4LlfrR0A5t8QJRGx0WwF10DLGgJx7epMBpzhMIXc529FTIx4R
x2PcufjTZC9EN7PkLgVfYahWEkt/YIfV/0F6U6viLxdNC5O0pimSV57vT6HIthX1OC34eZca0cPqH
1kOuhRDKOhbP4yIgdYX6knpvw8aXsYcyTfAmDyrt0EWffeBPedaxMoxfijdlsBQUymviUQ8qBbfl1
Ew9VoC+VEsiobK7Ubog0IK+82LQ7FOLMoNYnhk5wJ63i1kVvBVAgH64PMME2KG//BwYFfKK6jUXib
abyNke72+1Jr0xpw1BHJPxNJ8Q8yCBLF0wmXmFJSM+9lSDd10BniFJeMFMQ0T1Sf8GUSIxYYbMK5p
DguRs+JOYkUID02ylJ3L6GAnxXCjGWzpdxw29/WWJc+qsYFEIbPkKzTUNQHaaLHmcLK22Ht
-----END CERTIFICATE-----

View File

@@ -1,34 +0,0 @@
type convert-to-ext4-sh, domain, coredomain;
type convert-to-ext4-sh_exec, system_file_type, exec_type, file_type;
userdebug_or_eng(`
permissive convert-to-ext4-sh;
init_daemon_domain(convert-to-ext4-sh)
allow convert-to-ext4-sh block_device:dir search;
allow convert-to-ext4-sh e2fs_exec:file rx_file_perms;
allow convert-to-ext4-sh efs_block_device:blk_file rw_file_perms;
allow convert-to-ext4-sh kernel:process setsched;
allow convert-to-ext4-sh kmsg_device:chr_file rw_file_perms;
allow convert-to-ext4-sh persist_block_device:blk_file { getattr ioctl open read write };
allow convert-to-ext4-sh shell_exec:file rx_file_perms;
allow convert-to-ext4-sh sysfs_fs_ext4_features:dir { read search };
allow convert-to-ext4-sh sysfs_fs_ext4_features:file read;
allow convert-to-ext4-sh tmpfs:dir { add_name create mounton open };
allow convert-to-ext4-sh tmpfs:dir { remove_name rmdir rw_file_perms setattr };
allow convert-to-ext4-sh tmpfs:file { create rw_file_perms unlink };
allow convert-to-ext4-sh toolbox_exec:file rx_file_perms;
allow convert-to-ext4-sh vendor_persist_type:dir { rw_file_perms search };
allow convert-to-ext4-sh vendor_persist_type:file rw_file_perms;
allowxperm convert-to-ext4-sh { efs_block_device persist_block_device}:blk_file ioctl {
BLKDISCARD BLKPBSZGET BLKDISCARDZEROES BLKROGET LOOP_CLR_FD
};
dontaudit convert-to-ext4-sh labeledfs:filesystem { mount unmount };
dontaudit convert-to-ext4-sh self:capability { chown fowner fsetid dac_read_search sys_admin sys_rawio };
dontaudit convert-to-ext4-sh unlabeled:dir { add_name create mounton open rw_file_perms search setattr };
dontaudit convert-to-ext4-sh unlabeled:file { create rw_file_perms setattr };
dontaudit convert-to-ext4-sh convert-to-ext4-sh:capability { dac_override };
')

View File

@@ -1,3 +1,4 @@
# File containing sepolicies for GCA-Eng & GCA-Next.
userdebug_or_eng(`
# Allows camera app to access the GXP device and properties.
allow debug_camera_app gxp_device:chr_file rw_file_perms;
@@ -9,4 +10,7 @@ userdebug_or_eng(`
# Allows GCA-Eng to find and access the EdgeTPU.
allow debug_camera_app edgetpu_app_service:service_manager find;
allow debug_camera_app edgetpu_device:chr_file { getattr read write ioctl map };
# Allows tachyon_service to communicate with GCA-Eng via binder.
binder_call(edgetpu_tachyon_server, debug_camera_app);
')

View File

@@ -1,8 +1,6 @@
# device.te
type modem_block_device, dev_type;
type custom_ab_block_device, dev_type;
type persist_block_device, dev_type;
type efs_block_device, dev_type;
type modem_userdata_block_device, dev_type;
type mfg_data_block_device, dev_type;
type vendor_toe_device, dev_type;
type lwis_device, dev_type;
@@ -20,3 +18,4 @@ type fips_block_device, dev_type;
# SecureElement SPI device
type st54spi_device, dev_type;
type st33spi_device, dev_type;

View File

@@ -0,0 +1,25 @@
# Allow dumpstate to execute dump_power
pixel_bugreport(dump_power);
allow dump_power sysfs_acpm_stats:dir r_dir_perms;
allow dump_power sysfs_acpm_stats:file r_file_perms;
allow dump_power sysfs_cpu:file r_file_perms;
allow dump_power sysfs_wlc:file r_file_perms;
allow dump_power sysfs_wlc:dir search;
allow dump_power sysfs_batteryinfo:dir r_dir_perms;
allow dump_power sysfs_batteryinfo:file r_file_perms;
allow dump_power logbuffer_device:chr_file r_file_perms;
allow dump_power mitigation_vendor_data_file:dir r_dir_perms;
allow dump_power mitigation_vendor_data_file:file r_file_perms;
allow dump_power sysfs_bcl:dir r_dir_perms;
allow dump_power sysfs_bcl:file r_file_perms;
allow dump_power battery_history_device:chr_file r_file_perms;
userdebug_or_eng(`
r_dir_file(dump_power, vendor_battery_debugfs)
r_dir_file(dump_power, vendor_maxfg_debugfs)
r_dir_file(dump_power, vendor_charger_debugfs)
r_dir_file(dump_power, vendor_votable_debugfs)
allow dump_power debugfs:dir r_dir_perms;
allow dump_power vendor_usb_debugfs:dir { search };
')

View File

@@ -1,30 +0,0 @@
pixel_bugreport(dump_power_gs201)
allow dump_power_gs201 sysfs_acpm_stats:dir r_dir_perms;
allow dump_power_gs201 sysfs_acpm_stats:file r_file_perms;
allow dump_power_gs201 sysfs_cpu:file r_file_perms;
allow dump_power_gs201 vendor_toolbox_exec:file execute_no_trans;
allow dump_power_gs201 logbuffer_device:chr_file r_file_perms;
allow dump_power_gs201 mitigation_vendor_data_file:dir r_dir_perms;
allow dump_power_gs201 sysfs:dir r_dir_perms;
allow dump_power_gs201 sysfs_batteryinfo:dir r_dir_perms;
allow dump_power_gs201 sysfs_batteryinfo:file r_file_perms;
allow dump_power_gs201 sysfs_bcl:dir r_dir_perms;
allow dump_power_gs201 sysfs_bcl:file r_file_perms;
allow dump_power_gs201 sysfs_wlc:dir r_dir_perms;
allow dump_power_gs201 sysfs_wlc:file r_file_perms;
allow dump_power_gs201 battery_history_device:chr_file r_file_perms;
allow dump_power_gs201 mitigation_vendor_data_file:file r_file_perms;
userdebug_or_eng(`
allow dump_power_gs201 debugfs:dir r_dir_perms;
allow dump_power_gs201 vendor_battery_debugfs:dir r_dir_perms;
allow dump_power_gs201 vendor_battery_debugfs:file r_file_perms;
allow dump_power_gs201 vendor_charger_debugfs:dir r_dir_perms;
allow dump_power_gs201 vendor_charger_debugfs:file r_file_perms;
allow dump_power_gs201 vendor_pm_genpd_debugfs:file r_file_perms;
allow dump_power_gs201 vendor_maxfg_debugfs:dir r_dir_perms;
allow dump_power_gs201 vendor_maxfg_debugfs:file r_file_perms;
allow dump_power_gs201 vendor_votable_debugfs:dir r_dir_perms;
allow dump_power_gs201 vendor_votable_debugfs:file r_file_perms;
')

View File

@@ -93,3 +93,6 @@ type sysfs_usbc_throttling_stats, sysfs_type, fs_type;
# WLC
type sysfs_wlc, sysfs_type, fs_type;
# /system_ext/bin/convert_to_ext4.sh
type convert-to-ext4-sh_exec, system_file_type, exec_type, file_type;

View File

@@ -5,7 +5,6 @@
/vendor/bin/vcd u:object_r:vcd_exec:s0
/vendor/bin/chre u:object_r:chre_exec:s0
/vendor/bin/cbd u:object_r:cbd_exec:s0
/vendor/bin/modem_svc_sit u:object_r:modem_svc_sit_exec:s0
/vendor/bin/rfsd u:object_r:rfsd_exec:s0
/vendor/bin/bipchmgr u:object_r:bipchmgr_exec:s0
/vendor/bin/storageproxyd u:object_r:tee_exec:s0
@@ -15,6 +14,7 @@
/vendor/bin/trusty_apploader u:object_r:trusty_apploader_exec:s0
/vendor/bin/trusty_metricsd u:object_r:trusty_metricsd_exec:s0
/vendor/bin/dumpsys u:object_r:vendor_dumpsys:s0
/vendor/bin/dump/dump_power u:object_r:dump_power_exec:s0
/vendor/bin/init\.uwb\.calib\.sh u:object_r:vendor_uwb_init_exec:s0
/vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service\.trusty u:object_r:hal_gatekeeper_default_exec:s0
/vendor/bin/hw/android\.hardware\.gatekeeper-service\.trusty u:object_r:hal_gatekeeper_default_exec:s0
@@ -41,8 +41,6 @@
/vendor/bin/hw/android\.hardware\.memtrack-service\.pixel u:object_r:hal_memtrack_default_exec:s0
/system_ext/bin/convert_to_ext4\.sh u:object_r:convert-to-ext4-sh_exec:s0
/vendor/bin/hw/disable_contaminant_detection\.sh u:object_r:disable-contaminant-detection-sh_exec:s0
/vendor/bin/dump/dump_power_gs201\.sh u:object_r:dump_power_gs201_exec:s0
/vendor/bin/ufs_firmware_update\.sh u:object_r:ufs_firmware_update_exec:s0
/vendor/bin/init\.check_ap_pd_auth\.sh u:object_r:init-check_ap_pd_auth-sh_exec:s0
# Vendor Firmwares
@@ -61,6 +59,7 @@
/vendor/lib(64)?/libGralloc4Wrapper\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/pixel-power-ext-V1-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/android\.frameworks\.stats-V1-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/android\.frameworks\.stats-V2-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/vendor-pixelatoms-cpp\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/libprotobuf-cpp-lite-(\d+\.){2,3}so u:object_r:same_process_hal_file:s0
@@ -83,7 +82,7 @@
/dev/janeiro u:object_r:edgetpu_device:s0
/dev/bigocean u:object_r:video_device:s0
/dev/goodix_fp u:object_r:fingerprint_device:s0
/dev/stmvl53l1_ranging u:object_r:rls_device:s0
/dev/ispolin_ranging u:object_r:rls_device:s0
/dev/watchdog0 u:object_r:watchdog_device:s0
/dev/mali0 u:object_r:gpu_device:s0
/dev/logbuffer_usbpd u:object_r:logbuffer_device:s0
@@ -209,6 +208,7 @@
/dev/maxfg_history u:object_r:battery_history_device:s0
/dev/battery_history u:object_r:battery_history_device:s0
/data/vendor/powerstats(/.*)? u:object_r:powerstats_vendor_data_file:s0
/data/vendor/fingerprint(/.*)? u:object_r:fingerprint_vendor_data_file:s0
# Persist
/mnt/vendor/persist/battery(/.*)? u:object_r:persist_battery_file:s0

View File

@@ -33,6 +33,7 @@ genfscon sysfs /devices/platform/28000000.mali/dma_buf_gpu_mem u
genfscon sysfs /devices/platform/28000000.mali/total_gpu_mem u:object_r:sysfs_gpu:s0
genfscon sysfs /devices/platform/28000000.mali/kprcs u:object_r:sysfs_gpu:s0
genfscon sysfs /devices/platform/28000000.mali/dvfs_period u:object_r:sysfs_gpu:s0
genfscon sysfs /devices/platform/28000000.mali/cur_freq u:object_r:sysfs_gpu:s0
# Fabric
genfscon sysfs /devices/platform/17000010.devfreq_mif/devfreq/17000010.devfreq_mif/min_freq u:object_r:sysfs_fabric:s0
@@ -64,6 +65,55 @@ genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-me
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/wakeup u:object_r:sysfs_wakeup:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power0_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power1_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power2_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power3_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power4_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power5_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power6_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power7_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power8_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power9_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power10_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_power11_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power0_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power1_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power2_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power3_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power4_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power5_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power6_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power7_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power8_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power9_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power10_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_power11_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current0_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current1_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current2_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current3_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current4_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current5_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current6_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current7_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current8_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current9_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current10_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18100000/i2c-20/20-001f/s2mpg12-meter/s2mpg12-odpm//iio:device0/in_current11_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current0_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current1_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current2_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current3_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current4_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current5_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current6_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current7_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current8_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current9_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current10_scale u:object_r:sysfs_odpm:s0
genfscon sysfs /devices/platform/acpm_mfd_bus@18110000/i2c-21/21-002f/s2mpg13-meter/s2mpg13-odpm/iio:device1/in_current11_scale u:object_r:sysfs_odpm:s0
# Devfreq current frequency
genfscon sysfs /devices/platform/17000010.devfreq_mif/devfreq/17000010.devfreq_mif/cur_freq u:object_r:sysfs_devfreq_cur:s0
genfscon sysfs /devices/platform/17000020.devfreq_int/devfreq/17000020.devfreq_int/cur_freq u:object_r:sysfs_devfreq_cur:s0
@@ -102,12 +152,16 @@ genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/panel_extin
genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/panel_name u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/serial_number u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/refresh_rate u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/panel_pwr_vreg u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/power_mode u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/power_state u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2d0000.drmdsim/1c2d0000.drmdsim.0/backlight u:object_r:sysfs_leds:s0
genfscon sysfs /devices/platform/1c2d0000.drmdsim/1c2d0000.drmdsim.0/panel_extinfo u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2d0000.drmdsim/1c2d0000.drmdsim.0/panel_name u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2d0000.drmdsim/1c2d0000.drmdsim.0/serial_number u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2d0000.drmdsim/1c2d0000.drmdsim.0/refresh_rate u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c2d0000.drmdsim/1c2d0000.drmdsim.0/power_state u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c240000.drmdecon/dqe0/atc u:object_r:sysfs_display:s0
genfscon sysfs /devices/platform/1c241000.drmdecon/dqe1/atc u:object_r:sysfs_display:s0

View File

@@ -8,3 +8,6 @@ allow google_camera_app vendor_fw_file:dir search;
# Allows GCA to find and access the EdgeTPU.
allow google_camera_app edgetpu_app_service:service_manager find;
allow google_camera_app edgetpu_device:chr_file { getattr read write ioctl map };
# Allows tachyon service to communicate with google_camera_app via binder.
binder_call(edgetpu_tachyon_server, google_camera_app);

View File

@@ -88,6 +88,7 @@ allow hal_camera_default sysfs_devfreq_cur:file r_file_perms;
# Allow camera HAL to read backlight of display
allow hal_camera_default sysfs_leds:dir r_dir_perms;
allow hal_camera_default sysfs_leds:file r_file_perms;
allow hal_camera_default sysfs_display:file r_file_perms;
# Allow camera HAL to send trace packets to Perfetto
userdebug_or_eng(`perfetto_producer(hal_camera_default)')

View File

@@ -4,6 +4,7 @@ init_daemon_domain(hal_radioext_default)
hwbinder_use(hal_radioext_default)
get_prop(hal_radioext_default, hwservicemanager_prop)
set_prop(hal_radioext_default, vendor_gril_prop)
add_hwservice(hal_radioext_default, hal_radioext_hwservice)
binder_call(hal_radioext_default, grilservice_app)

View File

@@ -19,3 +19,14 @@ allow init sysfs_scsi_devices_0000:file w_file_perms;
# Workaround for b/193113005 that modem_img unlabeled after disable-verity
dontaudit init overlayfs_file:file rename;
dontaudit init overlayfs_file:chr_file unlink;
# /system_ext/bin/convert_to_ext4.sh is a script to convert an f2fs
# filesystem into an ext4 filesystem. This script is executed on
# debuggable devices only. As it is a one-shot script which
# has run in permissive mode since 2022, we transition to the
# su domain to avoid unnecessarily polluting security policy
# with rules which are never enforced.
# This script was added in b/239632964
userdebug_or_eng(`
domain_auto_trans(init, convert-to-ext4-sh_exec, su)
')

View File

@@ -1,4 +1,4 @@
allow kernel vendor_fw_file:dir search;
allow kernel vendor_fw_file:dir r_dir_perms;
allow kernel vendor_fw_file:file r_file_perms;
# ZRam
@@ -8,9 +8,11 @@ allow kernel per_boot_file:file r_file_perms;
allow kernel self:capability2 perfmon;
allow kernel self:perf_event cpu;
dontaudit kernel vendor_battery_debugfs:dir search;
dontaudit kernel vendor_maxfg_debugfs:dir { search };
dontaudit kernel vendor_regmap_debugfs:dir search;
dontaudit kernel vendor_votable_debugfs:dir search;
dontaudit kernel vendor_usb_debugfs:dir search;
dontaudit kernel vendor_charger_debugfs:dir search;
userdebug_or_eng(`
allow kernel vendor_battery_debugfs:dir search;
allow kernel vendor_regmap_debugfs:dir search;
allow kernel vendor_usb_debugfs:dir search;
allow kernel vendor_votable_debugfs:dir search;
allow kernel vendor_charger_debugfs:dir search;
allow kernel vendor_maxfg_debugfs:dir search;
')

View File

@@ -1,3 +1,4 @@
# Selinux rule for modem_svc_sit daemon
type modem_svc_sit, domain;
type modem_svc_sit_exec, vendor_file_type, exec_type, file_type;
init_daemon_domain(modem_svc_sit)
@@ -20,7 +21,7 @@ allow modem_svc_sit modem_stat_data_file:file create_file_perms;
allow modem_svc_sit vendor_fw_file:dir search;
allow modem_svc_sit vendor_fw_file:file r_file_perms;
allow modem_svc_sit mnt_vendor_file:dir search;
allow modem_svc_sit mnt_vendor_file:dir r_dir_perms;
allow modem_svc_sit modem_userdata_file:dir create_dir_perms;
allow modem_svc_sit modem_userdata_file:file create_file_perms;
@@ -40,3 +41,17 @@ get_prop(modem_svc_sit, vendor_logger_prop)
userdebug_or_eng(`
allow modem_svc_sit radio_test_device:chr_file rw_file_perms;
')
# Write trace data to the Perfetto traced daemon. This requires connecting to
# its producer socket and obtaining a (per-process) tmpfs fd.
perfetto_producer(modem_svc_sit)
# Allow modem_svc_sit to access modem image file/dir
allow modem_svc_sit modem_img_file:dir r_dir_perms;
allow modem_svc_sit modem_img_file:file r_file_perms;
allow modem_svc_sit modem_img_file:lnk_file r_file_perms;
# Allow modem_svc_sit to access socket for UMI
userdebug_or_eng(`
allow modem_svc_sit radio_vendor_data_file:sock_file { create unlink };
')

View File

@@ -19,6 +19,7 @@ allow pixelstats_vendor fwk_sensor_service:service_manager find;
# Batery history
allow pixelstats_vendor battery_history_device:chr_file r_file_perms;
allow pixelstats_vendor logbuffer_device:chr_file r_file_perms;
# storage smart idle maintenance
get_prop(pixelstats_vendor, smart_idle_maint_enabled_prop);

View File

@@ -1,9 +1,12 @@
# whitechapel_pro Property Define
vendor_internal_prop(vendor_diag_prop)
vendor_internal_prop(vendor_slog_prop)
vendor_internal_prop(vendor_modem_prop)
vendor_internal_prop(vendor_persist_config_default_prop)
vendor_internal_prop(vendor_cbd_prop)
vendor_internal_prop(vendor_rild_prop)
vendor_internal_prop(vendor_gril_prop)
vendor_internal_prop(vendor_carrier_prop)
vendor_internal_prop(vendor_ssrdump_prop)
vendor_internal_prop(vendor_wifi_version)
@@ -23,7 +26,7 @@ vendor_internal_prop(vendor_persist_sys_default_prop)
vendor_internal_prop(vendor_display_prop)
# Fingerprint
vendor_internal_prop(vendor_fingerprint_prop)
vendor_restricted_prop(vendor_fingerprint_prop)
# UWB calibration
system_vendor_config_prop(vendor_uwb_calibration_prop)
@@ -44,3 +47,6 @@ vendor_restricted_prop(vendor_arm_runtime_option_prop)
# SJTAG lock state
vendor_internal_prop(vendor_sjtag_lock_state_prop)
# Bluetooth props
vendor_restricted_prop(vendor_bluetooth_prop)

View File

@@ -38,6 +38,9 @@ vendor.sys.rild_reset u:object_r:vendor_rild_prop:s0
persist.vendor.radio. u:object_r:vendor_rild_prop:s0
ro.vendor.config.build_carrier u:object_r:vendor_carrier_prop:s0
# for GRIL
vendor.gril. u:object_r:vendor_gril_prop:s0
persist.vendor.config. u:object_r:vendor_persist_config_default_prop:s0
# SSR Detector

View File

@@ -1,24 +0,0 @@
type ramdump_app, domain;
userdebug_or_eng(`
app_domain(ramdump_app)
allow ramdump_app app_api_service:service_manager find;
allow ramdump_app ramdump_vendor_data_file:file create_file_perms;
allow ramdump_app ramdump_vendor_data_file:dir create_dir_perms;
set_prop(ramdump_app, vendor_ramdump_prop)
get_prop(ramdump_app, system_boot_reason_prop)
# To access ramdumpfs.
allow ramdump_app mnt_vendor_file:dir search;
allow ramdump_app ramdump_vendor_mnt_file:dir create_dir_perms;
allow ramdump_app ramdump_vendor_mnt_file:file create_file_perms;
# To access subsystem ramdump files and dirs.
allow ramdump_app sscoredump_vendor_data_crashinfo_file:dir r_dir_perms;
allow ramdump_app sscoredump_vendor_data_crashinfo_file:file r_file_perms;
allow ramdump_app sscoredump_vendor_data_coredump_file:dir r_dir_perms;
allow ramdump_app sscoredump_vendor_data_coredump_file:file r_file_perms;
')

View File

@@ -32,6 +32,7 @@ allow rfsd radio_device:chr_file rw_file_perms;
# Allow to set rild and modem property
set_prop(rfsd, vendor_modem_prop)
set_prop(rfsd, vendor_rild_prop)
set_prop(cbd, vendor_cbd_prop)
# Allow rfsd to access modem image file/dir
allow rfsd modem_img_file:dir r_dir_perms;

View File

@@ -18,9 +18,6 @@ user=system seinfo=platform name=com.samsung.slsi.telephony.networktestmode doma
# Samsung S.LSI engineer mode
user=_app seinfo=platform name=com.samsung.slsi.engineermode domain=vendor_engineermode_app levelFrom=all
# coredump/ramdump
user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=all
# Domain for OFLBasicAgentApp to support NFC/eSIM fw upgrade
user=_app isPrivApp=true seinfo=platform name=com.thales.device.ofl.app.basicagent domain=ofl_app type=app_data_file levelFrom=user
@@ -40,9 +37,6 @@ user=_app seinfo=platform name=com.google.googlecbrs domain=cbrs_setup_app type=
# Domain for EuiccSupportPixel
user=_app isPrivApp=true seinfo=EuiccSupportPixel name=com.google.euiccpixel domain=euiccpixel_app type=app_data_file levelFrom=all
# Sub System Ramdump
user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_app_data_file levelFrom=user
# Domain for CatEngineService
user=system seinfo=platform name=com.google.android.CatEngine domain=cat_engine_service_app type=system_app_data_file levelFrom=all

View File

@@ -1,26 +0,0 @@
type ssr_detector_app, domain;
app_domain(ssr_detector_app)
allow ssr_detector_app app_api_service:service_manager find;
allow ssr_detector_app radio_service:service_manager find;
allow ssr_detector_app system_app_data_file:dir create_dir_perms;
allow ssr_detector_app system_app_data_file:file create_file_perms;
allow ssr_detector_app sscoredump_vendor_data_crashinfo_file:dir r_dir_perms;
allow ssr_detector_app sscoredump_vendor_data_crashinfo_file:file r_file_perms;
userdebug_or_eng(`
allow ssr_detector_app sscoredump_vendor_data_coredump_file:dir r_dir_perms;
allow ssr_detector_app sscoredump_vendor_data_coredump_file:file r_file_perms;
get_prop(ssr_detector_app, vendor_aoc_prop)
set_prop(ssr_detector_app, vendor_sjtag_lock_state_prop)
allow ssr_detector_app sysfs_sjtag:dir r_dir_perms;
allow ssr_detector_app sysfs_sjtag:file rw_file_perms;
allow ssr_detector_app proc_vendor_sched:dir search;
allow ssr_detector_app proc_vendor_sched:file rw_file_perms;
allow ssr_detector_app cgroup:file write;
allow ssr_detector_app vendor_toolbox_exec:file execute_no_trans;
')
get_prop(ssr_detector_app, vendor_ssrdump_prop)
get_prop(ssr_detector_app, vendor_wifi_version)

View File

@@ -1,11 +1,11 @@
type ufs_firmware_update, domain;
type ufs_firmware_update_exec, vendor_file_type, exec_type, file_type;
# ufs ffu
init_daemon_domain(ufs_firmware_update)
# ufs ffu
allow ufs_firmware_update vendor_toolbox_exec:file execute_no_trans;
allow ufs_firmware_update block_device:dir r_dir_perms;
allow ufs_firmware_update fips_block_device:blk_file rw_file_perms;
allow ufs_firmware_update sysfs:dir r_dir_perms;
allow ufs_firmware_update sysfs_scsi_devices_0000:dir search;
allow ufs_firmware_update sysfs_scsi_devices_0000:file r_file_perms;

View File

@@ -11,6 +11,8 @@ set_prop(vendor_init, vendor_usb_config_prop)
set_prop(vendor_init, vendor_rild_prop)
set_prop(vendor_init, logpersistd_logging_prop)
set_prop(vendor_init, vendor_logger_prop)
get_prop(vendor_init, telephony_modem_prop)
allow vendor_init proc_dirty:file w_file_perms;
allow vendor_init proc_sched:file w_file_perms;

View File

@@ -0,0 +1,3 @@
on init
write /sys/block/sda/queue/scheduler bfq
write /sys/block/sda/queue/iosched/slice_idle 0

View File

@@ -0,0 +1,2 @@
on init
write /sys/block/sda/queue/scheduler mq-deadline

View File

@@ -159,6 +159,21 @@
}
]
},
{
"Name": "HighPerformanceWI",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/groups/fg_wi/set_task_group",
"ProcFilePath": "/proc/vendor_sched/groups/fg_wi/set_proc_group",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "RealtimePerformance",
"Actions": [
@@ -250,6 +265,202 @@
}
]
},
{
"Name": "AdpfSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/adpf_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "AdpfClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/adpf_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "BoostPrioSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/boost_prio_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "BoostPrioClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/boost_prio_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreemptWakeupSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/preempt_wakeup_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreemptWakeupClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/preempt_wakeup_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreferFitSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/prefer_fit_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreferFitClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/prefer_fit_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreferIdleSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/prefer_idle_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreferIdleClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/prefer_idle_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "AutoUclampMaxSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/auto_uclamp_max_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "AutoUclampMaxClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/auto_uclamp_max_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreferHighCapSet",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/prefer_high_cap_set",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "PreferHighCapClear",
"Actions": [
{
"Name": "WriteFile",
"Params":
{
"FilePath": "/proc/vendor_sched/sched_qos/prefer_high_cap_clear",
"Value": "<pid>",
"LogFailures": "false"
}
}
]
},
{
"Name": "ResetUclampGrp",
"Actions": [
@@ -287,7 +498,35 @@
},
{
"Name": "OtaProfiles",
"Profiles": [ "OtaPerformance", "ProcessCapacityNormal", "LowIoPriority", "TimerSlackHigh" ]
"Profiles": [ "OtaPerformance", "ServiceCapacityLow", "LowIoPriority", "TimerSlackHigh" ]
},
{
"Name": "SCHED_QOS_SENSITIVE_EXTREME_SET",
"Profiles": [ "AdpfSet", "PreferIdleSet", "PreferFitSet", "BoostPrioSet", "PreemptWakeupSet" ]
},
{
"Name": "SCHED_QOS_SENSITIVE_EXTREME_CLEAR",
"Profiles": [ "AdpfClear", "PreferIdleClear", "PreferFitClear", "BoostPrioClear", "PreemptWakeupClear" ]
},
{
"Name": "SCHED_QOS_SENSITIVE_STANDARD_SET",
"Profiles": [ "AdpfSet", "PreferIdleSet", "PreferFitSet" ]
},
{
"Name": "SCHED_QOS_SENSITIVE_STANDARD_CLEAR",
"Profiles": [ "AdpfClear", "PreferIdleClear", "PreferFitClear" ]
},
{
"Name": "SCHED_QOS_POWER_EFFICIENCY_SET",
"Profiles": [ "AutoUclampMaxSet" ]
},
{
"Name": "SCHED_QOS_POWER_EFFICIENCY_CLEAR",
"Profiles": [ "AutoUclampMaxClear" ]
},
{
"Name": "InputPolicy",
"Profiles": [ "MaxPerformance", "SCHED_QOS_SENSITIVE_EXTREME_SET" ]
}
]
}

View File

@@ -74,7 +74,7 @@ constexpr char kProcInterruptsPath[] = "/proc/interrupts";
constexpr char kProcIrqPath[] = "/proc/irq/";
constexpr char kSmpAffinityList[] = "/smp_affinity_list";
#ifndef UDC_PATH
#define UDC_PATH "/sys/class/udc/11210000.dwc3/"
#define UDC_PATH "/sys/devices/platform/11210000.usb/11210000.dwc3/udc/11210000.dwc3/"
#endif
static MonitorFfs monitorFfs(kGadgetName);

View File

@@ -56,6 +56,7 @@ cc_binary {
"libbinder_ndk",
"libprotobuf-cpp-lite",
"server_configurable_flags",
"libaconfig_storage_read_api_cc",
],
static_libs: [
"libpixelusb-aidl",

View File

@@ -51,6 +51,7 @@ namespace usb_flags = android::hardware::usb::flags;
using aidl::android::frameworks::stats::IStats;
using android::base::GetProperty;
using android::base::ParseInt;
using android::base::Tokenize;
using android::base::Trim;
using android::hardware::google::pixel::getStatsService;
@@ -91,6 +92,8 @@ constexpr char kThermalZoneForTempReadPrimary[] = "usb_pwr_therm2";
constexpr char kThermalZoneForTempReadSecondary1[] = "usb_pwr_therm";
constexpr char kThermalZoneForTempReadSecondary2[] = "qi_therm";
constexpr char kPogoUsbActive[] = "/sys/devices/platform/google,pogo/pogo_usb_active";
constexpr char kPogoEnableHub[] = "/sys/devices/platform/google,pogo/enable_hub";
constexpr char kInternalHubDevnum[] = "/sys/bus/usb/devices/1-1/devnum";
constexpr char KPogoMoveDataToUsb[] = "/sys/devices/platform/google,pogo/move_data_to_usb";
constexpr char kPowerSupplyUsbType[] = "/sys/class/power_supply/usb/usb_type";
constexpr char kUdcUeventRegex[] =
@@ -471,11 +474,16 @@ bool switchMode(const string &portName, const PortRole &in_role, struct Usb *usb
return roleSwitch;
}
static int usbDeviceRemoved(const char *devname, void* client_data) {
return 0;
static int getInternalHubUniqueId() {
string internalHubDevnum;
int devnum = 0, internalHubUniqueId = -1;
if (ReadFileToString(kInternalHubDevnum, &internalHubDevnum) &&
ParseInt(Trim(internalHubDevnum).c_str(), &devnum))
internalHubUniqueId = 1000 + devnum;
return internalHubUniqueId;
}
static int usbDeviceAdded(const char *devname, void* client_data) {
static Status tuneInternalHub(const char *devname, void* client_data) {
uint16_t vendorId, productId;
struct usb_device *device;
::aidl::android::hardware::usb::Usb *usb;
@@ -484,7 +492,7 @@ static int usbDeviceAdded(const char *devname, void* client_data) {
device = usb_device_open(devname);
if (!device) {
ALOGE("usb_device_open failed\n");
return 0;
return Status::ERROR;
}
usb = (::aidl::android::hardware::usb::Usb *)client_data;
@@ -506,6 +514,26 @@ static int usbDeviceAdded(const char *devname, void* client_data) {
usb_device_close(device);
return Status::SUCCESS;
}
static int usbDeviceRemoved(const char *devname, void* client_data) {
return 0;
}
static int usbDeviceAdded(const char *devname, void* client_data) {
string pogoEnableHub;
int uniqueId = 0;
// Enable hub tuning when the pogo dock is connected.
if (ReadFileToString(kPogoEnableHub, &pogoEnableHub) && Trim(pogoEnableHub) == "1") {
// If enable_hub is set to 1, the internal hub is the first enumearted device on bus 1 and
// port 1.
uniqueId = usb_device_get_unique_id_from_name(devname);
if (uniqueId == getInternalHubUniqueId())
tuneInternalHub(devname, client_data);
}
return 0;
}
@@ -602,6 +630,11 @@ ScopedAStatus Usb::switchRole(const string& in_portName, const PortRole& in_role
fp = fopen(filename.c_str(), "w");
if (fp != NULL) {
int ret = fputs(convertRoletoString(in_role).c_str(), fp);
if (ret == EAGAIN) {
ALOGI("role switch busy, retry in %d ms", ROLE_SWAP_RETRY_MS);
std::this_thread::sleep_for(std::chrono::milliseconds(ROLE_SWAP_RETRY_MS));
ret = fputs(convertRoletoString(in_role).c_str(), fp);
}
fclose(fp);
if ((ret != EOF) && ReadFileToString(filename, &written)) {
written = Trim(written);
@@ -957,17 +990,21 @@ void queryVersionHelper(android::hardware::usb::Usb *usb,
Status status;
pthread_mutex_lock(&usb->mLock);
status = getPortStatusHelper(usb, currentPortStatus);
queryMoistureDetectionStatus(usb, currentPortStatus);
queryPowerTransferStatus(usb, currentPortStatus);
queryNonCompliantChargerStatus(currentPortStatus);
queryUsbDataSession(usb, currentPortStatus);
if (usb->mCallback != NULL) {
ScopedAStatus ret = usb->mCallback->notifyPortStatusChange(*currentPortStatus,
status);
if (!ret.isOk())
ALOGE("queryPortStatus error %s", ret.getDescription().c_str());
if (status == Status::SUCCESS && currentPortStatus->size() > 0) {
queryMoistureDetectionStatus(usb, currentPortStatus);
queryPowerTransferStatus(usb, currentPortStatus);
queryNonCompliantChargerStatus(currentPortStatus);
queryUsbDataSession(usb, currentPortStatus);
if (usb->mCallback != NULL) {
ScopedAStatus ret = usb->mCallback->notifyPortStatusChange(*currentPortStatus,
status);
if (!ret.isOk())
ALOGE("queryPortStatus error %s", ret.getDescription().c_str());
} else {
ALOGI("Notifying userspace skipped. Callback is NULL");
}
} else {
ALOGI("Notifying userspace skipped. Callback is NULL");
ALOGI("%s skipped. currentPortStatus is empty", __func__);
}
pthread_mutex_unlock(&usb->mLock);
}

View File

@@ -56,6 +56,8 @@ constexpr char kGadgetName[] = "11210000.dwc3";
#define VBUS_PATH NEW_UDC_PATH "dwc3_exynos_otg_b_sess"
#define USB_DATA_PATH NEW_UDC_PATH "usb_data_enabled"
#define ROLE_SWAP_RETRY_MS 700
struct Usb : public BnUsb {
Usb();

View File

@@ -19,8 +19,9 @@ LOCAL_WIFI_PATH := device/google/gs201/wifi/qcom
# wlan flags
BOARD_WLAN_DEVICE := qcwcn
BOARD_WLAN_CHIP := wcn6740
BOARD_WPA_SUPPLICANT_PRIVATE_LIB := lib_driver_cmd_$(BOARD_WLAN_DEVICE)
BOARD_HOSTAPD_PRIVATE_LIB := lib_driver_cmd_$(BOARD_WLAN_DEVICE)
# Use full namespace path for both BOARD_WPA_SUPPLICANT_PRIVATE_LIB and BOARD_HOSTAPD_PRIVATE_LIB due to wlan module for sw5100 has its own namespace.
BOARD_WPA_SUPPLICANT_PRIVATE_LIB := //hardware/qcom/wlan/wcn6740/qcwcn/wpa_supplicant_8_lib:lib_driver_cmd_$(BOARD_WLAN_DEVICE)
BOARD_HOSTAPD_PRIVATE_LIB := //hardware/qcom/wlan/wcn6740/qcwcn/wpa_supplicant_8_lib:lib_driver_cmd_$(BOARD_WLAN_DEVICE)
BOARD_WPA_SUPPLICANT_DRIVER := NL80211
BOARD_HOSTAPD_DRIVER := NL80211
WPA_SUPPLICANT_VERSION := VER_0_8_X
@@ -36,7 +37,7 @@ WIFI_FEATURE_IMU_DETECTION := true
WIFI_HIDL_UNIFIED_SUPPLICANT_SERVICE_RC_ENTRY := true
# Avoid Wifi reset on MAC Address change
# WIFI_AVOID_IFACE_RESET_MAC_CHANGE := true
# WIFI_FEATURE_HOSTAPD_11AX := true
WIFI_FEATURE_HOSTAPD_11AX := true
WIFI_DRIVER_STATE_CTRL_PARAM := "/dev/wlan"
WIFI_DRIVER_STATE_ON := "ON"
WIFI_DRIVER_STATE_OFF := "OFF"