Commit graph

2751 commits

Author SHA1 Message Date
Daniel Lowe
2c17c0280b Merge "[Pixel VPN] Apply reviewed default permissions" into main 2024-12-11 10:38:16 -08:00
Piotr Klasa
a63fbd1ca8 Move all vendor_sched parameters and permissions to init.pixel.perf.rc
Bug: 335874870
Test: Checked that permissions and values ​​for all affected files are correct (ls -l, cat)
Flag: EXEMPT not supported by this component yet
Change-Id: I56f8ac747a97e866e2a663ab70c141871330ec8f
2024-12-11 15:31:11 +01:00
Michael Bestas
23bb1a376d
zumapro: Update linker.config from AP4A.241205.013
These libraries are used in camera HAL APEX.

Change-Id: I40a7ff722ae55a4ca9fd77f97a2b5e73af1898e2
2024-12-11 04:15:46 +02:00
Michael Bestas
987c1bf308 Android 15.0.0 Release 6 (AP4A.241205.013)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
 eKA7AJwJzAEjJsFAnNBunzzVHwfc6k7TkwCfc/FFP5sw/Z4oEgjDPAjjxMk00lw=
 =P00m
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmdY7dcXHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmnQIg//RsMCsX8EXfSwirFmHcLqUgRl
 zr4r71c+SJderH03ME18EOtbsagw8MwPpV/U03cfE1AvKwv2UF0QhbkHyLn33YGm
 4LAgG5WTaETGYrZf9hBxAA8SAokhYIsHyfSJ+wwJtGOf02QPlIamPZKS8mLsedCF
 oXFmuwqnIdzGAi8AvNWCZDejrgkUXyK8DVQ06C3+DDljvcuxWve0c2kBNA4xvoeE
 j2XKqK+DBX+IholRFaKAgtkN1wgreqaGPqK/j6KlAnIpTeeRLsTl/CRjE9Ir3idJ
 9M2u11I0XSnJ4pP8JiY7JF2x+Wf5khIjB6sZgy754QnRbT71PZWRpypZIG69/rh5
 2EWNBHBzQrodSIZoF7M5YnbrAiqVUFxeu5Z7eNaEMQborHKTve3GcG/GRt25AIxZ
 WLnyNZFbziGtkV5R4tM3N9NQZ6Uz3tmDgVzBhGZK2c7loKSUfEp5G+LwtyvqQvmC
 FuFKB1T7FTdDnr4cdJlAQ8gQOFq/P3ax1UnFNQrBSlgRG3T8Q83nphQYGMChyXc9
 sp19jDw+B0JzGhfLQ53AJ60Al4wnUp+6eyVtiYgyM5zYnpLZsbVO1WqcjmwPJSo9
 wxNlsUu1Qy85o0y74kAC307sjgyK6b+bRaib8nehfwsDn2OZcC356rOe6NGoPhOZ
 tQ338qQThGg6Ludofns=
 =lZku
 -----END PGP SIGNATURE-----

Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6

Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eKA7AJwJzAEjJsFAnNBunzzVHwfc6k7TkwCfc/FFP5sw/Z4oEgjDPAjjxMk00lw=
# =P00m
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Wilson Sung (5) and others
# Via Android Build Coastguard Worker (38) and others
* tag 'android-15.0.0_r6': (52 commits)
  Make android.framework.stats-v2-ndk app reachable
  Allow fingerprint to access /dev/fth_fd
  Update SELinux error
  Change vendor_fingerprint_prop to vendor_restricted_prop
  Update SELinux error
  Move euiccpixel_app to vendor
  Allow systemui_app to set 'debug.tracing.desktop_mode_visible_tasks' system property
  storage: move storage related device type to common folder
  Move sepolicy about hal_radioext_default to gs-common
  Allow fingerprint to access sysfs_lhbm
  Update SELinux error
  Update sepolicy for nfc antenna selftest values
  Revert^2 "modem_svc: update sepolicy for UMI"
  Revert "modem_svc: update sepolicy for UMI"
  Update SELinux error
  modem_svc: update sepolicy for UMI
  fix bipchmgr sepolicy
  Label sysfs node power_mode as sysfs_display.
  Label frame_interval and expected_present_time as sysfs_display
  Grant the MDS assess the OemRil service AIDL interface.
  ...

 Conflicts:
	sepolicy/radio/radio.te
	sepolicy/tracking_denials/keys.conf
	sepolicy/vendor/genfs_contexts

Change-Id: I5bc554da77b3317f17a838508e87c7fe84f14191
2024-12-11 03:41:42 +02:00
Michael Bestas
4772d02af9 Android 15.0.0 Release 6 (AP4A.241205.013)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
 eCS1AKCAqQqQ2PZ/HMIFuzLZPWfZjvCRDACeJWblhIHa+ODC9PYstxkKALZVXCo=
 =E9VY
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmdY7PoXHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmlTuBAAss0qZU+h9oujq988gz6/SCTb
 Np3yMsknkUSdP9RcKm7qJBXpcdntcVtfUUyrOQ0Ki0myfdokSd8IMtZ0zFUewbiv
 QPpQJzt89htSwVsYIdnDJP9voegljkSLMSBCSiEg5uF+oW4uS2GFEtr/uDYHnAnX
 JmdrEps/Qreu42Zwgw9cItb1gQUzu9WNeRK53cy28TmTzPbx43nho0SYOs6sCDPN
 +2kk9EIRBZpPSh5bJB6Mqu2A5vSLqzM0YfX98iFQfWpfrOYlpFt1uKwI5SP9bu4L
 HSJRaSzIugentYQC89dWb2NLuFTWKgsWHSoCt9iqc4i8CDOkpOFv/Jw6xZM9HlPm
 Kk64SeiuCvqrg3rLz/muMae7bpNI2GHs3g3aSk7ibfcG4gCNmYzqXlyUI5jawRrQ
 wnbXflME2BIlfG0xGbqXh5lj+xK5DrsNRuyVZVlu0orw8RI3ZqrpCv7Bd6SI6vpM
 Gys+gR572DfO50OmuE7KzfV0OP6PLymM9/zxnK43qKLkaJ8yWruvpgtUlDcB85ed
 86FUe2iAhvQU+t88M/nC0YBR+PptB4HrlMLyUoRgfb6odq+kmqKfL620pmIKWssG
 qvs4boCVzvCzaNxJJj1bvFutB3get/0W0+PK8kWXiLnnVOheV8TsSnBonDXxfSOw
 S2KzBh/EIh+j/ICOces=
 =ELmX
 -----END PGP SIGNATURE-----

Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6

Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eCS1AKCAqQqQ2PZ/HMIFuzLZPWfZjvCRDACeJWblhIHa+ODC9PYstxkKALZVXCo=
# =E9VY
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Juan Yescas (14) and others
# Via Android (Google) Code Review (81) and others
* tag 'android-15.0.0_r6': (118 commits)
  Set auto prefer idle task name
  Set priority task name
  Change permission of fg_wi file nodes
  Delete TARGET_CPU_VARIANT_RUNTIME.
  Force EST loopback for hidden menu testing
  Add input event profile to mitigate input latency of input threads
  Control the "init_dpm.sh" to be built in zumapro devices
  [ZumaPro] Change default MTE mode to Asymm.
  usb: modify initial_descriptor_timeout to 500ms
  Control the modules built from vendor/google_devices/zumapro/prebuilts/gpu
  Revert "Revert "Move PRODUCT_SHIPPING_API_LEVEL to defined by de..."
  Revert "Disable EHLD"
  zumapro: avoid vector<const T>
  16kb: Select proper fstab for targets that only boot 16kb kernels
  16kb: Set f2fs block size to 16384 for targets that only boot 16kb kernels
  16kb: Config fstab for targets that only boot 16kb kernels
  Deprecate preloaded_nanoapps.json
  Delete PRODUCT_FULL_TREBLE_OVERRIDE.
  Control GoogleDialer built from zumapro/proprietary/GoogleDialer
  Add pixellogger with non radio
  ...

Change-Id: I8b9080bd2f089873aa4f2845913c2cf24d7a6857
2024-12-11 03:38:02 +02:00
Nathan Kulczak
056b4d427e Merge "Vibrator: Add permissions for owt_lib_compat" into main 2024-12-10 17:44:25 +00:00
Treehugger Robot
44a726dc5b Merge "Add enhanced geofencing data and satelltie access config json for Zuma Pro" into main 2024-12-10 06:30:23 +00:00
youngtaecha
9cc8c2ae4e Add enhanced geofencing data and satelltie access config json for Zuma Pro
US(mainland, hawaii, alaska), PuertoRico, Canada, Europe

Bug: 362312117
Flag: EXEMPT 'config change'
Test: Manually verified if the enhanced geofence file is working well
with the satellite_access_config.json file.(b/382816070)

Change-Id: I65dec5b1e9602979f102ab34764a8067e54bde05
2024-12-10 04:54:03 +00:00
Android Build Coastguard Worker
03140982aa Snap for 12770256 from 8aad411722 to 25Q1-release
Change-Id: Idd933bfede16f9210d2a896e25dd39acf73d9786
2024-12-10 00:33:41 +00:00
Android Build Coastguard Worker
c6dd3c2f71 Snap for 12770256 from fc5a37ec37 to 25Q1-release
Change-Id: I33cd56c49f7100a32c02557b048f747b7d872383
2024-12-10 00:33:41 +00:00
Eileen Lai
fc5a37ec37 Merge "modem_svc: use modem_svc_sit version sepolicy" into main 2024-12-09 15:09:36 +00:00
Eileen Lai
8aad411722 Merge "modem_svc: move shared_modem_platform related sepolicy to gs-common" into main 2024-12-09 15:09:35 +00:00
Roy Luo
4f3d7568c9 Enable usb state update via udc sysfs
Bug: 339241080
Test: tested on Tokay
Flag: android.hardware.usb.flags.enable_udc_sysfs_usb_state_update
Change-Id: I4ab097745c49f782c143140060607b4e784d5799
2024-12-09 13:23:23 +00:00
Roy Luo
20707fd77f Add udc sysfs to udc_sysfs fs context
Meeded for system server to monitor usb gadget state.
Grant hal_usb_impl read access as it's needed by UsbDataSessionMonitor.
Starting at board level api 202504 due to its dependency on aosp/3337514

10956 10956 W android.hardwar: type=1400 audit(0.0:327): avc:  denied  { read } for  name="state" dev="sysfs" ino=84394 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_udc:s0 tclass=file permissive=0

Bug: 339241080
Test: tested on Tokay
Flag: android.hardware.usb.flags.enable_udc_sysfs_usb_state_update
Change-Id: Iab79eec9a836d70792dfaa64eb24a5c013dc85aa
2024-12-09 13:21:14 +00:00
Jeremy Nei
1f96101a5e Merge "port display sysfs access" into main 2024-12-09 07:40:27 +00:00
Nina Chen
db19f527d7 Update SELinux error
copy bug_map entry from zuma

Test: SELinuxUncheckedDenialBootTest
Bug: 383013471
Flag: EXEMPT sepolicy
Change-Id: I514eb622b02f13b23aa3f9fe9c699b856a196c00
2024-12-09 11:43:18 +08:00
Daniel Lowe
036b6007f8 [Pixel VPN] Apply reviewed default permissions
Pregrantting below permissions:
READ_PHONE_STATE

Flag: EXEMPT add permission pregranted in b/337725984
Bug: 373686360
Test: presubmit, manual install
Change-Id: I0d5a3133081afb68ce14fae3a40468c58284f495
2024-12-09 02:45:43 +00:00
Android Build Coastguard Worker
ad9c9055d3 Snap for 12765415 from 6caf8b292d to 25Q1-release
Change-Id: Ia7be04c8332391b1273c476237de3383ef667ad8
2024-12-07 23:06:15 +00:00
Daniel Zheng
6caf8b292d Merge "update health HAL dependency" into main 2024-12-07 06:50:55 +00:00
Android Build Coastguard Worker
6465acc660 Snap for 12763142 from f5da0210e3 to 25Q1-release
Change-Id: I2775e3ab2f6f273fcb4ef5b1270ade3654936804
2024-12-07 02:05:50 +00:00
Android Build Coastguard Worker
d759b049a0 Snap for 12763142 from 9c90950b8f to 25Q1-release
Change-Id: I77c1d69185edd78c5f0903656cd3181578e59adf
2024-12-07 02:05:50 +00:00
Treehugger Robot
b88f09ef7d Merge "Add enhanced geofencing data and satelltie access config json for Zuma Pro" into main 2024-12-07 00:49:10 +00:00
Rohan Narayanan
f5da0210e3 Merge "Add hal_shared_modem_platform to modem_diagnostic_app.te" into main 2024-12-06 20:05:22 +00:00
youngtaecha
3dd14b523a Add enhanced geofencing data and satelltie access config json for Zuma Pro
Bug: 362312117
Flag: EXEMPT 'config change'
Test: Manually verified if the enhanced geofence file is working well
with the satellite_access_config.json file.

Change-Id: I9a27b9bc67dcd5d48e4487b1af973847b3a0912c
2024-12-06 19:08:33 +00:00
Dinesh Yadav
4814233812 Merge "Allow tachyon service to make binder calls to GCA" into main 2024-12-06 16:20:42 +00:00
Eileen Lai
6db5e8e725 modem_svc: use modem_svc_sit version sepolicy
For solving sepolicy conflicts for different AP version, modem_svc_sit will support devices from gs101 to zuma_pro.

Bug: 372400955

Change-Id: I926fe12be95f10a2c4db13c06dab8b1586f9dcc8
Flag: NONE local testing only
2024-12-06 12:58:58 +00:00
Eileen Lai
862fbd7fe0 modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I9b69d1754f718faac51e89bb10c3a2ba604d2bae
Flag: NONE local testing only
2024-12-06 12:58:34 +00:00
Rick Yiu
9c90950b8f Merge changes from topic "sched_qos_for_adpf" into main
* changes:
  Set permission for rampup_multiplier
  Use SCHED_QOS_SENSITIVE_EXTREME_SET for InputPolicy
  Add SCHED_QOS_POWER_EFFICIENCY profiles
2024-12-06 08:20:09 +00:00
Dinesh Yadav
1e5b6fb9eb Allow tachyon service to make binder calls to GCA
This permission is needed for tachyon service to call callbacks.

AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212  6987  6987 W com.google.edge: type=1400 audit(0.0:17): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424  4166  4166 W com.google.edge: type=1400 audit(0.0:254): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0

Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: Iaa61d70cdffb75024c497482f4c0a6cab493bec3
2024-12-06 04:07:23 +00:00
Rick Yiu
20ca1e9f98 Set permission for rampup_multiplier
Bug: 355612114
Flag: NONE init rc file does not support flag
Test: build pass
Change-Id: I410866488af508cb02d7fa509f4458fbdf676078
2024-12-06 01:53:25 +00:00
Nelson Li
ebe716f98d [automerger skipped] Change TARGET_RECOVERY_UI_LIB to use fully qualified names in zumapro am: 312ec7ca37 am: 7f7355750b -s ours
am skip reason: Merged-In I4b585c0b73366ba5e1f8c6461ed3ed62547af7b7 with SHA-1 1887e6e521 is already in history

Original change: https://android-review.googlesource.com/c/device/google/zumapro/+/3392061

Change-Id: I513abbc2c25c9fcc516f089d20f0ff079bb0858f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-06 01:46:49 +00:00
Nelson Li
7f7355750b Change TARGET_RECOVERY_UI_LIB to use fully qualified names in zumapro am: 312ec7ca37
Original change: https://android-review.googlesource.com/c/device/google/zumapro/+/3392061

Change-Id: I21809878188bfc1451511ec29729a917d4e00bf8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-06 01:35:49 +00:00
Rick Yiu
1c268207da Use SCHED_QOS_SENSITIVE_EXTREME_SET for InputPolicy
Let InputPolicy have all the feature of ADPF task.

Bug: 355612114
Flag: NONE vendor task_profiles.json does not support flag
Test: build pass
Change-Id: I5c2964c0328d2d3a95c84d4c2908ace198202e06
2024-12-06 01:19:00 +00:00
Rick Yiu
6e9b0dbc67 Add SCHED_QOS_POWER_EFFICIENCY profiles
Currently support AutoUclampMax.

Bug: 355612114
Flag: NONE vendor task_profiles.json
Test: build pass
Change-Id: I99c3862c471b212e2a8d0e5a7a5758daac461fbe
2024-12-06 01:19:00 +00:00
Android Build Coastguard Worker
65f68a033f Snap for 12755599 from 84aa7bf7a2 to 25Q1-release
Change-Id: I1680a3bb70eb38888bcb6606fbec7260bce56119
2024-12-06 00:04:26 +00:00
Android Build Coastguard Worker
f212c7b1c0 Snap for 12755599 from 9db371a596 to 25Q1-release
Change-Id: Ibbdb78c72c152c92d6713d556e569d17873e4a92
2024-12-06 00:04:25 +00:00
Daniel Zheng
36fdcd9831 update health HAL dependency
Bug: 381926253
Test: th
Change-Id: I9028c55dab29f7b4f73ee0011d9cb2ac4f4e7f91
2024-12-05 14:44:34 -08:00
Adrian Mejia
9db371a596 Merge "Add config_satellite_allow_tn_scanning_during_satellite_session flag." into main 2024-12-05 19:19:09 +00:00
Tim Lin
a547826e2e Add config_satellite_carrier_roaming_esos_provisioned_class for the intent to trigger satellite provisioning
Bug: 381285467
Test: make
Flag: EXEMPT resource only update

Change-Id: Ib253b2eca0a70f45eca1d9749cf9462fd4cc1d26
2024-12-05 07:56:16 +00:00
Nina Chen
84aa7bf7a2 Merge "Update SELinux error" into main 2024-12-05 06:58:47 +00:00
Nina Chen
30570259fe Update SELinux error
Flag: EXEMPT sepolicy
Test: SELinuxUncheckedDenialBootTest
Bug: 382362300
Bug: 366116096
Change-Id: I8cf6742ded1f3b90b46909ee0ac47c9f33258466
2024-12-05 06:43:47 +00:00
Joner Lin
07c6dcc88f Merge "allow hal_bluetooth_btlinux write sysfs file" into main 2024-12-05 05:12:18 +00:00
Joner Lin
a55772f311 Merge "init.zumapro.board.rc: bluetooth own uart debug node" into main 2024-12-05 05:11:48 +00:00
Nelson Li
312ec7ca37 Change TARGET_RECOVERY_UI_LIB to use fully qualified names in zumapro
Since the TARGET_RECOVERY_UI_LIB for each device is not exactly the
same, and most of the modules in it contain `soong_namespace{}` to
avoid conflicts between different devices, after converting
`librecovery_ui_ext` from Android.mk to Android.bp, it needs to be
changed to a `fully qualified name` in order to correctly use the
corresponding module.

Flag: EXEMPT refactor

Bug: 339143524
Test: m -j librecovery_ui_ext

Merged-In: I4b585c0b73366ba5e1f8c6461ed3ed62547af7b7
Change-Id: I4b585c0b73366ba5e1f8c6461ed3ed62547af7b7
2024-12-05 03:38:56 +00:00
jonerlin
a9b6884b3a allow hal_bluetooth_btlinux write sysfs file
12-04 19:32:23.040000  1002   784   784 I auditd  : type=1400 audit(0.0:30): avc:  denied  { write } for  comm="binder:784_2" name="uart_dbg" dev="sysfs" ino=60136 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sysfs_bt_uart:s0 tclass=file permissive=0
12-04 19:32:23.040000  1002   784   784 W binder:784_2: type=1400 audit(0.0:30): avc:  denied  { write } for  name="uart_dbg" dev="sysfs" ino=60136 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sysfs_bt_uart:s0 tclass=file permissive=0

Bug: 376774204
Test: v2/pixel-pts/release/bootstress/1200counts/suspend-resume
Flag: EXEMPT project configuration patch
Change-Id: I6c1a28d0e5e22b03b088d64d550fd475d796ae67
2024-12-05 02:41:13 +00:00
Treehugger Robot
e72cc55b33 Merge "Change TARGET_RECOVERY_UI_LIB to use fully qualified names in zumapro" into main 2024-12-05 02:39:17 +00:00
Android Build Coastguard Worker
dc522b0c8d Snap for 12748980 from 06525b3713 to 25Q1-release
Change-Id: I6e162073f99f1874894d2ab0f88fff0050973a19
2024-12-05 00:04:49 +00:00
Adrian Mejia
5c61b70300 Add config_satellite_allow_tn_scanning_during_satellite_session flag.
Bug: 382143173
Change-Id: Iedd8a22bd43024d07058448b8b8cda793264c750
Test: config change
Flag: EXEMPT config change
2024-12-04 19:35:05 +00:00
Roy Luo
06525b3713 Merge changes from topic "377782468_internal_hub" into main
* changes:
  usb: support device state monitoring with internal hub enabled
  usb: dump port name for usb device state update
  usb: clean up monitor thread in UsbDataSessionMonitor destructor
2024-12-04 10:01:16 +00:00
Jeremy Nei
c22f870169 port display sysfs access
Adds color_data access to sysfs_display

Bug: 369456857
Test: adb shell displaycolor_service 20000
Flag: EXEMPT N/A
Change-Id: Id2a00d138daad44d7135d5bd5652b128c1c63e46
2024-12-04 09:26:21 +00:00