Michael Bestas
24c5f5467c
gs-common: Introduce a common FCM
...
Change-Id: I343bfd4cce3132e87ae1465e4552d9a3316ec77d
2025-03-09 11:19:46 +02:00
Michael Bestas
c011de7d71
vibrator: Rename flags to avoid conflicts with prebuilts
...
felix still uses this but other pixels switched to prebuilt,
this confuses soong so just rename it for now.
Change-Id: I5f7f4f9b386533cf27e955f14faf3fddd2b43b5b
2025-03-09 11:19:10 +02:00
Michael Bestas
afe59287ff
Merge tag 'android-15.0.0_r21' into staging/lineage-22.2_merge-android-15.0.0_r21
...
Android 15.0.0 Release 21 (BP1A.250305.020)
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8fKCAAKCRDorT+BmrEO
# eMs3AJ95J96e0Kv/3dVWOrkTI5HXZjn+7QCfT8gs70sr9lbjAIKOoMKAueJM8y0=
# =K75U
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Mar 5 05:50:32 2025 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com >" [ultimate]
# By timmyli (6) and others
# Via Android (Google) Code Review (65) and others
* tag 'android-15.0.0_r21': (87 commits)
Revert "Add amm experiment."
Reduce the trace instance irq_gia_google's buffer size
Remove code that just re-enables IRQ and GIA events
Add amm experiment.
storage: add missing bug_map
Add apf experiment.
modem_svc: add modem_svc_sit to solve sepolicy conflicts arising from different device versions
modem_svc: move shared_modem_platform related sepolicy to gs-common
Add Intelligence rc
Always include camera calibration tools in debug builds.
Add kswapd experiment.
Add Proc Vendor Sched Sepolicy Fix
Add recovery support for perf experiments.
Revert "Allow tachyon service to make binder calls to GCA"
Allow tachyon service to make binder calls to GCA
Add libg3a logging initrc files.
Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL
dump_chip_info: dump more tables from chip-info driver
Introduce interrupts module for debug and trace
Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
...
Conflicts:
aoc/aoc.mk
camera/lyric.mk
Change-Id: Ifd45cd3aa7799789ded7db2b0f24207c39367067
2025-03-09 10:58:51 +02:00
Michael Bestas
4460098bc5
Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6
...
Android 15.0.0 Release 6 (AP4A.241205.013)
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eIS/AJ9ojetnDXDlslBpaDU7nNPVrNv+WgCeMKWKeHmJn6acS37FiZBS9+jvpec=
# =JvPS
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec 6 00:44:01 2024 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com >" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
# 3 years. Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By Randall Huang (12) and others
# Via Android (Google) Code Review (58) and others
* tag 'android-15.0.0_r6': (91 commits)
gsc: Change the criteria for building GSC targets
sepolicy: remove irregular policy
Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"
Revert "Allow devices that use HIDL to find AIDL radio_ext_service"
gs-common: add rules for euiccpixel_app
audio: allow set_prop for vendor_audio_prop_restricted
Allow devices that use HIDL to find AIDL radio_ext_service
Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service, This is required for AHardwareBuffer allocation.
storage: fix ota selinux error
Storage: add sepolicy for recovery mode
Add sepolicy for gcam app
check_current_prebuilt: Symlink current prebuilt folder to android root
shamp: Update shared_modem_platform HAL version to 3
dumpstate: gsa: Add GSA logs to dumpstate
storage: fix vendor_init avc denied
storage: fix vold avc denied
storage: fix adb bugreport and refactor the existing rules
storage: fix PowerStats avc denied
storage: move sepolicy to common folder
shamp: Update shared_modem_platform HAL version to 2
...
Conflicts:
camera/lyric.mk
storage/init.storage.rc
Change-Id: I5ed6cff3b54261c949ec6ba60b32820b264b4ec2
2024-12-11 03:37:46 +02:00
Android Build Coastguard Worker
c16a334052
Snap for 12770256 from db9f7e0d38 to 25Q1-release
...
Change-Id: I85393c3de41fee214d075d98dae2ca217abd1b23
2024-12-10 00:32:23 +00:00
Chintan Pandya
db9f7e0d38
Merge "Reduce the trace instance irq_gia_google's buffer size" into main
2024-12-09 17:24:41 +00:00
Treehugger Robot
fbe4a4f483
Merge "storage: add missing bug_map" into main
2024-12-09 17:05:38 +00:00
Eileen Lai
37bd9aa71e
Merge changes from topic "move_shared_modem_platform_sepolicy" into main
...
* changes:
modem_svc: add modem_svc_sit to solve sepolicy conflicts arising from different device versions
modem_svc: move shared_modem_platform related sepolicy to gs-common
2024-12-09 15:09:36 +00:00
Satish Yalla
b09df07b37
Merge "Revert "Add amm experiment."" into main
2024-12-09 07:25:12 +00:00
Satish Yalla
92b52953a3
Revert "Add amm experiment."
...
This reverts commit 842b86dcc1 .
Reason for revert: DroidMonitor created revert due to b/382821677. Will be verified through ABTD for standard investigation.
Change-Id: I5b0d026155c2acb0d117aad7249592fc3fa72d61
2024-12-09 02:15:16 +00:00
Android Build Coastguard Worker
5b93422d7a
Snap for 12765415 from 81762fe218 to 25Q1-release
...
Change-Id: I1dd5ea7669dc2329f93bd95f23c3283823bf5163
2024-12-07 23:04:57 +00:00
Treehugger Robot
81762fe218
Merge "Add amm experiment." into main
2024-12-07 07:52:05 +00:00
Wei Wang
b848040c01
Merge "Add Proc Vendor Sched Sepolicy Fix" into main
2024-12-07 06:21:53 +00:00
Android Build Coastguard Worker
6500f6c7a4
Snap for 12763142 from d5909db27f to 25Q1-release
...
Change-Id: I8aa37581dc2cda23ea0b8cc112b1d1737ee4afd3
2024-12-07 02:04:35 +00:00
Chintan Pandya
f94206fea7
Reduce the trace instance irq_gia_google's buffer size
...
Bug: 382283364
Test: Verified that trace buffer size reduced.
Flag: EXEMPT, init rc change to reduce trace buffer size
Change-Id: I8bf50ac8fa3cff263592b3eca1a6b72a20b2b129
Signed-off-by: Chintan Pandya <chintanpandya@google.com >
2024-12-06 23:10:45 +00:00
Chintan Pandya
68a7a49504
Merge "Remove code that just re-enables IRQ and GIA events" into main
2024-12-06 23:10:12 +00:00
Chintan Pandya
2d6b42c487
Remove code that just re-enables IRQ and GIA events
...
These events are already enabled from kernel.
Bug: 378928822
Test: Verified that trace functionality works as expected.
Flag: EXEMPT, just a clean up in init rc
Change-Id: I9e50e3d86e914b0db8633a1ae7287875b4df9838
Signed-off-by: Chintan Pandya <chintanpandya@google.com >
2024-12-06 23:08:30 +00:00
Dmitry Skiba
842b86dcc1
Add amm experiment.
...
See go/pixel-perf-amm-experiment for more info.
Bug: 365855872
Test: build/flash; set .Perf__amm_experiment=true, observe auto_migration_margins_enable value changing 1->0; set .Perf__amm_experiment="", observe the value changing 0->1
Flag: NONE controlled by Mendel instead
Change-Id: I02b98e3601a0564929acb73250e2e943664bc80a
Signed-off-by: Dmitry Skiba <dskiba@google.com >
2024-12-06 22:15:49 +00:00
Jaegeuk Kim
9e1cdbc471
storage: add missing bug_map
...
The warning is WAI, so make a correct report.
[ 11.777638] [ T374] type=1400 audit(1733512828.220:561): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:vendor_intelligence_prop:s0" dev="tmpfs" ino=436 scontext=u:r:shell:s0 tcontext=u:object_r:vendor_intelligence_prop:s0 tclass=file permissive=1
w/
[ 10.560345] [ T376] type=1400 audit(1733515761.004:342): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:vendor_intelligence_prop:s0" dev="tmpfs" ino=436 scontext=u:r:shell:s0 tcontext=u:object_r:vendor_intelligence_prop:s0 tclass=file permissive=1 bug=b/378120929
Bug: 378120929
Flag: EXEMPT bugfix
Change-Id: Ia158d71c43e6006ee86a227b5a083bc27230ef71
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com >
2024-12-06 12:16:14 -08:00
Dmitry Skiba
d5909db27f
Add apf experiment.
...
See go/pixel-perf-apf-experiment for more info.
Bug: 365855872
Test: build/flash, set .Perf__apf_experiment=true and observe vendor.powerhal.apf_enabled=false, .apf_disabled=true
Flag: NONE controlled by Mendel instead
Change-Id: Iee32c4b160d5013fbbd893765d3df54c1befa458
Signed-off-by: Dmitry Skiba <dskiba@google.com >
2024-12-06 17:59:11 +00:00
Eileen Lai
8112ee64cc
modem_svc: add modem_svc_sit to solve sepolicy conflicts arising from different device versions
...
Add modem_svc_sit to gs-common. modem_svc_sit will support devices from gs101 to zuma_pro. The shared_modem_platform will be updated to support devices after zumapro (not include).
Bug: 372400955
Flag: NONE local testing only
Change-Id: I0bcc9baf69045327e6fcca92ab8003e303db2649
2024-12-06 12:49:05 +00:00
Treehugger Robot
c38d34d5e2
Merge "Add Intelligence rc" into main
2024-12-06 10:23:48 +00:00
Eileen Lai
2833eecc49
modem_svc: move shared_modem_platform related sepolicy to gs-common
...
Bug: 372400955
Change-Id: I8b08e5b7789a5b2bf027deed0afc97f87ca25f3f
Flag: NONE local testing only
2024-12-06 10:15:18 +00:00
Jaegeuk Kim
3bcf1e5891
Add Intelligence rc
...
By persist.vendor.intelligence,
# on -> mount(ok) -> on
# off -> write_zeroes -> remove -> rm(ok) -> disable
# on -> mount(fail) -> remove -> rm(ok) -> disable
For SEpolicy,
type=1400 audit(1731445557.444:32): avc: denied { read } for comm="kworker/u16:3" path="/dev/block/sda33" dev="tmpfs" ino=1050 scontext=u:r:kernel:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
type=1400 audit(1731445557.476:33): avc: denied { execute_no_trans } for comm="storage_intelli" path="/vendor/bin/toolbox" dev="dm-11" ino=368 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
type=1400 audit(1731448933.292:16): avc: denied { search } for comm="dd" name="block" dev="tmpfs" ino=12 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
type=1400 audit(1731461590.844:16): avc: denied { write } for comm="dd" name="sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
type=1400 audit(1731461590.844:17): avc: denied { open } for comm="dd" path="/dev/block/sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
Bug: 378120929
Flag: build.RELEASE_PIXEL_VENDOR_INTELLIGENCE_AID
Change-Id: If9d2f067e29b6c574d3b827ea509fec92c6d8028
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com >
2024-12-05 19:31:26 -08:00
Android Build Coastguard Worker
71c2b6331f
Snap for 12755599 from 4250b91047 to 25Q1-release
...
Change-Id: Ife06b0d41b2367ecc7ecaa3738b4c5adf81510ab
2024-12-06 00:03:10 +00:00
Treehugger Robot
2021b27dcc
Merge "Always include camera calibration tools in debug builds." into main
2024-12-05 23:13:29 +00:00
Krzysztof Kosiński
f7eae2a946
Always include camera calibration tools in debug builds.
...
These statements will be ignored if the packages are
unavailable, such as in the PDK build.
Bug: 380373922
Test: presubmit, check that tools exist in husky-userdebug
Flag: EXEMPT debug-only tool
Change-Id: Id3a524a6adaf1f719a23eb91ebad161ce0551af4
2024-12-05 20:11:21 +00:00
Dmitry Skiba
4250b91047
Add kswapd experiment.
...
See go/pixel-perf-25q1-experiments for the info.
Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=0, set .Perf__kswapd_experiment=true, observe /sys/kernel/vendor_mm/kswapd_cpu_affinity changes
Flag: NONE controlled by Mendel instead
Change-Id: Id63690f0dcd38de92e4c2fde5b0ab814ed3d9db1
Signed-off-by: Dmitry Skiba <dskiba@google.com >
2024-12-05 17:59:34 +00:00
Dmitry Skiba
d530f11290
Merge "Add recovery support for perf experiments." into main
2024-12-05 17:35:19 +00:00
Piotr Klasa
2c41fdac32
Add Proc Vendor Sched Sepolicy Fix
...
Bug: 361092565
Test: m atest && atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Test: adb shell dmesg | grep proc_vendor_sched ; adb logcat -d | grep proc_vendor_sched
Evidences
12-02 19:31:34.952 279 279 W init : type=1400 audit(0.0:7): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:8): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:9): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:10): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:11): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:12): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:13): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:14): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:15): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:16): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
Flag: EXEMPT bugfix
Change-Id: Iad58e23abc1a7e27c3f5f4130e50d7e4aa0b6cf8
2024-12-05 12:05:19 +01:00
Dmitry Skiba
afc6c28401
Add recovery support for perf experiments.
...
This change establishes a place for perf experiments and adds a
script to delay experiments for recovery purposes. For more info
see go/pixel-perf-experiment-whatif.
Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=10, verify that vendor.perf.allow_experiments=1 after 10 seconds
Flag: NONE controlled by Mendel instead
Change-Id: I78db482542066d5d5646d8c303dbe88054cfe66d
Signed-off-by: Dmitry Skiba <dskiba@google.com >
2024-12-05 09:07:27 +00:00
Dinesh Yadav
42fd113c8b
Merge "Revert "Allow tachyon service to make binder calls to GCA"" into main
2024-12-05 08:11:09 +00:00
Dinesh Yadav
6711886008
Revert "Allow tachyon service to make binder calls to GCA"
...
This reverts commit 97f50223aa .
Reason for revert: This change breaks git_main-without-vendor as google_camera_app & debug_camera_app are not supported in non-vendor builds.
Change-Id: I9bf47c59aa036caf66e2f3fe5d7b6ea0938e4442
2024-12-05 08:02:02 +00:00
Dinesh Yadav
9c65d0ceaa
Merge "Allow tachyon service to make binder calls to GCA" into main
2024-12-05 06:02:06 +00:00
Bowen Lai
8a3ec83793
Merge "Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL" into main
2024-12-05 03:05:46 +00:00
Android Build Coastguard Worker
74ebecb396
Snap for 12742097 from 5f10a44aab to 25Q1-release
...
Change-Id: I4f285997f937403893084980f68990a3a71a8897
2024-12-04 00:03:28 +00:00
Xin Li
5f10a44aab
[automerger skipped] Merge ab/AP4A.241205.013 into aosp-main-future am: c0a71b7d0e -s ours
...
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30626201
Change-Id: I4eed38d9ea2b766b1e6312c4ac510fcb51ac4234
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-12-03 18:22:09 +00:00
Dinesh Yadav
97f50223aa
Allow tachyon service to make binder calls to GCA
...
This permission is needed for tachyon service to call callbacks.
AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212 6987 6987 W com.google.edge: type=1400 audit(0.0:17): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424 4166 4166 W com.google.edge: type=1400 audit(0.0:254): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0
Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: Id27ecd53e9ea7fbf273be098749cdaece55d00cb
2024-12-03 06:20:57 +00:00
Krzysztof Kosiński
5085275f71
Add libg3a logging initrc files.
...
These files are installed on the vendor partition regardless
of whether we use a prebuilt APEX or build it from source.
History links (Google internal only):
libg3a_gabc.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gABC/libg3a_gabc.rc;drc=82654c90cc30d21948d0be24931edda10739caf0
libg3a_gaf.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gAF/libg3a_gaf.rc;drc=1e01ef4606e8553866d803a30e4284485ff12741
libg3a_ghawb.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gHAWB/libg3a_ghawb.rc;drc=82654c90cc30d21948d0be24931edda10739caf0
Bug: 380379803
Test: presubmit, check husky logs when prebuilt APEX is used
Flag: EXEMPT build system fix
Change-Id: I405c0e3ad78d63e3faee8723c2ba7ba7cf0dd6db
2024-12-02 20:42:13 +00:00
Android Build Coastguard Worker
eeb419becc
Snap for 12730349 from 419a3d8812 to 25Q1-release
...
Change-Id: I4eba6bf8af2d206bf24ebffaf5066e008458ccfb
2024-11-30 02:03:09 +00:00
Zhengyuan Cui
419a3d8812
Merge "Allow command line tools to access Tachyon service in user builds." into main
2024-11-29 04:13:12 +00:00
bowenlai
e93068e6ca
Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL
...
Also add framework_compatibility_matrix.xml for aoc stable AIDL
Bug: 380993517
Flag: EXEMPT HAL interface change
Test: local build
Change-Id: I8a41ff1bdd4ffc8e5d7da08879738aa11fb81813
2024-11-28 15:01:26 +08:00
Android Build Coastguard Worker
16cdfdcf59
Snap for 12722466 from 75eed3f8c2 to 25Q1-release
...
Change-Id: If2022f08ea9bc79423913fac1287f9abda670079
2024-11-28 00:03:14 +00:00
Xin Li
c0a71b7d0e
Merge ab/AP4A.241205.013 into aosp-main-future
...
Bug: 370570306
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I15a1c680b1877aa299e5c865a5a78c6ce2bd4a62
2024-11-27 12:53:10 -08:00
Lucas Wei
75eed3f8c2
Merge "dump_chip_info: dump more tables from chip-info driver" into main
2024-11-27 03:40:59 +00:00
Lucas Wei
219845f0d9
dump_chip_info: dump more tables from chip-info driver
...
Add instructions to dump more tables from chip-info driver and grant
permissions by sepolicy.
Flag: EXEMPT, add more table entries for dumping
Test: adb shell dumpsys android.hardware.dumpstate.IDumpstateDevice/default dump_chip_info
Bug: 376346526
Change-Id: Ic9d0bb2059271e95e615e8f64cab129fa8358484
2024-11-27 03:40:47 +00:00
Kiwon Park
1dc746078a
Merge "gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode" into main
2024-11-27 03:33:01 +00:00
Android Build Coastguard Worker
898b496589
Snap for 12715656 from fa32332a55 to 25Q1-release
...
Change-Id: I221011f2e4196eb8dc477a14d9b9bcc16b6dc60f
2024-11-27 00:03:50 +00:00
Aleks Rozman
fa32332a55
Merge "Build lyric from source if prebuilt directory is missing." into main
2024-11-26 18:50:12 +00:00
Treehugger Robot
0a669d77cf
Merge "Document radioext_interface_type soong variable usage" into main
2024-11-26 05:17:15 +00:00
Treehugger Robot
5367ab60fc
Merge "dump_gps: collect gps logs in ascending order" into main
2024-11-26 04:34:59 +00:00
Android Build Coastguard Worker
f57721d3f2
Snap for 12705048 from 1b957304b3 to 25Q1-release
...
Change-Id: I7e20b3244b8d45990780278ea7508b87444ec788
2024-11-24 22:02:43 +00:00
Treehugger Robot
1b957304b3
Merge "Introduce interrupts module for debug and trace" into main
2024-11-24 16:04:01 +00:00
Android Build Coastguard Worker
4153dc553c
Snap for 12704382 from d3f90503f7 to 25Q1-release
...
Change-Id: I02ba559029a2b4c08e6a3c5bc856b3273105c5eb
2024-11-23 22:02:53 +00:00
Will Song
d3f90503f7
Merge changes from topic "reland_common_perf_config" into main
...
* changes:
Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
Revert^2 "gs-common: Added common perf init.rc"
2024-11-23 07:29:48 +00:00
Chintan Pandya
d6b9cc46bf
Introduce interrupts module for debug and trace
...
Interrupts module has following functions to perform:
1. Apply boot time configuration
- Create a new trace instance
- Enable required irq and irq_gia events in the
instance
- Apply required filters on the high frequency
events
- Set instance's trace buffer size
- Enable tracing
2. Sepolicy for every required access
3. Copy interrupts trace buffer to dumpsys whenever triggered
AVC denials:
avc: denied { search } for comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { write } for comm="dump_interrupts" name="all_logs" dev="dm-53" ino=7808 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { add_name } for comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { create } for comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { search } for comm="dump_interrupts" name="instances" dev="tracefs" ino=2151 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
avc: denied { search } for comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { read } for comm="dump_interrupts" name="trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc: denied { open } for comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc: denied { create } for comm="dump_interrupts" name="interrupts_trace" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { write open } for comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=8102 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=141578 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=7965 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
Flag: EXEMPT, add interrupts traces dump program to bugreport
Bug: 376124648
Test: Manually checked boot time trace configuration. Collected
`adb bugreport`. And checked interrupt traces are dumped
into and extracted out from the bugreport. More details
in the bug.
Change-Id: I08872a321fa9726b50a54aeb0a91ed63c0652a3a
2024-11-22 21:38:57 +00:00
Will Song
db25f03ec3
Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
...
Re-land after making SELinux corrections.
7606e41504
Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com >
Change-Id: I8721e1fb7f9df5b476a27e2db8aea8a5c395b233
2024-11-22 09:08:17 -08:00
Will Song
168f30d8a1
Revert^2 "gs-common: Added common perf init.rc"
...
Re-land after making SELinux corrections.
98e6a61c1f
Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com >
Change-Id: I4ae6407e7edeeed4b62774698b5cb85d32a01c2d
2024-11-22 09:08:08 -08:00
Android Build Coastguard Worker
e89b70bf3a
Snap for 12695596 from cafe80b310 to 25Q1-release
...
Change-Id: Ie0aee6d7d664b31014f57720d0405bf88066d492
2024-11-22 00:03:09 +00:00
Liana Kazanova (xWF)
cafe80b310
Merge "Revert "modem_svc: move shared_modem_platform related sepolicy t..."" into main
2024-11-21 20:16:06 +00:00
Meng Wang
8fb8122f3b
gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode
...
So all eSIM bootstrap configs are included in one shot.
This change is no-op for devices already including esim.mk because the sysproop was already set so.
Flag: NONE no-op mk change
Bug: 380280915
Change-Id: Ic1e83e4cd2ad546ddecbef7234457559894217e1
2024-11-21 18:19:31 +00:00
Liana Kazanova (xWF)
74283c5cbe
Revert "modem_svc: move shared_modem_platform related sepolicy t..."
...
Revert submission 30519089-move_modem_sepolicy
Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.
Reverted changes: /q/submissionid:30519089-move_modem_sepolicy
Change-Id: I241b3aba370f77c705ca3890151e760b4764beca
2024-11-21 17:54:12 +00:00
Eileen Lai
6db7e6756d
Merge "modem_svc: move shared_modem_platform related sepolicy to gs-common" into main
2024-11-21 17:03:11 +00:00
Edwin Tung
e8884c92fb
dump_gps: collect gps logs in ascending order
...
Bug: 359797762
Test: Check gps file in dumpstate
Flag: EXEMPT, add gps dump to bugreport
Change-Id: Ia869e634c5f526f217fd24595a6f415c30046980
2024-11-21 10:19:39 +00:00
Eileen Lai
20bb32819d
modem_svc: move shared_modem_platform related sepolicy to gs-common
...
Bug: 372400955
Flag: NONE local testing only
Change-Id: Ia23ff9f43ee855c2a758714d025123c071e9c288
2024-11-21 08:27:55 +00:00
Dinesh Yadav
acf0eb0ee5
Merge "Add sepolicy for edgetpu_tachyon_service to report metrics" into main
2024-11-21 08:25:01 +00:00
Dinesh Yadav
064b50e43b
Add sepolicy for edgetpu_tachyon_service to report metrics
...
This permission is needed to report errors encountered while running gxp workloads to telemetry services.
AVC Error seen while reporting errors:
11-21 09:30:05.711 406 406 E SELinux : avc: denied { find } for pid=1821 uid=1000 name=android.frameworks.stats.IStats/default scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=0
Bug: 359404493
Flag: EXEMPT updates device sepolicy only
Change-Id: Ic282928aad6283077e183f931230f79eea49053d
Signed-off-by: Dinesh Yadav <dkyadav@google.com >
2024-11-21 06:39:00 +00:00
Boon Jun
e3df39e77c
Document radioext_interface_type soong variable usage
...
Bug: 377991853
Bug: 371878208
Test: None
Flag: EXEMPT DOCS_ONLY
Change-Id: Ibb722d63ee726aeead0f7c89bdfa21c0ad3ae6b3
2024-11-21 05:38:22 +00:00
Wesley Lee
9cb50229d9
Merge "mediacodec: add GPU access policy" into main
2024-11-21 03:31:04 +00:00
Cheng Chang
90398dea27
Merge "sepolicy: Allow hal_gnss_pixel create file" into main
2024-11-21 00:39:46 +00:00
Android Build Coastguard Worker
2bf583b8c8
Snap for 12687986 from 0cf5a2a95d to 25Q1-release
...
Change-Id: Ic44ddf08536c85d8c4799294930e95ab6af0e930
2024-11-21 00:03:28 +00:00
Aleks Rozman
83e7cc5a7f
Build lyric from source if prebuilt directory is missing.
...
On select branches, like the camera-stability, the prebuilt directory is missing so we want to make sure that it is building from source even if the flags tell us that a prebuilt should be used.
Bug: 380099804
Change-Id: I8832451c1f7ff6d6de3c2991e9f63317966a2f83
Test: Make on camera-stability-dev and verify warning
Flag: EXEMPT (not applicable)
2024-11-20 22:48:19 +00:00
Wesley Lee
0649754278
mediacodec: add GPU access policy
...
avc: denied { read write }
for comm="binder:757_6" name="renderD128" dev="tmpfs"
ino=1566 scontext=u:r:mediacodec_google:s0
tcontext=u:object_r:gpu_device:s0 tclass=chr_file permissive=1
Bug: 378609071
Flag: EXEMPT bugfix
Test: run cts -m CtsMediaV2TestCases -t
android.mediav2.cts.CodecEncoderSurfaceTest#testSimpleEncodeFromSurface[26_c2.google.av1.encoder_video/av01_c2.google.av1.decoder_video/av01_512kbps_30fps_yuv420flexible_tonemapyes_persistentsurface]
Change-Id: I2af4f53c9ff8aca0d3c7fd721738f2044d4772fd
Signed-off-by: Wesley Lee <szuweilee@google.com >
2024-11-20 06:29:09 +00:00
Daniel Lee
0cf5a2a95d
Merge "storage: turn off writebooster flags upon init" into main
2024-11-20 05:12:10 +00:00
Android Build Coastguard Worker
34b68901a2
Snap for 12680993 from fa76c993b7 to 25Q1-release
...
Change-Id: I914c57ae3f13fbd031ad30e9c8edfd5870ddc200
2024-11-20 00:04:05 +00:00
Julius Snipes
993506e4f1
GRIL sepolicy for aidl radioext v2.1
...
avc: denied { find } for pid=2019 uid=10269 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c13,c257,c512,c768 tcontext=u:object_r:hal_aidl_radio_ext_service:s0 tclass=service_manager permissive=1
avc: denied { find } for pid=6500 uid=10242 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0
avc: denied { find } for interface=vendor.google.radioext::IRadioExt sid=u:r:grilservice_app:s0:c242,c256,c512,c768 pid=6500 scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=0
avc: denied { read write } for comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1
avc: denied { search } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1
avc: denied { read } for name="link_rate" dev="sysfs" ino=111840 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Bug: 355774451
Change-Id: Iea5e0cdff82b140caa1e8b6717e94d6d78076b28
Test: verify with test roms
Flag: EXEMPT sepolicy
2024-11-19 23:27:20 +00:00
Daniel Lee
350e262415
storage: turn off writebooster flags upon init
...
Enabling writebooster capability for Pixel UFS (pa/2994670)
enabled the following flags in Android Common Kernel:
- wb_flush_en
- wb_flush_during_h8
- wb_enable
This patch disables these writebooster-related flags to restore the
intended behavior for Pixel devices. This overrides the default Android
Common Kernel behavior.
While 'wb_flush_en' and 'wb_enable' have corresponding sysfs entries
('enable_wb_buf_flush' and 'wb_on') for toggling,
'wb_flush_during_h8' currently lacks this functionality in the Android
Common Kernel. Pixel provides the 'manual_gc' sysfs entry as a
workaround. Setting 'manual_gc' to 0 disables 'wb_flush_during_h8'.
Bug: 377958570
Flag: EXEMPT bugfix
Test: check if all writebooster-realated flags are false upon init
Change-Id: I918bf6939de3e208b715f554a96ccbd053f68a18
Signed-off-by: Daniel Lee <chullee@google.com >
2024-11-19 17:22:10 +00:00
Android Build Coastguard Worker
a43871d569
Snap for 12673321 from 32569fc7e5 to 25Q1-release
...
Change-Id: I392e8af4081c88356e99e13aa1876d7a91717e3d
2024-11-19 00:07:07 +00:00
Tommy Chiu
fa76c993b7
[automerger skipped] gsc: Change the criteria for building GSC targets am: 421324351c -s ours
...
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 8af77ef942 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30467455
Change-Id: I008809abb19974fc20f8f5047d08b017d9d3ae3d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-11-18 21:45:44 +00:00
Tommy Chiu
421324351c
gsc: Change the criteria for building GSC targets
...
There can be a case where vendor directory exists but vendor/google_nos
does not.
Bug: 371059500
Test: manual
Flag: EXEMPT refactor
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8af77ef94228bf37bd7be4d8db496f7084e0333d )
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-11-18 18:10:31 +00:00
Robert Lee
32569fc7e5
Merge "audio: update hdmi audio path" into main
2024-11-18 03:10:31 +00:00
Robert Lee
5a063cc17b
audio: update hdmi audio path
...
Add permission to read HDMI states by audio hal.
For new project is using
/devices/platform/dwc_dptx-audio/extcon/hdmi_audio
For old projects are using
/devices/platform/drmdp-adma/extcon/hdmi_audio
Bug: 328784922
Test: builds
Flag: EXEMPT update sepolocy
Change-Id: I3bd0ccf1ee804de3157e759eac275673c9fc96a2
Signed-off-by: Robert Lee <lerobert@google.com >
2024-11-18 03:08:08 +00:00
Android Build Coastguard Worker
c607d9ae35
Snap for 12667701 from 36f37eaf3b to 25Q1-release
...
Change-Id: Ieb1db54f556ba3627e888e8302b048abb3e2f414
2024-11-16 22:52:30 +00:00
Android Build Coastguard Worker
1e71dec3fc
Snap for 12664851 from 3c9ee42c23 to 25Q1-release
...
Change-Id: I7ffaacb34db5dc2802c72b9d5dd9b773d397262d
2024-11-16 02:03:51 +00:00
Madhav Iyengar
36f37eaf3b
Merge "Give ContextHub HAL access to AOC version" into main
2024-11-15 21:51:42 +00:00
Kai Hsieh
3c9ee42c23
Merge "Revert^2 "Add GIA (Google Input interface Abstraction laye..."" into main
2024-11-15 05:32:43 +00:00
Android Build Coastguard Worker
9351024f1c
Snap for 12658558 from efc0fc73ea to 25Q1-release
...
Change-Id: Ic46f3a5bdc231051adc0f73c532ac6a507659b05
2024-11-15 00:03:19 +00:00
Kai Hsieh
97586506bb
Revert^2 "Add GIA (Google Input interface Abstraction laye..."
...
Revert submission 30378113-revert-29512389-gia-PMLMEKURMT
Reason for revert: Revert to fix the issue that GIA cannot be started in caimen-next-userdbg
Reverted changes: /q/submissionid:30378113-revert-29512389-gia-PMLMEKURMT
Bug: 367881686
Change-Id: Iecc4738c10dfe244bea02611f1926a9f6264a46c
2024-11-14 10:10:46 +00:00
Cheng Chang
303cf04de1
sepolicy: Allow hal_gnss_pixel create file
...
[ 7564.504317] type=1400 audit(1731556655.872:63): avc: denied { create } for comm="android.hardwar" name="android.hardware.gnss-service.pixel" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=file permissive=0 bug=b/378004800
flag: EXEMPT the function has been verified at userdebug ROM.
Bug: 378004800
Bug: 377446770
Test: b/378004800 abtd to check sepolicy
Test: b/377446770#comment1 verified the coredump function on user ROM.
Change-Id: If5cbe1dfde904f7d1eb0daaa53fa6bef19161f01
2024-11-14 09:42:15 +00:00
Android Build Coastguard Worker
5e59303ad4
Snap for 12651823 from 6e5b6a6998 to 25Q1-release
...
Change-Id: I83b12f35c4e0867ffba20a3bb4e7069a8dcf0d57
2024-11-14 00:03:03 +00:00
Xin Li
efc0fc73ea
[automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: 61302f297c -s ours
...
am skip reason: Merged-In Idd70cf3d846fad1a25060ebfb6ae6a99599fd861 with SHA-1 d43a6e1c5a is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30284589
Change-Id: I323ceafb8b8140a941b906990b0cb63e3c941515
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-11-13 23:00:57 +00:00
Madhav Iyengar
e546ba5bae
Give ContextHub HAL access to AOC version
...
Required to gate use of the new ContextHub HAL <-> CHRE transport on the
availability of a bugfix in AOC.
Bug: 378367295
Flag: android.chre.flags.efw_xport_in_context_hub
Test: ...
Change-Id: Ibd5e3d20b7e5c14ea2200d85c179a4e96eb3b65a
2024-11-13 21:07:38 +00:00
Kai Hsieh
6e5b6a6998
Merge "Revert "Add GIA (Google Input interface Abstraction layer) relat..."" into main
2024-11-13 14:42:35 +00:00
ELIYAZ MOMIN (xWF)
c68ac049e1
Revert "Add GIA (Google Input interface Abstraction layer) relat..."
...
Revert submission 29512389-gia
Reason for revert: <Potential culprit for b/378865024 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.>
Reverted changes: /q/submissionid:29512389-gia
Change-Id: Ia4fd036130e54a5573efbd02a044631232561ea1
2024-11-13 14:06:24 +00:00
Treehugger Robot
cad0ccbb94
Merge "Introduce Pixel mailbox module" into main
2024-11-13 08:49:49 +00:00
Lucas Wei
f39a955d95
Introduce Pixel mailbox module
...
Introduce Pixel mailbox module to dump debugging messages and integrate
with bugreport.
This patch also create sepolicy files to avoid avc denied.
avc: denied { search } for comm="dump_mailbox" name="radio" dev="dm-57" ino=375 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { search } for comm="dump_mailbox" name="instances" dev="tracefs" ino=4203 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
avc: denied { read } for comm="dump_mailbox" name="trace" dev="tracefs" ino=7250 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1
avc: denied { open } for comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=7187 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_traci
avc: denied { create } for comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { write open } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=29097 scontext=u:r:dump_mailbox:s0 tcontex=1
avc: denied { getattr } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=29097 scontext=u:r:dump_mailbox:s0 tcontext=ut=5 audit_backlog_limit=64
=1
avc: denied { read } for comm="dump_mailbox" name="trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1
avc: denied { open } for comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1
avc: denied { create } for comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { write open } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=30937 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=30937 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { create } for comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclas(6 results) 15:39:41 [4796/19306]
avc: denied { write open } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=32864 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=32864 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
Flag: EXEMPT, add mailbox dump program to bugreport
Bug: 363168077
Change-Id: I622f37bf8f913df8d9b242ab206fc267d446753d
2024-11-13 07:52:03 +00:00
Kai Hsieh
9c0119a3d2
Merge "Add GIA (Google Input interface Abstraction layer) related SEPolicy rules and AIDL compatibility matrices." into main
2024-11-13 07:05:58 +00:00
Android Build Coastguard Worker
7993e14af2
Snap for 12644741 from 993cd00d79 to 25Q1-release
...
Change-Id: Ibff35ba4e173e93b8ee6cba694098bfea3ba7c61
2024-11-13 00:03:21 +00:00
timmyli
cfedcac7d7
Remove bug comment
...
Bug: 363018500
Test: comment only
Flag: EXEMPT remove comment
Change-Id: I86ed9f0e7ed5b3741b23afffb2d7440683f34eb0
2024-11-12 18:40:13 +00:00
Treehugger Robot
993cd00d79
Merge "Replace many app service permission with app_api_service" into main
2024-11-12 18:36:27 +00:00
Ocean Chen
594e90f573
Merge "Revert "storage: Defer blkio class configuration"" into main
2024-11-12 02:21:33 +00:00
Ocean Chen
3330640782
Revert "storage: Defer blkio class configuration"
...
This patch change the I/O schedulor back to mq-deadline before boot completed.
Bug:374905027
Test: forrest run
This reverts commit 0af034bf9f .
Change-Id: Ie49fb8a62d6fdb8da112e83d5a8e3551b0072379
2024-11-12 02:21:23 +00:00
Android Build Coastguard Worker
a092a1d146
Snap for 12637843 from ea38f5c687 to 25Q1-release
...
Change-Id: I1c8956ef66e1054578a1874c5a39695bb59f4943
2024-11-12 00:03:06 +00:00
timmyli
872e432821
Replace many app service permission with app_api_service
...
We don't need to grant permissions to all these things. Just
app_api_service is enough.
Bug: 363018500
Test: manual test with GCA Eng
Flag: EXEMPT add permissions
Change-Id: I2457b54b244b2739e89393f52442afd4544418f1
11-08 00:33:23.429 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=activity scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.436 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=display scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:display_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.439 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=network_management scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.453 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=connectivity scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:connectivity_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.457 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=netstats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.470 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=mount scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:mount_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.488 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=jobscheduler scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:jobscheduler_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.502 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=shortcut scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:shortcut_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.604 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=notification scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:notification_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.606 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=content scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:content_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.627 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=content_capture scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.630 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=gpu scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.630 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=activity_task scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.643 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=sensorservice scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.644 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=virtualdevice_native scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.652 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=device_policy scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.652 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=batterystats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.653 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=powerstats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:powerstats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.662 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=trust scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.677 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=device_state scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.718 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=vibrator_manager scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:vibrator_manager_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.724 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=input_method scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:input_method_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.732 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=power scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:power_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.733 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=thermalservice scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.784 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.786 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=autofill scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.795 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.798 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=graphicsstats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:graphicsstats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.798 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=performance_hint scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.835 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=clipboard scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.029 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.130 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=backup scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.160 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=audio scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.368 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.364 16052 16052 I GoogleCameraEng: type=1400 audit(0.0:1555): avc: denied { read } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:24.364 16052 16052 I GoogleCameraEng: type=1400 audit(0.0:1556): avc: denied { open } for path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:24.650 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.872 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=package_native scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
11-08 00:33:26.556 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=input scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:input_service:s0 tclass=service_manager permissive=1
11-08 00:33:34.977 344 344 E SELinux : avc: denied { find } for pid=16052 uid=10296 name=storagestats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:storagestats_service:s0 tclass=service_manager permissive=1
11-08 00:33:42.547 344 344 E SELinux : avc: denied { find } for pid=16961 uid=10296 name=activity scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
11-08 00:33:42.593 344 344 E SELinux : avc: denied { find } for pid=16961 uid=10296 name=mount scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:mount_service:s0 tclass=service_manager permissive=1
11-08 00:33:42.656 16961 16961 I GoogleCameraEng: type=1400 audit(0.0:1681): avc: denied { read } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:42.656 16961 16961 I GoogleCameraEng: type=1400 audit(0.0:1682): avc: denied { open } for path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:42.726 344 344 E SELinux : avc: denied { find } for pid=16961 uid=10296 name=content scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:content_service:s0 tclass=service_manager permissive=1
Change-Id: I91235f2f699fd07107eaa11174beee895559770e
2024-11-11 18:00:58 +00:00
Snehal Koukuntla
ea38f5c687
Add widevine SELinux permissions for L1
...
839 839 I android.hardwar: type=1400 audit(0.0:982): avc: denied { read } for name="system" dev="tmpfs" ino=1313 scontext=u:r:hal_drm_widevine:s0 tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file permissive=1
Bug: 363181505
Flag: EXEMPT bugfix
Change-Id: Ib9391b24f03a7306b8ba42c960d4c77c5bf148e8
2024-11-08 17:04:21 +00:00
Android Build Coastguard Worker
79c1d9921a
Snap for 12623742 from ba53a62a59 to 25Q1-release
...
Change-Id: Id34703b961eb399d7dc8e96a98ff4de67494048a
2024-11-08 00:03:23 +00:00
Michael Bestas
c3bf3419ad
Merge tag 'android-15.0.0_r5' into staging/lineage-22.0_merge-android-15.0.0_r5
...
Android 15.0.0 release 5
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZyvedgAKCRDorT+BmrEO
# eA+nAJ9tZiVlWuLXPuOc0IS9uMDXxsYy8ACePKq1szLOcZHeCqR7vR03lDwGvWo=
# =OL20
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Nov 6 23:24:06 2024 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com >" [marginal]
# gpg: initial-contribution@android.com: Verified 2337 signatures in the past
# 3 years. Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By bgkim
# Via Android Build Coastguard Worker
* tag 'android-15.0.0_r5':
bootctrl: fixed OOB read in BootControl
Change-Id: Ia26931b9bc054f359359c41314235f9f7f1c68aa
2024-11-07 14:54:51 +02:00
Android Build Coastguard Worker
8abc2c9922
Snap for 12616459 from 84d3523c6c to 25Q1-release
...
Change-Id: I9f28c10af64d538ea66fe5f0cd258607d88312e0
2024-11-07 00:06:14 +00:00
Zhengyuan Cui
2f08dd633a
Allow command line tools to access Tachyon service in user builds.
...
Bug: 377528455
Change-Id: I878e960b32af45030cebf73e9138752506c37953
Flag: tachyon
2024-11-06 20:40:46 +00:00
Xin Li
61302f297c
Merge 24Q4 (ab/12406339) into aosp-main-future
...
Bug: 370570306
Merged-In: Idd70cf3d846fad1a25060ebfb6ae6a99599fd861
Change-Id: I254edf09968accebbee718cb5494612d0e5031e7
2024-11-06 10:31:19 -08:00
Timmy Li
ba53a62a59
Revert^2 "Add more access for GCA to edgetpu"
...
This reverts commit 84d3523c6c .
Reason for revert: Remerge attempt after fixing build error.
Bug: 361092857
Test: manual test with GCA for permissions
Flag: EXEMPT add permissions
11-06 03:01:49.736 719 719 W binder:719_3: type=1400 audit(0.0:710): avc: denied { read write } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1542 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=0
Change-Id: I89ec01928edc4fcb4832d2da84c442354a65c25c
2024-11-06 18:24:20 +00:00
ELIYAZ MOMIN (xWF)
84d3523c6c
Revert "Add more access for GCA to edgetpu"
...
This reverts commit 132ad09bce .
Reason for revert: <Potential culprit for b/377693729 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.>
Change-Id: Ic0cf086e2dc3aad19b1e0965873f9966ad7e6c29
2024-11-06 16:54:52 +00:00
timmyli
132ad09bce
Add more access for GCA to edgetpu
...
Bug: 361092857
Test: manual test to check permissions
Flag: EXEMPT add permissions
11-06 03:01:49.736 719 719 W binder:719_3: type=1400 audit(0.0:710): avc: denied { read write } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1542 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=0
Change-Id: I2ef4ac39645179fe2a2ec1d7aeac928a43a01a61
2024-11-06 08:47:39 +00:00
Timmy Li
5f7aae6dac
Merge "Consolidate gca permissions inside gs-common" into main
2024-11-06 03:53:26 +00:00
Frank Yu
4cea32f400
Merge "Allow grilservice_app to binder call twoshay" into main
2024-11-06 03:25:18 +00:00
Android Build Coastguard Worker
066da71397
Snap for 12609205 from 91ee7dae60 to 25Q1-release
...
Change-Id: I88a4444efeb51f6baa290b9a1d65562477472e4a
2024-11-06 00:03:52 +00:00
timmyli
cb2c9c91c1
Consolidate gca permissions inside gs-common
...
SeLinux team is making an effort to have a general set of permissions
inside gs-common for GCA as oppose to having a new google_camera_app.te
for each device generation. Move the next gen permissions to the gs-common.
Bug: 361092857
Test: manual test to check permissions
Flag: EXEMPT add permissions
11-05 16:28:30.048 5720 5720 I FinishThread: type=1400 audit(0.0:665): avc: denied { read write } for name="gxp" dev="tmpfs" ino=1545 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera
11-05 16:28:30.048 5720 5720 I FinishThread: type=1400 audit(0.0:666): avc: denied { open } for path="/dev/gxp" dev="tmpfs" ino=1545 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera
11-05 16:28:30.048 5720 5720 I FinishThread: type=1400 audit(0.0:667): avc: denied { ioctl } for path="/dev/gxp" dev="tmpfs" ino=1545 ioctlcmd=0xee06 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera
11-05 16:15:05.062 332 332 E SELinux : avc: denied { find } for pid=5586 uid=10155 name=com.google.edgetpu.IEdgeTpuAppService/default scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_app_service:s0 tclass=service_manager permissive=1
11-05 16:15:06.356 5586 5586 I frame-quality-s: type=1400 audit(0.0:554): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1542 ioctlcmd=0xed23 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera
Change-Id: Ie38edbf7e2fecf6bc45605a947ad6fc63d4f4378
2024-11-05 21:57:22 +00:00
Timmy Li
91ee7dae60
Merge "Add permissions for GCA to access various services" into main
2024-11-05 19:37:39 +00:00
Treehugger Robot
ff585df52b
Merge "Allow fingerprint HAL to access IGoodixFingerprintDaemon" into main
2024-11-05 10:34:29 +00:00
KRIS CHEN
8d4f1c1f07
Allow fingerprint HAL to access IGoodixFingerprintDaemon
...
Fix the following avc denial:
avc: denied { add } for pid=1285 uid=1000 name=vendor.goodix.hardware.biometrics.fingerprint.IGoodixFingerprintDaemon/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0
Flag: EXEMPT NDK
Bug: 376602341
Test: boot with no relevant error
Change-Id: I12b5824d239bb3b55bb82fb50b9f6fc4c38b36c5
2024-11-05 09:31:29 +00:00
timmyli
5c50ccab62
Add permissions for GCA to access various services
...
app_api_service gives access to blanket app service permissions. The
more specific ones are listed in logs below.
Bug: 370899024
Bug: 375958865
Test: manual test with GCA to verify permissions
Flag: EXEMPT refactor
Specific logs:
11-05 01:13:34.640 332 332 E SELinux : avc: denied { find } for pid=5493 uid=10155 name=media.player scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mediaserver_service:s0 tclass=service_manager permissive=1
11-05 01:13:34.641 332 332 E SELinux : avc: denied { find } for pid=5493 uid=10155 name=media.camera scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:cameraserver_service:s0 tclass=service_manager permissive=1
11-05 01:29:31.002 326 326 E SELinux : avc: denied { find } for pid=5465 uid=10155 name=media.metrics scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass=service_manager permissive=1
11-05 01:29:31.498 326 326 E SELinux : avc: denied { find } for pid=5465 uid=10155 name=media.extractor scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mediaextractor_service:s0 tclass=service_manager permissive=1
11-05 01:29:30.961 326 326 E SELinux : avc: denied { find } for
pid=5465 uid=10155 name=media.audio_flinger
scontext=u:r:google_camera_app:s0:c155,c256,c512,c768
tcontext=u:object_r:audioserver_service:s0 tclass=service_manager
permissive=1
Logs from app services blanket granted by app_api_service
10-28 02:25:22.057 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=content scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:content_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.953 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=connectivity scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:connectivity_service:s0 tclass=service_manager permissive=1
10-28 02:25:22.577 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=power scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:power_service:s0 tclass=service_manager permissive=1
10-28 02:25:22.062 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=notification scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:notification_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.988 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=appops scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:appops_service:s0 tclass=service_manager permissive=1
10-28 02:25:22.014 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=user scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:user_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.852 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=display scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:display_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.998 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=jobscheduler scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:jobscheduler_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.855 339 339 I auditd : avc: denied { find } for pid=10509 uid=10149 name=network_management scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager permissive=1
10-02 05:40:18.428 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=content_capture scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.270 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=device_policy scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.215 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=sensorservice scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
10-02 05:40:18.166 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=netstats scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.219 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=virtualdevice_native scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.230 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=thermalservice scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.224 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=media.camera scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:cameraserver_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.214 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=media.player scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:mediaserver_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.485 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=backup scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
10-02 05:40:17.920 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=activity scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.511 355 355 I auditd : avc: denied { find } for pid=9560 uid=10129 name=device_state scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
Change-Id: I9bd98af328f948152c89f9f2c3a066a951f4aaad
2024-11-05 06:48:54 +00:00
Enzo Liao
31cb3f5521
Merge "RamdumpService: Update the SELinux policy for Flood Control to use Firebase Cloud Firestore." into main
2024-11-05 03:38:08 +00:00
Android Build Coastguard Worker
f82c4a9a47
Snap for 12602378 from 4ec2ce09c4 to 25Q1-release
...
Change-Id: Ifa825bd207fe0d7aaaac9220fa7fd1ba4bef165a
2024-11-05 00:03:55 +00:00
Treehugger Robot
4ec2ce09c4
Merge "[USB Audio] Fix SEPolicy issue" into main
2024-11-04 03:28:24 +00:00
Frank Yu
50930b4181
Allow grilservice_app to binder call twoshay
...
avc error log:
[ 37.308566] type=1400 audit(1730161331.968:20): avc: denied { call } for comm="pool-3-thread-1" scontext=u:r:grilservice_app:s0:c253,c256,c512,c768 tcontext=u:r:twoshay:s0 tclass=binder permissive=0 bug=b/375564898 app=com.google.android.grilservice
Flag: EXEMPT bugfix
Bug: 375564898
Change-Id: I7bd57884763e255be57455b138e306c904bc66e1
2024-11-01 09:04:43 +00:00
Enzo Liao
8ad4c5c9b9
RamdumpService: Update the SELinux policy for Flood Control to use Firebase Cloud Firestore.
...
Bug: 369260803
Design: go/fc-app-server
Flag: NONE N/A
Change-Id: Iebc91446aad59e2ed4e995fc5fc8fd3a45e0dc6f
2024-11-01 11:55:32 +08:00
Android Build Coastguard Worker
ca94d03179
Snap for 12587146 from 6a2ff60cdf to 25Q1-release
...
Change-Id: I160412d97490985e2fee569efdb513ae5537a65e
2024-10-31 23:02:36 +00:00
Lucas Wei
6a2ff60cdf
Merge "Introduce dump_chip_info module" into main
2024-10-31 05:29:28 +00:00
Kai Hsieh
1f83bb110e
Add GIA (Google Input interface Abstraction layer) related SEPolicy rules and AIDL compatibility matrices.
...
AVC evidences:
10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:24): avc: denied { search } for name="goog_touch_interface" dev="sysfs" ino=110634 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=dir permissive=1
10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:25): avc: denied { read } for name="interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:26): avc: denied { open } for path="/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:27): avc: denied { getattr } for path="/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:28): avc: denied { write } for name="interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
Test: Build succeed.
Test: Manually, checked whether GIA service is started successfully via command `service list`.
Bug: 367881686
Flag: build.RELEASE_PIXEL_GIA_ENABLED
Change-Id: I8069521425ff1e830d759252bf8bf460f4dc6f32
Signed-off-by: Kai Hsieh <kaihsieh@google.com >
2024-10-31 00:57:56 +00:00
Lucas Wei
0a17acae18
Introduce dump_chip_info module
...
Introduce dump_chip_info dumper to dump driver information of chip-info
and required sepolicy.
[ 9819.206787][ T335] type=1400 audit(1729750876.372:4710): avc:
denied { execute_no_trans } for comm="android.hardwar"
path="/vendor/bin/dump/dump_chip_info" dev="dm-11" ino=79
scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0
tclass=file permissive=1
[ 9819.231374][ T335] type=1400 audit(1729750876.384:4711): avc:
denied { getattr } for comm="dump_chip_info" path="pipe:[1038881]"
dev="pipefs" ino=1038881 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:r:shell:s0 tclass=fifo_file permissive=1
Flag: EXEMPT, change source of chipid
Bug: 298883728
Change-Id: I0ff6edf98548de4b93c9eeee005ab2e7b365cf7f
2024-10-30 01:54:29 +00:00
Android Build Coastguard Worker
de94bf2ded
Snap for 12573674 from 16cae5b0bc to 25Q1-release
...
Change-Id: I6558b839db8cbb6754fe3d61bf3cf99900eb0b06
2024-10-29 23:03:58 +00:00
Kiwon Park
16cae5b0bc
Merge "Disable bootstrap for UGS devices (sold in Canada)" into main
2024-10-29 18:36:24 +00:00
Joner Lin
89a81be220
Merge "add sepolicy rules for bluetooth common hal dumpstate" into main
2024-10-29 08:34:45 +00:00
Joner Lin
dc6f3713ce
Merge "add bluetooth common hal sepolicy rules for bt subsystem crash info files" into main
2024-10-29 04:04:57 +00:00
Android Build Coastguard Worker
a8ee8082d3
Snap for 12565212 from 9590adf0c7 to 25Q1-release
...
Change-Id: I188fe30e648ac27fadee2f484131bfad57caffa9
2024-10-28 23:03:30 +00:00
jonerlin
62abd5daf8
add sepolicy rules for bluetooth common hal dumpstate
...
10-27 07:29:30.836000 1000 7403 7403 I auditd : type=1400 audit(0.0:1002): avc: denied { search } for comm="dump_bt" name="radio" dev="dm-52" ino=378 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I dump_bt : type=1400 audit(0.0:1002): avc: denied { search } for name="radio" dev="dm-52" ino=378 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I auditd : type=1400 audit(0.0:1003): avc: denied { write } for comm="dump_bt" name="all_logs" dev="dm-52" ino=15632 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I dump_bt : type=1400 audit(0.0:1003): avc: denied { write } for name="all_logs" dev="dm-52" ino=15632 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I auditd : type=1400 audit(0.0:1004): avc: denied { add_name } for comm="dump_bt" name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I dump_bt : type=1400 audit(0.0:1004): avc: denied { add_name } for name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I auditd : type=1400 audit(0.0:1005): avc: denied { create } for comm="dump_bt" name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I dump_bt : type=1400 audit(0.0:1005): avc: denied { create } for name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I auditd : type=1400 audit(0.0:1006): avc: denied { read } for comm="dump_bt" name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000 1000 7403 7403 I dump_bt : type=1400 audit(0.0:1006): avc: denied { read } for name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I auditd : type=1400 audit(0.0:1005): avc: denied { open } for comm="dump_bt" path="/data/vendor/bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I dump_bt : type=1400 audit(0.0:1005): avc: denied { open } for path="/data/vendor/bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I auditd : type=1400 audit(0.0:1006): avc: denied { read } for comm="dump_bt" name="bt" dev="dm-52" ino=16645 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I dump_bt : type=1400 audit(0.0:1006): avc: denied { read } for name="bt" dev="dm-52" ino=16645 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I auditd : type=1400 audit(0.0:1007): avc: denied { search } for comm="dump_bt" name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I dump_bt : type=1400 audit(0.0:1007): avc: denied { search } for name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000 1000 7510 7510 I auditd : type=1400 audit(0.0:1008): avc: denied { read } for comm="dump_bt" name="btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 11:02:17.568000 1000 7510 7510 I dump_bt : type=1400 audit(0.0:1008): avc: denied { read } for name="btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 11:02:17.568000 1000 7510 7510 I auditd : type=1400 audit(0.0:1009): avc: denied { open } for comm="dump_bt" path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 11:02:17.568000 1000 7510 7510 I dump_bt : type=1400 audit(0.0:1009): avc: denied { open } for path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I auditd : type=1400 audit(0.0:1015): avc: denied { create } for comm="dump_bt" name="btsnoop_hci_vnd.log.last" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I dump_bt : type=1400 audit(0.0:1015): avc: denied { create } for name="btsnoop_hci_vnd.log.last" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I auditd : type=1400 audit(0.0:1016): avc: denied { write open } for comm="dump_bt" path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I dump_bt : type=1400 audit(0.0:1016): avc: denied { write open } for path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I auditd : type=1400 audit(0.0:1017): avc: denied { getattr } for comm="dump_bt" path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=11478 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I dump_bt : type=1400 audit(0.0:1017): avc: denied { getattr } for path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=11478 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I auditd : type=1400 audit(0.0:1018): avc: denied { getattr } for comm="dump_bt" path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000 1000 7526 7526 I dump_bt : type=1400 audit(0.0:1018): avc: denied { getattr } for path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:42.000000 1000 7526 7526 I auditd : type=1400 audit(0.0:1019): avc: denied { search } for comm="dump_bt" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-27 21:03:42.000000 1000 7526 7526 I dump_bt : type=1400 audit(0.0:1019): avc: denied { search } for name="ssrdump" dev="dm-52" ino=425 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I auditd : type=1400 audit(0.0:1062): avc: denied { read } for comm="dump_bt" name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I dump_bt : type=1400 audit(0.0:1062): avc: denied { read } for name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I auditd : type=1400 audit(0.0:1063): avc: denied { open } for comm="dump_bt" path="/data/vendor/ssrdump/coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I dump_bt : type=1400 audit(0.0:1063): avc: denied { open } for path="/data/vendor/ssrdump/coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I auditd : type=1400 audit(0.0:1064): avc: denied { search } for comm="dump_bt" name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I dump_bt : type=1400 audit(0.0:1064): avc: denied { search } for name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000 1000 8227 8227 I auditd : type=1400 audit(0.0:1065): avc: denied { read } for comm="dump_bt" name="coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 00:05:09.220000 1000 8227 8227 I dump_bt : type=1400 audit(0.0:1065): avc: denied { read } for name="coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 00:05:09.220000 1000 8227 8227 I auditd : type=1400 audit(0.0:1066): avc: denied { open } for comm="dump_bt" path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 00:05:09.220000 1000 8227 8227 I dump_bt : type=1400 audit(0.0:1066): avc: denied { open } for path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 07:01:56.708000 1000 7681 7681 I auditd : type=1400 audit(0.0:1019): avc: denied { getattr } for comm="dump_bt" path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_07-01-11.bin" dev="dm-52" ino=16414 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 07:01:56.708000 1000 7681 7681 I dump_bt : type=1400 audit(0.0:1019): avc: denied { getattr } for path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_07-01-11.bin" dev="dm-52" ino=16414 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-24 09:58:37.780000 1000 7820 7820 I auditd : type=1400 audit(0.0:985): avc: denied { read } for comm="dump_bt" name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000 1000 7820 7820 I dump_bt : type=1400 audit(0.0:985): avc: denied { read } for name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000 1000 7820 7820 I auditd : type=1400 audit(0.0:986): avc: denied { open } for comm="dump_bt" path="/data/vendor/bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000 1000 7820 7820 I dump_bt : type=1400 audit(0.0:986): avc: denied { open } for path="/data/vendor/bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000 1000 7820 7820 I auditd : type=1400 audit(0.0:987): avc: denied { search } for comm="dump_bt" name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000 1000 7820 7820 I dump_bt : type=1400 audit(0.0:987): avc: denied { search } for name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000 1000 7820 7820 I auditd : type=1400 audit(0.0:988): avc: denied { read } for comm="dump_bt" name="btsnoop_hci_vnd.log.last" dev="dm-51" ino=15291 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-24 09:58:37.780000 1000 7820 7820 I dump_bt : type=1400 audit(0.0:988): avc: denied { read } for name="btsnoop_hci_vnd.log.last" dev="dm-51" ino=15291 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
Bug: 373526518
Bug: 372146292
Test: build pass, get bugreport and check bt dumpstate log files
Flag: EXEMPT, mechanical change.
Change-Id: I65025ffdac1c3017c494ae2a9fe8deeb5c7ce970
2024-10-28 14:51:40 +00:00
Joner Lin
9590adf0c7
Merge "bt: add dumpstate for bluetooth common hal" into main
2024-10-28 14:15:47 +00:00
jonerlin
1de5b57908
add bluetooth common hal sepolicy rules for bt subsystem crash info files
...
10-28 14:58:24.744000 1002 894 894 I auditd : type=1400 audit(0.0:131): avc: denied { write } for comm="binder:894_2" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000 1002 894 894 I binder:894_2: type=1400 audit(0.0:131): avc: denied { write } for name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000 1002 894 894 I auditd : type=1400 audit(0.0:132): avc: denied { add_name } for comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000 1002 894 894 I binder:894_2: type=1400 audit(0.0:132): avc: denied { add_name } for name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000 1002 894 894 I auditd : type=1400 audit(0.0:133): avc: denied { create } for comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.744000 1002 894 894 I binder:894_2: type=1400 audit(0.0:133): avc: denied { create } for name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000 1002 894 894 I auditd : type=1400 audit(0.0:134): avc: denied { read write open } for comm="binder:894_2" path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000 1002 894 894 I binder:894_2: type=1400 audit(0.0:134): avc: denied { read write open } for path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000 1002 894 894 I auditd : type=1400 audit(0.0:135): avc: denied { setattr } for comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000 1002 894 894 I binder:894_2: type=1400 audit(0.0:135): avc: denied { setattr } for name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000 1002 894 894 I auditd : type=1400 audit(0.0:2065): avc: denied { open } for comm="binder:894_2" path="/data/vendor/ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:59:54.572000 1002 894 894 I binder:894_2: type=1400 audit(0.0:2065): avc: denied { open } for path="/data/vendor/ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:59:54.572000 1002 894 894 I auditd : type=1400 audit(0.0:2066): avc: denied { read } for comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000 1002 894 894 I binder:894_2: type=1400 audit(0.0:2066): avc: denied { read } for name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000 1002 894 894 I auditd : type=1400 audit(0.0:2067): avc: denied { open } for comm="binder:894_2" path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000 1002 894 894 I binder:894_2: type=1400 audit(0.0:2067): avc: denied { open } for path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000 1002 894 894 I auditd : type=1400 audit(0.0:2068): avc: denied { getattr } for comm="binder:894_2" path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000 1002 894 894 I binder:894_2: type=1400 audit(0.0:2068): avc: denied { getattr } for path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-23 13:34:22.912 873 873 I binder:873_3: type=1400 audit(0.0:5105): avc: denied { read } for name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[ 354.876922] type=1400 audit(1729656523.440:124): avc: denied { search } for comm="binder:873_2" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[ 738.332303] type=1400 audit(1729656906.896:2087): avc: denied { read } for comm="binder:873_3" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
Bug: 374695851
Test: build pass, make bt crash and get the bugreport
Flag: EXEMPT, internal cleanup.
Change-Id: If9c4064fe71bfc0b1055bc953a1b2e22978e1938
2024-10-28 12:10:33 +00:00
jonerlin
952e4d7841
bt: add dumpstate for bluetooth common hal
...
Bug: 373526518
Bug: 372146292
Test: build pass, get bugreport and check bt dumpstate log files
Flag: EXEMPT, mechanical change.
Change-Id: I63cf188014696e830160ebc7acaeead79520c5b4
2024-10-28 01:14:01 +00:00
Android Build Coastguard Worker
600b20a2b7
Snap for 12561555 from d9f390d180 to 25Q1-release
...
Change-Id: Ie66e9963997589f45de2e0ecf04f274109aaaa4b
2024-10-26 21:02:23 +00:00
Florian Mayer
d9f390d180
Remove mitchp from OWNERS am: cea50c9a35 am: 807b201e0d
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3321033
Change-Id: I18642110a1acdd8b02bd0613cd2805359a34cdbf
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-10-26 01:43:14 +00:00
Florian Mayer
807b201e0d
Remove mitchp from OWNERS am: cea50c9a35
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3321033
Change-Id: I270f087f593d214429eea2004efc2e49eba05277
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-10-26 01:21:48 +00:00
Android Build Coastguard Worker
b88282cb85
Snap for 12559614 from 22c1045a5c to 25Q1-release
...
Change-Id: Iae7db9a4e4ed6f69ce6015f64c95b537f4846d35
2024-10-26 01:07:52 +00:00
Nick Kralevich
22c1045a5c
mte: add nnk@google.com to OWNERS am: b7d645e1b4 am: 82dd63c79c
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3320735
Change-Id: Iec8e8d3bd0db452755f4c83405da185a55bd2479
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-10-25 18:42:59 +00:00
Nick Kralevich
82dd63c79c
mte: add nnk@google.com to OWNERS am: b7d645e1b4
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3320735
Change-Id: I045ae89a04542e70933a9a986c0d24255e0ae59f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-10-25 18:22:55 +00:00
Florian Mayer
cea50c9a35
Remove mitchp from OWNERS
...
Change-Id: Ib22ad3ae3a6ad1634618d2e04bda363d318c95cd
2024-10-25 17:58:48 +00:00
Nick Kralevich
b7d645e1b4
mte: add nnk@google.com to OWNERS
...
That way I can help with reviews and other MTE changes.
Test: not needed. OWNERS file change only
Change-Id: I1fb75c2e1347c4085eb614f858b4fb57dd462ad1
2024-10-25 10:55:23 -07:00
Wilson Sung
11ddfc3f82
Merge changes from topic "375108715" into main
...
* changes:
Move camera type back to project
Remove the duplicate gxp rule
2024-10-25 06:35:38 +00:00
Treehugger Robot
268ba1bac8
Merge "insmod.sh: Support 'rmmod' directive" into main
2024-10-24 20:05:47 +00:00
Wilson Sung
4352bbc13d
Move camera type back to project
...
Bug: 375108715
Test: build
Flag: EXEMPT bugfix
Change-Id: I3fe71ed2249903e703590c43ae675d67588a87a5
2024-10-24 11:18:51 +00:00
Wilson Sung
69ffa902be
Remove the duplicate gxp rule
...
Bug: 375108715
Test: build
Flag: EXEMPT bugfix
Change-Id: I8d4aa27c963709a91b1284921a20d7fc5d369d89
2024-10-24 08:05:26 +00:00
Android Build Coastguard Worker
bd6c469fc0
Snap for 12543847 from ca74f2730a to 25Q1-release
...
Change-Id: Ib76ed9fdaeaeddafcf5d9c1eb6f5e41669200b69
2024-10-23 23:02:53 +00:00
Joner Lin
ca74f2730a
Merge changes from topic "add pixel-bt service" into main
...
* changes:
add sepolicy rules for bluetooth common hal
introduce pixel bluetooth common hal service
2024-10-23 12:03:51 +00:00
jonerlin
d76dcdca38
add sepolicy rules for bluetooth common hal
...
10-21 17:44:33.052 8548 8548 W binder:8548_2: type=1400 audit(0.0:181): avc: denied { open } for path="/dev/wbrc" dev="tmpfs" ino=1653 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:wb_coexistence_dev:s0 tclass=chr_file permissive=0
10-21 17:44:33.056 8548 8548 W binder:8548_2: type=1400 audit(0.0:182): avc: denied { call } for scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:r:hal_power_stats_default:s0 tclass=binder permissive=0
10-21 14:33:39.544 491 491 E SELinux : avc: denied { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothCcc/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.547 491 491 E SELinux : avc: denied { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothExt/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.548 491 491 E SELinux : avc: denied { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothEwp/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.548 491 491 E SELinux : avc: denied { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothFinder/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.549 491 491 E SELinux : avc: denied { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothSar/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.550 491 491 E SELinux : avc: denied { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBTChannelAvoidance/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:34:29.557 491 491 E SELinux : avc: denied { find } for pid=11758 uid=1002 name=power.stats-vendor scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_power_stats_vendor_service:s0 tclass=service_manager permissive=0
10-21 14:34:29.558 491 491 E SELinux : avc: denied { add } for pid=11758 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothExt/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:34:29.848 11758 11758 W binder:11758_2: type=1400 audit(0.0:317): avc: denied { read write } for name="wbrc" dev="tmpfs" ino=1654 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:wb_coexistence_dev:s0 tclass=chr_file permissive=0
10-21 14:34:29.948 11758 11758 W binder:11758_2: type=1400 audit(0.0:318): avc: denied { read write } for name="wbrc" dev="tmpfs" ino=1654 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:wb_coexistence_dev:s0 tclass=chr_file permissive=0
10-22 21:43:21.504000 1002 874 874 I auditd : type=1400 audit(0.0:7): avc: denied { search } for comm="android.hardwar" name="aconfig" dev="sda10" ino=18 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:aconfig_storage_metadata_file:s0 tclass=dir permissive=0
10-22 21:43:21.504000 1002 874 874 W android.hardwar: type=1400 audit(0.0:7): avc: denied { search } for name="aconfig" dev="sda10" ino=18 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:aconfig_storage_metadata_file:s0 tclass=dir permissive=0
10-22 05:51:56.052000 1002 890 890 I auditd : type=1400 audit(0.0:30): avc: denied { read } for comm="binder:890_2" name="logbuffer_tty18" dev="tmpfs" ino=1297 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0
10-22 05:51:56.052000 1002 890 890 W binder:890_2: type=1400 audit(0.0:30): avc: denied { read } for name="logbuffer_tty18" dev="tmpfs" ino=1297 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0
10-22 22:35:30.176 871 871 I binder:871_2: type=1400 audit(0.0:122): avc: denied { search } for name="coredump" dev="dm-52" ino=426 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-22 22:35:30.176 871 871 I binder:871_2: type=1400 audit(0.0:123): avc: denied { write } for name="coredump" dev="dm-52" ino=426 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-22 22:35:30.176 871 871 I binder:871_2: type=1400 audit(0.0:124): avc: denied { add_name } for name="coredump_bt_2024-10-22_22-35-30.bin" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-22 22:35:30.176 871 871 I binder:871_2: type=1400 audit(0.0:125): avc: denied { create } for name="coredump_bt_2024-10-22_22-35-30.bin" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-22 22:35:30.176 871 871 I binder:871_2: type=1400 audit(0.0:126): avc: denied { read write open } for path="/data/vendor/ssrdump/coredump/coredump_bt_2024-10-22_22-35-30.bin" dev="dm-52" ino=18673 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-22 22:35:30.176 871 871 I binder:871_2: type=1400 audit(0.0:127): avc: denied { setattr } for name="coredump_bt_2024-10-22_22-35-30.bin" dev="dm-52" ino=18673 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-23 13:34:22.908 873 873 I binder:873_3: type=1400 audit(0.0:5101): avc: denied { read } for name="logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.908 873 873 I binder:873_3: type=1400 audit(0.0:5102): avc: denied { open } for path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.908 873 873 I binder:873_3: type=1400 audit(0.0:5103): avc: denied { getattr } for path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.908 873 873 I binder:873_3: type=1400 audit(0.0:5104): avc: denied { ioctl } for path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 ioctlcmd=0x5401 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.912 873 873 I binder:873_3: type=1400 audit(0.0:5105): avc: denied { read } for name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[ 354.876922] type=1400 audit(1729656523.440:124): avc: denied { search } for comm="binder:873_2" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[ 354.879606] type=1400 audit(1729656523.444:126): avc: denied { write } for comm="binder:873_2" name="coredump" dev="dm-52" ino=426 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
[ 354.879747] type=1400 audit(1729656523.444:127): avc: denied { add_name } for comm="binder:873_2" name="coredump_bt_2024-10-23_12-08-43.bin" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
[ 710.811807] type=1400 audit(1729656879.376:1045): avc: denied { getattr } for comm="dump_modem" path="/data/vendor/ssrdump/coredump" dev="dm-52" ino=426 scontext=u:r:dump_modem:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1 bug=b/361725982
[ 738.329130] type=1400 audit(1729656906.892:2083): avc: denied { read } for comm="binder:873_3" name="logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[ 738.329926] type=1400 audit(1729656906.892:2084): avc: denied { open } for comm="binder:873_3" path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[ 738.330266] type=1400 audit(1729656906.892:2085): avc: denied { getattr } for comm="binder:873_3" path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[ 738.330724] type=1400 audit(1729656906.892:2086): avc: denied { ioctl } for comm="binder:873_3" path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 ioctlcmd=0x5401 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[ 738.332303] type=1400 audit(1729656906.896:2087): avc: denied { read } for comm="binder:873_3" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
Bug: 374695851
Bug: 372146292
Test: build pass, enable/disable Bluetooth and Pair new device, make
bt firmware crash to get the firmware dump file
Flag: EXEMPT, mechanical change.
Change-Id: Ia5b2b8485c53dd677a39268438a9507817908f4f
2024-10-23 09:24:14 +00:00
Nathan Kulczak
53f2ed5308
Merge "Vibrator: Add enable_pwle_v2" into main
2024-10-23 02:22:06 +00:00
Nathan Kulczak
25ac4cc5ec
Vibrator: Add enable_pwle_v2
...
Add new flag to control status of CAP_COMPOSE_PWLE_EFFECTS_V2
Flag: vendor.vibrator.hal.flags.enable_pwle_v2
Bug: 346570576
Test: Flash to device and test with setprop
Change-Id: I9c004be51284bb6d044a1cb9327ea0502cc4f352
Signed-off-by: Nathan Kulczak <nathankulczak@google.com >
2024-10-23 02:20:47 +00:00
Android Build Coastguard Worker
c141f54549
Snap for 12537680 from 9e47244715 to 25Q1-release
...
Change-Id: Ic97ab2c0e7d08aac976f32b5a21970ba77b4a986
2024-10-22 23:03:38 +00:00
Treehugger Robot
9e47244715
Merge "storage: adjust ufs error history design" into main
2024-10-22 06:06:38 +00:00
Randall Huang
c3a0ad4d1c
storage: adjust ufs error history design
...
Bug: 359746077
Test: adb bugreport
Change-Id: I32d1cab81351285e1f9ea770169c8be2246f3df7
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-10-22 05:15:58 +00:00
Treehugger Robot
d5df99e993
Merge "[Audio AIDL] Move audiometricext to HIDL only." into main
2024-10-22 02:49:28 +00:00
jonerlin
016ddaf6d0
introduce pixel bluetooth common hal service
...
android.hardware.bluetooth-service.pixel
bug: 373530837
bug: 370264579
Test: verify bt function in forest test build
Flag: EXEMPT, mechanical change.
Change-Id: I5c0d87740bab8636309ee6c60ee9e8d83ea3a66c
2024-10-21 09:22:37 +00:00
Poomarin Phloyphisut
afd55f92b9
[Audio AIDL] Move audiometricext to HIDL only.
...
Previously, audiometricext module which is HIDL module is mistakenly included in AIDL rom.
Test: Local Build on both HIDL and AIDL devices
Flag: EXEMPT bugfix
Bug: 369772495
Change-Id: Ic56fa134056afa782440a8f1dcaa032df481bcc2
2024-10-21 08:39:33 +00:00
Brian Norris
6b137ff16d
insmod.sh: Support 'rmmod' directive
...
Some mechanisms (e.g., initramfs module lists) may be overzealous in
what modules get loaded on a system. It can save resources to remove
certain modules when we know they are going to be unused -- for example,
extraneous panel drivers only needed for other devices within a given
device family.
Bug: 360934165
Test: `rmmod|<module_name>.ko` added to init.insmod.<device>.cfg
Change-Id: Iddb588116a0526faded3396d54f54ef82deed44d
2024-10-18 15:10:16 -07:00
Android Build Coastguard Worker
58891f2f0f
Merge cherrypicks of ['googleplex-android-review.googlesource.com/29764306'] into 24Q4-release.
...
Change-Id: I189631de67329af60ffc56b821ca95d14d0c17ec
2024-10-18 21:20:09 +00:00
Tommy Chiu
1d50676e3f
gsc: Change the criteria for building GSC targets
...
There can be a case where vendor directory exists but vendor/google_nos
does not.
Bug: 371059500
Test: manual
Flag: EXEMPT refactor
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8af77ef94228bf37bd7be4d8db496f7084e0333d )
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-10-18 21:15:19 +00:00
Android Build Coastguard Worker
e8496cfd57
Snap for 12517605 from 570dfe1ed4 to 25Q1-release
...
Change-Id: If155686aa6a293321090dfa8e7d3e9cdad706123
2024-10-18 01:03:00 +00:00
Randall Huang
570dfe1ed4
storage: support new UFS error history algorithm
...
Bug: 359746077
Test: adb bugreport
Change-Id: I52a7ae0f1f9b60349437c0b3b5de630dd41b5627
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-10-17 12:57:00 +08:00
Android Build Coastguard Worker
56225106db
Snap for 12508860 from 2c8ec7ea44 to 25Q1-release
...
Change-Id: I297e370918e1d80d51df1697dae68e728c96d206
2024-10-16 23:02:59 +00:00
Cheng Chang
2c8ec7ea44
dump_gps: Support bugreport extract resource info
...
Bug: 369971486
Flag: EXEMPT log information update.
Test: Different input value in b/369971486.
Test: Read the sysfs value in b/369971486.
Test: Collect bugreport and check the attachment in b/369971486.
Test: Sepolicy test in b/369971486.
Change-Id: Ib8f2565387a9a2c7d715e4791bbcddb86a12fb70
2024-10-16 04:39:03 +00:00
Super Liu
c90999f82a
Merge "touch: Support SW_LID event from sensor HAL" into main
2024-10-16 01:39:36 +00:00
Android Build Coastguard Worker
6993882c34
Merge cherrypicks of ['googleplex-android-review.googlesource.com/29703186'] into 24Q4-release.
...
Change-Id: I5821ee53c0a71ff5a91bae6dcefc3a11bc66101f
2024-10-15 23:38:13 +00:00
samou
3171e2372e
sepolicy: remove irregular policy
...
Flag: EXEMPT refactor
Bug: 364989823
Signed-off-by: samou <samou@google.com >
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1822201a0c6a91d84627c6b59fcd21b223285dac )
Merged-In: I4cced2ae29591425a5bfcb971be6bd2db6b19c66
Change-Id: I4cced2ae29591425a5bfcb971be6bd2db6b19c66
2024-10-15 23:36:58 +00:00
Android Build Coastguard Worker
944aac0bfd
Snap for 12491918 from 3c45391425 to 25Q1-release
...
Change-Id: Ideab00a3d3c15682a477541841b5b951708fc03d
2024-10-12 21:02:41 +00:00
Android Build Coastguard Worker
81d6aeb0f6
Snap for 12488717 from 8af77ef942 to 25Q1-release
...
Change-Id: I8da313092feb9adbd68306bec2b545d417b75dc9
2024-10-12 01:03:37 +00:00
Zhengyuan Cui
3c45391425
Merge "Remove DBA from edgetpu.mk" into main
2024-10-11 21:41:51 +00:00
Zhengyuan Cui
06943763d5
Remove DBA from edgetpu.mk
...
DBA is not used anymore.
Verified dba service was there before and not there after.
Flashed built image to device to check.
Change-Id: I3838fcbbe3e6e2cadef81b4e2fc0d5cee60603cf
Bug: 369217630
2024-10-11 00:56:55 +00:00
Kiwon Park
d7d26a5aec
Disable bootstrap for UGS devices (sold in Canada)
...
Bug: 366072023
Change-Id: I0072d2a44bc7d5ba4c62b2410949e7378c457044
Test: m
Flag: EXEMPT disabling a feature
2024-10-09 23:41:33 +00:00
Tommy Chiu
8af77ef942
gsc: Change the criteria for building GSC targets
...
There can be a case where vendor directory exists but vendor/google_nos
does not.
Bug: 371059500
Test: manual
Flag: EXEMPT refactor
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-10-09 05:10:25 +00:00
Android Build Coastguard Worker
a67cf48728
Snap for 12470893 from fa448be01f to 25Q1-release
...
Change-Id: I7aa91dfc23e3bca2b67f412df90ef5fca91c107f
2024-10-08 23:03:24 +00:00
Adam Shih
fa448be01f
Merge "ban hal_dumpstate_default from execute_no_trans" into main
2024-10-08 03:13:54 +00:00
Ocean Chen
8edb8909cf
Merge "storage: Defer blkio class configuration" into main
2024-10-08 02:36:34 +00:00
Android Build Coastguard Worker
0550434447
Snap for 12465365 from 46b0571690 to 25Q1-release
...
Change-Id: Ifd39970e27d1e6b2be4c26ca106fdcf93066b9c4
2024-10-07 23:03:13 +00:00
Madhav Iyengar
d27988496b
Merge "[chre-hal-xport] Add file_contexts for new xport" into main
2024-10-07 21:45:41 +00:00
Madhav Iyengar
93d8e4ada6
[chre-hal-xport] Add file_contexts for new xport
...
Bug: 369883034
Flag: android.chre.flags.refactor_hal_xport_agnostic
Change-Id: I13b1a769f0f866a0b7c17d461052a6be83cc0e07
2024-10-07 21:44:19 +00:00
Timmy Li
46b0571690
Merge "Add permission for mediacodec to bindercall camera hal" into main
2024-10-07 17:40:31 +00:00
Taylor Nelms
65f5798628
Merge "display: add pixel display trace to bugreport" into main
2024-10-07 12:38:37 +00:00
timmyli
df68b9bc58
Add permission for mediacodec to bindercall camera hal
...
Bug: 370903762
Test: local test to check permissions
Flag: EXEMPT bug fix
10-07 01:54:59.328000 1046 768 768 I auditd : type=1400 audit(0.0:1920): avc: denied { call } for comm="binder:768_A" scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_camera_default:s0 tclass=binder permissive=0
10-07 01:54:59.328000 1046 768 768 W binder:768_A: type=1400 audit(0.0:1920): avc: denied { call } for scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_camera_default:s0 tclass=binder permissive=0
Change-Id: I437df92d99f0c31c0b5a1bdebc63f6bc7360ca90
2024-10-07 10:01:00 +00:00
Ravi Jain
0a9c248adb
Merge "vibrator: Add vibrator HAL flags" into main
2024-10-07 06:57:59 +00:00
Ocean Chen
0af034bf9f
storage: Defer blkio class configuration
...
Move blkio class configuration from on init to on property:sys.boot_completed=1.
This improves I/O balance between foreground and background processes during boot,
as many background processes compete for I/O resources at that time.
Deferring the configuration ensures a smoother user experience
by prioritizing foreground processes.
Bug: 364960533
Test: forrest build and test on felix
Change-Id: If15343d4d96d55032618a4611bf9fdf47105c974
2024-10-07 14:48:56 +08:00
Sam Ou
901da4857f
Merge "sepolicy: remove irregular policy" into main
2024-10-07 06:45:27 +00:00
Adam Shih
f24bfe8ca3
ban hal_dumpstate_default from execute_no_trans
...
It keeps people from using my domain to do random things,
which causes VTS failure like b/364989823.
Bug: 371497180
Test: build pass and adb bugreport
build fail when ag/28359861 is around.
Change-Id: I438bf2b026718a46bb841ab5e656d11eec630960
2024-10-07 05:54:43 +00:00
Super Liu
21b3ed1922
touch: Support SW_LID event from sensor HAL
...
Bug: 353360211
Flag: EXEMPT bugfix
Test: Manual local test.
Change-Id: Ie071f0aaf19956f1a472693baf19cbeb0c73b186
Signed-off-by: Super Liu <supercjliu@google.com >
2024-10-07 01:04:53 +00:00
Taylor Nelms
0379e1a2b8
display: add pixel display trace to bugreport
...
AVC error log justifications:
[ 1198.907014] type=1400 audit(1728067746.876:2074): avc: denied { search } for comm="cat" name="instances" dev="tracefs" ino=4194 scontext=u:r:dump_display_userdebug:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
[ 1198.908565] type=1400 audit(1728067746.876:2075): avc: denied { read } for comm="cat" name="trace" dev="tracefs" ino=167692 scontext=u:r:dump_display_userdebug:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1
[ 1198.909716] type=1400 audit(1728067746.876:2076): avc: denied { open } for comm="cat" path="/sys/kernel/tracing/instances/pixel-display/trace" dev="tracefs" ino=167692 scontext=u:r:dump_display_userdebug:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1
Bug: 369099258
Test: pixel display trace visible in bugreport
Flag: EXEMPT bugfix
Change-Id: I53f9340aee155d1ff0d0c0bc2db45e6bd77f342a
Signed-off-by: Taylor Nelms <tknelms@google.com >
2024-10-04 18:55:40 +00:00
samou
1822201a0c
sepolicy: remove irregular policy
...
Flag: EXEMPT refactor
Bug: 364989823
Change-Id: I4cced2ae29591425a5bfcb971be6bd2db6b19c66
Signed-off-by: samou <samou@google.com >
2024-10-04 16:07:24 +00:00
sienna
3c88c19581
Update AIDL to v4.
...
Bug: 361494448
Test: atest vts_treble_vintf_vendor_test
Flag: EXEMPT update aidl
Change-Id: I6883ad8fdb5cadc44e8e59fc50642fc24532cff9
2024-10-04 11:31:35 +00:00
Android Build Coastguard Worker
534f00b484
Snap for 12445464 from 4923764120 to 25Q1-release
...
Change-Id: Id210b0f649a63b4265cb3879ba9dd8dfee55d201
2024-10-02 23:03:29 +00:00
Treehugger Robot
4923764120
Merge changes from topic "touch_dumpstate_priority" into main
...
* changes:
dumpstate: touch: Add touch_predump for focaltech
dumpstate: touch: Add touch_predump for stm
2024-10-02 08:57:00 +00:00
Ernie Hsu
c693d44584
Merge "Add common lib for libgc2 encoders and decoders" into main
2024-10-02 06:31:56 +00:00
Ernie Hsu
1d9653d8c1
Add common lib for libgc2 encoders and decoders
...
Flag: EXEMPT refactor
Bug: 369762843
Change-Id: Ia971c1cc7dd9c67d147cf6e173772a5bfbfd2cef
2024-10-02 03:51:06 +00:00
Ravi Jain
297158486d
dumpstate: touch: Add touch_predump for focaltech
...
10-01 21:39:00.372 11262 11262 I sh : type=1400 audit(0.0:20): avc:
denied { write } for name="driver_test" dev="proc" ino=4026536282
scontext=u:r:predump_touch:s0 tcontext=u:object_r:proc_touch:s0
tclass=file permissive=1
10-01 21:40:03.076 6244 6244 I sh : type=1400 audit(0.0:21): avc:
denied { search } for name="focaltech_touch" dev="proc" ino=4026535873
scontext=u:r:predump_touch:s0 tcontext=u:object_r:proc_touch:s0
tclass=dir permissive=1
Test: b/318578275
Test: Flash on dogfood device and check touch dump logs
Bug: 287907308
Flag: EXEMPT bugfix
Change-Id: I1652ecc1054b50946159d4c3c0f3995cefa896f5
2024-10-02 03:43:39 +00:00
Ravi Jain
7d245967c1
dumpstate: touch: Add touch_predump for stm
...
10-01 21:39:00.372 11262 11262 I sh : type=1400 audit(0.0:20): avc:
denied { write } for name="driver_test" dev="proc" ino=4026536282
scontext=u:r:predump_touch:s0 tcontext=u:object_r:proc_touch:s0
tclass=file permissive=1
10-01 21:39:00.432 11265 11265 I cat : type=1400 audit(0.0:22): avc:
denied { search } for name="spi20.0" dev="sysfs" ino=55787
scontext=u:r:predump_touch:s0 tcontext=u:object_r:sysfs_touch:s0
tclass=dir permissive=1
10-01 21:39:00.444 11262 11262 I sh : type=1400 audit(0.0:25): avc:
denied { write } for name="stm_fts_cmd" dev="sysfs" ino=112798
scontext=u:r:predump_touch:s0 tcontext=u:object_r:sysfs_touch:s0
tclass=file permissive=1
Test: b/318578275
Test: Flash on dogfood device and check touch dump logs
Bug: 287907308
Flag: EXEMPT bugfix
Change-Id: I9dade94f96879a269b5db2ebbe9595ea0e099acc
2024-10-02 03:37:22 +00:00
Ravi Jain
d36b2b709b
vibrator: Add vibrator HAL flags
...
Move the HAL vibrator Flags temporarily from hardware/google/pixel.
Bug: 362659323
Test: Build Pass
Flag: EXEMPT refactor
Change-Id: Id51defdb09c1d912b991cada5c413b66c8501df7
2024-10-01 15:31:29 +00:00
Android Build Coastguard Worker
a98d8483f8
Snap for 12428696 from c398fe11da to 25Q1-release
...
Change-Id: I0b2334711c442504334462f249a97db680c1190b
2024-09-28 21:02:14 +00:00
Kiwon Park
c398fe11da
Allow gmscore to read setupwizard_feature_prop
...
Bug: 369682921
Change-Id: I7d893ee8785be326e98df57bc06396f7e10d2b01
Test: test bootstrap transfer
Flag: EXEMPT bugfix
2024-09-27 16:47:02 +00:00
Android Build Coastguard Worker
912e0f8969
Snap for 12415101 from e943d565fe to 25Q1-release
...
Change-Id: I7c124112adc620245c46ad591baf6de65984aadb
2024-09-25 23:02:59 +00:00
Treehugger Robot
e943d565fe
Merge "audio: add soong configs for debugging" into main
2024-09-25 08:47:14 +00:00
Michael Bestas
d26fdcfef2
Disable userdebug diagnostics
...
Change-Id: Icbdc3a61ab7b27f2aa0a6a07181b96edd9ee191a
2024-09-24 23:51:36 +03:00
Michael Bestas
35f66e77be
modem: Erase /data/vendor/slog
...
Free up 2.4GB of space used by leftover modem logs.
Change-Id: If2efcbb9a18a8a945e9620c0df819d0bd82d8ad7
2024-09-24 22:09:58 +03:00
Michael Bestas
8045332316
Always copy init.aoc.daemon.rc to vendor init
...
We don't have google bsp in tree but we include google's binaries.
Change-Id: I9fbe5b819a46b4500e2d78e65d02dfd1dcfdc8a4
2024-09-24 22:09:48 +03:00
Michael Bestas
2801e361ab
Exclude some things from LineageOS builds
...
Change-Id: I34420b49a2f419b84f3af9aff048249d77e419ae
2024-09-24 22:08:27 +03:00
Michael Bestas
a5b9a862ed
Add .gitupstream
...
Change-Id: I78e398ecf9f4a95707dc0810d6ed8a0133b3fde2
2024-09-24 21:12:34 +03:00
Safayat Ullah
617a80e659
display-dump: use generic panel path
...
Bug: 364795380
Test: adb bugreport
Flag: EXEMPT bugfix
Change-Id: I10f55a3ffb5daf6bf72d80473ba3af23b85a5120
2024-09-23 11:19:46 +00:00
Android Build Coastguard Worker
1d3a740d1e
Snap for 12399304 from d2c239970b to 25Q1-release
...
Change-Id: I8198f663a4e169cb14ca2962795b94c35bf94edf
2024-09-21 23:01:24 +00:00
Android Build Coastguard Worker
133708e84a
Merge cherrypicks of ['googleplex-android-review.googlesource.com/29034296'] into 24Q3-release.
...
Change-Id: Ie8c833054f2a4e11698f237caab65a4af17ea94f
2024-09-20 00:26:44 +00:00
bgkim
d93d355fb6
bootctrl: fixed OOB read in BootControl
...
Fixed OOB read in BootControl::isSlotMarkedSuccessful() by checking
if "in_slot" is negative
Flag: EXEMPT bugfix
Test: tested on Husky device
Bug: 353516777
Signed-off-by: bgkim <bgkim@google.com >
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b584b9c7e081d803b32f0ff5f059573dfa6c0a0e )
Merged-In: I634c32a8c12403008fe5a724bc447f82931ae9c5
Change-Id: I634c32a8c12403008fe5a724bc447f82931ae9c5
2024-09-20 00:18:45 +00:00
Android Build Coastguard Worker
11b3ae101f
Snap for 12378824 from d2c239970b to 24Q4-release
...
Change-Id: I9b6a5da156862083e0e722a299df74838e3cd5b7
2024-09-17 23:02:12 +00:00
Welly Hsu
d2c239970b
Merge "gs-common: add rules for euiccpixel_app" into main
2024-09-17 01:41:38 +00:00
Android Build Coastguard Worker
5445d223a5
Snap for 12373988 from 5bacb2c3ca to 24Q4-release
...
Change-Id: I76b58de6ca35949ee6af0cbf8a8a4a0ded2a6751
2024-09-16 23:01:47 +00:00
Priyanka Advani (xWF)
dc8c2ed6b3
Merge "Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"" into main
2024-09-16 21:10:24 +00:00
Priyanka Advani (xWF)
d43a6e1c5a
Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"
...
This reverts commit 1685969e60 .
Reason for revert: Droidmonitor created revert due to b/367330939.
Change-Id: Idd70cf3d846fad1a25060ebfb6ae6a99599fd861
2024-09-16 16:58:16 +00:00
Tom Flucke
5bacb2c3ca
Merge "dumpstate: gsa: Add GSA logs to dumpstate" into main
2024-09-16 15:10:38 +00:00
Treehugger Robot
2440c2fe6f
Merge "Revert "Allow devices that use HIDL to find AIDL radio_ext_service"" into main
2024-09-16 10:30:03 +00:00
Charlie Yang
1685969e60
Revert "Allow devices that use HIDL to find AIDL radio_ext_service"
...
Revert submission 29238469-gril-selinux
Reason for revert: b/367183524 - build break
Reverted changes: /q/submissionid:29238469-gril-selinux
Change-Id: Ica10c6ee500389223256e328d182c9495a826b06
2024-09-16 07:41:26 +00:00
Charlie Yang
275b9c66d5
Merge "Allow devices that use HIDL to find AIDL radio_ext_service" into main
2024-09-16 06:22:22 +00:00
Android Build Coastguard Worker
ecfc4abba3
Snap for 12370120 from 194a58c7bb to 25Q1-release
...
Change-Id: I31576bdfa801b21e43e2060f68930efdc0440807
2024-09-14 23:01:23 +00:00
Welly Hsu
0393e7fbe6
gs-common: add rules for euiccpixel_app
...
09-11 21:19:25.452 345 345 I auditd : avc: denied { find } for pid=14141 uid=10246 name=activity scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=0
09-11 21:20:57.035 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=netstats scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.055 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=content_capture scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.064 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=activity_task scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.111 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=gpu scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.182 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=voiceinteraction scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.184 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=autofill scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.190 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=sensitive_content_protection_service scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.193 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=performance_hint scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-11 21:21:09.436 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=audio scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-11 21:21:09.449 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=batterystats scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
09-11 21:21:09.454 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=batteryproperties scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:batteryproperties_service:s0 tclass=service_manager permissive=1
09-11 23:21:26.678 345 345 I auditd : avc: denied { find } for pid=17450 uid=10246 name=permission_checker scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:permission_checker_service:s0 tclass=service_manager permissive=1
09-03 16:29:54.032 351 351 E SELinux : avc: denied { find } for pid=3914 uid=10217 name=phone scontext=u:r:euiccpixel_app:s0:c217,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=1
09-03 17:35:07.453 351 351 E SELinux : avc: denied { find } for pid=3914 uid=10217 name=nfc scontext=u:r:euiccpixel_app:s0:c217,c256,c512,c768 tcontext=u:object_r:nfc_service:s0 tclass=service_manager permissive=1
09-11 21:20:57.108 17450 17450 I auditd : type=1400 audit(0.0:1055): avc: denied { read } for comm="RenderThread" name="uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel
09-11 21:20:57.108 17450 17450 I auditd : type=1400 audit(0.0:1056): avc: denied { open } for comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel
09-11 21:20:57.108 17450 17450 I auditd : type=1400 audit(0.0:1057): avc: denied { getattr } for comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel
09-11 21:21:48.494 12343 12343 I auditd : type=1400 audit(0.0:23): avc: denied { read write } for comm=4173796E635461736B202331 name="st54spi" dev="tmpfs" ino=1573 scontext=u:r:euiccpixel_app:s0:c3,c257,c522,c768 tcontext=u:object_r:st54spi_device:s0 tclass=chr_file permissive=1
09-11 21:20:57.108 17450 17450 I auditd : type=1400 audit(0.0:1056): avc: denied { read open } for comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel
09-11 21:20:57.108 17450 17450 I auditd : type=1400 audit(0.0:1057): avc: denied { getattr } for comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel
09-13 17:55:20.904 3776 3776 I auditd : type=1400 audit(0.0:1087): avc: denied { read } for comm="RenderThread" name="uevent" dev="sysfs" ino=46480 scontext=u:r:euiccpixel_app:s0:c225,c256,c512,c768 tcontext=u:object_r:sysfs_gpu_uevent:s0 tclass=file permissive=0 app=com.google.euiccpixel
09-13 18:18:26.988 4029 4029 I auditd : type=1400 audit(0.0:1077): avc: denied { open getattr } for comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46480 scontext=u:r:euiccpixel_app:s0:c225,c256,c512,c768 tcontext=u:object_r:sysfs_gpu_uevent:s0 tclass=file permissive=0 app=com.google.euiccpixel
09-13 17:55:20.996 3776 3776 I auditd : type=1400 audit(0.0:1090): avc: denied { read } for comm="ogle.euiccpixel" name="u:object_r:default_prop:s0" dev="tmpfs" ino=164 scontext=u:r:euiccpixel_app:s0:c225,c256,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.google.euiccpixel
Bug: 361092897
Test: make selinux_policy, flash and test on 25' project
Flag: EXEMPT NDK
Change-Id: I8850fe0c1eae7dc575cb323d1f4a9234b7df82db
2024-09-13 14:09:38 +00:00
David Li
15c9c33a46
audio: add soong configs for debugging
...
Bug: 357140465
Test: mm
Flag: EXEMPT bugfix
Change-Id: Ib5f229135ccde98b21c6fde8efd9b9121b2a0159
2024-09-13 10:03:50 +00:00
Android Build Coastguard Worker
124caa5313
Snap for 12361654 from 194a58c7bb to 24Q4-release
...
Change-Id: I95922170a21294ef3ae2911b09406a2269df1fed
2024-09-12 23:01:39 +00:00
Treehugger Robot
194a58c7bb
Merge "audio: allow set_prop for vendor_audio_prop_restricted" into main
2024-09-12 11:11:17 +00:00
Robert Lee
6902f81e2d
audio: allow set_prop for vendor_audio_prop_restricted
...
Bug: 338910843
Test: manual test
Flag: EXEMPT sepolicy
Change-Id: Id8ad088512aca6cc939c25b5d747fbedeb4cd479
Signed-off-by: Robert Lee <lerobert@google.com >
2024-09-12 09:07:45 +00:00
cey
1331d97c92
Allow devices that use HIDL to find AIDL radio_ext_service
...
Move the type to a common sepolicy so it can be shared.
avc: denied { find } for pid=6493 uid=10256 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c0,c257,c512,c768 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0
NO_AVC_EVIDENCE_CHECK=default_android_service not supported
Bug: 365099058
Test: manual
Flag: EXEMPT mk file
Change-Id: I9c2471792c2a423e19f1472bd7923a5284f9127e
2024-09-12 16:17:33 +08:00
Android Build Coastguard Worker
b3b26dd18b
Snap for 12354992 from df9178aaf4 to 24Q4-release
...
Change-Id: I4e8e485fb60b5ff2d9212f2f49e94277c3ce8d7f
2024-09-11 23:01:42 +00:00
Danh Nguyen
df9178aaf4
Merge "shamp: Update shared_modem_platform HAL version to 3" into main
2024-09-10 23:03:38 +00:00
Android Build Coastguard Worker
e7f58a6ca7
Snap for 12348750 from a85b95de5b to 24Q4-release
...
Change-Id: I2499b8a0bc8a1d03b812a8560aaefb5edc974056
2024-09-10 23:02:36 +00:00
Nishok Kumar S
a85b95de5b
Merge "Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service, This is required for AHardwareBuffer allocation." into main
2024-09-10 06:02:09 +00:00
Android Build Coastguard Worker
5a96e406c4
Snap for 12342105 from eb22aeaaa8 to 24Q4-release
...
Change-Id: I416362df57b0e9e0eb02242e274bb0215554d28a
2024-09-09 23:02:00 +00:00
Andy Hsu
eb22aeaaa8
Merge "Add sepolicy for gcam app" into main
2024-09-09 08:57:21 +00:00
Nishok Kumar S
db15a0bcf2
Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service,
...
This is required for AHardwareBuffer allocation.
Attached avc error log in commit message:
E SELinux : avc: denied { find } for pid=820 uid=1000 name=android.hardware.graphics.allocator.IAllocator/default scontext=u:r:hal_neuralnetworks_darwinn:s0 tcontext=u:object_r:hal_graphics_allocator_service:s0 tclass=service_manager permissive=0
Bug: 361711471
Test: Flash private build, run CTS NNAPI tests.
Change-Id: I7850bd0c64974180cee206bfc43c25b70fac3f79
2024-09-09 06:32:45 +00:00
Randall Huang
69c69b2609
storage: fix ota selinux error
...
avc: denied { read write } for pid=281 comm="update_engine_s" name="boot_lun_enabled" dev="sysfs" ino=99875 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
avc: denied { open } for pid=281 comm="update_engine_s" path="/sys/devices/platform/3c400000.ufs/pixel/boot_lun_enabled" dev="sysfs" ino=99875 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
Bug: 361093433
Test: OTA sideload
Change-Id: I7c92346d7ab08597d612e798d2252768eed124a2
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-09 12:48:43 +08:00
Randall Huang
9b9bee2c1a
Storage: add sepolicy for recovery mode
...
avc: denied { search } for pid=286 comm="fsck.f2fs" name="0:0:0:0" dev="sysfs" ino=100643 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc: denied { getattr } for pid=286 comm="fsck.f2fs" path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda10/partition" dev="sysfs" ino=102318 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { read } for pid=286 comm="fsck.f2fs" name="zoned" dev="sysfs" ino=101014 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { open } for pid=286 comm="fsck.f2fs" path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=101014 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { read } for pid=340 comm="fsck.f2fs" name="sda1" dev="tmpfs" ino=1060 scontext=u:r:fsck:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=0
avc: denied { read write } for pid=340 comm="fsck.f2fs" name="sda1" dev="tmpfs" ino=1060 scontext=u:r:fsck:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=0
Bug: 361093433
Test: factory data reset
Change-Id: Idce44f75e8ef6f3e381fcdaa8c29831747ee0ecd
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-09 12:41:58 +08:00
Android Build Coastguard Worker
5b80b21269
Snap for 12337407 from 92f65e92ab to 25Q1-release
...
Change-Id: Id725b9026ade2ea898197f807e1d8ff90a174d66
2024-09-07 23:01:36 +00:00
Android Build Coastguard Worker
b92f611c88
Snap for 12337246 from 92f65e92ab to 24Q4-release
...
Change-Id: Ic8185bd6fed7f0d10fcf3683c178816e57059328
2024-09-07 21:01:43 +00:00
Xin Li
92f65e92ab
[automerger skipped] Merge 24Q3 to AOSP main am: 3d9a037343 -s ours am: 1753d5c4df -s ours
...
am skip reason: Merged-In I14cff8dfe4e143995b9011cd34a1e7d74613ae33 with SHA-1 d1adbe0cb2 is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3258121
Change-Id: I703ee8ce839d2e5412036ef723919ca010a89a47
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-09-07 06:09:36 +00:00
Xin Li
1753d5c4df
[automerger skipped] Merge 24Q3 to AOSP main am: 3d9a037343 -s ours
...
am skip reason: Merged-In I14cff8dfe4e143995b9011cd34a1e7d74613ae33 with SHA-1 d1adbe0cb2 is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3258121
Change-Id: I812aa14274c7353bf1322ca8aaedae71adc2a471
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-09-07 02:41:15 +00:00
Android Build Coastguard Worker
988e34aa3c
Snap for 12335440 from c8a640f591 to 24Q4-release
...
Change-Id: I7d7b562d588c834d2369703aac31e71f9d774150
2024-09-07 02:32:07 +00:00
hwandy
6265f1f2eb
Add sepolicy for gcam app
...
Bug: b/359815606.
Bug: b/363018500.
Flag: EXEMPT bugfix.
Test: Locally built selinux policy and a local GCAEng (go/ab/12329728) and run GCAEng and saw selinux policy denial message gone.
AVC evidence from b/363018500:
08-27 22:57:12.442 340 340 I auditd : avc: denied { find } for pid=15696 uid=10286 name=activity scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=0
08-27 21:35:58.954 332 332 I auditd : avc: denied { find } for pid=4055 uid=10286 name=media.audio_policy scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:audioserver_service:s0 tclass=service_manager permissive=1
08-27 21:34:50.138 332 332 I auditd : avc: denied { find } for pid=4055 uid=10286 name=media.camera scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:cameraserver_service:s0 tclass=service_manager permissive=1
08-27 21:34:53.320 332 332 I auditd : avc: denied { find } for pid=4055 uid=10286 name=media.extractor scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:mediaextractor_service:s0 tclass=service_manager permissive=1
08-27 21:34:51.622 332 332 I auditd : avc: denied { find } for pid=4055 uid=10286 name=media.metrics scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass=service_manager permissive=1
08-27 21:35:59.012 332 332 I auditd : avc: denied { find } for pid=4055 uid=10286 name=media.resource_manager scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:mediaserver_service:s0 tclass=service_manager permissive=1
AVC evidence from go/ab/12328923:
09-06 11:16:24.421 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=netstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
09-06 11:16:24.627 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=shortcut scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:shortcut_service:s0 tclass=service_manager permissive=1
09-06 11:16:24.812 17252 17252 I GoogleCameraEng: type=1400 audit(0.0:1091): avc: denied { read } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:24.812 17252 17252 I GoogleCameraEng: type=1400 audit(0.0:1092): avc: denied { open } for path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.222 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=content_capture scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.220 17252 17252 I RenderThread: type=1400 audit(0.0:1093): avc: denied { read } for name="uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.220 17252 17252 I RenderThread: type=1400 audit(0.0:1094): avc: denied { open } for path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.220 17252 17252 I RenderThread: type=1400 audit(0.0:1095): avc: denied { getattr } for path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.877 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.902 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.920 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.928 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=performance_hint scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-06 11:16:26.060 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=clipboard scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
09-06 11:16:29.417 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=backup scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
09-06 11:16:29.484 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
09-06 11:17:01.249 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:01.306 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 11:17:01.495 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 11:17:02.330 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:05.916 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:07.826 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:09.579 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1164): avc: denied { read } for name="gxp" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1165): avc: denied { open } for path="/dev/gxp" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1166): avc: denied { ioctl } for path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1167): avc: denied { write } for name="gxp" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:11.692 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:13.696 17252 17252 I FinishThread: type=1400 audit(0.0:1177): avc: denied { ioctl } for path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee00 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:15.443 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:20.159 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=uimode scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:uimode_service:s0 tclass=service_manager permissive=1
09-06 11:17:21.816 17252 17252 I FinishThread: type=1400 audit(0.0:1185): avc: denied { ioctl } for path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee00 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:36.508 17252 17252 I FinishThread: type=1400 audit(0.0:1189): avc: denied { ioctl } for path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee00 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:54.854 328 328 E SELinux : avc: denied { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 15:38:05.817 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=netstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.000 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=shortcut scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:shortcut_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.627 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=content_capture scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.634 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=gpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.640 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=activity_task scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.694 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=sensorservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.695 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=virtualdevice_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.728 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=device_policy scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.730 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=batterystats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.731 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=powerstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:powerstats_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.788 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=trust scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.869 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=device_state scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.052 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=vibrator_manager scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vibrator_manager_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.135 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=thermalservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.380 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.384 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.399 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.406 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=performance_hint scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.542 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=clipboard scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
09-06 15:38:10.834 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=backup scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
09-06 15:38:10.899 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=com.google.edgetpu.IEdgeTpuAppService/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_app_service:s0 tclass=service_manager permissive=1
09-06 15:38:10.913 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
09-06 15:38:27.247 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
09-06 15:38:27.612 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 15:38:27.866 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 15:38:58.145 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=uimode scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:uimode_service:s0 tclass=service_manager permissive=1
09-06 15:38:59.592 12740 12740 I SEnhWorker: type=1400 audit(0.0:430): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:39:03.375 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=storagestats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:storagestats_service:s0 tclass=service_manager permissive=1
09-06 15:41:04.632 12740 12740 I RenderThread: type=1400 audit(0.0:470): avc: denied { read } for name="uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:04.632 12740 12740 I RenderThread: type=1400 audit(0.0:471): avc: denied { open } for path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:04.632 12740 12740 I RenderThread: type=1400 audit(0.0:472): avc: denied { getattr } for path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:04.769 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 15:41:05.188 12740 12740 I MicrovideoQShar: type=1400 audit(0.0:474): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:17.532 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=legacy_permission scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:legacy_permission_service:s0 tclass=service_manager permissive=1
09-06 15:41:45.676 12740 12740 I MicrovideoQShar: type=1400 audit(0.0:535): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:46.684 12740 12740 I GcaGeneric-4: type=1400 audit(0.0:540): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed19 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:48.288 12740 12740 I FinishThread: type=1400 audit(0.0:544): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed11 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:42:02.482 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 15:42:03.576 12740 12740 I GcaGeneric-4: type=1400 audit(0.0:565): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed19 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:42:06.947 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 15:42:06.955 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 15:42:07.652 12740 12740 I GcaGeneric-4: type=1400 audit(0.0:568): avc: denied { ioctl } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed12 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:42:08.903 343 343 E SELinux : avc: denied { find } for pid=12740 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 16:58:35.741 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=gpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
09-06 16:58:35.759 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=activity_task scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.142 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=sensorservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.142 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=virtualdevice_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.265 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=device_policy scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.344 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=batterystats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.344 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=trust scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.345 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=powerstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:powerstats_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.436 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=device_state scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.610 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=vibrator_manager scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vibrator_manager_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.640 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=thermalservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.785 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.944 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.946 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.955 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.962 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=performance_hint scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-06 16:58:37.147 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=clipboard scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
09-06 16:58:37.374 6263 6263 I binder:6263_6: type=1400 audit(0.0:2483): avc: denied { open } for path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=392 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 16:58:37.374 6263 6263 I binder:6263_6: type=1400 audit(0.0:2484): avc: denied { getattr } for path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=392 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 16:58:37.374 6263 6263 I binder:6263_6: type=1400 audit(0.0:2485): avc: denied { map } for path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=392 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 16:58:37.547 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 16:58:37.949 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=backup scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
09-06 16:58:38.733 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
09-06 16:58:38.737 338 338 E SELinux : avc: denied { find } for pid=6263 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 17:18:32.828 697 697 I binder:697_2: type=1400 audit(0.0:1275): avc: denied { read write } for path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1
Change-Id: I243f6242968fdc24478e923e8d30e529939b8a57
2024-09-07 01:16:23 +00:00
Robin Peng
c8a640f591
check_current_prebuilt: Symlink current prebuilt folder to android root
...
The Android are now based on Trunk Stable world and Pixel prebuilts CLs
also needs to reply with this which controlled by the flag which results:
- the flag value might be different on each branches
- the flag value are mostly different on each release configuration
- for local builds, ENGs' needs to figure out the correct location
of current prebuilts by checking through entire prebuilt textproto
files
To alleviate this problem, create an symlink file under android root
indicates current prebuilt path after invoke the android lunch cmd.
Bug: 364831620
Flag: EXEMPT export current prebuilt path
Change-Id: Idd130a70815fe1fe5288b003c5edb6979fd4c88c
Signed-off-by: Robin Peng <robinpeng@google.com >
2024-09-06 09:35:30 +00:00
Neo Yu
ab39c35ee2
Merge "Separate GRIL sepolicy for AIDL and HIDL by folders" into main
2024-09-06 01:41:13 +00:00
Xin Li
3d9a037343
Merge 24Q3 to AOSP main
...
Bug: 357762254
Merged-In: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Change-Id: Ic2a51a2ac1a142369dd49e4b6eb0dd37c32f1383
2024-09-05 17:02:37 -07:00
Android Build Coastguard Worker
c06c9d88d2
Snap for 12327203 from 19ab72a3de to 24Q4-release
...
Change-Id: Ie125c53bf36bd3d072c70df97977659c1b8883fa
2024-09-05 23:01:48 +00:00
danhtn
116b9d5ec1
shamp: Update shared_modem_platform HAL version to 3
...
Bug: 322731425
ag/29120584 provides a new V3 version
Test: `atest vts_treble_vintf_vendor_test:DeviceManifest/SingleAidlTest#HalIsServed/com_google_pixel_shared_modem_platform_ISharedModemPlatform_default_V1_84`
Flag: EXEMPT can't flag manifest changes
Change-Id: Ia91d7499f218a733906173e388a287cd591b8c01
2024-09-05 20:51:22 +00:00
Kieran Cyphus
19ab72a3de
Merge "shamp: Update shared_modem_platform HAL version to 2" into main
2024-09-05 18:17:58 +00:00
Thomas Flucke
02f64cf99f
dumpstate: gsa: Add GSA logs to dumpstate
...
New Stuff:
* Add program to read the GSA logs
Evidence:
avc: denied { read } for comm="dump_gsa" name="gsa-log1" dev="tmpfs" ino=1261 scontext=u:r:dump_gsa:s0 tcontext=u:object_r:gsa_log_device:s0 tclass=chr_file permissive=0
avc: denied { read } for comm="dump_gsa" name="gsa-bl1-log2" dev="tmpfs" ino=1222 scontext=u:r:dump_gsa:s0 tcontext=u:object_r:gsa_log_device:s0 tclass=chr_file permissive=0
Bug: 360205716
Test: adb shell dumpstate and check the dumpstate_board.txt for GSA logs
Flag: EXEMPT debug only
Change-Id: I4ea35da7916273cf526570067f24145ef4fb14f1
Signed-off-by: Thomas Flucke <tflucke@google.com >
2024-09-05 14:24:35 +00:00
Treehugger Robot
c1cdcbaeed
Merge "storage: fix vold avc denied" into main
2024-09-05 09:42:34 +00:00
Randall Huang
0440e82770
storage: fix vendor_init avc denied
...
avc: denied { write } for comm="init" name="swappiness" dev="proc" ino=207356 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc_dirty:s0 tclass=file permissive=1
Bug: 361093041
Test: local build
Change-Id: I595008f957c322aedbdf383c4e50c0e0ce30b9dc
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-05 08:42:30 +00:00
Randall Huang
24568c64d1
storage: fix vold avc denied
...
[ 33.709752][ T363] type=1400 audit(1725519791.892:729): avc: denied { read } for comm="binder:369_6" name="/" dev="sda5" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 33.710804][ T363] type=1400 audit(1725519791.892:730): avc: denied { open } for comm="binder:369_6" path="/mnt/vendor/efs" dev="sda5" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 33.711734][ T363] type=1400 audit(1725519791.892:731): avc: denied { ioctl } for comm="binder:369_6" path="/mnt/vendor/efs" dev="sda5" ino=3 ioctlcmd=0x5879 scontext=u:r:vold:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 33.712732][ T363] type=1400 audit(1725519791.892:732): avc: denied { read } for comm="binder:369_6" name="/" dev="sda7" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 33.713612][ T363] type=1400 audit(1725519791.892:733): avc: denied { open } for comm="binder:369_6" path="/mnt/vendor/modem_userdata" dev="sda7" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 33.714833][ T363] type=1400 audit(1725519791.892:734): avc: denied { ioctl } for comm="binder:369_6" path="/mnt/vendor/modem_userdata" dev="sda7" ino=3 ioctlcmd=0x5879 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
Bug: 361093041
Test: local build
Change-Id: I629f0303940f3f07ce3717cd0a2c8f975378f24b
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-05 08:42:25 +00:00
Randall Huang
bce5748b4f
storage: fix adb bugreport and refactor the existing rules
...
avc: denied { getattr } for comm="df" path="/mnt/vendor/persist" dev="sda15" ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
avc: denied { call } for comm="binder:10121_3" scontext=u:r:dumpstate:s0 tcontext=u:r:vold:s0 tclass=binder permissive=1
avc: denied { getattr } for comm="df" path="/mnt/vendor/efs" dev="sda5" ino=3 scontext=u:r:dumpstate:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
avc: denied { getattr } for comm="df" path="/mnt/vendor/modem_userdata" dev="sda7" ino=3 scontext=u:r:dumpstate:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
Bug: 361093041
Test: local build
Change-Id: I5c6be63beebf66d64db7e495c28493ab35621054
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-05 16:39:22 +08:00
Randall Huang
4391ba797c
Merge "storage: fix PowerStats avc denied" into main
2024-09-05 06:24:35 +00:00
Randall Huang
9d99d1d598
storage: fix PowerStats avc denied
...
avc: denied { search } for name="ufs_stats" dev="sysfs" ino=99872 scontext=u:r:hal_power_stats_default:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc: denied { open } for comm="android.hardwar" path="/sys/devices/platform/3c400000.ufs/host0/target000/0000/block/sda/stat" dev="sysfs" ino=100761 scontext=urhal_health_default
avc: denied { getattr } for comm="android.hardwar" path="/sys/devices/platform/3c400000.ufs/host0/target000/0000/block/sda/stat" dev="sysfs" ino=100761 scontext=urhal_health_default
avc: denied { search } for comm="android.hardwar" name="0000" dev="sysfs" ino=100578 scontext=urhal_health_defaults0 tcontext=uobject_r
avc: denied { read } for comm="android.hardwar" name="stat" dev="sysfs" ino=100761 scontext=urhal_health_defaults0 tcontext=uobject_rsysfs_scsi_devices_0000s0 tclass=file permissive=1
avc: denied { search } for comm="android.hardwar" name="0000" dev="sysfs" ino=100578 scontext=urhal_health_defaults0 tcontext=uobject_r
avc: denied { read } for comm="android.hardwar" name="stat" dev="sysfs" ino=100761 scontext=urhal_health_defaults0 tcontext=uobject_rsysfs_scsi_devices_0000s0 tclass=file permissive=1
Bug: 361093041
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: I94dadb9b9fc015fd1ecc39f9d62bc7209375a13a
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-05 04:10:53 +00:00
Sam Ou
2fdeb6aed7
Merge "sepolicy: fix dump_power policy" into main
2024-09-05 04:01:07 +00:00
Randall Huang
cacedb4ae8
storage: move sepolicy to common folder
...
avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0
Bug: 361093041
Test: local build
Change-Id: I90d29590908efc329a05bd8f5f3e145dac4982fc
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-05 10:48:44 +08:00
Android Build Coastguard Worker
fa12e08e98
Snap for 12319997 from d3977c94ad to 24Q4-release
...
Change-Id: If4d8990287e9ae871226a7ebc10c10b30a9044a7
2024-09-04 23:02:18 +00:00
Kieran Cyphus
94ef296dae
shamp: Update shared_modem_platform HAL version to 2
...
Bug: 364363838
ag/28965951 accidentally started providing a V2 when the manifests only said V1 which broke some VTS tests.
Test: `atest vts_treble_vintf_vendor_test:DeviceManifest/SingleAidlTest#HalIsServed/com_google_pixel_shared_modem_platform_ISharedModemPlatform_default_V1_84`
Flag: EXEMPT can't flag manifest changes
Change-Id: I17113f86e9bceaa3efe2f0d4d76e8349fe2c456e
2024-09-04 21:29:37 +00:00
Kiwon Park
d3977c94ad
Merge "Add eSIM directory and disable bootstrap when bootloader is unlocked in user build" into main
2024-09-04 16:55:20 +00:00
Neo Yu
0ca7adab01
Separate GRIL sepolicy for AIDL and HIDL by folders
...
Related avc error:
aidl part:
avc: denied { find } for pid=2019 uid=10269 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c13,c257,c512,c768 tcontext=u:object_r:hal_aidl_radio_ext_service:s0 tclass=service_manager permissive=1
avc: denied { read write } for comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1
avc: denied { search } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1
hidl part:
avc: denied { read write } for comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { search } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_radioext_default:s0 pid=792 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_radioext_default:s0 pid=792 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1
Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I0fb75f7f9c7339864ee303c0f1de3b218ceb81ed
2024-09-04 16:54:15 +00:00
Devika Krishnadas
76ca89b967
Add GPU team owners for mk files am: 1d82070ee9 am: 9747c1bb8d
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3252915
Change-Id: Ifdcf32d2555f28851739c53019e9bec4dfc13167
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-09-04 16:49:25 +00:00
Devika Krishnadas
9747c1bb8d
Add GPU team owners for mk files am: 1d82070ee9
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3252915
Change-Id: I12c5349ad38ca36302996f139dac08114cbea42a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-09-04 16:39:39 +00:00
samou
202f18ed18
sepolicy: fix dump_power policy
...
09-03 10:57:32.552 11878 11878 W dump_power: type=1400 audit(0.0:23): avc: denied { read } for name="thismeal.txt" dev="dm-51" ino=14368 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=0
09-05 00:01:19.432 6967 6967 W dump_power: type=1400 audit(0.0:25): avc: denied { open } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-52" ino=14368 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=0
09-05 00:11:25.532 6913 6913 W dump_power: type=1400 audit(0.0:25): avc: denied { getattr } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-52" ino=14368 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=0
Flag: EXEMPT refactor
Bug: 364612419
Change-Id: Ide2ad35e3f2a5bc3246603a4e66b67ec901ddc64
Signed-off-by: samou <samou@google.com >
2024-09-04 16:15:06 +00:00
Treehugger Robot
52f7c66ea0
Merge "gs-common: nfc: st21nfc: Add rules for android.hardware.nfc-service.st" into main
2024-09-04 08:54:32 +00:00
Snehal Koukuntla
13e34cc96a
Merge "Add widevine SELinux permissions" into main
2024-09-04 08:42:49 +00:00
Kyle Hsiao
a0681a7b7a
gs-common: nfc: st21nfc: Add rules for android.hardware.nfc-service.st
...
sepolicy for android.hardware.nfc-service.st
Flag: EXEMPT NDK
Bug: 361093394
Test: manual
Change-Id: Ibe90555a6ec9b13fb2cd8eae4131216d3240ec3a
2024-09-04 06:20:49 +00:00
Randall Huang
6ec23c152f
storage: move storage related device type to common folder
...
Bug: 364225000
Test: forrest build
Change-Id: Ica102c5a1ec45560939ac32c3ec22e721659c3cf
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-04 10:43:47 +08:00
Android Build Coastguard Worker
7f8d413a40
Snap for 12313714 from 019cc571f4 to 24Q4-release
...
Change-Id: I32d5a2ce7c74d01ed67e3bd0461eba6d6c6be1e7
2024-09-03 23:01:53 +00:00
Devika Krishnadas
1d82070ee9
Add GPU team owners for mk files
...
Bug: 275906497
Flag: EXEMPT only changing OWNERS
Change-Id: Ife6cdfd5097c6c50e0276ea3a70552e9feeb76a8
Signed-off-by: Devika Krishnadas <kdevika@google.com >
2024-09-03 22:49:19 +00:00
Snehal
bd3767ae16
Add widevine SELinux permissions
...
15992 15992 I exoplayer2.demo: type=1400 audit(0.0:1934): avc: denied { call } for scontext=u:r:untrusted_app_29:s0:c36,c257,c512,c768 tcontext=u:r:hal_drm_clearkey:s0 tclass=binder permissive=1 app=com.google.android.exoplayer2.demo
15992 15992 I exoplayer2.demo: type=1400 audit(0.0:1935): avc: denied { call } for scontext=u:r:untrusted_app_29:s0:c36,c257,c512,c768 tcontext=u:r:hal_drm_widevine:s0 tclass=binder permissive=1 app=com.google.android.exoplayer2.demo
860 860 I android.hardwar: type=1400 audit(0.0:4302): avc: denied { write } for name="mediadrm" dev="dm-57" ino=2565 scontext=u:r:hal_drm_widevine:s0 tcontext=u:object_r:mediadrm_vendor_data_file:s0 tclass=dir permissive=1
860 860 I android.hardwar: type=1400 audit(0.0:4304): avc: denied { create } for name="IDM1013" scontext=u:r:hal_drm_widevine:s0 tcontext=u:object_r:mediadrm_vendor_data_file:s0 tclass=dir permissive=1
Bug: 363182767
Bug: 363181505
Flag: EXEMPT bugfix
Change-Id: Ia8c3ba3d7fe9f09ceb40fd2b6ae88bbbcf5ac6f6
2024-09-03 13:40:57 +00:00
George Chang
019cc571f4
Merge "gs-common: nfc: st54spi: Add rules for hal_secure_element_st54spi_aidl" into main
2024-09-03 11:33:00 +00:00
Treehugger Robot
90f357aa8d
Merge "Storage: add selinux for ufs firmware upgrade event" into main
2024-09-03 03:36:51 +00:00
Android Build Coastguard Worker
3e22674416
Snap for 12309590 from 4c672d13c9 to 24Q4-release
...
Change-Id: I20e11f2f2a172737231b55e971c9dc54b2096b9c
2024-09-02 23:01:48 +00:00
Randall Huang
0f4a0bb8a2
Storage: add selinux for ufs firmware upgrade event
...
avc: denied { execute_no_trans } for comm="ufs_firmware_up" path="/vendor/bin/toybox_vendor" dev="dm-11" ino=380 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
avc: denied { read } for comm="cat" name="vendor" dev="sysfs" ino=63193 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { open } for comm="cat" path="/sys/devices/platform/13200000.ufs/vendor" dev="sysfs" ino=63193 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { search } for comm="dd" name="block" dev="tmpfs" ino=12 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
avc: denied { write } for comm="dd" name="sda12" dev="tmpfs" ino=1139 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:ufs_internal_block_device:s0 tclass=blk_file permissive=1
Bug: 361093041
Test: NA
Change-Id: I54445d4543a733baae85cd408b433033dd93ec6b
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-09-02 22:33:03 +00:00
Cheng Chang
4c672d13c9
Merge "gps: Allow gnss hal access vendor_gps_prop" into main
2024-09-02 07:38:45 +00:00
George Chang
cf2d68668f
gs-common: nfc: st54spi: Add rules for hal_secure_element_st54spi_aidl
...
sepolicy for android.hardware.secure_element-service.thales
08-26 12:49:43.959 343 343 E SELinux : avc: denied { add } for pid=706 uid=1068 name=android.hardware.secure_element.ISecureElement/eSE1 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:hal_secure_element_service:s0 tclass=service_manager permissive=1
08-26 12:49:43.936 706 706 I android.hardwar: type=1400 audit(0.0:9): avc: denied { call } for scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
08-26 12:49:43.936 706 706 I android.hardwar: type=1400 audit(0.0:10): avc: denied { transfer } for scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
08-26 12:49:59.904 1 1 I /system/bin/init: type=1107 audit(0.0:139): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.se.reset pid=706 uid=1068 gid=1068 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=1'
08-26 12:50:12.124 706 706 I android.hardwar: type=1400 audit(0.0:461): avc: denied { read write } for name="st54spi" dev="tmpfs" ino=1552 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:st54spi_device:s0 tclass=chr_file permissive=1
08-26 12:50:12.124 706 706 I android.hardwar: type=1400 audit(0.0:462): avc: denied { open } for path="/dev/st54spi" dev="tmpfs" ino=1552 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:st54spi_device:s0 tclass=chr_file permissive=1
08-26 16:33:44.332 737 737 I android.hardwar: type=1400 audit(0.0:959): avc: denied { read write } for name="st21nfc" dev="tmpfs" ino=1550 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file permissive=1
08-26 16:33:44.332 737 737 I android.hardwar: type=1400 audit(0.0:960): avc: denied { open } for path="/dev/st21nfc" dev="tmpfs" ino=1550 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file permissive=1
08-26 16:33:44.332 737 737 I android.hardwar: type=1400 audit(0.0:961): avc: denied { ioctl } for path="/dev/st21nfc" dev="tmpfs" ino=1550 ioctlcmd=0xea05 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file permissive=1
Flag: EXEMPT NDK
Bug: 361093024
Test: manual
Change-Id: I1f3aebc9894de9f3410f2031e2b99e07d4060fa5
2024-09-02 06:37:19 +00:00
Attis Chen
e5c668587d
Merge "Add dump of panel power_mode." into main
2024-09-02 04:54:18 +00:00
Android Build Coastguard Worker
cf6c0cdf42
Snap for 12306720 from a13a1663fd to 24Q4-release
...
Change-Id: If99865fcd5374862c1967cc823756257fa2501b9
2024-09-01 21:01:37 +00:00
Martin Liu
a13a1663fd
[automerger skipped] Move compaction_proactiveness to vendor sepolicy am: d1adbe0cb2 -s ours
...
am skip reason: Merged-In I14cff8dfe4e143995b9011cd34a1e7d74613ae33 with SHA-1 d6d4a779e5 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/29091424
Change-Id: Ied82c7da10415424f42bd7101bbe7c6ece892f0b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-09-01 15:28:58 +00:00
Martin Liu
d1adbe0cb2
Move compaction_proactiveness to vendor sepolicy
...
Move compaction_proactiveness sepolicy from the system
to vendor since it breaks other vendors.
Bug: 361985704
Test: check knob value
Flag: NONE sepolicy doesn't support flag
Change-Id: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Merged-In: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Signed-off-by: Martin Liu <liumartin@google.com >
2024-09-01 08:06:04 +00:00
Android Build Coastguard Worker
0eba224456
Snap for 12304452 from d1dfe55442 to 24Q4-release
...
Change-Id: I6b4d7ec206c59326c4d08e579130e1c467396ed9
2024-08-31 01:01:59 +00:00
Kiwon Park
69797e03ca
Add eSIM directory and disable bootstrap when bootloader is unlocked in user build
...
Allow vendor_init to set setupwizard prop
Allow priv_app and gmscore_app to get setupwizard prop
<11>[ 7.276992][ T329] init: Unable to set property 'setupwizard.feature.provisioning_profile_mode' from uid:0 gid:0 pid:330: SELinux permission check failed
08-28 15:35:42.536 10156 5884 5884 W oid.setupwizard: type=1400 audit(0.0:63): avc: denied { read } for name="u:object_r:setupwizard_feature_prop:s0" dev="tmpfs" ino=335 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:setupwizard_feature_prop:s0 tclass=file permissive=0 app=com.google.android.setupwizard
08-28 15:11:52.015 10185 6915 6915 W highpool[8]: type=1400 audit(0.0:17): avc: denied { read } for name="u:object_r:setupwizard_feature_prop:s0" dev="tmpfs" ino=339 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:setupwizard_feature_prop:s0 tclass=file permissive=0 app=com.google.android.gms
Bug: 349592724
Test: m
Change-Id: I8330c9f6f9efd215ec4ea1f7d3d6ff5596773e21
Flag: NONE disabling a feature just in factory
2024-08-30 10:28:16 -07:00
Treehugger Robot
d1dfe55442
Merge "Move compaction_proactiveness to vendor sepolicy" into main
2024-08-30 10:50:43 +00:00
Dennis Song
c9fb05a230
[automerger skipped] Explicitly set user root for the gs_watchdogd service. am: f25cb6895f am: 6c82faf70b -s ours
...
am skip reason: Merged-In I36a3a67dc357f608b33a131a4e5f6fd6defb91e5 with SHA-1 c0b820e056 is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3250951
Change-Id: I0e5a8cbb986a06a2e55ab58ee1c80b53fca96f2b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-30 09:58:38 +00:00
Dennis Song
6c82faf70b
Explicitly set user root for the gs_watchdogd service. am: f25cb6895f
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3250951
Change-Id: I58b8abe45d82b6ea620d6e623c4716785a992c76
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-30 09:29:18 +00:00
Dennis Song
f25cb6895f
Explicitly set user root for the gs_watchdogd service.
...
Otherwise host_init_verifier would fail.
Bug: 362447627
Test: Treehugger
Merged-In: I36a3a67dc357f608b33a131a4e5f6fd6defb91e5
Change-Id: I36a3a67dc357f608b33a131a4e5f6fd6defb91e5
2024-08-30 08:27:36 +00:00
Dennis Song
37238f4cff
Merge "Explicitly set user root for the gs_watchdogd service." into main
2024-08-30 08:24:56 +00:00
Martin Liu
d6d4a779e5
Move compaction_proactiveness to vendor sepolicy
...
Move compaction_proactiveness sepolicy from the system
to vendor since it breaks other vendors.
Bug: 361985704
Test: check knob value
Flag: NONE sepolicy doesn't support flag
Change-Id: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Signed-off-by: Martin Liu <liumartin@google.com >
2024-08-30 07:21:16 +00:00
Cheng Chang
f71ff2ba7c
gps: Allow gnss hal access vendor_gps_prop
...
avc: denied { read } for name="u:object_r:vendor_gps_prop:s0" dev="tmpfs" ino=421 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_prop:s0 tclass=file permissive=0
Bug: 335354369
Test: Check avc logcat.
Change-Id: Idfc885c6d54a9a5160643ff53f3e278ee067b286
2024-08-30 06:05:32 +00:00
Tommy Chiu
15ed5c639e
Move PRODUCT_COPY_FILES from each board>device-vendor.mk here
...
We used to put the firmware copy logic in dedicated device-vendor.mk
files for each platform. This approach is difficult to maintain and
unnecessary since we always want to deploy the latest firmware.
Propose a better approach for handling firmware copy logic.
Flag: EXEMPT refactor
Bug: 359071523
Test: Build pass
Change-Id: I4169353b9f8f16b82eb0e4ebf2a884f46e1a5f8b
2024-08-30 04:28:47 +00:00
Dennis Song
c0b820e056
Explicitly set user root for the gs_watchdogd service.
...
Otherwise host_init_verifier would fail.
Bug: 362447627
Test: Treehugger
Flag: EXEMPT bugfix
Change-Id: I36a3a67dc357f608b33a131a4e5f6fd6defb91e5
2024-08-30 03:42:06 +00:00
Android Build Coastguard Worker
dff8cf2015
Snap for 12296955 from 1ae1d53973 to 24Q4-release
...
Change-Id: Ifdbe1caaecb247508051bcb86cccf0423535df84
2024-08-29 23:01:35 +00:00
Randall Huang
1ae1d53973
Merge "storage: fix idle-maint avc denials." into main
2024-08-29 02:51:57 +00:00
Treehugger Robot
d9667c65f6
Merge "storage: allow mkfs/fsck for vendor partitons" into main
2024-08-29 02:51:23 +00:00
Frank Yu
d03036bdef
Merge "Move hal_radio_ext_service related policy of grilservice_app to gs-common." into main
2024-08-29 01:52:23 +00:00
Randall Huang
df4a5f7b48
storage: allow mkfs/fsck for vendor partitons
...
avc: denied { read } for name="sda7" dev="tmpfs" ino=1173 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { open } for path="/dev/block/sda7" dev="tmpfs" ino=1173 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { write } for name="sda7" dev="tmpfs" ino=1173 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { ioctl } for path="/dev/block/sda7" dev="tmpfs" ino=1173 ioctlcmd=0x1268 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { read } for name="sda5" dev="tmpfs" ino=1010 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { open } for path="/dev/block/sda5" dev="tmpfs" ino=1010 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { open } for path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=100275 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
avc: denied { write } for name="sda5" dev="tmpfs" ino=1010 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { ioctl } for path="/dev/block/sda5" dev="tmpfs" ino=1010 ioctlcmd=0x1268 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { search } for name="0:0:0:0" dev="sysfs" ino=100048 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc: denied { getattr } for path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=101272 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { read } for name="zoned" dev="sysfs" ino=100308 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=100308 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { search } for name="0:0:0:0" dev="sysfs" ino=100048 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc: denied { getattr } for path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda10/partition" dev="sysfs" ino=102003 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { read } for name="zoned" dev="sysfs" ino=100308 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=100308 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc: denied { read } for name="sda5" dev="tmpfs" ino=1004 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { open } for path="/dev/block/sda5" dev="tmpfs" ino=1004 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { write } for name="sda5" dev="tmpfs" ino=1004 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { ioctl } for path="/dev/block/sda5" dev="tmpfs" ino=1004 ioctlcmd=0x1268 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { read } for name="sda7" dev="tmpfs" ino=1199 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { open } for path="/dev/block/sda7" dev="tmpfs" ino=1199 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { write } for name="sda7" dev="tmpfs" ino=1199 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc: denied { ioctl } for path="/dev/block/sda7" dev="tmpfs" ino=1199 ioctlcmd=0x1268 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
Bug: 361093041
Test: build pass
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:0cf7210eb1b5ba1d22fb8dcb59f40cb74b98dd37 )
Change-Id: I0d89d360e75335784116a4e4769d0b60699917eb
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-08-29 01:10:11 +00:00
Randall Huang
d6ba7fad68
storage: fix idle-maint avc denials.
...
avc: denied { getattr } for path="/dev/block/sda5" dev="tmpfs" ino=1039 scontext=u:r:vold:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { getattr } for path="/dev/block/sda7" dev="tmpfs" ino=1199 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
Bug: 361093041
Test: run idle-maint run
Change-Id: Ie92ffa8b576c74e3a1cb127b265059ec76c14667
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-08-29 00:00:09 +00:00
Ernie Hsu
714dc8abf8
Merge "mediacodec: fix perfetto trace permission" into main
2024-08-28 23:33:40 +00:00
Prochin Wang
a8910cb36b
Merge "Label touch_property_type to associate with vendor_gti_prop" into main
2024-08-28 23:21:38 +00:00
Prochin Wang
956edf0d26
Label touch_property_type to associate with vendor_gti_prop
...
Pass ROM build of all git_main targets:
https://android-build.googleplex.com/builds/abtd/run/L52500030006128092/
https://android-build.corp.google.com/abtd/run/L93900030006078492/
https://android-build.corp.google.com/abtd/run/L15800030006086232/
https://android-build.corp.google.com/abtd/run/L27700030006086619/
Bug: 361237875
Test: mm and flash rom
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Change-Id: I518ff7c05fc1fa279cd7300cb77673a86ff3e35b
2024-08-28 23:20:52 +00:00
Android Build Coastguard Worker
2583351232
Snap for 12289667 from 13883d9a54 to 24Q4-release
...
Change-Id: I2890d977eedcaf8418bb8404c8ec0a45cd12830d
2024-08-28 23:02:15 +00:00
Bryan Bong Gyoune Kim
d1f646d258
Merge "bootctrl: fixed OOB read in BootControl" into main
2024-08-28 20:59:25 +00:00
bgkim
b584b9c7e0
bootctrl: fixed OOB read in BootControl
...
Fixed OOB read in BootControl::isSlotMarkedSuccessful() by checking
if "in_slot" is negative
Flag: EXEMPT bugfix
Test: tested on Husky device
Bug: 353516777
Change-Id: I634c32a8c12403008fe5a724bc447f82931ae9c5
Signed-off-by: bgkim <bgkim@google.com >
2024-08-28 12:44:34 -07:00
Ernie Hsu
d35b61f390
mediacodec: fix perfetto trace permission
...
08-28 16:33:56.280 1046 720 720 I auditd : type=1400 audit(0.0:469): avc: denied { write } for comm="TracingMuxer" name="traced_producer" dev="tmpfs" ino=1604 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=0
Flag: EXEMPT bugfix
Test: atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Bug: 361093311
Change-Id: I0aad9d771069cd0d660708e41c29c79d83e04704
2024-08-28 10:27:52 +00:00
Ernie Hsu
13883d9a54
mediacodec: fix permission for vendor_media_data and ecoservice
...
vendor_media_data:
08-27 12:07:01.540 747 747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1785): avc: denied { search } for comm=436F646563322E30204C6F6F706572 name="media" dev="dm-57" ino=399 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=dir permissive=1
08-27 12:07:01.540 747 747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1786): avc: denied { write } for comm=436F646563322E30204C6F6F706572 name="media" dev="dm-57" ino=399 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=dir permissive=1
08-27 12:07:01.540 747 747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1787): avc: denied { add_name } for comm=436F646563322E30204C6F6F706572 name="input_7335.bin" scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=dir permissive=1
08-27 12:07:01.540 747 747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1788): avc: denied { create } for comm=436F646563322E30204C6F6F706572 name="input_7335.bin" scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=file permissive=1
08-27 12:07:01.540 747 747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1789): avc: denied { append open } for comm=436F646563322E30204C6F6F706572 path="/data/vendor/media/input_7335.bin" dev="dm-57" ino=26749 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=file permissive=1
ecoservice:
08-27 13:07:44.686 358 358 E SELinux : avc: denied { find } for pid=743 uid=1046 name=media.ecoservice scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:eco_service:s0 tclass=service_manager permissive=1
Flag: EXEMPT bugfix
Test: video playback and screen record
Bug: 361093311
Change-Id: I37d5081061bad2917b24e320f4e4a9c8116db6fa
2024-08-28 07:16:06 +00:00
Treehugger Robot
e341a7fc8f
Merge "switch waves prebuilt version" into main
2024-08-28 03:14:32 +00:00
Android Build Coastguard Worker
e2a9c523c5
Snap for 12283639 from a01bc1d315 to 24Q4-release
...
Change-Id: I28edd756418051c880e912bf9f10c591ecbcc9bb
2024-08-27 23:02:11 +00:00
Frank Yu
e6358c91de
Move hal_radio_ext_service related policy of grilservice_app to gs-common.
...
Related avc error:
avc: denied { find } for pid=2227 uid=10259 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c3,c257,c512,c768 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0
avc: denied { call } for comm="oid.grilservice" scontext=u:r:grilservice_app:s0:c3,c257,c512,c768 tcontext=u:r:hal_radioext_default:s0 tclass=binder permissive=0 app=com.google.android.grilservice
Bug: 361210953
Change-Id: Ibb8a341847b0772668b52bc01f2d087bf1874fe9
Test: Verify with test ROM
Flag: EXEMPT sepolicy refactor
2024-08-27 12:10:52 +00:00
Ernie Hsu
a01bc1d315
mediacodec: fix vpu device sepolicy for video playback
...
08-27 11:30:17.500 734 734 I binder:734_4: type=1400 audit(0.0:1288): avc: denied { read write } for name="vpu" dev="tmpfs" ino=1585 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:17.500 734 734 I binder:734_4: type=1400 audit(0.0:1289): avc: denied { open } for path="/dev/vpu" dev="tmpfs" ino=1585 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:17.500 734 734 I binder:734_4: type=1400 audit(0.0:1290): avc: denied { ioctl } for path="/dev/vpu" dev="tmpfs" ino=1585 ioctlcmd=0x4200 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:17.500 734 734 I binder:734_4: type=1400 audit(0.0:1291): avc: denied { map } for path="/dev/vpu" dev="tmpfs" ino=1585 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:18.944 734 734 I FetchThread: type=1400 audit(0.0:1292): avc: denied { ioctl } for path="/dev/vpu" dev="tmpfs" ino=1585 ioctlcmd=0x4207 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
Bug: 353638738
Flag: EXEMPT bugfix
Test: video playback
Change-Id: I8ad4507693a4a0fbbd2709bd79d25b1ef4109904
2024-08-27 05:29:18 +00:00
Android Build Coastguard Worker
42ca11148b
Snap for 12278291 from e4506b0159 to 24Q4-release
...
Change-Id: I4aa90193edf11cb1efe3c800184f8c022a239d96
2024-08-26 23:01:45 +00:00
attis
44f21d0c43
Add dump of panel power_mode.
...
Add the power_mode sysfs node to dump_second_display.cpp and
dump_display.cpp.
Bug: 358505990
Flag: EXEMPT bugfix
Test: adb bugreport.
Change-Id: I875b9a3ef416c188376eb2f9226996b6645ccdb9
Signed-off-by: attis <attis@google.com >
2024-08-26 12:13:48 +00:00
Randall Huang
e4506b0159
storage: extend cmd_logging sepolicy to new ufshc
...
Bug: 361093041
Test: check ls -Zl
Change-Id: Ia461f47562932a7dad1c114f7b3e11e5fa0d312c
Signed-off-by: Randall Huang <huangrandall@google.com >
2024-08-26 09:53:10 +08:00
Jasmine Cha
3d6169d30b
switch waves prebuilt version
...
Flag: EXEMPT bringup waves
Bug: 352461861
Test: manual test
Change-Id: Ic7a826d98a77ccb579594a9fb7db1df5d62e99aa
Signed-off-by: Jasmine Cha <chajasmine@google.com >
2024-08-26 01:28:12 +00:00
Android Build Coastguard Worker
b3ebc1cbfe
Snap for 12272146 from 81654643af to 24Q4-release
...
Change-Id: I616bb7fb9e66bbe33eb8ec7029b1c4eeaa9aaba2
2024-08-24 01:01:48 +00:00
Sam Ou
81654643af
Merge "sepolicy: allow dumpstate to execute dump_power" into main
2024-08-23 10:58:34 +00:00
samou
c078a870cb
sepolicy: allow dumpstate to execute dump_power
...
08-22 09:10:30.200 7202 7202 I dump_power: type=1400 audit(0.0:830): avc: denied { read } for name="acpm_stats" dev="sysfs" ino=24831 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
08-22 09:10:30.200 7202 7202 I dump_power: type=1400 audit(0.0:831): avc: denied { open } for path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=24831 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
08-22 09:10:30.200 7202 7202 I dump_power: type=1400 audit(0.0:832): avc: denied { search } for name="acpm_stats" dev="sysfs" ino=24831 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
08-22 09:10:30.200 7202 7202 I dump_power: type=1400 audit(0.0:833): avc: denied { read } for name="core_stats" dev="sysfs" ino=50367 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
08-22 09:10:30.200 7202 7202 I dump_power: type=1400 audit(0.0:834): avc: denied { open } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=50367 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
08-22 09:10:30.200 7202 7202 I dump_power: type=1400 audit(0.0:835): avc: denied { getattr } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=50367 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:844): avc: denied { read } for name="time_in_state" dev="sysfs" ino=46007 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:845): avc: denied { open } for path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=46007 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:846): avc: denied { getattr } for path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=46007 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:847): avc: denied { read } for name="pm_genpd_summary" dev="debugfs" ino=1889 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_pm_genpd_debugfs:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:848): avc: denied { open } for path="/sys/kernel/debug/pm_genpd/pm_genpd_summary" dev="debugfs" ino=1889 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_pm_genpd_debugfs:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:849): avc: denied { getattr } for path="/sys/kernel/debug/pm_genpd/pm_genpd_summary" dev="debugfs" ino=1889 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_pm_genpd_debugfs:s0 tclass=file permissive=1
08-22 09:46:48.580 7468 7468 I dump_power: type=1400 audit(0.0:832): avc: denied { search } for name="battery" dev="sysfs" ino=78091 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
08-22 09:46:48.580 7468 7468 I dump_power: type=1400 audit(0.0:833): avc: denied { read } for name="uevent" dev="sysfs" ino=78092 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
08-22 09:46:48.580 7468 7468 I dump_power: type=1400 audit(0.0:834): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=78092 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
08-22 09:46:48.580 7468 7468 I dump_power: type=1400 audit(0.0:835): avc: denied { getattr } for path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=78092 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
08-22 09:46:48.600 7468 7468 I dump_power: type=1400 audit(0.0:836): avc: denied { read } for name="maxfg" dev="sysfs" ino=76330 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
08-22 09:46:48.600 7468 7468 I dump_power: type=1400 audit(0.0:837): avc: denied { read } for name="logbuffer_tcpm" dev="tmpfs" ino=924 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
08-22 09:54:11.732 7062 7062 I dump_power: type=1400 audit(0.0:836): avc: denied { search } for name="mitigation" dev="dm-50" ino=3646 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
08-22 09:54:11.732 7062 7062 I dump_power: type=1400 audit(0.0:837): avc: denied { search } for name="mitigation" dev="sysfs" ino=77466 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
08-22 09:54:11.732 7062 7062 I dump_power: type=1400 audit(0.0:838): avc: denied { read } for name="last_triggered_count" dev="sysfs" ino=77519 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
08-22 09:54:11.732 7062 7062 I dump_power: type=1400 audit(0.0:839): avc: denied { open } for path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=77519 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
08-22 09:54:11.732 7062 7062 I dump_power: type=1400 audit(0.0:840): avc: denied { read } for name="batoilo_count" dev="sysfs" ino=77531 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
08-22 09:54:11.732 7062 7062 I dump_power: type=1400 audit(0.0:841): avc: denied { open } for path="/sys/devices/virtual/pmic/mitigation/last_triggered_count/batoilo_count" dev="sysfs" ino=77531 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
08-22 10:30:19.904 7230 7230 I android.hardwar: type=1400 audit(0.0:838): avc: denied { execute_no_trans } for path="/vendor/bin/dump/dump_power" dev="overlay" ino=92 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:999): avc: denied { read } for name="maxfg_history" dev="tmpfs" ino=1179 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:battery_history_device:s0 tclass=chr_file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:1000): avc: denied { open } for path="/dev/logbuffer_tcpm" dev="tmpfs" ino=948 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:1001): avc: denied { getattr } for path="/dev/logbuffer_tcpm" dev="tmpfs" ino=948 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:1002): avc: denied { open } for path="/sys/devices/platform/10d60000.hsi2c" dev="sysfs" ino=22941 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
08-23 08:45:09.512 10793 10793 I dump_power: type=1400 audit(0.0:1003): avc: denied { getattr } for path="/sys/devices/virtual/pmic/mitigation/last_triggered_count/batoilo_count" dev="sysfs" ino=85543 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ic4040da7ef299c029e6e893f5f14da07751c2ebc
Signed-off-by: samou <samou@google.com >
2024-08-23 08:30:38 +00:00
Android Build Coastguard Worker
b0f5665edf
Snap for 12260156 from e7d8589878 to 24Q4-release
...
Change-Id: I52362b21a5db1a02f5390752f15338933e376d19
2024-08-21 23:02:11 +00:00
Roy Luo
e7d8589878
Export build flag to selinux policy for sysfs_udc fscontext
...
sysfs_udc context is introduced in aosp/3163782.
Build-time flag RELEASE_USB_UDC_SYSFS_SELINUX_POLICY_ENABLED guards
the access to the new fscontext.
This change exports the flag to selinux policy to make it visible.
Bug: 339241080
Test: build
Flag: RELEASE_USB_UDC_SYSFS_SELINUX_POLICY_ENABLED
Change-Id: I442c5cb16ee40e0a54bddd7c1550dbb4a69557c9
2024-08-21 01:12:43 +00:00
Rios Kao
7cf82126a0
Merge "aidl: audio: update external service version" into main
2024-08-21 00:34:00 +00:00
Devika Krishnadas
94460019bf
Merge "Enable Mapper V5 and Allocator V2" into main
2024-08-21 00:32:26 +00:00
Devika Krishnadas
c2312ed7a5
Enable Mapper V5 and Allocator V2
...
Bug: 267352318
Test: Conformance tests b/356892020
Test: IP smoke tests b/356907323
Test: Performance test b/356709819
Flag: EXEMPT HAL interface change
Change-Id: I97f04ef780b1b82cbfe79b1f24e4f190b3cc2347
Signed-off-by: Devika Krishnadas <kdevika@google.com >
2024-08-21 00:31:57 +00:00
Android Build Coastguard Worker
4bd20ef3a0
Snap for 12253386 from eea858c900 to 24Q4-release
...
Change-Id: Ic82cfa0829efd5ad1ef5949fc323748cf387805e
2024-08-20 23:01:59 +00:00
Rios Kao
cf0c5119c9
aidl: audio: update external service version
...
Test: atest vts_treble_vintf_vendor_test
Bug: 361019537
Flag: EXEMPT bug fix.
Change-Id: Ic069faf598ba67202132a52c68863b032c5adc44
2024-08-20 11:56:02 +00:00
Mahesh Kallelil
eea858c900
Merge "modem: Migrate dump_modem.sh to rust" into main
2024-08-20 03:25:55 +00:00
Android Build Coastguard Worker
1f9b0cfb11
Snap for 12247339 from 7eaa70c248 to 24Q4-release
...
Change-Id: Ia305e9017a7f18633e91fe5072a676de5c303f79
2024-08-19 23:02:16 +00:00
Mahesh Kallelil
9e2bbf3257
modem: Migrate dump_modem.sh to rust
...
Test: adb bugreport
Bug: 286755695
Flag: EXEMPT refactor
Change-Id: I69b147263d423594a51904970ce5af05eff3b03b
Signed-off-by: Mahesh Kallelil <kallelil@google.com >
2024-08-19 14:41:29 -07:00
Pechetty Sravani (xWF)
7eaa70c248
Merge changes from topic "revert-28323508-common_perf_init-ADJDKJXNAW" into main
...
* changes:
Revert "gs-common: Added common perf init.rc"
Revert "gs-common: Move cpufreq perf settings to gs-common"
2024-08-19 06:53:09 +00:00
Pechetty Sravani (xWF)
98e6a61c1f
Revert "gs-common: Added common perf init.rc"
...
Revert submission 28323508-common_perf_init
Reason for revert: Potential culprit for b/360746202- verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.
Reverted changes: /q/submissionid:28323508-common_perf_init
Change-Id: Ic29fb88b0d78974af602ff12456fb39c223c19e7
2024-08-19 05:33:45 +00:00
Pechetty Sravani (xWF)
7606e41504
Revert "gs-common: Move cpufreq perf settings to gs-common"
...
Revert submission 28323508-common_perf_init
Reason for revert: Potential culprit for b/360746202- verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.
Reverted changes: /q/submissionid:28323508-common_perf_init
Change-Id: I0dd3825e9574b79f761a43edc56f86c060103aeb
2024-08-19 05:33:51 +00:00
Treehugger Robot
71783b1729
Merge changes from topic "common_perf_init" into main
...
* changes:
gs-common: Move cpufreq perf settings to gs-common
gs-common: Added common perf init.rc
2024-08-19 03:55:25 +00:00
Android Build Coastguard Worker
2f139730bb
Snap for 12241618 from e6a505e473 to 24Q4-release
...
Change-Id: I04553ac72931daf232f7dddc77b5d29c1b5e3ac7
2024-08-17 01:01:57 +00:00
Treehugger Robot
e6a505e473
Merge "Init widevine sepolicy" into main
2024-08-16 17:15:08 +00:00
Snehal
84aaa5491e
Init widevine sepolicy
...
Bug: 354191444
Flag: EXEMPT bugfix
Change-Id: I331c31be2f1478b161a9af1d0c49506b717c30d2
2024-08-16 16:15:03 +00:00
Will Song
38522ec23e
gs-common: Move cpufreq perf settings to gs-common
...
Moving common cpufreq perf settings to gs-common
Bug: 335874870
Flag: NONE code refactor
Test: boot and check parameters
Change-Id: I9038a54d782be75d520e611fd93d18b1880ae442
Signed-off-by: Will Song <jinpengsong@google.com >
2024-08-15 16:54:48 -07:00
Will Song
6a77a85f6a
gs-common: Added common perf init.rc
...
Migrate configuratuions from devices setting to common folder
for kernel 6.1 devices.
Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Change-Id: I3c204c1df36eda67744d085600a95ac8bb696da9
Signed-off-by: Will Song <jinpengsong@google.com >
2024-08-15 16:54:28 -07:00
Android Build Coastguard Worker
b4d0a2002a
Snap for 12229688 from 722dbe869c to 24Q4-release
...
Change-Id: Ib02018a0dda57c28c143244d6dee6dc9554dc826
2024-08-14 23:02:08 +00:00
Devika Krishnadas
722dbe869c
Merge "Rename arm-gralloc namespace to pixel-gralloc for mapper-version" into main
2024-08-14 18:06:09 +00:00
Devika Krishnadas
6d8cc33dde
Rename arm-gralloc namespace to pixel-gralloc for mapper-version
...
Bug: 355046697
Test: Build and boot
Change-Id: Ic4e7bf898aec3bf37fe3b46d5109d06f86b13646
Signed-off-by: Devika Krishnadas <kdevika@google.com >
2024-08-14 15:48:41 +00:00
Android Build Coastguard Worker
56b2e3c7a9
Snap for 12224018 from 805f6b577c to 24Q4-release
...
Change-Id: Ie6199d72d076854e23d98b6a54332095a2baf3a2
2024-08-13 23:02:25 +00:00
Treehugger Robot
60bd35ec38
Merge "Use Build-Time flag to choose build from source or use prebuilt" into main
2024-08-13 22:11:48 +00:00
Baligh Uddin
29b454da85
Use Build-Time flag to choose build from source or use prebuilt
...
BUG: 358627252
Test: Local build + TH
Change-Id: I4ef22dbe357bb04876e459061a694bfb146ae6e3
Flag: build.RELEASE_PIXEL_CAMERA_ENABLE_PREBUILT
2024-08-13 15:05:46 +00:00
Will Song
805f6b577c
gs-common:performance: Add perf owner file am: 2c5b457e4b am: f14ff6e8dc
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3211739
Change-Id: Icc3d1cfa433589e2a3119990f757c0c25dd5dab0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-13 04:13:07 +00:00
Will Song
f14ff6e8dc
gs-common:performance: Add perf owner file am: 2c5b457e4b
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3211739
Change-Id: Id7325b32068421ed33086cb3e2c11d09e1bef49d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-13 03:53:59 +00:00
Android Build Coastguard Worker
1ee3252730
Snap for 12217053 from c417cf5c11 to 24Q4-release
...
Change-Id: I7ad9535ec7c1198913215f029ec079814b61a601
2024-08-12 23:06:42 +00:00
Xin Li
3e8a1e1c86
[automerger skipped] Merge 24Q3 (ab/AP3A.240905.001) to aosp-main-future am: ee94facd74 -s ours
...
am skip reason: Merged-In I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87 with SHA-1 875dd78991 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/28711892
Change-Id: Ibe5f4894e08487e2b7719658ae7cfa414fec4a1f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-12 21:01:29 +00:00
Super Liu
c417cf5c11
Merge "Refine the GTI dump order" into main
2024-08-12 06:17:17 +00:00
Will Song
2c5b457e4b
gs-common:performance: Add perf owner file
...
Bug: 358659371
Change-Id: I23b5033435e1bc240eaabcd4213134195a34d3f8
Test: build
2024-08-09 20:55:42 +00:00
Super Liu
8aaaec0793
Refine the GTI dump order
...
Adjust the order to get the touch snapshot as soon as possible.
This will avoid the following operations to overwrite the touch
statistics for further analysis.
Bug: 356993163
Flag: EXEMPT bugfix
Test: Manual test.
Change-Id: I012544849868ca7b81c11ffa13858eaa209af5c5
Signed-off-by: Super Liu <supercjliu@google.com >
2024-08-09 01:47:32 +00:00
Xin Li
ee94facd74
Merge 24Q3 (ab/AP3A.240905.001) to aosp-main-future
...
Bug: 347831320
Merged-In: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
Change-Id: I11751a3d94188293cacbaa7dbd71b69b177b732f
2024-08-08 11:15:48 -07:00
YiKai Peng
5c3b95a98f
WLC: service: update AIDL manifest version to 1-2
...
Test: Build/Flash
Bug: 357493518
Flag: vendor.google.wireless_charger.service.flags.enable_service
Change-Id: If318fd6fe855855a40fbb14157612b75149208cf
Signed-off-by: YiKai Peng <kenpeng@google.com >
2024-08-08 04:58:14 +00:00
Android Build Coastguard Worker
226dddf4d2
Snap for 12185670 from f91cdac2fe to 24Q4-release
...
Change-Id: Ice1efd8bc416ff71a69a53c14029f088d34c9a1e
2024-08-05 23:01:56 +00:00
Poomarin Phloyphisut
1ea1cff89a
[USB Audio] Fix SEPolicy issue
...
Error:
avc: denied { search } for name="01" dev="debugfs" ino=927573 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:vendor_usb_debugfs:s0 tclass=dir permissive=0
Bug: 342060153
Test: Local Test.
Flag: EXEMPT bugfix
Change-Id: I29a73a202b239cf37dc53ccf3ef83df3b693e717
2024-08-05 11:11:03 +00:00
Richard Chang
f91cdac2fe
Merge "zram: Ensure 1.5 GB free space before creating zram backing device" into main
2024-08-05 09:06:06 +00:00
Richard Chang
bf04670197
zram: Ensure 1.5 GB free space before creating zram backing device
...
fs_mgr follows system property 'ro.zram_backing_device_min_free_mb'
to check available space before creating zram backing device.
Previously, in Repair Mode, it requires at least 2 GB to boot
successfully with 512 MB zram backing device size. So we can set
1.5 GB as the minimum threshold.
Bug: 322821637
Bug: 326877642
Test: Fill up userdata, enlarge zram backing device size on next
boot.
Test: Boot to Repair Mode
Flag: EXEMPT bugfix
Change-Id: I16c6f1649181af94347b4534c790522bfd2fc166
2024-08-05 09:04:34 +00:00
Cyan_Hsieh
ee9fc2619a
Add FSTAB_OWNERS and update OWNERS to include Android.bp am: 70b62a2bcd am: 7c84d4f5d8
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3205326
Change-Id: I6dd88ed20fd36d030c05d521c354924f82755378
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-05 03:09:21 +00:00
Cyan_Hsieh
7c84d4f5d8
Add FSTAB_OWNERS and update OWNERS to include Android.bp am: 70b62a2bcd
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3205326
Change-Id: I2020275cf385bbdc63e2015ed2a91dfafb440c60
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-08-05 02:46:52 +00:00
Cyan_Hsieh
70b62a2bcd
Add FSTAB_OWNERS and update OWNERS to include Android.bp
...
Flag: EXEMPT only changing OWNERS
Bug: 357036384
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:838218ded4fee43f7982438487a143f95d29c615 )
Merged-In: I55736409ba04b348a75c2934686f9c1328223c1a
Change-Id: I55736409ba04b348a75c2934686f9c1328223c1a
2024-08-02 11:39:01 +00:00
Android Build Coastguard Worker
f56127c4de
Snap for 12164422 from b8dbc2a0df to 24Q4-release
...
Change-Id: Ib0569018386969dbd8d5a273fe65e6ec2e189db2
2024-07-31 23:01:55 +00:00
Treehugger Robot
b8dbc2a0df
Merge "sensors: Support registry dump on DEV device." into main
2024-07-31 03:37:58 +00:00
Android Build Coastguard Worker
a837d59bb9
Snap for 12158986 from e155aa7c04 to 24Q4-release
...
Change-Id: Ia4c59bed91b891b10b1da191eff07741af54ea0c
2024-07-30 23:02:28 +00:00
Rick Chen
35d4b2bf94
sensors: Support registry dump on DEV device.
...
Flag: EXEMPT bugfix
Bug: 356344263
Test: adb bugreport on DS.
Change-Id: Ifccf1ed18e01bd54bfbfd421969361734e631a32
Signed-off-by: Rick Chen <rickctchen@google.com >
2024-07-30 20:08:40 +08:00
YiKai Peng
e155aa7c04
WLC: service: add sepolicy for property vendor.wlcservice.test
...
avc: denied { read } for comm="binder:882_3" name="u:object_r:default_prop:s0" dev="tmpfs" ino=172 scontext=u:r:hal_wlcservice:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
Test: authentication test mode
Bug: 350830879
Flag: EXEMPT bugfix
Change-Id: Ie9f8fc5cce8e62b06931b77aa8cd16a3c9516fb5
Signed-off-by: YiKai Peng <kenpeng@google.com >
2024-07-30 08:53:50 +00:00
Android Build Coastguard Worker
63dc88c8cf
Snap for 12129055 from 2b3c202bd2 to 24Q4-release
...
Change-Id: I8b2bb787b6d6655737430d6cbe569c42d5e24323
2024-07-23 23:02:17 +00:00
Treehugger Robot
2b3c202bd2
Merge "Adjust name of vendor_camera_image_processing_hal_service" into main
2024-07-22 19:24:18 +00:00
Cheng Gu
9d83f45ffb
Adjust name of vendor_camera_image_processing_hal_service
...
Also removes vendor_camera_isp_service from sepolicy.
Bug: 354335791
Test: make
FLAG: EXEMPT bugfix
Change-Id: I1d1d2dd113676d0df5efc55d3a2fa931e3b9d588
2024-07-20 07:48:58 +00:00
Android Build Coastguard Worker
821bc67975
Snap for 12116631 from 826a8afe4c to 24Q4-release
...
Change-Id: Iee62a9b321686c5b56576a9237d7c8d6e11ffca0
2024-07-20 01:02:01 +00:00
Ernie Hsu
826a8afe4c
Merge "mediacodec: fix sepolicy for video playback/recording" into main
2024-07-19 06:47:07 +00:00
Ernie Hsu
cbe40aac4f
Merge "Move mediacodec hal setting to gs-common" into main
2024-07-19 05:13:45 +00:00
Feiyu Chen
aab6967f85
Merge "Allow Tachyon service to binder call a shell program" into main
2024-07-19 04:47:25 +00:00
feiyuchen
5c45a3e263
Allow Tachyon service to binder call a shell program
...
Our Tachyon tests are running as shell program. We need this CL, so we can successfully run the tests without `adb root`.
Bug: 353826183
Test: All tests in `run_tachyon_tests.py` passed after disabling the stress tests (cl/653778337)
Change-Id: I7275029f5a837243c81968d5b53ffc3b00ddf9a5
Flag: EXEMPT bugfix
2024-07-19 04:47:00 +00:00
Ernie Hsu
bbe999c372
mediacodec: fix sepolicy for video playback/recording
...
07-18 08:46:26.420 925 925 I CodecLooper: type=1400 audit(0.0:404): avc: denied { use } for path="/dev/ashmemf7003569-92c8-48c6-bfdb-b7331af5f4e9" dev="tmpfs" ino=1121 scontext=u:r:mediacodec_google:s0 tcontext=u:r:mediaserver:s0 tclass=fd permissive=1
07-18 08:46:26.468 925 925 I HwBinder:925_3: type=1400 audit(0.0:405): avc: denied { use } for path="/dmabuf:system-uncached" dev="dmabuf" ino=734 scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_graphics_allocator_default:s0 tclass=fd permissive=1
07-18 08:46:26.664 925 925 I HwBinder:925_4: type=1400 audit(0.0:406): avc: denied { use } for path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:untrusted_app_27:s0:c83,c256,c512,c768 tclass=fd permissive=1
07-18 08:46:26.668 925 925 I HwBinder:925_5: type=1400 audit(0.0:407): avc: denied { use } for path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:surfaceflinger:s0 tclass=fd permissive=1
07-18 08:46:26.696 925 925 I HwBinder:925_5: type=1400 audit(0.0:408): avc: denied { use } for path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_graphics_composer_default:s0 tclass=fd permissive=1
07-18 08:46:29.392 925 925 I HwBinder:925_6: type=1400 audit(0.0:409): avc: denied { use } for path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_graphics_composer_default:s0 tclass=fd permissive=1
Test: video playback, screen recording
Bug: 353638738
Change-Id: I071268d39cedf10b8f7c0ca0c9cb2bd33a367d09
2024-07-19 03:26:55 +00:00
Android Build Coastguard Worker
340698deeb
Snap for 12110738 from f26bca6ccb to 24Q4-release
...
Change-Id: I267d0b06d61f8a35264a8b33ea4dbda3b8f3a9ae
2024-07-18 23:02:00 +00:00
Hongyang Jiao
f26bca6ccb
Merge "Apply flag RELEASE_PACKAGE_BETTER_BUG" into main
2024-07-18 18:42:44 +00:00
feiyuchen
4a08cc17a9
Add missing SEPolicy for audio HAL to use EdgeTpu lib am: e0ddd9b2fa am: db1943023e
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3180719
Change-Id: I8c05d28aae1053889a4673a4a619c1462d642a16
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-07-18 16:43:38 +00:00
feiyuchen
db1943023e
Add missing SEPolicy for audio HAL to use EdgeTpu lib am: e0ddd9b2fa
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3180719
Change-Id: I2dcc98a6f61057a525b97e03d42af852a45d9a54
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-07-18 16:13:50 +00:00
Ernie Hsu
3b4a36a573
Move mediacodec hal setting to gs-common
...
Flag: EXEMPT refactor
Bug: 353638738
Change-Id: Id17997c75e7dc4f44d7ba8a3a98fa241052cbbff
2024-07-18 09:37:16 +00:00
feiyuchen
e0ddd9b2fa
Add missing SEPolicy for audio HAL to use EdgeTpu lib
...
Copied from ag/27351988
Bug: 352789444
Test: Default presubmit. To be tested on device
Change-Id: I8a124d644906ffc622598ac0bf6079d704197a33
2024-07-18 00:28:25 +00:00
Android Build Coastguard Worker
a5443257db
Snap for 12104175 from 4fa1df0c7c to 24Q4-release
...
Change-Id: I5395d2f059f88855f9a4f148f73b26d4000a7e68
2024-07-17 23:02:00 +00:00
Treehugger Robot
4fa1df0c7c
Merge "[BT] change # of copy file when crash" into main
2024-07-17 04:44:32 +00:00
shihchienc
37cf26dae4
[BT] change # of copy file when crash
...
Bug: 353618079
Test: m
Test: make bt crash and check bugreport
Flag: NONE not related to logic change
Change-Id: I20a7e5b27b64f40ffa7ae3ced38f4044f2bf64b9
2024-07-17 03:23:38 +00:00
Minche Li
c4a241c72c
Merge "Updates TTS voice packs in gs-common 202407" into main
2024-07-17 02:48:30 +00:00
Hongyang Jiao
a0e5b35936
Apply flag RELEASE_PACKAGE_BETTER_BUG
...
Flag: build.RELEASE_PACKAGE_BETTER_BUG
Bug: 353584670
Change-Id: I41b3fe23f68d46d29ef12692d00e1c6c1f7f141f
Test: manual test
2024-07-16 23:10:34 +00:00
Android Build Coastguard Worker
f6dbf8c55f
Snap for 12098010 from 3582506fec to 24Q4-release
...
Change-Id: Ia585ff437af9b9adde70c9b31565ff8e9b645a53
2024-07-16 23:02:35 +00:00
Dinesh Yadav
3582506fec
Allow camera HAL to access tachyon HAL
...
Bug: 352680961
Flag: EXEMPT updates device sepolicy only
Change-Id: I8383887e36340db67c595a12c11c336d3d9bf974
2024-07-16 04:31:02 +00:00
Android Build Coastguard Worker
2184dd7b23
Snap for 12091711 from 1a4e01ef9e to 24Q4-release
...
Change-Id: I98a41c54a2eb5869cfccfcb01ff6944ef798e481
2024-07-15 23:01:59 +00:00
Richard Chang
1a4e01ef9e
sepolicy: allow powerhal to access vendor_mm dir
...
Error log:
auditd : type=1400 audit(0.0:79): avc: denied { search } for comm="NodeLooperThrea" name="vendor_mm" dev="sysfs" ino=56518 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_vendor_mm:s0 tclass=dir permissive=0
Bug: 322916612
Test: check avc logs
Flag: EXEMPT bugfix
Change-Id: I0fa6ba0a11551646d76b65ec764b25cd697d0364
2024-07-15 06:39:22 +00:00
mincheli
3a090c42f9
Updates TTS voice packs in gs-common 202407
...
ag/28084993 update GoogleTTS.
So preloaded TTS voice packs should be also updated.
And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.
Flag: EXEMPT update preloaded files
Bug: 333626474
Test: build passed and manual test
Change-Id: Id942b52b763e519b25af9337b913a4599b249193
2024-07-15 04:00:32 +00:00
Android Build Coastguard Worker
e69717adc0
Snap for 12078078 from c1c7a5ff41 to 24Q4-release
...
Change-Id: I541c7a6d4d277a176b190c59a604434655c13c9c
2024-07-11 23:02:06 +00:00
Steven Tsai
c1c7a5ff41
Merge "Support AR one-shot fuse on the new platform" into main
2024-07-11 04:27:49 +00:00
Android Build Coastguard Worker
09e47ade08
Snap for 12072601 from 6344093af4 to 24Q4-release
...
Change-Id: I6563683a2df0d8d572990f676d57b4aab3e6a611
2024-07-11 01:02:28 +00:00
Baligh Uddin
6344093af4
Merge "Add dist_lyric_apex flag to lyric.mk" into main
2024-07-10 23:06:21 +00:00
Juan Yescas
488cbde222
Merge "Revert "Add a different implementation of insmod.sh"" into main
2024-07-09 23:46:59 +00:00
Juan Yescas
3b484f698e
Revert "Add a different implementation of insmod.sh"
...
This reverts commit 99f848ed48 .
Reason for revert: b/350767144#comment8
Bug: 350767144
Change-Id: I169af080656e8e871e3f6322b123eee8e681d530
2024-07-09 23:46:49 +00:00
Baligh Uddin
941dc90593
Add dist_lyric_apex flag to lyric.mk
...
This flag controls whether Lyric apex can be located in the dist-directory.
Flag: dist_lyric_apex
Change-Id: I7a87b2e0b1c220955aafda28173533bd4f6bcd52
BUG: 352009541
Test: TH
2024-07-09 23:22:59 +00:00
Steven Tsai
c984d655c2
Support AR one-shot fuse on the new platform
...
Bug: 351059371
Flag: EXEMPT bugfix
Change-Id: I14faf995aa259b607300616ba1a1ea6d24a92d2a
Signed-off-by: Steven Tsai <steventsai@google.com >
2024-07-05 15:34:07 +08:00
Android Build Coastguard Worker
ba09b1a269
Merge cherrypicks of ['googleplex-android-review.googlesource.com/28028457'] into 24Q3-release.
...
Change-Id: I72686e6128a2583f0b48a62513770ce34c569b5e
2024-07-04 03:24:48 +00:00
Rios Kao
b5951eaeb0
audio: add vendor serialno prop
...
note:
For some special device usage, the prop
would be used for special setup.
Test: end-to-end validation.
Bug: 349276230
Flag: EXEMPT bugfix
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:875dd78991c468e60a8437c9817dbabe71ef9b5d )
Merged-In: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
Change-Id: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
2024-07-04 03:08:15 +00:00
Android Build Coastguard Worker
d3fba7d53f
Snap for 12048319 from bb0d0ca8ff to 24Q4-release
...
Change-Id: I10d2aa9c1121f78fbf42448b1dd1aed55ae9a174
2024-07-03 23:02:17 +00:00
Super Liu
bb0d0ca8ff
touch: gti support sysfs_wakeup
...
07-03 02:59:22.526 517 517 W binder:517_5: type=1400 audit(0.0:18): avc: denied { read } for name="wakeup36" dev="sysfs" ino=98946 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=dir permissive=0
07-03 02:59:22.531 517 1547 E android.system.suspend-service: Error opening kernel wakelock stats for: wakeup36 (../../devices/virtual/goog_touch_interface/gti.0/wakeup36): Permission denied
Test: TH build pass
Bug: 335839116
Change-Id: I1840dc5433fd2bfd0722852e6b721c20ff14e39b
Signed-off-by: Super Liu <supercjliu@google.com >
2024-07-03 03:02:35 +00:00
David Lin
9e20095889
Merge "audio: add vendor serialno prop" into 24D1-dev am: 07890d909b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/28028457
Change-Id: I45639f601462a9400e9c5245429af434cb3d197c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-07-03 02:32:24 +00:00
David Lin
07890d909b
Merge "audio: add vendor serialno prop" into 24D1-dev
2024-07-03 02:19:47 +00:00
Super Liu
f61d73580b
Merge "Support touch sepolicy for spi20" into main
2024-07-03 01:49:48 +00:00
Android Build Coastguard Worker
fdaef4be49
Snap for 12042346 from 662ff8069f to 24Q4-release
...
Change-Id: Iceb070161425209ea9a0ca92e001c84f8c6c9afe
2024-07-02 23:02:51 +00:00
Super Liu
f897a71294
Support touch sepolicy for spi20
...
avc denied logs:
07-02 13:17:48.412 1 1 I auditd : type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=persist.sys.tap_gesture pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=0'
07-02 13:17:56.204 315 315 I auditd : type=1400 audit(0.0:20): avc: denied { write } for comm="init" name="nvt_heatmap" dev="proc" ino=4026536248 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0
vendor_init change to access sysfs_touch from sysfs:
07-02 13:17:56.680 1 1 I init : Command 'write /sys/devices/virtual/goog_touch_interface/gti.0/vendor_input/nvt_dttw_mode 1' action=vendor.all.modules.ready=1 (/vendor/etc/init/hw/init.rc:127) took 462ms and succeeded
ls -lZ /sys/devices/virtual/goog_touch_interface/gti.0/vendor_input/nvt_dttw_mode
-rw-r--r-- 1 system system u:object_r:sysfs:s0 4096 2024-07-02 13:17 /sys/devices/virtual/goog_touch_interface/gti.0/vendor_input/nvt_dttw_mode
Bug: 335839116
Test: TH pass
Change-Id: If1890defcb9400405071b1c669098d9d62bc56e4
Signed-off-by: Super Liu <supercjliu@google.com >
2024-07-02 14:15:46 +00:00
liangjlee
662ff8069f
Create power folder and align pm_freeze_timeout settings with p22 am: 16b70cbf76
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/28051339
Change-Id: Ieee24d5babc7d61036cf80e6d0d52d92a2156860
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-07-02 09:36:37 +00:00
Treehugger Robot
a20a805fc0
Merge "gps: Add pps_assert sepolicy" into main
2024-07-02 06:51:49 +00:00
Android Build Coastguard Worker
c21a0d5372
Snap for 12037182 from 90ea9b5fca to 24Q4-release
...
Change-Id: I019eddf7c2a31bf69dfc26b92f71288de5297e3c
2024-07-01 23:07:34 +00:00
Tim Lin
90ea9b5fca
Revert^2 "Support AIDL based radio HALs"
...
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Forrest build result in go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
9a26ed1a9b
Change-Id: I13117df3e25c01026c100207cc0d43aac8b82b7a
2024-07-01 08:32:25 +00:00
Pechetty Sravani
9a26ed1a9b
Revert "Support AIDL based radio HALs"
...
Revert submission 27917806-v_hal_migration_phase3
Reason for revert: Droidmonitor created revert due to b/350390759. Will be verifying through ABTD before submission.
Reverted changes: /q/submissionid:27917806-v_hal_migration_phase3
Change-Id: I466c1b61b86cb7a87f5a1a5ffbc0b4a86438beea
2024-07-01 06:11:17 +00:00
Android Build Coastguard Worker
2f7e9feb52
Merge cherrypicks of ['googleplex-android-review.googlesource.com/28051496'] into 24Q3-release.
...
Change-Id: I3d8a93b1df256057a222837d837962ce9a2a1e73
2024-06-28 23:16:25 +00:00
liangjlee
fa0cce475e
Create power folder and align pm_freeze_timeout settings with p22
...
Create a new power folder for adding common settings among projects.
The first usage would be to align pm_freeze_timeout with p22.
Bug: 331612600
Test: cat /sys/power/pm_freeze_timeout and the value is correct.
Flag: EXEMPT (bug 337358613)
Signed-off-by: liangjlee <liangjlee@google.com >
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:21f38c7d0d5496fdf85419f7f37382a510599730 )
Merged-In: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
Change-Id: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
2024-06-28 23:08:06 +00:00
timtmlin
d44c33ec48
Support AIDL based radio HALs
...
Enable AIDL for V requirement
AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change
Change-Id: I9c1e9aecd8a9704fc290bdb3f66dc94d9e2e5073
2024-06-28 12:49:19 +00:00
Android Build Coastguard Worker
68adb28cfb
Snap for 12025384 from 21f38c7d0d to 24Q4-release
...
Change-Id: If2fe899f02923da9af30093690b5211324bd03a3
2024-06-27 23:02:16 +00:00
liangjlee
16b70cbf76
Create power folder and align pm_freeze_timeout settings with p22
...
Create a new power folder for adding common settings among projects.
The first usage would be to align pm_freeze_timeout with p22.
Bug: 331612600
Test: cat /sys/power/pm_freeze_timeout and the value is correct.
Flag: EXEMPT (bug 337358613)
Change-Id: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
Signed-off-by: liangjlee <liangjlee@google.com >
2024-06-27 02:27:20 +00:00
liangjlee
21f38c7d0d
Create power folder and align pm_freeze_timeout settings with p22
...
Create a new power folder for adding common settings among projects.
The first usage would be to align pm_freeze_timeout with p22.
Bug: 331612600
Test: cat /sys/power/pm_freeze_timeout and the value is correct.
Flag: EXEMPT (bug 337358613)
Change-Id: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
Signed-off-by: liangjlee <liangjlee@google.com >
2024-06-27 02:36:28 +08:00
Cheng Chang
c9160b5fc2
gps: Add pps_assert sepolicy
...
avc: denied { read } for name="pps_assert" dev="sysfs" ino=104638 scontext=u:r:gpsd:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Bug: 258364350
Test: Verification at b/258364350.
Test: Function verification at b/258364350.
Test: Compile and verify the configuration is correct.
Change-Id: Id5589a798bc8535d069225778982a8be27898477
2024-06-25 10:12:25 +00:00
Rios Kao
875dd78991
audio: add vendor serialno prop
...
note:
For some special device usage, the prop
would be used for special setup.
Test: end-to-end validation.
Bug: 349276230
Flag: EXEMPT bugfix
Change-Id: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
2024-06-25 09:24:40 +00:00
Android Build Coastguard Worker
9a8464ec90
Snap for 12007880 from 0dd653e624 to 24Q4-release
...
Change-Id: Ia360e5c291a4cabb3ba8b337d01d225e6825741d
2024-06-24 23:02:22 +00:00
Woody Lin
0dd653e624
gs_watchdogd: Use timeout defined by platform
...
Uses timeout value of watchdog device directly, without modifying it
with ioctl. On some platforms, especially these with multiple watchdog
devices, the timeout values can be strictly defined for the watchdogs to
timeout in a certain order. Leaves timeout value as it is and divides
minimal of them by 2 as watchdog kicking period.
Flag: EXEMPT normal/day-to-day bugfix
Bug: 348318712
Change-Id: Icdcce368f1803cd3b38a48f05e2788d881e3ad6f
2024-06-24 11:45:43 +08:00
Android Build Coastguard Worker
a09b0ebd20
Snap for 11996894 from b45af4f2a8 to 24Q4-release
...
Change-Id: I58768703a125d2172cccf2327720647ef85ea288
2024-06-20 23:02:15 +00:00
Xin Li
b45af4f2a8
[automerger skipped] Merge "Merge 24Q3 (ab/11976889) to aosp-main-future" into aosp-main-future am: ff902d4fd9 -s ours
...
am skip reason: Merged-In I188263ee9b186736a48fd3a0cfa83745e2e54108 with SHA-1 e15af041dd is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27908775
Change-Id: I8df31ecdebf037e99707da160528cd43b75fe558
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-20 20:55:48 +00:00
Xin Li
e3eb48f789
[automerger skipped] Merge 24Q3 (ab/11976889) to aosp-main-future am: ba94250476 -s ours
...
am skip reason: Merged-In I188263ee9b186736a48fd3a0cfa83745e2e54108 with SHA-1 e15af041dd is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27908775
Change-Id: Ie7c41132cd8b95aef6d6195bddb3046862f52a5e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-20 20:55:43 +00:00
Xin Li
ff902d4fd9
Merge "Merge 24Q3 (ab/11976889) to aosp-main-future" into aosp-main-future
2024-06-20 20:22:34 +00:00
Android Build Coastguard Worker
87d52bdab4
Snap for 11992154 from bf85fe79bf to 24Q4-release
...
Change-Id: Icc8397acbafe77e35ec251d795ccc529cc932367
2024-06-19 23:02:02 +00:00
Utku Utkan
bf85fe79bf
Merge "Move definition for vendor_camera_lyricconfigprovider_service into product" into main
2024-06-19 02:31:58 +00:00
Utku Utkan
360765f4f3
Merge "Move definition for vendor_camera_cameraidremapper_service into product" into main
2024-06-19 02:26:11 +00:00
Bart Van Assche
1b0ca637f9
Merge "Make foreground and background I/O priority different" into main am: 56b74041e3 am: a24099e61b
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3132360
Change-Id: Id6da9d867acf8fb616f75992757f7bda6083d2d4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-19 00:22:02 +00:00
Bart Van Assche
a24099e61b
Merge "Make foreground and background I/O priority different" into main am: 56b74041e3
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3132360
Change-Id: I0c8494974e93af1f838bb956fcd887699c5d7f1d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-19 00:05:53 +00:00
Bart Van Assche
56b74041e3
Merge "Make foreground and background I/O priority different" into main
2024-06-18 23:46:59 +00:00
Android Build Coastguard Worker
0c33f6790a
Snap for 11987757 from aaabeedefd to 24Q4-release
...
Change-Id: Icffb2fa42de62dcecbc904bea4a8d6b887bd0650
2024-06-18 23:02:16 +00:00
Utku Utkan
1f61691a37
Move definition for vendor_camera_lyricconfigprovider_service into product
...
Following ag/25368073 as reference with the same justification.
Bug: 312091052
Test: atest PersistentBackgroundCameraServicesTests
Flag: EXEMPT SEPolicy refactoring to make CHD happy
Change-Id: Ie33a6550e0df0fd13271a15afd5beaaccae50e45
2024-06-18 22:13:48 +00:00
Utku Utkan
76783cf7e2
Move definition for vendor_camera_cameraidremapper_service into product
...
Following ag/25368073 as reference with the same justification.
Bug: 312091052
Test: atest PersistentBackgroundCameraServicesTests
Flag: EXEMPT SEPolicy refactoring to make CHD happy
Change-Id: If8810323750c2149b4624f8deffee1cd5c1ce36e
2024-06-18 22:12:41 +00:00
Xin Li
ba94250476
Merge 24Q3 (ab/11976889) to aosp-main-future
...
Bug: 347831320
Merged-In: I188263ee9b186736a48fd3a0cfa83745e2e54108
Change-Id: I991fd3f5e3eff2c7c2aa7a0c41c3929755a13244
2024-06-18 14:13:22 -07:00
Xin Li
aaabeedefd
[automerger skipped] Merge Android 14 QPR3 to AOSP main am: 47d1753cf8 -s ours am: f7edd705f9 -s ours
...
am skip reason: Merged-In I92a4a0fcec18e459b899a4da7ed13527197fe64b with SHA-1 8be8b3d6ef is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3131619
Change-Id: I050334784a9ad1206a6c4cd8dc46654eb52d958c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-18 05:55:28 +00:00
Android Build Coastguard Worker
1af38bf066
Snap for 11981331 from e15af041dd to 24Q4-release
...
Change-Id: I8ab4f78f8c7b9efdba134844912c2d13f5c62043
2024-06-17 23:01:51 +00:00
Xin Li
f7edd705f9
[automerger skipped] Merge Android 14 QPR3 to AOSP main am: 47d1753cf8 -s ours
...
am skip reason: Merged-In I92a4a0fcec18e459b899a4da7ed13527197fe64b with SHA-1 8be8b3d6ef is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3131619
Change-Id: I82ee04b923ae1f196d1f943ddd9e947d64bce8fe
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-17 20:41:51 +00:00
Android Build Coastguard Worker
9ae8a06ba6
Snap for 11975806 from e15af041dd to 24Q3-release
...
Change-Id: I2957dfd4555abe9b540b577371a6f671fa95e87a
2024-06-15 21:01:59 +00:00
Bruce Po
e15af041dd
Fix aocx selinux dumpstate permissions
...
After switching aocxd to stable AIDL, we encountered some permissions
issues associated with dumpstate:
dumpstate: type=1400 audit(0.0:548): avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:aocxd:s0 tclass=binder permissive=0
dumpstate: type=1400 audit(0.0:17): avc: denied { use } for path="pipe:[214567]" dev="pipefs" ino=214567 scontext=u:r:aocxd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=0
dumpstate: type=1400 audit(0.0:15): avc: denied { write } for path="pipe:[212933]" dev="pipefs" ino=212933 scontext=u:r:aocxd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=0
TEST:
make selinux_policy -j128
adb push $ANDROID_PRODUCT_OUT/vendor/etc/selinux/* /vendor/etc/selinux
adb reboot
adb root
adb bugreport
BUG: 347156752
Change-Id: I188263ee9b186736a48fd3a0cfa83745e2e54108
2024-06-14 15:36:14 -07:00
Bart Van Assche
fbf228931c
Make foreground and background I/O priority different
...
Assign a higher I/O priority to foreground I/O compared to background
I/O to improve responsiveness of the foreground app.
The command below shows that this CL has the intended effect on a device
with kernel 5.10:
$ adb shell 'cd /dev/blkio && grep -aH . blkio.prio.class background/blkio.prio.class'
blkio.prio.class:none-to-rt
background/blkio.prio.class:restrict-to-be
From a device with an Android 6.1 kernel:
$ grep -aH . blkio.prio.class background/blkio.prio.class'
blkio.prio.class:promote-to-rt
background/blkio.prio.class:restrict-to-be
Bug: 347109476
Change-Id: I6f1ea6a89a8dfaa223e8d2a82917b4de2d7bf1cf
Signed-off-by: Bart Van Assche <bvanassche@google.com >
2024-06-14 14:29:23 -07:00
Android Build Coastguard Worker
de17c6c026
Snap for 11967491 from 094c853eac to 24Q3-release
...
Change-Id: Iad475c7158d0b6ce47cd23ffd4a87021558a69ee
2024-06-13 23:02:07 +00:00
Xin Li
47d1753cf8
Merge Android 14 QPR3 to AOSP main
...
Bug: 346855327
Merged-In: I92a4a0fcec18e459b899a4da7ed13527197fe64b
Change-Id: Ia64bffd511e67c12349ed2890cba4cac392ebf01
2024-06-13 10:48:23 -07:00
Treehugger Robot
094c853eac
Merge "Revert^2 "Add one variable to decide if need TTS voice packs"" into main
2024-06-13 11:17:20 +00:00
Joey Poomarin Phloyphisut
aed49988c4
Merge "sepolicy: add permission for Speaker Version of pixelstats-vend." into main
2024-06-13 05:53:30 +00:00
Krzysztof Kosiński
ac7885c734
Merge "Remove pdk_build Soong variable." into main
2024-06-13 04:04:29 +00:00
Ray Hsu
3e8f843ae7
Revert^2 "Add one variable to decide if need TTS voice packs"
...
This reverts commit b4a21a0e14 .
Reason for revert: <TalkBack issue cause by this patch. We always include the voice_packs.mk for non factory target >
Bug: 140145973
Change-Id: I865ff7b4d2d25d0135d5df742c201fcc00b0525e
2024-06-13 01:37:43 +00:00
David Lin
603e40aa2c
Merge "Updates TTS voice packs in gs-common" into 24D1-dev am: 337425f820
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27787080
Change-Id: I382fb9bfb2925019f400ca7f86eb882a98e1e203
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-13 01:06:38 +00:00
David Lin
337425f820
Merge "Updates TTS voice packs in gs-common" into 24D1-dev
2024-06-13 00:47:20 +00:00
Krzysztof Kosiński
35a4e69e89
Remove pdk_build Soong variable.
...
The hybrid PDK build was replaced with the prebuilt APEX.
Bug: 321848659
Test: presubmit
Flag: EXEMPT build file cleanup
Change-Id: Id4c9275b5777605157a5448896b4b54af29f9383
2024-06-13 00:45:23 +00:00
Android Build Coastguard Worker
f854b31ee5
Snap for 11959661 from 89df9a4c83 to 24Q3-release
...
Change-Id: Ifbaa30eeedba21c7f6951b39b4e766c2673ff189
2024-06-12 23:02:28 +00:00
Cheng Chang
89df9a4c83
gps: Move type declaration to device folder am: 023d43829a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27576198
Change-Id: Ia516b83db9ed0c3bf2f2ad2abe40925e6ee5ebd9
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-12 07:27:17 +00:00
Minche Li
9e5462b025
Updates TTS voice packs in gs-common
...
TTS voice packs are better to be common for all devices
So the other device configs can have the common TTS voice packs
for the device build by "gs-common/device.mk"
And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.
Bug: 333626474
Bug: 140145973
Test: build passed and manual test
Change-Id: Idebba7ef2e69d0e9d2f30a94cbbcf70d2e3568d5
(cherry picked from commit 68ef072a54 )
2024-06-12 06:09:47 +00:00
KRIS CHEN
c66358781a
Merge "gs-common: add fingerprint dump" into main
2024-06-12 04:39:32 +00:00
Android Build Coastguard Worker
9fe30517f2
Snap for 11954976 from d952540c1c to 24Q3-release
...
Change-Id: Ic02031bd39c2d696130863ebfeb3e694741f9f34
2024-06-11 23:02:40 +00:00
chenkris
fe8968a08a
gs-common: add fingerprint dump
...
Bug: 346450599
Test: adb bugreport
Change-Id: I224171a532bba537c11e53cf46be0042038b7732
2024-06-11 13:35:04 +00:00
Cheng Chang
023d43829a
gps: Move type declaration to device folder
...
Bug: 343280252
Test: b/343280252 compile and abtd test
Change-Id: I1cbcce4452b149764876643722a0b37a18dc1b46
2024-06-11 07:50:47 +00:00
Poomarin Phloyphisut
fdd036bfa3
sepolicy: add permission for Speaker Version of pixelstats-vend.
...
Bug: 326342880
Test: Manually test passed
Change-Id: I8732e60ef57a2e9d92c53b901fb1695d10131695
2024-06-11 05:53:07 +00:00
Treehugger Robot
d952540c1c
Merge "Revert "Add one variable to decide if need TTS voice packs"" into main
2024-06-11 05:17:43 +00:00
Ray Hsu
b4a21a0e14
Revert "Add one variable to decide if need TTS voice packs"
...
This reverts commit b52878371b .
Reason for revert: <Need preload TTS voice packs. If we need this patch, please just phase in the factory branch>
Bug: 140145973
Change-Id: Iacbe0cac6f7d68eac8b2155795e918edd1e73e25
2024-06-11 04:36:59 +00:00
Wayne Lin
d3819ee3be
[automerger skipped] gps: maintain one solution am: ba840e7417 -s ours
...
am skip reason: Merged-In I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18 with SHA-1 2ced5f6958 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27080977
Change-Id: I1c3c1db87e1057a271780f289036c32e1cd7b522
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-11 02:49:50 +00:00
Android Build Coastguard Worker
fd72aea8ea
Snap for 11944020 from 5f01cd2856 to 24Q3-release
...
Change-Id: I9f97bbea31c2beee9aa3149defd3333ba022a474
2024-06-08 01:02:31 +00:00
Klines Jiang
5f01cd2856
[dump_gyotaku] Add collect odpm logs for dump_gyotaku.
...
Bug: 328551786
Test: Local build and odpm logs collected test passed.
Change-Id: Ic0071e8ee2262c3fa439444a6b90f092749afe43
2024-06-07 03:33:43 +00:00
Xin Li
6fe4471f0b
[automerger skipped] Merge 2024-06 Release (ab/AP2A.240605.024) to aosp-main-future am: 8be8b3d6ef -s ours
...
am skip reason: Merged-In I2c1785105bab74a483bc68893d96a8a88eabfd90 with SHA-1 3133d362a4 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27555143
Change-Id: I06ccf9eaf23d8b0820a67ea18968371ba8fff128
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-06-06 21:36:08 +00:00
Android Build Coastguard Worker
a0cc76f28a
Snap for 11931036 from 1fc96a57bb to 24Q3-release
...
Change-Id: If10bdebd7bd5df2096493c18be28d458d2911d3d
2024-06-05 23:07:01 +00:00
Treehugger Robot
1fc96a57bb
Merge changes from topic "customgnss" into main
...
* changes:
sepolicy: Allow hal_gnss_pixel access sscoredump file
sepolicy: Allow gnssd access modem_state
2024-06-05 09:05:59 +00:00
Treehugger Robot
406279f274
Merge "Remove obsolete relfector HAL policy." into main
2024-06-05 07:36:52 +00:00
Treehugger Robot
1cae148226
Merge "touch: Add the capability to simulate HW failure" into main
2024-06-05 02:50:17 +00:00
Android Build Coastguard Worker
1bfd54171a
Snap for 11926388 from 8b602f29a6 to 24Q3-release
...
Change-Id: Ic0851e23ae2eae3730dd158e428cbd3bfdfc8675
2024-06-04 23:57:09 +00:00
Bruce Po
8b5c7dbb93
Merge "selinux move aocx from vndservice to service" into main
2024-06-04 23:30:43 +00:00
Richard Chou
8b602f29a6
Merge "Recorder: add sepolicy for Google Recorder app" into main
2024-06-04 07:55:02 +00:00
Richard Chou
7d60dc41df
Recorder: add sepolicy for Google Recorder app
...
List of avc-denies:
http://b/338879856#comment3
Test: build pass
Bug: 338879856
Change-Id: I40884f0308f8a77b237c6b588db861b63950a8d8
2024-06-04 14:57:11 +08:00
Super Liu
70f4b0431e
touch: Add the capability to simulate HW failure
...
Usage:
$> setprop vendor.touch.gti0.ical.override.result RESULT
The designate RESULT to be used for the designate CMD.
If no RESULT assign, the default value will be "0 - -2147483648".
$> setprop vendor.touch.gti0.ical.override.cmd CMD
The result of designate CMD(e.g. 202 or 301) to be overrode by the
designate RESULT. If the CMD is "xxx", the result of any CMD will
be overode with the designate RESULT.
Bug: 341021854
Test: manual test
Change-Id: I3d24618e240b4a966b5a76a33ed9ab96503a3257
Signed-off-by: Super Liu <supercjliu@google.com >
2024-06-04 00:46:26 +00:00
Wayne Lin
ba840e7417
gps: maintain one solution
...
Move the rules from ag/27080484
Bug: 315915958
Test: build pass and GPS function works
Change-Id: I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18
Merged-In: I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18
2024-06-03 09:14:12 +00:00
Wayne Lin
2ced5f6958
gps: maintain one solution
...
Move the rules from ag/26254728
Bug: 315915958
Test: build pass and GPS function works
Change-Id: I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18
2024-06-03 08:35:41 +00:00
Cheng Chang
bb3522634e
sepolicy: Allow hal_gnss_pixel access sscoredump file
...
avc: denied { read } for name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=0
avc: denied { search } for name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=0
avc: denied { read } for name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
avc: denied { open } for path="/data/vendor/ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
avc: denied { search } for name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
avc: denied { getattr } for path="/data/vendor/ssrdump/crashinfo_gnss_2024-05-22_16-00-45.txt" dev="dm-48" ino=19897 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
avc: denied { read } for name="crashinfo_modem_2024-05-22_16-34-51.txt" dev="dm-48" ino=20760 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
Bug: 341224300
Test: b/341224300#comment13 abtd boot health check.
Test: b/341224300 SST test verification.
Change-Id: Ie2b55cb487e7e801a0199b1e9dd9ad16f1e3d682
2024-06-03 03:10:11 +00:00
Android Build Coastguard Worker
5547afa24d
Snap for 11916113 from 85ff832530 to 24Q4-release
...
Change-Id: Iba95a0e7ec3a2708812ec7e697fc60fcc9e1fbb4
2024-06-01 21:02:11 +00:00
Android Build Coastguard Worker
dc62ef14d1
Snap for 11916023 from 85ff832530 to 24Q3-release
...
Change-Id: I426e0ef510d5186d26c078454aa6dfdf96b43800
2024-06-01 21:02:02 +00:00
Jaegeuk Kim
85ff832530
Merge "Change rq_affinity of the zoned storage logical unit from one into two" into main
2024-06-01 02:22:49 +00:00
Android Build Coastguard Worker
02caad9192
Snap for 11914274 from 65a5fe99c1 to 24Q3-release
...
Change-Id: I1cf2cee09c27c77f52b5fe951f677cee7a9337d8
2024-06-01 01:02:15 +00:00
Android Build Coastguard Worker
47335ec131
Snap for 11915075 from 65a5fe99c1 to 24Q4-release
...
Change-Id: I6ce6d602f141226b3329bcb2f25d6ce7d80f474b
2024-06-01 01:02:10 +00:00
Bruce Po
1f7c89e359
selinux move aocx from vndservice to service
...
When updating aocx service to use binder ndk backend, we get this
selinux violation:
SELinux : avc: denied { add } for pid=2772 uid=0 name=aocx.IAocx scontext=u:r:aocxd:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0
TEST:
adb push out/target/product/tangorpro/vendor/etc/selinux/* /vendor/etc/selinux
adb reboot
adb shell aocx_tool list
BUG: 343998265
Change-Id: I1e4f554abfe02f33328c851f7da64c671d8f4cb7
2024-05-31 12:42:10 -07:00
Klines Jiang
65a5fe99c1
[SELinux] Initial access fingerprint sepolicy for gyotaku_app
...
Initial a specific build folder for fingerprint, we need to include the mk file on specific build.
Bug: 342335081
Test: Local build and sepolicy tests passed.
Change-Id: I8b8522ed949abc586ebab2efe4061f5e4b6cdde0
2024-05-31 10:03:46 +00:00
Treehugger Robot
e92cc2f8b1
Merge "Add the new IPC and ring buffer files." into main
2024-05-31 08:45:20 +00:00
Cheng Chang
ec3a553080
sepolicy: Allow gnssd access modem_state
...
avc: denied { read } for name="modem_state" dev="sysfs" ino=77641 scontext=u:r:gnssd:s0 tcontext=u:object_r:sysfs_modem_state:s0 tclass=file
avc: denied { open } for path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=77641 scontext=u:r:gnssd:s0 tcontext=u:object_r:sysfs_modem_state:s0 tclass=file
avc: denied { getattr } for path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=77641 scontext=u:r:gnssd:s0 tcontext=u:object_r:sysfs_modem_state:s0 tclass=file
Bug: 342284863
Test: b/342284863 for boot-health check.
Test: b/342284863 for function verification.
Change-Id: I1accfe367915737c14ee79dce71fe04cdcdbb727
2024-05-31 02:10:15 +00:00
Madhav Iyengar
ea854a89c4
Add the new IPC and ring buffer files.
...
Adds file_contexts entries for the files representing new AOC services
used by a new transport between CHRE on AOC and the bthal.
NOTE: The use-case for these files is the same as the
/dev/acd-com.google.bt* files (lines 23-24). Those files will eventually
be removed when we migrate from the old USF-based transport to the one
under development.
Bug: 342415506
Test: Works with other CLs in topic to support BT offload over the new
transport (with a local change to hook the new transport in).
Change-Id: I81246a25af020ab14da3d4ae7675f2a0f00f97be
2024-05-31 02:04:54 +00:00
Android Build Coastguard Worker
f0d76fc142
Snap for 11908474 from 8e0546449d to 24Q3-release
...
Change-Id: Iccf4daa51f498c6e52eb3d217fb40829e42df992
2024-05-30 23:02:20 +00:00
Bart Van Assche
41836d64ce
Change rq_affinity of the zoned storage logical unit from one into two
...
Bug: 335708738
Flag: EXEMPT This change only affects ZUFS devices
Change-Id: I3bb655856f0c27a42f26c6dd1a8fc53e7f6e1a00
Signed-off-by: Bart Van Assche <bvanassche@google.com >
2024-05-30 12:59:57 -07:00
Rios Kao
8e0546449d
Merge "audio: add a restricted property for audio app." into main
2024-05-30 03:38:36 +00:00
Randall Huang
1a4ff9675f
Merge "Allow userdata_exp partitions" into main
2024-05-30 02:45:44 +00:00
Philip Quinn
256d37b5d7
Remove obsolete relfector HAL policy.
...
Bug: 343566773
Test: presubmit
Change-Id: Ie779a71dfdc9d198643f5eb95396085ea842b7a5
2024-05-30 01:59:29 +00:00
Android Build Coastguard Worker
f013f826cd
Snap for 11902131 from 65df448851 to 24Q3-release
...
Change-Id: I45cf813d3dab6e92980f4f9d3de1ac8b48ffc888
2024-05-29 23:02:23 +00:00
Xin Li
1b583f2977
Merge "[automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: ef6bdc1f33 -s ours" into main
2024-05-29 21:39:03 +00:00
Xin Li
2ff078405b
[automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: ef6bdc1f33 -s ours
...
am skip reason: Merged-In I4ac1ecf51da01c24d4e2f0f7e52df1d2cb92e275 with SHA-1 1c9e011597 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27272614
Change-Id: I1579bc2c16412fe5a1c24f5b7f7f59992df9f33e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-29 20:48:58 +00:00
Xin Li
2ef9a3bb11
[automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: ef6bdc1f33 -s ours
...
am skip reason: Merged-In I4ac1ecf51da01c24d4e2f0f7e52df1d2cb92e275 with SHA-1 1c9e011597 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27272614
Change-Id: I7538e4b3033f31f59467d2c6a795c93b0d722542
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-29 19:44:39 +00:00
Michelle Ho
65df448851
[automerger skipped] Foldable concurrent selfie prebuilt flag am: 3297aee549 -s ours
...
am skip reason: Merged-In Idbacff0d8f97ad0047b334d5563c7e4d5d734182 with SHA-1 fd7d393907 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27394639
Change-Id: I6cb3b05560601c39ca3d2bd90fd56da0ea0f9c61
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-29 04:13:48 +00:00
Rios Kao
92a659256f
audio: add a restricted property for audio app.
...
note: For app layer to access specific property,
define persist.vendor.app.audio. and
set it as restricted.
Test: build pass
Bug: 333497194
Change-Id: I397a1bcb9bd16c7fa236049eead30b6e17a996b5
2024-05-29 02:48:30 +00:00
Treehugger Robot
dd9070f67f
Merge "Foldable concurrent selfie prebuilt flag" into main
2024-05-29 00:30:48 +00:00
Xin Li
8be8b3d6ef
Merge 2024-06 Release (ab/AP2A.240605.024) to aosp-main-future
...
Bug: 343100748
Merged-In: I2c1785105bab74a483bc68893d96a8a88eabfd90
Change-Id: I92a4a0fcec18e459b899a4da7ed13527197fe64b
2024-05-27 22:58:50 -07:00
Michelle Ho
fd7d393907
Foldable concurrent selfie prebuilt flag
...
Add a foldable concurrent selfie prebuilt
XML as the feature flag config file
Flag: com.google.pixel.camera.concurrent_foldable_dual_front
Bug: 333986739
Test: build pass
Change-Id: Idbacff0d8f97ad0047b334d5563c7e4d5d734182
2024-05-28 03:29:46 +00:00
Android Build Coastguard Worker
e3b025e4c1
Snap for 11892734 from d94cfccb71 to 24Q3-release
...
Change-Id: I6c3eb5ce7103d20bafa79a5428514e872a6d0a49
2024-05-27 23:02:11 +00:00
Michelle Ho
3297aee549
Foldable concurrent selfie prebuilt flag
...
Add a foldable concurrent selfie prebuilt
XML as the feature flag config file
Bug: 333986739
Test: build pass
Change-Id: Idbacff0d8f97ad0047b334d5563c7e4d5d734182
Merged-In: Idbacff0d8f97ad0047b334d5563c7e4d5d734182
2024-05-27 16:15:38 +00:00
Vic Huang
d94cfccb71
[BT] Add sepolicy of power stats
...
Bug: 341652267
Test: Local build and test pass
Change-Id: Ie3acff612c1f46e403d9b5b8047b6b2666fb1bde
2024-05-27 09:14:28 +00:00
Treehugger Robot
fe5a740e69
Merge "Create an isolated copy of vendor dumpstate from all devices" into main
2024-05-27 04:35:50 +00:00
Android Build Coastguard Worker
e684862fb1
Snap for 11889377 from 4434df4420 to 24Q3-release
...
Change-Id: I9d916c03a13d4e347a387f6ccf6a499a81ce619b
2024-05-25 03:01:58 +00:00
Xin Li
ef6bdc1f33
Merge Android 24Q2 Release (ab/11526283) to aosp-main-future
...
Bug: 337098550
Merged-In: I4ac1ecf51da01c24d4e2f0f7e52df1d2cb92e275
Change-Id: I436cedecd5c6eb58f03fc239c520070163d49b8f
2024-05-24 08:25:22 -07:00
Cyan_Hsieh
4434df4420
Add MK_OWNERS as owners file for makefile am: 82a8451d2a am: 127be6aaff
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3102997
Change-Id: I61f3ea0556475b30f148eca5a867f66ca7b6520c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-24 09:10:36 +00:00
Cyan_Hsieh
127be6aaff
Add MK_OWNERS as owners file for makefile am: 82a8451d2a
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3102997
Change-Id: I8afc931b8b3639a47b912020f214c6e15ea14e54
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-24 08:46:18 +00:00
Cyan_Hsieh
82a8451d2a
Add MK_OWNERS as owners file for makefile
...
Bug: 278167548
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:719071202775f584b02c313172b15496045009d8 )
Merged-In: I9c1ac31c640c9f74434b993c9cc24332d6820cd0
Change-Id: I9c1ac31c640c9f74434b993c9cc24332d6820cd0
2024-05-24 08:01:37 +00:00
Jaegeuk Kim
24ee023597
Allow userdata_exp partitions
...
Bug: 336319772
Change-Id: I7f878f29d356df3992fb49b9df8f8a900a6f12b8
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com >
2024-05-22 13:31:39 -07:00
Android Build Coastguard Worker
b16fcf188c
Snap for 11865526 from 2b710d7dbb to 24Q3-release
...
Change-Id: I6aa584bfeb20695286d021077963534fb69e2a2c
2024-05-21 01:02:16 +00:00
Adam Shih
3cd2c9ae0d
Create an isolated copy of vendor dumpstate from all devices
...
Bug: 326153087
Test: make android.hardware.dumpstate-service on husky and cheetah
target without breaking
Change-Id: I9053d813e4be75ac279beeec77fdcefed08396f9
2024-05-20 01:59:27 +00:00
YiKai Peng
2b710d7dbb
sepolicy: allow hal_wlcservice call
...
Bug: 341014314
Bug: 341220409
Test: SELinuxUncheckedDenialBootTest
Change-Id: I843c3be8c13d183174e87222b0f067bf98aad57d
Signed-off-by: YiKai Peng <kenpeng@google.com >
2024-05-19 13:34:15 +00:00
Android Build Coastguard Worker
05a246bf76
Snap for 11860797 from 5926313576 to 24Q3-release
...
Change-Id: Ifd0fd23bc699fa42fd98b1dff8b01578bef343d5
2024-05-18 23:02:08 +00:00
YiKai Peng
24af2c95b1
Reapply "WLC: service: add configuration and contexts for sepolicy"
...
This reverts commit 7d99cb87ea .
Bug: 311315038
Test: authentication
Change-Id: Iaf8d4043794f895ce9ce1ab9b295de072de16e50
2024-05-18 15:11:40 +00:00
Android Build Coastguard Worker
a7991e2587
Snap for 11859356 from aebd22a825 to 24Q3-release
...
Change-Id: I8c8c6be8b52a52664cdfda686e9c343181ef89d0
2024-05-18 03:02:09 +00:00
Priyanka Advani
5926313576
Merge "Revert "WLC: service: add configuration and contexts for sepolicy"" into main
2024-05-17 23:57:30 +00:00
Priyanka Advani
7d99cb87ea
Revert "WLC: service: add configuration and contexts for sepolicy"
...
Revert submission 27233359-wlcservice-main
Reason for revert: Droidmonitor triggered revert due to b/341014314. Test is still flaky on all devices except akita. Will be verifying through ABTD before submission.
Reverted changes: /q/submissionid:27233359-wlcservice-main
Change-Id: Idf2749208a361c14ebac92ad221cc2599fc8135e
2024-05-17 20:35:55 +00:00
Hongyang Jiao
aebd22a825
Remove BetterBug (and BetterBugStub) from aosp & factory build targets. am: db7b681039
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27350056
Change-Id: I9654dffa12d9e1c23f8f523a6753b8d48a9cd3b0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-17 04:11:46 +00:00
Android Build Coastguard Worker
34a0008fc4
Snap for 11853201 from d1a07d0197 to 24Q3-release
...
Change-Id: Idf399f606d440c1b306db6f79cfe5af1c9aea1bd
2024-05-17 01:02:02 +00:00
YiKai Peng
d1a07d0197
Merge "WLC: service: add configuration and contexts for sepolicy" into main
2024-05-16 06:41:52 +00:00
Android Build Coastguard Worker
b5e0efd733
Snap for 11847214 from ff3b853a7e to 24Q3-release
...
Change-Id: Icb4ded5a6a61c716be22d9eb2c1b1b56dbf1b63d
2024-05-16 01:02:40 +00:00
Feiyu Chen
ff3b853a7e
Merge "Add missing SEPolicy for audio HAL to use EdgeTpu lib" into main
2024-05-15 21:32:54 +00:00
feiyuchen
93c25dcb0d
Add missing SEPolicy for audio HAL to use EdgeTpu lib
...
Some policies were missing. This CL adds them.
Bug: 340369535
Test: Default presubmit. To be tested on device
Change-Id: I8a124d644906ffc622598ac0bf6079d704197a33
2024-05-15 18:08:31 +00:00
Hongyang Jiao
db7b681039
Remove BetterBug (and BetterBugStub) from aosp & factory build targets.
...
Bug:340172938
Change-Id: I82fc888497b23b9537f06f1727511608cb1e8ec8
Test: Manual
2024-05-15 06:50:55 +00:00
Midas Chien
cd14b2ad4d
Dump bts information am: 15538c9845
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27232582
Change-Id: I07bcaf815b664ab36a17eb19bd5c1ae6238685e2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-15 02:16:45 +00:00
Midas Chien
15538c9845
Dump bts information
...
Get BTS information when capturing bugreport.
Bug: 335422086
Test: capture bugreport
Change-Id: I5ae9be35a3fc3c975ccc843e9daee6d4e0ac130a
2024-05-14 07:40:58 +00:00
Android Build Coastguard Worker
e9c2ec792c
Snap for 11834877 from 12d68d3ff0 to 24Q3-release
...
Change-Id: I63a28159716141caa9535bccd8bd2c10c1920b49
2024-05-13 23:02:27 +00:00
Treehugger Robot
12d68d3ff0
Merge "sepolicy: allow hal_gnss_pixel create fifo node" into main
2024-05-13 08:09:14 +00:00
Android Build Coastguard Worker
870611c992
Snap for 11828632 from 6c1885ee19 to 24Q3-release
...
Change-Id: I30e861681f8f821051302ae02f80274bdf455048
2024-05-11 01:02:28 +00:00
Dinesh Yadav
6c1885ee19
Merge "Limit maxGxpDebugDumps to 4" into main
2024-05-10 13:43:19 +00:00
Cheng Chang
84fdceb8b4
sepolicy: allow hal_gnss_pixel create fifo node
...
avc: denied { read } for name="u:object_r:vendor_chre_hal_prop:s0" dev="tmpfs" ino=401 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_chre_hal_prop:s0 tclass=file
avc: denied { find } for pid=900 uid=1021 name=android.hardware.contexthub.IContextHub/default scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:hal_contexthub_service:s0 tclass=service_manager
avc: denied { call } for scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_contexthub_default:s0 tclass=binder
avc: denied { call } for scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder
avc: denied { search } for name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { write } for name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { add_name } for name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { create } for name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { read } for name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { open } for path="/data/vendor/gps/.pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file permissive=1
avc: denied { write } for name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { search } for name="gps" dev="dm-49" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { write } for name=".ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { write } for name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { open } for path="/data/vendor/gps/.ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { remove_name } for name=".pps_pipe" dev="dm-54" ino=11712 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { unlink } for name=".pps_pipe" dev="dm-59" ino=6600 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
Bug: 339391267
Test: Verified the boot health at b/339391267#comment21.
Test: Verified the boot health at b/339391267#comment22.
Change-Id: I9f0b0939aa2bc3af0049067edaa17bc507be9fe7
2024-05-10 09:42:14 +00:00
Treehugger Robot
62056d470e
Merge "Add a different implementation of insmod.sh" into main
2024-05-10 02:41:11 +00:00
Martin Liu
d400630a10
allow powerhal to access PA_KILL knobs am: 2522590c40
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27256041
Change-Id: I1e2ae9ee0b8e1744d3be313645c496947b76e7a1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-10 02:00:29 +00:00
Android Build Coastguard Worker
9dc2d05dc4
Snap for 11822896 from 5ca6b7496d to 24Q3-release
...
Change-Id: I87cf77594c3ef7d4e0ae1dfefb02dc23d6bcba5d
2024-05-09 23:07:01 +00:00
Kelvin Zhang
99f848ed48
Add a different implementation of insmod.sh
...
Use soong namespace to branch a implementation of insmod.sh .
The newly added implementation is only added to PRODUCT_PACKAGE
for dev option enabled devices. The only change to the script is
skip loading kernel modules from vendor|system_dlkm when under 16K
mode.
Test: Dev option works
Bug: 319335586
This reverts commit 11eb02562d .
Change-Id: I5f5d4ee79be7f872ec321e93f58f6516974d0cad
2024-05-09 09:46:55 -07:00
Feiyu Chen
5ca6b7496d
Merge "Add SELinux policy for apps to use Tachyon lib" into main
2024-05-09 16:19:57 +00:00
Achigo Liu
ea3763c1c4
Merge "Revert "Add a different implementation of insmod.sh"" into main
2024-05-09 15:58:31 +00:00
Juan Yescas
11eb02562d
Revert "Add a different implementation of insmod.sh"
...
This reverts commit 60cc378f18 .
Reason for revert: thermal-service.pixel native crash many times
Bug: 339337171
Change-Id: Ibd228ea6a0950c2ff8449f7fd55a405fe9a0a99f
2024-05-09 13:24:05 +00:00
nischaljain
2dbfad9f6f
Limit maxGxpDebugDumps to 4
...
DSP multicore workload can run atmost on 4 cores(in case of
amalthea) thus in case of crash we will need atmost 4 core
dumps. Thus limiting maxGxpDebugDumps to 4 to make sure that
we will be capturing all the required core dumps for the
recent crash and at the same time not inflating the bugreport
size.
Bug: 338583087
Change-Id: I76c5b1199c0d89f2bd9a2720dc24a7c86d057b4c
2024-05-09 12:33:01 +00:00
Android Build Coastguard Worker
bd241e1bb4
Snap for 11816316 from 2c4594cc71 to 24Q3-release
...
Change-Id: Ibaf82e764c6136c38bbdca0a5ba47df8ad9369c8
2024-05-08 23:02:21 +00:00
feiyuchen
12b799b125
Add SELinux policy for apps to use Tachyon lib
...
Bug: 339133130
Test: Verified apps can now open Tachyon client lib
Change-Id: I8ca9f08517ae8fc1deb5f97ce2823cd5eb5fafb6
2024-05-08 18:48:03 +00:00
Martin Liu
2522590c40
allow powerhal to access PA_KILL knobs
...
Bug: 322916612
Test: check avc logs
Change-Id: I637c6ad454b668f807b8d0eb4f66a83ca26dfa18
Signed-off-by: Martin Liu <liumartin@google.com >
2024-05-08 08:37:21 +00:00
Treehugger Robot
2c4594cc71
Merge "Add a different implementation of insmod.sh" into main
2024-05-08 04:21:52 +00:00
Kelvin Zhang
60cc378f18
Add a different implementation of insmod.sh
...
Use soong namespace to branch a implementation of insmod.sh .
The newly added implementation is only added to PRODUCT_PACKAGE
for dev option enabled devices. The only change to the script is
skip loading kernel modules from vendor|system_dlkm when under 16K
mode.
Test: Dev option works
Bug: 319335586
Change-Id: Ice77c19cad47f299db113f11878182f37e0b6f91
2024-05-07 20:04:33 -07:00
Android Build Coastguard Worker
ef0149eb28
Snap for 11811809 from 7b342c14ea to 24Q3-release
...
Change-Id: I57d7d19b40e9a5fa2505d38cddaa31eea9378da5
2024-05-07 23:02:41 +00:00
Enzo Liao
7b342c14ea
Merge "Remove unused apps (RamdumpService and SSRestartDetector) from factory build targets." into 24D1-dev am: 480bc0ce65
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27232581
Change-Id: I6b9452a8c1195b4e71cea19b661cd44f41cd8568
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-07 08:14:07 +00:00
Enzo Liao
480bc0ce65
Merge "Remove unused apps (RamdumpService and SSRestartDetector) from factory build targets." into 24D1-dev
2024-05-07 07:57:09 +00:00
Feiyu Chen
a8d31d2a27
Merge "Allow edgetpu_tachyon_service to call mlock()" into main
2024-05-07 06:22:48 +00:00
feiyuchen
0ea3b6ccd1
Allow edgetpu_tachyon_service to call mlock()
...
Tachyon AIDL service is the new Darwinn runtime v3. It needs mlock capability to support the GenAI effort, allowing file backed large models to be mlocked, satisfying the memory accounting on Android, similar to what we just did for edgetpu_app_service ag/26481028
Bug: 337949682
Test: On-device tested that tachyon service can now lock large memories.
Change-Id: I02e4d87adf8a459e88e35f7b965d65b2840adce5
2024-05-07 03:50:02 +00:00
Android Build Coastguard Worker
88efd422f2
Snap for 11806096 from bb873aca3c to 24Q3-release
...
Change-Id: I78d9104d9583761f446e3a2651da017f8f776788
2024-05-06 23:02:24 +00:00
Wei Wang
bb873aca3c
Merge "thermal: allow thermal_hal to read sysfs_gpu" into 24D1-dev am: 861035a42b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27091579
Change-Id: Ic33fe3e6a4bbbbb8a20a9d4de5a8273b5e1a297d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-06 16:41:34 +00:00
Wei Wang
861035a42b
Merge "thermal: allow thermal_hal to read sysfs_gpu" into 24D1-dev
2024-05-06 16:24:33 +00:00
Enzo Liao
882ef5add8
Remove unused apps (RamdumpService and SSRestartDetector) from factory build targets.
...
After ag/26620507, the two apps are built in factory build targets.
They don't need them so we should not build them.
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: Ie442c7a95e7fe764749031281e7740c3a4b5a768
2024-05-06 19:58:06 +08:00
YiKai Peng
3eb5f527cf
WLC: service: add configuration and contexts for sepolicy
...
binder setting is for callback by and access to hal_wireless_charger
Bug: 311315038
Test: authentication
Change-Id: Ieaf93c4736b7381be35bfcf12e83977762a3de5d
Signed-off-by: YiKai Peng <kenpeng@google.com >
2024-05-06 10:11:44 +00:00
Android Build Coastguard Worker
c3bc0936b4
Snap for 11803239 from d9a247ac35 to 24Q3-release
...
Change-Id: I69775205af27651cb2dcaab40b32837533a4a8f4
2024-05-05 21:07:04 +00:00
Kyle Zhang
d9a247ac35
Merge "Respect RELEASE_PACKAGE_WIDEVINE back in device.mk" into main
2024-05-04 21:26:33 +00:00
Android Build Coastguard Worker
390075f152
Snap for 11800966 from cf6bac7558 to 24Q3-release
...
Change-Id: Id3279ae02c4f1b2bcc4988edeb33b2e826b54ff1
2024-05-04 01:02:31 +00:00
Treehugger Robot
cf6bac7558
Merge "audio: pack AIDL haptic gen effect into the image" into 24D1-dev am: 51ca75b081
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27074035
Change-Id: I40f840d9674c6e080fb493f05126ab264564e5df
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-03 04:16:34 +00:00
Treehugger Robot
51ca75b081
Merge "audio: pack AIDL haptic gen effect into the image" into 24D1-dev
2024-05-03 03:54:45 +00:00
Android Build Coastguard Worker
1161ba4d6b
Snap for 11794304 from a7d1cea1ef to 24Q3-release
...
Change-Id: Ia3d5dadbc876654dcccd905660681009454fb5ef
2024-05-02 23:02:21 +00:00
Priyanka Advani
98550c6193
Revert "sepolicy: Allow PixelGnss implement PPS function" am: feb41bd23d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27192521
Change-Id: If61b9a17adeacf89cea31e2a6febfc9e5be44b15
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-02 19:54:21 +00:00
Philip Quinn
a7d1cea1ef
Merge "Include vendor/google/interfaces as a transitive dependency of twoshay." into main
2024-05-02 18:12:14 +00:00
Kyle Zhang
56aab3b93d
Respect RELEASE_PACKAGE_WIDEVINE back in device.mk
...
Bug: 338239204
Change-Id: Idd5e1c18947c72442a34f43f6e04b66039cf7946
2024-05-02 17:42:27 +00:00
Priyanka Advani
feb41bd23d
Revert "sepolicy: Allow PixelGnss implement PPS function"
...
Revert submission 27007604-pps_topic
Reason for revert: Droid-monitor created revert due to breakages in b/338407263. Will be verifying through ABTD before submission.
Reverted changes: /q/submissionid:27007604-pps_topic
Change-Id: Icf89f2bd526634daa8ba10f80471b80dab0837f7
2024-05-02 16:28:10 +00:00
Chia-Chi Teng
927816ea1e
sepolicy: Allow PixelGnss implement PPS function am: 890796a889
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27007165
Change-Id: I2b6a7d8648f4d62548b17d26d350fdc9de08f0d1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-05-02 13:36:25 +00:00
Philip Quinn
a19ae3354b
Include vendor/google/interfaces as a transitive dependency of twoshay.
...
Bug: 278909669
Test: presubmit
Change-Id: Ie9f2f76777407183e9e9e3792265cf00c3ecc204
2024-04-30 22:11:25 -07:00
Chia-Chi Teng
890796a889
sepolicy: Allow PixelGnss implement PPS function
...
avc: denied { read } for name="u:object_r:vendor_chre_hal_prop:s0" dev="tmpfs" ino=401 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_chre_hal_prop:s0 tclass=file
avc: denied { find } for pid=900 uid=1021 name=android.hardware.contexthub.IContextHub/default scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:hal_contexthub_service:s0 tclass=service_manager
avc: denied { call } for scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_contexthub_default:s0 tclass=binder
avc: denied { call } for scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder
avc: denied { search } for name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { write } for name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { add_name } for name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { create } for name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { read } for name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { open } for path="/data/vendor/gps/.pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file permissive=1
avc: denied { write } for name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { search } for name="gps" dev="dm-49" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { write } for name=".ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { write } for name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { open } for path="/data/vendor/gps/.ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc: denied { remove_name } for name=".pps_pipe" dev="dm-54" ino=11712 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc: denied { unlink } for name=".pps_pipe" dev="dm-59" ino=6600 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
Bug: 330120749
Test: Verify PixelGnss HAL can connect to Chre HAL.
Test: Function test verification b/330120749.
Test: b/330120749#comment24 health boot check.
Test: b/330120749#comment25 health boot check.
Change-Id: I100ae061cfcbba17a26ece79eb552d60aa782d79
2024-04-29 11:41:58 +00:00
Peter (YM)
88203440b2
thermal: allow thermal_hal to read sysfs_gpu
...
Update the sepolicy for thermalhal to read sysfs_gpu to access the basic
gpu info.
Bug: 336698561
Test: Flash Build and boot to home, run adb shell dumpsys android.hardware.thermal.IThermal/default, check the cdevceiling and hardlimit number for gpu
Change-Id: I6e722e108284ee0d7a0c86a9e50749ecf4b354a5
Signed-off-by: Peter (YM) <peterym@google.com >
2024-04-29 05:37:09 +00:00
Android Build Coastguard Worker
f29c18c8da
Snap for 11766482 from 417a0fbfcd to 24Q3-release
...
Change-Id: I64771d4e2befa5dc55b34f06a517811b79468a25
2024-04-25 23:02:22 +00:00
Erik Staats
417a0fbfcd
dump_umfw_stat: Reduce timeout to 0.5 seconds
...
Bug: 336359025
Test: Verified bugreport doesn't time out when umfw_stat_tool hangs.
Test: Verified bugreport contains UmfwStat statistics when
umfw_stat_tool doesn't hang.
Test: See details in testing done comment in
https://googleplex-android-review.git.corp.google.com/27069067 .
Flag: EXEMPT normal/day-to-day bugfix
Change-Id: Ia7573316a4217dff55cd789ded628cf033e08a89
2024-04-25 16:43:16 +00:00
Enzo Liao
0b1d777cc0
[automerger skipped] Merge "Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag." into 24D1-dev am: 3b7d90448c -s ours
...
am skip reason: Merged-In I02c2e1569a95ea90901d9476ef75bca74a4f43e1 with SHA-1 7d7c8ebaeb is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27047329
Change-Id: I2ece16bf6574f2cc7e9477fe8d65134897310f99
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-25 08:31:19 +00:00
Enzo Liao
9a578c86d2
[automerger skipped] Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag. am: 2843f2a79b -s ours
...
am skip reason: Merged-In I02c2e1569a95ea90901d9476ef75bca74a4f43e1 with SHA-1 7d7c8ebaeb is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27047329
Change-Id: I6725fb043bc51551c309f33f303faf4a1fdd60fe
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-25 08:31:13 +00:00
Enzo Liao
3b7d90448c
Merge "Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag." into 24D1-dev
2024-04-25 08:22:06 +00:00
Kelvin Zhang
b1119480f0
Merge "Revert "Skip loading kernel modules for 16K mode"" into main
2024-04-25 01:58:10 +00:00
Kelvin Zhang
03c030cd04
Revert "Skip loading kernel modules for 16K mode"
...
This reverts commit 959ba11426 .
Reason for revert: aosp/3050544 breaks this CL
Change-Id: I9dcbcd3b8d6fb8f1e9c468cbca3ea7264bda264d
2024-04-25 00:49:19 +00:00
Kelvin Zhang
d27d373537
Merge "Skip loading kernel modules for 16K mode" into main
2024-04-25 00:00:31 +00:00
Treehugger Robot
2ed1898907
Merge "Fixed a typo in init.storage.rc" into main
2024-04-24 23:22:19 +00:00
Android Build Coastguard Worker
9aba6abdf8
Snap for 11760402 from e4c7499bcb to 24Q3-release
...
Change-Id: If53973a3b7eea70c11426b9745b317e31088f115
2024-04-24 23:02:08 +00:00
Erick Alvarez
68135d2f44
Merge "Attach face detection state tracker files to the bug report" into 24D1-dev am: 0f0e2bed0a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27060465
Change-Id: Id14fae9a14ce14538b739a272a8369a7320f6f69
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-24 22:09:48 +00:00
Erick Alvarez
0f0e2bed0a
Merge "Attach face detection state tracker files to the bug report" into 24D1-dev
2024-04-24 20:59:28 +00:00
Daniel Lee
1a0943166d
Fixed a typo in init.storage.rc
...
"sys" -> "dev"
Change-Id: Ie7103a668cab027fb339762a7f4761b776b431f9
Signed-off-by: Daniel Lee <chullee@google.com >
2024-04-24 12:33:55 -07:00
Randall Huang
e4c7499bcb
Merge "storage: tune f2fs to get max performance" into main
2024-04-24 03:21:12 +00:00
Shinru Han
fe1b1aaa14
[automerger skipped] Merge "gps: Update gps makefile" into 24D1-dev am: b61232f24f -s ours
...
am skip reason: Merged-In I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668 with SHA-1 3647a441ad is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26546996
Change-Id: Idb13d5de4919a17d32e2329e63d3be7153a2b0e8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-24 01:15:36 +00:00
Shinru Han
72e1c30f8c
[automerger skipped] gps: Update gps makefile am: 84de7535b5 -s ours
...
am skip reason: Merged-In I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668 with SHA-1 3647a441ad is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26546996
Change-Id: Icbd94987a62251140af06909af467ace42fe67ed
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-24 01:15:26 +00:00
Shinru Han
b61232f24f
Merge "gps: Update gps makefile" into 24D1-dev
2024-04-24 00:59:36 +00:00
Jaegeuk Kim
8ce08dfc7e
storage: tune f2fs to get max performance
...
max_io_bytes : block will split out, so let's submit asap.
min_hot_blocks : don't mess up the logs per the chunk size.
Change-Id: I0795fea90c3aaee0ef6058fce7f4a3c31fc3fb42
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com >
2024-04-23 16:07:15 -07:00
Android Build Coastguard Worker
8af3871fea
Snap for 11753769 from 3b2fde15ef to 24Q3-release
...
Change-Id: I14dcd4492bb035d7f116a169a1b302509cad7f2b
2024-04-23 23:02:43 +00:00
David Li
2a7b2bd35b
audio: pack AIDL haptic gen effect into the image
...
Bug: 330686268
Test: mm; haptic playground
Change-Id: I629ebaf0c8aa1c6b92dce781cb9e1416094a8c67
2024-04-24 05:04:24 +08:00
Martin Liu
3b2fde15ef
Move compaction_proactiveness rule to system vendor init
...
Bug: 330670954
Test: boot
Change-Id: I3cb505a76850c9c3b48d127ae93eb03aa3da33d9
Signed-off-by: Martin Liu <liumartin@google.com >
2024-04-23 08:08:50 +00:00
Enzo Liao
2843f2a79b
Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag.
...
They include the domains:
1. dump_ramdump
2. ramdump
3. ramdump_app
4. sscoredump
5. ssr_detector_app
We copy policies of domains of ramdump and sscoredump from hardware/google/pixel-sepolicy to gs-common but don't remove them there to keep compatibility for other projects.
New SELinux policies:
1. Create a new file context of /data/vendor/ssrdump/logcat for SSRestartDetector to write device logs when it detects new coredumps.
2. RamdumpService will also access the path to compress device logs to zip files of coredumps.
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7d7c8ebaeb07288f43bf507de3cd8919984337da )
Merged-In: I02c2e1569a95ea90901d9476ef75bca74a4f43e1
Change-Id: I02c2e1569a95ea90901d9476ef75bca74a4f43e1
2024-04-23 06:45:07 +00:00
Minche Li
57c639e4ce
Merge "Updates TTS voice packs in gs-common" into main
2024-04-23 03:27:14 +00:00
Kelvin Zhang
959ba11426
Skip loading kernel modules for 16K mode
...
For boot options, 16K kernel modules are all stored under vendor_boot.
So we can skip loading modules from vendor_dlkm/system_dlkm
if device is in 16K mode and boot option is enabled.
Bug: 293313353
Change-Id: I46c440a7ce67dfbd0cce83dadbd908dff144c583
2024-04-22 16:23:46 -07:00
Erick Alvarez
9001eb43e9
Attach face detection state tracker files to the bug report
...
State tracker proto file size is small, usually ~15KB. Collect 10 most recent
files to the bug reports.
Bug: 311086427
Test: adb bugreport
Change-Id: I5e43c85aaf40e33e9a578749121b0d3a750c209e
2024-04-22 23:23:27 +00:00
Android Build Coastguard Worker
6f8f1622b2
Snap for 11746631 from d8a9aa897d to 24Q3-release
...
Change-Id: I3ff881b5988b74ccd9084ec912e2de670981f687
2024-04-22 23:02:11 +00:00
Enzo Liao
d8a9aa897d
Remove unused apps (RamdumpService and SSRestartDetector) from AOSP.
...
After ag/26620507, the two apps are built in AOSP.
AOSP doesn't need them so we should not build them.
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: I0925fa0bb512a0001bfb46c524c9124128bc5e6e
2024-04-22 16:57:27 +08:00
Enzo Liao
d211011681
Merge "Revert "Remove unsed apps (RamdumpService and SSRestartDetector)..."" into main
2024-04-22 07:52:40 +00:00
Enzo Liao
2a2146024b
Revert "Remove unsed apps (RamdumpService and SSRestartDetector)..."
...
Revert submission 26988480-Remove RamdumpService and SSRestartDetector from AOSP
Reason for revert: Exclude AOSP builds by a condition check instead
Reverted changes: /q/submissionid:26988480-Remove+RamdumpService+and+SSRestartDetector+from+AOSP
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: I518af9425d8f808671118c41d1cabd68782c1ff6
2024-04-22 05:10:46 +00:00
Android Build Coastguard Worker
e2d4962800
Snap for 11740859 from d5028db7e3 to 24Q3-release
...
Change-Id: I9ca7df41681282a1fff15d2d51f6bca94524e3da
2024-04-20 01:02:11 +00:00
Bruce Po
fe72bc0c1d
selinux allow aocxd to access AoC buffers
...
Allow aocxd service to access new device nodes
/dev/acd-aocx_inject*
/dev/acd-aocx_tapout*
type=1400 audit(0.0:88): avc: denied { getattr } for path="/dev/acd-aocx_tapout0" dev="tmpfs" ino=1936 scontext=u:r:aocxd:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0
type=1400 audit(0.0:89): avc: denied { getattr } for path="/dev/acd-aocx_inject0" dev="tmpfs" ino=1937 scontext=u:r:aocxd:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0
BUG: 335884035
Change-Id: Ie4cd637e91f1d9db081bb794a9fb60e3bafe0218
2024-04-19 21:25:41 +00:00
Binhao Lin
d5028db7e3
Merge "Attach multicam CPA to the bug report" into 24D1-dev am: 278620120f
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27030061
Change-Id: I9266fb1b07fbf7a396e37834dc25d1a2084fb192
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-19 21:13:45 +00:00
Binhao Lin
278620120f
Merge "Attach multicam CPA to the bug report" into 24D1-dev
2024-04-19 20:47:41 +00:00
Binhao Lin
b1a35566c1
Attach multicam CPA to the bug report
...
Multicam CPA file size is small, usually <50KB. Collect 10 most recent
files to the bug reports.
Bug: 310389222
Test: adb bugreport
Change-Id: I902fbdfa460a18fb3976d2fbfb4c1c0a716a4ab2
2024-04-19 18:33:56 +00:00
Treehugger Robot
67c14e6e01
Merge changes from topic "gs_mm_common" into main
...
* changes:
Set compaction_proactiveness and percpu_pagelist_high_fraction
allow vendor init to access MM knob
2024-04-19 06:27:54 +00:00
Ravi Jain
a30f1bcfb4
Merge changes from topic "touch_dumpstate_priority-24D1-dev" into 24D1-dev am: 3defa6f8ea
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26926316
Change-Id: I2d0bee71d89fa083110e177ddf4d4f3b06930300
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-19 06:14:22 +00:00
Ravi Jain
44c50aee79
dumpstate: touch: Add touch_predump for gti am: f7bacf5322
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26919214
Change-Id: I29b6676a78c0cd54d50f7f1f8d07dd75518cf197
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-19 06:14:18 +00:00
Ravi Jain
436222de27
dumpstate: touch: Init touch_predump service am: 8a52cae4dd
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26919213
Change-Id: Idb6efba436e5d06eeff611428b2e9bd1f6b6eb0e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-19 06:14:12 +00:00
Ravi Jain
3defa6f8ea
Merge changes from topic "touch_dumpstate_priority-24D1-dev" into 24D1-dev
...
* changes:
dumpstate: touch: Add touch_predump for syna
dumpstate: touch: Add touch_predump for gti
dumpstate: touch: Init touch_predump service
2024-04-19 05:47:46 +00:00
Android Build Coastguard Worker
903b377908
Snap for 11733120 from 448b457d10 to 24Q3-release
...
Change-Id: Ia297c93df1d0f9d528fa5eb51a83aa955515c434
2024-04-18 23:02:04 +00:00
Rios Kao
9be61e9e36
aidl: audio: update external service version am: 905441e15c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27007170
Change-Id: I429852de4d752f9b2d0be02983f51ffde34d7094
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-18 20:53:18 +00:00
Rios Kao
905441e15c
aidl: audio: update external service version
...
Bug: 332443021
Test: mm
Change-Id: I56f50c5f2ddce80f95af2228e91a1db5757dffbc
2024-04-18 18:38:14 +00:00
Martin Liu
d627901103
Set compaction_proactiveness and percpu_pagelist_high_fraction
...
Move the settings from project's setting to common folder so
the changes can also apply to the following 6.1 kernel.
Bug: 332916849
Bug: 309409009
Test: boot
Change-Id: I89d0386821e8a47301023aa414998dd76e3bd6b9
Signed-off-by: Martin Liu <liumartin@google.com >
2024-04-18 07:10:14 +00:00
Martin Liu
d7125c42db
allow vendor init to access MM knob
...
allow vendor init to access compaction_proactiveness
and percpu_pagelist_high_fraction
Bug: 332916849
Bug: 309409009
Test: boot
Change-Id: Idf83babc3f482ad4183c7287a808904c9608fc10
Signed-off-by: Martin Liu <liumartin@google.com >
2024-04-18 07:09:59 +00:00
Ravi Jain
f7bacf5322
dumpstate: touch: Add touch_predump for gti
...
go/touch_predump
Test: b/318578275
Test: Locally flash and check dump logs on dogfood device
Bug: 287907308
Change-Id: I4a35a9a57c1331d67dfcd1863b57d75a9b804c32
2024-04-18 06:35:29 +00:00
Ravi Jain
8d34b54167
dumpstate: touch: Add touch_predump for syna
...
go/touch_predump
Test: b/318578275
Test: Flash on dogfood and check touch dump logs
Bug: 287907308
Change-Id: I88c488dec5de85545ae5f33f5e65371883982e48
2024-04-18 06:35:29 +00:00
Ravi Jain
8a52cae4dd
dumpstate: touch: Init touch_predump service
...
go/touch_predump
Test: b/318578275
Test: Locally flash to check dump_touch logs on dogfood devices
Bug: 287907308
Change-Id: Ibc9df367549dd69c83936a7fd08465f7bb53ce80
2024-04-18 06:35:23 +00:00
Enzo Liao
448b457d10
Merge "Remove unsed apps (RamdumpService and SSRestartDetector) from AOSP." into main
2024-04-18 02:12:03 +00:00
Android Build Coastguard Worker
e49ffd684f
Snap for 11728787 from 32be9ab50e to 24Q3-release
...
Change-Id: I137f061e47ae81ecc0c0d00fb2ba4012b0ec1ba4
2024-04-17 23:03:36 +00:00
Hongyang Jiao
32be9ab50e
Merge "Add betterbug folder to gs-common" into 24D1-dev am: 5f3f01a719
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26987042
Change-Id: Iacf5377da09f19f9555d5465ca0ada0aac8dd9c4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-17 18:10:56 +00:00
David Lin
27f7af17f4
[automerger skipped] Merge "[Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet" into 24D1-dev am: f0c3c420ab -s ours
...
am skip reason: Merged-In I2c1785105bab74a483bc68893d96a8a88eabfd90 with SHA-1 d4de4ddf90 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26976960
Change-Id: I730d327703c3828c9c424acc4de91865bce49757
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-17 18:10:44 +00:00
Klines Jiang
33a4b03908
[automerger skipped] [Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet am: 3133d362a4 -s ours
...
am skip reason: Merged-In I2c1785105bab74a483bc68893d96a8a88eabfd90 with SHA-1 d4de4ddf90 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26976960
Change-Id: I121faf236dad692907ac631b2f6ab67569628840
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-17 18:10:41 +00:00
Hongyang Jiao
870982619f
[automerger skipped] Merge "Revert "Add betterbug folder to gs-common"" into 24D1-dev am: 1e6e41664f -s ours
...
am skip reason: skipped by jiaohy
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26630902
Change-Id: I29a9a9a858610febbc772fd5003a002f63c7da79
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-17 18:08:41 +00:00
Hongyang Jiao
5f3f01a719
Merge "Add betterbug folder to gs-common" into 24D1-dev
2024-04-17 17:57:26 +00:00
Shinru Han
84de7535b5
gps: Update gps makefile
...
Test: on-device
Bug: 326527903
Change-Id: I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668
Merged-In: I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668
2024-04-17 10:16:01 +00:00
David Lin
f0c3c420ab
Merge "[Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet" into 24D1-dev
2024-04-17 08:16:45 +00:00
Enzo Liao
69e58738af
Remove unsed apps (RamdumpService and SSRestartDetector) from AOSP.
...
After ag/26620507, the two apps are built in AOSP.
AOSP doesn't need them so we should not build them.
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: I93cf92de91e1880739e0593b84f6343d152682f8
2024-04-17 16:16:38 +08:00
Treehugger Robot
867995284c
Merge "gs_watchdogd: Support multiple watchdog char devices" into main
2024-04-17 02:58:40 +00:00
Android Build Coastguard Worker
0d5dc3718b
Snap for 11722130 from 46b6ca82a7 to 24Q3-release
...
Change-Id: I58e44981a406d4dd391feae318d0f0aea2d1c779
2024-04-16 23:02:28 +00:00
Hongyang Jiao
099d9ea0a9
Add betterbug folder to gs-common
...
Better Bug was previously labeled as priv_app, here we kept the same 'type=privapp_data_file levelFrom=user'
Copied some Better Bug used rules from system/sepolicy/private/priv_app.te.
(https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:system/sepolicy/private/priv_app.te;l=1?q=priv_app.te )
Test: local test
Bug: 322543833
Change-Id: Ia029e855dd46e65b9eec31835ccaabb3cb903058
2024-04-16 22:57:09 +00:00
Hongyang Jiao
1e6e41664f
Merge "Revert "Add betterbug folder to gs-common"" into 24D1-dev
2024-04-16 22:47:41 +00:00
Sam Ou
46b6ca82a7
Merge "sepolicy: allow dumpstate to call battery_mitigation" into 24D1-dev am: d8f09cbcef
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26963893
Change-Id: Iedb6b43c11ebf57fab3a1d578834772eaa10bd98
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-16 07:54:27 +00:00
Klines Jiang
3133d362a4
[Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet
...
Pixel 5a (barbet) does not support Pixel dump, we need to exclude build
Pixel dump for Pixel 5a (barbet). The git_24Q2-beta-release TARGET_PRODUCT is barbet_beta, updated to barbet% for all barbet target products.
Bug: 330819191
Test: Local build and trigger a new build the result passed
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:d4de4ddf902f75ebcb6b0e1079e78b8a96410ed5 )
Merged-In: I2c1785105bab74a483bc68893d96a8a88eabfd90
Change-Id: I2c1785105bab74a483bc68893d96a8a88eabfd90
24D1-dev is based on 24Q2-release. Therefore, we merged this CL to 24D1-dev.
2024-04-16 07:41:19 +00:00
Sam Ou
d8f09cbcef
Merge "sepolicy: allow dumpstate to call battery_mitigation" into 24D1-dev
2024-04-16 07:37:10 +00:00
samou
d7c33cef92
sepolicy: allow dumpstate to call battery_mitigation
...
Bug: 322141931
Change-Id: I5a6d013df754d3f6d6e9d1ee3ea335176450069b
Signed-off-by: samou <samou@google.com >
2024-04-16 03:54:45 +00:00
Ravi Jain
42f418b147
touch: moving ical related sepolicies to independent folder am: ea5ec69b79
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26957229
Change-Id: Ic92ed487646286266f021eedc4abf125e0d62549
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-16 02:53:34 +00:00
Chienyuan Huang
1a2d7ae821
Add Bluetooth Ranging HAL
...
Bug: 333984281
Test: Manual
Change-Id: Id4877463d5e465e91a8e321ffc6fe0cb07390ebd
2024-04-15 06:26:08 +00:00
Woody Lin
de061720c3
gs_watchdogd: Support multiple watchdog char devices
...
Handles systems with multiple watchdog hardware blocks. Identifies
each watchdog via the glob pattern
`/sys/devices/platform/*.watchdog_cl*/watchdog/watchdog*` to sysfs
path, and initializes and services each of them.
Bug: 295364297
Change-Id: I785c84e492a2286a5155a5b4692dae2a95df0cc4
2024-04-15 05:17:06 +00:00
Ravi Jain
ea5ec69b79
touch: moving ical related sepolicies to independent folder
...
Bug: 331139251
Test: Manually verify the result.
Change-Id: I53b5c8eb73f1ce775ec83a06b43c0b4993f31e69
2024-04-15 03:49:41 +00:00
Android Build Coastguard Worker
c21db60802
Snap for 11710546 from c7955c7eea to 24Q3-release
...
Change-Id: I613480bf140175d7c30390761bf7c59658f953cb
2024-04-13 01:02:30 +00:00
Android Build Coastguard Worker
fbbb4085b8
Snap for 11704135 from 725b775c76 to 24Q3-release
...
Change-Id: I15e704396442dcaa3e6c95104e5f791c63671953
2024-04-11 23:02:17 +00:00
Eliot Wong
c7955c7eea
Merge "Add SEPolicy for vendor_camera_image_processing_hal_service" into 24D1-dev am: 46f7fe3e61
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26604585
Change-Id: I5afe3ce331f9182b4202be2510c0708c3053a63d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-11 20:30:29 +00:00
Eliot Wong
46f7fe3e61
Merge "Add SEPolicy for vendor_camera_image_processing_hal_service" into 24D1-dev
2024-04-11 20:15:58 +00:00
Enzo Liao
725b775c76
Merge "Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag." into main
2024-04-11 02:03:26 +00:00
Android Build Coastguard Worker
076b43d60e
Snap for 11697857 from 80f7772326 to 24Q3-release
...
Change-Id: I24bafef978b855c0e3a3325c98c36c190518814f
2024-04-10 23:02:14 +00:00
Minche Li
68ef072a54
Updates TTS voice packs in gs-common
...
TTS voice packs are better to be common for all devices
So the other device configs can have the common TTS voice packs
for the device build by "gs-common/device.mk"
And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.
Bug: 333626474
Test: build passed and manual test
Change-Id: Idebba7ef2e69d0e9d2f30a94cbbcf70d2e3568d5
2024-04-10 07:07:03 +00:00
Tommy Chiu
80f7772326
mDL: Remove mDL HAL am: aab9ec8424
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26784702
Change-Id: Idbb0ccfc601753b12ed71f265f4a143e862df701
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-04-10 03:48:03 +00:00
Enzo Liao
7d7c8ebaeb
Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag.
...
They include the domains:
1. dump_ramdump
2. ramdump
3. ramdump_app
4. sscoredump
5. ssr_detector_app
We copy policies of domains of ramdump and sscoredump from hardware/google/pixel-sepolicy to gs-common but don't remove them there to keep compatibility for other projects.
New SELinux policies:
1. Create a new file context of /data/vendor/ssrdump/logcat for SSRestartDetector to write device logs when it detects new coredumps.
2. RamdumpService will also access the path to compress device logs to zip files of coredumps.
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Change-Id: I02c2e1569a95ea90901d9476ef75bca74a4f43e1
2024-04-08 14:10:15 +00:00
Daniel Chapin
a0708c2723
Revert "Add betterbug folder to gs-common"
...
Revert submission 26348985-bb-sepolicy-poc
Reason for revert: Droidfood blocking bug: b/327991669
Bug: 327991669
Reverted changes: /q/submissionid:26348985-bb-sepolicy-poc
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:aca06d61c64f947252808f73fbe01fdda5109c0e )
Merged-In: I0fe0bb22e293093d941b4d8ba826c8c8689a370d
Change-Id: I0fe0bb22e293093d941b4d8ba826c8c8689a370d
24D1-dev is based on 24Q2-release. Therefore, we merged this CL to 24D1-dev.
2024-04-08 06:19:44 +00:00
Android Build Coastguard Worker
4408c87187
Snap for 11666018 from da16cb987c to 24Q3-release
...
Change-Id: I168c0c9dc0ecfa6b70b90c6b92f477a70d3ac049
2024-04-03 23:02:10 +00:00
Android Build Coastguard Worker
c2491e5a64
Snap for 11661060 from 819230aee3 to 24Q3-release
...
Change-Id: I5dcd10efa2def528cc9d7c952f35b9345e68bc65
2024-04-02 23:02:24 +00:00
Treehugger Robot
da16cb987c
Merge "shamp: Add SEPolicy and compat matrix for shamp" into main
2024-04-02 20:42:01 +00:00
Tommy Chiu
aab9ec8424
mDL: Remove mDL HAL
...
Since the gsc firmware doens't support mDL since MAIN-00009, we'll need
to remove HAL accordingly to avoid inteface confusion.
Bug: 330415816
Test: PTE release test
Change-Id: Ie91817c926d77209c8ac1119dc74053cb0f6215a
2024-04-02 06:46:01 +00:00
Treehugger Robot
819230aee3
Merge "shamp: Create soong config variable for vendors" into main
2024-04-02 05:16:53 +00:00
Android Build Coastguard Worker
80b5e64aa5
Snap for 11654651 from 8c3d9d51c4 to 24Q3-release
...
Change-Id: Ie6eda38e30831993d02bbeb70280f64eb6a7db7f
2024-04-01 23:02:01 +00:00
Ted Wang
8c3d9d51c4
Merge "Switch to new Bluetooth Finder HAL" into main
2024-04-01 06:21:34 +00:00
Android Build Coastguard Worker
8cebcfd988
Snap for 11648291 from cd05e58009 to 24Q3-release
...
Change-Id: Ia5c5f5f58531c9b2fa3ab5565c5977e6091b0589
2024-03-30 01:02:18 +00:00
Mike Wang
cd05e58009
Merge "Move the sysfs_modem_state from a product folder to gs-common" into main
2024-03-29 15:16:19 +00:00
Android Build Coastguard Worker
3c5df18d11
Snap for 11641371 from a6cd2c4a8d to 24Q3-release
...
Change-Id: I6701e54ee0d48b34322a5f3d8dd2feeb00e7bc06
2024-03-28 23:02:07 +00:00
mikeyuewang
29035f24bc
Move the sysfs_modem_state from a product folder to gs-common
...
Bug: 331202327
Change-Id: Id9176ef2b8aa50b178e0cadf60d8a34876433377
2024-03-28 21:10:23 +00:00
Priyanka Advani
5f3cd46270
Merge "Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"" into 24D1-dev am: ce1c82e3b1
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26750103
Change-Id: Id97441ee75a43f418e589a15d8335ba14bd281d2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-28 20:20:53 +00:00
Priyanka Advani
ce1c82e3b1
Merge "Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"" into 24D1-dev
2024-03-28 20:01:53 +00:00
Priyanka Advani
406eea24ba
Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"
...
Revert submission 26593083-lassen_pps
Reason for revert: Culprit for test breakages in b/331680556. Will be verifying through ABTD for confirmation and before submitting the revert.
Bug: b/331680556
Reverted changes: /q/submissionid:26593083-lassen_pps
Change-Id: I97e29eaf09238d708fb9d941a5988ad42d583655
2024-03-28 19:53:52 +00:00
Samridhi
a6cd2c4a8d
Add SEPolicy domain for cavalry app am: 6561e3b343
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26554888
Change-Id: I8af4282ac6904d01d7acd5647e97070445c0bff0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-28 13:53:22 +00:00
Samridhi
6561e3b343
Add SEPolicy domain for cavalry app
...
AVC error logs: https://paste.googleplex.com/4870439005847552
Test: make selinux_policy, flash build and test
Bug: 329276535
Change-Id: I2ccb4d9205125f02f12cc26ea9e6e6e40b8d6ba2
2024-03-28 09:43:36 +00:00
Super Liu
8b74330011
[automerger skipped] touch: init service to access gti interactive_calibrate sysfs am: 58b64ca3fb -s ours
...
am skip reason: Merged-In I6296b9533dd0209e66832bfbbed6030a30077b96 with SHA-1 28754e355a is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26741130
Change-Id: Ice0917bc4bc31793e0ec835b95eab217f6600a69
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-28 08:40:48 +00:00
Super Liu
58b64ca3fb
touch: init service to access gti interactive_calibrate sysfs
...
Write usage: setprop vendor.touch.gti0.ical VALUE
Any VALUE(e.g. 20X or 30X) set through this property will write
into gti interactive_calibrate sysfs except for the VALUE `read`.
Read usage: setprop vendor.touch.gti0.ical read
getprop vendor.touch.gti0.ical.result
setprop with VALUE `read` will read the gti
interactive_calibrate sysfs and save the result to
vendor.touch.gti0.ical.result.
Besides, please add your DOMAIN to access vendor_gti_prop.
set_prop(DOMAIN, vendor_gti_prop)
Bug: 331139251
Test: Manually verify the result.
Change-Id: I6296b9533dd0209e66832bfbbed6030a30077b96
Merged-In: I6296b9533dd0209e66832bfbbed6030a30077b96
Signed-off-by: Super Liu <supercjliu@google.com >
(cherry picked from commit 28754e355a )
2024-03-28 07:27:32 +00:00
Treehugger Robot
83f398f4e8
Merge "touch: init service to access gti interactive_calibrate sysfs" into main
2024-03-28 07:26:12 +00:00
Eliot Wong
c387a9b7ac
Add SEPolicy for vendor_camera_image_processing_hal_service
...
avc message:
03-15 17:48:21.744 440 440 E SELinux : avc: denied { add } for pid=863 uid=1000 name=com.google.android.imageprocessing.IImageProcessingHal scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_image_processing_hal_service:s0 tclass=service_manager permissive=1
Bug: 323402267
Test: atest liblyric.services_image_processing_hal_test
Test: demo app
Change-Id: Idc9752a1a3f4b18de5f720a384fae97f0f160e98
2024-03-28 01:50:02 +00:00
Android Build Coastguard Worker
581273075f
Snap for 11635697 from 709c2f596d to 24Q3-release
...
Change-Id: I2ec8a5a9045f357e3a4557e58cb2cc4876bfab08
2024-03-27 23:02:31 +00:00
Charles Yeh
709c2f596d
Merge "Add a factoryota-watch.mk file to include the OtaClient for wearable device." into main
2024-03-27 06:03:33 +00:00
Charles Yeh
c979d12d72
Add a factoryota-watch.mk file to include the OtaClient for wearable
...
device.
Bug: 303001898
Test: build rom and check it works
Change-Id: Ifcd7da3eabbddfa903662d26609a2e6a5248ece9
2024-03-27 03:11:31 +00:00
Super Liu
28754e355a
touch: init service to access gti interactive_calibrate sysfs
...
Write usage: setprop vendor.touch.gti0.ical VALUE
Any VALUE(e.g. 20X or 30X) set through this property will write
into gti interactive_calibrate sysfs except for the VALUE `read`.
Read usage: setprop vendor.touch.gti0.ical read
getprop vendor.touch.gti0.ical.result
setprop with VALUE `read` will read the gti
interactive_calibrate sysfs and save the result to
vendor.touch.gti0.ical.result.
Besides, please add your DOMAIN to access vendor_gti_prop.
set_prop(DOMAIN, vendor_gti_prop)
Bug: 331139251
Test: Manually verify the result.
Change-Id: I6296b9533dd0209e66832bfbbed6030a30077b96
Signed-off-by: Super Liu <supercjliu@google.com >
2024-03-27 01:01:40 +00:00
Android Build Coastguard Worker
ef4291032a
Snap for 11623990 from d4de4ddf90 to 24Q3-release
...
Change-Id: I5e186a8cecff5af268b00d81f60f58d718c5eaac
2024-03-25 23:02:22 +00:00
Klines Jiang
d4de4ddf90
[Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet
...
Pixel 5a (barbet) does not support Pixel dump, we need to exclude build
Pixel dump for Pixel 5a (barbet). The git_24Q2-beta-release TARGET_PRODUCT is barbet_beta, updated to barbet% for all barbet target products.
Bug: 330819191
Test: Local build and trigger a new build the result passed
Change-Id: I2c1785105bab74a483bc68893d96a8a88eabfd90
2024-03-25 14:41:13 +00:00
Chia-Chi Teng
7429882fba
sepolicy: Allow PixelGnss to connect to Chre HAL am: 9a7af460a5
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26617900
Change-Id: If756d3473fa9b6ac556a16766220033c2fd53e63
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-25 13:09:33 +00:00
Android Build Coastguard Worker
7477e940f9
Snap for 11617975 from ec93f458c6 to 24Q3-release
...
Change-Id: I42223feb5bc464b198ea391e2a967f8d7ff26073
2024-03-23 01:01:54 +00:00
Chia-Chi Teng
9a7af460a5
sepolicy: Allow PixelGnss to connect to Chre HAL
...
avc: denied { read } for name="u:object_r:vendor_chre_hal_prop:s0" dev="tmpfs" ino=401 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_chre_hal_prop:s0 tclass=file permissive=0
avc: denied { find } for pid=900 uid=1021 name=android.hardware.contexthub.IContextHub/default scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:hal_contexthub_service:s0 tclass=service_manager permissive=0
avc: denied { call } for scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_contexthub_default:s0 tclass=binder permissive=0
avc: denied { call } for scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder permissive=0
Bug: 316227249
Test: Verify PixelGnss HAL can connect to Chre HAL.
Test: Function test verification b/330120749 without disable selinux.
Test: No avc error log in logcat.
Change-Id: Ia1052dbc14fdbb6287cd0958b30e1a1a116b7a80
2024-03-22 03:04:04 +00:00
Treehugger Robot
ec93f458c6
Merge "dumpstate: thermal: Add tmu intpend dumps" into 24D1-dev am: 4055216656
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26593649
Change-Id: Icc99ec08cc2e8da6de4e99c9d8d02bd92268c4af
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-22 01:31:09 +00:00
Treehugger Robot
4055216656
Merge "dumpstate: thermal: Add tmu intpend dumps" into 24D1-dev
2024-03-22 01:12:45 +00:00
Android Build Coastguard Worker
43224e0300
Snap for 11610847 from 7a5eea3546 to 24Q3-release
...
Change-Id: I293b1b8667efdb179fc3b5b4265d381d54f52735
2024-03-21 23:02:01 +00:00
Sam Ou
7a5eea3546
Merge "sepolicy: allow the communication between audio and battery_mitigation hal" into 24D1-dev am: 5a78c395eb
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26543992
Change-Id: I4aa587059c650eae8afc774380efd60a9dd3cc3f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-21 11:57:33 +00:00
Sam Ou
5a78c395eb
Merge "sepolicy: allow the communication between audio and battery_mitigation hal" into 24D1-dev
2024-03-21 11:41:43 +00:00
JJ Lee
8147b44aba
Dumpstate: add DVFSA32 and lengthen timeouts for memory_votes_* am: eee8e04b92
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26593440
Change-Id: I8017a2540ddb1c4c1f9ab0c0bdb6fc1349ff5ae5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-21 02:40:16 +00:00
Android Build Coastguard Worker
d3138f6651
Snap for 11603317 from ca1efb166e to 24Q3-release
...
Change-Id: Ie0b678e4296a6dfb866fedb563f39b554937c79c
2024-03-20 23:02:29 +00:00
Devika Krishnadas
2997e4f81b
Merge "Add pixel mapper service context" into main
2024-03-20 20:37:59 +00:00
Treehugger Robot
0e52931311
Merge "Revert "Enable MTE workaround for b/324412910"" into main
2024-03-20 18:44:32 +00:00
Devika Krishnadas
9357dd1314
Add pixel mapper service context
...
Bug: 267352318
Test: Build & check SELinux denials
Change-Id: I763f49d2ef38ae0ab5c1ee1652957f6512f8fbc6
Signed-off-by: Devika Krishnadas <kdevika@google.com >
2024-03-20 18:12:29 +00:00
Yurii Shutkin
ca1efb166e
rpmb_dev: add rpmb_dev package am: f02f35fa9c am: 2120172acc
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3001224
Change-Id: Ie7dd866a919ead418e8e411a8e0f8d5ca8f99eed
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-20 15:07:42 +00:00
Mitch Phillips
78662f8356
Revert "Enable MTE workaround for b/324412910"
...
This reverts commit 442f99acaf .
Re-enable MTE in this process now that the underlying issue has been
fixed.
Bug: 324412910
Test: Boot the device, observe no crashes.
Change-Id: I8b9e093f25b33b94e0c9635815d9b0a6e2f91b70
2024-03-20 14:54:04 +00:00
Yurii Shutkin
2120172acc
rpmb_dev: add rpmb_dev package am: f02f35fa9c
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3001224
Change-Id: Ia2a0d785d9988b2ab661ada8c0c23f28c472fc30
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-20 14:37:56 +00:00
Sandeep Bandaru
5a574f45ab
Merge "Adding policies for allowing inference services with TPU from isolated_compute_app" into main
2024-03-20 11:28:50 +00:00
sandeepbandaru
76ed6d8a6d
Adding policies for allowing inference services with TPU from isolated_compute_app
...
Test: make
Bug:309953452
Change-Id: I2b0dc17f1debc71ed78d37007213210a7a1aed77
2024-03-19 21:28:56 +00:00
samou
0d88550486
sepolicy: allow the communication between audio and battery_mitigation hal
...
Bug: 330302105
Change-Id: I28a3b67594319d857a8c46bc8c02cddc539caaf8
Signed-off-by: samou <samou@google.com >
2024-03-19 12:01:46 +00:00
JJ Lee
eee8e04b92
Dumpstate: add DVFSA32 and lengthen timeouts for memory_votes_*
...
Bug: 328362738
Test: build pass
Change-Id: I0db129604911794e0fbdaf91b67b2e6fbda07e4d
Signed-off-by: JJ Lee <leejj@google.com >
2024-03-19 08:19:10 +00:00
YiHo Cheng
8051099b42
dumpstate: thermal: Add tmu intpend dumps
...
tmu intpend register dump sysfs is added so add the sysfs in thermal
dump script as well
Bug: 271619423
Test: adb bugreport
Change-Id: I9d5fe4302ce6101837a075ab46798e5f49a61d7d
2024-03-15 18:04:10 +08:00
kierancyphus
d26d8270ff
shamp: Add SEPolicy and compat matrix for shamp
...
Bug: 329367768
This is the basic SELinux setup for a HAL. Since this lives in
gs-common and not all pixel devices will have the corresponding vendor
manifest, this hal will have to be marked as optional.
Test: If this was configured incorrectly, then the build should fail
Doc: go/shared-modem-platform-cpp-backend
Change-Id: I6dd0ee3d68ff226e14e3bdffe2e828c1184c1a01
2024-03-14 01:50:33 +00:00
Android Build Coastguard Worker
5e3dbdf6d4
Snap for 11571437 from 210f14f36d to 24Q3-release
...
Change-Id: Ic14da60f3937ff1de26e2ffc824e0e52f5b79cba
2024-03-13 23:02:06 +00:00
Zheng Pan
210f14f36d
Merge "Support conditional insmod" into main
2024-03-13 18:40:41 +00:00
Yurii Shutkin
f02f35fa9c
rpmb_dev: add rpmb_dev package
...
rpmb_dev is a mock implementation of rpmb for storageproxy.
It is used on emulation platforms where we don't have
real rpmb support in ufs.
Change-Id: I7a0d9e3ae2fef4c7652df9558c1d0aaaea328949
Test: storageproxyd
Bug: 328769740
Signed-off-by: Yurii Shutkin <shutkin@google.com >
2024-03-13 17:49:16 +01:00
kierancyphus
c14a6a75cc
shamp: Create soong config variable for vendors
...
Bug: 328704096
The soong config variable should be defined for all pixel products to
enforce backwards compatability (ensure that this is never built for non
enabled devices). In the case where `SHARED_MODEM_PLATFORM` is not
defined, then the soong config variable will choose the default
placeholder implmentation.
Doc: go/shared-modem-platform-cpp-backend
Test: Build for enabled and disabled targets and ensure that the
correct version of `shared_modem_platform` is being built.
Change-Id: I06ebdada2324fdd86cbb7718fd66602dd52070ea
2024-03-13 18:48:01 +08:00
Hongyang Jiao
19a7c4cda0
Merge "Add betterbug folder to gs-common" into main
2024-03-13 04:30:06 +00:00
Zheng Pan
b2a04f23d6
Support conditional insmod
...
Conditional insmod config file format
condinsmod|system_property_name|module1|module2
if getprop system_property_name == true;
load module1
else
load module2
Bug: 325647677
Change-Id: I0f2dd92caaefd707a626b9f80923aeab495d31a2
2024-03-12 18:21:05 -07:00
Wei Wang
16cadfdc02
Merge "sepolicy: allow setprop for thermal_controld" into 24D1-dev am: 212df1bf25
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26541909
Change-Id: I959f37b3a25e5923efb6fd29b77019a263debfde
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-13 00:56:13 +00:00
Wei Wang
212df1bf25
Merge "sepolicy: allow setprop for thermal_controld" into 24D1-dev
2024-03-13 00:16:31 +00:00
Android Build Coastguard Worker
9889b39458
Snap for 11565217 from ce4e42d661 to 24Q3-release
...
Change-Id: Id9d00e8d77bb114bfb7b7446e1f2c8979c19a686
2024-03-12 23:02:23 +00:00
Hongyang Jiao
9b300b02b1
Add betterbug folder to gs-common
...
Better Bug was previously labeled as priv_app, here we kept the same 'type=privapp_data_file levelFrom=user'
Copied some Better Bug used rules from system/sepolicy/private/priv_app.te.
(https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:system/sepolicy/private/priv_app.te;l=1?q=priv_app.te )
Test: local test
Bug: 322543833
Change-Id: Ia029e855dd46e65b9eec31835ccaabb3cb903058
2024-03-12 21:34:08 +00:00
Richard Hsu
ce4e42d661
Merge "[mlock] Allow edgetpu_app_service to call mlock()" into 24D1-dev am: 7462c63bdf
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26481028
Change-Id: I4db9f953995528712eb71d8a4cdf9549509b2e12
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-12 18:41:46 +00:00
Richard Hsu
7462c63bdf
Merge "[mlock] Allow edgetpu_app_service to call mlock()" into 24D1-dev
2024-03-12 18:03:20 +00:00
Shinru Han
4aa81ec2aa
Merge "gps: Update gps makefile" into main
2024-03-12 07:06:17 +00:00
Android Build Coastguard Worker
c276b9635a
Snap for 11558480 from 39617f5731 to 24Q3-release
...
Change-Id: I81c65d99ada90f9bab7ee26c23da81297b2ef108
2024-03-11 23:02:02 +00:00
Richard Hsu
f9c4631891
[mlock] Allow edgetpu_app_service to call mlock()
...
This CL references keunyoung's ag/25999220
This is to support the GenAI effort, allowing file backed large models to be mlocked, satisfying the memory accounting on Android.
AVC error message:
https://paste.googleplex.com/5844645780652032
Bug: 322229786
Tested:
end-to-end on ZUM and ZPR.
Change-Id: I6abef85eebbc051cb5e41b8f11f70f7ae1b489ab
2024-03-11 12:16:02 -07:00
TeYuan Wang
2e4c437b43
sepolicy: allow setprop for thermal_controld
...
selinux denied log:
[ 53.774820] type=1400 audit(1709683991.036:9): avc: denied { write } for comm="setprop" name="property_service" dev="tmpfs" ino=842 scontext=u:r:pixel-thermal-control-sh:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
Bug: 328118301
Test: adb shell getprop vendor.disable.thermalhal.control
Change-Id: I590f05d1119d11400b0115fff63b3420790e7332
2024-03-11 19:00:11 +00:00
Poomarin Phloyphisut
39617f5731
[HDMI Audio] Fix SEPolicy issue that prevent HDMI audio functionality. am: 292145d81e
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26495841
Change-Id: I4e4365c8b8a87360b954aa2e5749fc039cce7f5f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-11 13:06:33 +00:00
Shinru Han
3647a441ad
gps: Update gps makefile
...
Test: on-device
Bug: 326527903
Change-Id: I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668
2024-03-11 06:33:02 +00:00
Poomarin Phloyphisut
292145d81e
[HDMI Audio] Fix SEPolicy issue that prevent HDMI audio functionality.
...
Error:
avc: denied { search } for comm="binder:845_2" name="hdmi_audio" dev="sysfs" ino=77907 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:sysfs_extcon:s0 tclass=dir permissive=0
Test: Local test.
Bug: 327710671
Change-Id: I413f4edae98cb0b868a4b6b7c62f6d4ae6f17727
2024-03-11 01:51:06 +00:00
Android Build Coastguard Worker
70a47a29ee
Snap for 11551442 from 197c60eb8b to 24Q3-release
...
Change-Id: Ib2dec8975874c4b1d82800b13aa023a30e1b8aa4
2024-03-09 02:02:20 +00:00
Cole Faust
197c60eb8b
Use soong_config_get/set instead of raw variable accesses am: c44cfe952d am: ee24fe5dbf
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2995000
Change-Id: I4d31d554656b31ff9c67de9e396e64530287e9ba
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-08 20:15:11 +00:00
Cole Faust
ee24fe5dbf
Use soong_config_get/set instead of raw variable accesses am: c44cfe952d
...
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2995000
Change-Id: Id99e9d82b159e17504d6f1272a3a990757baa1a0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-08 19:30:32 +00:00
TeYuan Wang
b878885499
sepolicy: allow setprop for thermal_controld
...
selinux denied log:
[ 53.774820] type=1400 audit(1709683991.036:9): avc: denied { write } for comm="setprop" name="property_service" dev="tmpfs" ino=842 scontext=u:r:pixel-thermal-control-sh:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
Bug: 328118301
Test: adb shell getprop vendor.disable.thermalhal.control
Change-Id: I590f05d1119d11400b0115fff63b3420790e7332
2024-03-08 04:05:07 +00:00
Android Build Coastguard Worker
3be4f236f1
Snap for 11545716 from bc4933eeb1 to 24Q3-release
...
Change-Id: Ibbbad8af7534d747c0c22a25d92e3a52764d184c
2024-03-08 00:01:57 +00:00
Cole Faust
c44cfe952d
Use soong_config_get/set instead of raw variable accesses
...
The raw variable accesses are breaking the rbc product config CI.
Test: ./build/bazel/ci/rbc_dashboard.py --quick factory_husky-trunk_staging-userdebug factory_ripcurrent factory_shiba
Change-Id: Ied0b29d9eeae65fb94900258627247b0a4145bc5
2024-03-07 10:17:32 -08:00
Xin Li
bc4933eeb1
[automerger skipped] Merge Android 14 QPR2 to AOSP main am: dca283b418 -s ours am: 78d1620fb8 -s ours
...
am skip reason: Merged-In Ib12b30703f889fb1b0172fbe40415f4e6936d63e with SHA-1 1eaa8b8952 is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2989219
Change-Id: I0ba7385cf8cc72ca80bc00d1004abf34600ceb99
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-07 10:46:25 +00:00
Xin Li
78d1620fb8
[automerger skipped] Merge Android 14 QPR2 to AOSP main am: dca283b418 -s ours
...
am skip reason: Merged-In Ib12b30703f889fb1b0172fbe40415f4e6936d63e with SHA-1 1eaa8b8952 is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2989219
Change-Id: I3c10177382487e613a5ef95fc9691f6eb2a3342b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com >
2024-03-07 09:55:00 +00:00
Xin Li
dca283b418
Merge Android 14 QPR2 to AOSP main
...
Bug: 319669529
Merged-In: Ib12b30703f889fb1b0172fbe40415f4e6936d63e
Change-Id: I9b746fcebbdff92a2fa86ca2fff0452cc234e067
2024-03-06 09:29:48 -08:00
Android Build Coastguard Worker
5e9ee8f596
Snap for 11533280 from d996312839 to 24Q3-release
...
Change-Id: Iebffbf0e81742620909a33ef9fc94783f5de74db
2024-03-06 00:02:06 +00:00
Bart Sears
d996312839
Merge "Revert "Add betterbug folder to gs-common"" into main
2024-03-05 20:38:11 +00:00
Daniel Chapin
aca06d61c6
Revert "Add betterbug folder to gs-common"
...
Revert submission 26348985-bb-sepolicy-poc
Reason for revert: Droidfood blocking bug: b/327991669
Bug: b/327991669
Reverted changes: /q/submissionid:26348985-bb-sepolicy-poc
Change-Id: I0fe0bb22e293093d941b4d8ba826c8c8689a370d
2024-03-05 20:35:50 +00:00
Mark Chang
5c635e51a8
Merge "Move sepolicy files from hardware/google/pixel-sepolicy." into main
2024-03-05 05:31:47 +00:00
Android Build Coastguard Worker
fea4114f34
Snap for 11526283 from c093a56797 to 24Q3-release
...
Change-Id: Ib7e2166c8f326f8d8473d03985a26e69b30d32a3
2024-03-05 00:26:05 +00:00
Ted Wang
56581adeb7
Switch to new Bluetooth Finder HAL
...
Bug: 310790725
Test: Manual
Change-Id: I7a0a766fa3e0f02daff496c2370722f85b6e6740
2024-03-04 05:29:17 +00:00
Android Build Coastguard Worker
12b05d3ca8
Snap for 11520864 from f507e4a7f7 to 24Q3-release
...
Change-Id: Ie9784a157e138d46c06a3810bc1892069d77e21e
2024-03-02 02:02:30 +00:00
Mark Chang
542efdc2b9
Move sepolicy files from hardware/google/pixel-sepolicy.
...
Bug: 325422902
Test: Manual, system booted without sepolicy denied error.
Change-Id: I2146a2b1524d6d5a3d4a17635cce21c29c56c248
Signed-off-by: Mark Chang <changmark@google.com >
2024-03-01 11:59:40 +00:00
Android Build Coastguard Worker
fea3bc4814
Snap for 11517216 from 792837721c to 24Q3-release
...
Change-Id: I1e26b602b7441586252e99d8ddd39d91a94b5a58
2024-03-01 00:02:49 +00:00
Android Build Coastguard Worker
53bfb2c06e
Snap for 11510413 from c66788d5a7 to 24Q3-release
...
Change-Id: Ibbe217ccef47c96ea7ad50a6327ae406307278d4
2024-02-29 00:02:48 +00:00
Android Build Coastguard Worker
0fdd17eb38
Snap for 11504269 from 525803fc3e to 24Q3-release
...
Change-Id: I20759f283e847b1752e47fbc3b9b79f17071295e
2024-02-28 00:02:51 +00:00
Android Build Coastguard Worker
fc2353a384
Snap for 11492556 from 5cb8b637f6 to 24Q3-release
...
Change-Id: I431e2fb344b05a75a431f82065f919f6e11517fc
2024-02-24 02:16:48 +00:00
Android Build Coastguard Worker
b0774364a1
Snap for 11486189 from 1f9b2775bd to 24Q3-release
...
Change-Id: I349468a3cc288b991451a18f4e3c877af9fa9cde
2024-02-23 00:02:46 +00:00
Android Build Coastguard Worker
bfa3b63647
Snap for 11479750 from 2ce657ec4f to 24Q3-release
...
Change-Id: If6b216e478603dcea381e2ef32f4c93850d4fbc7
2024-02-22 00:03:03 +00:00
Android Build Coastguard Worker
746dc7b36d
Snap for 11469542 from 64ede7b44c to 24Q3-release
...
Change-Id: I091dd3baf9b8026f4971bdef4707fdf68919c852
2024-02-20 00:02:37 +00:00
Android Build Coastguard Worker
a2f3dec8c0
Snap for 11463929 from ec7b492ebd to 24Q3-release
...
Change-Id: Id80125bdde9f81cb0eba2eefb3e22e6346ff10c1
2024-02-17 02:03:04 +00:00
Android Build Coastguard Worker
4caf74726f
Snap for 11449429 from 0cdeb7aed1 to 24Q3-release
...
Change-Id: I45d26ec3bc673f078f5dc59da79d71fb1f5e8ee4
2024-02-15 00:02:33 +00:00
Android Build Coastguard Worker
b79d120c94
Snap for 11444718 from fb4b82b874 to 24Q3-release
...
Change-Id: I08730fc6621706c307a55e02d29d0e1a0848d0f1
2024-02-14 00:03:11 +00:00
Android Build Coastguard Worker
664da34aed
Snap for 11438798 from 14c6c627ef to 24Q3-release
...
Change-Id: I88ee266132fd4bd4aced05df1cf4b966ae565473
2024-02-13 00:03:19 +00:00