When updating aocx service to use binder ndk backend, we get this
selinux violation:
SELinux : avc: denied { add } for pid=2772 uid=0 name=aocx.IAocx scontext=u:r:aocxd:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0
TEST:
adb push out/target/product/tangorpro/vendor/etc/selinux/* /vendor/etc/selinux
adb reboot
adb shell aocx_tool list
BUG: 343998265
Change-Id: I1e4f554abfe02f33328c851f7da64c671d8f4cb7
Adds file_contexts entries for the files representing new AOC services
used by a new transport between CHRE on AOC and the bthal.
NOTE: The use-case for these files is the same as the
/dev/acd-com.google.bt* files (lines 23-24). Those files will eventually
be removed when we migrate from the old USF-based transport to the one
under development.
Bug: 342415506
Test: Works with other CLs in topic to support BT offload over the new
transport (with a local change to hook the new transport in).
Change-Id: I81246a25af020ab14da3d4ae7675f2a0f00f97be
Bug 315711190 is caused by an issue parsing the heap statistics. A proposed long term fix has been merged in, but is deemed risky for 24Q1. This CL removes heap printing from dumpstate is a low risk approach to working around this bug.
Bug: 315711190
Test: Built and tested on device
Change-Id: I6134aeeda6fe74d9bbf966d44a1a98391e03a2f7
aocxd sets thread scheduler to SCHED_FIFO. This is so audio processing
in aocxd can run without glitching.
vndbinder:11464: type=1400 audit(0.0:17): avc: denied { sys_nice } for capability=23 scontext=u:r:aocxd:s0 tcontext=u:r:aocxd:s0 tclass=capability permissive=0
BUG: 318791959
Change-Id: I9c9148aa7b18ce525091f93956e112b4c178a129
Add new aocxd server domain
- Allow aocxd to access AOC resources
- Add new aocx binder vendor service
Allow audio hal to find and talk to aocx
avc error tcontext=u:object_r:binder_device:s0 tclass=chr_file or tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file
avc: denied { add } for pid=1073 uid=0 name=aocx.IAocx scontext=u:r:aocxd:s0 tcontext=u:object_r:aocx:s0 tclass=service_manager
avc: denied { call } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:aocxd:s0 tclass=binder
BUG: 315853303
Change-Id: Ide16a2be9f032bef60f43d4d3daa6372ae06b057
This change allows the chre_daemon to use the dedicated channels
to AOC:
/dev/acd-com.google.chre
/dev/acd-com.google.chre.non_wake_up
Bug: 241960170
Test: local in-device verification.
Change-Id: I06f5eb143fe60d05f6ff0fbf06664e046f17a3aa
Add AoC Monitor Mode status to bug reports.
Bug: 288616032
Test: On device
Change-Id: Iced980bd76c2cc99ae20a67add9179e307f0e73c
Signed-off-by: Luigi Zevola <zevola@google.com>
Dump AoC FF1 DVFS table when triggering bugreports to capture core
frequency and DVFS requests.
Bug: 288284717
Test: On device
Change-Id: Icc42cefe0e1b6c2ca4dda10dfaf0867739b85751
Signed-off-by: Luigi Zevola <zevola@google.com>
The /dev/acd-mel_processor is for the SoundDose
feature
Bug: 244133608
Test: build pass
Change-Id: I1f9c914c9a2d8cc86a8f1c643a9bbd73deb221d4
Signed-off-by: Carter Hsu <carterhsu@google.com>
The aoc system node may be different for each platform. We can use
wildcard characters to replace these addresses.
To specify all addresses between 17000000 and 19000000, we could use the
wildcard character *. This would allow us to use the same code for all
platform, regardless of the specific addresses used
Test: adb bugreport && unzip bugreport*.zip &&
check dump_aoc section in dumpstate_board.txt
Bug: 279680450
Change-Id: I1eaad3bd31e78265af6a9428064e9def501a813e
- separate audio hal HIDL and AIDL services.
- separate sepolicy of aoc and audio
Bug: 259161622
Test: build pass and check hidl/aidl on gs201
build pass for other chipset
Change-Id: Id3c0446be6cdcd5a6e75c832e7d7f4a64716f79c
Signed-off-by: Jasmine Cha <chajasmine@google.com>
Set the /dev/acd-com.google.umfw_stat security context type to
aoc_device.
Bug: 254464877
Test: Verified /dev/acd-com.google.umfw_stat security context.
Change-Id: Ibeba4c65f479c38ab740e156dd244e2f40d00dd4
Merged-In: Ibeba4c65f479c38ab740e156dd244e2f40d00dd4