264 Commits
bka ... udc

Author SHA1 Message Date
4da0dfab2c zuma: Initialize for Evolution X 9.x
Signed-off-by: AnierinB <anierin@evolution-x.org>
2024-09-10 14:09:46 -07:00
Michael Bestas
22095a0c89 Revert "zuma: Build with 64-bit only GMS if WITH_GMS"
This reverts commit 5a496e36d0.

Reason for revert: GMS combined these makefiles.

Change-Id: Ibb7e0e04fcdcfdc6778807a105405dd983d54f2c
2024-09-09 21:28:54 +00:00
Aaron Kling
8d69aa53cf zuma: Remove elf files in copy files check
New extract files uses packages instead of copy files

Change-Id: I337c07d13bd350958d4808e1693cc6e03753a96c
2024-09-07 15:54:06 +03:00
basamaryan
c0d5f59080 zuma: Drop unnecessary BOARD_USERDATAIMAGE_FILE_SYSTEM_TYPE flag
Change-Id: Ibb96c529ac64239d7bb919e46f5a625a6deebf98
2024-06-23 19:23:44 +03:00
Michael Bestas
cd475bd801 Merge tag 'android-14.0.0_r50' into staging/lineage-21_merge-android-14.0.0_r50
Android 14.0.0 Release 50 (AP2A.240605.024)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmwAKCRDorT+BmrEO
# eN+KAJ9+8WsgiRKrXHLrgUpfHI/xjYufKQCfaGkVpBc/mawypov8BsAaENp9imw=
# =hjvk
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Jun 11 00:43:55 2024 EEST
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2542 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Wilson Sung (9) and others
# Via Android Build Coastguard Worker (33) and others
* tag 'android-14.0.0_r50': (47 commits)
  Revert^2 "Remove persist.bootanim.color property definitions"
  Revert "Remove persist.bootanim.color property definitions"
  Remove persist.bootanim.color property definitions
  add dsim wakeup labels
  Update tcpm i2c sepolicy with new device name
  Add HWC permission to access IStats AIDL
  hal_usb_impl: Grant read permission to usb overheat files
  Allow camera_app can access priv-app symlinks
  Allow con_monitor_app to read/write the folder /data/vendor/radio
  Update error on ROM 11396046
  Allow dump_power to read sysfs directories
  Update SELinux error
  Revert "rfsd: add new property to sepolicy"
  Revert "Allow dump_power to read directories under "/sys/class/p..."
  Revert "Allow dump_power to read directories under "/sys/class/p..."
  Revert "Allow dump_power to read directories under "/sys/class/p..."
  liboemservice_proxy: Update sepolicy to hal
  Add `capacity_headroom` to gpu sysfs
  Change the type of hw_jpg_device for selinux policy so that the GCA release flavor could access hw_jpg_device
  [displayport-stats] add sysfs access permission on Zuma devices.
  ...

 Conflicts:
	sepolicy/vendor/file_contexts
	sepolicy/zuma-sepolicy.mk

Change-Id: I3faf6cc680611da752218a7355f4b355a54bf09e
2024-06-15 22:29:25 +03:00
Michael Bestas
640d956fa3 Merge tag 'android-14.0.0_r50' into staging/lineage-21_merge-android-14.0.0_r50
Android 14.0.0 Release 50 (AP2A.240605.024)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmwAKCRDorT+BmrEO
# eBCcAJ4y/zo/Rh8n5sbacxtEm5ngrM2iqACfeL8d4MctLYMXlbSlBWXKdvxLJNw=
# =xFt1
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Jun 11 00:43:55 2024 EEST
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2542 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Daniel Chapin (4) and others
# Via Android (Google) Code Review (45) and others
* tag 'android-14.0.0_r50': (60 commits)
  Update health AIDL HAL to V3
  Revert "Add betterbug mk to zuma"
  Adding android.software.contextualsearch to zuma devices.
  pixelstats: added multiple GMSR paths
  Revert "Add sepolicy include to zuma."
  Removed ImsMedia from zuma
  Add sepolicy include to zuma.
  pixelstats: zuma: add Learning/Update/ModelLoad path
  Fix properties to enable override
  Add betterbug mk to zuma
  Enable Secretkeeper HAL service on zuma
  dumpstate: moving charger nodes to user build
  Revert "zuma: Set max supported page size to 65536"
  Fix permissions for dp_hotplug_error_code sysfs node
  zuma: Set max supported page size to 65536
  Add Youtube back in MRR Small Area Detection Allowlist
  Move manifest entries to gs-common.
  [Refactor] Include edgetpu targets in final image
  Revert^2 "zuma: enable dynamic color mode"
  Revert "zuma: enable dynamic color mode"
  ...

 Conflicts:
	device.mk

Change-Id: Iafc59345bd16d39006f074f12c5edb2ee6f6a254
2024-06-15 22:28:13 +03:00
Tommy Webb
5db0f71e54 Revert "Add back saturated color mode"
This presence of this color mode now leads to problems deactivating
color inversion and color correction, even if it is not selected.

This reverts commit 9dbedaab9e.

Issue: calyxos#2312
Change-Id: I1ce6aec9d32d4b3fd2d88545c91c579b8313e50a
2024-04-30 20:22:07 +03:00
Michael Bestas
411c08290d zuma: Update AiAi configs
Extracted from stock shiba AP1A.240405.002

Change-Id: Ief71f77fb2475311ed555fece837f46ff1eae4aa
2024-04-26 18:32:27 +03:00
Michael Bestas
97d87c2bcb fixup! Add AiAi allowlist
Change-Id: I4058626a7ebcec2217c44e68b6b0a5edb4022ae9
2024-04-08 00:14:59 +03:00
Michael Bestas
9dc5fd9d5c zuma: overlay: Enable battery cycle count
Change-Id: I92bc8363e1c9e2ad54c29a0a30dce992e25f697d
2024-03-28 00:08:41 +02:00
Michael Bestas
2466a30d0f zuma: Always enable displayport output
Change-Id: If7c2246d38b83914affb1c3379d41bb3568068f3
2024-03-10 10:34:13 +02:00
Michael Bestas
b96da85bea Merge tag 'android-14.0.0_r29' into staging/lineage-21_merge-android-14.0.0_r29
Android 14.0.0 release 29

# -----BEGIN PGP SIGNATURE-----
#
# iFwEABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZWxwAKCRDorT+BmrEO
# eG4YAJiXC4CAYe+tHHgmS2zRpWvrMp2fAJ95xvTlNaj8SVFvWVYVCJ9DEnb5NA==
# =pYvH
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Mar  5 01:18:31 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2373 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Wilson Sung (8) and others
# Via Automerger Merge Worker (823) and others
* tag 'android-14.0.0_r29': (99 commits)
  selinux: label wakeup for BMS I2C 0x36, 0x69
  Revert "Label dtbo partition as dtbo_block_device"
  Twoshay: Add SELinux Permissions for CHRE [Zuma]
  Update SELinux error
  Update SELinux error
  Add Secretkeeper HAL
  Add eusb_repeater to vendor_usb_debugfs context
  zuma: move sepolicy related to bootctrl hal to gs-common
  Removes duplicate hidraw_device type definition.
  Removes duplicate hidraw_device type definition.
  Revert "zuma: move sepolicy related to bootctrl hal to gs-common"
  Update SELinux error
  Suppress avc error log on debugfs's usb folder.
  zuma: move sepolicy related to bootctrl hal to gs-common
  hal_usb_impl: Add get_prop for vendor_usb_config_prop
  allow vendor init to access percpu_pagelist_high_fraction
  Move sg_device related policy
  Update SELinux error
  Add sepolicy entries for new BT channel
  dontaudit on dir search for vendor_votable_debugfs
  ...

 Conflicts:
	sepolicy/system_ext/private/seapp_contexts
	sepolicy/zuma-sepolicy.mk

Change-Id: I47332362d9b7c4da8e877f2a8c031d3897a06e62
2024-03-10 09:08:23 +02:00
Michael Bestas
d9760e28fe Merge tag 'android-14.0.0_r29' into staging/lineage-21_merge-android-14.0.0_r29
Android 14.0.0 release 29

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZWxwAKCRDorT+BmrEO
# eOsuAJ9g/XIKJBWTD8E2+Aqm6NMv3nukwwCeLSv4N14ocSv6KO22kRdCrxjYD5w=
# =wJqW
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Mar  5 01:18:31 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2372 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Roy Luo (7) and others
# Via Automerger Merge Worker (938) and others
* tag 'android-14.0.0_r29': (140 commits)
  Fine tune media_codecs_performance_c2.xml
  Update media_codecs_performance_c2.xml for meet device performance
  Revert^3 "Use graphics allocator 2"
  Revert "Force disable MTE in Chrome in _fullmte build."
  Add trusty code coverage controller daemon
  init: make dumpstate able to read display logbuffer
  powerstats: change TPU DVFS data source from ACPM to TPU kernel
  Grant the post notification permission to Turbo
  usb: enable media-presence polling for SD cards
  config: Use carrier config in ROM by default
  Revert^2 "usb: introduce UsbDataSessionMonitor class"
  Revert "usb: introduce UsbDataSessionMonitor class"
  dump_power: add eusb_repeater path to dump registers
  zuma: include bootctrl_aidl.mk from gs-common
  zuma: move bootctrl service declaration to gs-common
  zuma: move bootctrl hal to gs-common
  Revert "zuma: move bootctrl hal to gs-common"
  Revert "zuma: move bootctrl service declaration to gs-common"
  Revert "zuma: include bootctrl_aidl.mk from gs-common"
  usb: introduce UsbDataSessionMonitor class
  ...

 Conflicts:
	device.mk
	dumpstate/item.mk

Change-Id: I9707a2ef4b5743eebf49c8d33f1c50b18030745d
2024-03-10 09:05:36 +02:00
Michael Bestas
fe823ea469 Unset PRODUCT_BROKEN_VERIFY_USES_LIBRARIES
Change-Id: I6f61d58e2dd419cb11f2aeb4f0faf54145c6a5ce
2024-03-02 04:22:04 +02:00
Android Build Coastguard Worker
aabf81ebb3 Snap for 11504324 from 48a81fa140 to 24Q2-release
Change-Id: I956eadfc7fc7a4bfc8ca4e37cc57cb5e1984977c
2024-02-28 00:03:36 +00:00
Android Build Coastguard Worker
3307f4ea88 Snap for 11491255 from 0d051585be to 24Q2-release
Change-Id: I0a8a82f76c6336130a8acf7ecffaf79ca23f5b84
2024-02-24 02:03:27 +00:00
Android Build Coastguard Worker
95095ad8e3 Snap for 11486370 from 1d8864cdee to 24Q2-release
Change-Id: Id1370f2971a9084b8c12b63870695355e3a25b48
2024-02-23 00:03:35 +00:00
Android Build Coastguard Worker
bf43e1a3ee Snap for 11434712 from 15fda1a501 to 24Q2-release
Change-Id: I78b0593d3ab14771fca13a9f6b460a7119ea8635
2024-02-10 22:03:29 +00:00
Android Build Coastguard Worker
64bc0e79d9 Snap for 11432641 from 4e66878b19 to 24Q2-release
Change-Id: Ifacdec7e1b0ee7bdbdcf64a2af45c5bcbb67ae40
2024-02-10 02:03:37 +00:00
Android Build Coastguard Worker
85e20426d7 Snap for 11426397 from 6c5b44f1bb to 24Q2-release
Change-Id: I0309a067f4c81e5e290e5bdb89925abac9dcf281
2024-02-09 00:03:43 +00:00
Android Build Coastguard Worker
67f7e63ac4 Snap for 11413328 from a1c60e8b9e to 24Q2-release
Change-Id: Ibccba22d42eacdbfb7d97914ebe7fc1a77e9177c
2024-02-07 00:03:51 +00:00
Android Build Coastguard Worker
59bfc7b00d Snap for 11406759 from cfe12763f2 to 24Q2-release
Change-Id: I6708ce9d20e7be9fca1d9d08d8cfa673564cbce7
2024-02-06 00:08:24 +00:00
Android Build Coastguard Worker
14e73ec1b7 Snap for 11399958 from fdc9af0d88 to 24Q2-release
Change-Id: If4d44f9e39bb277df681d23254e9117a06ebf553
2024-02-03 02:03:34 +00:00
Android Build Coastguard Worker
2ea2f82d36 Snap for 11386701 from 98972beada to 24Q2-release
Change-Id: Ia1b4d290e1b008fbf8a9aa388c3d5d73eceb4c67
2024-02-01 00:03:07 +00:00
Android Build Coastguard Worker
67bbf21ea1 Snap for 11380007 from 0d82eda10f to 24Q2-release
Change-Id: I3f89979b13470936e83f4db35d7bf4f9f5acf716
2024-01-31 00:03:51 +00:00
Android Build Coastguard Worker
7c228ccf63 Snap for 11373247 from 4562b9e4e1 to 24Q2-release
Change-Id: Iebd281a0d6cd2dca6036bf7478f6f986d06813ac
2024-01-30 02:03:47 +00:00
Android Build Coastguard Worker
1d9cc6105a Snap for 11367679 from 6a6f65b5e5 to 24Q2-release
Change-Id: Ifc76f34cd228823bbe13120d53ebe18aeb14cfe8
2024-01-27 02:03:38 +00:00
Android Build Coastguard Worker
0be52ff430 Merge cherrypicks of ['googleplex-android-review.googlesource.com/26016344'] into 24Q2-release.
Change-Id: I6e1dafd1257cc7d5640cca769707ce8391ba2a85
2024-01-26 01:20:10 +00:00
Daniel Chapin
e079f8fa51 Revert "Allow dump_power to read directories under "/sys/class/p..."
Revert submission 25915320-320613177

Reason for revert: Droidfood blocking bug: 322294676

Reverted changes: /q/submissionid:25915320-320613177
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:a5df4f07bf774eb55aab6752aa2e8055f5a4d68e)
Merged-In: I5545dcd73cdce5ae029444c313bf5dc3f642a5c0
Change-Id: I5545dcd73cdce5ae029444c313bf5dc3f642a5c0
2024-01-26 01:19:54 +00:00
Android Build Coastguard Worker
73c7d4484e Snap for 11361184 from b042c7713f to 24Q2-release
Change-Id: I321b8426ca62ea50da1ba5a3acfb90b2f1e267c5
2024-01-26 00:03:40 +00:00
Android Build Coastguard Worker
c4018c027d Merge cherrypicks of ['googleplex-android-review.googlesource.com/26016344'] into 24Q2-release.
Change-Id: Ia7d81dc488d5504d9f762a53f4aae2b8bc1d3d36
2024-01-25 21:56:55 +00:00
Daniel Chapin
0fe87230aa Revert "Allow dump_power to read directories under "/sys/class/p..."
Revert submission 25915320-320613177

Reason for revert: Droidfood blocking bug: 322294676

Reverted changes: /q/submissionid:25915320-320613177
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:a5df4f07bf774eb55aab6752aa2e8055f5a4d68e)
Merged-In: I5545dcd73cdce5ae029444c313bf5dc3f642a5c0
Change-Id: I5545dcd73cdce5ae029444c313bf5dc3f642a5c0
2024-01-25 21:56:35 +00:00
Android Build Coastguard Worker
15714494b7 Snap for 11355999 from ab46db5fef to 24Q2-release
Change-Id: I709de8b648dbbe769e0f8e01de7638e68a59c6db
2024-01-25 02:34:26 +00:00
Android Build Coastguard Worker
ee21609fbb Merge cherrypicks of ['googleplex-android-review.googlesource.com/25837251', 'googleplex-android-review.googlesource.com/25874901'] into 24Q1-release.
Change-Id: I483350f4a19a089428f0ad77bf38808818732f47
2024-01-19 21:22:44 +00:00
wenchangliu
740a8ae223 Fine tune media_codecs_performance_c2.xml
Fine tune a stable performance table to mitigate CTS flaky results.

Bug: 317441297
Test: run cts -m CtsVideoTestCases -t android.video.cts.VideoEncoderDecoderTest
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b9a68d227d4f1c912630c7116152f22e33df8245)
Merged-In: If8b28c55db43d3d050c3c6c3edb29552c13e5b6a
Change-Id: If8b28c55db43d3d050c3c6c3edb29552c13e5b6a
2024-01-19 21:21:27 +00:00
wenchangliu
16929cd7da Update media_codecs_performance_c2.xml for meet device performance
Fine tune the performance table since the change in CPU policy for
power saving cause some encoder performance results from the CTS
are not able to meet pass criteria from the original performance
measurement results.

Bug: 317441297
Test: run cts -m CtsVideoTestCases -t android.video.cts.VideoEncoderDecoderTest
Test: run cts -m CtsVideoTestCases -t android.video.cts.CodecDecoderPerformanceTest
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:90186aa1f3e6c79a210618014523016bd241c248)
Merged-In: Ib75d3f35c5ea2e2dc80ba192d738d54140a09d68
Change-Id: Ib75d3f35c5ea2e2dc80ba192d738d54140a09d68
2024-01-19 21:21:17 +00:00
Android Build Coastguard Worker
1c44d8f2c4 Snap for 11324029 from 2d8e52e176 to 24Q2-release
Change-Id: If44c54f88112725dbd1e6a10debf24f515001055
2024-01-18 00:04:02 +00:00
Android Build Coastguard Worker
1d9dd174f1 Snap for 11314147 from feffef59dd to 24Q2-release
Change-Id: I19639348851d6e0858d06295f91ed97397bcbf20
2024-01-16 00:04:07 +00:00
Android Build Coastguard Worker
5c50384b56 Snap for 11308440 from 389a451f8f to 24Q2-release
Change-Id: Ieb321ecac121fe8c10012848c97614e49e347657
2024-01-13 02:09:13 +00:00
Android Build Coastguard Worker
881919a5e6 Snap for 11302939 from 80e1b3708f to 24Q2-release
Change-Id: I539560b305834f90f9dc01f16c51dde467cbb6e7
2024-01-12 01:11:41 +00:00
Android Build Coastguard Worker
7cf74df212 Merge cherrypicks of ['googleplex-android-review.googlesource.com/25846827'] into 24Q1-release.
Change-Id: Ief51a9b887dbd9f89fc358345fdfb1efe25f4b71
2024-01-11 22:19:25 +00:00
Android Build Coastguard Worker
d3936229d9 Merge cherrypicks of ['googleplex-android-review.googlesource.com/25843216'] into 24Q1-release.
Change-Id: I57a9ef4f681a6035385a7608fd1e08b3f9424605
2024-01-11 22:19:21 +00:00
Ken Yang
e2b363b48b selinux: label wakeup for BMS I2C 0x36, 0x69
Bug: 319035561
Signed-off-by: Ken Yang <yangken@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:137c2ebd5ab839f5164058b2c5c028de9e4b4ebe)
Merged-In: Ib57dba71691f70b75fbae23208125fa750b32dc1
Change-Id: Ib57dba71691f70b75fbae23208125fa750b32dc1
2024-01-11 22:17:40 +00:00
Devika Krishnadas
697482718f Revert^3 "Use graphics allocator 2"
4c7ea96e6b

Reverting to comply with the Allocator VTS for 24Q1, do not merge to main.

Bug: 310046460
Test: VtsHalGraphicsAllocatorAidl_TargetTest
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b84cbaaeb5757a765755f6f051133fe5be3f88fd)
Merged-In: Id8b721b05dc20032d13aed469327e8e996b0cffe
Change-Id: Id8b721b05dc20032d13aed469327e8e996b0cffe
2024-01-11 22:17:30 +00:00
Android Build Coastguard Worker
35a5c34e28 Merge cherrypicks of ['android-review.googlesource.com/2903808'] into 24Q1-release.
Change-Id: Iae28324db8a5570850169e58473e4c24313ad553
2024-01-11 01:39:33 +00:00
Inseob Kim
b8e8d51428 Revert "Label dtbo partition as dtbo_block_device"
This reverts commit 3773ca269e.

Reason for revert: b/319035582

Bug: 319035582
Test: boot
(cherry picked from https://android-review.googlesource.com/q/commit:f05143f43c483515a07d064522b43a58dfd1a772)
Merged-In: I3c2a5b5bc871aa506396c12d6e1fa036858c1273
Change-Id: I3c2a5b5bc871aa506396c12d6e1fa036858c1273
2024-01-11 01:35:50 +00:00
Android Build Coastguard Worker
c3ab3dd558 Snap for 11297328 from 64fd14fdd8 to 24Q2-release
Change-Id: I109b9690c02f80ec87f11a46d4261d63f308f8d2
2024-01-11 00:06:28 +00:00
Android Build Coastguard Worker
9b18e7ef87 Snap for 11292102 from 52beafc4c4 to 24Q2-release
Change-Id: I28e751a89b65d103cafd7e2c66e3eea6a33e06e2
2024-01-10 00:04:15 +00:00
Android Build Coastguard Worker
6cbcbcc2d9 Snap for 11286711 from 8b02313642 to 24Q2-release
Change-Id: I4d3fbcee0f41c9241dc720eb59f2511f0b97917c
2024-01-09 00:04:05 +00:00
Nolen Johnson
5a496e36d0 zuma: Build with 64-bit only GMS if WITH_GMS
* We are 64-bit only and therefore need this config selected.

Change-Id: Ifa31c29bad479f3a54859f51f2ce7a72b29895fa
2024-01-08 11:10:10 +02:00
Android Build Coastguard Worker
fe0927a252 Snap for 11282454 from a03af7a36c to 24Q2-release
Change-Id: I569f403959a0562504abc4ebef8986b3e51498b6
2024-01-06 22:03:16 +00:00
Michael Bestas
9f93b65da3 Merge tag 'android-14.0.0_r20' into staging/lineage-21_merge-android-14.0.0_r20
Android 14.0.0 release 20

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZZXyAwAKCRDorT+BmrEO
# eGhRAJ0ZrwN/OgAg7hWFx+NymGua8TzcTQCfWLmoInHHJyqgKYP7fDzcGWo79g4=
# =kbwW
# -----END PGP SIGNATURE-----
# gpg: Signature made Thu Jan  4 01:47:15 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2224 signatures in the past
#      2 years.  Encrypted 4 messages in the past 24 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Hungyen Weng (1) and Ruofei Ma (1)
# Via Android Build Coastguard Worker
* tag 'android-14.0.0_r20':
  config: Use carrier config in ROM by default
  Enable adaptive playback for BigWave

Change-Id: I41d31e69f5f1ef63e9843766ca7fd2c6fab023d6
2024-01-06 14:59:23 +02:00
Android Build Coastguard Worker
8407aa2501 Merge cherrypicks of ['android-review.googlesource.com/2896760'] into 24Q1-release.
Change-Id: Ia3aad662ab2d0c2526bd7f50fa2987ffc30e59de
2024-01-05 21:08:14 +00:00
Evgenii Stepanov
b455f212b8 Revert "Force disable MTE in Chrome in _fullmte build."
This reverts commit 4a1f9459e5.

The Chrome issue has been fixed upstread and this workaround is no
longer needed; in fact, it triggers another issue where conflicting MTE
mode settings make newer Chrome versions crash at startup.

Bug: 297266100
Bug: 305005339
Bug: https://crbug.com/1515053
Test: chrome still does not crash; debuggerd shows MTE is enabled (grep
for TCF_MTE)
(cherry picked from https://android-review.googlesource.com/q/commit:ff0cc4d3f416080b1f2a7bc6dea186805aa47022)
Merged-In: Iee2b704c4ea39b5809193c1ceed3b8f41618dd40
Change-Id: Iee2b704c4ea39b5809193c1ceed3b8f41618dd40
2024-01-05 21:03:12 +00:00
Android Build Coastguard Worker
656f222656 Snap for 11275524 from b808c32b7d to 24Q2-release
Change-Id: I7111d4cee52086c0c30e85e7e1095ced4166eff0
2024-01-05 00:03:41 +00:00
Android Build Coastguard Worker
862d1ebdca Snap for 11260009 from 839ddde474 to 24Q2-release
Change-Id: I860e30e0c1c8e1d4baf0806bc7b3026d3379e3ae
2023-12-29 00:03:51 +00:00
Android Build Coastguard Worker
21df9eb2b7 Snap for 11257657 from 26b57fcdc6 to 24Q2-release
Change-Id: I47f5f9f67346ffdcb62f74a8796f53e24087c979
2023-12-28 00:03:41 +00:00
Android Build Coastguard Worker
6e2cf65d55 Snap for 11251507 from 569134db41 to 24Q2-release
Change-Id: I616426daa3fd7cb04c9a894954e3372c4be82198
2023-12-23 02:03:36 +00:00
Android Build Coastguard Worker
f515c49e9f Snap for 11248037 from 79ba49730b to 24Q2-release
Change-Id: I94b0abd6c9ed508551eb70cd84433187f647a84f
2023-12-22 00:05:55 +00:00
Android Build Coastguard Worker
8d92dbd2cb Snap for 11243032 from f8f64b668c to 24Q2-release
Change-Id: I32d1863f4856300aabedf80ebad8c6cdced579fb
2023-12-21 00:04:19 +00:00
Michael Bestas
d5389c2f7c zuma: sepolicy: Don't label SystemUI as systemui_app
While this might be useful on Pixel stock ROM, this serves no purpose
anywhere else. In fact, it makes it more fragile, as we'd need to track
platform SystemUI related SELinux changes ourselves.

Change-Id: I205df902649fd712a89f21f51099e088c5bdef2e
2023-12-19 04:01:19 +02:00
Scott Warner
1daa52063d zuma: Add Lineage dependencies
Change-Id: I5337e8d48f3a468362c936de9a545ddec46446d0
2023-12-19 04:01:19 +02:00
LuK1337
fe43acad74 zuma: Add liboemcrypto.so to vendor linker config
This lets com.google.android.widevine.apex access it.

Change-Id: I4e9654fe6317b722f5fbf43b92abb367c18640ce
2023-12-19 04:01:19 +02:00
Rashed Abdel-Tawab
4e5a90058b zuma: Build a disabled vbmeta image
Squashed with:
Author: Nolen Johnson <johnsonnolen@gmail.com>
Date:   Sun May 9 16:04:34 2021 -0400

    Simplify AVB flag logic

    * AVB's `--flags 3` argument builds a disabled VBMeta with
      disabled hashtree, so no need to set both flags individually.

    Change-Id: Ibe9ee322a5af58f13e76d53e18dee49451fe8838

Change-Id: Ie8f1e0929b037b35b5e45c2e31be9253fa0bb097
2023-12-19 04:01:19 +02:00
Neel Chauhan
0e61ff4290 Revert "Enable compressed snapshots/VABc."
Virtual AB compression prevents GApps from being installed to
cheetah/panther.

This reverts commit 2bfa6d3ba01856d99c6ffdb64627c6e9391c4a41.

Change-Id: I119b8e042e4cdeec27a19ab5dd4f0666cc115ae1
2023-12-19 04:01:19 +02:00
Michael Bestas
b4feb51d80 zuma: Build Lineage Health HAL
Change-Id: I70cc903a03ac9fa3303bb8fa039c9de4806449bf
2023-12-19 04:01:18 +02:00
Alessandro Astone
bbeede9845 zuma: Build pixel touch HAL
Change-Id: I45cff81e1159613094440dd7b2b73b53519c9de6
2023-12-19 04:01:18 +02:00
Chirayu Desai
2373f07317 zuma: Allow radio access to IOemSlsiRadioExternal
Change-Id: Ib5d57b199b3e8288cd3de0c12898f0c1d679be4a
2023-12-19 04:01:18 +02:00
Michael Bestas
4111ace6d0 zuma: Label additional UWB services
Change-Id: Ia938529497a5b274354366e6d8c8579184be491c
2023-12-19 04:01:18 +02:00
Michael Bestas
81e39653bf zuma: Label vendor.dolby.media.c2@1.0-service
Change-Id: I89fb4c149aed94cf2f7c3d34f7fde5877175b1e2
2023-12-19 04:01:18 +02:00
Michael Bestas
b8c2535b0a zuma: Include missing vendor sepolicy
Change-Id: Id35fb4b22e2ee8dfafdfb8ae601ab823435d2b94
2023-12-19 04:01:18 +02:00
Danny Lin
7290cdcbe0 zuma: Update seapp certificates to match stock presigned apps
Certificates extracted from stock vendor_mac_permissions.xml using
adevtool: https://github.com/kdrag0n/adevtool

Change-Id: Iaf59f1548905d16fe7ad231c039ba43941c15710
2023-12-19 04:01:18 +02:00
Alessandro Astone
077a43c106 zuma: Fix public key for EuiccSupportPixel sepolicy domain
Change-Id: I00f7a9a2b0f41d08af3262b0efd625dd2b6e1c9f
2023-12-19 04:01:17 +02:00
ReallySnow
7d2abccb6d zuma: Add AiAi allowlist
* In Android 12, Android System Intelligence (com.google.android.as) uses
  some of the Private Compute Service (com.google.android.as.oss) services.
  The absence of these Allowlists will cause Android System Intelligence
  to fail to connect to the network and cause collapse.
* We don't need to extract google.xml to fix it, just extract the AiAi part

Change-Id: I446ae5d243cff134901094f82c90a0bbf3bb4381
2023-12-19 04:01:17 +02:00
Danny Lin
77fd31a831 zuma: Squashed import of AiAi configs
Co-authored-by: Alessandro Astone <ales.astone@gmail.com>
Co-authored-by: Michael Bestas <mkbestas@lineageos.org>
Change-Id: I78bd7d04cbd0b35f6a8c01df3a8c1013d99bbf42
2023-12-19 04:01:17 +02:00
razorloves
5c4e35db24 zuma: Hide user facing crash dialog for EUICC app
The GoogleParts app disables the EUICC app when there's no GMS, but it
doesn't happen quick enough. The crash dialog pops up a few times right
after initial boot up. There's no need to alarm the user, so hide it.

Change-Id: Ia06b336b30a8886bae522c6e8a76a1ca15da5edd
2023-12-19 02:29:48 +02:00
Peter Cai
b9041c91bf zuma: Disable Euicc when GMS and GSF are not installed
* This avoids EuiccGoogle / GoogleCarrierServices crashing, taking the
  whole telephony stack with them when no GMS or GSF is installed.
* Compared to change 274251, this approach is no-op when GAPPS add-on is
  flashed before the first boot, and thus should not cause issues with
  eSIM when GAPPS is flashed.
* With microG, this also works after installing the microG GMS & GSF
  packages and rebooting, although manual activation of the eSIM is
  needed via Settings - Network.
* The only downside is that users will still see one or two crashes
  during the first boot because our application only starts after the
  device is booted.

Change-Id: I4a11c93e855978abbf8d84fdbe4ffc8b2aedc27c
2023-12-19 02:29:48 +02:00
Michael Bestas
5ab70064b3 zuma: Inherit common partition reserved sizes
Change-Id: I444ce2fcd37cdfa58d83a7e872dc547fb05a2a89
2023-12-19 02:29:48 +02:00
Michael Bestas
898ca9895d zuma: Do not compile AoC audio for Lineage builds
Change-Id: Ibb75612ccbd41bc078b6bbd49ea442c2a9c00f15
2023-12-19 02:29:48 +02:00
Michael Bestas
40ea12a5d7 zuma: Include missing ConnectivityThermalPowerManager sepolicy
Change-Id: I1e0f05159a6797251ed85360966aa45246005bbd
2023-12-19 02:29:48 +02:00
Danny Lin
b8a90a37be zuma: Allow ConnectivityThermalPowerManager to request thermal mitigation
ConnectivityThermalPowerManager mainly exists to manage thermal
mitigation.

Change-Id: I7d1ad7cb45a24697e444ac1f85ccfb507cb1ce49
2023-12-19 02:29:47 +02:00
Danny Lin
0f2864ff5d zuma: Configure ConnectivityThermalPowerManager
Extracted from stock UQ1A.231205.015 on husky/shiba.

Change-Id: I71ad5adf9bf64bb1e30354446220d5769a9d44ca
2023-12-19 02:29:46 +02:00
Android Build Coastguard Worker
94d8cd70fc Snap for 11232546 from 31c017f325 to 24Q2-release
Change-Id: Icbc9c2dd20049727b0001e81faa119e6e9a3d686
2023-12-19 00:04:50 +00:00
Android Build Coastguard Worker
7826714062 Snap for 11227258 from b3e48816fa to 24Q2-release
Change-Id: I83dc98cbd6e766b4bc1d0ee18052e9f73c70eda1
2023-12-16 02:02:44 +00:00
Android Build Coastguard Worker
91309215e8 Snap for 11220357 from 25a875d403 to 24Q1-release
Change-Id: I32db3eef99d44744cc88312240c3748f2d02689a
2023-12-15 00:23:08 +00:00
Danny Lin
f643373281 zuma: Enable Adaptive Connectivity setting
This feature is provided by the ConnectivityThermalPowerManager app that
we extract as a proprietary blob, so we can expose it.

Change-Id: I407e9e2235531fbca0b2c0e48b68105b1e77ad1f
2023-12-14 14:26:35 +02:00
Michael Bestas
43a2406e3b zuma: Remove quick_qs_{offset,total}_height overlays
Commit 49895bb361e74ffe92a3c0b76f988c8e4697b5c1 in device/google/gs101
failed to remove these overlays. Since this tree was created from
device/google/gs101, this results in the following issue on shusky:
* Pull down status bar
* Try to adjust brightness, network settings open instead

This is caused by the 171px offset that causes the status bar
to overlap the brightness slider.

Test: Reliably adjust brightness, confirm with "Show layout bounds"
      from developer settings.
Change-Id: I1b97a28c257cb5b0faba830f29e9058d2dbe50fa
2023-12-14 14:26:01 +02:00
Nolen Johnson
153ce0184e zuma: Set camera extension package to Google package
Change-Id: I519ebf8a1e2a9d06561471206c91c01b352ebd47
2023-12-14 14:25:54 +02:00
LuK1337
4e7d985621 zuma: overlay: Add reboot to fastbootd
Change-Id: I733b4d29129f85b92222e292af46602310b9f29f
2023-12-14 14:25:45 +02:00
Michael Bestas
e10206f6be zuma: Set default screen brightness
Extracted from stock.

Change-Id: I8a5e2c8717c145e66aaa0e926ceefc7e117b04c2
2023-12-14 14:25:37 +02:00
razorloves
d5c115be1b zuma: Set auto brightness mode on by default
* Stock sets this on by default, mirror that behavior.

Change-Id: I5cb8e3db27849ebd90459a6d70e053158c05bcc9
2023-12-14 14:25:29 +02:00
Danny Baumann
5a4ee31fb3 zuma: Enable call recording
Change-Id: I1b4478b330b13cf5d0fe1ed0d40f43e4b3825f33
2023-12-14 14:24:32 +02:00
razorloves
16612f9b09 zuma: Set OPA property to enable google assistant
Change-Id: I741171219d64a28d56531f063f95f3f6f6cf81e6
2023-12-14 14:24:20 +02:00
razorloves
6be82f9ba3 zuma: Use CarrierSettings app instead of CarrierConfig
The CarrierSettings app enables/disables carrier apps based on sim
inserted, so use it instead of CarrierConfig.

Change-Id: I163dd615e9d8268c5f94a28ae234a30f74c7e83b
2023-12-14 14:23:58 +02:00
Michael Bestas
370e538a40 zuma: Set config_nightDisplayColorTemperatureCoefficients
Extracted from stock.

Change-Id: I5d69d01204b0dd86a7205eb3b16e02f97a7f3db2
2023-12-14 14:23:41 +02:00
Danny Lin
067d352cc0 zuma: Enable USB and skin temperature warnings
Extracted from stock.

Change-Id: I951f60579a4b7fa2dcc270b5acd433ad1ecb083c
2023-12-14 14:23:33 +02:00
Dan Pasanen
41b118d126 zuma: enable config_vibrateOnIconAnimation
* need those sexy vibes

Change-Id: If5671135879f6f4069d0ed881b41b0a243890349
2023-12-14 14:23:21 +02:00
Michael Bestas
9c058d7f12 zuma: overlay: Update multiple vibration strength levels overlay for 13
Change-Id: If17503f2dd4bd4d6e333891f9649a7db8d809852
2023-12-14 14:22:19 +02:00
Danny Lin
d2803aa9d6 zuma: overlay: Settings: Enable multiple vibration strength levels
All production zuma devices have CS40L2x haptic driver ICs that support
multiple intensities, so expose the Off/Low/Medium/High vibration
strength options like stock.

Change-Id: I72645b5bd5772e182592a630df86f9b6166b4923
2023-12-14 14:22:17 +02:00
mydongistiny
9dbedaab9e zuma: Add back saturated color mode
Change-Id: I183c2eabe7c3918fde6c37b0aa360ed7e94f6b61
2023-12-14 14:16:44 +02:00
Danny Lin
5308b6f994 zuma: Don't pin camera app in memory
The default camera app can be *huge* in some cases, e.g. when the app in
question is Google Camera. The system will only pin up to the first 80
MiB of the APK file, as well as the first 80 MiB of its odex. There are
several problems with this:

  - We could easily end up with 160 MiB of camera app files pinned,
    which is a tall order with the 6 GiB of usable RAM that we have
  - The data that gets pinned may not even be the most critical data for
    launching the camera

Let's disable pinning of the camera app to save RAM.

Change-Id: I745e39b6ff212dfaf9213517d2a2be8ff7384e24
2023-12-14 14:16:36 +02:00
Ethan Chen
e2189f19c5 zuma: Disable userdebug diagnostics
* We can't make use of most of the debug features on userdebug builds.

Change-Id: I31df2090b31243b742c4e82dc08cd8491dada54f
2023-12-14 14:16:19 +02:00
Chirayu Desai
37f6e87581 zuma: Add device manifest for radio & keymint
Change-Id: Ib6c4b28d33fb64cb05c715d86a96a829a498beac
2023-12-14 13:45:41 +02:00
Chirayu Desai
1ebdb9fd7a zuma: Build vbmeta_vendor
Change-Id: I74c028a2e5ade8830526e95f8ec90b1a1da35afb
2023-12-14 13:45:24 +02:00
Chirayu Desai
ba50847fd7 zuma: BUILD_BROKEN_ELF_PREBUILT_PRODUCT_COPY_FILES = true
Change-Id: I0eeaa3ba0f87e5fbe64234d413b5e4eee36957b0
2023-12-14 13:45:14 +02:00
Chirayu Desai
7257cf0176 zuma: Build vendor
Change-Id: I08dff42223ae54386a5ed050b51aa4a39e08bdb6
2023-12-14 13:45:07 +02:00
Chirayu Desai
7fb13af85f zuma: Build vendor_dlkm
Change-Id: Ic2a0e4cdfdcc448a73bef41e0d2140e9d0aefcf0
2023-12-14 13:44:54 +02:00
mydongistiny
d33f4b1880 zuma: Use Google's wifi_ext service
* Use vendor.google.wifi_ext@1.0-service
  that is in the vendor partition instead
  of the AOSP WiFi service.

Change-Id: Ia0fff6ffc532cc6b5e41f8ac242d00e64627cee8
(cherry picked from commit d2c1a98bb37193f598721c4d71267eb8ac2b110b)
2023-12-14 13:44:19 +02:00
Bruno Martins
a0b4b2a1ab zuma: Pin standard SystemUI instead of Google's
Change-Id: If96bb13d6cc2c2156d8df111a1037247c96c6e0f
(cherry picked from commit 043d76955467053dcf8f615f6637bdc66b667c0c)
2023-12-14 13:44:14 +02:00
Chirayu Desai
da26194ccf zuma: Create BoardConfigLineage
Change-Id: I8136e9f0df40ca3bf96dbfd2453275481178cdaa
2023-12-14 13:43:55 +02:00
Michael Bestas
b9f727e493 zuma: Update sepolicy path
Change-Id: Ie2d420cd25e1a8b65977504ed987df57b525dc5f
2023-12-14 13:41:36 +02:00
Michael Bestas
81354010f2 Add .gitupstream
Change-Id: I79747ef989659c069386a6ed34a59bba2e8ea860
2023-12-14 13:39:44 +02:00
Michael Bestas
4012340fa0 Add 'sepolicy/' from tag 'android-14.0.0_r17'
git-subtree-dir: sepolicy
git-subtree-mainline: 804eaebcae
git-subtree-split: 3286f258be
Change-Id: I30ac8e08a40401d0617b37bea85c4b8ed60ed17b
2023-12-14 13:36:55 +02:00
Android Build Coastguard Worker
577986678c Snap for 11216811 from b3e48816fa to 24Q1-release
Change-Id: Ifdf15312217f62374ce30d666e8e16de5fde3ade
2023-12-14 00:03:39 +00:00
Android Build Coastguard Worker
321dc20fb9 Snap for 11216811 from e1e8933703 to 24Q1-release
Change-Id: Ia515ea414f08223340989cfbda06f807340fd354
2023-12-14 00:03:38 +00:00
Android Build Coastguard Worker
8a7d32375e Snap for 11211173 from ed808b4425 to 24Q1-release
Change-Id: I1662f94e7c3672ad0eb720647d8171023e1720aa
2023-12-13 00:06:15 +00:00
Android Build Coastguard Worker
67c3fedb9d Merge cherrypicks of ['googleplex-android-review.googlesource.com/25616149'] into udc-qpr1-release.
Change-Id: I4193363030c8ad0c80e39b4325d4a126a3e7c08f
2023-12-12 05:02:40 +00:00
Hungyen Weng
cacbd7f2fc config: Use carrier config in ROM by default
Bug: 314890118

Test: Flash ROM and confirm the carrier config follows the ROM.
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:06e99301dd1bf20da055af6484694a9e7115dc73)
Merged-In: Iffdb9a3a53e82d86d9917d84a7ce6ac49a3bad2a
Change-Id: Iffdb9a3a53e82d86d9917d84a7ce6ac49a3bad2a
2023-12-12 05:01:50 +00:00
Android Build Coastguard Worker
7fcd2d361c Snap for 11206181 from 259348f8f7 to 24Q1-release
Change-Id: Ice268fc3ea3fabd8dd0b95e34dc19ec820de5923
2023-12-12 02:03:06 +00:00
Android Build Coastguard Worker
145f804642 Snap for 11206181 from 1b45f49762 to 24Q1-release
Change-Id: I39342f2c5107091e2b32f6ec89170119cd79c911
2023-12-12 02:03:05 +00:00
Android Build Coastguard Worker
ef429a28e9 Snap for 11201039 from 9f7b7c532d to 24Q1-release
Change-Id: I534e8505c0c19b4b81bdfdc0ee7cc27cb44e8d25
2023-12-10 00:03:13 +00:00
Android Build Coastguard Worker
607aadef44 Snap for 11200327 from 585d72a3bd to 24Q1-release
Change-Id: Ibf96d66b35a5d064840c9b01a12f3e3c04d707a7
2023-12-09 04:03:23 +00:00
Android Build Coastguard Worker
7016a182df Snap for 11192287 from 2ecdf16781 to 24Q1-release
Change-Id: I0a83af9c60ee1a8f9968511858f032c19fc4f975
2023-12-08 00:03:44 +00:00
Android Build Coastguard Worker
8831bb3fd1 Snap for 11186783 from 7beccb101a to 24Q1-release
Change-Id: If70ab8ab01c1b822e644041acb8889a571547f3b
2023-12-07 00:03:03 +00:00
Android Build Coastguard Worker
fd38ab1041 Snap for 11186783 from ec93b1bbd4 to 24Q1-release
Change-Id: I06f238bedb11b1f09c8f22d7954fea89096e7ab3
2023-12-07 00:03:02 +00:00
Android Build Coastguard Worker
186d6a8841 Snap for 11180250 from 47c545c8b0 to 24Q1-release
Change-Id: I0e4e5236ac545323d25bea3123f0d133bbe3db5a
2023-12-06 00:05:28 +00:00
Android Build Coastguard Worker
bfb557b32a Snap for 11180250 from 1dc0d70de4 to 24Q1-release
Change-Id: I670e414a427adc4ab7c9f0b3e51808918de8218c
2023-12-06 00:05:27 +00:00
Android Build Coastguard Worker
4b9be834b9 Snap for 11175020 from 7e977d05b5 to 24Q1-release
Change-Id: I4384742f462cf6cc6636537aa4ae31b092ebac07
2023-12-05 02:31:47 +00:00
Android Build Coastguard Worker
d7fb9d25df Snap for 11171107 from 5f8ba1c0d3 to 24Q1-release
Change-Id: I88b5d765e0661ecf782a8860a261a3983655c13d
2023-12-02 22:02:54 +00:00
Android Build Coastguard Worker
0857843adc Snap for 11169761 from 979e64b5f2 to 24Q1-release
Change-Id: I8476c66aa29a51d05a7fdc7936b863699d2441cc
2023-12-02 02:02:58 +00:00
Android Build Coastguard Worker
7be45da460 Snap for 11169761 from 62f3a1abc4 to 24Q1-release
Change-Id: I3ea56fbda81b7d951e5fd43a6769a7a4057a9c97
2023-12-02 02:02:57 +00:00
Android Build Coastguard Worker
5cdcebad59 Snap for 11162593 from 76972151b2 to 24Q1-release
Change-Id: Ie20703da7d977d14f3234ccc6bab86cbb6b23021
2023-12-01 00:03:31 +00:00
Android Build Coastguard Worker
55dbcbce49 Snap for 11162593 from e18209fef7 to 24Q1-release
Change-Id: I94ca14f18adf4f2eaa5341838400b2e0184b1e94
2023-12-01 00:03:30 +00:00
Android Build Coastguard Worker
11dc16884e Snap for 11157599 from d05c6ad1e6 to 24Q1-release
Change-Id: I24079c74eb78f8525f2a7444ae2dcc4b1bda64bc
2023-11-30 00:04:31 +00:00
Android Build Coastguard Worker
9da38f8b92 Snap for 11146061 from 9c8cb72283 to 24Q1-release
Change-Id: I7dc1c4dd88350545cf2cd90a796a47f5e3de7df1
2023-11-28 00:03:34 +00:00
Android Build Coastguard Worker
105faa918d Snap for 11146061 from 6a3349663d to 24Q1-release
Change-Id: I4a5ec6197a426c425eb55f05f9e3e7a69344a18e
2023-11-28 00:03:33 +00:00
Android Build Coastguard Worker
c18ae977e2 Snap for 11139387 from 9bd6f5ebd1 to 24Q1-release
Change-Id: I3694643b556b67373a1f87d457c92f3f47755107
2023-11-24 00:03:22 +00:00
Android Build Coastguard Worker
f4961ff03c Snap for 11135477 from 60b467ac40 to 24Q1-release
Change-Id: I59a8aba6f0d4f1b2823ec066388f3b91fbf4746a
2023-11-23 00:03:29 +00:00
Android Build Coastguard Worker
e13b1ebbb6 Snap for 11130229 from 70a5a27331 to 24Q1-release
Change-Id: I43746352959ea7470b0ed4ca7e66a1aa5e2871ca
2023-11-22 00:04:25 +00:00
Android Build Coastguard Worker
e2b583b00a Merge cherrypicks of ['googleplex-android-review.googlesource.com/25398212'] into udc-qpr1-release.
Change-Id: I95aa412212645226f6ed7498a0d849c023a78124
2023-11-21 18:03:15 +00:00
Ruofei Ma
10c24e2475 Enable adaptive playback for BigWave
Bug: 309722491

Signed-off-by: Ruofei Ma <ruofeim@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:d7b343305d3da89cca0b8eaa18ea4959ded6c197)
Merged-In: Ibc5a88efc535cc847fbde45541d451ee97c65a1e
Change-Id: Ibc5a88efc535cc847fbde45541d451ee97c65a1e
2023-11-21 18:02:43 +00:00
Android Build Coastguard Worker
3897206a7f Snap for 11124398 from 9fcc03e099 to 24Q1-release
Change-Id: Id4fcd0f9567a6ba42e32beb37c1b33ab178f7031
2023-11-21 00:02:59 +00:00
Android Build Coastguard Worker
f3d0a8de65 Snap for 11120126 from 09160b77ca to 24Q1-release
Change-Id: I1f314e115357b94a0188b28d3c1e5ad2d32ff357
2023-11-19 00:02:58 +00:00
Android Build Coastguard Worker
ef0c883b6b Snap for 11117647 from 658c20d024 to 24Q1-release
Change-Id: Idb15eab4a9a1503e82fcca09fab40f13490e7ad6
2023-11-18 02:02:52 +00:00
Android Build Coastguard Worker
73f4e839ea Snap for 11117647 from 228db5e2a5 to 24Q1-release
Change-Id: I11275e97e08835826604844fa33568eac810a259
2023-11-18 02:02:51 +00:00
Android Build Coastguard Worker
a5bda83f42 Snap for 11104212 from ca8e0baee7 to 24Q1-release
Change-Id: Ic31258f8c3a6c47c513cd2d4232838fe616cb063
2023-11-16 00:03:40 +00:00
Android Build Coastguard Worker
03ba2a0451 Snap for 11104212 from c55415c1e2 to 24Q1-release
Change-Id: I06ca8d41c44d5222a40ae9539998532c00f5f4f2
2023-11-16 00:03:39 +00:00
Android Build Coastguard Worker
50830d4644 Snap for 11097608 from 8ff4604573 to 24Q1-release
Change-Id: I95208dd4ca5fb6fc0ea669663b94eb21fc7f2c2c
2023-11-15 00:03:20 +00:00
Android Build Coastguard Worker
9907debfaa Snap for 11089623 from 78a70da442 to 24Q1-release
Change-Id: Ic60ffe7f7bae3e8d5ac9bb350aa18b08f7e52540
2023-11-14 00:03:01 +00:00
Android Build Coastguard Worker
5bcb107f75 Snap for 11084970 from 0774e72816 to 24Q1-release
Change-Id: I3224367f9886699167b0dc0bf53dceae01562507
2023-11-11 02:03:23 +00:00
Android Build Coastguard Worker
ecb4ea9c5a Snap for 11084970 from 398ceca7a9 to 24Q1-release
Change-Id: I70ba47f4962b30635def0900330543a589040a35
2023-11-11 02:03:23 +00:00
Android Build Coastguard Worker
792846a535 Snap for 11078623 from 64853c99f4 to 24Q1-release
Change-Id: If4d909a21558223196e7eb4f9d5538f822359de8
2023-11-10 00:03:03 +00:00
Android Build Coastguard Worker
562b4b17c1 Snap for 11071763 from d6f83eba29 to 24Q1-release
Change-Id: Id7c59391cdaac8295ed1928d1f39e959c830fd6d
2023-11-09 00:03:04 +00:00
Android Build Coastguard Worker
e98afc3ba9 Snap for 11071763 from ff513752a1 to 24Q1-release
Change-Id: I54d085bdc6ef19ca75f2b547b56a364aa30939ea
2023-11-09 00:03:03 +00:00
Android Build Coastguard Worker
1dbc5e2c6b Snap for 11065517 from d76fa68860 to 24Q1-release
Change-Id: I37b4c332b173fb836ad92970c663d4cd990fa191
2023-11-08 00:05:58 +00:00
Android Build Coastguard Worker
2c315c5526 Snap for 11059422 from c3d0ba2da2 to 24Q1-release
Change-Id: Iefecaff650f57d55f332f13e8f3c7f640bc604cd
2023-11-07 02:03:24 +00:00
Android Build Coastguard Worker
0f977a4b6c Snap for 11059422 from 5f6d9cc357 to 24Q1-release
Change-Id: I68c47c1d2dd09b0119fe4863f10c13ef9c8a4170
2023-11-07 02:03:23 +00:00
Android Build Coastguard Worker
ee41c86fa3 Snap for 11044623 from 73d96fb40f to 24Q1-release
Change-Id: I6c506d4edaa3202ffb7a1c263e72529ab32925fd
2023-11-03 01:03:56 +00:00
Android Build Coastguard Worker
e31789f758 Snap for 11038355 from 4a0a7997b5 to 24Q1-release
Change-Id: I158dfabfc2fcd3e478b4f5fa5a72fe2c698f2191
2023-11-02 01:03:40 +00:00
Android Build Coastguard Worker
4c72e906c3 Snap for 11031655 from 244aed251d to 24Q1-release
Change-Id: I02a8b0824d6e4b485c891565478d4a2f99395aa2
2023-11-01 01:03:36 +00:00
Android Build Coastguard Worker
d2a15ecb69 Snap for 11025555 from 11ea7dd6d6 to 24Q1-release
Change-Id: I654e6e8d437ba5f123ef0ac786e1c01cc5310fce
2023-10-31 01:03:14 +00:00
Android Build Coastguard Worker
590dea55dc Snap for 11025555 from d2c07f3b87 to 24Q1-release
Change-Id: Id0a99831fcb5220089e2381a28bb5e848fccd267
2023-10-31 01:03:13 +00:00
Android Build Coastguard Worker
9105fc486a Snap for 11020550 from fa6626b128 to 24Q1-release
Change-Id: Ia5d07babb40279fb5b5d3148ac34887b19a04719
2023-10-29 23:03:39 +00:00
Android Build Coastguard Worker
5d719004a9 Snap for 11017726 from 32d99c3e05 to 24Q1-release
Change-Id: I02f72d71a4702780ae425573bea923be6b9adbcb
2023-10-28 03:12:50 +00:00
Android Build Coastguard Worker
0e13f9add8 Snap for 11017726 from 44082e91da to 24Q1-release
Change-Id: I8e0583265715c85b5eca2189fcb7fb4db5c510ed
2023-10-28 03:12:49 +00:00
Android Build Coastguard Worker
2f8b18c626 Snap for 11012804 from 5d83d85ad2 to 24Q1-release
Change-Id: Icbd92ebadb85db1eea13826f3a461eaf8a8dd028
2023-10-27 03:19:57 +00:00
Android Build Coastguard Worker
539fd546c4 Snap for 11012804 from f60b0e874f to 24Q1-release
Change-Id: I102c5bfa108f4c2aba63e95a38cc6ab2520b1761
2023-10-27 03:19:57 +00:00
Android Build Coastguard Worker
aa3d20b9d9 Snap for 11005173 from 151ef4d45d to 24Q1-release
Change-Id: Idd8ce140666dabe12ebe531424fbd3ab44e684ba
2023-10-26 01:36:30 +00:00
Android Build Coastguard Worker
e13b8f4cc2 Snap for 10998418 from 2129b7fe3f to 24Q1-release
Change-Id: I88696dd518f7d915067d1cd692bae2b80c67d85e
2023-10-25 01:06:37 +00:00
Android Build Coastguard Worker
c54e58f059 Snap for 10992821 from 8d46bb7983 to 24Q1-release
Change-Id: I9c2acbaa0babd2a89a0eeaad7bd9a2d66498691b
2023-10-24 01:06:40 +00:00
Android Build Coastguard Worker
04c81876c4 Snap for 10992821 from a4c5c5f621 to 24Q1-release
Change-Id: I39ff0bf255ca68cc4b6d6bf54cc1050335231af7
2023-10-24 01:06:39 +00:00
Android Build Coastguard Worker
e0dd8973ec Snap for 10985023 from fcf7f847ae to 24Q1-release
Change-Id: Ieb32781fb68e02d49b705fa8f9d84d2a4743743e
2023-10-21 03:06:24 +00:00
Android Build Coastguard Worker
da84af699d Snap for 10985023 from ebe3cf6812 to 24Q1-release
Change-Id: Ifbb38778c43675d97837349cf136006aa24c6429
2023-10-21 03:06:23 +00:00
Android Build Coastguard Worker
376b209966 Snap for 10970117 from d20bee68db to 24Q1-release
Change-Id: Ibb223f8e23730b7779c1adfcc4d0982a6f0cac57
2023-10-19 01:10:05 +00:00
Android Build Coastguard Worker
0c6106e23a Snap for 10970117 from ab87cd4fae to 24Q1-release
Change-Id: I2e3322ce0e9ba4d291aeca5e6281a10c790653b3
2023-10-19 01:10:04 +00:00
Android Build Coastguard Worker
4a2cace054 Snap for 10963245 from d77b117b40 to 24Q1-release
Change-Id: I1fb41c223ee96eb854e6656e06e75283eadc6019
2023-10-18 01:05:26 +00:00
Android Build Coastguard Worker
58472995a1 Snap for 10958510 from d48c63c215 to 24Q1-release
Change-Id: I3769b3f8e87a3285180f31b30130b739f04a5c50
2023-10-17 02:30:46 +00:00
Android Build Coastguard Worker
7dfb3a5e3b Snap for 10950137 from 5883c27036 to 24Q1-release
Change-Id: I7626c38f44914b2dd29bcffe030bd5eb136e5863
2023-10-14 05:05:20 +00:00
Android Build Coastguard Worker
2f12992d4d Snap for 10950137 from 5cc2bfebf4 to 24Q1-release
Change-Id: I2aa51fe6a88b27cc2b2574d5ddfb50c353c33c46
2023-10-14 05:05:19 +00:00
Android Build Coastguard Worker
3286f258be Snap for 10949315 from 127ca27edc to udc-qpr1-release
Change-Id: I953a4cc7cb3da49a1c0e59c9a42f923ca79f7a09
2023-10-14 01:07:37 +00:00
Android Build Coastguard Worker
817b351fa5 Snap for 10942032 from f08b6e4d84 to 24Q1-release
Change-Id: I82b43192d4f9022dfe43248bc1beca162757019f
2023-10-13 03:10:35 +00:00
Android Build Coastguard Worker
1525445198 Merge cherrypicks of ['googleplex-android-review.googlesource.com/24948148'] into udc-qpr1-release.
Change-Id: Ibb4079baea932f9ebb9e7939c47242ff52e9994c
2023-10-12 23:55:38 +00:00
Chia-Chi Teng
c2fc0be24a Revert "bluetooth: Allow triggering AOC reset from BT HAL"
Revert submission 24871772-bt-aoc-coredump

Reason for revert: b/300076774 root cause identified as b/299038059

Reverted changes: /q/submissionid:24871772-bt-aoc-coredump

Bug: 299038059
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:0aa787efa82477a31e9941374ec5fa17738a4f07)
Merged-In: Ibd021c6b983c2eb390c268cf89f30e2e8ee54d21
Change-Id: Ibd021c6b983c2eb390c268cf89f30e2e8ee54d21
2023-10-12 23:55:19 +00:00
Android Build Coastguard Worker
fa0f83b22d Snap for 10929702 from a7648dfb45 to 24Q1-release
Change-Id: I134d8d703021537b284d20d5d5e49bcf12025081
2023-10-11 01:05:22 +00:00
Android Build Coastguard Worker
c168d1d626 Snap for 10923648 from b2592218d6 to 24Q1-release
Change-Id: Ia6a28090702866c884312ec3f01c10d57a2b4684
2023-10-10 01:05:55 +00:00
Android Build Coastguard Worker
711588b4fd Snap for 10915631 from 3c42b0fd71 to 24Q1-release
Change-Id: I175dd44cb3a9a454eb6a9a6eab7c74218d42005d
2023-10-07 03:06:01 +00:00
Android Build Coastguard Worker
c9c0c08991 Snap for 10909147 from 56723a2036 to 24Q1-release
Change-Id: I6ff3a0be981469f00c1200db604b0201d0e935d3
2023-10-06 01:05:21 +00:00
Android Build Coastguard Worker
bbcbaf407b Snap for 10909147 from 2685dda06f to 24Q1-release
Change-Id: Ia3f90e27a53066e10fee8195d02337fe517dec58
2023-10-06 01:05:20 +00:00
Android Build Coastguard Worker
56eb30285e Snap for 10909010 from fd78823dfa to udc-qpr1-release
Change-Id: Id5dc44ab68d45c22fe5699ae1bf8797f920e6e03
2023-10-05 23:03:34 +00:00
Android Build Coastguard Worker
b499a9eedc Snap for 10903783 from a9c5940732 to 24Q1-release
Change-Id: Iae2b2edfb94db92a97700d5cd86902ad4ba8fe65
2023-10-05 03:05:13 +00:00
Android Build Coastguard Worker
b6630efc4f Snap for 10897809 from 03fd3d9a37 to 24Q1-release
Change-Id: Iff90dc140ae70aac2088499bae4b3638c4db2cfd
2023-10-04 02:30:01 +00:00
Android Build Coastguard Worker
b929216e86 Snap for 10889587 from 78a11c134a to 24Q1-release
Change-Id: I529c57390a86aef1deada2e229a7d0889502be4f
2023-10-03 03:05:17 +00:00
Android Build Coastguard Worker
ac9934df2c Snap for 10884074 from e853c1919d to 24Q1-release
Change-Id: I28c2e27f9252d6d2975a9cb0db5e87ede8561221
2023-09-30 03:05:14 +00:00
Android Build Coastguard Worker
a8cf202eb4 Snap for 10884074 from 77b0f3fc8c to 24Q1-release
Change-Id: I33188b71c7dd7ef50a197f47bf7c0f4e92be957c
2023-09-30 03:05:13 +00:00
Android Build Coastguard Worker
eba8de4a1b Merge cherrypicks of ['googleplex-android-review.googlesource.com/24892143'] into 24Q1-release.
Change-Id: Ifaddb3c8e88aa1c8d33c706284b303ed7dd05cc3
2023-09-29 03:31:24 +00:00
Android Build Coastguard Worker
6ad62e2c3c Merge cherrypicks of ['googleplex-android-review.googlesource.com/24892142'] into 24Q1-release.
Change-Id: I9cf29f764cd8a53e38e8c1785ab841c1271a6f7e
2023-09-29 03:31:21 +00:00
Jing Wang
501cc68087 Revert "Add vendor_sjtag_lock_state_prop and init-check_ap_pd_au..."
Test: Revert submission 24754347-zuma-etm2dram

Reason for revert: b/302352974

Reverted changes: /q/submissionid:24754347-zuma-etm2dram

Bug: 302352974
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e853c1919d4fef493c545ed3e1c79958158f7d20)
Merged-In: I251c3a62c79722a9050bdbce85dc758fc4b6fda9
Change-Id: I251c3a62c79722a9050bdbce85dc758fc4b6fda9
2023-09-29 03:31:14 +00:00
Jing Wang
37a9786437 Revert "init.debug.rc: enable etm/etm2dram when SJTAG is unlocked"
Revert submission 24754347-zuma-etm2dram

Reason for revert: b/302352974

Reverted changes: /q/submissionid:24754347-zuma-etm2dram

Bug: 302352974
Signed-off-by: Jing Wang <jwangh@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:77b0f3fc8c55f7cc934d380c6d295aa5f47ffc5f)
Merged-In: I937658f7c78a97e2c3065a05058353b5cf16e860
Change-Id: I937658f7c78a97e2c3065a05058353b5cf16e860
2023-09-29 03:31:06 +00:00
Android Build Coastguard Worker
40b9df9454 Snap for 10878163 from 1af5314ec0 to 24Q1-release
Change-Id: I5a34bbd3e3c66c111725237286b3cfaeaf9bc4a7
2023-09-29 01:04:54 +00:00
Android Build Coastguard Worker
04ba176333 Snap for 10878163 from 447cdc3f6c to 24Q1-release
Change-Id: I4875bd2d385560dfdd361aa0c170c6c81686e356
2023-09-29 01:04:54 +00:00
Android Build Coastguard Worker
bca4ed4030 Snap for 10877629 from 858f999657 to udc-qpr1-release
Change-Id: Iedf7e84ba802018bd59a03d9e53782fe2c37f112
2023-09-28 23:03:21 +00:00
Android Build Coastguard Worker
d1f9ed8154 Snap for 10872577 from 160a33cd99 to 24Q1-release
Change-Id: I4caf645b96b7580201ee98f87eb6408b6047e7e3
2023-09-28 01:09:57 +00:00
Android Build Coastguard Worker
bc5b04415c Snap for 10865348 from 22eae6d60c to 24Q1-release
Change-Id: Iea8fca6b7031df1c47e00647714ea6a183a8ac3f
2023-09-27 01:04:04 +00:00
Android Build Coastguard Worker
4993d95a2d Snap for 10853826 from 3a73468bc5 to 24Q1-release
Change-Id: I10947ad33257a080ce6912e462ea6140e777ebdf
2023-09-23 23:03:06 +00:00
Android Build Coastguard Worker
3962771be5 Snap for 10851067 from a20daced19 to 24Q1-release
Change-Id: Id168f38b1e63fd426e78472b82a92d8ee39fbe9a
2023-09-23 03:03:54 +00:00
Android Build Coastguard Worker
043e39f30b Snap for 10844961 from b9abd19bc2 to 24Q1-release
Change-Id: I75f5e632b20d09b51166a206b4d1db712f90634d
2023-09-22 01:04:17 +00:00
Android Build Coastguard Worker
4d30db4766 Snap for 10843824 from 2c8f57245a to 24Q1-release
Change-Id: I0faefc9c392d7ede93f766d1b703bb04839bf08e
2023-09-21 21:53:27 +00:00
Android Build Coastguard Worker
351ce41e3e Snap for 10843824 from a1e0faee5b to 24Q1-release
Change-Id: I86951ab09f23cfde10d21f9b1808e19df7a58392
2023-09-21 21:53:25 +00:00
Android Build Coastguard Worker
e02d2b662b Snap for 10817717 from adf19fcc76 to udc-qpr1-release
Change-Id: Ia256b5d9cc68bf7b3f542d1f7730ea4ccb5332f3
2023-09-16 01:07:46 +00:00
Android Build Coastguard Worker
2c7a2f3b96 Snap for 10810697 from 64c085cfab to udc-qpr1-release
Change-Id: I509643a1cde727ce05c37851bc6f8f7a7d395d83
2023-09-14 23:03:38 +00:00
Android Build Coastguard Worker
a159dd37ea Snap for 10804332 from 1a65e5d5e4 to udc-qpr1-release
Change-Id: I5d2fbb62a49f0a3b4e1f84532c424fd4289d08cb
2023-09-13 23:03:22 +00:00
Android Build Coastguard Worker
5cde7e9535 Snap for 10739918 from 4bb847b815 to udc-qpr1-release
Change-Id: I9a0e3277ca7efec34580b9dbb672131ccb9bf358
2023-08-30 23:03:59 +00:00
Android Build Coastguard Worker
7276b2f7b5 Snap for 10732685 from ea09b155f2 to udc-qpr1-release
Change-Id: Iee4e1b49a299f4c5646d63b28a5db02c4c213e82
2023-08-29 23:03:01 +00:00
Android Build Coastguard Worker
1e83e2b16b Snap for 10712072 from ae9ab242e8 to udc-qpr1-release
Change-Id: Iee6cca82d00379e851f7b9958e7e820178372284
2023-08-24 23:03:01 +00:00
Android Build Coastguard Worker
071efa5a8d Snap for 10690357 from 7f3e2b9212 to udc-qpr1-release
Change-Id: Id3462b680735b5993a677c847cbb2b1dc79f0864
2023-08-21 23:03:19 +00:00
Android Build Coastguard Worker
6bbd96b4b5 Snap for 10675748 from 013ec5ce54 to udc-qpr1-release
Change-Id: Ie031a9573ca3967c61f7bfdb01ac92a0948afa2c
2023-08-17 23:03:08 +00:00
Android Build Coastguard Worker
085b322676 Snap for 10658274 from 746bd9ad3c to udc-qpr1-release
Change-Id: I39fa91dcd50530959cd46c6e3507f31f40b3c43c
2023-08-15 01:08:40 +00:00
Android Build Coastguard Worker
f7edd28e4f Snap for 10622798 from 2d2ec40c1a to udc-qpr1-release
Change-Id: Ie326fadfc261fe8f80956ffbd0b37ba3820c9c59
2023-08-07 23:03:49 +00:00
Android Build Coastguard Worker
983316518d Snap for 10594510 from 61939d2308 to udc-qpr1-release
Change-Id: I4042a485da8d152d47293071789149d60418aeae
2023-08-01 23:03:15 +00:00
Android Build Coastguard Worker
08faa85ed9 Snap for 10580366 from 91cd7cbad8 to udc-qpr1-release
Change-Id: Idca0aaad3fcae7b6e544fe739ec2268c3a31dfaa
2023-07-29 01:07:39 +00:00
Android Build Coastguard Worker
883ea98a15 Snap for 10542431 from 7aa9a5e3c0 to udc-qpr1-release
Change-Id: I6988e04123e8eec15a423af916f99e5155dd490d
2023-07-22 01:07:45 +00:00
Android Build Coastguard Worker
a55496243b Snap for 10527654 from 62b083db4d to udc-qpr1-release
Change-Id: Ibcfdf6034c45caa00774e029d008bbc4904a595c
2023-07-19 23:03:16 +00:00
Android Build Coastguard Worker
3794175969 Snap for 10509334 from 40759437ea to udc-qpr1-release
Change-Id: I4c6a7efb601a58b06b623ac8b8da7ed9c0881ad4
2023-07-17 23:03:33 +00:00
Android Build Coastguard Worker
16486ff98f Snap for 10503120 from 8e0c6c3838 to udc-qpr1-release
Change-Id: I74bc77633dd80d6def09110d204058124c6234b7
2023-07-15 21:02:51 +00:00
Android Build Coastguard Worker
0c02ac7c0d Snap for 10492621 from a5187246a1 to udc-qpr1-release
Change-Id: I002838d2214d453cbe99f938cb4ffb3c91aa0013
2023-07-13 23:03:37 +00:00
Android Build Coastguard Worker
6915794c2d Snap for 10486787 from 4c3281ff67 to udc-qpr1-release
Change-Id: Id118904027a228e389df433740c6e7b7e7b8cf03
2023-07-12 23:03:24 +00:00
Android Build Coastguard Worker
47f1f8365f Snap for 10477539 from 4640c96bb4 to udc-qpr1-release
Change-Id: I7e4a6ba5b199d7bc029d72918abe6f583a6f11c8
2023-07-11 23:03:09 +00:00
Android Build Coastguard Worker
983c584b52 Snap for 10468395 from 01714c600b to udc-qpr1-release
Change-Id: Ia5228f0586733af638e2286bf9a6bd71499509c7
2023-07-10 23:08:05 +00:00
Android Build Coastguard Worker
5e46b76d8b Snap for 10459084 from f65918769f to udc-qpr1-release
Change-Id: I44ea053a7f13cf3ccd87ea177c2c7a6e9a0a0eff
2023-07-08 01:07:39 +00:00
Android Build Coastguard Worker
4bf5b52b7e Snap for 10449897 from 304b7da426 to udc-qpr1-release
Change-Id: I3cf7cca895d8930905a5e2fb1f39c29b3a18ddd1
2023-07-06 23:03:24 +00:00
Android Build Coastguard Worker
68e32d7824 Snap for 10412120 from bd6892b9d3 to udc-qpr1-release
Change-Id: I05d34a6801ae14bae786726acbe49d691d08a32f
2023-06-29 23:03:39 +00:00
Android Build Coastguard Worker
99b8156815 Snap for 10393214 from 6f65e69366 to udc-qpr1-release
Change-Id: If02e1101984fca49c2913d3743fb2729c279f218
2023-06-27 23:03:07 +00:00
Android Build Coastguard Worker
54f73084ef Snap for 10361546 from 62b8a1fed8 to udc-qpr1-release
Change-Id: I901e6b26481cc990bc93cc6976bb569a02c5c05f
2023-06-22 01:07:38 +00:00
Android Build Coastguard Worker
00fc81481a Snap for 10354447 from 2f78573928 to udc-qpr1-release
Change-Id: Ia0c791375bae24adcb66b04c2552de9de8cc7978
2023-06-21 03:03:22 +00:00
Android Build Coastguard Worker
60eb4031dc Snap for 10347638 from 78f862e8ed to udc-qpr1-release
Change-Id: I43c4ff9720ab39af0842c5189af69c7374c931c0
2023-06-20 01:07:31 +00:00
Android Build Coastguard Worker
96c49a15c5 Snap for 10342904 from 461409cecd to udc-qpr1-release
Change-Id: I3fb76220f23c25cbfc6b477c7e927495065f0cc0
2023-06-17 23:02:51 +00:00
Android Build Coastguard Worker
7607133132 Snap for 10330433 from 2bd05aeaad to udc-qpr1-release
Change-Id: Ib596f67d9bbfd910edf2497bc5116142f4d37966
2023-06-16 03:03:00 +00:00
Android Build Coastguard Worker
33a3f2d2e4 Snap for 10322046 from 3c8fb109b8 to udc-qpr1-release
Change-Id: Ic04abba26a4993107cc2a350ebbac207acc93d83
2023-06-15 01:52:51 +00:00
Android Build Coastguard Worker
dcafe61f09 Snap for 10313683 from d19ec7a5b6 to udc-qpr1-release
Change-Id: Ic945902e7bec0af3830c0eabe6080b37912fb7c0
2023-06-14 02:28:07 +00:00
Android Build Coastguard Worker
655617578b Snap for 10309372 from cac09c20ba to udc-qpr1-release
Change-Id: I584e3962d263699bae3223658b05bd64c0f8629e
2023-06-13 03:02:48 +00:00
Android Build Coastguard Worker
651940e9a0 Snap for 10289553 from 088b6c2879 to udc-qpr1-release
Change-Id: Ia3cfe45a4073b75977412dc27a71aed6cbed727c
2023-06-09 03:02:35 +00:00
Android Build Coastguard Worker
65c0c041c7 Snap for 10277391 from 4c051c0cc2 to udc-qpr1-release
Change-Id: I80861d8015eece79e7d81953e195b9149116817e
2023-06-08 01:03:17 +00:00
Android Build Coastguard Worker
ae1bfc5a03 Snap for 10268796 from 77bbb28eae to udc-qpr1-release
Change-Id: I4f716224f4666e9a606c148ded523adcf3edbde6
2023-06-07 03:03:06 +00:00
Android Build Coastguard Worker
d3cf064eb6 Snap for 10245577 from 5ab934799d to udc-qpr1-release
Change-Id: I362c965515b429b07a33b67ce6be6944a021736f
2023-06-02 03:02:25 +00:00
Android Build Coastguard Worker
f6dc1820c1 Snap for 10233403 from 3f157f2b26 to udc-qpr1-release
Change-Id: I9321de05a665c59f1a60172129bb2b51befd868e
2023-06-01 02:37:28 +00:00
Android Build Coastguard Worker
002a8c97dc Snap for 10220938 from cb1221098a to udc-qpr1-release
Change-Id: I2302d863309b713ebf86f1ff14d53bba2a46dfa6
2023-05-30 01:07:44 +00:00
Android Build Coastguard Worker
f57e5e357e Snap for 10213992 from 363d20bf36 to udc-qpr1-release
Change-Id: I44500806456d9eb182183c0f490f6f3f1470575c
2023-05-27 05:08:57 +00:00
Android Build Coastguard Worker
19eb1c4762 Snap for 10204122 from af8727c24e to udc-qpr1-release
Change-Id: I82084a8443ada17b3f12d6959787b9e40658efb2
2023-05-26 01:09:01 +00:00
Android Build Coastguard Worker
464fc09491 Snap for 10196038 from 72f862ed29 to udc-qpr1-release
Change-Id: Ia1f7963ac52834f16828a6d5d469aaabe523a65e
2023-05-25 02:42:40 +00:00
Android Build Coastguard Worker
1db2fb26e8 Snap for 10186302 from 951634d720 to udc-qpr1-release
Change-Id: Ieb66a881cc4ae976e5a31ba96bc2519588da8347
2023-05-24 03:02:58 +00:00
Android Build Coastguard Worker
f066c154ff Snap for 10179466 from 751150f9bc to udc-qpr1-release
Change-Id: Ic7884826f3ebc0bf49a96a57af61efed8414f87a
2023-05-23 01:07:43 +00:00
Android Build Coastguard Worker
8c6ea1b90d Snap for 10171934 from 9897966578 to udc-qpr1-release
Change-Id: If1bfb885f867e3bd3c5fe273bd082611f1c5acc8
2023-05-20 04:38:20 +00:00
Android Build Coastguard Worker
64a3671bb0 Snap for 10157673 from bd597dc5a2 to udc-qpr1-release
Change-Id: I66f1374af26c6bf5dd55d7714e5e06fbce43d021
2023-05-18 03:03:20 +00:00
Android Build Coastguard Worker
f69d60b879 Snap for 10146593 from f2adc20b6d to udc-qpr1-release
Change-Id: I30d448c3d4ea9d3ad2999f21372e6aa3c459c5e0
2023-05-17 01:08:21 +00:00
Android Build Coastguard Worker
3242ad02de Snap for 10120310 from f4258fafc6 to udc-qpr1-release
Change-Id: I06d7a21260c8c1f64a2830a4b3fa51811e3b67bf
2023-05-12 03:03:32 +00:00
Android Build Coastguard Worker
f459e0c544 Snap for 10109327 from 9d30bd990e to udc-qpr1-release
Change-Id: I4268f8f50712ab13eeef2574c9bb9bcc15595724
2023-05-11 03:03:25 +00:00
Android Build Coastguard Worker
1cd4216143 Snap for 10094917 from 24dcac2665 to udc-qpr1-release
Change-Id: Ie2b892afa0644ebe11069c3bec750958583192c2
2023-05-10 03:04:02 +00:00
Android Build Coastguard Worker
e925ee7fd6 Snap for 10088597 from 6b0dd58200 to udc-qpr1-release
Change-Id: I83b53eb44a5289eed7d32bdaf328a483d532d222
2023-05-09 01:17:44 +00:00
Android Build Coastguard Worker
39eb0901f7 Snap for 10080193 from ad2c33b44a to udc-qpr1-release
Change-Id: I30328b99e397727b55c22e0b3283c95033a810ce
2023-05-06 03:03:44 +00:00
Android Build Coastguard Worker
5772fd0f40 Snap for 10063449 from ac8c60c304 to udc-qpr1-release
Change-Id: If90ee866e89f5204f2b733d9727631126de3ef87
2023-05-04 01:05:24 +00:00
Android Build Coastguard Worker
ea57b1ab64 Snap for 10054401 from a7d4318ac1 to udc-qpr1-release
Change-Id: I44d523805171fafd0dd3bb79f2b717da59cc4518
2023-05-03 01:08:10 +00:00
Android Build Coastguard Worker
531ef9b71d Snap for 10037196 from fc8dcdd504 to udc-qpr1-release
Change-Id: I6a9c84ed458a0c5b0d4afbe483a05238cb64a9b3
2023-04-29 03:03:22 +00:00
Android Build Coastguard Worker
072c6a9d90 Snap for 10017868 from 74494540d6 to udc-qpr1-release
Change-Id: I91b9681c25ac4a3bfe72ed0ebb8cf5aae3a0fa77
2023-04-28 01:08:01 +00:00
Joner Lin
0953a21581 Merge "allow bthal to access vendor bluetooth folder" into udc-d1-dev am: edd47032af
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/22271813

Change-Id: Ic19dd6a35e1288fc60400fc98825e3871129530d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-04-13 14:28:28 +00:00
152 changed files with 2560 additions and 1761 deletions

30
Android.mk Normal file
View File

@@ -0,0 +1,30 @@
#
# Copyright (C) 2011 The Android Open-Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# WARNING: Everything listed here will be built on ALL platforms,
# including x86, the universal, and the SDK. Modules must be uniquely
# named (liblights.panda), and must build everywhere, or limit themselves
# to only building on ARM if they include assembly. Individual makefiles
# are responsible for having their own logic, for fine-grained control.
LOCAL_PATH := $(call my-dir)
# if some modules are built directly from this directory (not subdirectories),
# their rules should be written here.
ifeq ($(USES_DEVICE_GOOGLE_ZUMA),true)
include $(call first-makefiles-under,$(LOCAL_PATH))
endif

View File

@@ -1,48 +0,0 @@
#
# Copyright (C) 2024 The Android Open-Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
ifeq ($(TARGET_BOOTS_16K),true)
# Configures the 16kb kernel directory.
TARGET_KERNEL_DIR := $(TARGET_KERNEL_DIR)/16kb
else ifeq ($(PRODUCT_16K_DEVELOPER_OPTION),true)
# Configures the 16kb kernel and modules for OTA updates.
TARGET_KERNEL_DIR_16K := $(TARGET_KERNEL_DIR)/16kb
BOARD_KERNEL_PATH_16K := $(TARGET_KERNEL_DIR_16K)/Image.lz4
BOARD_KERNEL_MODULES_16K += $(file < $(TARGET_KERNEL_DIR_16K)/vendor_kernel_boot.modules.load)
BOARD_KERNEL_MODULES_16K += $(file < $(TARGET_KERNEL_DIR_16K)/system_dlkm.modules.load)
BOARD_KERNEL_MODULES_16K += $(file < $(TARGET_KERNEL_DIR_16K)/vendor_dlkm.modules.load)
BOARD_KERNEL_MODULES_16K := $(foreach module,$(BOARD_KERNEL_MODULES_16K),$(TARGET_KERNEL_DIR_16K)/$(notdir $(module)))
BOARD_PREBUILT_DTBOIMAGE_16KB := $(TARGET_KERNEL_DIR_16K)/dtbo.img
# The 16kb mode does not use these modules.
BOARD_KERNEL_MODULES_16K := $(filter-out %/aoc_unit_test_dev.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/bcm_dbg.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/gnssif.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/gnss_spi.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/mali_kutf.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/mali_kutf_clk_rate_trace_test_portal.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/rt6160_regulator.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/sec_touch.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/sscoredump_sample_test.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/sscoredump_test.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_16K := $(filter-out %/zram.ko,$(BOARD_KERNEL_MODULES_16K))
BOARD_KERNEL_MODULES_LOAD_16K := $(foreach module,$(BOARD_KERNEL_MODULES_16K),$(notdir $(module)))
BOARD_16K_OTA_USE_INCREMENTAL := true
BOARD_16K_OTA_MOVE_VENDOR := true
endif

View File

@@ -16,10 +16,8 @@
include build/make/target/board/BoardConfigMainlineCommon.mk
include build/make/target/board/BoardConfigPixelCommon.mk
# Include settings for 16k developer option, if enabled
ifneq ($(wildcard $(TARGET_KERNEL_DIR)/16kb/),)
include device/google/zuma/BoardConfig-16k-common.mk
endif
# Should be uncommented after fixing vndk-sp violation is fixed.
PRODUCT_FULL_TREBLE_OVERRIDE := true
# HACK : To fix up after bring up multimedia devices.
TARGET_SOC := zuma
@@ -32,19 +30,18 @@ TARGET_ARCH := arm64
TARGET_ARCH_VARIANT := armv8-2a
TARGET_CPU_ABI := arm64-v8a
TARGET_CPU_VARIANT := cortex-a55
TARGET_CPU_VARIANT_RUNTIME := cortex-a55
BOARD_KERNEL_CMDLINE += earlycon=exynos4210,0x10870000 console=ttySAC0,115200 androidboot.console=ttySAC0 printk.devkmsg=on
BOARD_KERNEL_CMDLINE += cma_sysfs.experimental=Y
BOARD_KERNEL_CMDLINE += rcupdate.rcu_expedited=1 rcu_nocbs=all rcutree.enable_rcu_lazy
BOARD_KERNEL_CMDLINE += cgroup_disable=memory
BOARD_KERNEL_CMDLINE += rcupdate.rcu_expedited=1 rcu_nocbs=all
BOARD_KERNEL_CMDLINE += swiotlb=1024
BOARD_KERNEL_CMDLINE += cgroup.memory=nokmem
BOARD_KERNEL_CMDLINE += sysctl.kernel.sched_pelt_multiplier=4
# Normal (non-_fullmte) builds should disable kasan
ifeq (,$(filter %_fullmte,$(TARGET_PRODUCT)))
BOARD_KERNEL_CMDLINE += kasan=off
endif
BOARD_BOOTCONFIG += androidboot.boot_devices=13200000.ufs
TARGET_NO_BOOTLOADER := true
@@ -68,7 +65,7 @@ TARGET_RECOVERY_FSTAB_GENRULE := gen_fstab.zuma-sw-encrypt
TARGET_RECOVERY_PIXEL_FORMAT := ABGR_8888
TARGET_RECOVERY_UI_MARGIN_HEIGHT := 165
TARGET_RECOVERY_UI_LIB := \
//hardware/google/pixel/recovery:librecovery_ui_pixel \
librecovery_ui_pixel \
libfstab
AB_OTA_UPDATER := true
@@ -208,17 +205,6 @@ BOARD_USE_BLOB_ALLOCATOR := false
BOARD_SUPPORT_MFC_ENC_BT2020 := true
BOARD_SUPPORT_FLEXIBLE_P010 := true
BOARD_SUPPORT_MFC_VERSION := 1660
$(call soong_config_set,video_codec,target_soc_name,$(TARGET_SOC_NAME))
$(call soong_config_set_bool,video_codec,board_use_codec2_hidl_1_2,$(BOARD_USE_CODEC2_HIDL_1_2))
$(call soong_config_set_bool,video_codec,board_use_csc_filter,$(BOARD_USE_CSC_FILTER))
$(call soong_config_set_bool,video_codec,board_use_dec_sw_csc,$(BOARD_USE_DEC_SW_CSC))
$(call soong_config_set_bool,video_codec,board_use_enc_sw_csc,$(BOARD_USE_ENC_SW_CSC))
$(call soong_config_set_bool,video_codec,board_support_mfc_enc_rgb,$(BOARD_SUPPORT_MFC_ENC_RGB))
$(call soong_config_set_bool,video_codec,board_use_blob_allocator,$(BOARD_USE_BLOB_ALLOCATOR))
$(call soong_config_set_bool,video_codec,board_support_mfc_enc_bt2020,$(BOARD_SUPPORT_MFC_ENC_BT2020))
$(call soong_config_set_bool,video_codec,board_support_flexible_p010,$(BOARD_SUPPORT_FLEXIBLE_P010))
$(call soong_config_set_bool,video_codec,board_use_codec2_aidl,$(if $(BOARD_USE_CODEC2_AIDL),true,false))
$(call soong_config_set,video_codec,board_support_mfc_version,$(BOARD_SUPPORT_MFC_VERSION))
########################
BOARD_SUPER_PARTITION_SIZE := 8531214336
@@ -251,6 +237,12 @@ BOARD_USES_GENERIC_AUDIO := true
$(call soong_config_set,aoc_audio_func,ext_hidl,true)
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
$(call soong_config_set,aoc_audio_func,dump_usecase_data,true)
$(call soong_config_set,aoc_audio_func,hal_socket_control,true)
$(call soong_config_set,aoc_audio_func,record_tuning_keys,true)
endif
ifneq (,$(filter aosp_%,$(TARGET_PRODUCT)))
$(call soong_config_set,aoc_audio_func,aosp_build,true)
endif
@@ -285,8 +277,6 @@ BOARD_USES_EXYNOS_AFBC_FEATURE := true
BOARD_LIBACRYL_DEFAULT_COMPOSITOR := fimg2d_zuma
BOARD_LIBACRYL_G2D_HDR_PLUGIN := libacryl_hdr_plugin
$(call soong_config_set,acryl,libacryl_g2d_hdr_plugin,//hardware/google/graphics/zuma/libacryl_plugins:libacryl_hdr_plugin)
$(call soong_config_set,acryl,libacryl_c_include,hardware/google/graphics/$(TARGET_BOARD_PLATFORM)/libcap)
# HWCServices
BOARD_USES_HWC_SERVICES := true
@@ -400,19 +390,11 @@ KERNEL_MODULES := $(wildcard $(KERNEL_MODULE_DIR)/*.ko)
BOARD_SYSTEM_KERNEL_MODULES_BLOCKLIST_FILE := $(KERNEL_MODULE_DIR)/system_dlkm.modules.blocklist
BOARD_VENDOR_KERNEL_MODULES_BLOCKLIST_FILE := $(KERNEL_MODULE_DIR)/vendor_dlkm.modules.blocklist
# Prebuilt kernel modules that are *not* listed in vendor_kernel_boot.modules.load
BOARD_PREBUILT_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES = fips140.ko
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_EXTRA = $(foreach k,$(BOARD_PREBUILT_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES),$(if $(wildcard $(KERNEL_MODULE_DIR)/$(k)), $(k)))
# Kernel modules that are listed in vendor_kernel_boot.modules.load
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_FILE := $(strip $(shell cat $(KERNEL_MODULE_DIR)/vendor_kernel_boot.modules.load))
ifndef BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_FILE
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD := $(strip $(shell cat $(KERNEL_MODULE_DIR)/vendor_kernel_boot.modules.load))
ifndef BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD
$(error vendor_kernel_boot.modules.load not found or empty)
endif
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD := $(BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_EXTRA)
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD += $(BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_FILE)
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES := $(addprefix $(KERNEL_MODULE_DIR)/, $(BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_EXTRA))
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES += $(addprefix $(KERNEL_MODULE_DIR)/, $(notdir $(BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD_FILE)))
BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES := $(addprefix $(KERNEL_MODULE_DIR)/, $(notdir $(BOARD_VENDOR_KERNEL_RAMDISK_KERNEL_MODULES_LOAD)))
BOARD_VENDOR_KERNEL_MODULES_LOAD := $(strip $(shell cat $(KERNEL_MODULE_DIR)/vendor_dlkm.modules.load))
ifndef BOARD_VENDOR_KERNEL_MODULES_LOAD
@@ -440,5 +422,8 @@ BOARD_KERNEL_CMDLINE += log_buf_len=1024K
# Protected VM firmware
BOARD_PVMFWIMAGE_PARTITION_SIZE := 0x00100000
# pick up library for cleaning digital car keys on factory reset
-include vendor/google_devices/gs-common/proprietary/BoardConfigVendor.mk
include device/google/zuma/BoardConfigLineage.mk
include device/google/zuma/BoardConfigEvolution.mk

View File

@@ -1,10 +1,9 @@
#
# Copyright (C) 2024 The Evolution X Project
#
# SPDX-License-Identifier: Apache-2.0
#
BUILD_BROKEN_DUP_RULES := true
DISABLE_ARTIFACT_PATH_REQUIREMENTS := true
SPOOF_FIRST_API_LEVEL_32 := true

View File

@@ -1,10 +1,15 @@
#
# SPDX-FileCopyrightText: 2021-2024 The LineageOS Project
# SPDX-FileCopyrightText: 2021-2024 The Calyx Institute
# Copyright (C) 2023 The LineageOS Project
#
# SPDX-License-Identifier: Apache-2.0
#
# Lineage Health
TARGET_HEALTH_CHARGING_CONTROL_SUPPORTS_DEADLINE := true
TARGET_HEALTH_CHARGING_CONTROL_SUPPORTS_TOGGLE := false
# Manifests
DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE += vendor/lineage/config/device_framework_matrix.xml
DEVICE_MANIFEST_FILE += \
device/google/zuma/android.hardware.security.rkp-service.citadel.xml \
device/google/zuma/manifest_radio_ds.xml

85
CleanSpec.mk Normal file
View File

@@ -0,0 +1,85 @@
# Copyright (C) 2012 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# If you don't need to do a full clean build but would like to touch
# a file or delete some intermediate files, add a clean step to the end
# of the list. These steps will only be run once, if they haven't been
# run before.
#
# E.g.:
# $(call add-clean-step, touch -c external/sqlite/sqlite3.h)
# $(call add-clean-step, rm -rf $(PRODUCT_OUT)/obj/STATIC_LIBRARIES/libz_intermediates)
#
# Always use "touch -c" and "rm -f" or "rm -rf" to gracefully deal with
# files that are missing or have been moved.
#
# Use $(PRODUCT_OUT) to get to the "out/target/product/blah/" directory.
# Use $(OUT_DIR) to refer to the "out" directory.
#
# If you need to re-do something that's already mentioned, just copy
# the command and add it to the bottom of the list. E.g., if a change
# that you made last week required touching a file and a change you
# made today requires touching the same file, just copy the old
# touch step and add it to the end of the list.
#
# ************************************************
# NEWER CLEAN STEPS MUST BE AT THE END OF THE LIST
# ************************************************
# For example:
#$(call add-clean-step, rm -rf $(OUT_DIR)/target/common/obj/APPS/AndroidTests_intermediates)
#$(call add-clean-step, rm -rf $(OUT_DIR)/target/common/obj/JAVA_LIBRARIES/core_intermediates)
#$(call add-clean-step, find $(OUT_DIR) -type f -name "IGTalkSession*" -print0 | xargs -0 rm -f)
#$(call add-clean-step, rm -rf $(PRODUCT_OUT)/data/*)
$(call add-clean-step, find $(PRODUCT_OUT) -name "*.apk" | xargs rm)
# ************************************************
# NEWER CLEAN STEPS MUST BE AT THE END OF THE LIST
# ************************************************
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/obj/SHARED_LIBRARIES/libsurfaceflinger_intermediates)
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/obj/SHARED_LIBRARIES/libui_intermediates)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/root/default.prop)
$(call add-clean-step, rm -f $(TARGET_OUT)/build.prop)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/system/etc/mixer_paths_lb.xml)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/system/etc/permissions/android.hardware.camera.xml)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/root/*)
# Power HAL 1.0
$(call add-clean-step, rm -f $(PRODUCT_OUT)/vendor/init/android.hardware.power@1.0-service.rc)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/vendor/bin/hw/android.hardware.power@1.0-service)
# Power HAL HIDL
$(call add-clean-step, rm -f $(PRODUCT_OUT)/vendor/etc/init/android.hardware.power@1.3-service.pixel-libperfmgr.rc)
# Health storage HAL
$(call add-clean-step, find $(PRODUCT_OUT) -type f -name "*android.hardware.health.storage@1.0*" -print0 | xargs -0 rm -f)
# Update to USB HAL 1.3
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/bin/hw/android.hardware.usb@1.2-service.slider)
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/init/android.hardware.usb@1.2-service.slider.rc)
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/vintf/manifest/android.hardware.usb@1.2-service.slider.xml)
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/bin/hw/android.hardware.usb@1.3-service.slider)
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/init/android.hardware.usb@1.3-service.slider.rc)
$(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/vintf/manifest/android.hardware.usb@1.3-service.slider.xml)
# Power Stats HAL 1.0 to AIDL
$(call add-clean-step, rm -f $(PRODUCT_OUT)/vendor/bin/hw/android.hardware.power.stats@1.0-service.zuma)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/vendor/etc/init/android.hardware.power.stats@1.0-service.zuma.rc)
$(call add-clean-step, rm -f $(PRODUCT_OUT)/vendor/etc/vintf/manifest/android.hardware.power.stats@1.0-service.zuma.xml)
# Health HAL to AIDL
$(call add-clean-step, find $(PRODUCT_OUT)/system -type f -name "*charger*" -print0 | xargs -0 rm -f)
$(call add-clean-step, find $(PRODUCT_OUT)/vendor -type f -name "*health@*" -print0 | xargs -0 rm -f)
$(call add-clean-step, find $(PRODUCT_OUT)/recovery/root -type f -name "*charger*" -print0 | xargs -0 rm -f)
$(call add-clean-step, find $(PRODUCT_OUT)/recovery/root -type f -name "*health@*" -print0 | xargs -0 rm -f)

2
OWNERS Normal file
View File

@@ -0,0 +1,2 @@
# per-file for Pixel device makefiles, see go/pixel-device-mk-owner-checklist for details.
per-file *.mk=file:device/google/gs-common:main:/OWNERS

2
PREUPLOAD.cfg Normal file
View File

@@ -0,0 +1,2 @@
[Builtin Hooks]
jsonlint = true

View File

@@ -42,6 +42,7 @@ $(call inherit-product, $(SRC_TARGET_DIR)/product/handheld_vendor.mk)
$(call inherit-product, $(SRC_TARGET_DIR)/product/telephony_vendor.mk)
#$(call inherit-product, device/google/zuma/device.mk)
#$(call inherit-product-if-exists, vendor/google_devices/zuma/proprietary/device-vendor.mk)
# TODO: fix
# PRODUCT_RESTRICT_VENDOR_FILES := all

View File

@@ -14,6 +14,16 @@
* limitations under the License.
*/
// By default this device uses hardware-wrapped keys for storage encryption,
// which is intended to offer increased security over the traditional method
// (software keys). However, hardware-wrapped keys aren't compatible with
// FIPS-140 certification of the encryption hardware, and hence we have to
// disable the use of them in FIPS mode. This requires having two fstab files:
// one for the default mode, and one for FIPS mode selectable via
// androidboot.fstab_suffix on the kernel command line. These fstabs should be
// identical with the exception of the encryption settings, so to keep them in
// sync the rules below generate them from a template file.
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
@@ -23,7 +33,52 @@ package {
default_applicable_licenses: ["device_google_zuma_license"],
}
filegroup {
name: "fstab.zuma.common",
srcs: ["fstab.zuma.common"],
}
genrule {
name: "gen_fstab.zuma-hw-encrypt",
srcs: ["fstab.zuma.in"],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
" -e s/@inlinecrypt@/inlinecrypt/ " +
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-sw-encrypt",
srcs: ["fstab.zuma.in"],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
" -e s/@inlinecrypt@// " +
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-no-encrypt",
srcs: ["fstab.zuma.in"],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@//" +
" -e s/@inlinecrypt@// " +
" -e s/@metadata_encryption@// $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-fips",
srcs: ["fstab.zuma.in"],
out: ["fstab.zuma-fips"],
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
" -e s/@inlinecrypt@/inlinecrypt/ " +
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
}
prebuilt_etc {
name: "fstab.zuma",
src: ":gen_fstab.zuma-hw-encrypt",
vendor: true,
vendor_ramdisk_available: true,
}
prebuilt_etc {
name: "fstab.zuma-fips",
src: ":gen_fstab.zuma-fips",
vendor: true,
vendor_ramdisk_available: true,
}

View File

@@ -1,102 +0,0 @@
/*
* Copyright (C) 2021 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// By default this device uses hardware-wrapped keys for storage encryption,
// which is intended to offer increased security over the traditional method
// (software keys). However, hardware-wrapped keys aren't compatible with
// FIPS-140 certification of the encryption hardware, and hence we have to
// disable the use of them in FIPS mode. This requires having two fstab files:
// one for the default mode, and one for FIPS mode selectable via
// androidboot.fstab_suffix on the kernel command line. These fstabs should be
// identical with the exception of the encryption settings, so to keep them in
// sync the rules below generate them from a template file.
soong_namespace {
imports: [
"device/google/zuma",
],
}
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
// all of the 'license_kinds' from "device_google_zuma_license"
// to get the below license kinds:
// SPDX-license-identifier-Apache-2.0
default_applicable_licenses: ["device_google_zuma_license"],
}
genrule {
name: "gen_fstab.zuma-hw-encrypt",
srcs: [
":fstab.zuma.common",
"fstab.zuma.ext4",
],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
" -e s/@inlinecrypt@/inlinecrypt/ " +
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-sw-encrypt",
srcs: [
":fstab.zuma.common",
"fstab.zuma.ext4",
],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
" -e s/@inlinecrypt@// " +
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-no-encrypt",
srcs: [
":fstab.zuma.common",
"fstab.zuma.ext4",
],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@//" +
" -e s/@inlinecrypt@// " +
" -e s/@metadata_encryption@// $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-fips",
srcs: [
":fstab.zuma.common",
"fstab.zuma.ext4",
],
out: ["fstab.zuma-fips"],
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
" -e s/@inlinecrypt@/inlinecrypt/ " +
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
}
prebuilt_etc {
name: "fstab.zuma",
src: ":gen_fstab.zuma-hw-encrypt",
vendor: true,
vendor_ramdisk_available: true,
}
prebuilt_etc {
name: "fstab.zuma-fips",
src: ":gen_fstab.zuma-fips",
vendor: true,
vendor_ramdisk_available: true,
}

View File

@@ -1,10 +0,0 @@
# Android fstab file.
#
# The filesystem that contains the filesystem checker binary (typically /system) cannot
# specify MF_CHECK, and must come before any filesystems that do specify MF_CHECK
#
#<src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
/dev/block/platform/13200000.ufs/by-name/userdata /data ext4 noatime,nosuid,nodev,@inlinecrypt@ latemount,wait,check,quota,formattable,reservedsize=128M,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption
/dev/block/platform/13200000.ufs/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,compress_extension=apk,compress_extension=so,compress_extension=vdex,compress_extension=odex,@inlinecrypt@,atgc,checkpoint_merge,compress_cache latemount,wait,check,quota,sysfs_path=/dev/sys/block/bootdevice,checkpoint=fs,reservedsize=128M,fscompress,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption,device=zoned:/dev/block/by-name/zoned_device
/dev/block/platform/13200000.ufs/by-name/metadata /metadata ext4 noatime,nosuid,nodev,data=journal,commit=1 wait,check,formattable,first_stage_mount,metadata_csum
/dev/block/platform/13200000.ufs/by-name/metadata /metadata f2fs noatime,nosuid,nodev,sync wait,check,first_stage_mount

View File

@@ -1,102 +0,0 @@
/*
* Copyright (C) 2021 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// By default this device uses hardware-wrapped keys for storage encryption,
// which is intended to offer increased security over the traditional method
// (software keys). However, hardware-wrapped keys aren't compatible with
// FIPS-140 certification of the encryption hardware, and hence we have to
// disable the use of them in FIPS mode. This requires having two fstab files:
// one for the default mode, and one for FIPS mode selectable via
// androidboot.fstab_suffix on the kernel command line. These fstabs should be
// identical with the exception of the encryption settings, so to keep them in
// sync the rules below generate them from a template file.
soong_namespace {
imports: [
"device/google/zuma",
],
}
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
// all of the 'license_kinds' from "device_google_zuma_license"
// to get the below license kinds:
// SPDX-license-identifier-Apache-2.0
default_applicable_licenses: ["device_google_zuma_license"],
}
genrule {
name: "gen_fstab.zuma-hw-encrypt",
srcs: [
":fstab.zuma.common",
"fstab.zuma.f2fs",
],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
" -e s/@inlinecrypt@/inlinecrypt/ " +
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-sw-encrypt",
srcs: [
":fstab.zuma.common",
"fstab.zuma.f2fs",
],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
" -e s/@inlinecrypt@// " +
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-no-encrypt",
srcs: [
":fstab.zuma.common",
"fstab.zuma.f2fs",
],
out: ["fstab.zuma"],
cmd: "sed -e s/@fileencryption@//" +
" -e s/@inlinecrypt@// " +
" -e s/@metadata_encryption@// $(in) > $(out)",
}
genrule {
name: "gen_fstab.zuma-fips",
srcs: [
":fstab.zuma.common",
"fstab.zuma.f2fs",
],
out: ["fstab.zuma-fips"],
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
" -e s/@inlinecrypt@/inlinecrypt/ " +
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
}
prebuilt_etc {
name: "fstab.zuma",
src: ":gen_fstab.zuma-hw-encrypt",
vendor: true,
vendor_ramdisk_available: true,
}
prebuilt_etc {
name: "fstab.zuma-fips",
src: ":gen_fstab.zuma-fips",
vendor: true,
vendor_ramdisk_available: true,
}

View File

@@ -1,10 +0,0 @@
# Android fstab file.
#
# The filesystem that contains the filesystem checker binary (typically /system) cannot
# specify MF_CHECK, and must come before any filesystems that do specify MF_CHECK
#
#<src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
/dev/block/platform/13200000.ufs/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,compress_extension=apk,compress_extension=so,compress_extension=vdex,compress_extension=odex,@inlinecrypt@,atgc,checkpoint_merge,compress_cache latemount,wait,check,quota,formattable,sysfs_path=/dev/sys/block/bootdevice,checkpoint=fs,reservedsize=128M,fscompress,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption,device=zoned:/dev/block/by-name/zoned_device
/dev/block/platform/13200000.ufs/by-name/userdata /data ext4 noatime,nosuid,nodev,@inlinecrypt@ latemount,wait,check,quota,formattable,reservedsize=128M,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption
/dev/block/platform/13200000.ufs/by-name/metadata /metadata f2fs noatime,nosuid,nodev,sync wait,check,formattable,first_stage_mount
/dev/block/platform/13200000.ufs/by-name/metadata /metadata ext4 noatime,nosuid,nodev,data=journal,commit=1 wait,check,formattable,first_stage_mount,metadata_csum

View File

@@ -1,6 +0,0 @@
# Android fstab file.
# <src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
# Create the specific fstab file for efs partitions for flexibility
/dev/block/platform/13200000.ufs/by-name/efs /mnt/vendor/efs f2fs noatime,sync wait,check,formattable
/dev/block/platform/13200000.ufs/by-name/efs_backup /mnt/vendor/efs_backup f2fs noatime,sync wait,check,formattable
/dev/block/platform/13200000.ufs/by-name/modem_userdata /mnt/vendor/modem_userdata f2fs noatime,sync wait,check,formattable

View File

@@ -1,10 +0,0 @@
# Android fstab file.
# <src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
# Create the specific fstab file for efs partitions for flexibility
/data/vendor/copied/efs /mnt/vendor/efs none bind latemount
/data/vendor/copied/efs_backup /mnt/vendor/efs_backup none bind latemount
/data/vendor/copied/modem_userdata /mnt/vendor/modem_userdata none bind latemount
/data/vendor/copied/persist /mnt/vendor/persist none bind latemount

View File

@@ -14,7 +14,12 @@ vendor /vendor
vendor_dlkm /vendor_dlkm ext4 noatime,ro wait,slotselect,avb=vbmeta,avb_keys=no_such_key,logical,first_stage_mount
/dev/block/platform/13200000.ufs/by-name/boot /boot emmc defaults slotselect,avb=boot,first_stage_mount
/dev/block/platform/13200000.ufs/by-name/init_boot /init_boot emmc defaults slotselect,avb=init_boot,first_stage_mount
/dev/block/platform/13200000.ufs/by-name/efs /mnt/vendor/efs f2fs noatime,sync wait,check,formattable
/dev/block/platform/13200000.ufs/by-name/efs_backup /mnt/vendor/efs_backup f2fs noatime,sync wait,check,formattable
/dev/block/platform/13200000.ufs/by-name/modem_userdata /mnt/vendor/modem_userdata f2fs noatime,sync wait,check,formattable
/dev/block/platform/13200000.ufs/by-name/misc /misc emmc defaults wait
/dev/block/platform/13200000.ufs/by-name/metadata /metadata f2fs noatime,nosuid,nodev,sync wait,check,formattable,first_stage_mount
#/dev/block/platform/13200000.ufs/by-name/pvmfw /pvmfw emmc defaults wait,slotselect,avb=pvmfw,first_stage_mount
/dev/block/platform/13200000.ufs/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,compress_extension=apk,compress_extension=apex,compress_extension=so,compress_extension=vdex,compress_extension=odex,@inlinecrypt@,atgc,checkpoint_merge,compress_cache latemount,wait,check,quota,formattable,sysfs_path=/dev/sys/block/bootdevice,checkpoint=fs,reservedsize=128M,fscompress,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption,zoned_device
/dev/block/platform/13200000.ufs/by-name/vbmeta /vbmeta emmc defaults slotselect,first_stage_mount
/devices/platform/11210000.usb* auto vfat defaults voldmanaged=usb:auto

52
conf/init.debug.rc Normal file
View File

@@ -0,0 +1,52 @@
# SJTAG
on init
chown system system /sys/devices/platform/sjtag_ap/interface/access_lvl
chown system system /sys/devices/platform/sjtag_ap/interface/auth
chown system system /sys/devices/platform/sjtag_ap/interface/begin
chown system system /sys/devices/platform/sjtag_ap/interface/dbg_domain
chown system system /sys/devices/platform/sjtag_ap/interface/dbg_itvl
chown system system /sys/devices/platform/sjtag_ap/interface/end
chown system system /sys/devices/platform/sjtag_ap/interface/pubkey
chown system system /sys/devices/platform/sjtag_gsa/interface/access_lvl
chown system system /sys/devices/platform/sjtag_gsa/interface/auth
chown system system /sys/devices/platform/sjtag_gsa/interface/begin
chown system system /sys/devices/platform/sjtag_gsa/interface/dbg_domain
chown system system /sys/devices/platform/sjtag_gsa/interface/dbg_itvl
chown system system /sys/devices/platform/sjtag_gsa/interface/end
chown system system /sys/devices/platform/sjtag_gsa/interface/pubkey
on property:vendor.debug.ramdump.force_crash=true
write /sys/kernel/pixel_debug/trigger "null"
on property:power.battery_input.suspended=true
write /sys/kernel/debug/google_charger/input_suspend 1
on property:power.battery_input.suspended=false
write /sys/kernel/debug/google_charger/input_suspend 0
# Bluetooth
on post-fs-data
chown bluetooth system /dev/logbuffer_btlpm
chown bluetooth system /dev/logbuffer_tty18
# pKVM performance is different on A0 and B0 chips.
# Add extra tag to metrics collected on A0 to separate the results.
on property:ro.revision=PROTO1.0
setprop debug.hypervisor.metrics_tag "hwrev_a0"
on property:ro.revision=PROTO1.1
setprop debug.hypervisor.metrics_tag "hwrev_a0"
on property:ro.revision=EVT1.0
setprop debug.hypervisor.metrics_tag "hwrev_a0"
# A0 chips require pKVM for a hardware issue workaround. Set pKVM to 'enabled'
# in /misc partition on first boot to signal to tests that this device should
# not be booted with pKVM disabled.
service vendor.force_pkvm /vendor/bin/misc_writer --set-enable-pkvm
disabled
oneshot
on property:persist.sys.device_provisioned=1 && property:ro.revision=PROTO1.0
start vendor.force_pkvm
on property:persist.sys.device_provisioned=1 && property:ro.revision=PROTO1.1
start vendor.force_pkvm
on property:persist.sys.device_provisioned=1 && property:ro.revision=EVT1.0
start vendor.force_pkvm

View File

@@ -1,24 +0,0 @@
service copy_efs_files_to_data /vendor/bin/copy_efs_files_to_data
user root
group root radio system audio media graphics camera
stdio_to_kmsg
oneshot
disabled
on post-fs-data && property:ro.boot.hardware.cpu.pagesize=16384
mkdir /data/vendor/copied 0775 radio system
restorecon_recursive /data/vendor/copied
exec_start copy_efs_files_to_data
mount_all /vendor/etc/fstab.efs.from_data
restorecon_recursive /mnt/vendor/persist
restorecon_recursive /data/vendor/ss
setprop ro.vendor.persist.status mounted
on early-init && property:ro.boot.hardware.cpu.pagesize=4096
mount_all /vendor/etc/fstab.persist --early
setprop ro.vendor.persist.status mounted
on late-fs && property:ro.boot.hardware.cpu.pagesize=4096
mount_all /vendor/etc/fstab.efs --early

View File

@@ -1,6 +0,0 @@
on early-init
mount_all /vendor/etc/fstab.persist --early
setprop ro.vendor.persist.status mounted
on late-fs
mount_all /vendor/etc/fstab.efs --early

View File

@@ -1,47 +0,0 @@
on property:ro.vendor.persist.status=mounted
# for modem related functions
restorecon_recursive /mnt/vendor/efs
chown radio system /mnt/vendor/efs
restorecon_recursive /mnt/vendor/efs_backup
chown radio system /mnt/vendor/efs_backup
restorecon_recursive /mnt/vendor/modem_userdata
chown radio system /mnt/vendor/modem_userdata
# for battery defender
mkdir /mnt/vendor/persist/battery 0700 system system
# Factory calibration files
chmod 0771 /mnt/vendor/persist/camera
chmod 0771 /mnt/vendor/persist/camera/OTP_calibration
chmod 0771 /mnt/vendor/persist/camera/pdaf_calibration_data
mkdir /mnt/vendor/persist/camera/rear 0771 system camera
chmod 0771 /mnt/vendor/persist/camera/rear
restorecon_recursive /mnt/vendor/persist
restorecon_recursive /mnt/vendor/persist/aoc
restorecon_recursive /mnt/vendor/persist/audio
restorecon_recursive /mnt/vendor/persist/sensors
restorecon_recursive /mnt/vendor/persist/battery
restorecon_recursive /mnt/vendor/persist/camera
restorecon_recursive /mnt/vendor/persist/modem
# Set up display-related directories and permissions
# Add restorecon_recursive command to make sure the restorecon label is persist_display_file.
restorecon_recursive /mnt/vendor/persist/display
mkdir /mnt/vendor/persist/data/sfs 0700 system system
mkdir /mnt/vendor/persist/data/tz 0700 system system
mkdir /mnt/vendor/persist/touch 0770 system system
on property:ro.fstype.data=* && property:ro.vendor.persist.status=mounted
# Proxy for Secure Storage
mkdir /data/vendor/rebootescrow 0770 hsm hsm
mkdir /data/vendor/ss 0770 root system
mkdir /mnt/vendor/persist/ss 0770 root system
restorecon_recursive /mnt/vendor/persist/ss
symlink /mnt/vendor/persist/ss /data/vendor/ss/persist
chown root system /data/vendor/ss/persist
chmod 0770 /data/vendor/ss/persist
symlink /dev/block/platform/13200000\.ufs/by-name/trusty_persist /data/vendor/ss/persist/0
chown system system /data/vendor/ss/persist/0
chown system system /data/vendor/ss/persist/nsp
restart storageproxyd

View File

@@ -1,9 +1,9 @@
import /vendor/etc/init/hw/init.zuma.storage.rc
import /vendor/etc/init/hw/init.zuma.usb.rc
import android.hardware.drm@1.2-service.widevine.rc
import init.exynos.sensorhub.rc
on early-init
mount_all /vendor/etc/fstab.persist --early
write /proc/sys/kernel/sched_pelt_multiplier 1
write /sys/kernel/mm/lru_gen/enabled n
@@ -16,6 +16,38 @@ on init
# Disable util-awareness for mids and bigs
write /proc/vendor_sched/teo_util_threshold "2 1024 1024"
# Boot time fs tuning
write /sys/block/sda/queue/scheduler bfq
write /sys/block/sda/queue/iosched/slice_idle 0
chown system system /proc/vendor_sched/groups/bg/set_task_group
chown system system /proc/vendor_sched/groups/cam/set_task_group
chown system system /proc/vendor_sched/groups/fg/set_task_group
chown system system /proc/vendor_sched/groups/nnapi/set_task_group
chown system system /proc/vendor_sched/groups/sys/set_task_group
chown system system /proc/vendor_sched/groups/sys_bg/set_task_group
chown system system /proc/vendor_sched/groups/ta/set_task_group
chown system system /proc/vendor_sched/groups/rt/set_task_group
chown system system /proc/vendor_sched/groups/sf/set_task_group
chown system system /proc/vendor_sched/groups/dex2oat/set_task_group
chown system system /proc/vendor_sched/groups/cam_power/set_task_group
chown system system /proc/vendor_sched/groups/ota/set_task_group
chown system system /proc/vendor_sched/groups/bg/set_proc_group
chown system system /proc/vendor_sched/groups/cam/set_proc_group
chown system system /proc/vendor_sched/groups/fg/set_proc_group
chown system system /proc/vendor_sched/groups/nnapi/set_proc_group
chown system system /proc/vendor_sched/groups/sys/set_proc_group
chown system system /proc/vendor_sched/groups/sys_bg/set_proc_group
chown system system /proc/vendor_sched/groups/ta/set_proc_group
chown system system /proc/vendor_sched/groups/rt/set_proc_group
chown system system /proc/vendor_sched/groups/sf/set_proc_group
chown system system /proc/vendor_sched/groups/dex2oat/set_proc_group
chown system system /proc/vendor_sched/groups/cam_power/set_proc_group
chown system system /proc/vendor_sched/groups/ota/set_proc_group
chown system system /proc/vendor_sched/prefer_idle_set
chown system system /proc/vendor_sched/prefer_idle_clear
chown system system /proc/vendor_sched/pmu_poll_enable
chown system system /proc/vendor_sched/pmu_poll_time
chown system system /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/lcpi_threshold
chown system system /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/spc_threshold
chown system system /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/limit_frequency
@@ -39,11 +71,44 @@ on init
chown system system /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu7_memlat@17000010/memlat_cpuidle_state_aware
chown system system /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu8_memlat@17000010/memlat_cpuidle_state_aware
chmod 0220 /proc/vendor_sched/groups/bg/set_task_group
chmod 0220 /proc/vendor_sched/groups/cam/set_task_group
chmod 0220 /proc/vendor_sched/groups/fg/set_task_group
chmod 0220 /proc/vendor_sched/groups/nnapi/set_task_group
chmod 0220 /proc/vendor_sched/groups/sys/set_task_group
chmod 0220 /proc/vendor_sched/groups/sys_bg/set_task_group
chmod 0220 /proc/vendor_sched/groups/ta/set_task_group
chmod 0220 /proc/vendor_sched/groups/rt/set_task_group
chmod 0220 /proc/vendor_sched/groups/sf/set_task_group
chmod 0220 /proc/vendor_sched/groups/dex2oat/set_task_group
chmod 0220 /proc/vendor_sched/groups/cam_power/set_task_group
chmod 0220 /proc/vendor_sched/groups/ota/set_task_group
chmod 0220 /proc/vendor_sched/groups/bg/set_proc_group
chmod 0220 /proc/vendor_sched/groups/cam/set_proc_group
chmod 0220 /proc/vendor_sched/groups/fg/set_proc_group
chmod 0220 /proc/vendor_sched/groups/nnapi/set_proc_group
chmod 0220 /proc/vendor_sched/groups/sys/set_proc_group
chmod 0220 /proc/vendor_sched/groups/sys_bg/set_proc_group
chmod 0220 /proc/vendor_sched/groups/ta/set_proc_group
chmod 0220 /proc/vendor_sched/groups/rt/set_proc_group
chmod 0220 /proc/vendor_sched/groups/sf/set_proc_group
chmod 0220 /proc/vendor_sched/groups/dex2oat/set_proc_group
chmod 0220 /proc/vendor_sched/groups/cam_power/set_proc_group
chmod 0220 /proc/vendor_sched/groups/ota/set_proc_group
chmod 0220 /proc/vendor_sched/prefer_idle_set
chmod 0220 /proc/vendor_sched/prefer_idle_clear
chmod 0660 /proc/vendor_sched/pmu_poll_enable
chmod 0220 /proc/vendor_sched/pmu_poll_time
start vendor.keymaster-4-0
# ZRAM setup
write /sys/block/zram0/comp_algorithm lz77eh
write /proc/sys/vm/page-cluster 0
# adjust PCP high level
write /proc/sys/vm/percpu_pagelist_high_fraction 430
# Some user code relies on ro.boot.hardware.revision
setprop ro.boot.hardware.revision ${ro.revision}
@@ -78,6 +143,16 @@ on init
write /sys/class/net/rmnet6/queues/rx-0/rps_cpus fe
write /sys/class/net/rmnet7/queues/rx-0/rps_cpus fe
# Create UDS structure for base VR services.
mkdir /dev/socket/pdx 0775 system system
mkdir /dev/socket/pdx/system 0775 system system
mkdir /dev/socket/pdx/system/buffer_hub 0775 system system
mkdir /dev/socket/pdx/system/performance 0775 system system
mkdir /dev/socket/pdx/system/vr 0775 system system
mkdir /dev/socket/pdx/system/vr/display 0775 system system
mkdir /dev/socket/pdx/system/vr/pose 0775 system system
mkdir /dev/socket/pdx/system/vr/sensors 0775 system system
# Boot time 183626384
write /proc/vendor_sched/groups/ta/uclamp_min 221
write /proc/vendor_sched/groups/ta/prefer_idle 1
@@ -86,6 +161,18 @@ on init
write /proc/vendor_sched/groups/sys/uclamp_min 221
write /proc/vendor_sched/groups/sys/prefer_idle 1
# governor setting
write /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor sched_pixel
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/up_rate_limit_us 500
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/down_rate_limit_us 5000
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/down_rate_limit_scale_pow 2
write /sys/devices/system/cpu/cpu4/cpufreq/scaling_governor sched_pixel
write /sys/devices/system/cpu/cpu4/cpufreq/sched_pixel/up_rate_limit_us 500
write /sys/devices/system/cpu/cpu4/cpufreq/sched_pixel/down_rate_limit_us 20000
write /sys/devices/system/cpu/cpu8/cpufreq/scaling_governor sched_pixel
write /sys/devices/system/cpu/cpu8/cpufreq/sched_pixel/up_rate_limit_us 500
write /sys/devices/system/cpu/cpu8/cpufreq/sched_pixel/down_rate_limit_us 20000
# memlat cpuidle awareness setting
write /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu0_memlat@17000010/memlat_cpuidle_state_aware 2
@@ -98,6 +185,15 @@ on init
write /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu7_memlat@17000010/memlat_cpuidle_state_aware 2
write /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu8_memlat@17000010/memlat_cpuidle_state_aware 2
# RT uclamp setting
write /proc/sys/kernel/sched_util_clamp_min_rt_default 0
# change permissions and default values for camera-daemon cpu controller
chown system system /dev/cpuctl/camera-daemon/cpu.uclamp.min
chown system system /dev/cpuctl/camera-daemon/cpu.uclamp.max
chown root root /dev/cpuctl/camera-daemon/cpu.uclamp.latency_sensitive
chown system system /dev/cpuctl/camera-daemon/cgroup.procs
mkdir /dev/cpuset/camera-daemon-high-group
write /dev/cpuset/camera-daemon-high-group/cpus 0-8
write /dev/cpuset/camera-daemon-high-group/mems 0
@@ -116,6 +212,11 @@ on init
chown system system /dev/cpuset/camera-daemon-mid-high-group/tasks
chmod 0664 /dev/cpuset/camera-daemon-mid-high-group/tasks
write /proc/vendor_sched/groups/cam/prefer_idle 1
write /proc/vendor_sched/groups/cam/uclamp_min 1
chown system system /dev/cpuset/cgroup.procs
# nanohub sensor
chmod 0664 /dev/nanohub
chmod 0664 /dev/nanohub_comms
@@ -161,7 +262,6 @@ on init
chown system system /sys/class/power_supply/wireless/device/version
chown system system /sys/class/power_supply/wireless/device/features
chown system system /sys/class/power_supply/wireless/device/authtype
chown system system /sys/class/power_supply/wireless/device/authstart
# Adaptive charge
chown system system /sys/class/power_supply/battery/charge_deadline
@@ -202,6 +302,10 @@ on init
# Power Stats HAL
chown system system /dev/bbd_pwrstat
# Add a boost for NNAPI HAL
write /proc/vendor_sched/groups/nnapi/prefer_idle 0
write /proc/vendor_sched/groups/nnapi/uclamp_min 512
# Add memlat governor settings
write /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu0_memlat@17000010/polling_interval 10
write /sys/class/devfreq/gs_memlat_devfreq:devfreq_mif_cpu1_memlat@17000010/polling_interval 10
@@ -261,15 +365,6 @@ on init
chown root system /sys/devices/platform/16490000.gsa-ns/log_main
chown root system /sys/devices/platform/16490000.gsa-ns/log_intermediate
# Enable CPU Idle histograms
write /sys/kernel/metrics/cpuidle_histogram/enable 1
on init && property:ro.boot.hardware.cpu.pagesize=4096
write /sys/block/zram0/comp_algorithm lz77eh
on init && property:ro.boot.hardware.cpu.pagesize=16384
write /sys/block/zram0/comp_algorithm lzo-rle
on post-fs
# Ensure device is ready and start storageproxyd
wait /dev/sg1
@@ -283,11 +378,6 @@ on late-fs
# Mount RW partitions which need run fsck
mount_all --late
on late-init
write /sys/devices/system/cpu/cpu0/cpufreq/sched_pixel/down_rate_limit_us 5000
write /sys/devices/system/cpu/cpu4/cpufreq/sched_pixel/down_rate_limit_us 20000
write /sys/devices/system/cpu/cpu8/cpufreq/sched_pixel/down_rate_limit_us 20000
on post-fs-data
# Modem temperature driver
chown radio system /sys/devices/platform/cp-tm1/cp_temp
@@ -309,7 +399,7 @@ on post-fs-data
mkdir /data/vendor/radio/logs/always-on 777 system radio
# Modem extended log folder
mkdir /data/vendor/radio/extended_logs 0771 radio system
mkdir /data/vendor/radio/extended_logs 0770 radio system
# Log Mask Library Mask storage paths
mkdir /data/vendor/radio/log_masks 777 system system
@@ -353,8 +443,15 @@ on post-fs-data
chown system system /dev/ispolin_ranging
chmod 0660 /dev/ispolin_ranging
# Factory calibration files
chmod 0771 /mnt/vendor/persist/camera
chmod 0771 /mnt/vendor/persist/camera/OTP_calibration
chmod 0771 /mnt/vendor/persist/camera/pdaf_calibration_data
mkdir /mnt/vendor/persist/camera/rear 0771 system camera
chmod 0771 /mnt/vendor/persist/camera/rear
# Audio dump and debug
mkdir /data/vendor/audio 0770 system audio
mkdir /data/vendor/audio 0770 audio audio
# Create the directories for Darwinn HAL.
mkdir /data/vendor/hal_neuralnetworks_darwinn 0770 system system
@@ -446,9 +543,9 @@ on early-boot
chown system system /dev/logbuffer_usbpd
chown system system /dev/logbuffer_wireless
chown system system /dev/logbuffer_pca9468
chown system system /dev/logbuffer_dc_mains
chown system system /dev/logbuffer_cpm
chown system system /dev/logbuffer_wc68
chown system system /dev/logbuffer_ln8411
chown system system /dev/logbuffer_pcie0
chown system system /dev/logbuffer_pcie1
chown system system /dev/logbuffer_bd
@@ -514,11 +611,34 @@ on property:persist.vendor.radio.no_modem_board=1
on fs
mount_all --early
restorecon_recursive /mnt/vendor/efs
chown radio system /mnt/vendor/efs
restorecon_recursive /mnt/vendor/efs_backup
chown radio system /mnt/vendor/efs_backup
restorecon_recursive /mnt/vendor/modem_userdata
chown radio system /mnt/vendor/modem_userdata
# Mount modem partition
mount_all /vendor/etc/fstab.modem --early
restorecon_recursive /mnt/vendor/modem_img
# for battery defender
mkdir /mnt/vendor/persist/battery 0700 system system
restorecon_recursive /mnt/vendor/persist
restorecon_recursive /mnt/vendor/persist/aoc
restorecon_recursive /mnt/vendor/persist/audio
restorecon_recursive /mnt/vendor/persist/sensors
restorecon_recursive /mnt/vendor/persist/battery
restorecon_recursive /mnt/vendor/persist/camera
restorecon_recursive /mnt/vendor/persist/modem
# Set up display-related directories and permissions
# Add restorecon_recursive command to make sure the restorecon label is persist_display_file.
restorecon_recursive /mnt/vendor/persist/display
mkdir /mnt/vendor/persist/data/sfs 0700 system system
mkdir /mnt/vendor/persist/data/tz 0700 system system
mkdir /mnt/vendor/persist/touch 0770 system system
# Permissions for ION
chmod 0660 /sys/class/ion_cma/ion_video_ext/isolated
chown system system /sys/class/ion_cma/ion_video_ext/isolated
@@ -537,8 +657,6 @@ on fs
chown system system /sys/devices/platform/exynos-drm/primary-panel/panel_need_handle_idle_exit
chown system system /sys/devices/platform/exynos-drm/primary-panel/op_hz
chown system system /sys/devices/platform/exynos-drm/primary-panel/refresh_ctrl
chown system system /sys/devices/platform/exynos-drm/primary-panel/power_state
chown system system /sys/devices/platform/exynos-drm/displayport/drm-displayport/hdcp_negotiation
chown system system /sys/module/drm/parameters/vblankoffdelay
chown system system /sys/module/drm/parameters/debug
chown system system /sys/class/dqe0/atc/ambient_light
@@ -644,9 +762,6 @@ on property:sys.boot_completed=1
# Set kswapd affinity
write /sys/kernel/vendor_mm/kswapd_cpu_affinity ff
# Set kcompactd affinity
write /sys/kernel/vendor_mm/kcompactd_cpu_affinity ff
# Adjust watermark level
write /proc/sys/vm/watermark_scale_factor 200
@@ -658,9 +773,9 @@ on property:sys.boot_completed=1
write /sys/devices/platform/17000010.devfreq_mif/devfreq/17000010.devfreq_mif/exynos_data/cancel_boot_freq 1
# Restore prefer idle
write /proc/vendor_sched/groups/ta/preferred_idle_mask_low 0xff
write /proc/vendor_sched/groups/ta/preferred_idle_mask_mid 0xff
write /proc/vendor_sched/groups/ta/preferred_idle_mask_high 0xff
write /proc/vendor_sched/groups/ta/preferred_idle_mask_low 0x1ff
write /proc/vendor_sched/groups/ta/preferred_idle_mask_mid 0x1ff
write /proc/vendor_sched/groups/ta/preferred_idle_mask_high 0x1ff
write /proc/vendor_sched/groups/fg/preferred_idle_mask_low 0x1ff
write /proc/vendor_sched/groups/fg/preferred_idle_mask_mid 0x1ff
write /proc/vendor_sched/groups/fg/preferred_idle_mask_high 0x1ff
@@ -671,13 +786,27 @@ on property:sys.boot_completed=1
# Setup final cpuset
write /dev/cpuset/top-app/cpus 0-8
write /dev/cpuset/foreground/cpus 0-7
write /dev/cpuset/foreground_window/cpus 0-7
write /dev/cpuset/background/cpus 0-3
write /dev/cpuset/system-background/cpus 0-3
write /dev/cpuset/restricted/cpus 0-3
write /dev/cpuset/camera-daemon/cpus 0-8
setprop vendor.powerhal.init 1
# Setup final cpu.uclamp
write /proc/vendor_sched/groups/ta/uclamp_min 1
write /proc/vendor_sched/groups/fg/uclamp_min 0
write /proc/vendor_sched/groups/sys/prefer_idle 0
# Set ug group
write /proc/vendor_sched/groups/bg/ug 0
write /proc/vendor_sched/groups/sys_bg/ug 0
write /proc/vendor_sched/groups/ota/ug 0
write /proc/vendor_sched/groups/dex2oat/ug 1
write /proc/vendor_sched/groups/ta/ug 1
# Set bg group throttle
write /proc/vendor_sched/ug_bg_group_throttle ${persist.device_config.vendor_system_native.ug_bg_group_throttle:-308}
# Set uclamp.max for some groups, which could indicate cpu importance used in scheduling
write /proc/vendor_sched/auto_uclamp_max "130 130 130 130 512 512 512 512 670"
write /proc/vendor_sched/groups/bg/uclamp_max 130
@@ -701,6 +830,12 @@ on property:sys.boot_completed=1
write /sys/devices/system/cpu/cpufreq/policy8/sched_pixel/limit_frequency 2363000
write /proc/vendor_sched/pmu_poll_time 10
# Disable PMU freq limit
write /sys/devices/system/cpu/cpufreq/policy0/sched_pixel/pmu_limit_enable 1
write /sys/devices/system/cpu/cpufreq/policy4/sched_pixel/pmu_limit_enable 1
write /sys/devices/system/cpu/cpufreq/policy8/sched_pixel/pmu_limit_enable 1
write /proc/vendor_sched/pmu_poll_enable 0
# Make devices on the critical path for suspend/resume asynchronous
write /sys/devices/platform/fixedregulator@0/regulator/regulator.2/power/async "enabled"
write /sys/devices/platform/fixedregulator@0/power/async "enabled"
@@ -708,6 +843,18 @@ on property:sys.boot_completed=1
write /sys/devices/platform/10840000.pinctrl/power/async "enabled"
write /sys/devices/platform/13060000.pinctrl/power/async "enabled"
# Setup cpu.shares to throttle background groups (bg ~ 5% sysbg ~ 5% dex2oat ~2.5%)
write /dev/cpuctl/background/cpu.shares 1024
write /dev/cpuctl/system-background/cpu.shares 1024
write /dev/cpuctl/dex2oat/cpu.shares 512
write /dev/cpuctl/system/cpu.shares 20480
# We only have system and background groups holding tasks and the groups below are empty
write /dev/cpuctl/camera-daemon/cpu.shares 20480
write /dev/cpuctl/foreground/cpu.shares 20480
write /dev/cpuctl/nnapi-hal/cpu.shares 20480
write /dev/cpuctl/rt/cpu.shares 20480
write /dev/cpuctl/top-app/cpu.shares 20480
# gvotables for dumpstate
chown system system /sys/kernel/debug/gvotables
@@ -790,6 +937,20 @@ service bugreport /system/bin/dumpstate -d -p -z
oneshot
keycodes 114 115 116
# Proxy for Secure Storage
on post-fs-data
mkdir /data/vendor/rebootescrow 0770 hsm hsm
mkdir /data/vendor/ss 0770 root system
mkdir /mnt/vendor/persist/ss 0770 root system
restorecon_recursive /mnt/vendor/persist/ss
symlink /mnt/vendor/persist/ss /data/vendor/ss/persist
chown root system /data/vendor/ss/persist
chmod 0770 /data/vendor/ss/persist
symlink /dev/block/platform/13200000\.ufs/by-name/trusty_persist /data/vendor/ss/persist/0
chown system system /data/vendor/ss/persist/0
chown system system /data/vendor/ss/persist/nsp
restart storageproxyd
service storageproxyd /vendor/bin/storageproxyd -d /dev/trusty-ipc-dev0 \
-r /dev/sg1 -p /data/vendor/ss -t ufs
@@ -855,14 +1016,38 @@ on property:vendor.thermal.link_ready=1
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/soft_ocp_cpu2_lvl 12000
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/soft_ocp_gpu_lvl 9000
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/soft_ocp_tpu_lvl 8500
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/ocp_cpu2_lvl 12000
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/ocp_gpu_lvl 9000
write /sys/devices/virtual/pmic/mitigation/triggered_lvl/ocp_tpu_lvl 12000
write /sys/devices/virtual/pmic/mitigation/clock_div/tpu_clk_div 0x1
write /sys/devices/virtual/pmic/mitigation/clock_div/gpu_clk_div 0x1
write /sys/devices/virtual/pmic/mitigation/clock_div/cpu2_clk_div 0x1
write /sys/devices/platform/cpupm/cpupm/cpd_cl1 1 #Enable power down
write /sys/devices/platform/cpupm/cpupm/cpd_cl2 1 #Enable power down
chown system system /dev/thermal/tz-by-name/soc/mode
chown system system /dev/thermal/tz-by-name/vdroop2/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/vdroop2/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/vdroop1/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/vdroop1/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/smpl_gm/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/smpl_gm/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_cpu1/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_cpu1/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_cpu2/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_cpu2/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_tpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_tpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/ocp_gpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/ocp_gpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu1/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu1/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu2/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_cpu2/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_tpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_tpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soft_ocp_gpu/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soft_ocp_gpu/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/soc/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soc/trip_point_0_hyst
chown system system /dev/thermal/tz-by-name/batoilo/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/batoilo/trip_point_0_hyst
# Thermal
chown system system /dev/thermal/tz-by-name/soc_therm/trip_point_0_temp
chown system system /dev/thermal/tz-by-name/soc_therm/trip_point_0_hyst
@@ -972,14 +1157,3 @@ on property:persist.device_config.runtime_native_boot.mode_override=asymm
write /sys/devices/system/cpu/cpu6/mte_tcf_preferred asymm
write /sys/devices/system/cpu/cpu7/mte_tcf_preferred asymm
write /sys/devices/system/cpu/cpu8/mte_tcf_preferred asymm
# Battery health
on property:persist.vendor.pulsar.opt_out=1
write /sys/class/power_supply/battery/aacp_opt_out 1
on property:persist.vendor.pulsar.opt_out=0
write /sys/class/power_supply/battery/aacp_opt_out 0
# NFC
on post-fs-data
mkdir /data/vendor/nfc 0770 nfc nfc

View File

@@ -75,7 +75,7 @@ on early-boot
mkdir /config/usb_gadget/g1/functions/uvc.0
write /config/usb_gadget/g1/functions/uvc.0/function_name "Android Webcam"
write /config/usb_gadget/g1/functions/uvc.0/streaming_maxpacket 3072
write /config/usb_gadget/g1/functions/uvc.0/streaming_maxburst 1
# write /config/usb_gadget/g1/functions/uvc.0/streaming_maxburst 5
# write /config/usb_gadget/g1/functions/uvc.0/streaming_interval 2
# setup control params
mkdir /config/usb_gadget/g1/functions/uvc.0/control/header/h
@@ -423,12 +423,3 @@ on property:persist.vendor.usb.displayport.enabled=1
on property:persist.vendor.usb.displayport.enabled=0
write /sys/module/exynos_drm/parameters/dp_enabled 0
write /sys/class/typec/port0/port0.0/mode1/active "no"
on property:persist.sys.hdcp_checking=always
write /sys/module/exynos_hdcp2/parameters/max_ver 3
on property:persist.sys.hdcp_checking="drm-only"
write /sys/module/exynos_hdcp2/parameters/max_ver 2
on property:persist.sys.hdcp_checking=never
write /sys/module/exynos_hdcp2/parameters/max_ver 0

View File

@@ -97,7 +97,6 @@
/dev/acd-mel_processor 0660 system audio
/dev/amcs 0660 system audio
/dev/acd-audio_rtp_* 0660 system radio
/dev/acd-mc_headpos 0660 system audio
# Secure MEM driver
/dev/s5p-smem 0660 drm drmrpc
@@ -156,20 +155,10 @@
/dev/acd-com.google.chre 0660 system system
/dev/acd-com.google.chre.non_wake_up 0660 system system
# CHRE (EFW transport)
/dev/acd-chre_ctl 0660 system system
/dev/acd-chre_data_tx 0220 system system
/dev/acd-chre_data_rx 0440 system system
# BT
/dev/acd-com.google.bt 0660 system system
/dev/acd-com.google.bt.non_wake_up 0660 system system
# AoC Bluetooth Offload
/dev/acd-chre_bt_offload_ctl 0660 bluetooth bluetooth
/dev/acd-chre_bt_offload_data_tx 0220 bluetooth bluetooth
/dev/acd-chre_bt_offload_data_rx 0440 bluetooth bluetooth
# LWIS
/dev/lwis* 0660 system system
@@ -256,4 +245,4 @@
/sys/bus/aoc/devices/control udfps_get_disp_freq 0440 system system
# USB Alt Modes
/sys/devices/platform/10cb0000.hsi2c/i2c-*/*-0025/typec/port0/port0-partner/port0-partner.* mode1/active 0664 system system
/sys/devices/platform/10cb0000.hsi2c/i2c-*/*-0025/typec/port0/port0-partner/port0-partner.* mode1/active 0664 system system

View File

@@ -51,14 +51,11 @@
<permission name="android.permission.BLUETOOTH_CONNECT" fixed="false"/>
</exception>
<exception package="com.google.android.GoogleCamera">
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
</exception>
<exception package="com.google.android.apps.camera.services">
<!-- Camera -->
<permission name="android.permission.CAMERA" fixed="false"/>
<!-- Camera Connectivity -->
<permission name="android.permission.ACCESS_FINE_LOCATION" fixed="false"/>
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
<permission name="android.permission.BLUETOOTH_CONNECT" fixed="false"/>
<permission name="android.permission.BLUETOOTH_SCAN" fixed="false"/>
@@ -78,8 +75,6 @@
<permission name="android.permission.ACTIVITY_RECOGNITION" fixed="false"/>
<!-- Notifications -->
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
<!-- Used by Bluetooth Module to collect bluetooth info -->
<permission name="android.permission.BLUETOOTH_CONNECT" fixed="false"/>
</exception>
<exception package="com.google.android.apps.setupwizard.searchselector">
@@ -167,16 +162,5 @@
<!-- Notifications -->
<permission name="android.permission.POST_NOTIFICATIONS" fixed="false"/>
</exception>
<exception package="com.google.android.apps.pixel.relationships">
<permission name="android.permission.CALL_PHONE" fixed="false"/>
<permission name="android.permission.READ_CALL_LOG" fixed="false"/>
<permission name="android.permission.READ_CONTACTS" fixed="false"/>
<permission name="android.permission.WRITE_CONTACTS" fixed="false"/>
</exception>
<exception
package="com.google.android.apps.privacy.wildlife">
<permission name="android.permission.READ_PHONE_STATE" fixed="false"/>
</exception>
</exceptions>

View File

@@ -14,6 +14,7 @@
# limitations under the License.
#
-include vendor/google_devices/zuma/proprietary/telephony/device-vendor.mk
include device/google/zuma/device.mk
# Telephony
@@ -43,6 +44,23 @@ PRODUCT_PRODUCT_PROPERTIES += \
PRODUCT_PRODUCT_PROPERTIES += \
ro.thermal_warmreset = true
# Set the max page size to 4096 (b/300367402)
PRODUCT_MAX_PAGE_SIZE_SUPPORTED := 4096
# Trigger fsck on upgrade (305658663)
PRODUCT_PRODUCT_PROPERTIES += \
ro.preventative_fsck = 1
# Indicate that the bootloader supports the MTE developer option switch
# (MISC_MEMTAG_MODE_MEMTAG_ONCE), with the exception of _fullmte products that
# force enable MTE.
ifeq (,$(filter %_fullmte,$(TARGET_PRODUCT)))
PRODUCT_PRODUCT_PROPERTIES += ro.arm64.memtag.bootctl_supported=1
# N.B. persist properties in product Makefiles aren't actually persisted to the data
# partition, so they will actually go away if we remove them here, or if the user
# flashes from a normal build to a fullmte build.
PRODUCT_PRODUCT_PROPERTIES += persist.arm64.memtag.app.com.android.se=off
PRODUCT_PRODUCT_PROPERTIES += persist.arm64.memtag.app.com.google.android.bluetooth=off
PRODUCT_PRODUCT_PROPERTIES += persist.arm64.memtag.app.com.android.nfc=off
PRODUCT_PRODUCT_PROPERTIES += persist.arm64.memtag.system_server=off
endif

346
device.mk
View File

@@ -16,7 +16,7 @@
include device/google/gs-common/device.mk
include device/google/gs-common/gs_watchdogd/watchdog.mk
include device/google/gs-common/ramdump_and_coredump/ramdump_and_coredump.mk
include device/google/gs-common/ramdump/ramdump.mk
include device/google/gs-common/soc/soc.mk
include device/google/gs-common/modem/modem.mk
include device/google/gs-common/aoc/aoc.mk
@@ -26,12 +26,11 @@ include device/google/gs-common/storage/storage.mk
include device/google/gs-common/thermal/dump/thermal.mk
include device/google/gs-common/thermal/thermal_hal/device.mk
include device/google/gs-common/performance/perf.mk
include device/google/gs-common/power/power.mk
include device/google/gs-common/pixel_metrics/pixel_metrics.mk
include device/google/gs-common/soc/freq.mk
include device/google/gs-common/gps/dump/log.mk
include device/google/gs-common/bcmbt/dump/dumplog.mk
include device/google/gs-common/display/dump_exynos_display.mk
include device/google/gs-common/display/dump.mk
include device/google/gs-common/display_logbuffer/dump.mk
include device/google/gs-common/gxp/gxp.mk
include device/google/gs-common/camera/dump.mk
@@ -41,12 +40,8 @@ include device/google/gs-common/umfw_stat/umfw_stat.mk
include device/google/gs-common/widevine/widevine.mk
include device/google/gs-common/sota_app/factoryota.mk
include device/google/gs-common/misc_writer/misc_writer.mk
include device/google/gs-common/gyotaku_app/gyotaku.mk
include device/google/gs-common/bootctrl/bootctrl_aidl.mk
include device/google/gs-common/betterbug/betterbug.mk
include device/google/gs-common/recorder/recorder.mk
include device/google/gs-common/fingerprint/fingerprint.mk
include device/google/gs-common/nfc/nfc.mk
include device/google/gs-common/16kb/16kb.mk
include device/google/zuma/dumpstate/item.mk
@@ -60,10 +55,10 @@ AB_OTA_POSTINSTALL_CONFIG += \
POSTINSTALL_OPTIONAL_system=true
# Set Vendor SPL to match platform
VENDOR_SECURITY_PATCH := 2025-08-05
VENDOR_SECURITY_PATCH = $(PLATFORM_SECURITY_PATCH)
# Set boot SPL
BOOT_SECURITY_PATCH := 2025-08-05
BOOT_SECURITY_PATCH = $(PLATFORM_SECURITY_PATCH)
# TODO(b/207450311): Remove this flag once implemented
USE_PIXEL_GRALLOC := false
@@ -73,10 +68,23 @@ endif
PRODUCT_SOONG_NAMESPACES += \
hardware/google/av \
hardware/google/gchips \
hardware/google/gchips/gralloc4 \
hardware/google/graphics/common \
hardware/google/graphics/zuma \
hardware/google/interfaces \
hardware/google/pixel \
device/google/zuma \
device/google/zuma/powerstats
device/google/zuma/powerstats \
vendor/google_devices/common/chre/host/hal \
vendor/google/whitechapel/tools \
vendor/google/interfaces \
vendor/google_devices/common/proprietary/confirmatioui_hal \
vendor/google_nos/host/android \
vendor/google_nos/test/system-test-harness \
vendor/google/camera
LOCAL_KERNEL := $(TARGET_KERNEL_DIR)/Image.lz4
# Set the environment variable to switch the Keymint HAL service to Rust
TRUSTY_KEYMINT_IMPL := rust
@@ -90,6 +98,43 @@ endif
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += \
ro.oem_unlock_supported=1
# Include vendor telephony soong namespace
PRODUCT_SOONG_NAMESPACES += \
vendor/samsung_slsi/telephony/$(BOARD_USES_SHARED_VENDOR_TELEPHONY)
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
#Set IKE logs to verbose for WFC
PRODUCT_PROPERTY_OVERRIDES += log.tag.IKE=VERBOSE
#Set Shannon IMS logs to debug
PRODUCT_PROPERTY_OVERRIDES += log.tag.SHANNON_IMS=DEBUG
#Set Shannon QNS logs to debug
PRODUCT_PROPERTY_OVERRIDES += log.tag.ShannonQNS=DEBUG
PRODUCT_PROPERTY_OVERRIDES += log.tag.ShannonQNS-ims=DEBUG
PRODUCT_PROPERTY_OVERRIDES += log.tag.ShannonQNS-emergency=DEBUG
PRODUCT_PROPERTY_OVERRIDES += log.tag.ShannonQNS-mms=DEBUG
PRODUCT_PROPERTY_OVERRIDES += log.tag.ShannonQNS-xcap=DEBUG
PRODUCT_PROPERTY_OVERRIDES += log.tag.ShannonQNS-HC=DEBUG
# Modem userdebug
include device/google/zuma/modem/userdebug.mk
endif
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
# b/36703476: Set default log size to 1M
PRODUCT_PROPERTY_OVERRIDES += \
ro.logd.size=1M
# b/114766334: persist all logs by default rotating on 30 files of 1MiB
# change to 60 files for zuma
PRODUCT_PROPERTY_OVERRIDES += \
logd.logpersistd=logcatd \
logd.logpersistd.size=60
PRODUCT_PRODUCT_PROPERTIES += \
ro.logcat.compress=true
endif
# From system.property
PRODUCT_PROPERTY_OVERRIDES += \
ro.telephony.default_network=27 \
@@ -138,7 +183,7 @@ PRODUCT_PRODUCT_PROPERTIES += \
bluetooth.profile.asha.central.enabled?=true \
bluetooth.profile.a2dp.source.enabled?=true \
bluetooth.profile.avrcp.target.enabled?=true \
bluetooth.profile.bap.unicast.client.enabled?=true \
bluetooth.profile.bap.unicast.server.enabled?=true \
bluetooth.profile.bas.client.enabled?=true \
bluetooth.profile.csip.set_coordinator.enabled?=true \
bluetooth.profile.gatt.enabled?=true \
@@ -153,8 +198,8 @@ PRODUCT_PRODUCT_PROPERTIES += \
bluetooth.profile.pan.panu.enabled?=true \
bluetooth.profile.pbap.server.enabled?=true \
bluetooth.profile.sap.server.enabled?=true \
bluetooth.profile.ccp.server.enabled?=true \
bluetooth.profile.vcp.controller.enabled?=true
bluetooth.profile.tbs.server.enabled?=true \
bluetooth.profile.vc.server.enabled?=true
# Carrier configuration default location
PRODUCT_PROPERTY_OVERRIDES += \
@@ -163,29 +208,18 @@ PRODUCT_PROPERTY_OVERRIDES += \
PRODUCT_PROPERTY_OVERRIDES += \
telephony.active_modems.max_count=2
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.usb.displayport.enabled=1
# Enable Settings 2-pane optimization for devices supporting display ports.
PRODUCT_SYSTEM_PROPERTIES += \
persist.settings.large_screen_opt_for_dp.enabled=true
else
PRODUCT_PROPERTY_OVERRIDES += \
persist.sys.hdcp_checking=drm-only
persist.vendor.usb.displayport.enabled=1
endif
USE_LASSEN_OEMHOOK := true
# The "power-anomaly-sitril" is added into PRODUCT_SOONG_NAMESPACES when
# $(USE_LASSEN_OEMHOOK) is true and $(BOARD_WITHOUT_RADIO) is not true.
ifneq ($(BOARD_WITHOUT_RADIO),true)
$(call soong_config_set,sitril,use_lassen_oemhook_with_radio,true)
endif
# Use for GRIL
USES_LASSEN_MODEM := true
$(call soong_config_set, vendor_ril_google_feature, use_lassen_modem, true)
ifneq ($(BOARD_WITHOUT_RADIO),true)
$(call soong_config_set_bool,grilservice,use_google_qns,true)
endif
ifeq ($(USES_GOOGLE_DIALER_CARRIER_SETTINGS),true)
USE_GOOGLE_DIALER := true
@@ -208,6 +242,9 @@ USE_SWIFTSHADER := false
# HWUI
TARGET_USES_VULKAN = true
PRODUCT_SOONG_NAMESPACES += \
vendor/arm/mali/valhall
$(call soong_config_set,pixel_mali,soc,$(TARGET_BOARD_PLATFORM))
$(call soong_config_set,arm_gralloc,soc,$(TARGET_BOARD_PLATFORM))
@@ -216,18 +253,9 @@ PRODUCT_PACKAGES += \
csffw_image_prebuilt__firmware_prebuilt_ttux_mali_csffw.bin \
libGLES_mali \
vulkan.mali \
libOpenCL \
libgpudataproducer
# Install the OpenCL ICD Loader
PRODUCT_SOONG_NAMESPACES += external/OpenCL-ICD-Loader
PRODUCT_PACKAGES += \
libOpenCL \
mali_icd__customer_pixel_opencl-icd_ARM.icd
ifeq ($(DEVICE_IS_64BIT_ONLY),false)
PRODUCT_PACKAGES += \
mali_icd__customer_pixel_opencl-icd_ARM32.icd
endif
ifeq ($(USE_SWIFTSHADER),true)
PRODUCT_PACKAGES += \
libEGL_angle \
@@ -245,10 +273,11 @@ PRODUCT_VENDOR_PROPERTIES += \
endif
# Mali Configuration Properties
# b/221255664 prevents setting PROTECTED_MAX_CORE_COUNT=2
PRODUCT_VENDOR_PROPERTIES += \
vendor.mali.platform.config=/vendor/etc/mali/platform.config \
vendor.mali.debug.config=/vendor/etc/mali/debug.config \
vendor.mali.base_protected_max_core_count=4 \
vendor.mali.base_protected_max_core_count=1 \
vendor.mali.base_protected_tls_max=67108864 \
vendor.mali.platform_agt_frequency_khz=24576
@@ -257,8 +286,9 @@ PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.hardware.vulkan.version-1_3.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.vulkan.version.xml \
frameworks/native/data/etc/android.hardware.vulkan.level-1.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.vulkan.level.xml \
frameworks/native/data/etc/android.hardware.vulkan.compute-0.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.vulkan.compute.xml \
frameworks/native/data/etc/android.software.vulkan.deqp.level-2025-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.vulkan.deqp.level.xml \
frameworks/native/data/etc/android.software.opengles.deqp.level-2025-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.opengles.deqp.level.xml
frameworks/native/data/etc/android.software.contextualsearch.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.contextualsearch.xml \
frameworks/native/data/etc/android.software.vulkan.deqp.level-2023-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.vulkan.deqp.level.xml \
frameworks/native/data/etc/android.software.opengles.deqp.level-2023-03-01.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.opengles.deqp.level.xml
#endif
@@ -281,7 +311,6 @@ PRODUCT_VENDOR_PROPERTIES += ro.surface_flinger.prime_shader_cache.ultrahdr=1
DEVICE_MANIFEST_FILE := \
device/google/zuma/manifest.xml
BOARD_USE_CODEC2_AIDL := V1
ifneq (,$(filter aosp_%,$(TARGET_PRODUCT)))
DEVICE_MANIFEST_FILE += \
device/google/zuma/manifest_media_aosp.xml
@@ -305,36 +334,27 @@ DEVICE_PACKAGE_OVERLAYS += device/google/zuma/overlay
# This device is shipped with 34 (Android U)
PRODUCT_SHIPPING_API_LEVEL := 34
# RKP VINTF
-include vendor/google_nos/host/android/hals/keymaster/aidl/strongbox/RemotelyProvisionedComponent-citadel.mk
# Enforce the Product interface
PRODUCT_PRODUCT_VNDK_VERSION := current
PRODUCT_ENFORCE_PRODUCT_PARTITION_INTERFACE := true
# Init files
PRODUCT_COPY_FILES += \
$(LOCAL_KERNEL):kernel \
device/google/zuma/conf/init.zuma.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zuma.usb.rc \
device/google/zuma/conf/ueventd.zuma.rc:$(TARGET_COPY_OUT_VENDOR)/etc/ueventd.rc
PRODUCT_COPY_FILES += \
device/google/zuma/conf/init.zuma.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zuma.rc \
device/google/zuma/conf/init.persist.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.persist.rc
device/google/zuma/conf/init.zuma.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zuma.rc
ifeq (true,$(filter $(TARGET_BOOTS_16K) $(PRODUCT_16K_DEVELOPER_OPTION),true))
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_COPY_FILES += \
device/google/zuma/conf/init.efs.16k.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.efs.rc \
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.efs.from_data:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.efs.from_data \
PRODUCT_PACKAGES += fsck.f2fs.vendor
else
device/google/zuma/conf/init.debug.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.debug.rc
PRODUCT_COPY_FILES += \
device/google/zuma/conf/init.efs.4k.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.efs.rc
endif
ifneq (,$(filter 5.%, $(TARGET_LINUX_KERNEL_VERSION)))
PRODUCT_COPY_FILES += \
device/google/zuma/storage/5.15/init.zuma.storage.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zuma.storage.rc
else
PRODUCT_COPY_FILES += \
device/google/zuma/storage/6.1/init.zuma.storage.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zuma.storage.rc
device/google/zuma/conf/init.freq.userdebug.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.freq.userdebug.rc
endif
# Recovery files
@@ -342,14 +362,6 @@ PRODUCT_COPY_FILES += \
device/google/zuma/conf/init.recovery.device.rc:$(TARGET_COPY_OUT_RECOVERY)/root/init.recovery.zuma.rc
# Fstab files
ifeq (ext4,$(TARGET_RW_FILE_SYSTEM_TYPE))
PRODUCT_SOONG_NAMESPACES += \
device/google/zuma/conf/ext4
else
PRODUCT_SOONG_NAMESPACES += \
device/google/zuma/conf/f2fs
endif
PRODUCT_PACKAGES += \
fstab.zuma \
fstab.zuma.vendor_ramdisk \
@@ -358,9 +370,7 @@ PRODUCT_PACKAGES += \
PRODUCT_COPY_FILES += \
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.persist:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.persist \
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.modem:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.modem \
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.efs:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.efs
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.modem:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.modem
# Shell scripts
PRODUCT_PACKAGES += \
@@ -376,7 +386,18 @@ PRODUCT_COPY_FILES += \
PRODUCT_HOST_PACKAGES += \
mkdtimg
PRODUCT_PACKAGES += \
messaging
# CHRE
## Tools
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES += \
chre_power_test_client \
chre_test_client \
chre_aidl_hal_client
endif
## HAL
include device/google/gs-common/chre/hal.mk
PRODUCT_COPY_FILES += \
@@ -385,6 +406,8 @@ PRODUCT_COPY_FILES += \
## Enable the CHRE Daemon
CHRE_USF_DAEMON_ENABLED := false
CHRE_DEDICATED_TRANSPORT_CHANNEL_ENABLED := true
PRODUCT_PACKAGES += \
preloaded_nanoapps.json
# Filesystem management tools
PRODUCT_PACKAGES += \
@@ -397,8 +420,13 @@ PRODUCT_PACKAGES += \
checkpoint_gc
# Vendor verbose logging default property
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.verbose_logging_enabled=true
else
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.verbose_logging_enabled=false
endif
# Vendor modem extensive logging default property
PRODUCT_PROPERTY_OVERRIDES += \
@@ -414,8 +442,13 @@ PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.sys.modem.logging.enable=true
# Enable silent CP crash handling
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.ril.crash_handling_mode=1
else
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.ril.crash_handling_mode=2
endif
# Add support dual SIM mode
PRODUCT_PROPERTY_OVERRIDES += \
@@ -458,6 +491,12 @@ PRODUCT_PACKAGES += \
PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.software.midi.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.midi.xml
# default usb debug functions
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.usb.usbradio.config=dm
endif
# adpf 16ms update rate
PRODUCT_PRODUCT_PROPERTIES += \
vendor.powerhal.adpf.rate=16666666
@@ -487,9 +526,6 @@ PRODUCT_PROPERTY_OVERRIDES += aaudio.mmap_policy=2
PRODUCT_PROPERTY_OVERRIDES += aaudio.mmap_exclusive_policy=2
PRODUCT_PROPERTY_OVERRIDES += aaudio.hw_burst_min_usec=2000
# Set util_clamp_min for s/w spatializer
PRODUCT_PROPERTY_OVERRIDES += audio.spatializer.effect.util_clamp_min=300
# Calliope firmware overwrite
#PRODUCT_COPY_FILES += \
device/google/zuma/firmware/calliope_dram.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/calliope_dram.bin \
@@ -516,6 +552,10 @@ PRODUCT_PROPERTY_OVERRIDES += audio.spatializer.effect.util_clamp_min=300
PRODUCT_PACKAGES += \
com.android.future.usb.accessory
PRODUCT_PACKAGES += \
android.hardware.graphics.mapper@4.0-impl \
android.hardware.graphics.allocator-V1-service
PRODUCT_PACKAGES += \
android.hardware.memtrack-service.pixel \
libion_exynos \
@@ -555,6 +595,14 @@ PRODUCT_PACKAGES += \
PRODUCT_PACKAGES += \
ConnectivityOverlay
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
f2fs_io \
check_f2fs \
f2fs.fibmap \
dump.f2fs
endif
# Storage health HAL
PRODUCT_PACKAGES += \
android.hardware.health.storage-service.default
@@ -577,6 +625,11 @@ ifeq (,$(filter true, $(BOARD_WITHOUT_DTLS)))
include device/google/gs-common/dauntless/gsc.mk
endif
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
WvInstallKeybox
endif
# Copy Camera HFD Setfiles
#PRODUCT_COPY_FILES += \
device/google/zuma/firmware/camera/libhfd/default_configuration.hfd.cfg.json:$(TARGET_COPY_OUT_VENDOR)/firmware/default_configuration.hfd.cfg.json \
@@ -620,6 +673,10 @@ PRODUCT_PROPERTY_OVERRIDES += \
debug.slsi_platform=1 \
debug.hwc.winupdate=1
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES += displaycolor_service
endif
PRODUCT_PROPERTY_OVERRIDES += \
debug.sf.disable_backpressure=0 \
debug.sf.enable_gl_backpressure=1 \
@@ -635,8 +692,8 @@ PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.earlyGl.sf.duration=16600000
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.earlyGl.app.duration=16600000
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.frame_rate_multiple_threshold=120
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.treat_170m_as_sRGB=1
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.hdcp_negotiation=1
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.hdcp_support=1
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.hwc_hotplug_error_via_neg_vsync=1
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += debug.sf.hwc_hdcp_via_neg_vsync=1
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.enable_layer_caching=true
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.set_idle_timer_ms?=80
@@ -662,7 +719,8 @@ PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.display_update_imminent
PRODUCT_PROPERTY_OVERRIDES += \
persist.sys.sf.native_mode=2
PRODUCT_COPY_FILES += \
device/google/zuma/display/display_colordata_cal0.pb:$(TARGET_COPY_OUT_VENDOR)/etc/display_colordata_cal0.pb
device/google/zuma/display/display_colordata_cal0.pb:$(TARGET_COPY_OUT_VENDOR)/etc/display_colordata_cal0.pb \
device/google/zuma/display/display_colordata_cal2.pb:$(TARGET_COPY_OUT_VENDOR)/etc/display_colordata_cal2.pb
# limit DPP downscale ratio
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += vendor.hwc.dpp.downscale=4
@@ -691,11 +749,18 @@ PRODUCT_PACKAGES += wpa_supplicant.conf
WIFI_PRIV_CMD_UPDATE_MBO_CELL_STATUS := enabled
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES += wpa_cli
PRODUCT_PACKAGES += hostapd_cli
endif
####################################
## VIDEO
####################################
# Video
PRODUCT_SOONG_NAMESPACES += vendor/google/media/bigwave
$(call soong_config_set,bigw,soc,$(TARGET_BOARD_PLATFORM))
PRODUCT_PACKAGES += \
@@ -720,25 +785,16 @@ PRODUCT_COPY_FILES += \
device/google/zuma/media_codecs_performance_c2.xml:$(TARGET_COPY_OUT_VENDOR)/etc/media_codecs_performance_c2.xml \
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2-poolmask=458752 \
debug.c2.use_dmabufheaps=1 \
media.c2.dmabuf.padding=512 \
debug.stagefright.ccodec_delayed_params=1 \
ro.vendor.gpu.dataspace=1
ifneq ($(BOARD_USE_CODEC2_AIDL), )
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2-poolmask=1507328
else
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2-poolmask=458752
endif
# Create input surface on the framework side
PRODUCT_PROPERTY_OVERRIDES += \
debug.stagefright.c2inputsurface=-1 \
PRODUCT_PROPERTY_OVERRIDES += media.c2.hal.selection=aidl
# 2. OpenMAX IL
PRODUCT_COPY_FILES += \
device/google/zuma/media_codecs.xml:$(TARGET_COPY_OUT_VENDOR)/etc/media_codecs.xml \
@@ -771,7 +827,21 @@ endif
$(call inherit-product, system/core/trusty/trusty-storage.mk)
$(call inherit-product, system/core/trusty/trusty-base.mk)
# Trusty unit test tool and code coverage tool
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
trusty-ut-ctrl \
tipc-test \
trusty_stats_test \
trusty-coverage-controller
endif
include device/google/gs101/confirmationui/confirmationui.mk
# Trusty Metrics Daemon
PRODUCT_SOONG_NAMESPACES += \
vendor/google/trusty/common
PRODUCT_PACKAGES += \
trusty_metricsd
@@ -785,9 +855,15 @@ PRODUCT_PROPERTY_OVERRIDES += \
ro.frp.pst=/dev/block/by-name/frp
# System props to enable Bluetooth Quality Report (BQR) feature
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PRODUCT_PROPERTIES += \
persist.bluetooth.bqr.event_mask?=262174 \
persist.bluetooth.bqr.min_interval_ms=500
else
PRODUCT_PRODUCT_PROPERTIES += \
persist.bluetooth.bqr.event_mask?=30 \
persist.bluetooth.bqr.min_interval_ms=500
endif
#VNDK
PRODUCT_PACKAGES += \
@@ -819,6 +895,12 @@ PRODUCT_PACKAGES += \
PRODUCT_PACKAGES += \
Iwlan
#Iwlan test app for eng builds
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES += \
IwlanTestApp
endif
PRODUCT_PACKAGES += \
whitelist \
libstagefright_hdcp \
@@ -831,6 +913,9 @@ PRODUCT_PACKAGES += \
calliope_iva.bin \
vts.bin
# This will be called only if IMSService is building with source code for dev branches.
$(call inherit-product-if-exists, vendor/samsung_slsi/telephony/$(BOARD_USES_SHARED_VENDOR_TELEPHONY)/shannon-ims/device-vendor.mk)
PRODUCT_PACKAGES += ShannonIms
PRODUCT_PACKAGES += ShannonRcs
@@ -838,9 +923,7 @@ PRODUCT_PACKAGES += ShannonRcs
# Exynos RIL and telephony
# Multi SIM(DSDS)
SIM_COUNT := 2
$(call soong_config_set,sim,sim_count,$(SIM_COUNT))
SUPPORT_MULTI_SIM := true
# Support NR
SUPPORT_NR := true
# Support 5G on both stacks
@@ -850,8 +933,18 @@ USE_RADIO_HAL_2_1 := true
# Using Early Send Device Info
USE_EARLY_SEND_DEVICE_INFO := true
$(call inherit-product, $(SRC_TARGET_DIR)/product/core_64_bit_only.mk)
#$(call inherit-product, vendor/google_devices/telephony/common/device-vendor.mk)
#$(call inherit-product, vendor/google_devices/zuma/proprietary/device-vendor.mk)
ifneq ($(BOARD_WITHOUT_RADIO),true)
$(call inherit-product-if-exists, vendor/samsung_slsi/telephony/$(BOARD_USES_SHARED_VENDOR_TELEPHONY)/common/device-vendor.mk)
endif
$(call inherit-product, $(SRC_TARGET_DIR)/product/core_64_bit_only.mk)
#$(call inherit-product, hardware/google_devices/exynos5/exynos5.mk)
#$(call inherit-product-if-exists, hardware/google_devices/zuma/zuma.mk)
#$(call inherit-product-if-exists, vendor/google_devices/common/exynos-vendor.mk)
#$(call inherit-product-if-exists, hardware/broadcom/wlan/bcmdhd/firmware/bcm4375/device-bcm.mk)
include device/google/gs-common/sensors/sensors.mk
$(call soong_config_set,usf,target_soc,zuma)
@@ -861,19 +954,20 @@ PRODUCT_COPY_FILES += \
frameworks/native/data/etc/handheld_core_hardware.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/handheld_core_hardware.xml \
ifneq ($(BOARD_WITHOUT_RADIO),true)
# Use Lassen specifc Shared Modem Platform
SHARED_MODEM_PLATFORM_VENDOR := lassen
# Shared Modem Platform
include device/google/gs-common/modem/modem_svc_sit/shared_modem_platform.mk
# modem_svc_sit daemon
PRODUCT_PACKAGES += modem_svc_sit
# modem_ml_svc_sit daemon
PRODUCT_PACKAGES += modem_ml_svc_sit
# modem ML models configs
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_COPY_FILES += \
device/google/zuma/modem_ml/modem_ml_models_userdebug.conf:$(TARGET_COPY_OUT_VENDOR)/etc/modem_ml_models.conf
else
PRODUCT_COPY_FILES += \
device/google/zuma/modem_ml/modem_ml_models_user.conf:$(TARGET_COPY_OUT_VENDOR)/etc/modem_ml_models.conf
endif
# modem logging binary/configs
PRODUCT_PACKAGES += modem_logging_control
@@ -915,15 +1009,31 @@ PRODUCT_PACKAGES += \
endif
# Vibrator Diag
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += \
diag-vibrator \
diag-vibrator-cs40l25a \
diag-vibrator-drv2624 \
$(NULL)
endif
PRODUCT_PACKAGES += \
android.hardware.health-service.zuma \
android.hardware.health-service.zuma_recovery \
# Audio
# Audio HAL Server & Default Implementations
ifeq ($(USE_AUDIO_HAL_AIDL),true)
include device/google/gs-common/audio/aidl.mk
else
include device/google/gs-common/audio/hidl_zuma.mk
endif
## AoC soong
PRODUCT_SOONG_NAMESPACES += \
vendor/google/whitechapel/aoc
$(call soong_config_set,aoc,target_soc,$(TARGET_BOARD_PLATFORM))
$(call soong_config_set,aoc,target_product,$(TARGET_PRODUCT))
@@ -944,6 +1054,22 @@ PRODUCT_PROPERTY_OVERRIDES += \
PRODUCT_PACKAGES += vndservicemanager
PRODUCT_PACKAGES += vndservice
## TinyTools, debug tool and cs35l41 speaker calibration tool for Audio
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES += \
tinyplay \
tinycap \
tinymix \
tinypcminfo \
tinyhostless \
cplay \
aoc_hal \
aoc_tuning_inft \
mahal_test \
ma_aoc_tuning_test \
crus_sp_cal
endif
PRODUCT_PACKAGES += \
google.hardware.media.c2@1.0-service \
libgc2_store \
@@ -954,7 +1080,7 @@ PRODUCT_PACKAGES += \
libgc2_utils
## Start packet router
include device/google/gs-common/telephony/pktrouter.mk
include device/google/gs101/telephony/pktrouter.mk
# Thermal HAL
PRODUCT_PROPERTY_OVERRIDES += persist.vendor.enable.thermal.genl=true
@@ -963,7 +1089,14 @@ PRODUCT_PROPERTY_OVERRIDES += persist.vendor.enable.thermal.genl=true
include device/google/gs-common/edgetpu/edgetpu.mk
# Config variables for TPU chip on device.
$(call soong_config_set,edgetpu_config,chip,rio)
# Include the edgetpu targets defined the namespaces below into the final image.
PRODUCT_SOONG_NAMESPACES += \
vendor/google_devices/zuma/proprietary/gchips/tpu/metrics \
vendor/google_devices/zuma/proprietary/gchips/tpu/tflite_delegate \
vendor/google_devices/zuma/proprietary/gchips/tpu/darwinn_logging_service \
vendor/google_devices/zuma/proprietary/gchips/tpu/nnapi_stable_aidl \
vendor/google_devices/zuma/proprietary/gchips/tpu/aidl \
vendor/google_devices/zuma/proprietary/gchips/tpu/hal
# TPU firmware
PRODUCT_PACKAGES += edgetpu-rio.fw
@@ -1015,12 +1148,20 @@ else
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/logger_app
endif
# sscoredump
include hardware/google/pixel/sscoredump/device.mk
# RadioExt Version
USES_RADIOEXT_V1_6 = true
# Wifi ext
include hardware/google/pixel/wifi_ext/device.mk
# Battery Stats Viewer
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += BatteryStatsViewer
endif
# Install product specific framework compatibility matrix
# (TODO: b/169535506) This includes the FCM for system_ext and product partition.
# It must be split into the FCM of each partition.
@@ -1041,14 +1182,19 @@ PRODUCT_PROPERTY_OVERRIDES += \
# Hardware Info Collection
include hardware/google/pixel/HardwareInfo/HardwareInfo.mk
# UFS: the script is used to select the corresponding firmware to run FFU.
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += ufs_firmware_update.sh
endif
# RIL extension service
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
ifeq (,$(filter aosp_% factory_%,$(TARGET_PRODUCT)))
include device/google/gs-common/pixel_ril/ril.mk
endif
# Touch service
include hardware/google/pixel/input/twoshay.mk
include device/google/gs-common/touch/twoshay/aidl_zuma.mk
include device/google/gs-common/touch/twoshay/twoshay.mk
# Allow longer timeout for incident report generation in bugreport
# Overriding in /product partition instead of /vendor intentionally,

View File

@@ -114,7 +114,7 @@
</hal>
<hal format="aidl" optional="true">
<name>com.google.hardware.pixel.display</name>
<version>13-15</version>
<version>10</version>
<interface>
<name>IDisplay</name>
<instance>default</instance>
@@ -153,7 +153,7 @@
</hal>
<hal format="aidl" optional="true">
<name>vendor.google.wifi_ext</name>
<version>2-4</version>
<version>2-3</version>
<interface>
<name>IWifiExt</name>
<instance>default</instance>

Binary file not shown.

View File

@@ -24,7 +24,6 @@ cc_binary {
],
vendor: true,
relative_install_path: "dump",
init_rc: ["dump_power.rc"],
}
sh_binary {

9
dumpstate/OWNERS Normal file
View File

@@ -0,0 +1,9 @@
aaronding@google.com
rurumihong@google.com
adamshih@google.com
wilsonsung@google.com
lucaswei@google.com
cyanhsieh@google.com
rogerliao@google.com
cyuanjen@google.com
robinpeng@google.com

View File

@@ -21,9 +21,7 @@
#include <stdio.h>
#include <stdlib.h>
#include <sys/sysinfo.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>
#include <vector>
#include <android-base/file.h>
@@ -200,18 +198,39 @@ void dumpMaxFg() {
const char *maxfg [][2] = {
{"Power supply property maxfg", "/sys/class/power_supply/maxfg/uevent"},
{"maxfg registers", "/sys/class/power_supply/maxfg/registers_dump"},
{"m5_state", "/sys/class/power_supply/maxfg/m5_model_state"},
{"maxfg logbuffer", "/dev/logbuffer_maxfg"},
{"maxfg_monitor logbuffer", "/dev/logbuffer_maxfg_monitor"},
};
const char *maxfgFlip [][2] = {
{"Power supply property maxfg_base", "/sys/class/power_supply/maxfg_base/uevent"},
{"Power supply property maxfg_flip", "/sys/class/power_supply/maxfg_flip/uevent"},
{"m5_state", "/sys/class/power_supply/maxfg_base/m5_model_state"},
{"maxfg_base", "/dev/logbuffer_maxfg_base"},
{"maxfg_flip", "/dev/logbuffer_maxfg_flip"},
{"maxfg_base", "/dev/logbuffer_maxfg_base_monitor"},
{"maxfg_flip", "/dev/logbuffer_maxfg_flip_monitor"},
};
const char *maxfgHistoryName = "Maxim FG History";
const char *maxfgHistoryDir = "/dev/maxfg_history";
std::string content;
if (isValidDir(maxfgLoc)) {
for (const auto &row : maxfg) {
dumpFileContent(row[0], row[1]);
}
} else {
for (const auto &row : maxfgFlip) {
dumpFileContent(row[0], row[1]);
}
}
if (isValidFile(maxfgHistoryDir)) {
dumpFileContent(maxfgHistoryName, maxfgHistoryDir);
}
}
@@ -241,50 +260,55 @@ void dumpLogBufferTcpm() {
}
void dumpTcpc() {
const char* max77759TcpcHead = "TCPC Device Attributes";
const char* directory = "/sys/class/typec/port0/device";
const char* max77759Tcpc [] {
"auto_discharge",
"bc12_enabled",
"cc_toggle_enable",
"contaminant_detection",
"contaminant_detection_status",
"frs",
"irq_hpd_count",
"non_compliant_reasons",
"sbu_pullup",
"update_sdp_enum_timeout",
"usb_limit_accessory_current",
"usb_limit_accessory_enable",
"usb_limit_sink_current",
"usb_limit_sink_enable",
"usb_limit_source_enable",
int ret;
const char* max77759TcpcHead = "TCPC";
const char* i2cSubDirMatch = "i2c-";
const char* directory = "/sys/devices/platform/10d60000.hsi2c/";
const char* max77759Tcpc [][2] {
{"registers:", "/i2c-max77759tcpc/registers"},
{"frs:", "/i2c-max77759tcpc/frs"},
{"auto_discharge:", "/i2c-max77759tcpc/auto_discharge"},
{"bcl2_enabled:", "/i2c-max77759tcpc/bcl2_enabled"},
{"cc_toggle_enable:", "/i2c-max77759tcpc/cc_toggle_enable"},
{"containment_detection:", "/i2c-max77759tcpc/containment_detection"},
{"containment_detection_status:", "/i2c-max77759tcpc/containment_detection_status"},
};
std::vector<std::string> files;
std::string content;
std::string tcpcRegistersPath(std::string(directory) + "/registers");
dumpFileContent("TCPC Registers", tcpcRegistersPath.c_str());
printTitle(max77759TcpcHead);
for (auto& tcpcVal : max77759Tcpc) {
std::string filename = std::string(directory) + "/" + std::string(tcpcVal);
printf("%s: ", tcpcVal);
android::base::ReadFileToString(filename, &content);
if (!content.empty() && (content.back() == '\n' || content.back() == '\r'))
content.pop_back();
printf("%s\n", content.c_str());
ret = getFilesInDir(directory, &files);
if (ret < 0) {
for (auto &tcpcVal : max77759Tcpc)
printf("%s\n", tcpcVal[0]);
return;
}
for (auto &file : files) {
for (auto &tcpcVal : max77759Tcpc) {
printf("%s ", tcpcVal[0]);
if (std::string::npos == std::string(file).find(i2cSubDirMatch)) {
continue;
}
std::string fileName = directory + file + "/" + std::string(tcpcVal[1]);
if (!android::base::ReadFileToString(fileName, &content)) {
continue;
}
printf("%s\n", content.c_str());
}
}
printf("\n");
}
void dumpPdEngine() {
const char* pdEngine [][2] {
{"Logbuffer TCPC", "/dev/logbuffer_usbpd"},
{"PPS-google_cpm logbuffer", "/dev/logbuffer_cpm"},
{"PPS-pca9468 logbuffer", "/dev/logbuffer_pca9468"},
{"PPS-dc_mains logbuffer", "/dev/logbuffer_dc_mains"},
{"PD Engine", "/dev/logbuffer_usbpd"},
{"PPS-google_cpm", "/dev/logbuffer_cpm"},
{"PPS-dc", "/dev/logbuffer_pca9468"},
};
for (const auto &row : pdEngine) {
@@ -310,6 +334,15 @@ void dumpWc68() {
}
}
void dumpLn8411() {
const char* ln8411Title = "LN8411";
const char* ln8411File = "/dev/logbuffer_ln8411";
if (isValidFile(ln8411File)) {
dumpFileContent(ln8411Title, ln8411File);
}
}
void dumpBatteryHealth() {
const char* batteryHealth [][2] {
{"Battery Health", "/sys/class/power_supply/battery/health_index_stats"},
@@ -329,7 +362,7 @@ void dumpBatteryHealth() {
}
void dumpBatteryDefend() {
const char* defendConfig [][3] {
const char* defendConfig [][4] {
{"TRICKLE-DEFEND Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "bd_"},
{"DWELL-DEFEND Config", "/sys/devices/platform/google,charger/", "charge_s"},
@@ -374,57 +407,6 @@ void dumpBatteryDefend() {
}
}
void dumpBatteryCaretaker() {
const char* aacpConfig [][3] {
{"AACP Version",
"/sys/devices/platform/google,battery/power_supply/battery/", "aacp_"},
{"AACR Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "aacr_"},
{"AAFV Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "aafv_"},
{"AACT Config",
"/sys/devices/platform/google,battery/power_supply/battery/", "aact_"},
{"AACC",
"/sys/devices/platform/google,battery/power_supply/battery/", "aacc"},
};
std::vector<std::string> files;
struct dirent *entry;
std::string content;
std::string fileLocation;
for (auto &config : aacpConfig) {
DIR *dir = opendir(config[1]);
if (dir == NULL)
continue;
printTitle(config[0]);
while ((entry = readdir(dir)) != NULL) {
if (std::string(entry->d_name).find(config[2]) != std::string::npos &&
strncmp(config[2], entry->d_name, strlen(config[2])) == 0) {
files.push_back(entry->d_name);
}
}
closedir(dir);
sort(files.begin(), files.end());
for (auto &file : files) {
fileLocation = std::string(config[1]) + std::string(file);
if (!android::base::ReadFileToString(fileLocation, &content) || content.empty()) {
content = "\n";
}
printf("%s: %s", file.c_str(), content.c_str());
if (content.back() != '\n')
printf("\n");
}
files.clear();
}
}
void printValuesOfDirectory(const char *directory, std::string debugfs, const char *strMatch) {
std::vector<std::string> files;
auto info = directory;
@@ -499,6 +481,7 @@ void dumpChgUserDebug() {
const std::string debugfs = "/d/";
const char *maxFgDir = "/d/maxfg";
const char *maxFgStrMatch = "maxfg";
const char *maxFg77779StrMatch = "max77779fg";
const char *chgTblName = "Charging table dump";
const char *chgTblDir = "/d/google_battery/chg_raw_profile";
@@ -506,6 +489,16 @@ void dumpChgUserDebug() {
"fg_model",
"algo_ver",
"model_ok",
"registers",
"nv_registers",
};
const char *max77779FgInfo [] {
"fg_model",
"algo_ver",
"model_ok",
"registers",
"debug_registers",
};
if (isUserBuild())
@@ -517,6 +510,10 @@ void dumpChgUserDebug() {
for (auto & directory : maxFgInfo) {
printValuesOfDirectory(directory, debugfs, maxFgStrMatch);
}
} else {
for (auto & directory : max77779FgInfo) {
printValuesOfDirectory(directory, debugfs, maxFg77779StrMatch);
}
}
}
@@ -635,27 +632,10 @@ void dumpGvoteables() {
void dumpMitigation() {
const char *mitigationList [][2] {
{"LastmealCSV" , "/data/vendor/mitigation/lastmeal.csv"},
{"Lastmeal" , "/data/vendor/mitigation/lastmeal.txt"},
{"Thismeal" , "/data/vendor/mitigation/thismeal.txt"},
};
/* parsing thismeal.bin */
int status;
int pid = fork();
if (pid < 0) {
printf("Fork failed for parsing thismeal.bin.\n");
exit(EXIT_FAILURE);
} else if (pid == 0) {
execl("/vendor/bin/hw/battery_mitigation", "battery_mitigation", "-d", nullptr);
exit(EXIT_SUCCESS);
}
waitpid(pid, &status, 0);
if (WIFSIGNALED(status)) {
printf("Failed to parse thismeal.bin.(killed by: %d)\n", WTERMSIG(status));
}
for (auto &row : mitigationList) {
if (!isValidFile(row[1]))
printTitle(row[0]);
@@ -961,21 +941,9 @@ void dumpIrqDurationCounts() {
}
}
void dumpCpuIdleHistogramStats() {
const char* cpuIdleHistogramTitle = "CPU Idle Histogram";
const char* cpuIdleHistogramFile = "/sys/kernel/metrics/cpuidle_histogram/"
"cpuidle_histogram";
const char* cpuClusterHistogramTitle = "CPU Cluster Histogram";
const char* cpuClusterHistogramFile = "/sys/kernel/metrics/"
"cpuidle_histogram/cpucluster_histogram";
dumpFileContent(cpuIdleHistogramTitle, cpuIdleHistogramFile);
dumpFileContent(cpuClusterHistogramTitle, cpuClusterHistogramFile);
}
int main() {
dumpPowerStatsTimes();
dumpAcpmStats();
dumpCpuIdleHistogramStats();
dumpPowerSupplyStats();
dumpMaxFg();
dumpPowerSupplyDock();
@@ -984,9 +952,9 @@ int main() {
dumpPdEngine();
dumpEusbRepeater();
dumpWc68();
dumpLn8411();
dumpBatteryHealth();
dumpBatteryDefend();
dumpBatteryCaretaker();
dumpChg();
dumpChgUserDebug();
dumpBatteryEeprom();

View File

@@ -1,3 +0,0 @@
on init
# for parsing thismeal.bin
chown system system /vendor/bin/hw/battery_mitigation

View File

@@ -1,2 +1,6 @@
PRODUCT_PACKAGES += dump_wlan.sh \
dump_power
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_PACKAGES_DEBUG += dump_gsa.sh
endif

View File

@@ -1,10 +1,6 @@
[
{
"repository": "device_google_gs-common",
"target_path": "device/google/gs-common"
},
{
"repository": "packages_apps_PixelParts",
"target_path": "packages/apps/PixelParts"
"repository": "device_google_gs101",
"target_path": "device/google/gs101"
}
]

View File

@@ -5,7 +5,4 @@
#
# PixelParts
#include packages/apps/PixelParts/device.mk
# UDFPS
TARGET_HAS_UDFPS += true
include packages/apps/PixelParts/device.mk

View File

@@ -0,0 +1,25 @@
//
// Copyright (C) 2022 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
sh_binary {
name: "factory_post_boot",
src: "factory_post_boot.sh",
vendor: true,
sub_dir: "factory",
}

View File

@@ -0,0 +1,4 @@
#!/vendor/bin/sh
# Add adbd to nnapi vendor cgroup. (b/222226268)
echo `pidof adbd` > /proc/vendor_sched/set_task_group_nnapi

View File

@@ -0,0 +1,15 @@
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
// all of the 'license_kinds' from "//device/google/zuma:device_google_zuma_license"
// to get the below license kinds:
// SPDX-license-identifier-Apache-2.0
default_applicable_licenses: [
"//device/google/zuma:device_google_zuma_license",
],
}
runtime_resource_overlay {
name: "FactoryOverlayFrameworkRes",
product_specific: true,
}

View File

@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2021 The Android Open Source Project
<!-- Copyright (C) 2020 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
@@ -13,15 +13,12 @@
See the License for the specific language governing permissions and
limitations under the License.
-->
<!-- Pixel specific tethering overlays -->
<!-- Pixel specific factory overlays -->
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.android.networkstack.tethering.overlay"
android:versionCode="1"
android:versionName="1.0">
package="com.android.frameworkres.overlay.factory">
<application android:hasCode="false" />
<overlay
android:targetPackage="com.android.networkstack.tethering"
android:targetName="TetheringConfig"
android:isStatic="true"
android:priority="0" />
android:targetPackage="android"
android:isStatic="true"
android:priority="2"/>
</manifest>

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

View File

@@ -0,0 +1,33 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/*
** Copyright 2023, The Android Open Source Project
**
** Licensed under the Apache License, Version 2.0 (the "License");
** you may not use this file except in compliance with the License.
** You may obtain a copy of the License at
**
** http://www.apache.org/licenses/LICENSE-2.0
**
** Unless required by applicable law or agreed to in writing, software
** distributed under the License is distributed on an "AS IS" BASIS,
** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
** See the License for the specific language governing permissions and
** limitations under the License.
*/
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Type of the tap sensor. Empty if tap is not supported. False to disable the tap sensor -->
<string name="config_dozeTapSensorType" translatable="false">false</string>
<!-- Control whether the pickup gesture is enabled by default. This value will be used
during initialization when the setting is still null. -->
<bool name="config_dozePickupGestureEnabled">false</bool>
<!-- Is the lock-screen disabled for new users by default -->
<bool name="config_disableLockscreenByDefault">true</bool>
</resources>

View File

@@ -0,0 +1,15 @@
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
// all of the 'license_kinds' from "//device/google/zuma:device_google_zuma_license"
// to get the below license kinds:
// SPDX-license-identifier-Apache-2.0
default_applicable_licenses: [
"//device/google/zuma:device_google_zuma_license",
],
}
runtime_resource_overlay {
name: "FactoryOverlayLauncher3",
product_specific: true,
}

View File

@@ -0,0 +1,25 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2020 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<!-- Pixel specific factory overlays -->
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.android.launcher3.overlay.factory">
<application android:hasCode="false" />
<overlay
android:targetPackage="com.android.launcher3"
android:targetName="favorites"
android:isStatic="true"
android:priority="2"/>
</manifest>

View File

@@ -0,0 +1,41 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2009 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<favorites xmlns:launcher="http://schemas.android.com/apk/res-auto/com.android.launcher3">
<!-- Hotseat (We use the screen as the position of the item in the hotseat) -->
<!-- Dialer, Capacity, ELabel, Language, Barcode -->
<resolve
launcher:container="-101"
launcher:screen="0"
launcher:x="0"
launcher:y="0" >
<favorite launcher:uri="#Intent;action=android.intent.action.DIAL;end" />
<favorite launcher:uri="tel:123" />
<favorite launcher:uri="#Intent;action=android.intent.action.CALL_BUTTON;end" />
</resolve>
<resolve
launcher:container="-101"
launcher:screen="4"
launcher:x="4"
launcher:y="0" >
<favorite
launcher:packageName="com.google_cte.barcodescanner"
launcher:className="com.google_cte.barcodescanner.MainActivity" />
</resolve>
</favorites>

View File

@@ -0,0 +1,15 @@
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
// all of the 'license_kinds' from "//device/google/zuma:device_google_zuma_license"
// to get the below license kinds:
// SPDX-license-identifier-Apache-2.0
default_applicable_licenses: [
"//device/google/zuma:device_google_zuma_license",
],
}
runtime_resource_overlay {
name: "FactoryOverlaySettings",
product_specific: true,
}

View File

@@ -0,0 +1,25 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2020 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<!-- Pixel specific factory overlays -->
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.android.providers.settings.overlay.factory">
<application android:hasCode="false" />
<overlay
android:targetPackage="com.android.providers.settings"
android:targetName="resources"
android:isStatic="true"
android:priority="2"/>
</manifest>

View File

@@ -0,0 +1,26 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright (c) 2009, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources>
<integer name="def_lockscreen_sounds_enabled">0</integer>
<bool name="def_lockscreen_disabled">true</bool>
<bool name="def_dtmf_tones_enabled">false</bool>
<bool name="def_sound_effects_enabled">false</bool>
<bool name="def_charging_sounds_enabled">false</bool>
<string name="def_immersive_mode_confirmations" translatable="false">confirmed</string>
</resources>

97
factory_common.mk Normal file
View File

@@ -0,0 +1,97 @@
#
# Copyright 2020 The Android Open-Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
$(call inherit-product, device/google/zuma/aosp_common.mk)
$(call inherit-product-if-exists, vendor/google_devices/zuma/factory/pixel/device-factory.mk)
PRODUCT_PROPERTY_OVERRIDES += service.adb.root=1 \
vendor.disable.thermal.control=1 \
ro.vendor.factory=1
# Factory Libraries of Audio
PRODUCT_PACKAGES += audioroute libaudioroutelite
# Enable fatp by default for factory builds
PRODUCT_SYSTEM_DEFAULT_PROPERTIES += \
persist.vendor.camera.fatp.enable=1
# Disable camera related features for factory builds
PRODUCT_PROPERTY_OVERRIDES += \
persist.vendor.camera.af.ignore_gyro=1 \
persist.vendor.camera.multicam.framesync=0 \
vendor.camera.debug.bypass_face_ssd_processor=1 \
vendor.camera.debug.csi_ebuf_enable=0 \
vendor.camera.debug.enable_face_detection=0 \
vendor.camera.debug.force_dpm_on=0 \
vendor.camera.debug.force_eis_on=0 \
vendor.camera.debug.force_eaf_on=0 \
vendor.camera.debug.force_mesh_warp_on=0 \
vendor.camera.debug.force_rectiface_node_on=0 \
vendor.camera.debug.force_steadiface_on=0 \
vendor.camera.debug.force_tnr_on=0 \
vendor.camera.debug.force_segmentation_node_on=0 \
vendor.camera.debug.enable_saliency=0 \
vendor.camera.debug.force_local_tone_mapping_on=0 \
vendor.camera.debug.local_tone_mapping_controller_v1.mode=0 \
vendor.camera.debug.enable_scene_detection=0
# Disable ScreenDecorations for factory builds
PRODUCT_PROPERTY_OVERRIDES += \
debug.disable_screen_decorations=true
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.set_idle_timer_ms?=80
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.set_touch_timer_ms=200
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.set_display_power_timer_ms=1000
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += ro.surface_flinger.use_content_detection_for_refresh_rate=true
# Disable dimming in factory
PRODUCT_DEFAULT_PROPERTY_OVERRIDES += vendor.display.0.brightness.dimming.usage=2
# factory should always has SELinux permissive
BOARD_BOOTCONFIG += androidboot.selinux=permissive
BOARD_KERNEL_CMDLINE += androidboot.selinux=permissive
# Disable DebugFS restrictions in factory builds
PRODUCT_SET_DEBUGFS_RESTRICTIONS := false
# Disable Bluetooth as default in factory build
DEVICE_PACKAGE_OVERLAYS += device/google/zuma/overlay-factory
PRODUCT_COPY_FILES += \
device/google/zuma/conf/init.factory.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.factory.rc
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/factory_boost
# Add factory-friendly changes
PRODUCT_PACKAGES += \
FactoryOverlaySettings \
FactoryOverlayLauncher3 \
FactoryOverlayFrameworkRes \
factory_post_boot
# To prevent rebooting due to crashing services
PRODUCT_SYSTEM_DEFAULT_PROPERTIES += \
init.svc_debug.no_fatal.zygote=true \
persist.device_config.configuration.disable_rescue_party=true
# PixelLogger for RF testing
PRODUCT_PACKAGES_DEBUG += \
PixelLogger \
# ModemDiagnosticSystem for desense tool
PRODUCT_PACKAGES += \
ModemDiagnosticSystem \

View File

@@ -0,0 +1,18 @@
# ----------------------------
# Add feature flags below
# ----------------------------
FPC_CONFIG_BUILD_VERSION=33
FPC_CONFIG_CAPACITIVE=1
FPC_CONFIG_MAX_NR_TEMPLATES=5
FPC_CONFIG_SENSE_TOUCH_CALIBRATION_PATH=/data/fpc/calibration_sense_touch.dat
FPC_CONFIG_TA_FS=1
FPC_DEFECTIVE_PIXEL_LIST_SIZE=5000
FPC_SENSOR_SDK_LOG_LEVEL=3
FPC_TEE_RUNTIME=TRUSTY
LIBFPC_NAME=libfpc1541_S_nav_debug.a
FPC_CONFIG_DEBUG=1
FPC_CONFIG_PRODUCT_DEFAULT=FPC_PRODUCT_TYPE1541_S
#
# File included from device/<manufacture>/<>/<device>.mk
# Packages to include into the build

View File

@@ -0,0 +1,21 @@
# ----------------------------
# Add feature flags below
# ----------------------------
FPC_CONFIG_BUILD_VERSION=33
FPC_CONFIG_CAPACITIVE=1
FPC_CONFIG_MAX_NR_TEMPLATES=5
FPC_CONFIG_NAVIGATION=0
FPC_CONFIG_SENSE_TOUCH_CALIBRATION_PATH=/data/fpc/calibration_sense_touch.dat
FPC_CONFIG_SENSORTEST=1
FPC_CONFIG_TA_FS=1
FPC_DEFECTIVE_PIXEL_LIST_SIZE=5000
FPC_SENSOR_SDK_LOG_LEVEL=3
FPC_TEE_RUNTIME=TRUSTY
LIBFPC_NAME=libfpc1541_S_nav_debug.a
FPC_CONFIG_DEBUG=1
FPC_CONFIG_ENGINEERING=1
FPC_CONFIG_PRODUCT_DEFAULT=FPC_PRODUCT_TYPE1541_S
#
# File included from device/<manufacture>/<>/<device>.mk
# Packages to include into the build

View File

@@ -0,0 +1,8 @@
# Fingerprint
include device/google/zuma/fingerprint/fpc1540/fingerprint_config.mk
PRODUCT_PACKAGES += \
android.hardware.biometrics.fingerprint@2.1-service.fpc \
PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.hardware.fingerprint.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.fingerprint.xml

View File

@@ -0,0 +1,10 @@
# Fingerprint
include device/google/zuma/fingerprint/fpc1540/fingerprint_config_factory.mk
PRODUCT_PACKAGES += \
fpc_tee_test\
SensorTestTool \
PRODUCT_PACKAGES += \
com.fingerprints.extension.xml \
com.fingerprints.extension \

View File

@@ -1,7 +1,7 @@
<manifest version="1.0" type="device">
<hal format="aidl">
<name>android.hardware.health</name>
<version>4</version>
<version>3</version>
<fqname>IHealth/default</fqname>
</hal>
</manifest>

View File

@@ -0,0 +1,24 @@
#
# Copyright (C) 2018 The Android Open-Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
on property:sys.boot_completed=1 && property:persist.vendor.limit.wlc.current=1
write /sys/class/power_supply/dc/current_max 75000
on property:sys.boot_completed=1 && property:persist.vendor.limit.wlc.current=0
write /sys/class/power_supply/dc/current_max 1100000
on property:vendor.disable.wlc=1
write /sys/class/power_supply/wireless/online 0

View File

@@ -1,6 +1,6 @@
#
# SPDX-FileCopyrightText: 2021-2024 The LineageOS Project
# SPDX-FileCopyrightText: 2021-2024 The Calyx Institute
# Copyright (C) 2023 The LineageOS Project
#
# SPDX-License-Identifier: Apache-2.0
#
@@ -16,23 +16,12 @@ PRODUCT_PRODUCT_PROPERTIES += \
ro.vendor.camera.extensions.package=com.google.android.apps.camera.services \
ro.vendor.camera.extensions.service=com.google.android.apps.camera.services.extensions.service.PixelExtensions
# EUICC
PRODUCT_PACKAGES += \
EuiccSupportPixelOverlay
# Experiments
include device/google/gs-common/performance/experiments/experiments.mk
# Google Assistant
PRODUCT_PRODUCT_PROPERTIES += ro.opa.eligible_device=true
# Lineage Health
include hardware/google/pixel/lineage_health/device.mk
$(call soong_config_set,lineage_health,charging_control_supports_deadline,true)
$(call soong_config_set,lineage_health,charging_control_supports_limit,true)
$(call soong_config_set,lineage_health,charging_control_supports_toggle,false)
# Linker config
PRODUCT_VENDOR_LINKER_CONFIG_FRAGMENTS += \
device/google/zuma/linker.config.json
@@ -41,9 +30,5 @@ PRODUCT_VENDOR_LINKER_CONFIG_FRAGMENTS += \
PRODUCT_PACKAGES += \
GoogleParts
# Tethering
PRODUCT_PACKAGES += \
TetheringOverlay
# Touch
include hardware/google/pixel/touch/device.mk

View File

@@ -1,10 +1,5 @@
{
"provideLibs": [
"liboemcrypto.so",
"lib_aion_buffer.so",
"libedgetpu_client.google.so",
"libedgetpu_tachyon.google.so",
"libedgetpu_util.so",
"libgxp.so"
"liboemcrypto.so"
]
}

View File

@@ -1,4 +1,13 @@
<manifest version="1.0" type="device" target-level="8">
<hal format="hidl">
<name>android.hardware.graphics.mapper</name>
<transport arch="32+64">passthrough</transport>
<version>4.0</version>
<interface>
<name>IMapper</name>
<instance>default</instance>
</interface>
</hal>
<hal format="aidl">
<name>android.hardware.boot</name>
<fqname>IBootControl/default</fqname>

View File

@@ -1,13 +1,12 @@
<manifest version="1.0" type="device">
<!-- AIDL fragment -->
<hal format="aidl">
<name>android.hardware.media.c2</name>
<version>1</version>
<fqname>IComponentStore/default1</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.media.c2</name>
<version>1</version>
<fqname>IComponentStore/default</fqname>
<hal format="hidl">
<name>android.hardware.media.c2</name>
<transport>hwbinder</transport>
<version>1.2</version>
<interface>
<name>IComponentStore</name>
<instance>default</instance>
<instance>default1</instance>
</interface>
</hal>
</manifest>

View File

@@ -1,5 +1,4 @@
<manifest version="1.0" type="device">
<!-- HIDL fragment -->
<hal format="hidl">
<name>android.hardware.media.c2</name>
<transport>hwbinder</transport>
@@ -9,10 +8,4 @@
<instance>default</instance>
</interface>
</hal>
<!-- AIDL fragment -->
<hal format="aidl">
<name>android.hardware.media.c2</name>
<version>1</version>
<fqname>IComponentStore/default</fqname>
</hal>
</manifest>

View File

@@ -108,7 +108,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp8.decoder" type="video/x-vnd.on2.vp8" >
<Limit name="size" min="32x32" max="3840x2160" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="1-32400" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -122,7 +122,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp9.decoder" type="video/x-vnd.on2.vp9" >
<Limit name="size" min="64x64" max="7680x4352" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="1-8160" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -137,7 +137,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp9.decoder.secure" type="video/x-vnd.on2.vp9" >
<Limit name="size" min="64x64" max="3840x2176" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="1-2040" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -222,7 +222,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp8.encoder" type="video/x-vnd.on2.vp8" >
<Limit name="size" min="32x32" max="3840x2160" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="1-32400" />
<Limit name="blocks-per-second" min="1" max="3888000" />
@@ -238,7 +238,7 @@
</MediaCodec>
<MediaCodec name="c2.exynos.vp9.encoder" type="video/x-vnd.on2.vp9" >
<Limit name="size" min="64x64" max="3840x2176" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="1-2040" />
<Limit name="blocks-per-second" min="1" max="243000" />

View File

@@ -19,7 +19,7 @@
<Decoders>
<MediaCodec name="c2.google.av1.decoder" type="video/av01">
<Limit name="size" min="96x96" max="3840x2160" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="36-32400" />
<Limit name="blocks-per-second" min="24" max="1944000" />
@@ -34,7 +34,7 @@
</MediaCodec>
<MediaCodec name="c2.google.av1.decoder.secure" type="video/av01">
<Limit name="size" min="96x96" max="3840x2160" />
<Limit name="alignment" value="1x1" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="16x16" />
<Limit name="block-count" range="36-32400" />
<Limit name="blocks-per-second" min="24" max="1944000" />
@@ -51,21 +51,20 @@
</Decoders>
<Encoders>
<MediaCodec name="c2.google.av1.encoder" type="video/av01">
<Limit name="size" min="80x80" max="3840x2176" />
<Limit name="alignment" value="1x1" />
<Limit name="size" min="64x64" max="3840x2176" />
<Limit name="alignment" value="2x2" />
<Limit name="block-size" value="64x64" />
<Limit name="block-count" range="4-2040" />
<Limit name="blocks-per-second" min="4" max="61200" />
<Limit name="block-count" range="1-2040" />
<Limit name="blocks-per-second" min="1" max="61200" />
<Limit name="bitrate" range="1-120000000" />
<Limit name="performance-point-1280x720" value="200" />
<Limit name="performance-point-1280x720" range="240" />
<Limit name="performance-point-1920x1080" value="180" />
<Limit name="performance-point-1920x1079" value="120" />
<Limit name="performance-point-3840x2160" value="60" />
<Limit name="performance-point-3840x2160" range="60" />
<Limit name="concurrent-instances" max="16" />
<Feature name="can-swap-width-height" value="1" />
<Feature name="vq-minimum-quality"/>
<Feature name="encoding-statistics"/>
<Feature name="hdr-editing" />
</MediaCodec>
</Encoders>
</MediaCodecs>

View File

@@ -37,8 +37,8 @@
<Limit name="measured-frame-rate-1920x1088" range="409-411" /> <!-- v90%=1.0 -->
</MediaCodec>
<MediaCodec name="c2.exynos.hevc.decoder" type="video/hevc" update="true">
<!-- b/385249512 -->
<Limit name="measured-frame-rate-352x288" range="420-521" /> <!-- v90%=1.0 -->
<!-- measured 90%:529-530 med:529 N=2 -->
<Limit name="measured-frame-rate-352x288" range="1150-1250" /> <!-- v90%=1.0 -->
<!-- measured 90%:528-530 med:529 N=2 -->
<Limit name="measured-frame-rate-640x360" range="528-529" /> <!-- v90%=1.0 -->
<!-- measured 90%:546-549 med:546 N=2 -->
@@ -51,8 +51,8 @@
<Limit name="measured-frame-rate-3840x2160" range="159-159" /> <!-- v90%=1.0 -->
</MediaCodec>
<MediaCodec name="c2.exynos.hevc.decoder.secure" type="video/hevc" update="true">
<!-- b/385249512 -->
<Limit name="measured-frame-rate-352x288" range="420-521" /> <!-- v90%=1.0 -->
<!-- measured 90%:529-530 med:529 N=2 -->
<Limit name="measured-frame-rate-352x288" range="1150-1250" /> <!-- v90%=1.0 -->
<!-- measured 90%:528-530 med:529 N=2 -->
<Limit name="measured-frame-rate-640x360" range="528-529" /> <!-- v90%=1.0 -->
<!-- measured 90%:546-549 med:546 N=2 -->
@@ -115,24 +115,24 @@
</MediaCodec>
<MediaCodec name="c2.android.avc.decoder" type="video/avc" update="true">
<!-- measured 90%:342-360 med:343 N=2 -->
<Limit name="measured-frame-rate-320x240" range="291-512" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-320x240" range="342-351" /> <!-- v90%=1.0 -->
<!-- measured 90%:142-147 med:143 N=2 -->
<Limit name="measured-frame-rate-720x480" range="244-474" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-720x480" range="142-145" /> <!-- v90%=1.0 -->
<!-- measured 90%:54-56 med:55 N=2 -->
<Limit name="measured-frame-rate-1280x720" range="110-209" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1280x720" range="54-55" /> <!-- v90%=1.0 -->
<!-- measured 90%:25-26 med:26 N=2 -->
<Limit name="measured-frame-rate-1920x1080" range="45-87" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1920x1080" range="25-26" /> <!-- v90%=1.0 -->
</MediaCodec>
<MediaCodec name="c2.android.hevc.decoder" type="video/hevc" update="true">
<Limit name="measured-frame-rate-352x288" range="291-512" />
<Limit name="measured-frame-rate-352x288" range="583-674" />
<!-- measured 90%:196-207 med:196 N=2 -->
<Limit name="measured-frame-rate-640x360" range="244-474" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-640x360" range="196-201" /> <!-- v90%=1.0 -->
<!-- measured 90%:177-180 med:178 N=2 -->
<Limit name="measured-frame-rate-720x480" range="232-443" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-720x480" range="177-178" /> <!-- v90%=1.0 -->
<!-- measured 90%:81-82 med:82 N=2 -->
<Limit name="measured-frame-rate-1280x720" range="171-325" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1280x720" range="81-82" /> <!-- v90%=1.0 -->
<!-- measured 90%:45-47 med:46 N=2 -->
<Limit name="measured-frame-rate-1920x1080" range="118-219" /> <!-- v90%=1.0 -->
<Limit name="measured-frame-rate-1920x1080" range="45-46" /> <!-- v90%=1.0 -->
</MediaCodec>
<MediaCodec name="c2.android.mpeg4.decoder" type="video/mp4v-es" update="true">
<Limit name="measured-frame-rate-176x144" range="1111-1176" />

1
modem/userdebug.mk Normal file
View File

@@ -0,0 +1 @@
PRODUCT_PACKAGES += vcd

View File

@@ -0,0 +1,4 @@
#name,version,ml_type,compute_enable,compute_timer,train_enable,train_timer,monitor_enable_monitor_timer,execution_type,execution_timer
fr2_bps_ml_model,0,LEGACY,true,0,false,0,false,0,SYNCHRONOUS_REGULAR,5000
sample_linear_reg,0,LEGACY,false,0,false,0,false,0,SYNCHRONOUS_REGULAR,5000
sample_fully_conn,88,LEGACY,false,0,false,0,false,0,SYNCHRONOUS_REGULAR,5000

View File

@@ -0,0 +1,23 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright (c) 2009, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources>
<!-- Don't enable BT until user wants it -->
<bool name="def_bluetooth_on">false</bool>
</resources>

View File

@@ -0,0 +1,7 @@
<resources>
<string-array name="logger_entries">
<item>shannondm</item>
<item>cnss_diag</item>
<item>brcm_gps</item>
</string-array>
</resources>

View File

@@ -0,0 +1,10 @@
<?xml version="1.0" encoding="utf-8"?>
<resources>
<string name="config_logger_default_value" translatable="false">shannondm</string>
<string name="config_cfg_default_value" translatable="false">Built-in Mask #1</string>
<!-- default config file for cnss_diag logger -->
<string name="config_cfg_default_value_cnss_diag" translatable="false">cnss_diag.conf</string>
<!-- config file to enable brcm gps logger -->
<bool name="config_brcm_gps_enabled" translatable="false">true</bool>
</resources>

View File

@@ -0,0 +1,19 @@
<?xml version="1.0" encoding="utf-8"?>
<resources>
<string-array name="config_message_no_message">
<item></item>
</string-array>
<string-array name="config_message_audio_warning">
<item>This will collect audio from your voice calls. Would you like to proceed?</item>
</string-array>
<string-array name="config_message_possible_audio_warning">
<item>This may collect audio from your voice calls. Would you like to proceed?</item>
<item>Pixel_Default.nprf</item>
<item>Built-in Mask #0</item>
<item>Built-in Mask #1</item>
<item>Built-in Mask #2</item>
<item>Built-in Mask #3</item>
</string-array>
<string name="config_privacy_warning_title">Privacy Warning</string>
<string name="default_config_selection_message">You are loading a user defined logging config. This may collect audio from your voice calls. Would you like to proceed?</string>
</resources>

View File

@@ -31,38 +31,6 @@
<!-- B y-intercept --> <item>-0.349361641294833436</item>
</string-array>
<!-- The fixed keyboard vibration strength in [0,1], or -1 to indicate the strength not fixed
and should depend on the touch feedback intensity user setting -->
<item name="config_keyboardHapticFeedbackFixedAmplitude" type="dimen">0.62</item>
<!-- Indicating if keyboard vibration settings supported or not. -->
<bool name="config_keyboardVibrationSettingsSupported">true</bool>
<!-- Indicating if ringtone vibration settings supported or not. -->
<bool name="config_ringtoneVibrationSettingsSupported">true</bool>
<!-- External display peak refresh rate for the given device. Change this value if you want to
prevent the framework from using higher refresh rates, even if display modes with higher
refresh rates are available from hardware composer. Only has an effect if this value and
config_externalDisplayPeakWidth and config_externalDisplayPeakHeight are non-zero. -->
<integer name="config_externalDisplayPeakRefreshRate">61</integer>
<!-- External display peak width for the given device. Change this value if you want
to prevent the framework from using higher resolution, even if display modes with higher
resolutions are available from hardware composer. Only has an effect if this value and
config_externalDisplayPeakRefreshRate and config_externalDisplayPeakHeight are non-zero.-->
<integer name="config_externalDisplayPeakWidth">1920</integer>
<!-- External display peak height for the given device. Change this value if you want
to prevent the framework from using higher resolution, even if display modes with higher
resolutions are available from hardware composer. Only has an effect if this value and
config_externalDisplayPeakRefreshRate and config_externalDisplayPeakWidth are non-zero. -->
<integer name="config_externalDisplayPeakHeight">1080</integer>
<!-- Enable synchronization of the displays refresh rates by applying the default low refresh
rate. -->
<bool name="config_refreshRateSynchronizationEnabled">true</bool>
<!-- List of comma separated package names for which we the system will not show crash, ANR,
etc. dialogs. -->
<string translatable="false" name="config_appsNotReportingCrashes">com.google.android.euicc</string>

View File

@@ -18,10 +18,6 @@
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Whether device has screen with higher aspect ratio -->
<bool name="config_haveHigherAspectRatioScreen">true</bool>
<!-- Defines the actions shown in advanced reboot submenu -->
<string-array name="config_restartActionsList">
<item>restart</item>

View File

@@ -20,34 +20,29 @@
<item>connectivity_thermal_power_manager/apply_action_time_seconds=10</item>
<item>connectivity_thermal_power_manager/atm_power_threshold_mw=800</item>
<item>connectivity_thermal_power_manager/cellular_thermal_adaptive_thermal_status_adaptive_action_list=</item>
<item>connectivity_thermal_power_manager/criteria_1_enabled=true</item>
<item>connectivity_thermal_power_manager/criteria_4_enabled=true</item>
<item>connectivity_thermal_power_manager/criteria_4_lte_pref_mode=3</item>
<item>connectivity_thermal_power_manager/wifi_disconnected_time_seconds=180</item>
<item>connectivity_thermal_power_manager/wifi_internet_driven_endc_product_carrier_id_set=shiba,husky,akita,komodo,tokay,caiman,comet@1,1989,2023,2576,2067,2071,2073,2577,2522,2075,2578,2083,2433,1949</item>
<!-- Live Caption (Pixel 2017 + OEM) -->
<item>device_personalization_services/Captions__allow_box_x_axis_movement=true</item>
<item>device_personalization_services/Captions__allow_use_public_speech_recognition=true</item>
<item>device_personalization_services/Captions__allow_voip_call_without_audio_recording=true</item>
<item>device_personalization_services/Captions__available_for_download=en-US;en-GB;en-CA;en-IE;en-AU;en-SG;en-IN;fr-FR;fr-CA;fr-BE;fr-CH;it-IT;it-CH;de-DE;de-AT;de-BE;de-CH;ja-JP;es-ES;es-US;cmn-Hant-TW;hi-IN;pt-BR;tr-TR;pl-PL;cmn-Hans-CN;ko-KR;ru-RU;vi-VN</item>
<item>device_personalization_services/Captions__allow_voip_call_without_audio_recording=false</item>
<item>device_personalization_services/Captions__available_for_download=en-US;en-GB;en-CA;en-IE;en-AU;en-SG;en-IN;fr-FR;fr-CA;fr-BE;fr-CH;it-IT;it-CH;de-DE;de-AT;de-BE;de-CH;ja-JP;es-ES;es-US;cmn-Hant-TW;hi-IN</item>
<item>device_personalization_services/Captions__disable_prod=false</item>
<!-- <item>device_personalization_services/Captions__enable=false</item> -->
<item>device_personalization_services/Captions__enable_activation_boost=true</item>
<item>device_personalization_services/Captions__enable_adaptive_box_width=true</item>
<item>device_personalization_services/Captions__enable_augmented_modality=true</item>
<item>device_personalization_services/Captions__enable_augmented_modality_input=true</item>
<item>device_personalization_services/Captions__enable_augmented_modality_language_detection=true</item>
<item>device_personalization_services/Captions__enable_augmented_music=true</item>
<!-- <item>device_personalization_services/Captions__enable_clearcut_logging=true</item> -->
<item>device_personalization_services/Captions__enable_drag_and_double_tap_to_resize=true</item>
<item>device_personalization_services/Captions__enable_ec_integration=false</item>
<item>device_personalization_services/Captions__enable_drag_and_double_tap_to_resize=false</item>
<item>device_personalization_services/Captions__enable_language_detection=true</item>
<item>device_personalization_services/Captions__enable_new_model_version_advanced_2023=true</item>
<item>device_personalization_services/Captions__enable_one_caption_experiment=false</item>
<item>device_personalization_services/Captions__enable_punctuations=true</item>
<item>device_personalization_services/Captions__enable_setting_page=false</item>
<item>device_personalization_services/Captions__enable_survey=false</item>
<item>device_personalization_services/Captions__enable_text_transform=true</item>
<item>device_personalization_services/Captions__enable_westworld_logging=false</item>
<item>device_personalization_services/Captions__enable_zero_day=false</item>
@@ -57,9 +52,7 @@
<item>device_personalization_services/Captions__new_model_version=20210623</item>
<item>device_personalization_services/Captions__new_model_version_advanced_2023=20230808</item>
<item>device_personalization_services/Captions__speech_threshold=0.2</item>
<item>device_personalization_services/Captions__support_lang_id_disabled_after_dismissals=true</item>
<item>device_personalization_services/Captions__supported_languages=en-US;fr-FR;it-IT;de-DE;ja-JP;es-ES;cmn-Hant-TW;hi-IN;pt-BR;tr-TR;pl-PL;cmn-Hans-CN;ko-KR;ru-RU;vi-VN</item>
<item>device_personalization_services/Captions__supported_languages_beta_quality=ja-JP;pt-BR;tr-TR;pl-PL;cmn-Hans-CN;ko-KR;ru-RU;vi-VN</item>
<item>device_personalization_services/Captions__supported_languages=en-US;fr-FR;it-IT;de-DE;ja-JP;es-ES;cmn-Hant-TW;hi-IN</item>
<item>device_personalization_services/Captions__surface_sound_events=true</item>
<item>device_personalization_services/Captions__text_transform_augmented_input=true</item>
<item>device_personalization_services/Captions__visibility_playing_duration_millis=5000</item>
@@ -67,23 +60,12 @@
<!-- Now Playing (Pixel 2017) -->
<item>device_personalization_services/NowPlaying__ambient_music_apk_music_detector_min_score=0.45</item>
<item>device_personalization_services/NowPlaying__ambient_music_download_album_art_via_astrea=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_enable_resource_download_logging=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_enhanced_metadata_shards_manifest=4003:https://storage.googleapis.com/music-iq-db/updatable_db_v4/20241015-000033/manifest.json</item>
<item>device_personalization_services/NowPlaying__ambient_music_get_model_state_cooldown_seconds_cloud_search=9</item>
<item>device_personalization_services/NowPlaying__ambient_music_index_manifest_17_09_02=3105:https://storage.googleapis.com/music-iq-db/updatable_db_v3/20241013-030037/manifest.json</item>
<item>device_personalization_services/NowPlaying__ambient_music_index_manifest_17_09_02=3082:https://storage.googleapis.com/music-iq-db/updatable_db_v3/20240421-030101/manifest.json</item>
<item>device_personalization_services/NowPlaying__ambient_music_matcher_match_threshold_17_09_02=1.0E-6</item>
<item>device_personalization_services/NowPlaying__ambient_music_on_demand_enabled=true</item>
<item>device_personalization_services/NowPlaying__ambient_music_on_demand_music_confidence=0.48</item>
<item>device_personalization_services/NowPlaying__ambient_music_on_demand_search_use_new_opt_in_flow=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_show_album_art=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_support_dsp_model_tflite_p6=true</item>
<item>device_personalization_services/NowPlaying__ambient_music_use_enhanced_matches_database=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_use_metadata_shards_database=false</item>
<item>device_personalization_services/NowPlaying__ambient_music_use_yt_domain_fife_urls=false</item>
<item>device_personalization_services/NowPlaying__cloud_api_allowed=true</item>
<item>device_personalization_services/NowPlaying__create_shortcut_on_np_enabled=false</item>
<item>device_personalization_services/NowPlaying__default_music_player_setting=false</item>
<item>device_personalization_services/NowPlaying__dsp_model_checksum_enabled=true</item>
<!-- <item>device_personalization_services/NowPlaying__enable_usage_fa=true</item> -->
<item>device_personalization_services/NowPlaying__favorites_enabled=true</item>
@@ -97,7 +79,6 @@
<item>device_personalization_services/NowPlaying__on_demand_hide_if_fingerprinter_install_not_confirmed=true</item>
<item>device_personalization_services/NowPlaying__on_demand_min_supported_aga_version=12.35.17</item>
<item>device_personalization_services/NowPlaying__on_demand_retry_fingerprinter_install=true</item>
<item>device_personalization_services/NowPlaying__shortcut_direct_create_enabled=false</item>
<item>device_personalization_services/NowPlaying__youtube_export_enabled=true</item>
<!-- Adaptive Sound (Pixel 2020) -->
@@ -125,10 +106,8 @@
<item>device_personalization_services/Translate__enable_default_langid_model=true</item>
<item>device_personalization_services/Translate__enable_dictionary_langid_detection=true</item>
<item>device_personalization_services/Translate__enable_opmv4_service=true</item>
<item>device_personalization_services/Translate__enable_settings_backup_restore=false</item>
<item>device_personalization_services/Translate__enable_setup_wizard_dialog_v2=false</item>
<item>device_personalization_services/Translate__enable_spa_setting=false</item>
<item>device_personalization_services/Translate__enable_translate_kit_api_migration=false</item>
<item>device_personalization_services/Translate__interpreter_source_languages=de,en,ja,es,fr,it</item>
<item>device_personalization_services/Translate__interpreter_target_languages=de,en,ja,es,fr,it</item>
<item>device_personalization_services/Translate__replace_auto_translate_copied_text_enabled=true</item>

View File

@@ -74,9 +74,6 @@
<!-- If this is true, the screen will come on when you unplug usb/power/whatever. -->
<bool name="config_unplugTurnsOnScreen">true</bool>
<bool name="config_use_tiered_cached_adj">false</bool>
<!-- If device supports pickup/lift gesture -->
<bool name="config_dozePulsePickup">true</bool>
@@ -244,6 +241,12 @@
<item>"/system_ext/priv-app/SystemUI/SystemUI.apk"</item>
</string-array>
<!-- Should the pinner service pin the Home application? -->
<bool name="config_pinnerHomeApp">true</bool>
<!-- Bytes that the PinnerService will pin for WebView -->
<integer name="config_pinnerWebviewPinBytes">20971520</integer>
<!-- The default intensity level for alarm vibrations. See
Settings.System.ALARM_VIBRATION_INTENSITY more details on the constant values and
meanings. -->
@@ -273,9 +276,6 @@
<!-- Enable Zram writeback feature to allow unused pages in zram be written to flash. -->
<bool name="config_zramWriteback">true</bool>
<!-- the number of the max cached processes in the system. -->
<integer name="config_customizedMaxCachedProcesses">1024</integer>
<!-- Boolean indicating if restoring network selection should be skipped -->
<!-- The restoring is handled by modem if it is true -->
<bool translatable="false" name="skip_restoring_network_selection">true</bool>
@@ -307,11 +307,4 @@
<!-- Pre-scale volume at volume step 3 for Absolute Volume -->
<fraction name="config_prescaleAbsoluteVolume_index3">100%</fraction>
<!-- Whether to enable usb state update via udc sysfs. -->
<bool name="config_enableUdcSysfsUsbStateUpdate">true</bool>
<!-- Whether desktop mode is supported on the current device -->
<bool name="config_isDesktopModeSupported">true</bool>
</resources>

View File

@@ -0,0 +1,22 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright (c) 2020, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Content description of the data connection type 5G UW. [CHAR LIMIT=NONE] -->
<string name="data_connection_5g_plus" translatable="false">5G UW</string>
</resources>

View File

@@ -0,0 +1,22 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright (c) 2020, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Content description of the data connection type 5G UW. [CHAR LIMIT=NONE] -->
<string name="data_connection_5g_plus" translatable="false">5G UW</string>
</resources>

42
pixelstats/Android.bp Normal file
View File

@@ -0,0 +1,42 @@
//
// Copyright (C) 2017 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package {
// See: http://go/android-license-faq
// A large-scale-change added 'default_applicable_licenses' to import
// all of the 'license_kinds' from "//device/google/zuma:device_google_zuma_license"
// to get the below license kinds:
// SPDX-license-identifier-Apache-2.0
default_applicable_licenses: [
"//device/google/zuma:device_google_zuma_license",
],
}
cc_binary {
name: "pixelstats-vendor",
init_rc: ["pixelstats-vendor.zuma.rc"],
srcs: [
"service.cpp",
],
shared_libs: [
"libbase",
"liblog",
"libutils",
"libpixelstats",
],
proprietary: true,
static_libs: ["chre_client"],
header_libs: ["chre_api"],
}

View File

@@ -0,0 +1,11 @@
on property:sys.boot_completed=1
chown system system /sys/class/power_supply/maxfg_base/fg_learning_events
chown system system /sys/class/power_supply/maxfg/fg_learning_events
start vendor.pixelstats_vendor
on post-fs-data
chown system system /sys/kernel/metrics/irq/stats_reset
service vendor.pixelstats_vendor /vendor/bin/pixelstats-vendor
class hal
user system
group system context_hub readproc
disabled

151
pixelstats/service.cpp Normal file
View File

@@ -0,0 +1,151 @@
/*
* Copyright (C) 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define LOG_TAG "pixelstats"
#include <android-base/logging.h>
#include <pixelstats/SysfsCollector.h>
#include <pixelstats/UeventListener.h>
#include <thread>
#include <pixelstats/SysfsCollector.h>
#include <pixelstats/UeventListener.h>
using android::hardware::google::pixel::SysfsCollector;
using android::hardware::google::pixel::UeventListener;
#define UFSHC_PATH(filename) "/dev/sys/block/bootdevice/" #filename
#define UFS_ERR_PATH(err_type) UFSHC_PATH(err_stats/) #err_type
const struct SysfsCollector::SysfsPaths sysfs_paths = {
.SlowioReadCntPath = UFSHC_PATH(slowio_read_cnt),
.SlowioWriteCntPath = UFSHC_PATH(slowio_write_cnt),
.SlowioUnmapCntPath = UFSHC_PATH(slowio_unmap_cnt),
.SlowioSyncCntPath = UFSHC_PATH(slowio_sync_cnt),
.CycleCountBinsPath = "/sys/class/power_supply/battery/cycle_counts",
.UFSLifetimeA = UFSHC_PATH(health_descriptor/life_time_estimation_a),
.UFSLifetimeB = UFSHC_PATH(health_descriptor/life_time_estimation_b),
.UFSLifetimeC = UFSHC_PATH(health_descriptor/life_time_estimation_c),
.F2fsStatsPath = "/sys/fs/f2fs/",
.ImpedancePath = "/sys/devices/platform/audiometrics/speaker_impedance",
.CodecPath = "/sys/devices/platform/audiometrics/codec_state",
.EEPROMPath = "/dev/battery_history",
.MitigationPath = "/sys/devices/virtual/pmic/mitigation",
.MitigationDurationPath = "/sys/devices/virtual/pmic/mitigation/irq_dur_cnt",
.BrownoutReasonProp = "vendor.brownout_reason",
.BrownoutLogPath = "/data/vendor/mitigation/lastmeal.txt",
.SpeakerTemperaturePath = "/sys/devices/platform/audiometrics/speaker_temp",
.SpeakerExcursionPath = "/sys/devices/platform/audiometrics/speaker_excursion",
.SpeakerHeartBeatPath = "/sys/devices/platform/audiometrics/speaker_heartbeat",
.UFSErrStatsPath = {
UFS_ERR_PATH(pa_err_count),
UFS_ERR_PATH(dl_err_count),
UFS_ERR_PATH(nl_err_count),
UFS_ERR_PATH(tl_err_count),
UFS_ERR_PATH(dme_err_count),
UFS_ERR_PATH(fatal_err_count),
UFS_ERR_PATH(auto_hibern8_err_count)
},
.AmsRatePath = "/sys/devices/platform/audiometrics/ams_rate_read_once",
.ThermalStatsPaths = {
"/sys/devices/platform/100a0000.BIG/trip_counter",
"/sys/devices/platform/100a0000.MID/trip_counter",
"/sys/devices/platform/100a0000.LITTLE/trip_counter",
"/sys/devices/platform/100b0000.G3D/trip_counter",
"/sys/devices/platform/100b0000.TPU/trip_counter",
"/sys/devices/platform/100b0000.AUR/trip_counter",
},
.ResumeLatencyMetricsPath = "/sys/kernel/metrics/resume_latency/resume_latency_metrics",
.LongIRQMetricsPath = "/sys/kernel/metrics/irq/long_irq_metrics",
.StormIRQMetricsPath = "/sys/kernel/metrics/irq/storm_irq_metrics",
.IRQStatsResetPath = "/sys/kernel/metrics/irq/stats_reset",
.TempResidencyAndResetPaths = {
{
"/sys/kernel/metrics/thermal/tr_by_group/tmu/stats",
"/sys/kernel/metrics/thermal/tr_by_group/tmu/stats_reset"
},
{
"/sys/kernel/metrics/thermal/tr_by_group/spmic/stats",
"/sys/kernel/metrics/thermal/tr_by_group/spmic/stats_reset"
}
},
.ModemPcieLinkStatsPath = "/sys/devices/platform/12100000.pcie/link_stats",
.WifiPcieLinkStatsPath = "/sys/devices/platform/13120000.pcie/link_stats",
.DisplayStatsPaths = {
"/sys/devices/platform/exynos-drm/primary-panel/error_count_te",
"/sys/devices/platform/exynos-drm/primary-panel/error_count_unknown",
"/sys/devices/platform/exynos-drm/secondary-panel/error_count_te",
"/sys/devices/platform/exynos-drm/secondary-panel/error_count_unknown",
},
.PDMStatePath = "/sys/devices/platform/audiometrics/pdm_state",
.WavesPath = "/sys/devices/platform/audiometrics/waves",
.AdaptedInfoCountPath = "/sys/devices/platform/audiometrics/adapted_info_active_count",
.AdaptedInfoDurationPath = "/sys/devices/platform/audiometrics/adapted_info_active_duration",
.CCARatePath = "/sys/devices/platform/audiometrics/cca_count_read_once",
.PcmLatencyPath = "/sys/devices/platform/audiometrics/pcm_latency",
.PcmCountPath = "/sys/devices/platform/audiometrics/pcm_count",
.TotalCallCountPath = "/sys/devices/platform/audiometrics/call_count",
.OffloadEffectsIdPath = "/sys/devices/platform/audiometrics/offload_effects_id",
.OffloadEffectsDurationPath = "/sys/devices/platform/audiometrics/offload_effects_duration",
.BluetoothAudioUsagePath = "/sys/devices/platform/audiometrics/bt_usage",
.GMSRPath = {
"/sys/class/power_supply/maxfg/gmsr",
"/sys/class/power_supply/maxfg_base/gmsr",
},
.DisplayPortStatsPaths = {
"/sys/devices/platform/exynos-drm/displayport/drm-displayport-stats/link_negotiation_failures",
"/sys/devices/platform/exynos-drm/displayport/drm-displayport-stats/edid_read_failures",
"/sys/devices/platform/exynos-drm/displayport/drm-displayport-stats/dpcd_read_failures",
"/sys/devices/platform/exynos-drm/displayport/drm-displayport-stats/edid_invalid_failures",
"/sys/devices/platform/exynos-drm/displayport/drm-displayport-stats/sink_count_invalid_failures",
"/sys/devices/platform/exynos-drm/displayport/drm-displayport-stats/link_unstable_failures",
},
.HDCPStatsPaths = {
"/sys/devices/platform/hdcp/hdcp2_success_count",
"/sys/devices/platform/hdcp/hdcp2_fallback_count",
"/sys/devices/platform/hdcp/hdcp2_fail_count",
"/sys/devices/platform/hdcp/hdcp1_success_count",
"/sys/devices/platform/hdcp/hdcp1_fail_count",
"/sys/devices/platform/hdcp/hdcp0_count",
}
};
const struct UeventListener::UeventPaths ueventPaths = {
.AudioUevent = "/devices/virtual/amcs/amcs",
.TypeCPartnerUevent = "PRODUCT_TYPE=",
.FGLearningPath = {
"/sys/class/power_supply/maxfg/fg_learning_events",
"/sys/class/power_supply/maxfg_base/fg_learning_events"
},
.FwUpdatePath = "",
.FGModelLoadingPath = {
"/sys/class/power_supply/maxfg/m5_model_state",
"/sys/class/power_supply/maxfg_base/m5_model_state"
}
};
int main() {
LOG(INFO) << "starting PixelStats";
UeventListener ueventListener(ueventPaths);
std::thread listenThread(&UeventListener::ListenForever, &ueventListener);
listenThread.detach();
SysfsCollector collector(sysfs_paths);
collector.collect(); // This blocks forever.
return 0;
}

View File

@@ -282,7 +282,7 @@ void addSoC(std::shared_ptr<PowerStats> p) {
}
void setEnergyMeter(std::shared_ptr<PowerStats> p) {
std::vector<std::string> deviceNames { "s2mpg14-odpm", "s2mpg15-odpm" };
std::vector<const std::string> deviceNames { "s2mpg14-odpm", "s2mpg15-odpm" };
p->setEnergyMeterDataProvider(std::make_unique<IioEnergyMeterDataProvider>(deviceNames, true));
}

View File

@@ -1,9 +0,0 @@
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
runtime_resource_overlay {
name: "TetheringOverlay",
sdk_version: "current",
product_specific: true
}

View File

@@ -1,46 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
/*
* Copyright (C) 2021 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<resources>
<!-- List of regexpressions describing the interface (if any) that represent tetherable
USB interfaces. If the device doesn't want to support tethering over USB this should
be empty. An example would be "usb.*" -->
<string-array translatable="false" name="config_tether_usb_regexs">
<item>rndis\\d</item>
</string-array>
<!-- List of regexpressions describing the interface (if any) that represent tetherable
NCM interfaces. If the device doesn't want to support tethering over NCM this should
be empty. -->
<string-array translatable="false" name="config_tether_ncm_regexs">
<item>ncm\\d</item>
</string-array>
<!-- List of regexpressions describing the interface (if any) that represent tetherable
Wifi P2P interfaces. If the device doesn't want to support tethering over Wifi P2p this
should be empty. An example would be "p2p-p2p\\d-.*" -->
<string-array translatable="false" name="config_tether_wifi_p2p_regexs">
<item>p2p-p2p\\d-.*</item>
<item>p2p\\d</item>
<item>p2p-wlan\\d-.*</item>
</string-array>
<!-- Which USB function should be enabled when TETHERING_USB is requested. 0: RNDIS, 1: NCM.
-->
<integer translatable="false" name="config_tether_usb_functions">1</integer>
</resources>

View File

@@ -1,28 +1,33 @@
-----BEGIN CERTIFICATE-----
MIIFxjCCA66gAwIBAgIURH+ESClecwsP2Et2gQ1RAHxabWcwDQYJKoZIhvcNAQELBQAwdDELMAkGA
1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBg
NVBAoTC0dvb2dsZSBJbmMuMRAwDgYDVQQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMB4XDTE
5MDIyODE5MjIxNloXDTQ5MDIyODE5MjIxNlowdDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlm
b3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBgNVBAoTC0dvb2dsZSBJbmMuMRAwDgYDV
QQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCg
KCAgEA5AVOe4SKiCOnR4DQ2V3sIo5LNpGtmdzZ54MnHIrsSX8n43xtCTpfQWDWnDZFCIHSmR8KAOQ
0BNxL8ajtr66gU6tFzD5Vlistwl9P9uUlYWgGaeyEoOUqtiN2HtsJDpcCLYKOz6oH2c5NeruDp5n/
Z49xpXXXLgoOTlsoS65tsTcWFrcSuuOE40UyFJ+Rwhh1EiXGPvT99gaXNnDq5WIsPNNe39jV7f01l
Zs/g5iUn4dVA/DxLMam/CQh7qQkh6qWkDL8koQ21N9xEZYTR8qvGvgz3Zd1yfT0P1HsgJaPXK5Fqb
2vLV1NP8KoYIlB2KqadCn+HJjIgH8UIbB+R8o6KuWCYzLb5vPs87HkXG5/Y+GB7HrCIC+6a8BJ4UU
yjUkg/HtBd7GlEixZKLtbcJ3erdfL7uigjCJEqAYDXr2Zes31898ePcl3YQO5/rHobB7f4w3iF/Tw
IAAyRRlOceoskCEa/vCbmb7I8HQIJthSNedWcBiKUneohCtfLT3qS0JUVZewiFRMOVD8mwcZFr4o/
UfVslEe8DpBp0WXs/83OeEJdtfRc861jdOJ7EIyfDmBX91iWgLCBgv6aXtMvP7CwgZV7y+C+Wbbsj
YTYSjsNVSA1uexVPozsSkIjxote0aAiu6+b8LAq9bq2c6Yc6MoldgBqlfcwvFzlKqlm966q6UCAwE
AAaNQME4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUuH5K2ov/9L++x+8UhrCDhNdJm6EwHwYDVR0j
BBgwFoAUuH5K2ov/9L++x+8UhrCDhNdJm6EwDQYJKoZIhvcNAQELBQADggIBAIV1Wx+iwchzxx+gg
bWlmJx+oPya2axvj8cgbLGujxI+nmtY2b7UvzazggubioxJJW7rzemLMDwfKPlfiZkIeQmBe2YJhH
iwIPaRAB2juZTfQARsEkd4qYvcIDui6PbbgitLWOh3lYNDcVe/c8+EwbJuNNSqjPwIZvj2lodTQNI
7uUy1ff5hytHsznObr/rh+MeJlKKY56JL6VEzsD694iVFxJ7f4FXK5Y0pjqYmGj1krcfMFoxHPAmj
57yf3VVzeGKx5re+5WIMe5K0RZB9IWxfvx1DsxXvzVeaHYW/c6VF7TVT/RUV+iLtst+1A1RJbeXDu
3uLHxPAC44WUb3FQOUKPRP2cIul70ifJSbvu+qLuyfgwltXyYIeQMSrUw4WK6NMNYaIPgEq1BX4rL
UlKxlH4xaNwT5ZCWLTRdWozYP5FFSMdQhhOb1Ki81wKmr1f9EkXoW9eGRZBj3tAg90k0qltel30eL
pW6gmnNg+la84nyaXfBF3vQAbaAuW5D3TAMWR/Wl6nHoPItdrXHkyMRvQkzx2ezKz61ZP3uDfEZvM
LXR0lle8s6pTZB3GLS4mY9LFQdDwPlc1xk8yEcdnUAZs+9U6zZF1+FKSgb3UNy81g2DHUMp0FCBXT
y+kLm0LQVYU91kLd+fTkmgkWl4xSyXeV5g3FFuiv9ahl7//vvCG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-----END CERTIFICATE-----

View File

@@ -14,7 +14,6 @@
/vendor/lib(64)?/libGralloc4Wrapper\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/pixel-power-ext-V1-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/android\.frameworks\.stats-V1-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/android\.frameworks\.stats-V2-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/vendor-pixelatoms-cpp\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/libprotobuf-cpp-lite-(\d+\.){2,3}so u:object_r:same_process_hal_file:s0

View File

@@ -64,14 +64,13 @@ genfscon sysfs /devices/platform/google,usbc_port_cooling_dev/cleared_time
genfscon sysfs /devices/platform/google,usbc_port_cooling_dev/hysteresis_time u:object_r:sysfs_usbc_throttling_stats:s0
genfscon sysfs /devices/platform/google,usbc_port_cooling_dev/trip_time u:object_r:sysfs_usbc_throttling_stats:s0
# ARM ETE
genfscon sysfs /devices/platform/ete0 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete1 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete2 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete3 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete4 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete5 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete6 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete7 u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/ete8 u:object_r:sysfs_devices_cs_etm:s0
# Coresight ETM
genfscon sysfs /devices/platform/2b840000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2b940000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2ba40000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2bb40000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2bc40000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2bd40000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2be40000.etm u:object_r:sysfs_devices_cs_etm:s0
genfscon sysfs /devices/platform/2bf40000.etm u:object_r:sysfs_devices_cs_etm:s0

View File

@@ -1,6 +1,4 @@
# Vendor
vendor_internal_prop(vendor_nfc_prop)
vendor_restricted_prop(vendor_nfc_antenna_prop)
vendor_internal_prop(vendor_secure_element_prop)
vendor_internal_prop(vendor_battery_profile_prop)
vendor_internal_prop(vendor_camera_prop)
@@ -8,7 +6,6 @@ vendor_internal_prop(vendor_camera_fatp_prop)
vendor_internal_prop(vendor_ro_sys_default_prop)
vendor_internal_prop(vendor_persist_sys_default_prop)
vendor_internal_prop(vendor_display_prop)
vendor_internal_prop(vendor_persist_prop)
# UWB calibration
system_vendor_config_prop(vendor_uwb_calibration_prop)

View File

@@ -3,7 +3,6 @@ persist.vendor.testing_battery_profile u:object_r:vendor_battery_profile_pro
# NFC
persist.vendor.nfc. u:object_r:vendor_nfc_prop:s0
persist.vendor.nfc.antenna. u:object_r:vendor_nfc_antenna_prop:s0
# SecureElement
persist.vendor.se. u:object_r:vendor_secure_element_prop:s0

View File

@@ -0,0 +1 @@
rlsservice u:object_r:rls_service:s0

View File

@@ -5,7 +5,6 @@ init_daemon_domain(cbd)
set_prop(cbd, vendor_modem_prop)
set_prop(cbd, vendor_cbd_prop)
set_prop(cbd, vendor_rild_prop)
get_prop(cbd, telephony_modem_prop)
allow cbd mnt_vendor_file:dir r_dir_perms;

View File

@@ -1,28 +1,29 @@
-----BEGIN CERTIFICATE-----
MIIF1TCCA72gAwIBAgIVAPZ4KZV2jpxRBCoVAidCu62l3cDqMA0GCSqGSIb3DQEBCwUAMHsxCzAJB
gNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MRQwEg
YDVQQKEwtHb29nbGUgSW5jLjEQMA4GA1UECxMHQW5kcm9pZDEXMBUGA1UEAwwOY29tX2dvb2dsZV9
tZHMwHhcNMTkwNDIyMTQ1NzA1WhcNNDkwNDIyMTQ1NzA1WjB7MQswCQYDVQQGEwJVUzETMBEGA1UE
CBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEUMBIGA1UEChMLR29vZ2xlIEluY
y4xEDAOBgNVBAsTB0FuZHJvaWQxFzAVBgNVBAMMDmNvbV9nb29nbGVfbWRzMIICIjANBgkqhkiG9w
0BAQEFAAOCAg8AMIICCgKCAgEAqgNC0hhI3NzaPUllJfe01hCTuEpl35D02+DKJ5prPFxv6KGTk6s
kjZOwV87Zf2pyj/cbnv28ioDjwvqMBe4ntFdKtH9gl2tTAVl69HMKXF4Iny/wnrt2mxzhWxFUd5Pu
W+mWug+UQw/NGUuaf5d/yys/RrchHKM1+zBV6aOzH6BXiwDoOF2i43d5GlNQ/tFuMySWLJftJN0QU
LFelxNDFFJZhw2P3c4opxjmF2yCoIiDfBEIhTZFKUbHX6YDLXmtUpXl35q+cxK4TCxPURyzwdfiyh
eF3TTxagfzhvXNg/ifrY67S4qCGfzoEMPxrTz02gS0u3D6r/2+hl9vAJChLKDNdIs6TqIw+YnABrE
LiZLLFnaABnjQ7xC3xv1s3W6dWxaxnoVMtC1YvdgwhC5gSpJ4A+AGcCLv96hoeB1IIoGV9Yt0Z97M
FpXeHFpAxFZ1F9feBqwOCDbu50dmdKZvqGHZ4Ts3uy7ukDQ08dquHpT+NmqkmmW5GGhkuyZS3HHpU
/QeVsZiyJCJBbDe5lz6NGXK56ruuF9ILeGHtldjQm40oYRc01ESScyVjSU0kpMOC7hn1B7rKAm8xx
G7eH04ieQrNnbbee7atOO4C3157W5CqujfLMeo6OCRVtcYkYIuSi8hIPNySu/qOaEtEP4owVNZR0H
6mCHy5pANsyBofMkCAwEAAaNQME4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUgk8pmLx8yP3RILwR
5am1G10PBEowHwYDVR0jBBgwFoAUgk8pmLx8yP3RILwR5am1G10PBEowDQYJKoZIhvcNAQELBQADg
gIBAC9iQ1huo6CzjcsB1IIw3WYPYVfHtvG7fiB49QO6cjth8fxM36YOxnMzK9Zh89cnFx7BeXG4Md
bR3lAWO+wTbEpM/5azAQfqHB/ZEEAo1THtqS58C1bTwJ5zxkA+wL/x1ucTEV0QZtPHC1K5nIV5FuI
CiJjui5FHfj2HYu2A5a5729rdZ7sL8Vgx6TUFKpEPs5iCrlx5X/E+/wJaDM5iIjVvrGJJq0VWHHeD
JEE+Sw1CDxWYRzvu1WvCvhk149hf4LlfrR0A5t8QJRGx0WwF10DLGgJx7epMBpzhMIXc529FTIx4R
x2PcufjTZC9EN7PkLgVfYahWEkt/YIfV/0F6U6viLxdNC5O0pimSV57vT6HIthX1OC34eZca0cPqH
1kOuhRDKOhbP4yIgdYX6knpvw8aXsYcyTfAmDyrt0EWffeBPedaxMoxfijdlsBQUymviUQ8qBbfl1
Ew9VoC+VEsiobK7Ubog0IK+82LQ7FOLMoNYnhk5wJ63i1kVvBVAgH64PMME2KG//BwYFfKK6jUXib
abyNke72+1Jr0xpw1BHJPxNJ8Q8yCBLF0wmXmFJSM+9lSDd10BniFJeMFMQ0T1Sf8GUSIxYYbMK5p
DguRs+JOYkUID02ylJ3L6GAnxXCjGWzpdxw29/WWJc+qsYFEIbPkKzTUNQHaaLHmcLK22Ht
MIIFxjCCA66gAwIBAgIUHaTgvNgfCuCnEGvjMtysCgoCclIwDQYJKoZIhvcNAQELBQAwdDELMAkG
A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDAS
BgNVBAoTC0dvb2dsZSBJbmMuMRAwDgYDVQQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMB4X
DTE5MDQyMjE0NTcwNVoXDTQ5MDQyMjE0NTcwNVowdDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNh
bGlmb3JuaWExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBgNVBAoTC0dvb2dsZSBJbmMuMRAw
DgYDVQQLEwdBbmRyb2lkMRAwDgYDVQQDEwdBbmRyb2lkMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A
MIICCgKCAgEAwrx6YQqIIvZEULv/1AAF8HR4t0kPnZsgGwoR3SrumpGCNRPjAN8yztJi6fdNZSLn
lj7giXZm16lDTWQ+/bKwuDof5adaRuE7nrf2oVTzRQ3Z1XFcw0400mQ0EHZYTBV6wgl9/K4zepIi
/149Vyy0ynkiB3kmZYCDS6VfOvHHyqxxuKlwF2ry0YILGo3PwaNDiONizpq2RtLNIYseyK6ow5QH
wHtL81n8bc3bIbwJjrKnCef2WDEy8ZaVMyLIYZwYZ3rw4MLQVF5Pqy93RKMfz7ZzJaERlwWsqz01
2Ae1QpP82MBQVMoAUhjFKO3XAlD1592nx1zNzf5kpwGhTEpSWrnVS3UUW3ISBactM/fihmjOot5S
UXidLa0W2FvJuLDn0XL7TnwLU8MOekesKKQQa17ESEGTpSlJP3nw/xccbaYAzXof6yRJ3iJnNsGG
2njAxC9XqxwaaV4PsomfFueqgx0u3wQsPWskTbRgLQK3z/V8+hoTxsrZ4VE23DZ3z4vz4CXn/1Iz
up7Gceun4cBqEYz+leVsc3ML28dsbOmoju910uOeCH28D6aDHRKzsGClj09bUeL/ZpStLEPA1AU+
Nju2Y7rQI1T0l7tWIhKq5W6pPPpZcePNNflLvF72gudEa5v/PQGjWmElXOEMmzpRhqZovaDbcpej
CWu11DeYtfkCAwEAAaNQME4wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQUEdfzOO0hHPuLPlpdLAtl
gtAUNckwHwYDVR0jBBgwFoAUEdfzOO0hHPuLPlpdLAtlgtAUNckwDQYJKoZIhvcNAQELBQADggIB
AHUv2QmPiuvFHmroIn0GztonAEKcHYENCKvC7nDGrj7MedD46Fn7mC1Nej2yuXM8KOkpjapjOA9o
4ggV75R28HDkHP3Ies1xK1TejPGekxfvvLP+RmWFJPiuKaVhwn78BM4IWSSqKA3vh/pZH+OqK8kO
HK1BpFkwvlyira025XGnCPWzBNij9pMqioUpGjz3Pp7cw2iPY1tTlcmYXsCns7AbZ9Z3YNav7Zx6
jku9aJRsdAtW3tfKi4rmuh0VAYVmlp4BmcVkmRKozYn8QKyB/PAhGbDAnIwDzoHsrFvwxpKwMJJs
JFVumvh9JrGq0YvY6R52DzA7+KvWkAMe22JXW70EhSZ8QD5t7WphZ683Hpjf5fWpWXcU/fUqkihi
HPy9ogiNlJ5hYaDMbkKyA2vzsagJorK4V1pXg3gk7D96MOE5wFSROd/WQit8W+4ApkF3DOIjyCEC
KHAZVkcp8nx//hs50GoirtUhLpj4PcYHUg6I2c+Gx/krSOQD/fxuC7PWxE5whIZRBaXIkHWALufR
e7eeFI9peEu/nvn/MjNXyVoUbuQ3Ja4QFt+Ku7+KU+numH8ajBCzaPeu6bxosVNXyiDAxDI+Tfuk
jn37lHw/TQ8athakHqhxg63+nwsbnkyd0S1qPG38ocHqLliPBVz8nntcmUR1PdeFZpvGGlD83sJV
-----END CERTIFICATE-----

View File

@@ -1,60 +0,0 @@
type copy_efs_files_to_data, domain;
type copy_efs_files_to_data_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(copy_efs_files_to_data);
# Allow creating files on /data/vendor/copied
allow copy_efs_files_to_data modem_efs_image_file:dir { create_dir_perms };
allow copy_efs_files_to_data modem_efs_image_file:file { create_file_perms };
allow copy_efs_files_to_data modem_efs_image_file:lnk_file { create_file_perms };
# Allow execute binaries from /vendor/bin
allow copy_efs_files_to_data vendor_toolbox_exec:file rx_file_perms;
allow copy_efs_files_to_data vendor_shell_exec:file rx_file_perms;
# Allow execute /vendor/bin/dump.f2fs
allow copy_efs_files_to_data vendor_file:file { getattr execute_no_trans };
# Allow execute dump.f2fs to dump files from /dev/block/by-name/efs
allow copy_efs_files_to_data block_device:dir search;
allow copy_efs_files_to_data efs_block_device:blk_file r_file_perms;
allow copy_efs_files_to_data modem_userdata_block_device:blk_file r_file_perms;
allow copy_efs_files_to_data persist_block_device:blk_file r_file_perms;
# Allow checking if /data/vendor/copied/[efs/efs_backup/persist] exist
allow copy_efs_files_to_data modem_efs_file:dir getattr;
allow copy_efs_files_to_data modem_userdata_file:dir getattr;
allow copy_efs_files_to_data persist_file:dir getattr;
allow copy_efs_files_to_data sysfs_scsi_devices_0000:dir r_dir_perms;
allow copy_efs_files_to_data sysfs_scsi_devices_0000:file r_file_perms;
# dump.f2fs need to restore file permissions after dumping
# files from an f2fs image
allow copy_efs_files_to_data self:capability chown;
allow copy_efs_files_to_data self:capability fowner;
allow copy_efs_files_to_data kmsg_debug_device:chr_file { w_file_perms ioctl getattr };
# Should not write to any block devices. Only read from block device
# and dump files to /data/vendor/copied
dontaudit copy_efs_files_to_data dev_type:blk_file write;
# Setting xattr requires sys_admin
dontaudit copy_efs_files_to_data self:capability sys_admin;
# dump.f2fs would attempt to restore selinux on dumped files, but we
# will use restorecon to do the job.
dontaudit copy_efs_files_to_data modem_efs_image_file:dir relabelfrom;
dontaudit copy_efs_files_to_data modem_efs_image_file:file relabelfrom;
dontaudit copy_efs_files_to_data modem_efs_file:dir relabelto;
dontaudit copy_efs_files_to_data modem_efs_file:file relabelto;
dontaudit copy_efs_files_to_data modem_userdata_file:dir relabelto;
dontaudit copy_efs_files_to_data modem_userdata_file:file relabelto;
dontaudit copy_efs_files_to_data vendor_persist_type:dir relabelto;
dontaudit copy_efs_files_to_data vendor_persist_type:file relabelto;

View File

@@ -1,4 +1,4 @@
# radio
type modem_block_device, dev_type;
type vendor_gnss_device, dev_type;
type modem_userdata_block_device, dev_type;
type efs_block_device, dev_type;

View File

@@ -1,6 +1,5 @@
# Data
type rild_vendor_data_file, file_type, data_file_type;
type modem_efs_image_file, file_type, data_file_type;
type vendor_gps_file, file_type, data_file_type;
type modem_ml_data_file, file_type, data_file_type;
type modem_stat_data_file, file_type, data_file_type;

View File

@@ -3,14 +3,15 @@
/vendor/bin/bipchmgr u:object_r:bipchmgr_exec:s0
/vendor/bin/vcd u:object_r:vcd_exec:s0
/vendor/bin/dmd u:object_r:dmd_exec:s0
/vendor/bin/sced u:object_r:sced_exec:s0
/vendor/bin/rfsd u:object_r:rfsd_exec:s0
/vendor/bin/modem_logging_control u:object_r:modem_logging_control_exec:s0
/vendor/bin/modem_svc_sit u:object_r:modem_svc_sit_exec:s0
/vendor/bin/modem_ml_svc_sit u:object_r:modem_ml_svc_sit_exec:s0
/vendor/bin/cbd u:object_r:cbd_exec:s0
/vendor/bin/hw/rild_exynos u:object_r:rild_exec:s0
/vendor/bin/hw/vendor\.google\.radioext@1\.0-service u:object_r:hal_radioext_default_exec:s0
/vendor/bin/liboemservice_proxy_default u:object_r:liboemservice_proxy_default_exec:s0
/vendor/bin/copy_efs_files_to_data u:object_r:copy_efs_files_to_data_exec:s0
# Config files
/vendor/etc/modem_ml_models\.conf u:object_r:modem_config_file:s0
@@ -22,7 +23,6 @@
/data/vendor/modem_ml(/.*)? u:object_r:modem_ml_data_file:s0
/data/vendor/modem_stat(/.*)? u:object_r:modem_stat_data_file:s0
/data/vendor/rild(/.*)? u:object_r:rild_vendor_data_file:s0
/data/vendor/copied(/.*)? u:object_r:modem_efs_image_file:s0
# vendor extra images
/mnt/vendor/efs(/.*)? u:object_r:modem_efs_file:s0

View File

@@ -17,5 +17,3 @@ binder_call(grilservice_app, hal_wifi_ext)
binder_call(grilservice_app, hal_audiometricext_default)
binder_call(grilservice_app, rild)
hal_client_domain(grilservice_app, hal_power_stats)
set_prop(grilservice_app, vendor_logger_prop)
set_prop(grilservice_app, vendor_modem_prop)

View File

@@ -4,7 +4,6 @@ init_daemon_domain(hal_radioext_default)
hwbinder_use(hal_radioext_default)
get_prop(hal_radioext_default, hwservicemanager_prop)
set_prop(hal_radioext_default, vendor_gril_prop)
add_hwservice(hal_radioext_default, hal_radioext_hwservice)
binder_call(hal_radioext_default, servicemanager)

View File

@@ -7,8 +7,6 @@ allow modem_diagnostic_app app_api_service:service_manager find;
allow modem_diagnostic_app radio_service:service_manager find;
userdebug_or_eng(`
allow modem_diagnostic_app sysfs_modem_state:file r_file_perms;
hal_client_domain(modem_diagnostic_app, hal_power_stats);
allow modem_diagnostic_app hal_exynos_rild_hwservice:hwservice_manager find;

View File

@@ -1,4 +1,3 @@
# Selinux rule for modem_svc_sit daemon
type modem_svc_sit, domain;
type modem_svc_sit_exec, vendor_file_type, exec_type, file_type;
init_daemon_domain(modem_svc_sit)
@@ -21,7 +20,7 @@ allow modem_svc_sit modem_stat_data_file:file create_file_perms;
allow modem_svc_sit vendor_fw_file:dir search;
allow modem_svc_sit vendor_fw_file:file r_file_perms;
allow modem_svc_sit mnt_vendor_file:dir r_dir_perms;
allow modem_svc_sit mnt_vendor_file:dir search;
allow modem_svc_sit modem_userdata_file:dir create_dir_perms;
allow modem_svc_sit modem_userdata_file:file create_file_perms;
@@ -37,16 +36,3 @@ get_prop(modem_svc_sit, hwservicemanager_prop)
# logging property
get_prop(modem_svc_sit, vendor_logger_prop)
# Write trace data to the Perfetto traced daemon. This requires connecting to
# its producer socket and obtaining a (per-process) tmpfs fd.
perfetto_producer(modem_svc_sit)
# Allow modem_svc_sit to access modem image file/dir
allow modem_svc_sit modem_img_file:dir r_dir_perms;
allow modem_svc_sit modem_img_file:file r_file_perms;
allow modem_svc_sit modem_img_file:lnk_file r_file_perms;
# Allow modem_svc_sit to access socket for UMI
allow modem_svc_sit radio_vendor_data_file:sock_file { create unlink write };

View File

@@ -6,7 +6,6 @@ vendor_internal_prop(vendor_persist_config_default_prop)
vendor_internal_prop(vendor_diag_prop)
vendor_internal_prop(vendor_modem_prop)
vendor_internal_prop(vendor_rild_prop)
vendor_internal_prop(vendor_gril_prop)
vendor_internal_prop(vendor_ssrdump_prop)
vendor_internal_prop(vendor_wifi_version)
vendor_internal_prop(vendor_imssvc_prop)

View File

@@ -38,9 +38,6 @@ vendor.sys.rild_reset u:object_r:vendor_rild_prop:s0
persist.vendor.radio. u:object_r:vendor_rild_prop:s0
ro.vendor.config.build_carrier u:object_r:vendor_carrier_prop:s0
# for GRIL
vendor.gril. u:object_r:vendor_gril_prop:s0
# SSR Detector
vendor.debug.ssrdump. u:object_r:vendor_ssrdump_prop:s0
persist.vendor.sys.ssr. u:object_r:vendor_ssrdump_prop:s0

View File

@@ -29,7 +29,6 @@ allow rfsd radio_device:chr_file rw_file_perms;
# Allow to set rild and modem property
set_prop(rfsd, vendor_modem_prop)
set_prop(rfsd, vendor_rild_prop)
set_prop(rfsd, vendor_cbd_prop)
# Allow rfsd to access modem image file/dir
allow rfsd modem_img_file:dir r_dir_perms;

Some files were not shown because too many files have changed in this diff Show More