Snap for 10843824 from eec4beedd6daad60df5fe2e2c886469e0dfec1d1 to 24Q1-release

Change-Id: I9bfa89a75fcaa182e118eedca439ed28455e7d30
This commit is contained in:
Android Build Coastguard Worker 2023-09-21 21:52:33 +00:00
commit 50097cd5c9
63 changed files with 178 additions and 14425 deletions

View File

@ -0,0 +1,2 @@
allow radio hal_audio_ext_service:service_manager find;
binder_call(radio, hal_audio_default)

View File

@ -10,9 +10,11 @@ genfscon sysfs /devices/platform/audiometrics/codec_crashed_counter u:ob
genfscon sysfs /devices/platform/audiometrics/hwinfo_part_number u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/ams_rate_read_once u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/cca_rate_read_once u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/cca_count_read_once u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/pdm_state u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/waves u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/adapted_info_active_count u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/adapted_info_active_duration u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/pcm_count u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/pcm_latency u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/call_count u:object_r:sysfs_pixelstats:s0

View File

@ -0,0 +1,2 @@
allow radio hal_audio_ext_hwservice:hwservice_manager find;
binder_call(radio, hal_audio_default)

View File

@ -7,5 +7,7 @@ PRODUCT_PACKAGES += BrownoutDetection
endif
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/battery_mitigation/sepolicy
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/battery_mitigation/sepolicy/vendor
SYSTEM_EXT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/battery_mitigation/sepolicy/system_ext/private
SYSTEM_EXT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/battery_mitigation/sepolicy/system_ext/public
PRODUCT_SOONG_NAMESPACES += device/google/gs-common/battery_mitigation

View File

@ -1,9 +1,8 @@
type brownout_detection_app, domain, coredomain;
typeattribute brownout_detection_app coredomain;
userdebug_or_eng(`
app_domain(brownout_detection_app)
net_domain(brownout_detection_app)
allow brownout_detection_app app_api_service:service_manager find;
allow brownout_detection_app system_api_service:service_manager find;
get_prop(brownout_detection_app, vendor_brownout_reason_prop)
')

View File

@ -0,0 +1 @@
type brownout_detection_app, domain;

View File

@ -0,0 +1,3 @@
userdebug_or_eng(`
get_prop(brownout_detection_app, vendor_brownout_reason_prop)
')

View File

@ -1,4 +1,6 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/vendor
PRODUCT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/product/public
PRODUCT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/product/private
PRODUCT_PACKAGES_DEBUG += dump_camera

View File

@ -0,0 +1,9 @@
typeattribute vendor_pbcs_app coredomain;
app_domain(vendor_pbcs_app);
dontaudit vendor_pbcs_app system_app_data_file:dir *;
allow vendor_pbcs_app app_api_service:service_manager find;
# Allow PBCS to find Camera Service.
allow vendor_pbcs_app cameraserver_service:service_manager find;

View File

@ -0,0 +1,12 @@
typeattribute vendor_pcs_app coredomain;
app_domain(vendor_pcs_app);
allow vendor_pcs_app {
app_api_service
audioserver_service
cameraserver_service
mediametrics_service
mediaserver_service
radio_service
}:service_manager find;

View File

@ -0,0 +1 @@
type vendor_pbcs_app, domain;

View File

@ -0,0 +1 @@
type vendor_pcs_app, domain;

View File

@ -1,13 +1,3 @@
type vendor_pbcs_app, domain, coredomain;
app_domain(vendor_pbcs_app);
dontaudit vendor_pbcs_app system_app_data_file:dir *;
allow vendor_pbcs_app app_api_service:service_manager find;
# Allow PBCS to find Camera Service.
allow vendor_pbcs_app cameraserver_service:service_manager find;
# Allow PBCS to add the ServiceBinder service to ServiceManager.
add_service(vendor_pbcs_app, vendor_camera_binder_service);
# Allow PBCS to add the LyricConfigProvider service to ServiceManager.
@ -15,8 +5,8 @@ add_service(vendor_pbcs_app, vendor_camera_lyricconfigprovider_service);
# Allow PBCS to add the CameraIdRemapper service to ServiceManager.
add_service(vendor_pbcs_app, vendor_camera_cameraidremapper_service);
binder_call(vendor_pbcs_app, hal_camera_default);
# Allow PBCS to read debug system properties of the form vendor.camera.pbcs.debug.*
# and persist.vendor.camera.pbcs.debug.*
get_prop(vendor_pbcs_app, vendor_camera_pbcs_debug_prop);
binder_call(vendor_pbcs_app, hal_camera_default);

View File

@ -0,0 +1,21 @@
# Allow PCS to find the LyricConfigProvider service through ServiceManager.
allow vendor_pcs_app vendor_camera_lyricconfigprovider_service:service_manager find;
# Allow PCS to find the CameraIdRemapper service through ServiceManager.
allow vendor_pcs_app vendor_camera_cameraidremapper_service:service_manager find;
allow vendor_pcs_app hal_pixel_remote_camera_service:service_manager add;
binder_call(vendor_pcs_app, hal_pixel_remote_camera_service);
binder_call(vendor_pcs_app, hal_camera_default);
# Allow PCS to open socket connections for HTTP streaming support.
allow vendor_pcs_app vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
allow vendor_pcs_app fwmarkd_socket:sock_file write;
allow vendor_pcs_app port:tcp_socket name_connect;
allow vendor_pcs_app port:udp_socket name_bind;
allow vendor_pcs_app netd:unix_stream_socket connectto;
allow vendor_pcs_app node:udp_socket node_bind;
allow netd vendor_pcs_app:unpriv_socket_class_set create_socket_perms_no_ioctl;
allow netd vendor_pcs_app:fd use;

View File

@ -1,23 +0,0 @@
type vendor_pcs_app, domain, coredomain;
app_domain(vendor_pcs_app);
allow vendor_pcs_app {
app_api_service
audioserver_service
cameraserver_service
mediametrics_service
mediaserver_service
radio_service
}:service_manager find;
# Allow PCS to find the LyricConfigProvider service through ServiceManager.
allow vendor_pcs_app vendor_camera_lyricconfigprovider_service:service_manager find;
# Allow PCS to find the CameraIdRemapper service through ServiceManager.
allow vendor_pcs_app vendor_camera_cameraidremapper_service:service_manager find;
allow vendor_pcs_app hal_pixel_remote_camera_service:service_manager add;
binder_call(vendor_pcs_app, hal_camera_default);
binder_call(vendor_pcs_app, hal_pixel_remote_camera_service);

View File

@ -9,3 +9,6 @@ vndbinder_use(hal_weaver_citadel)
binder_call(hal_weaver_citadel, citadeld)
allow hal_weaver_citadel citadeld_service:service_manager find;
# Allow callbacks
allow citadeld hal_weaver_citadel:binder call;

View File

@ -23,6 +23,10 @@ PRODUCT_PACKAGES += \
PRODUCT_PACKAGES += com.google.edgetpu.dba-service
# TPU DBA C API library
PRODUCT_PACKAGES += libedgetpu_dba.google
# TPU Tachyon HAL service
PRODUCT_PACKAGES += com.google.edgetpu.tachyon-service
# TPU Tachyon C API library
PRODUCT_PACKAGES += libedgetpu_tachyon.google
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/edgetpu/sepolicy

View File

@ -0,0 +1,46 @@
# Tachyon service.
type edgetpu_tachyon_server, domain;
type edgetpu_tachyon_server_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(edgetpu_tachyon_server)
# The vendor service will use binder calls.
binder_use(edgetpu_tachyon_server);
# The vendor service will serve a binder service.
binder_service(edgetpu_tachyon_server);
# Tachyon service to register the service to service_manager.
add_service(edgetpu_tachyon_server, edgetpu_tachyon_service);
# Allow Tachyon service to access the edgetpu_app_service.
allow edgetpu_tachyon_server edgetpu_app_service:service_manager find;
binder_call(edgetpu_tachyon_server, edgetpu_app_server);
# Allow Tachyon service to look for TPU instance in /dev/edgetpu or /dev/edgetpu-soc.
allow edgetpu_tachyon_server edgetpu_device:chr_file rw_file_perms;
# Allow Tachyon service to access hardware buffers and ION memory.
allow edgetpu_tachyon_server hal_allocator:fd use;
allow edgetpu_tachyon_server hal_graphics_mapper_hwservice:hwservice_manager find;
allow edgetpu_tachyon_server hal_graphics_allocator:fd use;
allow edgetpu_tachyon_server gpu_device:chr_file rw_file_perms;
allow edgetpu_tachyon_server gpu_device:dir r_dir_perms;
allow edgetpu_tachyon_server ion_device:chr_file r_file_perms;
# Allow Tachyon service to read the overcommit_memory info.
allow edgetpu_tachyon_server proc_overcommit_memory:file r_file_perms;
# Allow Tachyon service to read the kernel version.
# This is done inside the InitGoogle.
allow edgetpu_tachyon_server proc_version:file r_file_perms;
# Allow Tachyon service to send trace packets to Perfetto with SELinux enabled
# under userdebug builds.
userdebug_or_eng(`perfetto_producer(edgetpu_tachyon_server)')
# Allow Tachyon service to read tflite Darwinn delegate properties
get_prop(edgetpu_tachyon_server, vendor_tflite_delegate_prop)
# Allow Tachyon service to read hetero runtime properties
get_prop(edgetpu_tachyon_server, vendor_hetero_runtime_prop)
# Allow Tachyon service to read EdgeTPU CPU scheduler properties
get_prop(edgetpu_tachyon_server, vendor_edgetpu_cpu_scheduler_prop)

View File

@ -24,3 +24,6 @@
# EdgeTPU DBA service
/vendor/bin/hw/com\.google\.edgetpu.dba-service u:object_r:edgetpu_dba_server_exec:s0
# Tachyon service
/vendor/bin/hw/com\.google\.edgetpu.tachyon-service u:object_r:edgetpu_tachyon_server_exec:s0

View File

@ -1,6 +1,7 @@
type edgetpu_nnapi_service, app_api_service, service_manager_type, isolated_compute_allowed_service;
type edgetpu_vendor_service, service_manager_type, hal_service_type;
type edgetpu_dba_service, app_api_service, service_manager_type, isolated_compute_allowed_service;
type edgetpu_tachyon_service, app_api_service, service_manager_type, isolated_compute_allowed_service;
# EdgeTPU binder service type declaration.
type edgetpu_app_service, service_manager_type;

View File

@ -8,3 +8,6 @@ com.google.edgetpu.IEdgeTpuAppService/default u:object_r:edgetpu_ap
# EdgeTPU DBA Service
com.google.edgetpu.dba.IDevice/default u:object_r:edgetpu_dba_service:s0
# Tachyon Service
com.google.edgetpu.tachyon.IComputeService/default u:object_r:edgetpu_tachyon_service:s0

View File

@ -1,13 +1,14 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/gps/brcm/sepolicy
PRODUCT_SOONG_NAMESPACES += device/google/gs-common/gps/brcm/prebuilt
PRODUCT_SOONG_NAMESPACES += vendor/broadcom/gps/bcm47765
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
$(call soong_config_set, SensorHub_debug, assertion, true)
endif
$(call soong_config_set, gpssdk, sdkv1, False)
$(call soong_config_set, gpssdk, gpsmcuversion, gpsv2_$(TARGET_BUILD_VARIANT))
PRODUCT_PACKAGES += \
bcm47765_gps_package \
sitril-gps \
android.hardware.location.gps.prebuilt.xml
PRODUCT_PACKAGES_DEBUG += \

View File

@ -1,14 +0,0 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/gps/brcm/sepolicy
PRODUCT_SOONG_NAMESPACES += vendor/broadcom/gps/bcm47765
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
$(call soong_config_set, gpsv2, assertion, true)
endif
PRODUCT_PACKAGES += \
bcm47765_gps_package_v2 \
android.hardware.location.gps.prebuilt.xml
PRODUCT_PACKAGES_DEBUG += \
init.gps_log.rc

View File

@ -1,240 +0,0 @@
soong_namespace {
imports: [
"hardware/google/pixel",
],
}
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
cc_prebuilt_library_shared {
name: "android.hardware.gnss@2.1-impl-google",
arch: {
arm64: {
srcs: ["android.hardware.gnss@2.1-impl-google.so"],
shared_libs: [
"liblog",
"libutils",
"libbinder_ndk",
"android.hardware.gnss-V3-ndk",
"libhardware",
"libc++",
"libc",
"libm",
"libdl",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
// Bypass because libhidltransport is deprecated
check_elf_files: false,
}
cc_prebuilt_binary {
name: "android.hardware.gnss@2.1-service-brcm",
init_rc: ["init.gps.rc"],
arch: {
arm64: {
srcs: ["android.hardware.gnss@2.1-service-brcm"],
shared_libs: [
"liblog",
"libutils",
"libhardware",
"libbinder_ndk",
"android.hardware.gnss-V3-ndk",
"libc++",
"libc",
"libm",
"libdl",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
// Bypass because libhidltransport is deprecated
// Bypass because libhwbinder is deprecated
check_elf_files: false,
vintf_fragments: ["android.hardware.gnss@2.1-service-brcm.xml"]
}
cc_prebuilt_library_shared {
name: "flp.default",
arch: {
arm64: {
srcs: ["flp.default.so"],
shared_libs: [
"liblog",
"libcutils",
"libutils",
"libc++",
"libc",
"libm",
"libdl",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
// Bypass because soname mismatch
check_elf_files: false,
}
cc_prebuilt_binary {
name: "gpsd",
arch: {
arm64: {
srcs: ["gpsd"],
shared_libs: [
"liblog",
"libutils",
"libhardware_legacy",
"libcutils",
"libssl",
"libcrypto",
// "libsitril-gps",
"android.frameworks.sensorservice@1.0",
"libhidlbase",
"libandroid_net",
"libc++",
"libc",
"libm",
"libdl",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
// Bypass because libsitril-gps is Android.mk module
check_elf_files: false,
}
cc_prebuilt_library_shared {
name: "gps.default",
arch: {
arm64: {
srcs: ["gps.default.so"],
shared_libs: [
"liblog",
"libcutils",
"libutils",
"libc++",
"libc",
"libm",
"libdl",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
// Bypass because soname mismatch
check_elf_files: false,
}
cc_prebuilt_binary {
name: "lhd",
arch: {
arm64: {
srcs: ["lhd"],
shared_libs: [
"liblog",
"libutils",
"libhardware_legacy",
"libc++",
"libc",
"libm",
"libz",
"libdl",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
}
cc_prebuilt_binary {
name: "scd",
arch: {
arm64: {
srcs: ["scd"],
shared_libs: [
"liblog",
"libutils",
"libssl",
"libcrypto",
"libandroid_net",
],
},
},
compile_multilib: "64",
vendor: true,
relative_install_path: "hw",
strip: {
none: true,
},
}
soong_config_module_type {
name: "gps_prebuilt_firmware",
module_type: "prebuilt_firmware",
config_namespace: "SensorHub_debug",
bool_variables: [
"assertion",
],
properties: [
"src"
],
}
gps_prebuilt_firmware {
name: "SensorHub.patch",
soong_config_variables: {
assertion: {
src: "SensorHub_DebugBuild_A0.patch",
conditions_default: {
src: "SensorHub_A0.patch"
},
},
},
vendor: true,
filename: "SensorHub.patch"
}
phony {
name: "bcm47765_gps_package",
required: [
"android.hardware.gnss@2.1-impl-google",
"android.hardware.gnss@2.1-service-brcm",
"flp.default",
"gpsd",
"lhd",
"gps.default",
"scd",
"SensorHub.patch"
],
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,7 +0,0 @@
<manifest version="1.0" type="device">
<hal format="aidl">
<name>android.hardware.gnss</name>
<version>3</version>
<fqname>IGnss/default</fqname>
</hal>
</manifest>

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,26 +0,0 @@
service lhd /vendor/bin/hw/lhd /vendor/etc/gnss/lhd.conf
class main
user gps
group system inet net_raw sdcard_rw
ioprio be 0
service gpsd /vendor/bin/hw/gpsd -c /vendor/etc/gnss/gps.xml
class main
user gps
group system gps radio inet wakelock sdcard_rw net_raw
ioprio be 0
service scd /vendor/bin/hw/scd /vendor/etc/gnss/scd.conf
class main
user gps
group system inet net_raw wakelock
ioprio be 0
priority -1
service gnss_service /vendor/bin/hw/android.hardware.gnss@2.1-service-brcm
class hal
user gps
group system gps radio
ioprio be 0
priority -1

Binary file not shown.

Binary file not shown.

8
gyotaku_app/gyotaku.mk Normal file
View File

@ -0,0 +1,8 @@
ifneq ($(TARGET_BUILD_VARIANT), user)
ifeq (,$(filter aosp_%, $(TARGET_PRODUCT))) # Skip aosp target product
PRODUCT_PACKAGES_DEBUG += \
Gyotaku
BOARD_SEPOLICY_DIRS += device/google/gs-common/gyotaku_app/sepolicy/
endif
endif

View File

@ -0,0 +1,34 @@
type gyotaku_app, domain;
app_domain(gyotaku_app)
userdebug_or_eng(`
# For Gyotaku app common use
allow gyotaku_app app_api_service:service_manager find;
allow gyotaku_app privapp_data_file:lnk_file read;
allow gyotaku_app gyotaku_app:udp_socket create;
allow gyotaku_app system_app_data_file:dir create_dir_perms;
allow gyotaku_app system_app_data_file:file create_file_perms;
# For cloud and network related use
allow gyotaku_app dnsproxyd_socket:sock_file write;
allow gyotaku_app gyotaku_app:udp_socket connect;
allow gyotaku_app netd:unix_stream_socket connectto;
allow gyotaku_app gyotaku_app:tcp_socket create;
allow gyotaku_app privapp_data_file:file execute;
allow netd gyotaku_app:fd use;
allow netd gyotaku_app:tcp_socket {read write};
# For access /proc/fs/f2fs/* storage use
allow gyotaku_app proc_f2fs:dir search;
allow gyotaku_app proc_f2fs:file {open read};
# For access /proc/stat use
allow gyotaku_app proc_stat:file {read open getattr};
# For getproperty isDebuggable use
get_prop(gyotaku_app, userdebug_or_eng_prop)
# For persiste property use
allow gyotaku_app logpersistd_logging_prop:file {read open getattr map};
')

View File

@ -0,0 +1,2 @@
# Gyotaku app
user=system seinfo=platform name=com.google.android.apps.internal.gyotaku domain=gyotaku_app type=system_app_data_file levelFrom=all

View File

@ -1,5 +0,0 @@
PRODUCT_SOONG_NAMESPACES += vendor/google/apps/PersistentBackgroundServices
PRODUCT_PACKAGES += \
PersistentBackgroundServices
SYSTEM_EXT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/pixelsystemservice/sepolicy

View File

@ -1,6 +0,0 @@
type pixelsystemservice_app, domain, coredomain;
app_domain(pixelsystemservice_app);
# Standard system services
allow pixelsystemservice_app app_api_service:service_manager find;

View File

@ -1,2 +0,0 @@
# Pixel System Service
user=_app seinfo=platform name=com.google.android.pixelsystemservice domain=pixelsystemservice_app type=app_data_file levelFrom=all

View File

@ -1,3 +0,0 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/thermal/sepolicy/dump
PRODUCT_PACKAGES += dump/dump_thermal.sh

View File

@ -5,6 +5,7 @@ package {
sh_binary {
name: "dump_syna.sh",
src: "dump_syna.sh",
init_rc: ["init.touch.syna20.rc"],
vendor: true,
sub_dir: "dump",
}

View File

@ -0,0 +1,3 @@
on property:vendor.device.modules.ready=1
chown system system /sys/class/spi_master/spi20/spi20.0/synaptics_tcm.0/sysfs/get_raw_data
chown system system /sys/class/spi_master/spi20/spi20.0/synaptics_tcm.0/sysfs/force_active

View File

@ -1,3 +1,3 @@
genfscon sysfs /devices/platform/10d10000.spi/spi_master/spi0/spi0.0/synaptics_tcm.0/sysfs u:object_r:sysfs_touch:s0
genfscon sysfs /devices/platform/111d0000.spi/spi_master/spi20/spi20.0/synaptics_tcm.0/sysfs u:object_r:sysfs_touch:s0
genfscon sysfs /devices/platform/111d0000.spi/spi_master/spi20/spi20.0/synaptics_tcm.0/wakeup u:object_r:sysfs_wakeup:s0