746 Commits
udc ... vic

Author SHA1 Message Date
Michael Bestas
24c5f5467c gs-common: Introduce a common FCM
Change-Id: I343bfd4cce3132e87ae1465e4552d9a3316ec77d
2025-03-09 11:19:46 +02:00
Michael Bestas
c011de7d71 vibrator: Rename flags to avoid conflicts with prebuilts
felix still uses this but other pixels switched to prebuilt,
this confuses soong so just rename it for now.

Change-Id: I5f7f4f9b386533cf27e955f14faf3fddd2b43b5b
2025-03-09 11:19:10 +02:00
Michael Bestas
afe59287ff Merge tag 'android-15.0.0_r21' into staging/lineage-22.2_merge-android-15.0.0_r21
Android 15.0.0 Release 21 (BP1A.250305.020)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8fKCAAKCRDorT+BmrEO
# eMs3AJ95J96e0Kv/3dVWOrkTI5HXZjn+7QCfT8gs70sr9lbjAIKOoMKAueJM8y0=
# =K75U
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Mar  5 05:50:32 2025 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [ultimate]

# By timmyli (6) and others
# Via Android (Google) Code Review (65) and others
* tag 'android-15.0.0_r21': (87 commits)
  Revert "Add amm experiment."
  Reduce the trace instance irq_gia_google's buffer size
  Remove code that just re-enables IRQ and GIA events
  Add amm experiment.
  storage: add missing bug_map
  Add apf experiment.
  modem_svc: add modem_svc_sit to solve sepolicy conflicts arising from different device versions
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Add Intelligence rc
  Always include camera calibration tools in debug builds.
  Add kswapd experiment.
  Add Proc Vendor Sched Sepolicy Fix
  Add recovery support for perf experiments.
  Revert "Allow tachyon service to make binder calls to GCA"
  Allow tachyon service to make binder calls to GCA
  Add libg3a logging initrc files.
  Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL
  dump_chip_info: dump more tables from chip-info driver
  Introduce interrupts module for debug and trace
  Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
  ...

 Conflicts:
	aoc/aoc.mk
	camera/lyric.mk

Change-Id: Ifd45cd3aa7799789ded7db2b0f24207c39367067
2025-03-09 10:58:51 +02:00
Michael Bestas
4460098bc5 Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6
Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eIS/AJ9ojetnDXDlslBpaDU7nNPVrNv+WgCeMKWKeHmJn6acS37FiZBS9+jvpec=
# =JvPS
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Randall Huang (12) and others
# Via Android (Google) Code Review (58) and others
* tag 'android-15.0.0_r6': (91 commits)
  gsc: Change the criteria for building GSC targets
  sepolicy: remove irregular policy
  Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"
  Revert "Allow devices that use HIDL to find AIDL radio_ext_service"
  gs-common: add rules for euiccpixel_app
  audio: allow set_prop for vendor_audio_prop_restricted
  Allow devices that use HIDL to find AIDL radio_ext_service
  Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service, This is required for AHardwareBuffer allocation.
  storage: fix ota selinux error
  Storage: add sepolicy for recovery mode
  Add sepolicy for gcam app
  check_current_prebuilt: Symlink current prebuilt folder to android root
  shamp: Update shared_modem_platform HAL version to 3
  dumpstate: gsa: Add GSA logs to dumpstate
  storage: fix vendor_init avc denied
  storage: fix vold avc denied
  storage: fix adb bugreport and refactor the existing rules
  storage: fix PowerStats avc denied
  storage: move sepolicy to common folder
  shamp: Update shared_modem_platform HAL version to 2
  ...

 Conflicts:
	camera/lyric.mk
	storage/init.storage.rc

Change-Id: I5ed6cff3b54261c949ec6ba60b32820b264b4ec2
2024-12-11 03:37:46 +02:00
Android Build Coastguard Worker
c16a334052 Snap for 12770256 from db9f7e0d38 to 25Q1-release
Change-Id: I85393c3de41fee214d075d98dae2ca217abd1b23
2024-12-10 00:32:23 +00:00
Chintan Pandya
db9f7e0d38 Merge "Reduce the trace instance irq_gia_google's buffer size" into main 2024-12-09 17:24:41 +00:00
Treehugger Robot
fbe4a4f483 Merge "storage: add missing bug_map" into main 2024-12-09 17:05:38 +00:00
Eileen Lai
37bd9aa71e Merge changes from topic "move_shared_modem_platform_sepolicy" into main
* changes:
  modem_svc: add modem_svc_sit to solve sepolicy conflicts arising from different device versions
  modem_svc: move shared_modem_platform related sepolicy to gs-common
2024-12-09 15:09:36 +00:00
Satish Yalla
b09df07b37 Merge "Revert "Add amm experiment."" into main 2024-12-09 07:25:12 +00:00
Satish Yalla
92b52953a3 Revert "Add amm experiment."
This reverts commit 842b86dcc1.

Reason for revert: DroidMonitor created revert due to b/382821677. Will be verified through ABTD for standard investigation.

Change-Id: I5b0d026155c2acb0d117aad7249592fc3fa72d61
2024-12-09 02:15:16 +00:00
Android Build Coastguard Worker
5b93422d7a Snap for 12765415 from 81762fe218 to 25Q1-release
Change-Id: I1dd5ea7669dc2329f93bd95f23c3283823bf5163
2024-12-07 23:04:57 +00:00
Treehugger Robot
81762fe218 Merge "Add amm experiment." into main 2024-12-07 07:52:05 +00:00
Wei Wang
b848040c01 Merge "Add Proc Vendor Sched Sepolicy Fix" into main 2024-12-07 06:21:53 +00:00
Android Build Coastguard Worker
6500f6c7a4 Snap for 12763142 from d5909db27f to 25Q1-release
Change-Id: I8aa37581dc2cda23ea0b8cc112b1d1737ee4afd3
2024-12-07 02:04:35 +00:00
Chintan Pandya
f94206fea7 Reduce the trace instance irq_gia_google's buffer size
Bug: 382283364
Test: Verified that trace buffer size reduced.
Flag: EXEMPT, init rc change to reduce trace buffer size
Change-Id: I8bf50ac8fa3cff263592b3eca1a6b72a20b2b129
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-06 23:10:45 +00:00
Chintan Pandya
68a7a49504 Merge "Remove code that just re-enables IRQ and GIA events" into main 2024-12-06 23:10:12 +00:00
Chintan Pandya
2d6b42c487 Remove code that just re-enables IRQ and GIA events
These events are already enabled from kernel.

Bug: 378928822
Test: Verified that trace functionality works as expected.
Flag: EXEMPT, just a clean up in init rc
Change-Id: I9e50e3d86e914b0db8633a1ae7287875b4df9838
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-06 23:08:30 +00:00
Dmitry Skiba
842b86dcc1 Add amm experiment.
See go/pixel-perf-amm-experiment for more info.

Bug: 365855872
Test: build/flash; set .Perf__amm_experiment=true, observe auto_migration_margins_enable value changing 1->0; set .Perf__amm_experiment="", observe the value changing 0->1
Flag: NONE controlled by Mendel instead
Change-Id: I02b98e3601a0564929acb73250e2e943664bc80a
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-06 22:15:49 +00:00
Jaegeuk Kim
9e1cdbc471 storage: add missing bug_map
The warning is WAI, so make a correct report.

[   11.777638] [  T374] type=1400 audit(1733512828.220:561): avc:  denied  { open } for  comm="getprop" path="/dev/__properties__/u:object_r:vendor_intelligence_prop:s0" dev="tmpfs" ino=436 scontext=u:r:shell:s0 tcontext=u:object_r:vendor_intelligence_prop:s0 tclass=file permissive=1

w/

[   10.560345] [  T376] type=1400 audit(1733515761.004:342): avc:  denied  { open } for  comm="getprop" path="/dev/__properties__/u:object_r:vendor_intelligence_prop:s0" dev="tmpfs" ino=436 scontext=u:r:shell:s0 tcontext=u:object_r:vendor_intelligence_prop:s0 tclass=file permissive=1 bug=b/378120929

Bug: 378120929
Flag: EXEMPT bugfix
Change-Id: Ia158d71c43e6006ee86a227b5a083bc27230ef71
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2024-12-06 12:16:14 -08:00
Dmitry Skiba
d5909db27f Add apf experiment.
See go/pixel-perf-apf-experiment for more info.

Bug: 365855872
Test: build/flash, set .Perf__apf_experiment=true and observe vendor.powerhal.apf_enabled=false, .apf_disabled=true
Flag: NONE controlled by Mendel instead
Change-Id: Iee32c4b160d5013fbbd893765d3df54c1befa458
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-06 17:59:11 +00:00
Eileen Lai
8112ee64cc modem_svc: add modem_svc_sit to solve sepolicy conflicts arising from different device versions
Add modem_svc_sit to gs-common. modem_svc_sit will support devices from gs101 to zuma_pro. The shared_modem_platform will be updated to support devices after zumapro (not include).

Bug: 372400955

Flag: NONE local testing only
Change-Id: I0bcc9baf69045327e6fcca92ab8003e303db2649
2024-12-06 12:49:05 +00:00
Treehugger Robot
c38d34d5e2 Merge "Add Intelligence rc" into main 2024-12-06 10:23:48 +00:00
Eileen Lai
2833eecc49 modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I8b08e5b7789a5b2bf027deed0afc97f87ca25f3f
Flag: NONE local testing only
2024-12-06 10:15:18 +00:00
Jaegeuk Kim
3bcf1e5891 Add Intelligence rc
By persist.vendor.intelligence,

 # on  -> mount(ok)    -> on
 # off -> write_zeroes -> remove -> rm(ok) -> disable
 # on  -> mount(fail)  -> remove -> rm(ok) -> disable

For SEpolicy,

type=1400 audit(1731445557.444:32): avc:  denied  { read } for  comm="kworker/u16:3" path="/dev/block/sda33" dev="tmpfs" ino=1050 scontext=u:r:kernel:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1

type=1400 audit(1731445557.476:33): avc:  denied  { execute_no_trans } for  comm="storage_intelli" path="/vendor/bin/toolbox" dev="dm-11" ino=368 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1

type=1400 audit(1731448933.292:16): avc:  denied  { search } for  comm="dd" name="block" dev="tmpfs" ino=12 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1

type=1400 audit(1731461590.844:16): avc:  denied  { write } for  comm="dd" name="sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
type=1400 audit(1731461590.844:17): avc:  denied  { open } for  comm="dd" path="/dev/block/sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1

Bug: 378120929
Flag: build.RELEASE_PIXEL_VENDOR_INTELLIGENCE_AID
Change-Id: If9d2f067e29b6c574d3b827ea509fec92c6d8028
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2024-12-05 19:31:26 -08:00
Android Build Coastguard Worker
71c2b6331f Snap for 12755599 from 4250b91047 to 25Q1-release
Change-Id: Ife06b0d41b2367ecc7ecaa3738b4c5adf81510ab
2024-12-06 00:03:10 +00:00
Treehugger Robot
2021b27dcc Merge "Always include camera calibration tools in debug builds." into main 2024-12-05 23:13:29 +00:00
Krzysztof Kosiński
f7eae2a946 Always include camera calibration tools in debug builds.
These statements will be ignored if the packages are
unavailable, such as in the PDK build.

Bug: 380373922
Test: presubmit, check that tools exist in husky-userdebug
Flag: EXEMPT debug-only tool
Change-Id: Id3a524a6adaf1f719a23eb91ebad161ce0551af4
2024-12-05 20:11:21 +00:00
Dmitry Skiba
4250b91047 Add kswapd experiment.
See go/pixel-perf-25q1-experiments for the info.

Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=0, set .Perf__kswapd_experiment=true, observe /sys/kernel/vendor_mm/kswapd_cpu_affinity changes
Flag: NONE controlled by Mendel instead
Change-Id: Id63690f0dcd38de92e4c2fde5b0ab814ed3d9db1
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-05 17:59:34 +00:00
Dmitry Skiba
d530f11290 Merge "Add recovery support for perf experiments." into main 2024-12-05 17:35:19 +00:00
Piotr Klasa
2c41fdac32 Add Proc Vendor Sched Sepolicy Fix
Bug: 361092565

Test: m atest && atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Test: adb shell dmesg | grep proc_vendor_sched ; adb logcat -d | grep proc_vendor_sched

Evidences

12-02 19:31:34.952   279   279 W init    : type=1400 audit(0.0:7): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:8): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:9): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:10): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:11): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:12): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:13): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:14): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:15): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:16): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0

Flag: EXEMPT bugfix
Change-Id: Iad58e23abc1a7e27c3f5f4130e50d7e4aa0b6cf8
2024-12-05 12:05:19 +01:00
Dmitry Skiba
afc6c28401 Add recovery support for perf experiments.
This change establishes a place for perf experiments and adds a
script to delay experiments for recovery purposes. For more info
see go/pixel-perf-experiment-whatif.

Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=10, verify that vendor.perf.allow_experiments=1 after 10 seconds
Flag: NONE controlled by Mendel instead
Change-Id: I78db482542066d5d5646d8c303dbe88054cfe66d
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-05 09:07:27 +00:00
Dinesh Yadav
42fd113c8b Merge "Revert "Allow tachyon service to make binder calls to GCA"" into main 2024-12-05 08:11:09 +00:00
Dinesh Yadav
6711886008 Revert "Allow tachyon service to make binder calls to GCA"
This reverts commit 97f50223aa.

Reason for revert: This change breaks git_main-without-vendor  as google_camera_app & debug_camera_app are not supported in non-vendor builds.

Change-Id: I9bf47c59aa036caf66e2f3fe5d7b6ea0938e4442
2024-12-05 08:02:02 +00:00
Dinesh Yadav
9c65d0ceaa Merge "Allow tachyon service to make binder calls to GCA" into main 2024-12-05 06:02:06 +00:00
Bowen Lai
8a3ec83793 Merge "Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL" into main 2024-12-05 03:05:46 +00:00
Android Build Coastguard Worker
74ebecb396 Snap for 12742097 from 5f10a44aab to 25Q1-release
Change-Id: I4f285997f937403893084980f68990a3a71a8897
2024-12-04 00:03:28 +00:00
Xin Li
5f10a44aab [automerger skipped] Merge ab/AP4A.241205.013 into aosp-main-future am: c0a71b7d0e -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30626201

Change-Id: I4eed38d9ea2b766b1e6312c4ac510fcb51ac4234
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-03 18:22:09 +00:00
Dinesh Yadav
97f50223aa Allow tachyon service to make binder calls to GCA
This permission is needed for tachyon service to call callbacks.

AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212  6987  6987 W com.google.edge: type=1400 audit(0.0:17): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424  4166  4166 W com.google.edge: type=1400 audit(0.0:254): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0

Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: Id27ecd53e9ea7fbf273be098749cdaece55d00cb
2024-12-03 06:20:57 +00:00
Krzysztof Kosiński
5085275f71 Add libg3a logging initrc files.
These files are installed on the vendor partition regardless
of whether we use a prebuilt APEX or build it from source.

History links (Google internal only):
libg3a_gabc.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gABC/libg3a_gabc.rc;drc=82654c90cc30d21948d0be24931edda10739caf0
libg3a_gaf.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gAF/libg3a_gaf.rc;drc=1e01ef4606e8553866d803a30e4284485ff12741
libg3a_ghawb.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gHAWB/libg3a_ghawb.rc;drc=82654c90cc30d21948d0be24931edda10739caf0

Bug: 380379803
Test: presubmit, check husky logs when prebuilt APEX is used
Flag: EXEMPT build system fix
Change-Id: I405c0e3ad78d63e3faee8723c2ba7ba7cf0dd6db
2024-12-02 20:42:13 +00:00
Android Build Coastguard Worker
eeb419becc Snap for 12730349 from 419a3d8812 to 25Q1-release
Change-Id: I4eba6bf8af2d206bf24ebffaf5066e008458ccfb
2024-11-30 02:03:09 +00:00
Zhengyuan Cui
419a3d8812 Merge "Allow command line tools to access Tachyon service in user builds." into main 2024-11-29 04:13:12 +00:00
bowenlai
e93068e6ca Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL
Also add framework_compatibility_matrix.xml for aoc stable AIDL

Bug: 380993517
Flag: EXEMPT HAL interface change
Test: local build
Change-Id: I8a41ff1bdd4ffc8e5d7da08879738aa11fb81813
2024-11-28 15:01:26 +08:00
Android Build Coastguard Worker
16cdfdcf59 Snap for 12722466 from 75eed3f8c2 to 25Q1-release
Change-Id: If2022f08ea9bc79423913fac1287f9abda670079
2024-11-28 00:03:14 +00:00
Xin Li
c0a71b7d0e Merge ab/AP4A.241205.013 into aosp-main-future
Bug: 370570306
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I15a1c680b1877aa299e5c865a5a78c6ce2bd4a62
2024-11-27 12:53:10 -08:00
Lucas Wei
75eed3f8c2 Merge "dump_chip_info: dump more tables from chip-info driver" into main 2024-11-27 03:40:59 +00:00
Lucas Wei
219845f0d9 dump_chip_info: dump more tables from chip-info driver
Add instructions to dump more tables from chip-info driver and grant
permissions by sepolicy.

Flag: EXEMPT, add more table entries for dumping
Test: adb shell dumpsys android.hardware.dumpstate.IDumpstateDevice/default dump_chip_info
Bug: 376346526
Change-Id: Ic9d0bb2059271e95e615e8f64cab129fa8358484
2024-11-27 03:40:47 +00:00
Kiwon Park
1dc746078a Merge "gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode" into main 2024-11-27 03:33:01 +00:00
Android Build Coastguard Worker
898b496589 Snap for 12715656 from fa32332a55 to 25Q1-release
Change-Id: I221011f2e4196eb8dc477a14d9b9bcc16b6dc60f
2024-11-27 00:03:50 +00:00
Aleks Rozman
fa32332a55 Merge "Build lyric from source if prebuilt directory is missing." into main 2024-11-26 18:50:12 +00:00
Treehugger Robot
0a669d77cf Merge "Document radioext_interface_type soong variable usage" into main 2024-11-26 05:17:15 +00:00
Treehugger Robot
5367ab60fc Merge "dump_gps: collect gps logs in ascending order" into main 2024-11-26 04:34:59 +00:00
Android Build Coastguard Worker
f57721d3f2 Snap for 12705048 from 1b957304b3 to 25Q1-release
Change-Id: I7e20b3244b8d45990780278ea7508b87444ec788
2024-11-24 22:02:43 +00:00
Treehugger Robot
1b957304b3 Merge "Introduce interrupts module for debug and trace" into main 2024-11-24 16:04:01 +00:00
Android Build Coastguard Worker
4153dc553c Snap for 12704382 from d3f90503f7 to 25Q1-release
Change-Id: I02ba559029a2b4c08e6a3c5bc856b3273105c5eb
2024-11-23 22:02:53 +00:00
Will Song
d3f90503f7 Merge changes from topic "reland_common_perf_config" into main
* changes:
  Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
  Revert^2 "gs-common: Added common perf init.rc"
2024-11-23 07:29:48 +00:00
Chintan Pandya
d6b9cc46bf Introduce interrupts module for debug and trace
Interrupts module has following functions to perform:

1. Apply boot time configuration
	- Create a new trace instance
	- Enable required irq and irq_gia events in the
          instance
	- Apply required filters on the high frequency
          events
	- Set instance's trace buffer size
	- Enable tracing
2. Sepolicy for every required access
3. Copy interrupts trace buffer to dumpsys whenever triggered

AVC denials:
avc:  denied  { search } for  comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { write } for  comm="dump_interrupts" name="all_logs" dev="dm-53" ino=7808 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { add_name } for  comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { create } for  comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { search } for  comm="dump_interrupts" name="instances" dev="tracefs" ino=2151 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
avc:  denied  { search } for  comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { read } for  comm="dump_interrupts" name="trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc:  denied  { open } for  comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc:  denied  { create } for  comm="dump_interrupts" name="interrupts_trace" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { write open } for  comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=8102 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=141578 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=7965 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

Flag: EXEMPT, add interrupts traces dump program to bugreport
Bug: 376124648
Test: Manually checked boot time trace configuration. Collected
      `adb bugreport`. And checked interrupt traces are dumped
      into and extracted out from the bugreport. More details
      in the bug.
Change-Id: I08872a321fa9726b50a54aeb0a91ed63c0652a3a
2024-11-22 21:38:57 +00:00
Will Song
db25f03ec3 Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
Re-land after making SELinux corrections.

7606e41504

Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com>
Change-Id: I8721e1fb7f9df5b476a27e2db8aea8a5c395b233
2024-11-22 09:08:17 -08:00
Will Song
168f30d8a1 Revert^2 "gs-common: Added common perf init.rc"
Re-land after making SELinux corrections.

98e6a61c1f

Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com>

Change-Id: I4ae6407e7edeeed4b62774698b5cb85d32a01c2d
2024-11-22 09:08:08 -08:00
Android Build Coastguard Worker
e89b70bf3a Snap for 12695596 from cafe80b310 to 25Q1-release
Change-Id: Ie0aee6d7d664b31014f57720d0405bf88066d492
2024-11-22 00:03:09 +00:00
Liana Kazanova (xWF)
cafe80b310 Merge "Revert "modem_svc: move shared_modem_platform related sepolicy t..."" into main 2024-11-21 20:16:06 +00:00
Meng Wang
8fb8122f3b gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode
So all eSIM bootstrap configs are included in one shot.

This change is no-op for devices already including esim.mk because the sysproop was already set so.

Flag: NONE no-op mk change
Bug: 380280915
Change-Id: Ic1e83e4cd2ad546ddecbef7234457559894217e1
2024-11-21 18:19:31 +00:00
Liana Kazanova (xWF)
74283c5cbe Revert "modem_svc: move shared_modem_platform related sepolicy t..."
Revert submission 30519089-move_modem_sepolicy

Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:30519089-move_modem_sepolicy

Change-Id: I241b3aba370f77c705ca3890151e760b4764beca
2024-11-21 17:54:12 +00:00
Eileen Lai
6db7e6756d Merge "modem_svc: move shared_modem_platform related sepolicy to gs-common" into main 2024-11-21 17:03:11 +00:00
Edwin Tung
e8884c92fb dump_gps: collect gps logs in ascending order
Bug: 359797762
Test: Check gps file in dumpstate
Flag: EXEMPT, add gps dump to bugreport
Change-Id: Ia869e634c5f526f217fd24595a6f415c30046980
2024-11-21 10:19:39 +00:00
Eileen Lai
20bb32819d modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955


Flag: NONE local testing only
Change-Id: Ia23ff9f43ee855c2a758714d025123c071e9c288
2024-11-21 08:27:55 +00:00
Dinesh Yadav
acf0eb0ee5 Merge "Add sepolicy for edgetpu_tachyon_service to report metrics" into main 2024-11-21 08:25:01 +00:00
Dinesh Yadav
064b50e43b Add sepolicy for edgetpu_tachyon_service to report metrics
This permission is needed to report errors encountered while running gxp workloads to telemetry services.

AVC Error seen while reporting errors:
11-21 09:30:05.711   406   406 E SELinux : avc:  denied  { find } for pid=1821 uid=1000 name=android.frameworks.stats.IStats/default scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=0

Bug: 359404493
Flag: EXEMPT updates device sepolicy only
Change-Id: Ic282928aad6283077e183f931230f79eea49053d
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2024-11-21 06:39:00 +00:00
Boon Jun
e3df39e77c Document radioext_interface_type soong variable usage
Bug: 377991853
Bug: 371878208
Test: None
Flag: EXEMPT DOCS_ONLY
Change-Id: Ibb722d63ee726aeead0f7c89bdfa21c0ad3ae6b3
2024-11-21 05:38:22 +00:00
Wesley Lee
9cb50229d9 Merge "mediacodec: add GPU access policy" into main 2024-11-21 03:31:04 +00:00
Cheng Chang
90398dea27 Merge "sepolicy: Allow hal_gnss_pixel create file" into main 2024-11-21 00:39:46 +00:00
Android Build Coastguard Worker
2bf583b8c8 Snap for 12687986 from 0cf5a2a95d to 25Q1-release
Change-Id: Ic44ddf08536c85d8c4799294930e95ab6af0e930
2024-11-21 00:03:28 +00:00
Aleks Rozman
83e7cc5a7f Build lyric from source if prebuilt directory is missing.
On select branches, like the camera-stability, the prebuilt directory is missing so we want to make sure that it is building from source even if the flags tell us that a prebuilt should be used.

Bug: 380099804
Change-Id: I8832451c1f7ff6d6de3c2991e9f63317966a2f83
Test: Make on camera-stability-dev and verify warning
Flag: EXEMPT (not applicable)
2024-11-20 22:48:19 +00:00
Wesley Lee
0649754278 mediacodec: add GPU access policy
avc:  denied  { read write }
for  comm="binder:757_6" name="renderD128" dev="tmpfs"
ino=1566 scontext=u:r:mediacodec_google:s0
tcontext=u:object_r:gpu_device:s0 tclass=chr_file permissive=1

Bug: 378609071

Flag: EXEMPT bugfix

Test: run cts -m CtsMediaV2TestCases -t
android.mediav2.cts.CodecEncoderSurfaceTest#testSimpleEncodeFromSurface[26_c2.google.av1.encoder_video/av01_c2.google.av1.decoder_video/av01_512kbps_30fps_yuv420flexible_tonemapyes_persistentsurface]

Change-Id: I2af4f53c9ff8aca0d3c7fd721738f2044d4772fd
Signed-off-by: Wesley Lee <szuweilee@google.com>
2024-11-20 06:29:09 +00:00
Daniel Lee
0cf5a2a95d Merge "storage: turn off writebooster flags upon init" into main 2024-11-20 05:12:10 +00:00
Android Build Coastguard Worker
34b68901a2 Snap for 12680993 from fa76c993b7 to 25Q1-release
Change-Id: I914c57ae3f13fbd031ad30e9c8edfd5870ddc200
2024-11-20 00:04:05 +00:00
Julius Snipes
993506e4f1 GRIL sepolicy for aidl radioext v2.1
avc:  denied  { find } for pid=2019 uid=10269 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c13,c257,c512,c768 tcontext=u:object_r:hal_aidl_radio_ext_service:s0 tclass=service_manager permissive=1

avc:  denied  { find } for pid=6500 uid=10242 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0

avc:  denied  { find } for interface=vendor.google.radioext::IRadioExt sid=u:r:grilservice_app:s0:c242,c256,c512,c768 pid=6500 scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=0

avc:  denied  { read write } for  comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1

avc:  denied  { search } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1

avc:  denied  { read } for  name="link_rate" dev="sysfs" ino=111840 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 355774451
Change-Id: Iea5e0cdff82b140caa1e8b6717e94d6d78076b28
Test: verify with test roms
Flag: EXEMPT sepolicy
2024-11-19 23:27:20 +00:00
Daniel Lee
350e262415 storage: turn off writebooster flags upon init
Enabling writebooster capability for Pixel UFS (pa/2994670)
enabled the following flags in Android Common Kernel:

  - wb_flush_en
  - wb_flush_during_h8
  - wb_enable

This patch disables these writebooster-related flags to restore the
intended behavior for Pixel devices. This overrides the default Android
Common Kernel behavior.

While 'wb_flush_en' and 'wb_enable' have corresponding sysfs entries
('enable_wb_buf_flush' and 'wb_on') for toggling,
'wb_flush_during_h8' currently lacks this functionality in the Android
Common Kernel. Pixel provides the 'manual_gc' sysfs entry as a
workaround. Setting 'manual_gc' to 0 disables 'wb_flush_during_h8'.

Bug: 377958570
Flag: EXEMPT bugfix
Test: check if all writebooster-realated flags are false upon init
Change-Id: I918bf6939de3e208b715f554a96ccbd053f68a18
Signed-off-by: Daniel Lee <chullee@google.com>
2024-11-19 17:22:10 +00:00
Android Build Coastguard Worker
a43871d569 Snap for 12673321 from 32569fc7e5 to 25Q1-release
Change-Id: I392e8af4081c88356e99e13aa1876d7a91717e3d
2024-11-19 00:07:07 +00:00
Tommy Chiu
fa76c993b7 [automerger skipped] gsc: Change the criteria for building GSC targets am: 421324351c -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 8af77ef942 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30467455

Change-Id: I008809abb19974fc20f8f5047d08b017d9d3ae3d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-18 21:45:44 +00:00
Tommy Chiu
421324351c gsc: Change the criteria for building GSC targets
There can be a case where vendor directory exists but vendor/google_nos
does not.

Bug: 371059500
Test: manual
Flag: EXEMPT refactor
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8af77ef94228bf37bd7be4d8db496f7084e0333d)
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-11-18 18:10:31 +00:00
Robert Lee
32569fc7e5 Merge "audio: update hdmi audio path" into main 2024-11-18 03:10:31 +00:00
Robert Lee
5a063cc17b audio: update hdmi audio path
Add permission to read HDMI states by audio hal.

For new project is using
/devices/platform/dwc_dptx-audio/extcon/hdmi_audio

For old projects are using
/devices/platform/drmdp-adma/extcon/hdmi_audio

Bug: 328784922
Test: builds
Flag: EXEMPT update sepolocy
Change-Id: I3bd0ccf1ee804de3157e759eac275673c9fc96a2
Signed-off-by: Robert Lee <lerobert@google.com>
2024-11-18 03:08:08 +00:00
Android Build Coastguard Worker
c607d9ae35 Snap for 12667701 from 36f37eaf3b to 25Q1-release
Change-Id: Ieb1db54f556ba3627e888e8302b048abb3e2f414
2024-11-16 22:52:30 +00:00
Android Build Coastguard Worker
1e71dec3fc Snap for 12664851 from 3c9ee42c23 to 25Q1-release
Change-Id: I7ffaacb34db5dc2802c72b9d5dd9b773d397262d
2024-11-16 02:03:51 +00:00
Madhav Iyengar
36f37eaf3b Merge "Give ContextHub HAL access to AOC version" into main 2024-11-15 21:51:42 +00:00
Kai Hsieh
3c9ee42c23 Merge "Revert^2 "Add GIA (Google Input interface Abstraction laye..."" into main 2024-11-15 05:32:43 +00:00
Android Build Coastguard Worker
9351024f1c Snap for 12658558 from efc0fc73ea to 25Q1-release
Change-Id: Ic46f3a5bdc231051adc0f73c532ac6a507659b05
2024-11-15 00:03:19 +00:00
Kai Hsieh
97586506bb Revert^2 "Add GIA (Google Input interface Abstraction laye..."
Revert submission 30378113-revert-29512389-gia-PMLMEKURMT

Reason for revert: Revert to fix the issue that GIA cannot be started in caimen-next-userdbg

Reverted changes: /q/submissionid:30378113-revert-29512389-gia-PMLMEKURMT
Bug: 367881686
Change-Id: Iecc4738c10dfe244bea02611f1926a9f6264a46c
2024-11-14 10:10:46 +00:00
Cheng Chang
303cf04de1 sepolicy: Allow hal_gnss_pixel create file
[ 7564.504317] type=1400 audit(1731556655.872:63): avc:  denied  { create } for  comm="android.hardwar" name="android.hardware.gnss-service.pixel" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=file permissive=0 bug=b/378004800

flag: EXEMPT the function has been verified at userdebug ROM.
Bug: 378004800
Bug: 377446770
Test: b/378004800 abtd to check sepolicy
Test: b/377446770#comment1 verified the coredump function on user ROM.
Change-Id: If5cbe1dfde904f7d1eb0daaa53fa6bef19161f01
2024-11-14 09:42:15 +00:00
Android Build Coastguard Worker
5e59303ad4 Snap for 12651823 from 6e5b6a6998 to 25Q1-release
Change-Id: I83b12f35c4e0867ffba20a3bb4e7069a8dcf0d57
2024-11-14 00:03:03 +00:00
Xin Li
efc0fc73ea [automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: 61302f297c -s ours
am skip reason: Merged-In Idd70cf3d846fad1a25060ebfb6ae6a99599fd861 with SHA-1 d43a6e1c5a is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30284589

Change-Id: I323ceafb8b8140a941b906990b0cb63e3c941515
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-13 23:00:57 +00:00
Madhav Iyengar
e546ba5bae Give ContextHub HAL access to AOC version
Required to gate use of the new ContextHub HAL <-> CHRE transport on the
availability of a bugfix in AOC.

Bug: 378367295
Flag: android.chre.flags.efw_xport_in_context_hub
Test: ...
Change-Id: Ibd5e3d20b7e5c14ea2200d85c179a4e96eb3b65a
2024-11-13 21:07:38 +00:00
Kai Hsieh
6e5b6a6998 Merge "Revert "Add GIA (Google Input interface Abstraction layer) relat..."" into main 2024-11-13 14:42:35 +00:00
ELIYAZ MOMIN (xWF)
c68ac049e1 Revert "Add GIA (Google Input interface Abstraction layer) relat..."
Revert submission 29512389-gia

Reason for revert: <Potential culprit for b/378865024  - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.>

Reverted changes: /q/submissionid:29512389-gia

Change-Id: Ia4fd036130e54a5573efbd02a044631232561ea1
2024-11-13 14:06:24 +00:00
Treehugger Robot
cad0ccbb94 Merge "Introduce Pixel mailbox module" into main 2024-11-13 08:49:49 +00:00
Lucas Wei
f39a955d95 Introduce Pixel mailbox module
Introduce Pixel mailbox module to dump debugging messages and integrate
with bugreport.
This patch also create sepolicy files to avoid avc denied.

avc:  denied  { search } for  comm="dump_mailbox" name="radio" dev="dm-57" ino=375 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { search } for  comm="dump_mailbox" name="instances" dev="tracefs" ino=4203 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
avc:  denied  { read } for  comm="dump_mailbox" name="trace" dev="tracefs" ino=7250 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1
avc:  denied  { open } for  comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=7187 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_traci
avc:  denied  { create } for  comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { write open } for  comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=29097 scontext=u:r:dump_mailbox:s0 tcontex=1
avc:  denied  { getattr } for  comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=29097 scontext=u:r:dump_mailbox:s0 tcontext=ut=5 audit_backlog_limit=64
=1
avc:  denied  { read } for  comm="dump_mailbox" name="trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1
avc:  denied  { open } for  comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1
avc:  denied  { create } for  comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { write open } for  comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=30937 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=30937 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { create } for  comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclas(6 results) 15:39:41 [4796/19306]
avc:  denied  { write open } for  comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=32864 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=32864 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

Flag: EXEMPT, add mailbox dump program to bugreport
Bug: 363168077
Change-Id: I622f37bf8f913df8d9b242ab206fc267d446753d
2024-11-13 07:52:03 +00:00
Kai Hsieh
9c0119a3d2 Merge "Add GIA (Google Input interface Abstraction layer) related SEPolicy rules and AIDL compatibility matrices." into main 2024-11-13 07:05:58 +00:00
Android Build Coastguard Worker
7993e14af2 Snap for 12644741 from 993cd00d79 to 25Q1-release
Change-Id: Ibff35ba4e173e93b8ee6cba694098bfea3ba7c61
2024-11-13 00:03:21 +00:00
timmyli
cfedcac7d7 Remove bug comment
Bug: 363018500
Test: comment only
Flag: EXEMPT remove comment
Change-Id: I86ed9f0e7ed5b3741b23afffb2d7440683f34eb0
2024-11-12 18:40:13 +00:00
Treehugger Robot
993cd00d79 Merge "Replace many app service permission with app_api_service" into main 2024-11-12 18:36:27 +00:00
Ocean Chen
594e90f573 Merge "Revert "storage: Defer blkio class configuration"" into main 2024-11-12 02:21:33 +00:00
Ocean Chen
3330640782 Revert "storage: Defer blkio class configuration"
This patch change the I/O schedulor back to mq-deadline before boot completed.

Bug:374905027
Test: forrest run

This reverts commit 0af034bf9f.

Change-Id: Ie49fb8a62d6fdb8da112e83d5a8e3551b0072379
2024-11-12 02:21:23 +00:00
Android Build Coastguard Worker
a092a1d146 Snap for 12637843 from ea38f5c687 to 25Q1-release
Change-Id: I1c8956ef66e1054578a1874c5a39695bb59f4943
2024-11-12 00:03:06 +00:00
timmyli
872e432821 Replace many app service permission with app_api_service
We don't need to grant permissions to all these things. Just
app_api_service is enough.

Bug: 363018500
Test: manual test with GCA Eng
Flag: EXEMPT add permissions
Change-Id: I2457b54b244b2739e89393f52442afd4544418f1

11-08 00:33:23.429   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=activity scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.436   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=display scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:display_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.439   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=network_management scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.453   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=connectivity scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:connectivity_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.457   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=netstats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.470   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=mount scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:mount_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.488   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=jobscheduler scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:jobscheduler_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.502   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=shortcut scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:shortcut_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.604   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=notification scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:notification_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.606   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=content scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:content_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.627   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=content_capture scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.630   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=gpu scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.630   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=activity_task scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.643   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=sensorservice scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.644   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=virtualdevice_native scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.652   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=device_policy scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.652   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=batterystats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.653   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=powerstats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:powerstats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.662   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=trust scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.677   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=device_state scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.718   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=vibrator_manager scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:vibrator_manager_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.724   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=input_method scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:input_method_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.732   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=power scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:power_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.733   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=thermalservice scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.784   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.786   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=autofill scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.795   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.798   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=graphicsstats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:graphicsstats_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.798   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=performance_hint scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
11-08 00:33:23.835   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=clipboard scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.029   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.130   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=backup scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.160   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=audio scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.368   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.364 16052 16052 I GoogleCameraEng: type=1400 audit(0.0:1555): avc:  denied  { read } for  name="enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:24.364 16052 16052 I GoogleCameraEng: type=1400 audit(0.0:1556): avc:  denied  { open } for  path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:24.650   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
11-08 00:33:24.872   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=package_native scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
11-08 00:33:26.556   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=input scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:input_service:s0 tclass=service_manager permissive=1
11-08 00:33:34.977   344   344 E SELinux : avc:  denied  { find } for pid=16052 uid=10296 name=storagestats scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:storagestats_service:s0 tclass=service_manager permissive=1
11-08 00:33:42.547   344   344 E SELinux : avc:  denied  { find } for pid=16961 uid=10296 name=activity scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
11-08 00:33:42.593   344   344 E SELinux : avc:  denied  { find } for pid=16961 uid=10296 name=mount scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:mount_service:s0 tclass=service_manager permissive=1
11-08 00:33:42.656 16961 16961 I GoogleCameraEng: type=1400 audit(0.0:1681): avc:  denied  { read } for  name="enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:42.656 16961 16961 I GoogleCameraEng: type=1400 audit(0.0:1682): avc:  denied  { open } for  path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
11-08 00:33:42.726   344   344 E SELinux : avc:  denied  { find } for pid=16961 uid=10296 name=content scontext=u:r:debug_camera_app:s0:c40,c257,c512,c768 tcontext=u:object_r:content_service:s0 tclass=service_manager permissive=1

Change-Id: I91235f2f699fd07107eaa11174beee895559770e
2024-11-11 18:00:58 +00:00
Snehal Koukuntla
ea38f5c687 Add widevine SELinux permissions for L1
839   839 I android.hardwar: type=1400 audit(0.0:982): avc:  denied  { read } for  name="system" dev="tmpfs" ino=1313 scontext=u:r:hal_drm_widevine:s0 tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file permissive=1

Bug: 363181505
Flag: EXEMPT bugfix
Change-Id: Ib9391b24f03a7306b8ba42c960d4c77c5bf148e8
2024-11-08 17:04:21 +00:00
Android Build Coastguard Worker
79c1d9921a Snap for 12623742 from ba53a62a59 to 25Q1-release
Change-Id: Id34703b961eb399d7dc8e96a98ff4de67494048a
2024-11-08 00:03:23 +00:00
Michael Bestas
c3bf3419ad Merge tag 'android-15.0.0_r5' into staging/lineage-22.0_merge-android-15.0.0_r5
Android 15.0.0 release 5

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZyvedgAKCRDorT+BmrEO
# eA+nAJ9tZiVlWuLXPuOc0IS9uMDXxsYy8ACePKq1szLOcZHeCqR7vR03lDwGvWo=
# =OL20
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Nov  6 23:24:06 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2337 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By bgkim
# Via Android Build Coastguard Worker
* tag 'android-15.0.0_r5':
  bootctrl: fixed OOB read in BootControl

Change-Id: Ia26931b9bc054f359359c41314235f9f7f1c68aa
2024-11-07 14:54:51 +02:00
Android Build Coastguard Worker
8abc2c9922 Snap for 12616459 from 84d3523c6c to 25Q1-release
Change-Id: I9f28c10af64d538ea66fe5f0cd258607d88312e0
2024-11-07 00:06:14 +00:00
Zhengyuan Cui
2f08dd633a Allow command line tools to access Tachyon service in user builds.
Bug: 377528455
Change-Id: I878e960b32af45030cebf73e9138752506c37953
Flag: tachyon
2024-11-06 20:40:46 +00:00
Xin Li
61302f297c Merge 24Q4 (ab/12406339) into aosp-main-future
Bug: 370570306
Merged-In: Idd70cf3d846fad1a25060ebfb6ae6a99599fd861
Change-Id: I254edf09968accebbee718cb5494612d0e5031e7
2024-11-06 10:31:19 -08:00
Timmy Li
ba53a62a59 Revert^2 "Add more access for GCA to edgetpu"
This reverts commit 84d3523c6c.

Reason for revert: Remerge attempt after fixing build error.

Bug: 361092857
Test: manual test with GCA for permissions
Flag: EXEMPT add permissions

11-06 03:01:49.736   719   719 W binder:719_3: type=1400 audit(0.0:710): avc:  denied  { read write } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1542 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=0

Change-Id: I89ec01928edc4fcb4832d2da84c442354a65c25c
2024-11-06 18:24:20 +00:00
ELIYAZ MOMIN (xWF)
84d3523c6c Revert "Add more access for GCA to edgetpu"
This reverts commit 132ad09bce.

Reason for revert: <Potential culprit for b/377693729  - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.>

Change-Id: Ic0cf086e2dc3aad19b1e0965873f9966ad7e6c29
2024-11-06 16:54:52 +00:00
timmyli
132ad09bce Add more access for GCA to edgetpu
Bug: 361092857
Test: manual test to check permissions
Flag: EXEMPT add permissions

11-06 03:01:49.736   719   719 W binder:719_3: type=1400 audit(0.0:710): avc:  denied  { read write } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1542 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=0

Change-Id: I2ef4ac39645179fe2a2ec1d7aeac928a43a01a61
2024-11-06 08:47:39 +00:00
Timmy Li
5f7aae6dac Merge "Consolidate gca permissions inside gs-common" into main 2024-11-06 03:53:26 +00:00
Frank Yu
4cea32f400 Merge "Allow grilservice_app to binder call twoshay" into main 2024-11-06 03:25:18 +00:00
Android Build Coastguard Worker
066da71397 Snap for 12609205 from 91ee7dae60 to 25Q1-release
Change-Id: I88a4444efeb51f6baa290b9a1d65562477472e4a
2024-11-06 00:03:52 +00:00
timmyli
cb2c9c91c1 Consolidate gca permissions inside gs-common
SeLinux team is making an effort to have a general set of permissions
inside gs-common for GCA as oppose to having a new google_camera_app.te
for each device generation. Move the next gen permissions to the gs-common.

Bug: 361092857
Test: manual test to check permissions
Flag: EXEMPT add permissions

11-05 16:28:30.048  5720  5720 I FinishThread: type=1400 audit(0.0:665): avc:  denied  { read write } for  name="gxp" dev="tmpfs" ino=1545 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera
11-05 16:28:30.048  5720  5720 I FinishThread: type=1400 audit(0.0:666): avc:  denied  { open } for  path="/dev/gxp" dev="tmpfs" ino=1545 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera
11-05 16:28:30.048  5720  5720 I FinishThread: type=1400 audit(0.0:667): avc:  denied  { ioctl } for  path="/dev/gxp" dev="tmpfs" ino=1545 ioctlcmd=0xee06 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera

11-05 16:15:05.062   332   332 E SELinux : avc:  denied  { find } for pid=5586 uid=10155 name=com.google.edgetpu.IEdgeTpuAppService/default scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_app_service:s0 tclass=service_manager permissive=1
11-05 16:15:06.356  5586  5586 I frame-quality-s: type=1400 audit(0.0:554): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1542 ioctlcmd=0xed23 scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCamera

Change-Id: Ie38edbf7e2fecf6bc45605a947ad6fc63d4f4378
2024-11-05 21:57:22 +00:00
Timmy Li
91ee7dae60 Merge "Add permissions for GCA to access various services" into main 2024-11-05 19:37:39 +00:00
Treehugger Robot
ff585df52b Merge "Allow fingerprint HAL to access IGoodixFingerprintDaemon" into main 2024-11-05 10:34:29 +00:00
KRIS CHEN
8d4f1c1f07 Allow fingerprint HAL to access IGoodixFingerprintDaemon
Fix the following avc denial:
avc:  denied  { add } for pid=1285 uid=1000 name=vendor.goodix.hardware.biometrics.fingerprint.IGoodixFingerprintDaemon/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0

Flag: EXEMPT NDK
Bug: 376602341
Test: boot with no relevant error
Change-Id: I12b5824d239bb3b55bb82fb50b9f6fc4c38b36c5
2024-11-05 09:31:29 +00:00
timmyli
5c50ccab62 Add permissions for GCA to access various services
app_api_service gives access to blanket app service permissions. The
more specific ones are listed in logs below.

Bug: 370899024
Bug: 375958865
Test: manual test with GCA to verify permissions
Flag: EXEMPT refactor

Specific logs:
11-05 01:13:34.640   332   332 E SELinux : avc:  denied  { find } for pid=5493 uid=10155 name=media.player scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mediaserver_service:s0 tclass=service_manager permissive=1
11-05 01:13:34.641   332   332 E SELinux : avc:  denied  { find } for pid=5493 uid=10155 name=media.camera scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:cameraserver_service:s0 tclass=service_manager permissive=1
11-05 01:29:31.002   326   326 E SELinux : avc:  denied  { find } for pid=5465 uid=10155 name=media.metrics scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass=service_manager permissive=1
11-05 01:29:31.498   326   326 E SELinux : avc:  denied  { find } for pid=5465 uid=10155 name=media.extractor scontext=u:r:google_camera_app:s0:c155,c256,c512,c768 tcontext=u:object_r:mediaextractor_service:s0 tclass=service_manager permissive=1
11-05 01:29:30.961   326   326 E SELinux : avc:  denied  { find } for
pid=5465 uid=10155 name=media.audio_flinger
scontext=u:r:google_camera_app:s0:c155,c256,c512,c768
tcontext=u:object_r:audioserver_service:s0 tclass=service_manager
permissive=1

Logs from app services blanket granted by app_api_service
10-28 02:25:22.057   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=content scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:content_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.953   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=connectivity scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:connectivity_service:s0 tclass=service_manager permissive=1
10-28 02:25:22.577   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=power scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:power_service:s0 tclass=service_manager permissive=1
10-28 02:25:22.062   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=notification scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:notification_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.988   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=appops scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:appops_service:s0 tclass=service_manager permissive=1
10-28 02:25:22.014   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=user scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:user_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.852   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=display scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:display_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.998   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=jobscheduler scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:jobscheduler_service:s0 tclass=service_manager permissive=1
10-28 02:25:21.855   339   339 I auditd  : avc:  denied  { find } for pid=10509 uid=10149 name=network_management scontext=u:r:google_camera_app:s0:c149,c256,c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager permissive=1
10-02 05:40:18.428   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=content_capture scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.270   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=device_policy scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.215   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=sensorservice scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
10-02 05:40:18.166   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=netstats scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.219   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=virtualdevice_native scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.230   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=thermalservice scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.224   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=media.camera scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:cameraserver_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.214   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=media.player scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:mediaserver_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.485   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=backup scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
10-02 05:40:17.920   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=activity scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
10-02 05:40:19.511   355   355 I auditd  : avc:  denied  { find } for pid=9560 uid=10129 name=device_state scontext=u:r:google_camera_app:s0:c129,c256,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1

Change-Id: I9bd98af328f948152c89f9f2c3a066a951f4aaad
2024-11-05 06:48:54 +00:00
Enzo Liao
31cb3f5521 Merge "RamdumpService: Update the SELinux policy for Flood Control to use Firebase Cloud Firestore." into main 2024-11-05 03:38:08 +00:00
Android Build Coastguard Worker
f82c4a9a47 Snap for 12602378 from 4ec2ce09c4 to 25Q1-release
Change-Id: Ifa825bd207fe0d7aaaac9220fa7fd1ba4bef165a
2024-11-05 00:03:55 +00:00
Treehugger Robot
4ec2ce09c4 Merge "[USB Audio] Fix SEPolicy issue" into main 2024-11-04 03:28:24 +00:00
Frank Yu
50930b4181 Allow grilservice_app to binder call twoshay
avc error log:

[   37.308566] type=1400 audit(1730161331.968:20): avc:  denied  { call } for  comm="pool-3-thread-1" scontext=u:r:grilservice_app:s0:c253,c256,c512,c768 tcontext=u:r:twoshay:s0 tclass=binder permissive=0 bug=b/375564898 app=com.google.android.grilservice

Flag: EXEMPT bugfix
Bug: 375564898
Change-Id: I7bd57884763e255be57455b138e306c904bc66e1
2024-11-01 09:04:43 +00:00
Enzo Liao
8ad4c5c9b9 RamdumpService: Update the SELinux policy for Flood Control to use Firebase Cloud Firestore.
Bug: 369260803
Design: go/fc-app-server
Flag: NONE N/A
Change-Id: Iebc91446aad59e2ed4e995fc5fc8fd3a45e0dc6f
2024-11-01 11:55:32 +08:00
Android Build Coastguard Worker
ca94d03179 Snap for 12587146 from 6a2ff60cdf to 25Q1-release
Change-Id: I160412d97490985e2fee569efdb513ae5537a65e
2024-10-31 23:02:36 +00:00
Lucas Wei
6a2ff60cdf Merge "Introduce dump_chip_info module" into main 2024-10-31 05:29:28 +00:00
Kai Hsieh
1f83bb110e Add GIA (Google Input interface Abstraction layer) related SEPolicy rules and AIDL compatibility matrices.
AVC evidences:
10-29 16:53:50.756  1305  1305 I binder:1305_2: type=1400 audit(0.0:24): avc:  denied  { search } for  name="goog_touch_interface" dev="sysfs" ino=110634 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=dir permissive=1
10-29 16:53:50.756  1305  1305 I binder:1305_2: type=1400 audit(0.0:25): avc:  denied  { read } for  name="interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
10-29 16:53:50.756  1305  1305 I binder:1305_2: type=1400 audit(0.0:26): avc:  denied  { open } for  path="/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
10-29 16:53:50.756  1305  1305 I binder:1305_2: type=1400 audit(0.0:27): avc:  denied  { getattr } for  path="/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1
10-29 16:53:50.756  1305  1305 I binder:1305_2: type=1400 audit(0.0:28): avc:  denied  { write } for  name="interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1

Test: Build succeed.
Test: Manually, checked whether GIA service is started successfully via command `service list`.
Bug: 367881686
Flag: build.RELEASE_PIXEL_GIA_ENABLED
Change-Id: I8069521425ff1e830d759252bf8bf460f4dc6f32
Signed-off-by: Kai Hsieh <kaihsieh@google.com>
2024-10-31 00:57:56 +00:00
Lucas Wei
0a17acae18 Introduce dump_chip_info module
Introduce dump_chip_info dumper to dump driver information of chip-info
and required sepolicy.

[ 9819.206787][  T335] type=1400 audit(1729750876.372:4710): avc:
denied  { execute_no_trans } for  comm="android.hardwar"
path="/vendor/bin/dump/dump_chip_info" dev="dm-11" ino=79
scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0
tclass=file permissive=1
[ 9819.231374][  T335] type=1400 audit(1729750876.384:4711): avc:
denied  { getattr } for  comm="dump_chip_info" path="pipe:[1038881]"
dev="pipefs" ino=1038881 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:r:shell:s0 tclass=fifo_file permissive=1

Flag: EXEMPT, change source of chipid
Bug: 298883728
Change-Id: I0ff6edf98548de4b93c9eeee005ab2e7b365cf7f
2024-10-30 01:54:29 +00:00
Android Build Coastguard Worker
de94bf2ded Snap for 12573674 from 16cae5b0bc to 25Q1-release
Change-Id: I6558b839db8cbb6754fe3d61bf3cf99900eb0b06
2024-10-29 23:03:58 +00:00
Kiwon Park
16cae5b0bc Merge "Disable bootstrap for UGS devices (sold in Canada)" into main 2024-10-29 18:36:24 +00:00
Joner Lin
89a81be220 Merge "add sepolicy rules for bluetooth common hal dumpstate" into main 2024-10-29 08:34:45 +00:00
Joner Lin
dc6f3713ce Merge "add bluetooth common hal sepolicy rules for bt subsystem crash info files" into main 2024-10-29 04:04:57 +00:00
Android Build Coastguard Worker
a8ee8082d3 Snap for 12565212 from 9590adf0c7 to 25Q1-release
Change-Id: I188fe30e648ac27fadee2f484131bfad57caffa9
2024-10-28 23:03:30 +00:00
jonerlin
62abd5daf8 add sepolicy rules for bluetooth common hal dumpstate
10-27 07:29:30.836000  1000  7403  7403 I auditd  : type=1400 audit(0.0:1002): avc:  denied  { search } for  comm="dump_bt" name="radio" dev="dm-52" ino=378 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I dump_bt : type=1400 audit(0.0:1002): avc:  denied  { search } for  name="radio" dev="dm-52" ino=378 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I auditd  : type=1400 audit(0.0:1003): avc:  denied  { write } for  comm="dump_bt" name="all_logs" dev="dm-52" ino=15632 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I dump_bt : type=1400 audit(0.0:1003): avc:  denied  { write } for  name="all_logs" dev="dm-52" ino=15632 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I auditd  : type=1400 audit(0.0:1004): avc:  denied  { add_name } for  comm="dump_bt" name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I dump_bt : type=1400 audit(0.0:1004): avc:  denied  { add_name } for  name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I auditd  : type=1400 audit(0.0:1005): avc:  denied  { create } for  comm="dump_bt" name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I dump_bt : type=1400 audit(0.0:1005): avc:  denied  { create } for  name="bt" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I auditd  : type=1400 audit(0.0:1006): avc:  denied  { read } for  comm="dump_bt" name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 07:29:30.836000  1000  7403  7403 I dump_bt : type=1400 audit(0.0:1006): avc:  denied  { read } for  name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I auditd  : type=1400 audit(0.0:1005): avc:  denied  { open } for  comm="dump_bt" path="/data/vendor/bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I dump_bt : type=1400 audit(0.0:1005): avc:  denied  { open } for  path="/data/vendor/bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I auditd  : type=1400 audit(0.0:1006): avc:  denied  { read } for  comm="dump_bt" name="bt" dev="dm-52" ino=16645 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I dump_bt : type=1400 audit(0.0:1006): avc:  denied  { read } for  name="bt" dev="dm-52" ino=16645 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I auditd  : type=1400 audit(0.0:1007): avc:  denied  { search } for  comm="dump_bt" name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I dump_bt : type=1400 audit(0.0:1007): avc:  denied  { search } for  name="bluetooth" dev="dm-52" ino=405 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-27 11:02:17.568000  1000  7510  7510 I auditd  : type=1400 audit(0.0:1008): avc:  denied  { read } for  comm="dump_bt" name="btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 11:02:17.568000  1000  7510  7510 I dump_bt : type=1400 audit(0.0:1008): avc:  denied  { read } for  name="btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 11:02:17.568000  1000  7510  7510 I auditd  : type=1400 audit(0.0:1009): avc:  denied  { open } for  comm="dump_bt" path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 11:02:17.568000  1000  7510  7510 I dump_bt : type=1400 audit(0.0:1009): avc:  denied  { open } for  path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15209 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I auditd  : type=1400 audit(0.0:1015): avc:  denied  { create } for  comm="dump_bt" name="btsnoop_hci_vnd.log.last" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I dump_bt : type=1400 audit(0.0:1015): avc:  denied  { create } for  name="btsnoop_hci_vnd.log.last" scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I auditd  : type=1400 audit(0.0:1016): avc:  denied  { write open } for  comm="dump_bt" path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I dump_bt : type=1400 audit(0.0:1016): avc:  denied  { write open } for  path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I auditd  : type=1400 audit(0.0:1017): avc:  denied  { getattr } for  comm="dump_bt" path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=11478 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I dump_bt : type=1400 audit(0.0:1017): avc:  denied  { getattr } for  path="/data/vendor/bluetooth/btsnoop_hci_vnd.log.last" dev="dm-52" ino=11478 scontext=u:r:dump_bt:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I auditd  : type=1400 audit(0.0:1018): avc:  denied  { getattr } for  comm="dump_bt" path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:41.980000  1000  7526  7526 I dump_bt : type=1400 audit(0.0:1018): avc:  denied  { getattr } for  path="/data/vendor/radio/logs/always-on/all_logs/bt/btsnoop_hci_vnd.log.last" dev="dm-52" ino=15548 scontext=u:r:dump_bt:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
10-27 21:03:42.000000  1000  7526  7526 I auditd  : type=1400 audit(0.0:1019): avc:  denied  { search } for  comm="dump_bt" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-27 21:03:42.000000  1000  7526  7526 I dump_bt : type=1400 audit(0.0:1019): avc:  denied  { search } for  name="ssrdump" dev="dm-52" ino=425 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I auditd  : type=1400 audit(0.0:1062): avc:  denied  { read } for  comm="dump_bt" name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I dump_bt : type=1400 audit(0.0:1062): avc:  denied  { read } for  name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I auditd  : type=1400 audit(0.0:1063): avc:  denied  { open } for  comm="dump_bt" path="/data/vendor/ssrdump/coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I dump_bt : type=1400 audit(0.0:1063): avc:  denied  { open } for  path="/data/vendor/ssrdump/coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I auditd  : type=1400 audit(0.0:1064): avc:  denied  { search } for  comm="dump_bt" name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I dump_bt : type=1400 audit(0.0:1064): avc:  denied  { search } for  name="coredump" dev="dm-52" ino=426 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-28 00:05:09.220000  1000  8227  8227 I auditd  : type=1400 audit(0.0:1065): avc:  denied  { read } for  comm="dump_bt" name="coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 00:05:09.220000  1000  8227  8227 I dump_bt : type=1400 audit(0.0:1065): avc:  denied  { read } for  name="coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 00:05:09.220000  1000  8227  8227 I auditd  : type=1400 audit(0.0:1066): avc:  denied  { open } for  comm="dump_bt" path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 00:05:09.220000  1000  8227  8227 I dump_bt : type=1400 audit(0.0:1066): avc:  denied  { open } for  path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_00-04-17.bin" dev="dm-52" ino=15913 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 07:01:56.708000  1000  7681  7681 I auditd  : type=1400 audit(0.0:1019): avc:  denied  { getattr } for  comm="dump_bt" path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_07-01-11.bin" dev="dm-52" ino=16414 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-28 07:01:56.708000  1000  7681  7681 I dump_bt : type=1400 audit(0.0:1019): avc:  denied  { getattr } for  path="/data/vendor/ssrdump/coredump/coredump_bt_socdump_2024-10-28_07-01-11.bin" dev="dm-52" ino=16414 scontext=u:r:dump_bt:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-24 09:58:37.780000  1000  7820  7820 I auditd  : type=1400 audit(0.0:985): avc:  denied  { read } for  comm="dump_bt" name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000  1000  7820  7820 I dump_bt : type=1400 audit(0.0:985): avc:  denied  { read } for  name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000  1000  7820  7820 I auditd  : type=1400 audit(0.0:986): avc:  denied  { open } for  comm="dump_bt" path="/data/vendor/bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000  1000  7820  7820 I dump_bt : type=1400 audit(0.0:986): avc:  denied  { open } for  path="/data/vendor/bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000  1000  7820  7820 I auditd  : type=1400 audit(0.0:987): avc:  denied  { search } for  comm="dump_bt" name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000  1000  7820  7820 I dump_bt : type=1400 audit(0.0:987): avc:  denied  { search } for  name="bluetooth" dev="dm-51" ino=405 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
10-24 09:58:37.780000  1000  7820  7820 I auditd  : type=1400 audit(0.0:988): avc:  denied  { read } for  comm="dump_bt" name="btsnoop_hci_vnd.log.last" dev="dm-51" ino=15291 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1
10-24 09:58:37.780000  1000  7820  7820 I dump_bt : type=1400 audit(0.0:988): avc:  denied  { read } for  name="btsnoop_hci_vnd.log.last" dev="dm-51" ino=15291 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=file permissive=1

Bug: 373526518
Bug: 372146292
Test: build pass, get bugreport and check bt dumpstate log files
Flag: EXEMPT, mechanical change.
Change-Id: I65025ffdac1c3017c494ae2a9fe8deeb5c7ce970
2024-10-28 14:51:40 +00:00
Joner Lin
9590adf0c7 Merge "bt: add dumpstate for bluetooth common hal" into main 2024-10-28 14:15:47 +00:00
jonerlin
1de5b57908 add bluetooth common hal sepolicy rules for bt subsystem crash info files
10-28 14:58:24.744000  1002   894   894 I auditd  : type=1400 audit(0.0:131): avc:  denied  { write } for  comm="binder:894_2" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000  1002   894   894 I binder:894_2: type=1400 audit(0.0:131): avc:  denied  { write } for  name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000  1002   894   894 I auditd  : type=1400 audit(0.0:132): avc:  denied  { add_name } for  comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000  1002   894   894 I binder:894_2: type=1400 audit(0.0:132): avc:  denied  { add_name } for  name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:58:24.744000  1002   894   894 I auditd  : type=1400 audit(0.0:133): avc:  denied  { create } for  comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.744000  1002   894   894 I binder:894_2: type=1400 audit(0.0:133): avc:  denied  { create } for  name="crashinfo_bt_2024-10-28_14-58-24.txt" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000  1002   894   894 I auditd  : type=1400 audit(0.0:134): avc:  denied  { read write open } for  comm="binder:894_2" path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000  1002   894   894 I binder:894_2: type=1400 audit(0.0:134): avc:  denied  { read write open } for  path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000  1002   894   894 I auditd  : type=1400 audit(0.0:135): avc:  denied  { setattr } for  comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:58:24.748000  1002   894   894 I binder:894_2: type=1400 audit(0.0:135): avc:  denied  { setattr } for  name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000  1002   894   894 I auditd  : type=1400 audit(0.0:2065): avc:  denied  { open } for  comm="binder:894_2" path="/data/vendor/ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:59:54.572000  1002   894   894 I binder:894_2: type=1400 audit(0.0:2065): avc:  denied  { open } for  path="/data/vendor/ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
10-28 14:59:54.572000  1002   894   894 I auditd  : type=1400 audit(0.0:2066): avc:  denied  { read } for  comm="binder:894_2" name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000  1002   894   894 I binder:894_2: type=1400 audit(0.0:2066): avc:  denied  { read } for  name="crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000  1002   894   894 I auditd  : type=1400 audit(0.0:2067): avc:  denied  { open } for  comm="binder:894_2" path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000  1002   894   894 I binder:894_2: type=1400 audit(0.0:2067): avc:  denied  { open } for  path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000  1002   894   894 I auditd  : type=1400 audit(0.0:2068): avc:  denied  { getattr } for  comm="binder:894_2" path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-28 14:59:54.572000  1002   894   894 I binder:894_2: type=1400 audit(0.0:2068): avc:  denied  { getattr } for  path="/data/vendor/ssrdump/crashinfo_bt_2024-10-28_14-58-24.txt" dev="dm-52" ino=15503 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
10-23 13:34:22.912   873   873 I binder:873_3: type=1400 audit(0.0:5105): avc:  denied  { read } for  name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[  354.876922] type=1400 audit(1729656523.440:124): avc:  denied  { search } for  comm="binder:873_2" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[  738.332303] type=1400 audit(1729656906.896:2087): avc:  denied  { read } for  comm="binder:873_3" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1

Bug: 374695851
Test: build pass, make bt crash and get the bugreport
Flag: EXEMPT, internal cleanup.
Change-Id: If9c4064fe71bfc0b1055bc953a1b2e22978e1938
2024-10-28 12:10:33 +00:00
jonerlin
952e4d7841 bt: add dumpstate for bluetooth common hal
Bug: 373526518
Bug: 372146292
Test: build pass, get bugreport and check bt dumpstate log files
Flag: EXEMPT, mechanical change.
Change-Id: I63cf188014696e830160ebc7acaeead79520c5b4
2024-10-28 01:14:01 +00:00
Android Build Coastguard Worker
600b20a2b7 Snap for 12561555 from d9f390d180 to 25Q1-release
Change-Id: Ie66e9963997589f45de2e0ecf04f274109aaaa4b
2024-10-26 21:02:23 +00:00
Florian Mayer
d9f390d180 Remove mitchp from OWNERS am: cea50c9a35 am: 807b201e0d
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3321033

Change-Id: I18642110a1acdd8b02bd0613cd2805359a34cdbf
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-26 01:43:14 +00:00
Florian Mayer
807b201e0d Remove mitchp from OWNERS am: cea50c9a35
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3321033

Change-Id: I270f087f593d214429eea2004efc2e49eba05277
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-26 01:21:48 +00:00
Android Build Coastguard Worker
b88282cb85 Snap for 12559614 from 22c1045a5c to 25Q1-release
Change-Id: Iae7db9a4e4ed6f69ce6015f64c95b537f4846d35
2024-10-26 01:07:52 +00:00
Nick Kralevich
22c1045a5c mte: add nnk@google.com to OWNERS am: b7d645e1b4 am: 82dd63c79c
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3320735

Change-Id: Iec8e8d3bd0db452755f4c83405da185a55bd2479
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-25 18:42:59 +00:00
Nick Kralevich
82dd63c79c mte: add nnk@google.com to OWNERS am: b7d645e1b4
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3320735

Change-Id: I045ae89a04542e70933a9a986c0d24255e0ae59f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-25 18:22:55 +00:00
Florian Mayer
cea50c9a35 Remove mitchp from OWNERS
Change-Id: Ib22ad3ae3a6ad1634618d2e04bda363d318c95cd
2024-10-25 17:58:48 +00:00
Nick Kralevich
b7d645e1b4 mte: add nnk@google.com to OWNERS
That way I can help with reviews and other MTE changes.

Test: not needed. OWNERS file change only
Change-Id: I1fb75c2e1347c4085eb614f858b4fb57dd462ad1
2024-10-25 10:55:23 -07:00
Wilson Sung
11ddfc3f82 Merge changes from topic "375108715" into main
* changes:
  Move camera type back to project
  Remove the duplicate gxp rule
2024-10-25 06:35:38 +00:00
Treehugger Robot
268ba1bac8 Merge "insmod.sh: Support 'rmmod' directive" into main 2024-10-24 20:05:47 +00:00
Wilson Sung
4352bbc13d Move camera type back to project
Bug: 375108715
Test: build
Flag: EXEMPT bugfix
Change-Id: I3fe71ed2249903e703590c43ae675d67588a87a5
2024-10-24 11:18:51 +00:00
Wilson Sung
69ffa902be Remove the duplicate gxp rule
Bug: 375108715
Test: build
Flag: EXEMPT bugfix
Change-Id: I8d4aa27c963709a91b1284921a20d7fc5d369d89
2024-10-24 08:05:26 +00:00
Android Build Coastguard Worker
bd6c469fc0 Snap for 12543847 from ca74f2730a to 25Q1-release
Change-Id: Ib76ed9fdaeaeddafcf5d9c1eb6f5e41669200b69
2024-10-23 23:02:53 +00:00
Joner Lin
ca74f2730a Merge changes from topic "add pixel-bt service" into main
* changes:
  add sepolicy rules for bluetooth common hal
  introduce pixel bluetooth common hal service
2024-10-23 12:03:51 +00:00
jonerlin
d76dcdca38 add sepolicy rules for bluetooth common hal
10-21 17:44:33.052  8548  8548 W binder:8548_2: type=1400 audit(0.0:181): avc:  denied  { open } for  path="/dev/wbrc" dev="tmpfs" ino=1653 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:wb_coexistence_dev:s0 tclass=chr_file permissive=0
10-21 17:44:33.056  8548  8548 W binder:8548_2: type=1400 audit(0.0:182): avc:  denied  { call } for  scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:r:hal_power_stats_default:s0 tclass=binder permissive=0
10-21 14:33:39.544   491   491 E SELinux : avc:  denied  { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothCcc/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.547   491   491 E SELinux : avc:  denied  { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothExt/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.548   491   491 E SELinux : avc:  denied  { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothEwp/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.548   491   491 E SELinux : avc:  denied  { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothFinder/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.549   491   491 E SELinux : avc:  denied  { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothSar/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:33:39.550   491   491 E SELinux : avc:  denied  { add } for pid=889 uid=1002 name=vendor.google.bluetooth_ext.IBTChannelAvoidance/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:34:29.557   491   491 E SELinux : avc:  denied  { find } for pid=11758 uid=1002 name=power.stats-vendor scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_power_stats_vendor_service:s0 tclass=service_manager permissive=0
10-21 14:34:29.558   491   491 E SELinux : avc:  denied  { add } for pid=11758 uid=1002 name=vendor.google.bluetooth_ext.IBluetoothExt/default scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=0
10-21 14:34:29.848 11758 11758 W binder:11758_2: type=1400 audit(0.0:317): avc:  denied  { read write } for  name="wbrc" dev="tmpfs" ino=1654 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:wb_coexistence_dev:s0 tclass=chr_file permissive=0
10-21 14:34:29.948 11758 11758 W binder:11758_2: type=1400 audit(0.0:318): avc:  denied  { read write } for  name="wbrc" dev="tmpfs" ino=1654 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:wb_coexistence_dev:s0 tclass=chr_file permissive=0
10-22 21:43:21.504000  1002   874   874 I auditd  : type=1400 audit(0.0:7): avc:  denied  { search } for  comm="android.hardwar" name="aconfig" dev="sda10" ino=18 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:aconfig_storage_metadata_file:s0 tclass=dir permissive=0
10-22 21:43:21.504000  1002   874   874 W android.hardwar: type=1400 audit(0.0:7): avc:  denied  { search } for  name="aconfig" dev="sda10" ino=18 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:aconfig_storage_metadata_file:s0 tclass=dir permissive=0
10-22 05:51:56.052000  1002   890   890 I auditd  : type=1400 audit(0.0:30): avc:  denied  { read } for  comm="binder:890_2" name="logbuffer_tty18" dev="tmpfs" ino=1297 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0
10-22 05:51:56.052000  1002   890   890 W binder:890_2: type=1400 audit(0.0:30): avc:  denied  { read } for  name="logbuffer_tty18" dev="tmpfs" ino=1297 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0
10-22 22:35:30.176   871   871 I binder:871_2: type=1400 audit(0.0:122): avc:  denied  { search } for  name="coredump" dev="dm-52" ino=426 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-22 22:35:30.176   871   871 I binder:871_2: type=1400 audit(0.0:123): avc:  denied  { write } for  name="coredump" dev="dm-52" ino=426 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-22 22:35:30.176   871   871 I binder:871_2: type=1400 audit(0.0:124): avc:  denied  { add_name } for  name="coredump_bt_2024-10-22_22-35-30.bin" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
10-22 22:35:30.176   871   871 I binder:871_2: type=1400 audit(0.0:125): avc:  denied  { create } for  name="coredump_bt_2024-10-22_22-35-30.bin" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-22 22:35:30.176   871   871 I binder:871_2: type=1400 audit(0.0:126): avc:  denied  { read write open } for  path="/data/vendor/ssrdump/coredump/coredump_bt_2024-10-22_22-35-30.bin" dev="dm-52" ino=18673 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-22 22:35:30.176   871   871 I binder:871_2: type=1400 audit(0.0:127): avc:  denied  { setattr } for  name="coredump_bt_2024-10-22_22-35-30.bin" dev="dm-52" ino=18673 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=file permissive=1
10-23 13:34:22.908   873   873 I binder:873_3: type=1400 audit(0.0:5101): avc:  denied  { read } for  name="logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.908   873   873 I binder:873_3: type=1400 audit(0.0:5102): avc:  denied  { open } for  path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.908   873   873 I binder:873_3: type=1400 audit(0.0:5103): avc:  denied  { getattr } for  path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.908   873   873 I binder:873_3: type=1400 audit(0.0:5104): avc:  denied  { ioctl } for  path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 ioctlcmd=0x5401 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-23 13:34:22.912   873   873 I binder:873_3: type=1400 audit(0.0:5105): avc:  denied  { read } for  name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[  354.876922] type=1400 audit(1729656523.440:124): avc:  denied  { search } for  comm="binder:873_2" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
[  354.879606] type=1400 audit(1729656523.444:126): avc:  denied  { write } for  comm="binder:873_2" name="coredump" dev="dm-52" ino=426 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
[  354.879747] type=1400 audit(1729656523.444:127): avc:  denied  { add_name } for  comm="binder:873_2" name="coredump_bt_2024-10-23_12-08-43.bin" scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1
[  710.811807] type=1400 audit(1729656879.376:1045): avc:  denied  { getattr } for  comm="dump_modem" path="/data/vendor/ssrdump/coredump" dev="dm-52" ino=426 scontext=u:r:dump_modem:s0 tcontext=u:object_r:sscoredump_vendor_data_coredump_file:s0 tclass=dir permissive=1 bug=b/361725982
[  738.329130] type=1400 audit(1729656906.892:2083): avc:  denied  { read } for  comm="binder:873_3" name="logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[  738.329926] type=1400 audit(1729656906.892:2084): avc:  denied  { open } for  comm="binder:873_3" path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[  738.330266] type=1400 audit(1729656906.892:2085): avc:  denied  { getattr } for  comm="binder:873_3" path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[  738.330724] type=1400 audit(1729656906.892:2086): avc:  denied  { ioctl } for  comm="binder:873_3" path="/dev/logbuffer_tty18" dev="tmpfs" ino=1264 ioctlcmd=0x5401 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
[  738.332303] type=1400 audit(1729656906.896:2087): avc:  denied  { read } for  comm="binder:873_3" name="ssrdump" dev="dm-52" ino=425 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1

Bug: 374695851
Bug: 372146292
Test: build pass, enable/disable Bluetooth and Pair new device, make
bt firmware crash to get the firmware dump file
Flag: EXEMPT, mechanical change.

Change-Id: Ia5b2b8485c53dd677a39268438a9507817908f4f
2024-10-23 09:24:14 +00:00
Nathan Kulczak
53f2ed5308 Merge "Vibrator: Add enable_pwle_v2" into main 2024-10-23 02:22:06 +00:00
Nathan Kulczak
25ac4cc5ec Vibrator: Add enable_pwle_v2
Add new flag to control status of CAP_COMPOSE_PWLE_EFFECTS_V2

Flag: vendor.vibrator.hal.flags.enable_pwle_v2
Bug: 346570576
Test: Flash to device and test with setprop
Change-Id: I9c004be51284bb6d044a1cb9327ea0502cc4f352
Signed-off-by: Nathan Kulczak <nathankulczak@google.com>
2024-10-23 02:20:47 +00:00
Android Build Coastguard Worker
c141f54549 Snap for 12537680 from 9e47244715 to 25Q1-release
Change-Id: Ic97ab2c0e7d08aac976f32b5a21970ba77b4a986
2024-10-22 23:03:38 +00:00
Treehugger Robot
9e47244715 Merge "storage: adjust ufs error history design" into main 2024-10-22 06:06:38 +00:00
Randall Huang
c3a0ad4d1c storage: adjust ufs error history design
Bug: 359746077
Test: adb bugreport
Change-Id: I32d1cab81351285e1f9ea770169c8be2246f3df7
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-10-22 05:15:58 +00:00
Treehugger Robot
d5df99e993 Merge "[Audio AIDL] Move audiometricext to HIDL only." into main 2024-10-22 02:49:28 +00:00
jonerlin
016ddaf6d0 introduce pixel bluetooth common hal service
android.hardware.bluetooth-service.pixel

bug: 373530837
bug: 370264579
Test: verify bt function in forest test build
Flag: EXEMPT, mechanical change.

Change-Id: I5c0d87740bab8636309ee6c60ee9e8d83ea3a66c
2024-10-21 09:22:37 +00:00
Poomarin Phloyphisut
afd55f92b9 [Audio AIDL] Move audiometricext to HIDL only.
Previously, audiometricext module which is HIDL module is mistakenly included in AIDL rom.

Test: Local Build on both HIDL and AIDL devices
Flag: EXEMPT bugfix
Bug: 369772495
Change-Id: Ic56fa134056afa782440a8f1dcaa032df481bcc2
2024-10-21 08:39:33 +00:00
Brian Norris
6b137ff16d insmod.sh: Support 'rmmod' directive
Some mechanisms (e.g., initramfs module lists) may be overzealous in
what modules get loaded on a system. It can save resources to remove
certain modules when we know they are going to be unused -- for example,
extraneous panel drivers only needed for other devices within a given
device family.

Bug: 360934165
Test: `rmmod|<module_name>.ko` added to init.insmod.<device>.cfg
Change-Id: Iddb588116a0526faded3396d54f54ef82deed44d
2024-10-18 15:10:16 -07:00
Android Build Coastguard Worker
58891f2f0f Merge cherrypicks of ['googleplex-android-review.googlesource.com/29764306'] into 24Q4-release.
Change-Id: I189631de67329af60ffc56b821ca95d14d0c17ec
2024-10-18 21:20:09 +00:00
Tommy Chiu
1d50676e3f gsc: Change the criteria for building GSC targets
There can be a case where vendor directory exists but vendor/google_nos
does not.

Bug: 371059500
Test: manual
Flag: EXEMPT refactor
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8af77ef94228bf37bd7be4d8db496f7084e0333d)
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-10-18 21:15:19 +00:00
Android Build Coastguard Worker
e8496cfd57 Snap for 12517605 from 570dfe1ed4 to 25Q1-release
Change-Id: If155686aa6a293321090dfa8e7d3e9cdad706123
2024-10-18 01:03:00 +00:00
Randall Huang
570dfe1ed4 storage: support new UFS error history algorithm
Bug: 359746077
Test: adb bugreport
Change-Id: I52a7ae0f1f9b60349437c0b3b5de630dd41b5627
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-10-17 12:57:00 +08:00
Android Build Coastguard Worker
56225106db Snap for 12508860 from 2c8ec7ea44 to 25Q1-release
Change-Id: I297e370918e1d80d51df1697dae68e728c96d206
2024-10-16 23:02:59 +00:00
Cheng Chang
2c8ec7ea44 dump_gps: Support bugreport extract resource info
Bug: 369971486
Flag: EXEMPT log information update.
Test: Different input value in b/369971486.
Test: Read the sysfs value in b/369971486.
Test: Collect bugreport and check the attachment in b/369971486.
Test: Sepolicy test in b/369971486.
Change-Id: Ib8f2565387a9a2c7d715e4791bbcddb86a12fb70
2024-10-16 04:39:03 +00:00
Super Liu
c90999f82a Merge "touch: Support SW_LID event from sensor HAL" into main 2024-10-16 01:39:36 +00:00
Android Build Coastguard Worker
6993882c34 Merge cherrypicks of ['googleplex-android-review.googlesource.com/29703186'] into 24Q4-release.
Change-Id: I5821ee53c0a71ff5a91bae6dcefc3a11bc66101f
2024-10-15 23:38:13 +00:00
samou
3171e2372e sepolicy: remove irregular policy
Flag: EXEMPT refactor
Bug: 364989823
Signed-off-by: samou <samou@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1822201a0c6a91d84627c6b59fcd21b223285dac)
Merged-In: I4cced2ae29591425a5bfcb971be6bd2db6b19c66
Change-Id: I4cced2ae29591425a5bfcb971be6bd2db6b19c66
2024-10-15 23:36:58 +00:00
Android Build Coastguard Worker
944aac0bfd Snap for 12491918 from 3c45391425 to 25Q1-release
Change-Id: Ideab00a3d3c15682a477541841b5b951708fc03d
2024-10-12 21:02:41 +00:00
Android Build Coastguard Worker
81d6aeb0f6 Snap for 12488717 from 8af77ef942 to 25Q1-release
Change-Id: I8da313092feb9adbd68306bec2b545d417b75dc9
2024-10-12 01:03:37 +00:00
Zhengyuan Cui
3c45391425 Merge "Remove DBA from edgetpu.mk" into main 2024-10-11 21:41:51 +00:00
Zhengyuan Cui
06943763d5 Remove DBA from edgetpu.mk
DBA is not used anymore.

Verified dba service was there before and not there after.

Flashed built image to device to check.

Change-Id: I3838fcbbe3e6e2cadef81b4e2fc0d5cee60603cf
Bug: 369217630
2024-10-11 00:56:55 +00:00
Kiwon Park
d7d26a5aec Disable bootstrap for UGS devices (sold in Canada)
Bug: 366072023
Change-Id: I0072d2a44bc7d5ba4c62b2410949e7378c457044
Test: m
Flag: EXEMPT disabling a feature
2024-10-09 23:41:33 +00:00
Tommy Chiu
8af77ef942 gsc: Change the criteria for building GSC targets
There can be a case where vendor directory exists but vendor/google_nos
does not.

Bug: 371059500
Test: manual
Flag: EXEMPT refactor
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-10-09 05:10:25 +00:00
Android Build Coastguard Worker
a67cf48728 Snap for 12470893 from fa448be01f to 25Q1-release
Change-Id: I7aa91dfc23e3bca2b67f412df90ef5fca91c107f
2024-10-08 23:03:24 +00:00
Adam Shih
fa448be01f Merge "ban hal_dumpstate_default from execute_no_trans" into main 2024-10-08 03:13:54 +00:00
Ocean Chen
8edb8909cf Merge "storage: Defer blkio class configuration" into main 2024-10-08 02:36:34 +00:00
Android Build Coastguard Worker
0550434447 Snap for 12465365 from 46b0571690 to 25Q1-release
Change-Id: Ifd39970e27d1e6b2be4c26ca106fdcf93066b9c4
2024-10-07 23:03:13 +00:00
Madhav Iyengar
d27988496b Merge "[chre-hal-xport] Add file_contexts for new xport" into main 2024-10-07 21:45:41 +00:00
Madhav Iyengar
93d8e4ada6 [chre-hal-xport] Add file_contexts for new xport
Bug: 369883034
Flag: android.chre.flags.refactor_hal_xport_agnostic
Change-Id: I13b1a769f0f866a0b7c17d461052a6be83cc0e07
2024-10-07 21:44:19 +00:00
Timmy Li
46b0571690 Merge "Add permission for mediacodec to bindercall camera hal" into main 2024-10-07 17:40:31 +00:00
Taylor Nelms
65f5798628 Merge "display: add pixel display trace to bugreport" into main 2024-10-07 12:38:37 +00:00
timmyli
df68b9bc58 Add permission for mediacodec to bindercall camera hal
Bug: 370903762
Test: local test to check permissions
Flag: EXEMPT bug fix

10-07 01:54:59.328000  1046   768   768 I auditd  : type=1400 audit(0.0:1920): avc:  denied  { call } for  comm="binder:768_A" scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_camera_default:s0 tclass=binder permissive=0
10-07 01:54:59.328000  1046   768   768 W binder:768_A: type=1400 audit(0.0:1920): avc:  denied  { call } for  scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_camera_default:s0 tclass=binder permissive=0

Change-Id: I437df92d99f0c31c0b5a1bdebc63f6bc7360ca90
2024-10-07 10:01:00 +00:00
Ravi Jain
0a9c248adb Merge "vibrator: Add vibrator HAL flags" into main 2024-10-07 06:57:59 +00:00
Ocean Chen
0af034bf9f storage: Defer blkio class configuration
Move blkio class configuration from on init to on property:sys.boot_completed=1.
This improves I/O balance between foreground and background processes during boot,
as many background processes compete for I/O resources at that time.
Deferring the configuration ensures a smoother user experience
by prioritizing foreground processes.

Bug: 364960533
Test: forrest build and test on felix
Change-Id: If15343d4d96d55032618a4611bf9fdf47105c974
2024-10-07 14:48:56 +08:00
Sam Ou
901da4857f Merge "sepolicy: remove irregular policy" into main 2024-10-07 06:45:27 +00:00
Adam Shih
f24bfe8ca3 ban hal_dumpstate_default from execute_no_trans
It keeps people from using my domain to do random things,
which causes VTS failure like b/364989823.

Bug: 371497180
Test: build pass and adb bugreport
build fail when ag/28359861 is around.

Change-Id: I438bf2b026718a46bb841ab5e656d11eec630960
2024-10-07 05:54:43 +00:00
Super Liu
21b3ed1922 touch: Support SW_LID event from sensor HAL
Bug: 353360211
Flag: EXEMPT bugfix
Test: Manual local test.
Change-Id: Ie071f0aaf19956f1a472693baf19cbeb0c73b186
Signed-off-by: Super Liu <supercjliu@google.com>
2024-10-07 01:04:53 +00:00
Taylor Nelms
0379e1a2b8 display: add pixel display trace to bugreport
AVC error log justifications:
[ 1198.907014] type=1400 audit(1728067746.876:2074): avc:  denied  { search } for  comm="cat" name="instances" dev="tracefs" ino=4194 scontext=u:r:dump_display_userdebug:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
[ 1198.908565] type=1400 audit(1728067746.876:2075): avc:  denied  { read } for  comm="cat" name="trace" dev="tracefs" ino=167692 scontext=u:r:dump_display_userdebug:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1
[ 1198.909716] type=1400 audit(1728067746.876:2076): avc:  denied  { open } for  comm="cat" path="/sys/kernel/tracing/instances/pixel-display/trace" dev="tracefs" ino=167692 scontext=u:r:dump_display_userdebug:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1

Bug: 369099258
Test: pixel display trace visible in bugreport
Flag: EXEMPT bugfix
Change-Id: I53f9340aee155d1ff0d0c0bc2db45e6bd77f342a
Signed-off-by: Taylor Nelms <tknelms@google.com>
2024-10-04 18:55:40 +00:00
samou
1822201a0c sepolicy: remove irregular policy
Flag: EXEMPT refactor
Bug: 364989823
Change-Id: I4cced2ae29591425a5bfcb971be6bd2db6b19c66
Signed-off-by: samou <samou@google.com>
2024-10-04 16:07:24 +00:00
sienna
3c88c19581 Update AIDL to v4.
Bug: 361494448
Test: atest vts_treble_vintf_vendor_test
Flag: EXEMPT update aidl
Change-Id: I6883ad8fdb5cadc44e8e59fc50642fc24532cff9
2024-10-04 11:31:35 +00:00
Android Build Coastguard Worker
534f00b484 Snap for 12445464 from 4923764120 to 25Q1-release
Change-Id: Id210b0f649a63b4265cb3879ba9dd8dfee55d201
2024-10-02 23:03:29 +00:00
Treehugger Robot
4923764120 Merge changes from topic "touch_dumpstate_priority" into main
* changes:
  dumpstate: touch: Add touch_predump for focaltech
  dumpstate: touch: Add touch_predump for stm
2024-10-02 08:57:00 +00:00
Ernie Hsu
c693d44584 Merge "Add common lib for libgc2 encoders and decoders" into main 2024-10-02 06:31:56 +00:00
Ernie Hsu
1d9653d8c1 Add common lib for libgc2 encoders and decoders
Flag: EXEMPT refactor
Bug: 369762843
Change-Id: Ia971c1cc7dd9c67d147cf6e173772a5bfbfd2cef
2024-10-02 03:51:06 +00:00
Ravi Jain
297158486d dumpstate: touch: Add touch_predump for focaltech
10-01 21:39:00.372 11262 11262 I sh      : type=1400 audit(0.0:20): avc:
denied  { write } for  name="driver_test" dev="proc" ino=4026536282
scontext=u:r:predump_touch:s0 tcontext=u:object_r:proc_touch:s0
tclass=file permissive=1

10-01 21:40:03.076  6244  6244 I sh      : type=1400 audit(0.0:21): avc:
denied  { search } for  name="focaltech_touch" dev="proc" ino=4026535873
scontext=u:r:predump_touch:s0 tcontext=u:object_r:proc_touch:s0
tclass=dir permissive=1

Test: b/318578275
Test: Flash on dogfood device and check touch dump logs
Bug: 287907308
Flag: EXEMPT bugfix
Change-Id: I1652ecc1054b50946159d4c3c0f3995cefa896f5
2024-10-02 03:43:39 +00:00
Ravi Jain
7d245967c1 dumpstate: touch: Add touch_predump for stm
10-01 21:39:00.372 11262 11262 I sh      : type=1400 audit(0.0:20): avc:
denied  { write } for  name="driver_test" dev="proc" ino=4026536282
scontext=u:r:predump_touch:s0 tcontext=u:object_r:proc_touch:s0
tclass=file permissive=1

10-01 21:39:00.432 11265 11265 I cat     : type=1400 audit(0.0:22): avc:
denied  { search } for  name="spi20.0" dev="sysfs" ino=55787
scontext=u:r:predump_touch:s0 tcontext=u:object_r:sysfs_touch:s0
tclass=dir permissive=1

10-01 21:39:00.444 11262 11262 I sh      : type=1400 audit(0.0:25): avc:
denied  { write } for  name="stm_fts_cmd" dev="sysfs" ino=112798
scontext=u:r:predump_touch:s0 tcontext=u:object_r:sysfs_touch:s0
tclass=file permissive=1

Test: b/318578275
Test: Flash on dogfood device and check touch dump logs
Bug: 287907308
Flag: EXEMPT bugfix
Change-Id: I9dade94f96879a269b5db2ebbe9595ea0e099acc
2024-10-02 03:37:22 +00:00
Ravi Jain
d36b2b709b vibrator: Add vibrator HAL flags
Move the HAL vibrator Flags temporarily from hardware/google/pixel.

Bug: 362659323
Test: Build Pass
Flag: EXEMPT refactor
Change-Id: Id51defdb09c1d912b991cada5c413b66c8501df7
2024-10-01 15:31:29 +00:00
Android Build Coastguard Worker
a98d8483f8 Snap for 12428696 from c398fe11da to 25Q1-release
Change-Id: I0b2334711c442504334462f249a97db680c1190b
2024-09-28 21:02:14 +00:00
Kiwon Park
c398fe11da Allow gmscore to read setupwizard_feature_prop
Bug: 369682921
Change-Id: I7d893ee8785be326e98df57bc06396f7e10d2b01
Test: test bootstrap transfer
Flag: EXEMPT bugfix
2024-09-27 16:47:02 +00:00
Android Build Coastguard Worker
912e0f8969 Snap for 12415101 from e943d565fe to 25Q1-release
Change-Id: I7c124112adc620245c46ad591baf6de65984aadb
2024-09-25 23:02:59 +00:00
Treehugger Robot
e943d565fe Merge "audio: add soong configs for debugging" into main 2024-09-25 08:47:14 +00:00
Michael Bestas
d26fdcfef2 Disable userdebug diagnostics
Change-Id: Icbdc3a61ab7b27f2aa0a6a07181b96edd9ee191a
2024-09-24 23:51:36 +03:00
Michael Bestas
35f66e77be modem: Erase /data/vendor/slog
Free up 2.4GB of space used by leftover modem logs.

Change-Id: If2efcbb9a18a8a945e9620c0df819d0bd82d8ad7
2024-09-24 22:09:58 +03:00
Michael Bestas
8045332316 Always copy init.aoc.daemon.rc to vendor init
We don't have google bsp in tree but we include google's binaries.

Change-Id: I9fbe5b819a46b4500e2d78e65d02dfd1dcfdc8a4
2024-09-24 22:09:48 +03:00
Michael Bestas
2801e361ab Exclude some things from LineageOS builds
Change-Id: I34420b49a2f419b84f3af9aff048249d77e419ae
2024-09-24 22:08:27 +03:00
Michael Bestas
a5b9a862ed Add .gitupstream
Change-Id: I78e398ecf9f4a95707dc0810d6ed8a0133b3fde2
2024-09-24 21:12:34 +03:00
Safayat Ullah
617a80e659 display-dump: use generic panel path
Bug: 364795380
Test: adb bugreport
Flag: EXEMPT bugfix
Change-Id: I10f55a3ffb5daf6bf72d80473ba3af23b85a5120
2024-09-23 11:19:46 +00:00
Android Build Coastguard Worker
1d3a740d1e Snap for 12399304 from d2c239970b to 25Q1-release
Change-Id: I8198f663a4e169cb14ca2962795b94c35bf94edf
2024-09-21 23:01:24 +00:00
Android Build Coastguard Worker
133708e84a Merge cherrypicks of ['googleplex-android-review.googlesource.com/29034296'] into 24Q3-release.
Change-Id: Ie8c833054f2a4e11698f237caab65a4af17ea94f
2024-09-20 00:26:44 +00:00
bgkim
d93d355fb6 bootctrl: fixed OOB read in BootControl
Fixed OOB read in BootControl::isSlotMarkedSuccessful() by checking
if "in_slot" is negative

Flag: EXEMPT bugfix
Test: tested on Husky device
Bug: 353516777
Signed-off-by: bgkim <bgkim@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b584b9c7e081d803b32f0ff5f059573dfa6c0a0e)
Merged-In: I634c32a8c12403008fe5a724bc447f82931ae9c5
Change-Id: I634c32a8c12403008fe5a724bc447f82931ae9c5
2024-09-20 00:18:45 +00:00
Android Build Coastguard Worker
11b3ae101f Snap for 12378824 from d2c239970b to 24Q4-release
Change-Id: I9b6a5da156862083e0e722a299df74838e3cd5b7
2024-09-17 23:02:12 +00:00
Welly Hsu
d2c239970b Merge "gs-common: add rules for euiccpixel_app" into main 2024-09-17 01:41:38 +00:00
Android Build Coastguard Worker
5445d223a5 Snap for 12373988 from 5bacb2c3ca to 24Q4-release
Change-Id: I76b58de6ca35949ee6af0cbf8a8a4a0ded2a6751
2024-09-16 23:01:47 +00:00
Priyanka Advani (xWF)
dc8c2ed6b3 Merge "Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"" into main 2024-09-16 21:10:24 +00:00
Priyanka Advani (xWF)
d43a6e1c5a Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"
This reverts commit 1685969e60.

Reason for revert: Droidmonitor created revert due to b/367330939.

Change-Id: Idd70cf3d846fad1a25060ebfb6ae6a99599fd861
2024-09-16 16:58:16 +00:00
Tom Flucke
5bacb2c3ca Merge "dumpstate: gsa: Add GSA logs to dumpstate" into main 2024-09-16 15:10:38 +00:00
Treehugger Robot
2440c2fe6f Merge "Revert "Allow devices that use HIDL to find AIDL radio_ext_service"" into main 2024-09-16 10:30:03 +00:00
Charlie Yang
1685969e60 Revert "Allow devices that use HIDL to find AIDL radio_ext_service"
Revert submission 29238469-gril-selinux

Reason for revert: b/367183524 - build break

Reverted changes: /q/submissionid:29238469-gril-selinux

Change-Id: Ica10c6ee500389223256e328d182c9495a826b06
2024-09-16 07:41:26 +00:00
Charlie Yang
275b9c66d5 Merge "Allow devices that use HIDL to find AIDL radio_ext_service" into main 2024-09-16 06:22:22 +00:00
Android Build Coastguard Worker
ecfc4abba3 Snap for 12370120 from 194a58c7bb to 25Q1-release
Change-Id: I31576bdfa801b21e43e2060f68930efdc0440807
2024-09-14 23:01:23 +00:00
Welly Hsu
0393e7fbe6 gs-common: add rules for euiccpixel_app
09-11 21:19:25.452   345   345 I auditd  : avc:  denied  { find } for pid=14141 uid=10246 name=activity scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=0

09-11 21:20:57.035   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=netstats scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.055   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=content_capture scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.064   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=activity_task scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.111   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=gpu scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.182   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=voiceinteraction scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.184   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=autofill scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.190   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=sensitive_content_protection_service scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.193   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=performance_hint scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1

09-11 21:21:09.436   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=audio scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1

09-11 21:21:09.449   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=batterystats scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1

09-11 21:21:09.454   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=batteryproperties scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:batteryproperties_service:s0 tclass=service_manager permissive=1

09-11 23:21:26.678   345   345 I auditd  : avc:  denied  { find } for pid=17450 uid=10246 name=permission_checker scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:permission_checker_service:s0 tclass=service_manager permissive=1

09-03 16:29:54.032   351   351 E SELinux : avc:  denied  { find } for pid=3914 uid=10217 name=phone scontext=u:r:euiccpixel_app:s0:c217,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=1

09-03 17:35:07.453   351   351 E SELinux : avc:  denied  { find } for pid=3914 uid=10217 name=nfc scontext=u:r:euiccpixel_app:s0:c217,c256,c512,c768 tcontext=u:object_r:nfc_service:s0 tclass=service_manager permissive=1

09-11 21:20:57.108 17450 17450 I auditd  : type=1400 audit(0.0:1055): avc:  denied  { read } for  comm="RenderThread" name="uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel

09-11 21:20:57.108 17450 17450 I auditd  : type=1400 audit(0.0:1056): avc:  denied  { open } for  comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel

09-11 21:20:57.108 17450 17450 I auditd  : type=1400 audit(0.0:1057): avc:  denied  { getattr } for  comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel

09-11 21:21:48.494 12343 12343 I auditd  : type=1400 audit(0.0:23): avc:  denied  { read write } for  comm=4173796E635461736B202331 name="st54spi" dev="tmpfs" ino=1573 scontext=u:r:euiccpixel_app:s0:c3,c257,c522,c768 tcontext=u:object_r:st54spi_device:s0 tclass=chr_file permissive=1

09-11 21:20:57.108 17450 17450 I auditd  : type=1400 audit(0.0:1056): avc:  denied  { read open } for  comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel

09-11 21:20:57.108 17450 17450 I auditd  : type=1400 audit(0.0:1057): avc:  denied  { getattr } for  comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46479 scontext=u:r:euiccpixel_app:s0:c246,c256,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.euiccpixel

09-13 17:55:20.904  3776  3776 I auditd  : type=1400 audit(0.0:1087): avc:  denied  { read } for  comm="RenderThread" name="uevent" dev="sysfs" ino=46480 scontext=u:r:euiccpixel_app:s0:c225,c256,c512,c768 tcontext=u:object_r:sysfs_gpu_uevent:s0 tclass=file permissive=0 app=com.google.euiccpixel

09-13 18:18:26.988  4029  4029 I auditd  : type=1400 audit(0.0:1077): avc:  denied  { open getattr } for  comm="RenderThread" path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=46480 scontext=u:r:euiccpixel_app:s0:c225,c256,c512,c768 tcontext=u:object_r:sysfs_gpu_uevent:s0 tclass=file permissive=0 app=com.google.euiccpixel

09-13 17:55:20.996  3776  3776 I auditd  : type=1400 audit(0.0:1090): avc:  denied  { read } for  comm="ogle.euiccpixel" name="u:object_r:default_prop:s0" dev="tmpfs" ino=164 scontext=u:r:euiccpixel_app:s0:c225,c256,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.google.euiccpixel

Bug: 361092897
Test: make selinux_policy, flash and test on 25' project
Flag: EXEMPT NDK
Change-Id: I8850fe0c1eae7dc575cb323d1f4a9234b7df82db
2024-09-13 14:09:38 +00:00
David Li
15c9c33a46 audio: add soong configs for debugging
Bug: 357140465
Test: mm
Flag: EXEMPT bugfix
Change-Id: Ib5f229135ccde98b21c6fde8efd9b9121b2a0159
2024-09-13 10:03:50 +00:00
Android Build Coastguard Worker
124caa5313 Snap for 12361654 from 194a58c7bb to 24Q4-release
Change-Id: I95922170a21294ef3ae2911b09406a2269df1fed
2024-09-12 23:01:39 +00:00
Treehugger Robot
194a58c7bb Merge "audio: allow set_prop for vendor_audio_prop_restricted" into main 2024-09-12 11:11:17 +00:00
Robert Lee
6902f81e2d audio: allow set_prop for vendor_audio_prop_restricted
Bug: 338910843
Test: manual test
Flag: EXEMPT sepolicy
Change-Id: Id8ad088512aca6cc939c25b5d747fbedeb4cd479
Signed-off-by: Robert Lee <lerobert@google.com>
2024-09-12 09:07:45 +00:00
cey
1331d97c92 Allow devices that use HIDL to find AIDL radio_ext_service
Move the type to a common sepolicy so it can be shared.

avc:  denied  { find } for pid=6493 uid=10256 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c0,c257,c512,c768 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0

NO_AVC_EVIDENCE_CHECK=default_android_service not supported

Bug: 365099058
Test: manual
Flag: EXEMPT mk file
Change-Id: I9c2471792c2a423e19f1472bd7923a5284f9127e
2024-09-12 16:17:33 +08:00
Android Build Coastguard Worker
b3b26dd18b Snap for 12354992 from df9178aaf4 to 24Q4-release
Change-Id: I4e8e485fb60b5ff2d9212f2f49e94277c3ce8d7f
2024-09-11 23:01:42 +00:00
Danh Nguyen
df9178aaf4 Merge "shamp: Update shared_modem_platform HAL version to 3" into main 2024-09-10 23:03:38 +00:00
Android Build Coastguard Worker
e7f58a6ca7 Snap for 12348750 from a85b95de5b to 24Q4-release
Change-Id: I2499b8a0bc8a1d03b812a8560aaefb5edc974056
2024-09-10 23:02:36 +00:00
Nishok Kumar S
a85b95de5b Merge "Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service, This is required for AHardwareBuffer allocation." into main 2024-09-10 06:02:09 +00:00
Android Build Coastguard Worker
5a96e406c4 Snap for 12342105 from eb22aeaaa8 to 24Q4-release
Change-Id: I416362df57b0e9e0eb02242e274bb0215554d28a
2024-09-09 23:02:00 +00:00
Andy Hsu
eb22aeaaa8 Merge "Add sepolicy for gcam app" into main 2024-09-09 08:57:21 +00:00
Nishok Kumar S
db15a0bcf2 Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service,
This is required for AHardwareBuffer allocation.

Attached avc error log in commit message:

E SELinux : avc:  denied  { find } for pid=820 uid=1000 name=android.hardware.graphics.allocator.IAllocator/default scontext=u:r:hal_neuralnetworks_darwinn:s0 tcontext=u:object_r:hal_graphics_allocator_service:s0 tclass=service_manager permissive=0

Bug: 361711471
Test: Flash private build, run CTS NNAPI tests.
Change-Id: I7850bd0c64974180cee206bfc43c25b70fac3f79
2024-09-09 06:32:45 +00:00
Randall Huang
69c69b2609 storage: fix ota selinux error
avc:  denied  { read write } for  pid=281 comm="update_engine_s" name="boot_lun_enabled" dev="sysfs" ino=99875 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
avc:  denied  { open } for  pid=281 comm="update_engine_s" path="/sys/devices/platform/3c400000.ufs/pixel/boot_lun_enabled" dev="sysfs" ino=99875 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1

Bug: 361093433
Test: OTA sideload
Change-Id: I7c92346d7ab08597d612e798d2252768eed124a2
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-09 12:48:43 +08:00
Randall Huang
9b9bee2c1a Storage: add sepolicy for recovery mode
avc:  denied  { search } for  pid=286 comm="fsck.f2fs" name="0:0:0:0" dev="sysfs" ino=100643 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc:  denied  { getattr } for  pid=286 comm="fsck.f2fs" path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda10/partition" dev="sysfs" ino=102318 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { read } for  pid=286 comm="fsck.f2fs" name="zoned" dev="sysfs" ino=101014 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { open } for  pid=286 comm="fsck.f2fs" path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=101014 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { read } for  pid=340 comm="fsck.f2fs" name="sda1" dev="tmpfs" ino=1060 scontext=u:r:fsck:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=0
avc:  denied  { read write } for  pid=340 comm="fsck.f2fs" name="sda1" dev="tmpfs" ino=1060 scontext=u:r:fsck:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=0

Bug: 361093433
Test: factory data reset
Change-Id: Idce44f75e8ef6f3e381fcdaa8c29831747ee0ecd
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-09 12:41:58 +08:00
Android Build Coastguard Worker
5b80b21269 Snap for 12337407 from 92f65e92ab to 25Q1-release
Change-Id: Id725b9026ade2ea898197f807e1d8ff90a174d66
2024-09-07 23:01:36 +00:00
Android Build Coastguard Worker
b92f611c88 Snap for 12337246 from 92f65e92ab to 24Q4-release
Change-Id: Ic8185bd6fed7f0d10fcf3683c178816e57059328
2024-09-07 21:01:43 +00:00
Xin Li
92f65e92ab [automerger skipped] Merge 24Q3 to AOSP main am: 3d9a037343 -s ours am: 1753d5c4df -s ours
am skip reason: Merged-In I14cff8dfe4e143995b9011cd34a1e7d74613ae33 with SHA-1 d1adbe0cb2 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3258121

Change-Id: I703ee8ce839d2e5412036ef723919ca010a89a47
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 06:09:36 +00:00
Xin Li
1753d5c4df [automerger skipped] Merge 24Q3 to AOSP main am: 3d9a037343 -s ours
am skip reason: Merged-In I14cff8dfe4e143995b9011cd34a1e7d74613ae33 with SHA-1 d1adbe0cb2 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3258121

Change-Id: I812aa14274c7353bf1322ca8aaedae71adc2a471
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 02:41:15 +00:00
Android Build Coastguard Worker
988e34aa3c Snap for 12335440 from c8a640f591 to 24Q4-release
Change-Id: I7d7b562d588c834d2369703aac31e71f9d774150
2024-09-07 02:32:07 +00:00
hwandy
6265f1f2eb Add sepolicy for gcam app
Bug: b/359815606.
Bug: b/363018500.
Flag: EXEMPT bugfix.
Test: Locally built selinux policy and a local GCAEng (go/ab/12329728) and run GCAEng and saw selinux policy denial message gone.

AVC evidence from b/363018500:

    08-27 22:57:12.442   340   340 I auditd  : avc:  denied  { find } for pid=15696 uid=10286 name=activity scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=0

    08-27 21:35:58.954   332   332 I auditd  : avc:  denied  { find } for pid=4055 uid=10286 name=media.audio_policy scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:audioserver_service:s0 tclass=service_manager permissive=1

    08-27 21:34:50.138   332   332 I auditd  : avc:  denied  { find } for pid=4055 uid=10286 name=media.camera scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:cameraserver_service:s0 tclass=service_manager permissive=1

    08-27 21:34:53.320   332   332 I auditd  : avc:  denied  { find } for pid=4055 uid=10286 name=media.extractor scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:mediaextractor_service:s0 tclass=service_manager permissive=1

    08-27 21:34:51.622   332   332 I auditd  : avc:  denied  { find } for pid=4055 uid=10286 name=media.metrics scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass=service_manager permissive=1

    08-27 21:35:59.012   332   332 I auditd  : avc:  denied  { find } for pid=4055 uid=10286 name=media.resource_manager scontext=u:r:debug_camera_app:s0:c30,c257,c512,c768 tcontext=u:object_r:mediaserver_service:s0 tclass=service_manager permissive=1

AVC evidence from go/ab/12328923:

09-06 11:16:24.421   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=netstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
09-06 11:16:24.627   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=shortcut scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:shortcut_service:s0 tclass=service_manager permissive=1
09-06 11:16:24.812 17252 17252 I GoogleCameraEng: type=1400 audit(0.0:1091): avc:  denied  { read } for  name="enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:24.812 17252 17252 I GoogleCameraEng: type=1400 audit(0.0:1092): avc:  denied  { open } for  path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.222   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=content_capture scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.220 17252 17252 I RenderThread: type=1400 audit(0.0:1093): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.220 17252 17252 I RenderThread: type=1400 audit(0.0:1094): avc:  denied  { open } for  path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.220 17252 17252 I RenderThread: type=1400 audit(0.0:1095): avc:  denied  { getattr } for  path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:16:25.877   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.902   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.920   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 11:16:25.928   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=performance_hint scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-06 11:16:26.060   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=clipboard scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
09-06 11:16:29.417   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=backup scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
09-06 11:16:29.484   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
09-06 11:17:01.249   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:01.306   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 11:17:01.495   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 11:17:02.330   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:05.916   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:07.826   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:09.579   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1164): avc:  denied  { read } for  name="gxp" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1165): avc:  denied  { open } for  path="/dev/gxp" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1166): avc:  denied  { ioctl } for  path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:10.580 17252 17252 I FinishThread: type=1400 audit(0.0:1167): avc:  denied  { write } for  name="gxp" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:11.692   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:13.696 17252 17252 I FinishThread: type=1400 audit(0.0:1177): avc:  denied  { ioctl } for  path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee00 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:15.443   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 11:17:20.159   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=uimode scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:uimode_service:s0 tclass=service_manager permissive=1
09-06 11:17:21.816 17252 17252 I FinishThread: type=1400 audit(0.0:1185): avc:  denied  { ioctl } for  path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee00 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:36.508 17252 17252 I FinishThread: type=1400 audit(0.0:1189): avc:  denied  { ioctl } for  path="/dev/gxp" dev="tmpfs" ino=1511 ioctlcmd=0xee00 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gxp_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 11:17:54.854   328   328 E SELinux : avc:  denied  { find } for pid=17252 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1

09-06 15:38:05.817   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=netstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.000   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=shortcut scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:shortcut_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.627   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=content_capture scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.634   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=gpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.640   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=activity_task scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.694   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=sensorservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.695   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=virtualdevice_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.728   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=device_policy scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.730   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=batterystats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.731   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=powerstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:powerstats_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.788   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=trust scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=1
09-06 15:38:06.869   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=device_state scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.052   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=vibrator_manager scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vibrator_manager_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.135   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=thermalservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.380   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.384   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.399   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.406   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=performance_hint scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-06 15:38:07.542   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=clipboard scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
09-06 15:38:10.834   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=backup scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
09-06 15:38:10.899   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=com.google.edgetpu.IEdgeTpuAppService/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_app_service:s0 tclass=service_manager permissive=1
09-06 15:38:10.913   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
09-06 15:38:27.247   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
09-06 15:38:27.612   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 15:38:27.866   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1
09-06 15:38:58.145   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=uimode scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:uimode_service:s0 tclass=service_manager permissive=1
09-06 15:38:59.592 12740 12740 I SEnhWorker: type=1400 audit(0.0:430): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:39:03.375   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=storagestats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:storagestats_service:s0 tclass=service_manager permissive=1
09-06 15:41:04.632 12740 12740 I RenderThread: type=1400 audit(0.0:470): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:04.632 12740 12740 I RenderThread: type=1400 audit(0.0:471): avc:  denied  { open } for  path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:04.632 12740 12740 I RenderThread: type=1400 audit(0.0:472): avc:  denied  { getattr } for  path="/sys/devices/platform/34f00000.gpu0/uevent" dev="sysfs" ino=45203 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:04.769   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 15:41:05.188 12740 12740 I MicrovideoQShar: type=1400 audit(0.0:474): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:17.532   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=legacy_permission scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:legacy_permission_service:s0 tclass=service_manager permissive=1
09-06 15:41:45.676 12740 12740 I MicrovideoQShar: type=1400 audit(0.0:535): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed1a scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:46.684 12740 12740 I GcaGeneric-4: type=1400 audit(0.0:540): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed19 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:41:48.288 12740 12740 I FinishThread: type=1400 audit(0.0:544): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed11 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:42:02.482   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 15:42:03.576 12740 12740 I GcaGeneric-4: type=1400 audit(0.0:565): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed19 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:42:06.947   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 15:42:06.955   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 15:42:07.652 12740 12740 I GcaGeneric-4: type=1400 audit(0.0:568): avc:  denied  { ioctl } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 ioctlcmd=0xed12 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1 app=com.google.android.GoogleCameraEng
09-06 15:42:08.903   343   343 E SELinux : avc:  denied  { find } for pid=12740 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 16:58:35.741   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=gpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
09-06 16:58:35.759   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=activity_task scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.142   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=sensorservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.142   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=virtualdevice_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:virtual_device_native_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.265   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=device_policy scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_policy_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.344   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=batterystats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:batterystats_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.344   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=trust scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.345   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=powerstats scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:powerstats_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.436   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=device_state scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:device_state_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.610   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=vibrator_manager scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vibrator_manager_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.640   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=thermalservice scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.785   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.944   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=voiceinteraction scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.946   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=autofill scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.955   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=sensitive_content_protection_service scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
09-06 16:58:36.962   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=performance_hint scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
09-06 16:58:37.147   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=clipboard scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:clipboard_service:s0 tclass=service_manager permissive=1
09-06 16:58:37.374  6263  6263 I binder:6263_6: type=1400 audit(0.0:2483): avc:  denied  { open } for  path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=392 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 16:58:37.374  6263  6263 I binder:6263_6: type=1400 audit(0.0:2484): avc:  denied  { getattr } for  path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=392 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 16:58:37.374  6263  6263 I binder:6263_6: type=1400 audit(0.0:2485): avc:  denied  { map } for  path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=392 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng
09-06 16:58:37.547   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=audio scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
09-06 16:58:37.949   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=backup scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:backup_service:s0 tclass=service_manager permissive=1
09-06 16:58:38.733   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=android.frameworks.stats.IStats/default scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
09-06 16:58:38.737   338   338 E SELinux : avc:  denied  { find } for pid=6263 uid=10289 name=package_native scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=1

09-06 17:18:32.828   697   697 I binder:697_2: type=1400 audit(0.0:1275): avc:  denied  { read write } for  path="/dev/edgetpu-soc" dev="tmpfs" ino=1511 scontext=u:r:debug_camera_app:s0:c33,c257,c512,c768 tcontext=u:object_r:edgetpu_device:s0 tclass=chr_file permissive=1

Change-Id: I243f6242968fdc24478e923e8d30e529939b8a57
2024-09-07 01:16:23 +00:00
Robin Peng
c8a640f591 check_current_prebuilt: Symlink current prebuilt folder to android root
The Android are now based on Trunk Stable world and Pixel prebuilts CLs
also needs to reply with this which controlled by the flag which results:
- the flag value might be different on each branches
- the flag value are mostly different on each release configuration
- for local builds, ENGs' needs to figure out the correct location
  of current prebuilts by checking through entire prebuilt textproto
  files

To alleviate this problem, create an symlink file under android root
indicates current prebuilt path after invoke the android lunch cmd.

Bug: 364831620
Flag: EXEMPT export current prebuilt path
Change-Id: Idd130a70815fe1fe5288b003c5edb6979fd4c88c
Signed-off-by: Robin Peng <robinpeng@google.com>
2024-09-06 09:35:30 +00:00
Neo Yu
ab39c35ee2 Merge "Separate GRIL sepolicy for AIDL and HIDL by folders" into main 2024-09-06 01:41:13 +00:00
Xin Li
3d9a037343 Merge 24Q3 to AOSP main
Bug: 357762254
Merged-In: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Change-Id: Ic2a51a2ac1a142369dd49e4b6eb0dd37c32f1383
2024-09-05 17:02:37 -07:00
Android Build Coastguard Worker
c06c9d88d2 Snap for 12327203 from 19ab72a3de to 24Q4-release
Change-Id: Ie125c53bf36bd3d072c70df97977659c1b8883fa
2024-09-05 23:01:48 +00:00
danhtn
116b9d5ec1 shamp: Update shared_modem_platform HAL version to 3
Bug: 322731425

ag/29120584 provides a new V3 version

Test: `atest vts_treble_vintf_vendor_test:DeviceManifest/SingleAidlTest#HalIsServed/com_google_pixel_shared_modem_platform_ISharedModemPlatform_default_V1_84`
Flag: EXEMPT can't flag manifest changes

Change-Id: Ia91d7499f218a733906173e388a287cd591b8c01
2024-09-05 20:51:22 +00:00
Kieran Cyphus
19ab72a3de Merge "shamp: Update shared_modem_platform HAL version to 2" into main 2024-09-05 18:17:58 +00:00
Thomas Flucke
02f64cf99f dumpstate: gsa: Add GSA logs to dumpstate
New Stuff:
* Add program to read the GSA logs

Evidence:
avc:  denied  { read } for  comm="dump_gsa" name="gsa-log1" dev="tmpfs" ino=1261 scontext=u:r:dump_gsa:s0 tcontext=u:object_r:gsa_log_device:s0 tclass=chr_file permissive=0
avc:  denied  { read } for  comm="dump_gsa" name="gsa-bl1-log2" dev="tmpfs" ino=1222 scontext=u:r:dump_gsa:s0 tcontext=u:object_r:gsa_log_device:s0 tclass=chr_file permissive=0

Bug: 360205716
Test: adb shell dumpstate and check the dumpstate_board.txt for GSA logs
Flag: EXEMPT debug only
Change-Id: I4ea35da7916273cf526570067f24145ef4fb14f1
Signed-off-by: Thomas Flucke <tflucke@google.com>
2024-09-05 14:24:35 +00:00
Treehugger Robot
c1cdcbaeed Merge "storage: fix vold avc denied" into main 2024-09-05 09:42:34 +00:00
Randall Huang
0440e82770 storage: fix vendor_init avc denied
avc:  denied  { write } for  comm="init" name="swappiness" dev="proc" ino=207356 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc_dirty:s0 tclass=file permissive=1

Bug: 361093041
Test: local build
Change-Id: I595008f957c322aedbdf383c4e50c0e0ce30b9dc
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-05 08:42:30 +00:00
Randall Huang
24568c64d1 storage: fix vold avc denied
[   33.709752][  T363] type=1400 audit(1725519791.892:729): avc:  denied  { read } for  comm="binder:369_6" name="/" dev="sda5" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   33.710804][  T363] type=1400 audit(1725519791.892:730): avc:  denied  { open } for  comm="binder:369_6" path="/mnt/vendor/efs" dev="sda5" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   33.711734][  T363] type=1400 audit(1725519791.892:731): avc:  denied  { ioctl } for  comm="binder:369_6" path="/mnt/vendor/efs" dev="sda5" ino=3 ioctlcmd=0x5879 scontext=u:r:vold:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   33.712732][  T363] type=1400 audit(1725519791.892:732): avc:  denied  { read } for  comm="binder:369_6" name="/" dev="sda7" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   33.713612][  T363] type=1400 audit(1725519791.892:733): avc:  denied  { open } for  comm="binder:369_6" path="/mnt/vendor/modem_userdata" dev="sda7" ino=3 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   33.714833][  T363] type=1400 audit(1725519791.892:734): avc:  denied  { ioctl } for  comm="binder:369_6" path="/mnt/vendor/modem_userdata" dev="sda7" ino=3 ioctlcmd=0x5879 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1

Bug: 361093041
Test: local build
Change-Id: I629f0303940f3f07ce3717cd0a2c8f975378f24b
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-05 08:42:25 +00:00
Randall Huang
bce5748b4f storage: fix adb bugreport and refactor the existing rules
avc: denied { getattr } for comm="df" path="/mnt/vendor/persist" dev="sda15" ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
avc: denied { call } for comm="binder:10121_3" scontext=u:r:dumpstate:s0 tcontext=u:r:vold:s0 tclass=binder permissive=1
avc: denied { getattr } for comm="df" path="/mnt/vendor/efs" dev="sda5" ino=3 scontext=u:r:dumpstate:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
avc: denied { getattr } for comm="df" path="/mnt/vendor/modem_userdata" dev="sda7" ino=3 scontext=u:r:dumpstate:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1

Bug: 361093041
Test: local build
Change-Id: I5c6be63beebf66d64db7e495c28493ab35621054
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-05 16:39:22 +08:00
Randall Huang
4391ba797c Merge "storage: fix PowerStats avc denied" into main 2024-09-05 06:24:35 +00:00
Randall Huang
9d99d1d598 storage: fix PowerStats avc denied
avc:  denied  { search } for  name="ufs_stats" dev="sysfs" ino=99872 scontext=u:r:hal_power_stats_default:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc:  denied  { open } for  comm="android.hardwar" path="/sys/devices/platform/3c400000.ufs/host0/target000/0000/block/sda/stat" dev="sysfs" ino=100761 scontext=urhal_health_default
avc:  denied  { getattr } for  comm="android.hardwar" path="/sys/devices/platform/3c400000.ufs/host0/target000/0000/block/sda/stat" dev="sysfs" ino=100761 scontext=urhal_health_default
avc:  denied  { search } for  comm="android.hardwar" name="0000" dev="sysfs" ino=100578 scontext=urhal_health_defaults0 tcontext=uobject_r
avc:  denied  { read } for  comm="android.hardwar" name="stat" dev="sysfs" ino=100761 scontext=urhal_health_defaults0 tcontext=uobject_rsysfs_scsi_devices_0000s0 tclass=file permissive=1
avc:  denied  { search } for  comm="android.hardwar" name="0000" dev="sysfs" ino=100578 scontext=urhal_health_defaults0 tcontext=uobject_r
avc:  denied  { read } for  comm="android.hardwar" name="stat" dev="sysfs" ino=100761 scontext=urhal_health_defaults0 tcontext=uobject_rsysfs_scsi_devices_0000s0 tclass=file permissive=1

Bug: 361093041
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: I94dadb9b9fc015fd1ecc39f9d62bc7209375a13a
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-05 04:10:53 +00:00
Sam Ou
2fdeb6aed7 Merge "sepolicy: fix dump_power policy" into main 2024-09-05 04:01:07 +00:00
Randall Huang
cacedb4ae8 storage: move sepolicy to common folder
avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0

Bug: 361093041
Test: local build
Change-Id: I90d29590908efc329a05bd8f5f3e145dac4982fc
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-05 10:48:44 +08:00
Android Build Coastguard Worker
fa12e08e98 Snap for 12319997 from d3977c94ad to 24Q4-release
Change-Id: If4d8990287e9ae871226a7ebc10c10b30a9044a7
2024-09-04 23:02:18 +00:00
Kieran Cyphus
94ef296dae shamp: Update shared_modem_platform HAL version to 2
Bug: 364363838

ag/28965951 accidentally started providing a V2 when the manifests only said V1 which broke some VTS tests.

Test: `atest vts_treble_vintf_vendor_test:DeviceManifest/SingleAidlTest#HalIsServed/com_google_pixel_shared_modem_platform_ISharedModemPlatform_default_V1_84`
Flag: EXEMPT can't flag manifest changes

Change-Id: I17113f86e9bceaa3efe2f0d4d76e8349fe2c456e
2024-09-04 21:29:37 +00:00
Kiwon Park
d3977c94ad Merge "Add eSIM directory and disable bootstrap when bootloader is unlocked in user build" into main 2024-09-04 16:55:20 +00:00
Neo Yu
0ca7adab01 Separate GRIL sepolicy for AIDL and HIDL by folders
Related avc error:

aidl part:
avc:  denied  { find } for pid=2019 uid=10269 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c13,c257,c512,c768 tcontext=u:object_r:hal_aidl_radio_ext_service:s0 tclass=service_manager permissive=1

avc:  denied  { read write } for  comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1

avc:  denied  { search } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1


hidl part:
avc:  denied  { read write } for  comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

avc:  denied  { search } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_radioext_default:s0 pid=792 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_radioext_default:s0 pid=792 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1

Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I0fb75f7f9c7339864ee303c0f1de3b218ceb81ed
2024-09-04 16:54:15 +00:00
Devika Krishnadas
76ca89b967 Add GPU team owners for mk files am: 1d82070ee9 am: 9747c1bb8d
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3252915

Change-Id: Ifdcf32d2555f28851739c53019e9bec4dfc13167
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-04 16:49:25 +00:00
Devika Krishnadas
9747c1bb8d Add GPU team owners for mk files am: 1d82070ee9
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3252915

Change-Id: I12c5349ad38ca36302996f139dac08114cbea42a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-04 16:39:39 +00:00
samou
202f18ed18 sepolicy: fix dump_power policy
09-03 10:57:32.552 11878 11878 W dump_power: type=1400 audit(0.0:23): avc:  denied  { read } for  name="thismeal.txt" dev="dm-51" ino=14368 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=0
09-05 00:01:19.432  6967  6967 W dump_power: type=1400 audit(0.0:25): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-52" ino=14368 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=0
09-05 00:11:25.532  6913  6913 W dump_power: type=1400 audit(0.0:25): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-52" ino=14368 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=0

Flag: EXEMPT refactor
Bug: 364612419
Change-Id: Ide2ad35e3f2a5bc3246603a4e66b67ec901ddc64
Signed-off-by: samou <samou@google.com>
2024-09-04 16:15:06 +00:00
Treehugger Robot
52f7c66ea0 Merge "gs-common: nfc: st21nfc: Add rules for android.hardware.nfc-service.st" into main 2024-09-04 08:54:32 +00:00
Snehal Koukuntla
13e34cc96a Merge "Add widevine SELinux permissions" into main 2024-09-04 08:42:49 +00:00
Kyle Hsiao
a0681a7b7a gs-common: nfc: st21nfc: Add rules for android.hardware.nfc-service.st
sepolicy for android.hardware.nfc-service.st

Flag: EXEMPT NDK
Bug: 361093394
Test: manual
Change-Id: Ibe90555a6ec9b13fb2cd8eae4131216d3240ec3a
2024-09-04 06:20:49 +00:00
Randall Huang
6ec23c152f storage: move storage related device type to common folder
Bug: 364225000
Test: forrest build
Change-Id: Ica102c5a1ec45560939ac32c3ec22e721659c3cf
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:43:47 +08:00
Android Build Coastguard Worker
7f8d413a40 Snap for 12313714 from 019cc571f4 to 24Q4-release
Change-Id: I32d5a2ce7c74d01ed67e3bd0461eba6d6c6be1e7
2024-09-03 23:01:53 +00:00
Devika Krishnadas
1d82070ee9 Add GPU team owners for mk files
Bug: 275906497
Flag: EXEMPT only changing OWNERS
Change-Id: Ife6cdfd5097c6c50e0276ea3a70552e9feeb76a8
Signed-off-by: Devika Krishnadas <kdevika@google.com>
2024-09-03 22:49:19 +00:00
Snehal
bd3767ae16 Add widevine SELinux permissions
15992 15992 I exoplayer2.demo: type=1400 audit(0.0:1934): avc:  denied  { call } for  scontext=u:r:untrusted_app_29:s0:c36,c257,c512,c768 tcontext=u:r:hal_drm_clearkey:s0 tclass=binder permissive=1 app=com.google.android.exoplayer2.demo

15992 15992 I exoplayer2.demo: type=1400 audit(0.0:1935): avc:  denied  { call } for  scontext=u:r:untrusted_app_29:s0:c36,c257,c512,c768 tcontext=u:r:hal_drm_widevine:s0 tclass=binder permissive=1 app=com.google.android.exoplayer2.demo

860   860 I android.hardwar: type=1400 audit(0.0:4302): avc:  denied  { write } for  name="mediadrm" dev="dm-57" ino=2565 scontext=u:r:hal_drm_widevine:s0 tcontext=u:object_r:mediadrm_vendor_data_file:s0 tclass=dir permissive=1

860   860 I android.hardwar: type=1400 audit(0.0:4304): avc:  denied  { create } for  name="IDM1013" scontext=u:r:hal_drm_widevine:s0 tcontext=u:object_r:mediadrm_vendor_data_file:s0 tclass=dir permissive=1

Bug: 363182767
Bug: 363181505

Flag: EXEMPT bugfix

Change-Id: Ia8c3ba3d7fe9f09ceb40fd2b6ae88bbbcf5ac6f6
2024-09-03 13:40:57 +00:00
George Chang
019cc571f4 Merge "gs-common: nfc: st54spi: Add rules for hal_secure_element_st54spi_aidl" into main 2024-09-03 11:33:00 +00:00
Treehugger Robot
90f357aa8d Merge "Storage: add selinux for ufs firmware upgrade event" into main 2024-09-03 03:36:51 +00:00
Android Build Coastguard Worker
3e22674416 Snap for 12309590 from 4c672d13c9 to 24Q4-release
Change-Id: I20e11f2f2a172737231b55e971c9dc54b2096b9c
2024-09-02 23:01:48 +00:00
Randall Huang
0f4a0bb8a2 Storage: add selinux for ufs firmware upgrade event
avc:  denied  { execute_no_trans } for  comm="ufs_firmware_up" path="/vendor/bin/toybox_vendor" dev="dm-11" ino=380 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
avc:  denied  { read } for  comm="cat" name="vendor" dev="sysfs" ino=63193 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { open } for  comm="cat" path="/sys/devices/platform/13200000.ufs/vendor" dev="sysfs" ino=63193 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { search } for  comm="dd" name="block" dev="tmpfs" ino=12 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
avc:  denied  { write } for  comm="dd" name="sda12" dev="tmpfs" ino=1139 scontext=u:r:ufs_firmware_update:s0 tcontext=u:object_r:ufs_internal_block_device:s0 tclass=blk_file permissive=1

Bug: 361093041
Test: NA
Change-Id: I54445d4543a733baae85cd408b433033dd93ec6b
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-02 22:33:03 +00:00
Cheng Chang
4c672d13c9 Merge "gps: Allow gnss hal access vendor_gps_prop" into main 2024-09-02 07:38:45 +00:00
George Chang
cf2d68668f gs-common: nfc: st54spi: Add rules for hal_secure_element_st54spi_aidl
sepolicy for android.hardware.secure_element-service.thales

08-26 12:49:43.959   343   343 E SELinux : avc:  denied  { add } for pid=706 uid=1068 name=android.hardware.secure_element.ISecureElement/eSE1 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:hal_secure_element_service:s0 tclass=service_manager permissive=1
08-26 12:49:43.936   706   706 I android.hardwar: type=1400 audit(0.0:9): avc:  denied  { call } for  scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
08-26 12:49:43.936   706   706 I android.hardwar: type=1400 audit(0.0:10): avc:  denied  { transfer } for  scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
08-26 12:49:59.904     1     1 I /system/bin/init: type=1107 audit(0.0:139): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc:  denied  { set } for property=persist.vendor.se.reset pid=706 uid=1068 gid=1068 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=1'
08-26 12:50:12.124   706   706 I android.hardwar: type=1400 audit(0.0:461): avc:  denied  { read write } for  name="st54spi" dev="tmpfs" ino=1552 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:st54spi_device:s0 tclass=chr_file permissive=1
08-26 12:50:12.124   706   706 I android.hardwar: type=1400 audit(0.0:462): avc:  denied  { open } for  path="/dev/st54spi" dev="tmpfs" ino=1552 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:st54spi_device:s0 tclass=chr_file permissive=1
08-26 16:33:44.332   737   737 I android.hardwar: type=1400 audit(0.0:959): avc:  denied  { read write } for  name="st21nfc" dev="tmpfs" ino=1550 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file permissive=1
08-26 16:33:44.332   737   737 I android.hardwar: type=1400 audit(0.0:960): avc:  denied  { open } for  path="/dev/st21nfc" dev="tmpfs" ino=1550 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file permissive=1
08-26 16:33:44.332   737   737 I android.hardwar: type=1400 audit(0.0:961): avc:  denied  { ioctl } for  path="/dev/st21nfc" dev="tmpfs" ino=1550 ioctlcmd=0xea05 scontext=u:r:hal_secure_element_st54spi_aidl:s0 tcontext=u:object_r:nfc_device:s0 tclass=chr_file permissive=1

Flag: EXEMPT NDK
Bug: 361093024
Test: manual
Change-Id: I1f3aebc9894de9f3410f2031e2b99e07d4060fa5
2024-09-02 06:37:19 +00:00
Attis Chen
e5c668587d Merge "Add dump of panel power_mode." into main 2024-09-02 04:54:18 +00:00
Android Build Coastguard Worker
cf6c0cdf42 Snap for 12306720 from a13a1663fd to 24Q4-release
Change-Id: If99865fcd5374862c1967cc823756257fa2501b9
2024-09-01 21:01:37 +00:00
Martin Liu
a13a1663fd [automerger skipped] Move compaction_proactiveness to vendor sepolicy am: d1adbe0cb2 -s ours
am skip reason: Merged-In I14cff8dfe4e143995b9011cd34a1e7d74613ae33 with SHA-1 d6d4a779e5 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/29091424

Change-Id: Ied82c7da10415424f42bd7101bbe7c6ece892f0b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-01 15:28:58 +00:00
Martin Liu
d1adbe0cb2 Move compaction_proactiveness to vendor sepolicy
Move compaction_proactiveness sepolicy from the system
to vendor since it breaks other vendors.

Bug: 361985704
Test: check knob value
Flag: NONE sepolicy doesn't support flag
Change-Id: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Merged-In: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Signed-off-by: Martin Liu <liumartin@google.com>
2024-09-01 08:06:04 +00:00
Android Build Coastguard Worker
0eba224456 Snap for 12304452 from d1dfe55442 to 24Q4-release
Change-Id: I6b4d7ec206c59326c4d08e579130e1c467396ed9
2024-08-31 01:01:59 +00:00
Kiwon Park
69797e03ca Add eSIM directory and disable bootstrap when bootloader is unlocked in user build
Allow vendor_init to set setupwizard prop
Allow priv_app and gmscore_app to get setupwizard prop
<11>[    7.276992][  T329] init: Unable to set property 'setupwizard.feature.provisioning_profile_mode' from uid:0 gid:0 pid:330: SELinux permission check failed

08-28 15:35:42.536 10156  5884  5884 W oid.setupwizard: type=1400 audit(0.0:63): avc:  denied  { read } for  name="u:object_r:setupwizard_feature_prop:s0" dev="tmpfs" ino=335 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:setupwizard_feature_prop:s0 tclass=file permissive=0 app=com.google.android.setupwizard

08-28 15:11:52.015 10185  6915  6915 W highpool[8]: type=1400 audit(0.0:17): avc:  denied  { read } for  name="u:object_r:setupwizard_feature_prop:s0" dev="tmpfs" ino=339 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:setupwizard_feature_prop:s0 tclass=file permissive=0 app=com.google.android.gms

Bug: 349592724
Test: m
Change-Id: I8330c9f6f9efd215ec4ea1f7d3d6ff5596773e21
Flag: NONE disabling a feature just in factory
2024-08-30 10:28:16 -07:00
Treehugger Robot
d1dfe55442 Merge "Move compaction_proactiveness to vendor sepolicy" into main 2024-08-30 10:50:43 +00:00
Dennis Song
c9fb05a230 [automerger skipped] Explicitly set user root for the gs_watchdogd service. am: f25cb6895f am: 6c82faf70b -s ours
am skip reason: Merged-In I36a3a67dc357f608b33a131a4e5f6fd6defb91e5 with SHA-1 c0b820e056 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3250951

Change-Id: I0e5a8cbb986a06a2e55ab58ee1c80b53fca96f2b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-30 09:58:38 +00:00
Dennis Song
6c82faf70b Explicitly set user root for the gs_watchdogd service. am: f25cb6895f
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3250951

Change-Id: I58b8abe45d82b6ea620d6e623c4716785a992c76
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-30 09:29:18 +00:00
Dennis Song
f25cb6895f Explicitly set user root for the gs_watchdogd service.
Otherwise host_init_verifier would fail.

Bug: 362447627
Test: Treehugger
Merged-In: I36a3a67dc357f608b33a131a4e5f6fd6defb91e5
Change-Id: I36a3a67dc357f608b33a131a4e5f6fd6defb91e5
2024-08-30 08:27:36 +00:00
Dennis Song
37238f4cff Merge "Explicitly set user root for the gs_watchdogd service." into main 2024-08-30 08:24:56 +00:00
Martin Liu
d6d4a779e5 Move compaction_proactiveness to vendor sepolicy
Move compaction_proactiveness sepolicy from the system
to vendor since it breaks other vendors.

Bug: 361985704
Test: check knob value
Flag: NONE sepolicy doesn't support flag
Change-Id: I14cff8dfe4e143995b9011cd34a1e7d74613ae33
Signed-off-by: Martin Liu <liumartin@google.com>
2024-08-30 07:21:16 +00:00
Cheng Chang
f71ff2ba7c gps: Allow gnss hal access vendor_gps_prop
avc:  denied  { read } for  name="u:object_r:vendor_gps_prop:s0" dev="tmpfs" ino=421 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_prop:s0 tclass=file permissive=0

Bug: 335354369
Test: Check avc logcat.
Change-Id: Idfc885c6d54a9a5160643ff53f3e278ee067b286
2024-08-30 06:05:32 +00:00
Tommy Chiu
15ed5c639e Move PRODUCT_COPY_FILES from each board>device-vendor.mk here
We used to put the firmware copy logic in dedicated device-vendor.mk
files for each platform. This approach is difficult to maintain and
unnecessary since we always want to deploy the latest firmware.
Propose a better approach for handling firmware copy logic.

Flag: EXEMPT refactor
Bug: 359071523
Test: Build pass
Change-Id: I4169353b9f8f16b82eb0e4ebf2a884f46e1a5f8b
2024-08-30 04:28:47 +00:00
Dennis Song
c0b820e056 Explicitly set user root for the gs_watchdogd service.
Otherwise host_init_verifier would fail.

Bug: 362447627
Test: Treehugger
Flag: EXEMPT bugfix
Change-Id: I36a3a67dc357f608b33a131a4e5f6fd6defb91e5
2024-08-30 03:42:06 +00:00
Android Build Coastguard Worker
dff8cf2015 Snap for 12296955 from 1ae1d53973 to 24Q4-release
Change-Id: Ifdbe1caaecb247508051bcb86cccf0423535df84
2024-08-29 23:01:35 +00:00
Randall Huang
1ae1d53973 Merge "storage: fix idle-maint avc denials." into main 2024-08-29 02:51:57 +00:00
Treehugger Robot
d9667c65f6 Merge "storage: allow mkfs/fsck for vendor partitons" into main 2024-08-29 02:51:23 +00:00
Frank Yu
d03036bdef Merge "Move hal_radio_ext_service related policy of grilservice_app to gs-common." into main 2024-08-29 01:52:23 +00:00
Randall Huang
df4a5f7b48 storage: allow mkfs/fsck for vendor partitons
avc:  denied  { read } for  name="sda7" dev="tmpfs" ino=1173 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { open } for  path="/dev/block/sda7" dev="tmpfs" ino=1173 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { write } for  name="sda7" dev="tmpfs" ino=1173 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { ioctl } for  path="/dev/block/sda7" dev="tmpfs" ino=1173 ioctlcmd=0x1268 scontext=u:r:fsck:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { read } for  name="sda5" dev="tmpfs" ino=1010 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { open } for  path="/dev/block/sda5" dev="tmpfs" ino=1010 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { open } for  path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=100275 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
avc:  denied  { write } for  name="sda5" dev="tmpfs" ino=1010 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { ioctl } for  path="/dev/block/sda5" dev="tmpfs" ino=1010 ioctlcmd=0x1268 scontext=u:r:fsck:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { search } for  name="0:0:0:0" dev="sysfs" ino=100048 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc:  denied  { getattr } for  path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=101272 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { read } for  name="zoned" dev="sysfs" ino=100308 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { open } for  path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=100308 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1

avc:  denied  { search } for  name="0:0:0:0" dev="sysfs" ino=100048 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
avc:  denied  { getattr } for  path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda10/partition" dev="sysfs" ino=102003 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { read } for  name="zoned" dev="sysfs" ino=100308 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { open } for  path="/sys/devices/platform/3c400000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=100308 scontext=u:r:e2fs:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
avc:  denied  { read } for  name="sda5" dev="tmpfs" ino=1004 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { open } for  path="/dev/block/sda5" dev="tmpfs" ino=1004 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { write } for  name="sda5" dev="tmpfs" ino=1004 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { ioctl } for  path="/dev/block/sda5" dev="tmpfs" ino=1004 ioctlcmd=0x1268 scontext=u:r:e2fs:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { read } for  name="sda7" dev="tmpfs" ino=1199 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { open } for  path="/dev/block/sda7" dev="tmpfs" ino=1199 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { write } for  name="sda7" dev="tmpfs" ino=1199 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
avc:  denied  { ioctl } for  path="/dev/block/sda7" dev="tmpfs" ino=1199 ioctlcmd=0x1268 scontext=u:r:e2fs:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1


Bug: 361093041
Test: build pass
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:0cf7210eb1b5ba1d22fb8dcb59f40cb74b98dd37)
Change-Id: I0d89d360e75335784116a4e4769d0b60699917eb
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-08-29 01:10:11 +00:00
Randall Huang
d6ba7fad68 storage: fix idle-maint avc denials.
avc: denied { getattr } for path="/dev/block/sda5" dev="tmpfs" ino=1039 scontext=u:r:vold:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
avc: denied { getattr } for path="/dev/block/sda7" dev="tmpfs" ino=1199 scontext=u:r:vold:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1

Bug: 361093041
Test: run idle-maint run
Change-Id: Ie92ffa8b576c74e3a1cb127b265059ec76c14667
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-08-29 00:00:09 +00:00
Ernie Hsu
714dc8abf8 Merge "mediacodec: fix perfetto trace permission" into main 2024-08-28 23:33:40 +00:00
Prochin Wang
a8910cb36b Merge "Label touch_property_type to associate with vendor_gti_prop" into main 2024-08-28 23:21:38 +00:00
Prochin Wang
956edf0d26 Label touch_property_type to associate with vendor_gti_prop
Pass ROM build of all git_main targets:
https://android-build.googleplex.com/builds/abtd/run/L52500030006128092/
https://android-build.corp.google.com/abtd/run/L93900030006078492/
https://android-build.corp.google.com/abtd/run/L15800030006086232/
https://android-build.corp.google.com/abtd/run/L27700030006086619/

Bug: 361237875
Test: mm and flash rom
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Change-Id: I518ff7c05fc1fa279cd7300cb77673a86ff3e35b
2024-08-28 23:20:52 +00:00
Android Build Coastguard Worker
2583351232 Snap for 12289667 from 13883d9a54 to 24Q4-release
Change-Id: I2890d977eedcaf8418bb8404c8ec0a45cd12830d
2024-08-28 23:02:15 +00:00
Bryan Bong Gyoune Kim
d1f646d258 Merge "bootctrl: fixed OOB read in BootControl" into main 2024-08-28 20:59:25 +00:00
bgkim
b584b9c7e0 bootctrl: fixed OOB read in BootControl
Fixed OOB read in BootControl::isSlotMarkedSuccessful() by checking
if "in_slot" is negative

Flag: EXEMPT bugfix
Test: tested on Husky device
Bug: 353516777
Change-Id: I634c32a8c12403008fe5a724bc447f82931ae9c5
Signed-off-by: bgkim <bgkim@google.com>
2024-08-28 12:44:34 -07:00
Ernie Hsu
d35b61f390 mediacodec: fix perfetto trace permission
08-28 16:33:56.280  1046   720   720 I auditd  : type=1400 audit(0.0:469): avc:  denied  { write } for  comm="TracingMuxer" name="traced_producer" dev="tmpfs" ino=1604 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:traced_producer_socket:s0 tclass=sock_file permissive=0

Flag: EXEMPT bugfix
Test: atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Bug: 361093311
Change-Id: I0aad9d771069cd0d660708e41c29c79d83e04704
2024-08-28 10:27:52 +00:00
Ernie Hsu
13883d9a54 mediacodec: fix permission for vendor_media_data and ecoservice
vendor_media_data:
08-27 12:07:01.540   747   747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1785): avc:  denied  { search } for  comm=436F646563322E30204C6F6F706572 name="media" dev="dm-57" ino=399 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=dir permissive=1
08-27 12:07:01.540   747   747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1786): avc:  denied  { write } for  comm=436F646563322E30204C6F6F706572 name="media" dev="dm-57" ino=399 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=dir permissive=1
08-27 12:07:01.540   747   747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1787): avc:  denied  { add_name } for  comm=436F646563322E30204C6F6F706572 name="input_7335.bin" scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=dir permissive=1
08-27 12:07:01.540   747   747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1788): avc:  denied  { create } for  comm=436F646563322E30204C6F6F706572 name="input_7335.bin" scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=file permissive=1
08-27 12:07:01.540   747   747 I /vendor/bin/hw/google.hardware.media.c2@3.0-service: type=1400 audit(0.0:1789): avc:  denied  { append open } for  comm=436F646563322E30204C6F6F706572 path="/data/vendor/media/input_7335.bin" dev="dm-57" ino=26749 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:vendor_media_data_file:s0 tclass=file permissive=1

ecoservice:
08-27 13:07:44.686   358   358 E SELinux : avc:  denied  { find } for pid=743 uid=1046 name=media.ecoservice scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:eco_service:s0 tclass=service_manager permissive=1

Flag: EXEMPT bugfix
Test: video playback and screen record
Bug: 361093311
Change-Id: I37d5081061bad2917b24e320f4e4a9c8116db6fa
2024-08-28 07:16:06 +00:00
Treehugger Robot
e341a7fc8f Merge "switch waves prebuilt version" into main 2024-08-28 03:14:32 +00:00
Android Build Coastguard Worker
e2a9c523c5 Snap for 12283639 from a01bc1d315 to 24Q4-release
Change-Id: I28edd756418051c880e912bf9f10c591ecbcc9bb
2024-08-27 23:02:11 +00:00
Frank Yu
e6358c91de Move hal_radio_ext_service related policy of grilservice_app to gs-common.
Related avc error:

avc:  denied  { find } for pid=2227 uid=10259 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c3,c257,c512,c768 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0

avc:  denied  { call } for  comm="oid.grilservice" scontext=u:r:grilservice_app:s0:c3,c257,c512,c768 tcontext=u:r:hal_radioext_default:s0 tclass=binder permissive=0 app=com.google.android.grilservice

Bug: 361210953
Change-Id: Ibb8a341847b0772668b52bc01f2d087bf1874fe9
Test: Verify with test ROM
Flag: EXEMPT sepolicy refactor
2024-08-27 12:10:52 +00:00
Ernie Hsu
a01bc1d315 mediacodec: fix vpu device sepolicy for video playback
08-27 11:30:17.500   734   734 I binder:734_4: type=1400 audit(0.0:1288): avc:  denied  { read write } for  name="vpu" dev="tmpfs" ino=1585 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:17.500   734   734 I binder:734_4: type=1400 audit(0.0:1289): avc:  denied  { open } for  path="/dev/vpu" dev="tmpfs" ino=1585 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:17.500   734   734 I binder:734_4: type=1400 audit(0.0:1290): avc:  denied  { ioctl } for  path="/dev/vpu" dev="tmpfs" ino=1585 ioctlcmd=0x4200 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:17.500   734   734 I binder:734_4: type=1400 audit(0.0:1291): avc:  denied  { map } for  path="/dev/vpu" dev="tmpfs" ino=1585 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1
08-27 11:30:18.944   734   734 I FetchThread: type=1400 audit(0.0:1292): avc:  denied  { ioctl } for  path="/dev/vpu" dev="tmpfs" ino=1585 ioctlcmd=0x4207 scontext=u:r:mediacodec_google:s0 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=1

Bug: 353638738
Flag: EXEMPT bugfix
Test: video playback
Change-Id: I8ad4507693a4a0fbbd2709bd79d25b1ef4109904
2024-08-27 05:29:18 +00:00
Android Build Coastguard Worker
42ca11148b Snap for 12278291 from e4506b0159 to 24Q4-release
Change-Id: I4aa90193edf11cb1efe3c800184f8c022a239d96
2024-08-26 23:01:45 +00:00
attis
44f21d0c43 Add dump of panel power_mode.
Add the power_mode sysfs node to dump_second_display.cpp and
dump_display.cpp.

Bug: 358505990
Flag: EXEMPT bugfix
Test: adb bugreport.
Change-Id: I875b9a3ef416c188376eb2f9226996b6645ccdb9
Signed-off-by: attis <attis@google.com>
2024-08-26 12:13:48 +00:00
Randall Huang
e4506b0159 storage: extend cmd_logging sepolicy to new ufshc
Bug: 361093041
Test: check ls -Zl
Change-Id: Ia461f47562932a7dad1c114f7b3e11e5fa0d312c
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-08-26 09:53:10 +08:00
Jasmine Cha
3d6169d30b switch waves prebuilt version
Flag: EXEMPT bringup waves
Bug: 352461861
Test: manual test

Change-Id: Ic7a826d98a77ccb579594a9fb7db1df5d62e99aa
Signed-off-by: Jasmine Cha <chajasmine@google.com>
2024-08-26 01:28:12 +00:00
Android Build Coastguard Worker
b3ebc1cbfe Snap for 12272146 from 81654643af to 24Q4-release
Change-Id: I616bb7fb9e66bbe33eb8ec7029b1c4eeaa9aaba2
2024-08-24 01:01:48 +00:00
Sam Ou
81654643af Merge "sepolicy: allow dumpstate to execute dump_power" into main 2024-08-23 10:58:34 +00:00
samou
c078a870cb sepolicy: allow dumpstate to execute dump_power
08-22 09:10:30.200  7202  7202 I dump_power: type=1400 audit(0.0:830): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=24831 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
08-22 09:10:30.200  7202  7202 I dump_power: type=1400 audit(0.0:831): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=24831 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
08-22 09:10:30.200  7202  7202 I dump_power: type=1400 audit(0.0:832): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=24831 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
08-22 09:10:30.200  7202  7202 I dump_power: type=1400 audit(0.0:833): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=50367 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
08-22 09:10:30.200  7202  7202 I dump_power: type=1400 audit(0.0:834): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=50367 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
08-22 09:10:30.200  7202  7202 I dump_power: type=1400 audit(0.0:835): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=50367 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:844): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=46007 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:845): avc:  denied  { open } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=46007 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:846): avc:  denied  { getattr } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=46007 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:847): avc:  denied  { read } for  name="pm_genpd_summary" dev="debugfs" ino=1889 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_pm_genpd_debugfs:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:848): avc:  denied  { open } for  path="/sys/kernel/debug/pm_genpd/pm_genpd_summary" dev="debugfs" ino=1889 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_pm_genpd_debugfs:s0 tclass=file permissive=1
08-22 09:26:58.572 10656 10656 I dump_power: type=1400 audit(0.0:849): avc:  denied  { getattr } for  path="/sys/kernel/debug/pm_genpd/pm_genpd_summary" dev="debugfs" ino=1889 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_pm_genpd_debugfs:s0 tclass=file permissive=1
08-22 09:46:48.580  7468  7468 I dump_power: type=1400 audit(0.0:832): avc:  denied  { search } for  name="battery" dev="sysfs" ino=78091 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
08-22 09:46:48.580  7468  7468 I dump_power: type=1400 audit(0.0:833): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=78092 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
08-22 09:46:48.580  7468  7468 I dump_power: type=1400 audit(0.0:834): avc:  denied  { open } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=78092 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
08-22 09:46:48.580  7468  7468 I dump_power: type=1400 audit(0.0:835): avc:  denied  { getattr } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=78092 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
08-22 09:46:48.600  7468  7468 I dump_power: type=1400 audit(0.0:836): avc:  denied  { read } for  name="maxfg" dev="sysfs" ino=76330 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
08-22 09:46:48.600  7468  7468 I dump_power: type=1400 audit(0.0:837): avc:  denied  { read } for  name="logbuffer_tcpm" dev="tmpfs" ino=924 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
08-22 09:54:11.732  7062  7062 I dump_power: type=1400 audit(0.0:836): avc:  denied  { search } for  name="mitigation" dev="dm-50" ino=3646 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
08-22 09:54:11.732  7062  7062 I dump_power: type=1400 audit(0.0:837): avc:  denied  { search } for  name="mitigation" dev="sysfs" ino=77466 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
08-22 09:54:11.732  7062  7062 I dump_power: type=1400 audit(0.0:838): avc:  denied  { read } for  name="last_triggered_count" dev="sysfs" ino=77519 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
08-22 09:54:11.732  7062  7062 I dump_power: type=1400 audit(0.0:839): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=77519 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
08-22 09:54:11.732  7062  7062 I dump_power: type=1400 audit(0.0:840): avc:  denied  { read } for  name="batoilo_count" dev="sysfs" ino=77531 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
08-22 09:54:11.732  7062  7062 I dump_power: type=1400 audit(0.0:841): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count/batoilo_count" dev="sysfs" ino=77531 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
08-22 10:30:19.904  7230  7230 I android.hardwar: type=1400 audit(0.0:838): avc:  denied  { execute_no_trans } for  path="/vendor/bin/dump/dump_power" dev="overlay" ino=92 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:999): avc:  denied  { read } for  name="maxfg_history" dev="tmpfs" ino=1179 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:battery_history_device:s0 tclass=chr_file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:1000): avc:  denied  { open } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=948 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:1001): avc:  denied  { getattr } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=948 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
08-23 08:45:09.392 10793 10793 I dump_power: type=1400 audit(0.0:1002): avc:  denied  { open } for  path="/sys/devices/platform/10d60000.hsi2c" dev="sysfs" ino=22941 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
08-23 08:45:09.512 10793 10793 I dump_power: type=1400 audit(0.0:1003): avc:  denied  { getattr } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count/batoilo_count" dev="sysfs" ino=85543 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1

Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ic4040da7ef299c029e6e893f5f14da07751c2ebc
Signed-off-by: samou <samou@google.com>
2024-08-23 08:30:38 +00:00
Android Build Coastguard Worker
b0f5665edf Snap for 12260156 from e7d8589878 to 24Q4-release
Change-Id: I52362b21a5db1a02f5390752f15338933e376d19
2024-08-21 23:02:11 +00:00
Roy Luo
e7d8589878 Export build flag to selinux policy for sysfs_udc fscontext
sysfs_udc context is introduced in aosp/3163782.
Build-time flag RELEASE_USB_UDC_SYSFS_SELINUX_POLICY_ENABLED guards
the access to the new fscontext.
This change exports the flag to selinux policy to make it visible.

Bug: 339241080
Test: build
Flag: RELEASE_USB_UDC_SYSFS_SELINUX_POLICY_ENABLED
Change-Id: I442c5cb16ee40e0a54bddd7c1550dbb4a69557c9
2024-08-21 01:12:43 +00:00
Rios Kao
7cf82126a0 Merge "aidl: audio: update external service version" into main 2024-08-21 00:34:00 +00:00
Devika Krishnadas
94460019bf Merge "Enable Mapper V5 and Allocator V2" into main 2024-08-21 00:32:26 +00:00
Devika Krishnadas
c2312ed7a5 Enable Mapper V5 and Allocator V2
Bug: 267352318
Test: Conformance tests b/356892020
Test: IP smoke tests b/356907323
Test: Performance test b/356709819
Flag: EXEMPT HAL interface change
Change-Id: I97f04ef780b1b82cbfe79b1f24e4f190b3cc2347
Signed-off-by: Devika Krishnadas <kdevika@google.com>
2024-08-21 00:31:57 +00:00
Android Build Coastguard Worker
4bd20ef3a0 Snap for 12253386 from eea858c900 to 24Q4-release
Change-Id: Ic82cfa0829efd5ad1ef5949fc323748cf387805e
2024-08-20 23:01:59 +00:00
Rios Kao
cf0c5119c9 aidl: audio: update external service version
Test: atest vts_treble_vintf_vendor_test
Bug: 361019537
Flag: EXEMPT bug fix.
Change-Id: Ic069faf598ba67202132a52c68863b032c5adc44
2024-08-20 11:56:02 +00:00
Mahesh Kallelil
eea858c900 Merge "modem: Migrate dump_modem.sh to rust" into main 2024-08-20 03:25:55 +00:00
Android Build Coastguard Worker
1f9b0cfb11 Snap for 12247339 from 7eaa70c248 to 24Q4-release
Change-Id: Ia305e9017a7f18633e91fe5072a676de5c303f79
2024-08-19 23:02:16 +00:00
Mahesh Kallelil
9e2bbf3257 modem: Migrate dump_modem.sh to rust
Test: adb bugreport
Bug: 286755695
Flag: EXEMPT refactor
Change-Id: I69b147263d423594a51904970ce5af05eff3b03b
Signed-off-by: Mahesh Kallelil <kallelil@google.com>
2024-08-19 14:41:29 -07:00
Pechetty Sravani (xWF)
7eaa70c248 Merge changes from topic "revert-28323508-common_perf_init-ADJDKJXNAW" into main
* changes:
  Revert "gs-common: Added common perf init.rc"
  Revert "gs-common: Move cpufreq perf settings to gs-common"
2024-08-19 06:53:09 +00:00
Pechetty Sravani (xWF)
98e6a61c1f Revert "gs-common: Added common perf init.rc"
Revert submission 28323508-common_perf_init

Reason for revert: Potential culprit for b/360746202- verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:28323508-common_perf_init

Change-Id: Ic29fb88b0d78974af602ff12456fb39c223c19e7
2024-08-19 05:33:45 +00:00
Pechetty Sravani (xWF)
7606e41504 Revert "gs-common: Move cpufreq perf settings to gs-common"
Revert submission 28323508-common_perf_init

Reason for revert: Potential culprit for b/360746202- verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:28323508-common_perf_init

Change-Id: I0dd3825e9574b79f761a43edc56f86c060103aeb
2024-08-19 05:33:51 +00:00
Treehugger Robot
71783b1729 Merge changes from topic "common_perf_init" into main
* changes:
  gs-common: Move cpufreq perf settings to gs-common
  gs-common: Added common perf init.rc
2024-08-19 03:55:25 +00:00
Android Build Coastguard Worker
2f139730bb Snap for 12241618 from e6a505e473 to 24Q4-release
Change-Id: I04553ac72931daf232f7dddc77b5d29c1b5e3ac7
2024-08-17 01:01:57 +00:00
Treehugger Robot
e6a505e473 Merge "Init widevine sepolicy" into main 2024-08-16 17:15:08 +00:00
Snehal
84aaa5491e Init widevine sepolicy
Bug: 354191444

Flag: EXEMPT bugfix

Change-Id: I331c31be2f1478b161a9af1d0c49506b717c30d2
2024-08-16 16:15:03 +00:00
Will Song
38522ec23e gs-common: Move cpufreq perf settings to gs-common
Moving common cpufreq perf settings to gs-common

Bug: 335874870
Flag: NONE code refactor
Test: boot and check parameters
Change-Id: I9038a54d782be75d520e611fd93d18b1880ae442
Signed-off-by: Will Song <jinpengsong@google.com>
2024-08-15 16:54:48 -07:00
Will Song
6a77a85f6a gs-common: Added common perf init.rc
Migrate configuratuions from devices setting to common folder
for kernel 6.1 devices.

Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Change-Id: I3c204c1df36eda67744d085600a95ac8bb696da9
Signed-off-by: Will Song <jinpengsong@google.com>
2024-08-15 16:54:28 -07:00
Android Build Coastguard Worker
b4d0a2002a Snap for 12229688 from 722dbe869c to 24Q4-release
Change-Id: Ib02018a0dda57c28c143244d6dee6dc9554dc826
2024-08-14 23:02:08 +00:00
Devika Krishnadas
722dbe869c Merge "Rename arm-gralloc namespace to pixel-gralloc for mapper-version" into main 2024-08-14 18:06:09 +00:00
Devika Krishnadas
6d8cc33dde Rename arm-gralloc namespace to pixel-gralloc for mapper-version
Bug: 355046697
Test: Build and boot
Change-Id: Ic4e7bf898aec3bf37fe3b46d5109d06f86b13646
Signed-off-by: Devika Krishnadas <kdevika@google.com>
2024-08-14 15:48:41 +00:00
Android Build Coastguard Worker
56b2e3c7a9 Snap for 12224018 from 805f6b577c to 24Q4-release
Change-Id: Ie6199d72d076854e23d98b6a54332095a2baf3a2
2024-08-13 23:02:25 +00:00
Treehugger Robot
60bd35ec38 Merge "Use Build-Time flag to choose build from source or use prebuilt" into main 2024-08-13 22:11:48 +00:00
Baligh Uddin
29b454da85 Use Build-Time flag to choose build from source or use prebuilt
BUG: 358627252
Test: Local build + TH
Change-Id: I4ef22dbe357bb04876e459061a694bfb146ae6e3
Flag: build.RELEASE_PIXEL_CAMERA_ENABLE_PREBUILT
2024-08-13 15:05:46 +00:00
Will Song
805f6b577c gs-common:performance: Add perf owner file am: 2c5b457e4b am: f14ff6e8dc
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3211739

Change-Id: Icc3d1cfa433589e2a3119990f757c0c25dd5dab0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-13 04:13:07 +00:00
Will Song
f14ff6e8dc gs-common:performance: Add perf owner file am: 2c5b457e4b
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3211739

Change-Id: Id7325b32068421ed33086cb3e2c11d09e1bef49d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-13 03:53:59 +00:00
Android Build Coastguard Worker
1ee3252730 Snap for 12217053 from c417cf5c11 to 24Q4-release
Change-Id: I7ad9535ec7c1198913215f029ec079814b61a601
2024-08-12 23:06:42 +00:00
Xin Li
3e8a1e1c86 [automerger skipped] Merge 24Q3 (ab/AP3A.240905.001) to aosp-main-future am: ee94facd74 -s ours
am skip reason: Merged-In I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87 with SHA-1 875dd78991 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/28711892

Change-Id: Ibe5f4894e08487e2b7719658ae7cfa414fec4a1f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-12 21:01:29 +00:00
Super Liu
c417cf5c11 Merge "Refine the GTI dump order" into main 2024-08-12 06:17:17 +00:00
Will Song
2c5b457e4b gs-common:performance: Add perf owner file
Bug: 358659371
Change-Id: I23b5033435e1bc240eaabcd4213134195a34d3f8
Test: build
2024-08-09 20:55:42 +00:00
Super Liu
8aaaec0793 Refine the GTI dump order
Adjust the order to get the touch snapshot as soon as possible.
This will avoid the following operations to overwrite the touch
statistics for further analysis.

Bug: 356993163
Flag: EXEMPT bugfix
Test: Manual test.
Change-Id: I012544849868ca7b81c11ffa13858eaa209af5c5
Signed-off-by: Super Liu <supercjliu@google.com>
2024-08-09 01:47:32 +00:00
Xin Li
ee94facd74 Merge 24Q3 (ab/AP3A.240905.001) to aosp-main-future
Bug: 347831320
Merged-In: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
Change-Id: I11751a3d94188293cacbaa7dbd71b69b177b732f
2024-08-08 11:15:48 -07:00
YiKai Peng
5c3b95a98f WLC: service: update AIDL manifest version to 1-2
Test: Build/Flash
Bug: 357493518
Flag: vendor.google.wireless_charger.service.flags.enable_service
Change-Id: If318fd6fe855855a40fbb14157612b75149208cf
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-08-08 04:58:14 +00:00
Android Build Coastguard Worker
226dddf4d2 Snap for 12185670 from f91cdac2fe to 24Q4-release
Change-Id: Ice1efd8bc416ff71a69a53c14029f088d34c9a1e
2024-08-05 23:01:56 +00:00
Poomarin Phloyphisut
1ea1cff89a [USB Audio] Fix SEPolicy issue
Error:
avc:  denied  { search } for  name="01" dev="debugfs" ino=927573 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:vendor_usb_debugfs:s0 tclass=dir permissive=0

Bug: 342060153
Test: Local Test.
Flag: EXEMPT bugfix
Change-Id: I29a73a202b239cf37dc53ccf3ef83df3b693e717
2024-08-05 11:11:03 +00:00
Richard Chang
f91cdac2fe Merge "zram: Ensure 1.5 GB free space before creating zram backing device" into main 2024-08-05 09:06:06 +00:00
Richard Chang
bf04670197 zram: Ensure 1.5 GB free space before creating zram backing device
fs_mgr follows system property 'ro.zram_backing_device_min_free_mb'
to check available space before creating zram backing device.

Previously, in Repair Mode, it requires at least 2 GB to boot
successfully with 512 MB zram backing device size. So we can set
1.5 GB as the minimum threshold.

Bug: 322821637
Bug: 326877642
Test: Fill up userdata, enlarge zram backing device size on next
boot.
Test: Boot to Repair Mode
Flag: EXEMPT bugfix

Change-Id: I16c6f1649181af94347b4534c790522bfd2fc166
2024-08-05 09:04:34 +00:00
Cyan_Hsieh
ee9fc2619a Add FSTAB_OWNERS and update OWNERS to include Android.bp am: 70b62a2bcd am: 7c84d4f5d8
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3205326

Change-Id: I6dd88ed20fd36d030c05d521c354924f82755378
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-05 03:09:21 +00:00
Cyan_Hsieh
7c84d4f5d8 Add FSTAB_OWNERS and update OWNERS to include Android.bp am: 70b62a2bcd
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3205326

Change-Id: I2020275cf385bbdc63e2015ed2a91dfafb440c60
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-08-05 02:46:52 +00:00
Cyan_Hsieh
70b62a2bcd Add FSTAB_OWNERS and update OWNERS to include Android.bp
Flag: EXEMPT only changing OWNERS
Bug: 357036384
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:838218ded4fee43f7982438487a143f95d29c615)
Merged-In: I55736409ba04b348a75c2934686f9c1328223c1a
Change-Id: I55736409ba04b348a75c2934686f9c1328223c1a
2024-08-02 11:39:01 +00:00
Android Build Coastguard Worker
f56127c4de Snap for 12164422 from b8dbc2a0df to 24Q4-release
Change-Id: Ib0569018386969dbd8d5a273fe65e6ec2e189db2
2024-07-31 23:01:55 +00:00
Treehugger Robot
b8dbc2a0df Merge "sensors: Support registry dump on DEV device." into main 2024-07-31 03:37:58 +00:00
Android Build Coastguard Worker
a837d59bb9 Snap for 12158986 from e155aa7c04 to 24Q4-release
Change-Id: Ia4c59bed91b891b10b1da191eff07741af54ea0c
2024-07-30 23:02:28 +00:00
Rick Chen
35d4b2bf94 sensors: Support registry dump on DEV device.
Flag: EXEMPT bugfix
Bug: 356344263
Test: adb bugreport on DS.
Change-Id: Ifccf1ed18e01bd54bfbfd421969361734e631a32
Signed-off-by: Rick Chen <rickctchen@google.com>
2024-07-30 20:08:40 +08:00
YiKai Peng
e155aa7c04 WLC: service: add sepolicy for property vendor.wlcservice.test
avc:  denied  { read } for  comm="binder:882_3" name="u:object_r:default_prop:s0" dev="tmpfs" ino=172 scontext=u:r:hal_wlcservice:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0

Test: authentication test mode
Bug: 350830879
Flag: EXEMPT bugfix
Change-Id: Ie9f8fc5cce8e62b06931b77aa8cd16a3c9516fb5
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-07-30 08:53:50 +00:00
Android Build Coastguard Worker
63dc88c8cf Snap for 12129055 from 2b3c202bd2 to 24Q4-release
Change-Id: I8b2bb787b6d6655737430d6cbe569c42d5e24323
2024-07-23 23:02:17 +00:00
Treehugger Robot
2b3c202bd2 Merge "Adjust name of vendor_camera_image_processing_hal_service" into main 2024-07-22 19:24:18 +00:00
Cheng Gu
9d83f45ffb Adjust name of vendor_camera_image_processing_hal_service
Also removes vendor_camera_isp_service from sepolicy.

Bug: 354335791
Test: make
FLAG: EXEMPT bugfix
Change-Id: I1d1d2dd113676d0df5efc55d3a2fa931e3b9d588
2024-07-20 07:48:58 +00:00
Android Build Coastguard Worker
821bc67975 Snap for 12116631 from 826a8afe4c to 24Q4-release
Change-Id: Iee62a9b321686c5b56576a9237d7c8d6e11ffca0
2024-07-20 01:02:01 +00:00
Ernie Hsu
826a8afe4c Merge "mediacodec: fix sepolicy for video playback/recording" into main 2024-07-19 06:47:07 +00:00
Ernie Hsu
cbe40aac4f Merge "Move mediacodec hal setting to gs-common" into main 2024-07-19 05:13:45 +00:00
Feiyu Chen
aab6967f85 Merge "Allow Tachyon service to binder call a shell program" into main 2024-07-19 04:47:25 +00:00
feiyuchen
5c45a3e263 Allow Tachyon service to binder call a shell program
Our Tachyon tests are running as shell program. We need this CL, so we can successfully run the tests without `adb root`.

Bug: 353826183
Test: All tests in `run_tachyon_tests.py` passed after disabling the stress tests (cl/653778337)
Change-Id: I7275029f5a837243c81968d5b53ffc3b00ddf9a5
Flag: EXEMPT bugfix
2024-07-19 04:47:00 +00:00
Ernie Hsu
bbe999c372 mediacodec: fix sepolicy for video playback/recording
07-18 08:46:26.420   925   925 I CodecLooper: type=1400 audit(0.0:404): avc:  denied  { use } for  path="/dev/ashmemf7003569-92c8-48c6-bfdb-b7331af5f4e9" dev="tmpfs" ino=1121 scontext=u:r:mediacodec_google:s0 tcontext=u:r:mediaserver:s0 tclass=fd permissive=1
07-18 08:46:26.468   925   925 I HwBinder:925_3: type=1400 audit(0.0:405): avc:  denied  { use } for  path="/dmabuf:system-uncached" dev="dmabuf" ino=734 scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_graphics_allocator_default:s0 tclass=fd permissive=1
07-18 08:46:26.664   925   925 I HwBinder:925_4: type=1400 audit(0.0:406): avc:  denied  { use } for  path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:untrusted_app_27:s0:c83,c256,c512,c768 tclass=fd permissive=1
07-18 08:46:26.668   925   925 I HwBinder:925_5: type=1400 audit(0.0:407): avc:  denied  { use } for  path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:surfaceflinger:s0 tclass=fd permissive=1
07-18 08:46:26.696   925   925 I HwBinder:925_5: type=1400 audit(0.0:408): avc:  denied  { use } for  path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_graphics_composer_default:s0 tclass=fd permissive=1
07-18 08:46:29.392   925   925 I HwBinder:925_6: type=1400 audit(0.0:409): avc:  denied  { use } for  path="anon_inode:sync_file" dev="anon_inodefs" ino=52 scontext=u:r:mediacodec_google:s0 tcontext=u:r:hal_graphics_composer_default:s0 tclass=fd permissive=1

Test: video playback, screen recording
Bug: 353638738
Change-Id: I071268d39cedf10b8f7c0ca0c9cb2bd33a367d09
2024-07-19 03:26:55 +00:00
Android Build Coastguard Worker
340698deeb Snap for 12110738 from f26bca6ccb to 24Q4-release
Change-Id: I267d0b06d61f8a35264a8b33ea4dbda3b8f3a9ae
2024-07-18 23:02:00 +00:00
Hongyang Jiao
f26bca6ccb Merge "Apply flag RELEASE_PACKAGE_BETTER_BUG" into main 2024-07-18 18:42:44 +00:00
feiyuchen
4a08cc17a9 Add missing SEPolicy for audio HAL to use EdgeTpu lib am: e0ddd9b2fa am: db1943023e
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3180719

Change-Id: I8c05d28aae1053889a4673a4a619c1462d642a16
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-07-18 16:43:38 +00:00
feiyuchen
db1943023e Add missing SEPolicy for audio HAL to use EdgeTpu lib am: e0ddd9b2fa
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3180719

Change-Id: I2dcc98a6f61057a525b97e03d42af852a45d9a54
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-07-18 16:13:50 +00:00
Ernie Hsu
3b4a36a573 Move mediacodec hal setting to gs-common
Flag: EXEMPT refactor
Bug: 353638738
Change-Id: Id17997c75e7dc4f44d7ba8a3a98fa241052cbbff
2024-07-18 09:37:16 +00:00
feiyuchen
e0ddd9b2fa Add missing SEPolicy for audio HAL to use EdgeTpu lib
Copied from ag/27351988

Bug: 352789444
Test: Default presubmit. To be tested on device
Change-Id: I8a124d644906ffc622598ac0bf6079d704197a33
2024-07-18 00:28:25 +00:00
Android Build Coastguard Worker
a5443257db Snap for 12104175 from 4fa1df0c7c to 24Q4-release
Change-Id: I5395d2f059f88855f9a4f148f73b26d4000a7e68
2024-07-17 23:02:00 +00:00
Treehugger Robot
4fa1df0c7c Merge "[BT] change # of copy file when crash" into main 2024-07-17 04:44:32 +00:00
shihchienc
37cf26dae4 [BT] change # of copy file when crash
Bug: 353618079
Test: m
Test: make bt crash and check bugreport
Flag: NONE not related to logic change
Change-Id: I20a7e5b27b64f40ffa7ae3ced38f4044f2bf64b9
2024-07-17 03:23:38 +00:00
Minche Li
c4a241c72c Merge "Updates TTS voice packs in gs-common 202407" into main 2024-07-17 02:48:30 +00:00
Hongyang Jiao
a0e5b35936 Apply flag RELEASE_PACKAGE_BETTER_BUG
Flag: build.RELEASE_PACKAGE_BETTER_BUG
Bug: 353584670
Change-Id: I41b3fe23f68d46d29ef12692d00e1c6c1f7f141f
Test: manual test
2024-07-16 23:10:34 +00:00
Android Build Coastguard Worker
f6dbf8c55f Snap for 12098010 from 3582506fec to 24Q4-release
Change-Id: Ia585ff437af9b9adde70c9b31565ff8e9b645a53
2024-07-16 23:02:35 +00:00
Dinesh Yadav
3582506fec Allow camera HAL to access tachyon HAL
Bug: 352680961
Flag: EXEMPT updates device sepolicy only
Change-Id: I8383887e36340db67c595a12c11c336d3d9bf974
2024-07-16 04:31:02 +00:00
Android Build Coastguard Worker
2184dd7b23 Snap for 12091711 from 1a4e01ef9e to 24Q4-release
Change-Id: I98a41c54a2eb5869cfccfcb01ff6944ef798e481
2024-07-15 23:01:59 +00:00
Richard Chang
1a4e01ef9e sepolicy: allow powerhal to access vendor_mm dir
Error log:
auditd  : type=1400 audit(0.0:79): avc:  denied  { search } for  comm="NodeLooperThrea" name="vendor_mm" dev="sysfs" ino=56518 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_vendor_mm:s0 tclass=dir permissive=0

Bug: 322916612
Test: check avc logs
Flag: EXEMPT bugfix
Change-Id: I0fa6ba0a11551646d76b65ec764b25cd697d0364
2024-07-15 06:39:22 +00:00
mincheli
3a090c42f9 Updates TTS voice packs in gs-common 202407
ag/28084993 update GoogleTTS.
So preloaded TTS voice packs should be also updated.

And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.

Flag: EXEMPT update preloaded files
Bug: 333626474
Test: build passed and manual test
Change-Id: Id942b52b763e519b25af9337b913a4599b249193
2024-07-15 04:00:32 +00:00
Android Build Coastguard Worker
e69717adc0 Snap for 12078078 from c1c7a5ff41 to 24Q4-release
Change-Id: I541c7a6d4d277a176b190c59a604434655c13c9c
2024-07-11 23:02:06 +00:00
Steven Tsai
c1c7a5ff41 Merge "Support AR one-shot fuse on the new platform" into main 2024-07-11 04:27:49 +00:00
Android Build Coastguard Worker
09e47ade08 Snap for 12072601 from 6344093af4 to 24Q4-release
Change-Id: I6563683a2df0d8d572990f676d57b4aab3e6a611
2024-07-11 01:02:28 +00:00
Baligh Uddin
6344093af4 Merge "Add dist_lyric_apex flag to lyric.mk" into main 2024-07-10 23:06:21 +00:00
Juan Yescas
488cbde222 Merge "Revert "Add a different implementation of insmod.sh"" into main 2024-07-09 23:46:59 +00:00
Juan Yescas
3b484f698e Revert "Add a different implementation of insmod.sh"
This reverts commit 99f848ed48.

Reason for revert: b/350767144#comment8

Bug: 350767144
Change-Id: I169af080656e8e871e3f6322b123eee8e681d530
2024-07-09 23:46:49 +00:00
Baligh Uddin
941dc90593 Add dist_lyric_apex flag to lyric.mk
This flag controls whether Lyric apex can be located in the dist-directory.

Flag: dist_lyric_apex
Change-Id: I7a87b2e0b1c220955aafda28173533bd4f6bcd52
BUG: 352009541
Test: TH
2024-07-09 23:22:59 +00:00
Steven Tsai
c984d655c2 Support AR one-shot fuse on the new platform
Bug: 351059371
Flag: EXEMPT bugfix
Change-Id: I14faf995aa259b607300616ba1a1ea6d24a92d2a
Signed-off-by: Steven Tsai <steventsai@google.com>
2024-07-05 15:34:07 +08:00
Android Build Coastguard Worker
ba09b1a269 Merge cherrypicks of ['googleplex-android-review.googlesource.com/28028457'] into 24Q3-release.
Change-Id: I72686e6128a2583f0b48a62513770ce34c569b5e
2024-07-04 03:24:48 +00:00
Rios Kao
b5951eaeb0 audio: add vendor serialno prop
note:
      For some special device usage, the prop
      would be used for special setup.

Test: end-to-end validation.
Bug: 349276230
Flag: EXEMPT bugfix
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:875dd78991c468e60a8437c9817dbabe71ef9b5d)
Merged-In: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
Change-Id: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
2024-07-04 03:08:15 +00:00
Android Build Coastguard Worker
d3fba7d53f Snap for 12048319 from bb0d0ca8ff to 24Q4-release
Change-Id: I10d2aa9c1121f78fbf42448b1dd1aed55ae9a174
2024-07-03 23:02:17 +00:00
Super Liu
bb0d0ca8ff touch: gti support sysfs_wakeup
07-03 02:59:22.526   517   517 W binder:517_5: type=1400 audit(0.0:18): avc:  denied  { read } for  name="wakeup36" dev="sysfs" ino=98946 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=dir permissive=0
07-03 02:59:22.531   517  1547 E android.system.suspend-service: Error opening kernel wakelock stats for: wakeup36 (../../devices/virtual/goog_touch_interface/gti.0/wakeup36): Permission denied

Test: TH build pass
Bug: 335839116
Change-Id: I1840dc5433fd2bfd0722852e6b721c20ff14e39b
Signed-off-by: Super Liu <supercjliu@google.com>
2024-07-03 03:02:35 +00:00
David Lin
9e20095889 Merge "audio: add vendor serialno prop" into 24D1-dev am: 07890d909b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/28028457

Change-Id: I45639f601462a9400e9c5245429af434cb3d197c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-07-03 02:32:24 +00:00
David Lin
07890d909b Merge "audio: add vendor serialno prop" into 24D1-dev 2024-07-03 02:19:47 +00:00
Super Liu
f61d73580b Merge "Support touch sepolicy for spi20" into main 2024-07-03 01:49:48 +00:00
Android Build Coastguard Worker
fdaef4be49 Snap for 12042346 from 662ff8069f to 24Q4-release
Change-Id: Iceb070161425209ea9a0ca92e001c84f8c6c9afe
2024-07-02 23:02:51 +00:00
Super Liu
f897a71294 Support touch sepolicy for spi20
avc denied logs:
07-02 13:17:48.412     1     1 I auditd  : type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc:  denied  { read } for property=persist.sys.tap_gesture pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=0'
07-02 13:17:56.204   315   315 I auditd  : type=1400 audit(0.0:20): avc:  denied  { write } for  comm="init" name="nvt_heatmap" dev="proc" ino=4026536248 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0

vendor_init change to access sysfs_touch from sysfs:
07-02 13:17:56.680     1     1 I init    : Command 'write /sys/devices/virtual/goog_touch_interface/gti.0/vendor_input/nvt_dttw_mode 1' action=vendor.all.modules.ready=1 (/vendor/etc/init/hw/init.rc:127) took 462ms and succeeded
ls -lZ /sys/devices/virtual/goog_touch_interface/gti.0/vendor_input/nvt_dttw_mode
-rw-r--r-- 1 system system u:object_r:sysfs:s0  4096 2024-07-02 13:17 /sys/devices/virtual/goog_touch_interface/gti.0/vendor_input/nvt_dttw_mode

Bug: 335839116
Test: TH pass
Change-Id: If1890defcb9400405071b1c669098d9d62bc56e4
Signed-off-by: Super Liu <supercjliu@google.com>
2024-07-02 14:15:46 +00:00
liangjlee
662ff8069f Create power folder and align pm_freeze_timeout settings with p22 am: 16b70cbf76
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/28051339

Change-Id: Ieee24d5babc7d61036cf80e6d0d52d92a2156860
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-07-02 09:36:37 +00:00
Treehugger Robot
a20a805fc0 Merge "gps: Add pps_assert sepolicy" into main 2024-07-02 06:51:49 +00:00
Android Build Coastguard Worker
c21a0d5372 Snap for 12037182 from 90ea9b5fca to 24Q4-release
Change-Id: I019eddf7c2a31bf69dfc26b92f71288de5297e3c
2024-07-01 23:07:34 +00:00
Tim Lin
90ea9b5fca Revert^2 "Support AIDL based radio HALs"
Enable AIDL for V requirement

AVC log in b/281968564#comment208 and go/v-ril-hal-migration
Forrest build result in go/v-ril-hal-migration

Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change

9a26ed1a9b

Change-Id: I13117df3e25c01026c100207cc0d43aac8b82b7a
2024-07-01 08:32:25 +00:00
Pechetty Sravani
9a26ed1a9b Revert "Support AIDL based radio HALs"
Revert submission 27917806-v_hal_migration_phase3

Reason for revert: Droidmonitor created revert due to b/350390759. Will be verifying through ABTD before submission.

Reverted changes: /q/submissionid:27917806-v_hal_migration_phase3

Change-Id: I466c1b61b86cb7a87f5a1a5ffbc0b4a86438beea
2024-07-01 06:11:17 +00:00
Android Build Coastguard Worker
2f7e9feb52 Merge cherrypicks of ['googleplex-android-review.googlesource.com/28051496'] into 24Q3-release.
Change-Id: I3d8a93b1df256057a222837d837962ce9a2a1e73
2024-06-28 23:16:25 +00:00
liangjlee
fa0cce475e Create power folder and align pm_freeze_timeout settings with p22
Create a new power folder for adding common settings among projects.
The first usage would be to align pm_freeze_timeout with p22.

Bug: 331612600
Test: cat /sys/power/pm_freeze_timeout and the value is correct.
Flag: EXEMPT (bug 337358613)
Signed-off-by: liangjlee <liangjlee@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:21f38c7d0d5496fdf85419f7f37382a510599730)
Merged-In: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
Change-Id: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
2024-06-28 23:08:06 +00:00
timtmlin
d44c33ec48 Support AIDL based radio HALs
Enable AIDL for V requirement

AVC log in b/281968564#comment208 and go/v-ril-hal-migration

Bug: 281968564
Test: telephony function test
Flag: EXEMPT HAL interface change

Change-Id: I9c1e9aecd8a9704fc290bdb3f66dc94d9e2e5073
2024-06-28 12:49:19 +00:00
Android Build Coastguard Worker
68adb28cfb Snap for 12025384 from 21f38c7d0d to 24Q4-release
Change-Id: If2fe899f02923da9af30093690b5211324bd03a3
2024-06-27 23:02:16 +00:00
liangjlee
16b70cbf76 Create power folder and align pm_freeze_timeout settings with p22
Create a new power folder for adding common settings among projects.
The first usage would be to align pm_freeze_timeout with p22.

Bug: 331612600
Test: cat /sys/power/pm_freeze_timeout and the value is correct.
Flag: EXEMPT (bug 337358613)
Change-Id: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
Signed-off-by: liangjlee <liangjlee@google.com>
2024-06-27 02:27:20 +00:00
liangjlee
21f38c7d0d Create power folder and align pm_freeze_timeout settings with p22
Create a new power folder for adding common settings among projects.
The first usage would be to align pm_freeze_timeout with p22.

Bug: 331612600
Test: cat /sys/power/pm_freeze_timeout and the value is correct.
Flag: EXEMPT (bug 337358613)
Change-Id: Ib8219114ec7d789ea3ee9a44863497d3751c0baf
Signed-off-by: liangjlee <liangjlee@google.com>
2024-06-27 02:36:28 +08:00
Cheng Chang
c9160b5fc2 gps: Add pps_assert sepolicy
avc:  denied  { read } for  name="pps_assert" dev="sysfs" ino=104638 scontext=u:r:gpsd:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 258364350
Test: Verification at b/258364350.
Test: Function verification at b/258364350.
Test: Compile and verify the configuration is correct.
Change-Id: Id5589a798bc8535d069225778982a8be27898477
2024-06-25 10:12:25 +00:00
Rios Kao
875dd78991 audio: add vendor serialno prop
note:
      For some special device usage, the prop
      would be used for special setup.

Test: end-to-end validation.
Bug: 349276230
Flag: EXEMPT bugfix

Change-Id: I3a7fb89b44b8df11d5fd71ed8635576f7d74ff87
2024-06-25 09:24:40 +00:00
Android Build Coastguard Worker
9a8464ec90 Snap for 12007880 from 0dd653e624 to 24Q4-release
Change-Id: Ia360e5c291a4cabb3ba8b337d01d225e6825741d
2024-06-24 23:02:22 +00:00
Woody Lin
0dd653e624 gs_watchdogd: Use timeout defined by platform
Uses timeout value of watchdog device directly, without modifying it
with ioctl. On some platforms, especially these with multiple watchdog
devices, the timeout values can be strictly defined for the watchdogs to
timeout in a certain order. Leaves timeout value as it is and divides
minimal of them by 2 as watchdog kicking period.

Flag: EXEMPT normal/day-to-day bugfix
Bug: 348318712
Change-Id: Icdcce368f1803cd3b38a48f05e2788d881e3ad6f
2024-06-24 11:45:43 +08:00
Android Build Coastguard Worker
a09b0ebd20 Snap for 11996894 from b45af4f2a8 to 24Q4-release
Change-Id: I58768703a125d2172cccf2327720647ef85ea288
2024-06-20 23:02:15 +00:00
Xin Li
b45af4f2a8 [automerger skipped] Merge "Merge 24Q3 (ab/11976889) to aosp-main-future" into aosp-main-future am: ff902d4fd9 -s ours
am skip reason: Merged-In I188263ee9b186736a48fd3a0cfa83745e2e54108 with SHA-1 e15af041dd is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27908775

Change-Id: I8df31ecdebf037e99707da160528cd43b75fe558
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-20 20:55:48 +00:00
Xin Li
e3eb48f789 [automerger skipped] Merge 24Q3 (ab/11976889) to aosp-main-future am: ba94250476 -s ours
am skip reason: Merged-In I188263ee9b186736a48fd3a0cfa83745e2e54108 with SHA-1 e15af041dd is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27908775

Change-Id: Ie7c41132cd8b95aef6d6195bddb3046862f52a5e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-20 20:55:43 +00:00
Xin Li
ff902d4fd9 Merge "Merge 24Q3 (ab/11976889) to aosp-main-future" into aosp-main-future 2024-06-20 20:22:34 +00:00
Android Build Coastguard Worker
87d52bdab4 Snap for 11992154 from bf85fe79bf to 24Q4-release
Change-Id: Icc8397acbafe77e35ec251d795ccc529cc932367
2024-06-19 23:02:02 +00:00
Utku Utkan
bf85fe79bf Merge "Move definition for vendor_camera_lyricconfigprovider_service into product" into main 2024-06-19 02:31:58 +00:00
Utku Utkan
360765f4f3 Merge "Move definition for vendor_camera_cameraidremapper_service into product" into main 2024-06-19 02:26:11 +00:00
Bart Van Assche
1b0ca637f9 Merge "Make foreground and background I/O priority different" into main am: 56b74041e3 am: a24099e61b
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3132360

Change-Id: Id6da9d867acf8fb616f75992757f7bda6083d2d4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-19 00:22:02 +00:00
Bart Van Assche
a24099e61b Merge "Make foreground and background I/O priority different" into main am: 56b74041e3
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3132360

Change-Id: I0c8494974e93af1f838bb956fcd887699c5d7f1d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-19 00:05:53 +00:00
Bart Van Assche
56b74041e3 Merge "Make foreground and background I/O priority different" into main 2024-06-18 23:46:59 +00:00
Android Build Coastguard Worker
0c33f6790a Snap for 11987757 from aaabeedefd to 24Q4-release
Change-Id: Icffb2fa42de62dcecbc904bea4a8d6b887bd0650
2024-06-18 23:02:16 +00:00
Utku Utkan
1f61691a37 Move definition for vendor_camera_lyricconfigprovider_service into product
Following ag/25368073 as reference with the same justification.

Bug: 312091052
Test: atest PersistentBackgroundCameraServicesTests
Flag: EXEMPT SEPolicy refactoring to make CHD happy
Change-Id: Ie33a6550e0df0fd13271a15afd5beaaccae50e45
2024-06-18 22:13:48 +00:00
Utku Utkan
76783cf7e2 Move definition for vendor_camera_cameraidremapper_service into product
Following ag/25368073 as reference with the same justification.

Bug: 312091052
Test: atest PersistentBackgroundCameraServicesTests
Flag: EXEMPT SEPolicy refactoring to make CHD happy
Change-Id: If8810323750c2149b4624f8deffee1cd5c1ce36e
2024-06-18 22:12:41 +00:00
Xin Li
ba94250476 Merge 24Q3 (ab/11976889) to aosp-main-future
Bug: 347831320
Merged-In: I188263ee9b186736a48fd3a0cfa83745e2e54108
Change-Id: I991fd3f5e3eff2c7c2aa7a0c41c3929755a13244
2024-06-18 14:13:22 -07:00
Xin Li
aaabeedefd [automerger skipped] Merge Android 14 QPR3 to AOSP main am: 47d1753cf8 -s ours am: f7edd705f9 -s ours
am skip reason: Merged-In I92a4a0fcec18e459b899a4da7ed13527197fe64b with SHA-1 8be8b3d6ef is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3131619

Change-Id: I050334784a9ad1206a6c4cd8dc46654eb52d958c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-18 05:55:28 +00:00
Android Build Coastguard Worker
1af38bf066 Snap for 11981331 from e15af041dd to 24Q4-release
Change-Id: I8ab4f78f8c7b9efdba134844912c2d13f5c62043
2024-06-17 23:01:51 +00:00
Xin Li
f7edd705f9 [automerger skipped] Merge Android 14 QPR3 to AOSP main am: 47d1753cf8 -s ours
am skip reason: Merged-In I92a4a0fcec18e459b899a4da7ed13527197fe64b with SHA-1 8be8b3d6ef is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3131619

Change-Id: I82ee04b923ae1f196d1f943ddd9e947d64bce8fe
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-17 20:41:51 +00:00
Android Build Coastguard Worker
9ae8a06ba6 Snap for 11975806 from e15af041dd to 24Q3-release
Change-Id: I2957dfd4555abe9b540b577371a6f671fa95e87a
2024-06-15 21:01:59 +00:00
Bruce Po
e15af041dd Fix aocx selinux dumpstate permissions
After switching aocxd to stable AIDL, we encountered some permissions
issues associated with dumpstate:

dumpstate: type=1400 audit(0.0:548): avc:  denied  { call } for  scontext=u:r:dumpstate:s0 tcontext=u:r:aocxd:s0 tclass=binder permissive=0

dumpstate: type=1400 audit(0.0:17): avc:  denied  { use } for  path="pipe:[214567]" dev="pipefs" ino=214567 scontext=u:r:aocxd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=0

dumpstate: type=1400 audit(0.0:15): avc:  denied  { write } for  path="pipe:[212933]" dev="pipefs" ino=212933 scontext=u:r:aocxd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=0

TEST:
make selinux_policy -j128
adb push $ANDROID_PRODUCT_OUT/vendor/etc/selinux/* /vendor/etc/selinux
adb reboot
adb root
adb bugreport

BUG: 347156752
Change-Id: I188263ee9b186736a48fd3a0cfa83745e2e54108
2024-06-14 15:36:14 -07:00
Bart Van Assche
fbf228931c Make foreground and background I/O priority different
Assign a higher I/O priority to foreground I/O compared to background
I/O to improve responsiveness of the foreground app.

The command below shows that this CL has the intended effect on a device
with kernel 5.10:

    $ adb shell 'cd /dev/blkio && grep -aH . blkio.prio.class background/blkio.prio.class'
    blkio.prio.class:none-to-rt
    background/blkio.prio.class:restrict-to-be

From a device with an Android 6.1 kernel:

    $ grep -aH . blkio.prio.class background/blkio.prio.class'
    blkio.prio.class:promote-to-rt
    background/blkio.prio.class:restrict-to-be

Bug: 347109476
Change-Id: I6f1ea6a89a8dfaa223e8d2a82917b4de2d7bf1cf
Signed-off-by: Bart Van Assche <bvanassche@google.com>
2024-06-14 14:29:23 -07:00
Android Build Coastguard Worker
de17c6c026 Snap for 11967491 from 094c853eac to 24Q3-release
Change-Id: Iad475c7158d0b6ce47cd23ffd4a87021558a69ee
2024-06-13 23:02:07 +00:00
Xin Li
47d1753cf8 Merge Android 14 QPR3 to AOSP main
Bug: 346855327
Merged-In: I92a4a0fcec18e459b899a4da7ed13527197fe64b
Change-Id: Ia64bffd511e67c12349ed2890cba4cac392ebf01
2024-06-13 10:48:23 -07:00
Treehugger Robot
094c853eac Merge "Revert^2 "Add one variable to decide if need TTS voice packs"" into main 2024-06-13 11:17:20 +00:00
Joey Poomarin Phloyphisut
aed49988c4 Merge "sepolicy: add permission for Speaker Version of pixelstats-vend." into main 2024-06-13 05:53:30 +00:00
Krzysztof Kosiński
ac7885c734 Merge "Remove pdk_build Soong variable." into main 2024-06-13 04:04:29 +00:00
Ray Hsu
3e8f843ae7 Revert^2 "Add one variable to decide if need TTS voice packs"
This reverts commit b4a21a0e14.

Reason for revert: <TalkBack issue cause by this patch. We always include the voice_packs.mk for non factory target >

Bug: 140145973
Change-Id: I865ff7b4d2d25d0135d5df742c201fcc00b0525e
2024-06-13 01:37:43 +00:00
David Lin
603e40aa2c Merge "Updates TTS voice packs in gs-common" into 24D1-dev am: 337425f820
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27787080

Change-Id: I382fb9bfb2925019f400ca7f86eb882a98e1e203
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-13 01:06:38 +00:00
David Lin
337425f820 Merge "Updates TTS voice packs in gs-common" into 24D1-dev 2024-06-13 00:47:20 +00:00
Krzysztof Kosiński
35a4e69e89 Remove pdk_build Soong variable.
The hybrid PDK build was replaced with the prebuilt APEX.

Bug: 321848659
Test: presubmit
Flag: EXEMPT build file cleanup
Change-Id: Id4c9275b5777605157a5448896b4b54af29f9383
2024-06-13 00:45:23 +00:00
Android Build Coastguard Worker
f854b31ee5 Snap for 11959661 from 89df9a4c83 to 24Q3-release
Change-Id: Ifbaa30eeedba21c7f6951b39b4e766c2673ff189
2024-06-12 23:02:28 +00:00
Cheng Chang
89df9a4c83 gps: Move type declaration to device folder am: 023d43829a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27576198

Change-Id: Ia516b83db9ed0c3bf2f2ad2abe40925e6ee5ebd9
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-12 07:27:17 +00:00
Minche Li
9e5462b025 Updates TTS voice packs in gs-common
TTS voice packs are better to be common for all devices
So the other device configs can have the common TTS voice packs
  for the device build  by "gs-common/device.mk"

And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.

Bug: 333626474
Bug: 140145973
Test: build passed and manual test
Change-Id: Idebba7ef2e69d0e9d2f30a94cbbcf70d2e3568d5
(cherry picked from commit 68ef072a54)
2024-06-12 06:09:47 +00:00
KRIS CHEN
c66358781a Merge "gs-common: add fingerprint dump" into main 2024-06-12 04:39:32 +00:00
Android Build Coastguard Worker
9fe30517f2 Snap for 11954976 from d952540c1c to 24Q3-release
Change-Id: Ic02031bd39c2d696130863ebfeb3e694741f9f34
2024-06-11 23:02:40 +00:00
chenkris
fe8968a08a gs-common: add fingerprint dump
Bug: 346450599
Test: adb bugreport
Change-Id: I224171a532bba537c11e53cf46be0042038b7732
2024-06-11 13:35:04 +00:00
Cheng Chang
023d43829a gps: Move type declaration to device folder
Bug: 343280252
Test: b/343280252 compile and abtd test
Change-Id: I1cbcce4452b149764876643722a0b37a18dc1b46
2024-06-11 07:50:47 +00:00
Poomarin Phloyphisut
fdd036bfa3 sepolicy: add permission for Speaker Version of pixelstats-vend.
Bug: 326342880
Test: Manually test passed
Change-Id: I8732e60ef57a2e9d92c53b901fb1695d10131695
2024-06-11 05:53:07 +00:00
Treehugger Robot
d952540c1c Merge "Revert "Add one variable to decide if need TTS voice packs"" into main 2024-06-11 05:17:43 +00:00
Ray Hsu
b4a21a0e14 Revert "Add one variable to decide if need TTS voice packs"
This reverts commit b52878371b.

Reason for revert: <Need preload TTS voice packs. If we need this patch, please just phase in the factory branch>

Bug: 140145973
Change-Id: Iacbe0cac6f7d68eac8b2155795e918edd1e73e25
2024-06-11 04:36:59 +00:00
Wayne Lin
d3819ee3be [automerger skipped] gps: maintain one solution am: ba840e7417 -s ours
am skip reason: Merged-In I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18 with SHA-1 2ced5f6958 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27080977

Change-Id: I1c3c1db87e1057a271780f289036c32e1cd7b522
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-11 02:49:50 +00:00
Android Build Coastguard Worker
fd72aea8ea Snap for 11944020 from 5f01cd2856 to 24Q3-release
Change-Id: I9f97bbea31c2beee9aa3149defd3333ba022a474
2024-06-08 01:02:31 +00:00
Klines Jiang
5f01cd2856 [dump_gyotaku] Add collect odpm logs for dump_gyotaku.
Bug: 328551786

Test: Local build and odpm logs collected test passed.

Change-Id: Ic0071e8ee2262c3fa439444a6b90f092749afe43
2024-06-07 03:33:43 +00:00
Xin Li
6fe4471f0b [automerger skipped] Merge 2024-06 Release (ab/AP2A.240605.024) to aosp-main-future am: 8be8b3d6ef -s ours
am skip reason: Merged-In I2c1785105bab74a483bc68893d96a8a88eabfd90 with SHA-1 3133d362a4 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27555143

Change-Id: I06ccf9eaf23d8b0820a67ea18968371ba8fff128
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 21:36:08 +00:00
Android Build Coastguard Worker
a0cc76f28a Snap for 11931036 from 1fc96a57bb to 24Q3-release
Change-Id: If10bdebd7bd5df2096493c18be28d458d2911d3d
2024-06-05 23:07:01 +00:00
Treehugger Robot
1fc96a57bb Merge changes from topic "customgnss" into main
* changes:
  sepolicy: Allow hal_gnss_pixel access sscoredump file
  sepolicy: Allow gnssd access modem_state
2024-06-05 09:05:59 +00:00
Treehugger Robot
406279f274 Merge "Remove obsolete relfector HAL policy." into main 2024-06-05 07:36:52 +00:00
Treehugger Robot
1cae148226 Merge "touch: Add the capability to simulate HW failure" into main 2024-06-05 02:50:17 +00:00
Android Build Coastguard Worker
1bfd54171a Snap for 11926388 from 8b602f29a6 to 24Q3-release
Change-Id: Ic0851e23ae2eae3730dd158e428cbd3bfdfc8675
2024-06-04 23:57:09 +00:00
Bruce Po
8b5c7dbb93 Merge "selinux move aocx from vndservice to service" into main 2024-06-04 23:30:43 +00:00
Richard Chou
8b602f29a6 Merge "Recorder: add sepolicy for Google Recorder app" into main 2024-06-04 07:55:02 +00:00
Richard Chou
7d60dc41df Recorder: add sepolicy for Google Recorder app
List of avc-denies:
http://b/338879856#comment3

Test: build pass
Bug: 338879856
Change-Id: I40884f0308f8a77b237c6b588db861b63950a8d8
2024-06-04 14:57:11 +08:00
Super Liu
70f4b0431e touch: Add the capability to simulate HW failure
Usage:
  $> setprop vendor.touch.gti0.ical.override.result RESULT
  The designate RESULT to be used for the designate CMD.
  If no RESULT assign, the default value will be "0 - -2147483648".

  $> setprop vendor.touch.gti0.ical.override.cmd CMD
  The result of designate CMD(e.g. 202 or 301) to be overrode by the
  designate RESULT. If the CMD is "xxx", the result of any CMD will
  be overode with the designate RESULT.

Bug: 341021854
Test: manual test
Change-Id: I3d24618e240b4a966b5a76a33ed9ab96503a3257
Signed-off-by: Super Liu <supercjliu@google.com>
2024-06-04 00:46:26 +00:00
Wayne Lin
ba840e7417 gps: maintain one solution
Move the rules from ag/27080484

Bug: 315915958
Test: build pass and GPS function works
Change-Id: I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18
Merged-In: I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18
2024-06-03 09:14:12 +00:00
Wayne Lin
2ced5f6958 gps: maintain one solution
Move the rules from ag/26254728

Bug: 315915958
Test: build pass and GPS function works
Change-Id: I730a7af2b8456ae4a350dbd0d6bdbfe7d3484b18
2024-06-03 08:35:41 +00:00
Cheng Chang
bb3522634e sepolicy: Allow hal_gnss_pixel access sscoredump file
avc:  denied  { read } for  name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=0
avc:  denied  { search } for  name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=0
avc:  denied  { read } for  name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
avc:  denied  { open } for  path="/data/vendor/ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
avc:  denied  { search } for  name="ssrdump" dev="dm-48" ino=404 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir permissive=1
avc:  denied  { getattr } for  path="/data/vendor/ssrdump/crashinfo_gnss_2024-05-22_16-00-45.txt" dev="dm-48" ino=19897 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1
avc:  denied  { read } for  name="crashinfo_modem_2024-05-22_16-34-51.txt" dev="dm-48" ino=20760 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=file permissive=1

Bug: 341224300
Test: b/341224300#comment13 abtd boot health check.
Test: b/341224300 SST test verification.
Change-Id: Ie2b55cb487e7e801a0199b1e9dd9ad16f1e3d682
2024-06-03 03:10:11 +00:00
Android Build Coastguard Worker
5547afa24d Snap for 11916113 from 85ff832530 to 24Q4-release
Change-Id: Iba95a0e7ec3a2708812ec7e697fc60fcc9e1fbb4
2024-06-01 21:02:11 +00:00
Android Build Coastguard Worker
dc62ef14d1 Snap for 11916023 from 85ff832530 to 24Q3-release
Change-Id: I426e0ef510d5186d26c078454aa6dfdf96b43800
2024-06-01 21:02:02 +00:00
Jaegeuk Kim
85ff832530 Merge "Change rq_affinity of the zoned storage logical unit from one into two" into main 2024-06-01 02:22:49 +00:00
Android Build Coastguard Worker
02caad9192 Snap for 11914274 from 65a5fe99c1 to 24Q3-release
Change-Id: I1cf2cee09c27c77f52b5fe951f677cee7a9337d8
2024-06-01 01:02:15 +00:00
Android Build Coastguard Worker
47335ec131 Snap for 11915075 from 65a5fe99c1 to 24Q4-release
Change-Id: I6ce6d602f141226b3329bcb2f25d6ce7d80f474b
2024-06-01 01:02:10 +00:00
Bruce Po
1f7c89e359 selinux move aocx from vndservice to service
When updating aocx service to use binder ndk backend, we get this
selinux violation:

SELinux : avc:  denied  { add } for pid=2772 uid=0 name=aocx.IAocx scontext=u:r:aocxd:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0

TEST:
adb push out/target/product/tangorpro/vendor/etc/selinux/* /vendor/etc/selinux
adb reboot
adb shell aocx_tool list

BUG: 343998265
Change-Id: I1e4f554abfe02f33328c851f7da64c671d8f4cb7
2024-05-31 12:42:10 -07:00
Klines Jiang
65a5fe99c1 [SELinux] Initial access fingerprint sepolicy for gyotaku_app
Initial a specific build folder for fingerprint, we need to include the mk file on specific build.

Bug: 342335081

Test: Local build and sepolicy tests passed.
Change-Id: I8b8522ed949abc586ebab2efe4061f5e4b6cdde0
2024-05-31 10:03:46 +00:00
Treehugger Robot
e92cc2f8b1 Merge "Add the new IPC and ring buffer files." into main 2024-05-31 08:45:20 +00:00
Cheng Chang
ec3a553080 sepolicy: Allow gnssd access modem_state
avc:  denied  { read } for  name="modem_state" dev="sysfs" ino=77641 scontext=u:r:gnssd:s0 tcontext=u:object_r:sysfs_modem_state:s0 tclass=file
avc:  denied  { open } for  path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=77641 scontext=u:r:gnssd:s0 tcontext=u:object_r:sysfs_modem_state:s0 tclass=file
avc:  denied  { getattr } for  path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=77641 scontext=u:r:gnssd:s0 tcontext=u:object_r:sysfs_modem_state:s0 tclass=file

Bug: 342284863
Test: b/342284863 for boot-health check.
Test: b/342284863 for function verification.
Change-Id: I1accfe367915737c14ee79dce71fe04cdcdbb727
2024-05-31 02:10:15 +00:00
Madhav Iyengar
ea854a89c4 Add the new IPC and ring buffer files.
Adds file_contexts entries for the files representing new AOC services
used by a new transport between CHRE on AOC and the bthal.

NOTE: The use-case for these files is the same as the
/dev/acd-com.google.bt* files (lines 23-24). Those files will eventually
be removed when we migrate from the old USF-based transport to the one
under development.

Bug: 342415506
Test: Works with other CLs in topic to support BT offload over the new
transport (with a local change to hook the new transport in).

Change-Id: I81246a25af020ab14da3d4ae7675f2a0f00f97be
2024-05-31 02:04:54 +00:00
Android Build Coastguard Worker
f0d76fc142 Snap for 11908474 from 8e0546449d to 24Q3-release
Change-Id: Iccf4daa51f498c6e52eb3d217fb40829e42df992
2024-05-30 23:02:20 +00:00
Bart Van Assche
41836d64ce Change rq_affinity of the zoned storage logical unit from one into two
Bug: 335708738
Flag: EXEMPT This change only affects ZUFS devices
Change-Id: I3bb655856f0c27a42f26c6dd1a8fc53e7f6e1a00
Signed-off-by: Bart Van Assche <bvanassche@google.com>
2024-05-30 12:59:57 -07:00
Rios Kao
8e0546449d Merge "audio: add a restricted property for audio app." into main 2024-05-30 03:38:36 +00:00
Randall Huang
1a4ff9675f Merge "Allow userdata_exp partitions" into main 2024-05-30 02:45:44 +00:00
Philip Quinn
256d37b5d7 Remove obsolete relfector HAL policy.
Bug: 343566773
Test: presubmit
Change-Id: Ie779a71dfdc9d198643f5eb95396085ea842b7a5
2024-05-30 01:59:29 +00:00
Android Build Coastguard Worker
f013f826cd Snap for 11902131 from 65df448851 to 24Q3-release
Change-Id: I45cf813d3dab6e92980f4f9d3de1ac8b48ffc888
2024-05-29 23:02:23 +00:00
Xin Li
1b583f2977 Merge "[automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: ef6bdc1f33 -s ours" into main 2024-05-29 21:39:03 +00:00
Xin Li
2ff078405b [automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: ef6bdc1f33 -s ours
am skip reason: Merged-In I4ac1ecf51da01c24d4e2f0f7e52df1d2cb92e275 with SHA-1 1c9e011597 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27272614

Change-Id: I1579bc2c16412fe5a1c24f5b7f7f59992df9f33e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 20:48:58 +00:00
Xin Li
2ef9a3bb11 [automerger skipped] Merge Android 24Q2 Release (ab/11526283) to aosp-main-future am: ef6bdc1f33 -s ours
am skip reason: Merged-In I4ac1ecf51da01c24d4e2f0f7e52df1d2cb92e275 with SHA-1 1c9e011597 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27272614

Change-Id: I7538e4b3033f31f59467d2c6a795c93b0d722542
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 19:44:39 +00:00
Michelle Ho
65df448851 [automerger skipped] Foldable concurrent selfie prebuilt flag am: 3297aee549 -s ours
am skip reason: Merged-In Idbacff0d8f97ad0047b334d5563c7e4d5d734182 with SHA-1 fd7d393907 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27394639

Change-Id: I6cb3b05560601c39ca3d2bd90fd56da0ea0f9c61
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-29 04:13:48 +00:00
Rios Kao
92a659256f audio: add a restricted property for audio app.
note: For app layer to access specific property,
      define persist.vendor.app.audio. and
      set it as restricted.

Test: build pass
Bug: 333497194

Change-Id: I397a1bcb9bd16c7fa236049eead30b6e17a996b5
2024-05-29 02:48:30 +00:00
Treehugger Robot
dd9070f67f Merge "Foldable concurrent selfie prebuilt flag" into main 2024-05-29 00:30:48 +00:00
Xin Li
8be8b3d6ef Merge 2024-06 Release (ab/AP2A.240605.024) to aosp-main-future
Bug: 343100748
Merged-In: I2c1785105bab74a483bc68893d96a8a88eabfd90
Change-Id: I92a4a0fcec18e459b899a4da7ed13527197fe64b
2024-05-27 22:58:50 -07:00
Michelle Ho
fd7d393907 Foldable concurrent selfie prebuilt flag
Add a foldable concurrent selfie prebuilt
XML as the feature flag config file

Flag: com.google.pixel.camera.concurrent_foldable_dual_front
Bug: 333986739
Test: build pass
Change-Id: Idbacff0d8f97ad0047b334d5563c7e4d5d734182
2024-05-28 03:29:46 +00:00
Android Build Coastguard Worker
e3b025e4c1 Snap for 11892734 from d94cfccb71 to 24Q3-release
Change-Id: I6c3eb5ce7103d20bafa79a5428514e872a6d0a49
2024-05-27 23:02:11 +00:00
Michelle Ho
3297aee549 Foldable concurrent selfie prebuilt flag
Add a foldable concurrent selfie prebuilt
XML as the feature flag config file

Bug: 333986739
Test: build pass
Change-Id: Idbacff0d8f97ad0047b334d5563c7e4d5d734182
Merged-In: Idbacff0d8f97ad0047b334d5563c7e4d5d734182
2024-05-27 16:15:38 +00:00
Vic Huang
d94cfccb71 [BT] Add sepolicy of power stats
Bug: 341652267
Test: Local build and test pass
Change-Id: Ie3acff612c1f46e403d9b5b8047b6b2666fb1bde
2024-05-27 09:14:28 +00:00
Treehugger Robot
fe5a740e69 Merge "Create an isolated copy of vendor dumpstate from all devices" into main 2024-05-27 04:35:50 +00:00
Android Build Coastguard Worker
e684862fb1 Snap for 11889377 from 4434df4420 to 24Q3-release
Change-Id: I9d916c03a13d4e347a387f6ccf6a499a81ce619b
2024-05-25 03:01:58 +00:00
Xin Li
ef6bdc1f33 Merge Android 24Q2 Release (ab/11526283) to aosp-main-future
Bug: 337098550
Merged-In: I4ac1ecf51da01c24d4e2f0f7e52df1d2cb92e275
Change-Id: I436cedecd5c6eb58f03fc239c520070163d49b8f
2024-05-24 08:25:22 -07:00
Cyan_Hsieh
4434df4420 Add MK_OWNERS as owners file for makefile am: 82a8451d2a am: 127be6aaff
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3102997

Change-Id: I61f3ea0556475b30f148eca5a867f66ca7b6520c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-24 09:10:36 +00:00
Cyan_Hsieh
127be6aaff Add MK_OWNERS as owners file for makefile am: 82a8451d2a
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3102997

Change-Id: I8afc931b8b3639a47b912020f214c6e15ea14e54
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-24 08:46:18 +00:00
Cyan_Hsieh
82a8451d2a Add MK_OWNERS as owners file for makefile
Bug: 278167548
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:719071202775f584b02c313172b15496045009d8)
Merged-In: I9c1ac31c640c9f74434b993c9cc24332d6820cd0
Change-Id: I9c1ac31c640c9f74434b993c9cc24332d6820cd0
2024-05-24 08:01:37 +00:00
Jaegeuk Kim
24ee023597 Allow userdata_exp partitions
Bug: 336319772
Change-Id: I7f878f29d356df3992fb49b9df8f8a900a6f12b8
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2024-05-22 13:31:39 -07:00
Android Build Coastguard Worker
b16fcf188c Snap for 11865526 from 2b710d7dbb to 24Q3-release
Change-Id: I6aa584bfeb20695286d021077963534fb69e2a2c
2024-05-21 01:02:16 +00:00
Adam Shih
3cd2c9ae0d Create an isolated copy of vendor dumpstate from all devices
Bug: 326153087
Test: make android.hardware.dumpstate-service on husky and cheetah
target without breaking

Change-Id: I9053d813e4be75ac279beeec77fdcefed08396f9
2024-05-20 01:59:27 +00:00
YiKai Peng
2b710d7dbb sepolicy: allow hal_wlcservice call
Bug: 341014314
Bug: 341220409
Test: SELinuxUncheckedDenialBootTest
Change-Id: I843c3be8c13d183174e87222b0f067bf98aad57d
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-05-19 13:34:15 +00:00
Android Build Coastguard Worker
05a246bf76 Snap for 11860797 from 5926313576 to 24Q3-release
Change-Id: Ifd0fd23bc699fa42fd98b1dff8b01578bef343d5
2024-05-18 23:02:08 +00:00
YiKai Peng
24af2c95b1 Reapply "WLC: service: add configuration and contexts for sepolicy"
This reverts commit 7d99cb87ea.

Bug: 311315038
Test: authentication
Change-Id: Iaf8d4043794f895ce9ce1ab9b295de072de16e50
2024-05-18 15:11:40 +00:00
Android Build Coastguard Worker
a7991e2587 Snap for 11859356 from aebd22a825 to 24Q3-release
Change-Id: I8c8c6be8b52a52664cdfda686e9c343181ef89d0
2024-05-18 03:02:09 +00:00
Priyanka Advani
5926313576 Merge "Revert "WLC: service: add configuration and contexts for sepolicy"" into main 2024-05-17 23:57:30 +00:00
Priyanka Advani
7d99cb87ea Revert "WLC: service: add configuration and contexts for sepolicy"
Revert submission 27233359-wlcservice-main

Reason for revert: Droidmonitor triggered revert due to b/341014314. Test is still flaky on all devices except akita. Will be verifying through ABTD before submission.

Reverted changes: /q/submissionid:27233359-wlcservice-main

Change-Id: Idf2749208a361c14ebac92ad221cc2599fc8135e
2024-05-17 20:35:55 +00:00
Hongyang Jiao
aebd22a825 Remove BetterBug (and BetterBugStub) from aosp & factory build targets. am: db7b681039
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27350056

Change-Id: I9654dffa12d9e1c23f8f523a6753b8d48a9cd3b0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-17 04:11:46 +00:00
Android Build Coastguard Worker
34a0008fc4 Snap for 11853201 from d1a07d0197 to 24Q3-release
Change-Id: Idf399f606d440c1b306db6f79cfe5af1c9aea1bd
2024-05-17 01:02:02 +00:00
YiKai Peng
d1a07d0197 Merge "WLC: service: add configuration and contexts for sepolicy" into main 2024-05-16 06:41:52 +00:00
Android Build Coastguard Worker
b5e0efd733 Snap for 11847214 from ff3b853a7e to 24Q3-release
Change-Id: Icb4ded5a6a61c716be22d9eb2c1b1b56dbf1b63d
2024-05-16 01:02:40 +00:00
Feiyu Chen
ff3b853a7e Merge "Add missing SEPolicy for audio HAL to use EdgeTpu lib" into main 2024-05-15 21:32:54 +00:00
feiyuchen
93c25dcb0d Add missing SEPolicy for audio HAL to use EdgeTpu lib
Some policies were missing. This CL adds them.

Bug: 340369535
Test: Default presubmit. To be tested on device
Change-Id: I8a124d644906ffc622598ac0bf6079d704197a33
2024-05-15 18:08:31 +00:00
Hongyang Jiao
db7b681039 Remove BetterBug (and BetterBugStub) from aosp & factory build targets.
Bug:340172938
Change-Id: I82fc888497b23b9537f06f1727511608cb1e8ec8
Test: Manual
2024-05-15 06:50:55 +00:00
Midas Chien
cd14b2ad4d Dump bts information am: 15538c9845
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27232582

Change-Id: I07bcaf815b664ab36a17eb19bd5c1ae6238685e2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-15 02:16:45 +00:00
Midas Chien
15538c9845 Dump bts information
Get BTS information when capturing bugreport.

Bug: 335422086
Test: capture bugreport
Change-Id: I5ae9be35a3fc3c975ccc843e9daee6d4e0ac130a
2024-05-14 07:40:58 +00:00
Android Build Coastguard Worker
e9c2ec792c Snap for 11834877 from 12d68d3ff0 to 24Q3-release
Change-Id: I63a28159716141caa9535bccd8bd2c10c1920b49
2024-05-13 23:02:27 +00:00
Treehugger Robot
12d68d3ff0 Merge "sepolicy: allow hal_gnss_pixel create fifo node" into main 2024-05-13 08:09:14 +00:00
Android Build Coastguard Worker
870611c992 Snap for 11828632 from 6c1885ee19 to 24Q3-release
Change-Id: I30e861681f8f821051302ae02f80274bdf455048
2024-05-11 01:02:28 +00:00
Dinesh Yadav
6c1885ee19 Merge "Limit maxGxpDebugDumps to 4" into main 2024-05-10 13:43:19 +00:00
Cheng Chang
84fdceb8b4 sepolicy: allow hal_gnss_pixel create fifo node
avc:  denied  { read } for  name="u:object_r:vendor_chre_hal_prop:s0" dev="tmpfs" ino=401 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_chre_hal_prop:s0 tclass=file
avc:  denied  { find } for pid=900 uid=1021 name=android.hardware.contexthub.IContextHub/default scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:hal_contexthub_service:s0 tclass=service_manager
avc:  denied  { call } for  scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_contexthub_default:s0 tclass=binder
avc:  denied  { call } for  scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder
avc:  denied  { search } for  name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { write } for  name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { add_name } for  name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { create } for  name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { read } for  name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { open } for  path="/data/vendor/gps/.pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file permissive=1
avc:  denied  { write } for  name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { search } for  name="gps" dev="dm-49" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { write } for  name=".ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { write } for  name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { open } for  path="/data/vendor/gps/.ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { remove_name } for  name=".pps_pipe" dev="dm-54" ino=11712 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { unlink } for  name=".pps_pipe" dev="dm-59" ino=6600 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file

Bug: 339391267
Test: Verified the boot health at b/339391267#comment21.
Test: Verified the boot health at b/339391267#comment22.
Change-Id: I9f0b0939aa2bc3af0049067edaa17bc507be9fe7
2024-05-10 09:42:14 +00:00
Treehugger Robot
62056d470e Merge "Add a different implementation of insmod.sh" into main 2024-05-10 02:41:11 +00:00
Martin Liu
d400630a10 allow powerhal to access PA_KILL knobs am: 2522590c40
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27256041

Change-Id: I1e2ae9ee0b8e1744d3be313645c496947b76e7a1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-10 02:00:29 +00:00
Android Build Coastguard Worker
9dc2d05dc4 Snap for 11822896 from 5ca6b7496d to 24Q3-release
Change-Id: I87cf77594c3ef7d4e0ae1dfefb02dc23d6bcba5d
2024-05-09 23:07:01 +00:00
Kelvin Zhang
99f848ed48 Add a different implementation of insmod.sh
Use soong namespace to branch a implementation of insmod.sh .
The newly added implementation is only added to PRODUCT_PACKAGE
for dev option enabled devices. The only change to the script is
skip loading kernel modules from vendor|system_dlkm when under 16K
mode.

Test: Dev option works
Bug: 319335586

This reverts commit 11eb02562d.

Change-Id: I5f5d4ee79be7f872ec321e93f58f6516974d0cad
2024-05-09 09:46:55 -07:00
Feiyu Chen
5ca6b7496d Merge "Add SELinux policy for apps to use Tachyon lib" into main 2024-05-09 16:19:57 +00:00
Achigo Liu
ea3763c1c4 Merge "Revert "Add a different implementation of insmod.sh"" into main 2024-05-09 15:58:31 +00:00
Juan Yescas
11eb02562d Revert "Add a different implementation of insmod.sh"
This reverts commit 60cc378f18.

Reason for revert: thermal-service.pixel native crash many times

Bug: 339337171
Change-Id: Ibd228ea6a0950c2ff8449f7fd55a405fe9a0a99f
2024-05-09 13:24:05 +00:00
nischaljain
2dbfad9f6f Limit maxGxpDebugDumps to 4
DSP multicore workload can run atmost on 4 cores(in case of
amalthea) thus in case of crash we will need atmost 4 core
dumps. Thus limiting maxGxpDebugDumps to 4 to make sure that
we will be capturing all the required core dumps for the
recent crash and at the same time not inflating the bugreport
size.

Bug: 338583087
Change-Id: I76c5b1199c0d89f2bd9a2720dc24a7c86d057b4c
2024-05-09 12:33:01 +00:00
Android Build Coastguard Worker
bd241e1bb4 Snap for 11816316 from 2c4594cc71 to 24Q3-release
Change-Id: Ibaf82e764c6136c38bbdca0a5ba47df8ad9369c8
2024-05-08 23:02:21 +00:00
feiyuchen
12b799b125 Add SELinux policy for apps to use Tachyon lib
Bug: 339133130
Test: Verified apps can now open Tachyon client lib
Change-Id: I8ca9f08517ae8fc1deb5f97ce2823cd5eb5fafb6
2024-05-08 18:48:03 +00:00
Martin Liu
2522590c40 allow powerhal to access PA_KILL knobs
Bug: 322916612
Test: check avc logs
Change-Id: I637c6ad454b668f807b8d0eb4f66a83ca26dfa18
Signed-off-by: Martin Liu <liumartin@google.com>
2024-05-08 08:37:21 +00:00
Treehugger Robot
2c4594cc71 Merge "Add a different implementation of insmod.sh" into main 2024-05-08 04:21:52 +00:00
Kelvin Zhang
60cc378f18 Add a different implementation of insmod.sh
Use soong namespace to branch a implementation of insmod.sh .
The newly added implementation is only added to PRODUCT_PACKAGE
for dev option enabled devices. The only change to the script is
skip loading kernel modules from vendor|system_dlkm when under 16K
mode.

Test: Dev option works
Bug: 319335586
Change-Id: Ice77c19cad47f299db113f11878182f37e0b6f91
2024-05-07 20:04:33 -07:00
Android Build Coastguard Worker
ef0149eb28 Snap for 11811809 from 7b342c14ea to 24Q3-release
Change-Id: I57d7d19b40e9a5fa2505d38cddaa31eea9378da5
2024-05-07 23:02:41 +00:00
Enzo Liao
7b342c14ea Merge "Remove unused apps (RamdumpService and SSRestartDetector) from factory build targets." into 24D1-dev am: 480bc0ce65
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27232581

Change-Id: I6b9452a8c1195b4e71cea19b661cd44f41cd8568
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-07 08:14:07 +00:00
Enzo Liao
480bc0ce65 Merge "Remove unused apps (RamdumpService and SSRestartDetector) from factory build targets." into 24D1-dev 2024-05-07 07:57:09 +00:00
Feiyu Chen
a8d31d2a27 Merge "Allow edgetpu_tachyon_service to call mlock()" into main 2024-05-07 06:22:48 +00:00
feiyuchen
0ea3b6ccd1 Allow edgetpu_tachyon_service to call mlock()
Tachyon AIDL service is the new Darwinn runtime v3. It needs mlock capability to support the GenAI effort, allowing file backed large models to be mlocked, satisfying the memory accounting on Android, similar to what we just did for edgetpu_app_service ag/26481028

Bug: 337949682
Test: On-device tested that tachyon service can now lock large memories.
Change-Id: I02e4d87adf8a459e88e35f7b965d65b2840adce5
2024-05-07 03:50:02 +00:00
Android Build Coastguard Worker
88efd422f2 Snap for 11806096 from bb873aca3c to 24Q3-release
Change-Id: I78d9104d9583761f446e3a2651da017f8f776788
2024-05-06 23:02:24 +00:00
Wei Wang
bb873aca3c Merge "thermal: allow thermal_hal to read sysfs_gpu" into 24D1-dev am: 861035a42b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27091579

Change-Id: Ic33fe3e6a4bbbbb8a20a9d4de5a8273b5e1a297d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-06 16:41:34 +00:00
Wei Wang
861035a42b Merge "thermal: allow thermal_hal to read sysfs_gpu" into 24D1-dev 2024-05-06 16:24:33 +00:00
Enzo Liao
882ef5add8 Remove unused apps (RamdumpService and SSRestartDetector) from factory build targets.
After ag/26620507, the two apps are built in factory build targets.
They don't need them so we should not build them.

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: Ie442c7a95e7fe764749031281e7740c3a4b5a768
2024-05-06 19:58:06 +08:00
YiKai Peng
3eb5f527cf WLC: service: add configuration and contexts for sepolicy
binder setting is for callback by and access to hal_wireless_charger

Bug: 311315038
Test: authentication
Change-Id: Ieaf93c4736b7381be35bfcf12e83977762a3de5d
Signed-off-by: YiKai Peng <kenpeng@google.com>
2024-05-06 10:11:44 +00:00
Android Build Coastguard Worker
c3bc0936b4 Snap for 11803239 from d9a247ac35 to 24Q3-release
Change-Id: I69775205af27651cb2dcaab40b32837533a4a8f4
2024-05-05 21:07:04 +00:00
Kyle Zhang
d9a247ac35 Merge "Respect RELEASE_PACKAGE_WIDEVINE back in device.mk" into main 2024-05-04 21:26:33 +00:00
Android Build Coastguard Worker
390075f152 Snap for 11800966 from cf6bac7558 to 24Q3-release
Change-Id: Id3279ae02c4f1b2bcc4988edeb33b2e826b54ff1
2024-05-04 01:02:31 +00:00
Treehugger Robot
cf6bac7558 Merge "audio: pack AIDL haptic gen effect into the image" into 24D1-dev am: 51ca75b081
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27074035

Change-Id: I40f840d9674c6e080fb493f05126ab264564e5df
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-03 04:16:34 +00:00
Treehugger Robot
51ca75b081 Merge "audio: pack AIDL haptic gen effect into the image" into 24D1-dev 2024-05-03 03:54:45 +00:00
Android Build Coastguard Worker
1161ba4d6b Snap for 11794304 from a7d1cea1ef to 24Q3-release
Change-Id: Ia3d5dadbc876654dcccd905660681009454fb5ef
2024-05-02 23:02:21 +00:00
Priyanka Advani
98550c6193 Revert "sepolicy: Allow PixelGnss implement PPS function" am: feb41bd23d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27192521

Change-Id: If61b9a17adeacf89cea31e2a6febfc9e5be44b15
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-02 19:54:21 +00:00
Philip Quinn
a7d1cea1ef Merge "Include vendor/google/interfaces as a transitive dependency of twoshay." into main 2024-05-02 18:12:14 +00:00
Kyle Zhang
56aab3b93d Respect RELEASE_PACKAGE_WIDEVINE back in device.mk
Bug: 338239204
Change-Id: Idd5e1c18947c72442a34f43f6e04b66039cf7946
2024-05-02 17:42:27 +00:00
Priyanka Advani
feb41bd23d Revert "sepolicy: Allow PixelGnss implement PPS function"
Revert submission 27007604-pps_topic

Reason for revert: Droid-monitor created revert due to breakages in b/338407263. Will be verifying through ABTD before submission.

Reverted changes: /q/submissionid:27007604-pps_topic

Change-Id: Icf89f2bd526634daa8ba10f80471b80dab0837f7
2024-05-02 16:28:10 +00:00
Chia-Chi Teng
927816ea1e sepolicy: Allow PixelGnss implement PPS function am: 890796a889
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27007165

Change-Id: I2b6a7d8648f4d62548b17d26d350fdc9de08f0d1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-02 13:36:25 +00:00
Philip Quinn
a19ae3354b Include vendor/google/interfaces as a transitive dependency of twoshay.
Bug: 278909669
Test: presubmit
Change-Id: Ie9f2f76777407183e9e9e3792265cf00c3ecc204
2024-04-30 22:11:25 -07:00
Chia-Chi Teng
890796a889 sepolicy: Allow PixelGnss implement PPS function
avc:  denied  { read } for  name="u:object_r:vendor_chre_hal_prop:s0" dev="tmpfs" ino=401 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_chre_hal_prop:s0 tclass=file
avc:  denied  { find } for pid=900 uid=1021 name=android.hardware.contexthub.IContextHub/default scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:hal_contexthub_service:s0 tclass=service_manager
avc:  denied  { call } for  scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_contexthub_default:s0 tclass=binder
avc:  denied  { call } for  scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder
avc:  denied  { search } for  name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { write } for  name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { add_name } for  name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { create } for  name=".pps_pipe" scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { read } for  name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { open } for  path="/data/vendor/gps/.pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file permissive=1
avc:  denied  { write } for  name=".pps_pipe" dev="dm-54" ino=11418 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { search } for  name="gps" dev="dm-49" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { write } for  name=".ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { write } for  name="gps" dev="dm-54" ino=380 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { open } for  path="/data/vendor/gps/.ppspipe" dev="dm-49" ino=18610 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file
avc:  denied  { remove_name } for  name=".pps_pipe" dev="dm-54" ino=11712 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=dir
avc:  denied  { unlink } for  name=".pps_pipe" dev="dm-59" ino=6600 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_gps_file:s0 tclass=fifo_file

Bug: 330120749
Test: Verify PixelGnss HAL can connect to Chre HAL.
Test: Function test verification b/330120749.
Test: b/330120749#comment24 health boot check.
Test: b/330120749#comment25 health boot check.
Change-Id: I100ae061cfcbba17a26ece79eb552d60aa782d79
2024-04-29 11:41:58 +00:00
Peter (YM)
88203440b2 thermal: allow thermal_hal to read sysfs_gpu
Update the sepolicy for thermalhal to read sysfs_gpu to access the basic
gpu info.

Bug: 336698561
Test: Flash Build and boot to home, run adb shell dumpsys android.hardware.thermal.IThermal/default, check the cdevceiling and hardlimit number for gpu
Change-Id: I6e722e108284ee0d7a0c86a9e50749ecf4b354a5
Signed-off-by: Peter (YM) <peterym@google.com>
2024-04-29 05:37:09 +00:00
Android Build Coastguard Worker
f29c18c8da Snap for 11766482 from 417a0fbfcd to 24Q3-release
Change-Id: I64771d4e2befa5dc55b34f06a517811b79468a25
2024-04-25 23:02:22 +00:00
Erik Staats
417a0fbfcd dump_umfw_stat: Reduce timeout to 0.5 seconds
Bug: 336359025
Test: Verified bugreport doesn't time out when umfw_stat_tool hangs.
Test: Verified bugreport contains UmfwStat statistics when
 umfw_stat_tool doesn't hang.
Test: See details in testing done comment in
 https://googleplex-android-review.git.corp.google.com/27069067 .
Flag: EXEMPT normal/day-to-day bugfix
Change-Id: Ia7573316a4217dff55cd789ded628cf033e08a89
2024-04-25 16:43:16 +00:00
Enzo Liao
0b1d777cc0 [automerger skipped] Merge "Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag." into 24D1-dev am: 3b7d90448c -s ours
am skip reason: Merged-In I02c2e1569a95ea90901d9476ef75bca74a4f43e1 with SHA-1 7d7c8ebaeb is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27047329

Change-Id: I2ece16bf6574f2cc7e9477fe8d65134897310f99
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-25 08:31:19 +00:00
Enzo Liao
9a578c86d2 [automerger skipped] Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag. am: 2843f2a79b -s ours
am skip reason: Merged-In I02c2e1569a95ea90901d9476ef75bca74a4f43e1 with SHA-1 7d7c8ebaeb is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27047329

Change-Id: I6725fb043bc51551c309f33f303faf4a1fdd60fe
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-25 08:31:13 +00:00
Enzo Liao
3b7d90448c Merge "Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag." into 24D1-dev 2024-04-25 08:22:06 +00:00
Kelvin Zhang
b1119480f0 Merge "Revert "Skip loading kernel modules for 16K mode"" into main 2024-04-25 01:58:10 +00:00
Kelvin Zhang
03c030cd04 Revert "Skip loading kernel modules for 16K mode"
This reverts commit 959ba11426.

Reason for revert: aosp/3050544 breaks this CL

Change-Id: I9dcbcd3b8d6fb8f1e9c468cbca3ea7264bda264d
2024-04-25 00:49:19 +00:00
Kelvin Zhang
d27d373537 Merge "Skip loading kernel modules for 16K mode" into main 2024-04-25 00:00:31 +00:00
Treehugger Robot
2ed1898907 Merge "Fixed a typo in init.storage.rc" into main 2024-04-24 23:22:19 +00:00
Android Build Coastguard Worker
9aba6abdf8 Snap for 11760402 from e4c7499bcb to 24Q3-release
Change-Id: If53973a3b7eea70c11426b9745b317e31088f115
2024-04-24 23:02:08 +00:00
Erick Alvarez
68135d2f44 Merge "Attach face detection state tracker files to the bug report" into 24D1-dev am: 0f0e2bed0a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27060465

Change-Id: Id14fae9a14ce14538b739a272a8369a7320f6f69
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-24 22:09:48 +00:00
Erick Alvarez
0f0e2bed0a Merge "Attach face detection state tracker files to the bug report" into 24D1-dev 2024-04-24 20:59:28 +00:00
Daniel Lee
1a0943166d Fixed a typo in init.storage.rc
"sys" -> "dev"

Change-Id: Ie7103a668cab027fb339762a7f4761b776b431f9
Signed-off-by: Daniel Lee <chullee@google.com>
2024-04-24 12:33:55 -07:00
Randall Huang
e4c7499bcb Merge "storage: tune f2fs to get max performance" into main 2024-04-24 03:21:12 +00:00
Shinru Han
fe1b1aaa14 [automerger skipped] Merge "gps: Update gps makefile" into 24D1-dev am: b61232f24f -s ours
am skip reason: Merged-In I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668 with SHA-1 3647a441ad is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26546996

Change-Id: Idb13d5de4919a17d32e2329e63d3be7153a2b0e8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-24 01:15:36 +00:00
Shinru Han
72e1c30f8c [automerger skipped] gps: Update gps makefile am: 84de7535b5 -s ours
am skip reason: Merged-In I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668 with SHA-1 3647a441ad is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26546996

Change-Id: Icbd94987a62251140af06909af467ace42fe67ed
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-24 01:15:26 +00:00
Shinru Han
b61232f24f Merge "gps: Update gps makefile" into 24D1-dev 2024-04-24 00:59:36 +00:00
Jaegeuk Kim
8ce08dfc7e storage: tune f2fs to get max performance
max_io_bytes : block will split out, so let's submit asap.

min_hot_blocks : don't mess up the logs per the chunk size.

Change-Id: I0795fea90c3aaee0ef6058fce7f4a3c31fc3fb42
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2024-04-23 16:07:15 -07:00
Android Build Coastguard Worker
8af3871fea Snap for 11753769 from 3b2fde15ef to 24Q3-release
Change-Id: I14dcd4492bb035d7f116a169a1b302509cad7f2b
2024-04-23 23:02:43 +00:00
David Li
2a7b2bd35b audio: pack AIDL haptic gen effect into the image
Bug: 330686268
Test: mm; haptic playground
Change-Id: I629ebaf0c8aa1c6b92dce781cb9e1416094a8c67
2024-04-24 05:04:24 +08:00
Martin Liu
3b2fde15ef Move compaction_proactiveness rule to system vendor init
Bug: 330670954
Test: boot
Change-Id: I3cb505a76850c9c3b48d127ae93eb03aa3da33d9
Signed-off-by: Martin Liu <liumartin@google.com>
2024-04-23 08:08:50 +00:00
Enzo Liao
2843f2a79b Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag.
They include the domains:
1. dump_ramdump
2. ramdump
3. ramdump_app
4. sscoredump
5. ssr_detector_app

We copy policies of domains of ramdump and sscoredump from hardware/google/pixel-sepolicy to gs-common but don't remove them there to keep compatibility for other projects.

New SELinux policies:
1. Create a new file context of /data/vendor/ssrdump/logcat for SSRestartDetector to write device logs when it detects new coredumps.
2. RamdumpService will also access the path to compress device logs to zip files of coredumps.

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:7d7c8ebaeb07288f43bf507de3cd8919984337da)
Merged-In: I02c2e1569a95ea90901d9476ef75bca74a4f43e1
Change-Id: I02c2e1569a95ea90901d9476ef75bca74a4f43e1
2024-04-23 06:45:07 +00:00
Minche Li
57c639e4ce Merge "Updates TTS voice packs in gs-common" into main 2024-04-23 03:27:14 +00:00
Kelvin Zhang
959ba11426 Skip loading kernel modules for 16K mode
For boot options, 16K kernel modules are all stored under vendor_boot.
So we can skip loading modules from vendor_dlkm/system_dlkm
if device is in 16K mode and boot option is enabled.

Bug: 293313353
Change-Id: I46c440a7ce67dfbd0cce83dadbd908dff144c583
2024-04-22 16:23:46 -07:00
Erick Alvarez
9001eb43e9 Attach face detection state tracker files to the bug report
State tracker proto file size is small, usually ~15KB. Collect 10 most recent
files to the bug reports.

Bug: 311086427
Test: adb bugreport
Change-Id: I5e43c85aaf40e33e9a578749121b0d3a750c209e
2024-04-22 23:23:27 +00:00
Android Build Coastguard Worker
6f8f1622b2 Snap for 11746631 from d8a9aa897d to 24Q3-release
Change-Id: I3ff881b5988b74ccd9084ec912e2de670981f687
2024-04-22 23:02:11 +00:00
Enzo Liao
d8a9aa897d Remove unused apps (RamdumpService and SSRestartDetector) from AOSP.
After ag/26620507, the two apps are built in AOSP.
AOSP doesn't need them so we should not build them.

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: I0925fa0bb512a0001bfb46c524c9124128bc5e6e
2024-04-22 16:57:27 +08:00
Enzo Liao
d211011681 Merge "Revert "Remove unsed apps (RamdumpService and SSRestartDetector)..."" into main 2024-04-22 07:52:40 +00:00
Enzo Liao
2a2146024b Revert "Remove unsed apps (RamdumpService and SSRestartDetector)..."
Revert submission 26988480-Remove RamdumpService and SSRestartDetector from AOSP

Reason for revert: Exclude AOSP builds by a condition check instead

Reverted changes: /q/submissionid:26988480-Remove+RamdumpService+and+SSRestartDetector+from+AOSP

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A

Change-Id: I518af9425d8f808671118c41d1cabd68782c1ff6
2024-04-22 05:10:46 +00:00
Android Build Coastguard Worker
e2d4962800 Snap for 11740859 from d5028db7e3 to 24Q3-release
Change-Id: I9ca7df41681282a1fff15d2d51f6bca94524e3da
2024-04-20 01:02:11 +00:00
Bruce Po
fe72bc0c1d selinux allow aocxd to access AoC buffers
Allow aocxd service to access new device nodes
/dev/acd-aocx_inject*
/dev/acd-aocx_tapout*

type=1400 audit(0.0:88): avc:  denied  { getattr } for  path="/dev/acd-aocx_tapout0" dev="tmpfs" ino=1936 scontext=u:r:aocxd:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0

type=1400 audit(0.0:89): avc:  denied  { getattr } for  path="/dev/acd-aocx_inject0" dev="tmpfs" ino=1937 scontext=u:r:aocxd:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0

BUG: 335884035
Change-Id: Ie4cd637e91f1d9db081bb794a9fb60e3bafe0218
2024-04-19 21:25:41 +00:00
Binhao Lin
d5028db7e3 Merge "Attach multicam CPA to the bug report" into 24D1-dev am: 278620120f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27030061

Change-Id: I9266fb1b07fbf7a396e37834dc25d1a2084fb192
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-19 21:13:45 +00:00
Binhao Lin
278620120f Merge "Attach multicam CPA to the bug report" into 24D1-dev 2024-04-19 20:47:41 +00:00
Binhao Lin
b1a35566c1 Attach multicam CPA to the bug report
Multicam CPA file size is small, usually <50KB. Collect 10 most recent
files to the bug reports.

Bug: 310389222
Test: adb bugreport
Change-Id: I902fbdfa460a18fb3976d2fbfb4c1c0a716a4ab2
2024-04-19 18:33:56 +00:00
Treehugger Robot
67c14e6e01 Merge changes from topic "gs_mm_common" into main
* changes:
  Set compaction_proactiveness and percpu_pagelist_high_fraction
  allow vendor init to access MM knob
2024-04-19 06:27:54 +00:00
Ravi Jain
a30f1bcfb4 Merge changes from topic "touch_dumpstate_priority-24D1-dev" into 24D1-dev am: 3defa6f8ea
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26926316

Change-Id: I2d0bee71d89fa083110e177ddf4d4f3b06930300
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-19 06:14:22 +00:00
Ravi Jain
44c50aee79 dumpstate: touch: Add touch_predump for gti am: f7bacf5322
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26919214

Change-Id: I29b6676a78c0cd54d50f7f1f8d07dd75518cf197
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-19 06:14:18 +00:00
Ravi Jain
436222de27 dumpstate: touch: Init touch_predump service am: 8a52cae4dd
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26919213

Change-Id: Idb6efba436e5d06eeff611428b2e9bd1f6b6eb0e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-19 06:14:12 +00:00
Ravi Jain
3defa6f8ea Merge changes from topic "touch_dumpstate_priority-24D1-dev" into 24D1-dev
* changes:
  dumpstate: touch: Add touch_predump for syna
  dumpstate: touch: Add touch_predump for gti
  dumpstate: touch: Init touch_predump service
2024-04-19 05:47:46 +00:00
Android Build Coastguard Worker
903b377908 Snap for 11733120 from 448b457d10 to 24Q3-release
Change-Id: Ia297c93df1d0f9d528fa5eb51a83aa955515c434
2024-04-18 23:02:04 +00:00
Rios Kao
9be61e9e36 aidl: audio: update external service version am: 905441e15c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/27007170

Change-Id: I429852de4d752f9b2d0be02983f51ffde34d7094
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-18 20:53:18 +00:00
Rios Kao
905441e15c aidl: audio: update external service version
Bug: 332443021
Test: mm
Change-Id: I56f50c5f2ddce80f95af2228e91a1db5757dffbc
2024-04-18 18:38:14 +00:00
Martin Liu
d627901103 Set compaction_proactiveness and percpu_pagelist_high_fraction
Move the settings from project's setting to common folder so
the changes can also apply to the following 6.1 kernel.

Bug: 332916849
Bug: 309409009
Test: boot
Change-Id: I89d0386821e8a47301023aa414998dd76e3bd6b9
Signed-off-by: Martin Liu <liumartin@google.com>
2024-04-18 07:10:14 +00:00
Martin Liu
d7125c42db allow vendor init to access MM knob
allow vendor init to access compaction_proactiveness
and percpu_pagelist_high_fraction

Bug: 332916849
Bug: 309409009
Test: boot
Change-Id: Idf83babc3f482ad4183c7287a808904c9608fc10
Signed-off-by: Martin Liu <liumartin@google.com>
2024-04-18 07:09:59 +00:00
Ravi Jain
f7bacf5322 dumpstate: touch: Add touch_predump for gti
go/touch_predump

Test: b/318578275
Test: Locally flash and check dump logs on dogfood device
Bug: 287907308
Change-Id: I4a35a9a57c1331d67dfcd1863b57d75a9b804c32
2024-04-18 06:35:29 +00:00
Ravi Jain
8d34b54167 dumpstate: touch: Add touch_predump for syna
go/touch_predump

Test: b/318578275
Test: Flash on dogfood and check touch dump logs
Bug: 287907308
Change-Id: I88c488dec5de85545ae5f33f5e65371883982e48
2024-04-18 06:35:29 +00:00
Ravi Jain
8a52cae4dd dumpstate: touch: Init touch_predump service
go/touch_predump

Test: b/318578275
Test: Locally flash to check dump_touch logs on dogfood devices
Bug: 287907308
Change-Id: Ibc9df367549dd69c83936a7fd08465f7bb53ce80
2024-04-18 06:35:23 +00:00
Enzo Liao
448b457d10 Merge "Remove unsed apps (RamdumpService and SSRestartDetector) from AOSP." into main 2024-04-18 02:12:03 +00:00
Android Build Coastguard Worker
e49ffd684f Snap for 11728787 from 32be9ab50e to 24Q3-release
Change-Id: I137f061e47ae81ecc0c0d00fb2ba4012b0ec1ba4
2024-04-17 23:03:36 +00:00
Hongyang Jiao
32be9ab50e Merge "Add betterbug folder to gs-common" into 24D1-dev am: 5f3f01a719
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26987042

Change-Id: Iacf5377da09f19f9555d5465ca0ada0aac8dd9c4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-17 18:10:56 +00:00
David Lin
27f7af17f4 [automerger skipped] Merge "[Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet" into 24D1-dev am: f0c3c420ab -s ours
am skip reason: Merged-In I2c1785105bab74a483bc68893d96a8a88eabfd90 with SHA-1 d4de4ddf90 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26976960

Change-Id: I730d327703c3828c9c424acc4de91865bce49757
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-17 18:10:44 +00:00
Klines Jiang
33a4b03908 [automerger skipped] [Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet am: 3133d362a4 -s ours
am skip reason: Merged-In I2c1785105bab74a483bc68893d96a8a88eabfd90 with SHA-1 d4de4ddf90 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26976960

Change-Id: I121faf236dad692907ac631b2f6ab67569628840
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-17 18:10:41 +00:00
Hongyang Jiao
870982619f [automerger skipped] Merge "Revert "Add betterbug folder to gs-common"" into 24D1-dev am: 1e6e41664f -s ours
am skip reason: skipped by jiaohy

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26630902

Change-Id: I29a9a9a858610febbc772fd5003a002f63c7da79
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-17 18:08:41 +00:00
Hongyang Jiao
5f3f01a719 Merge "Add betterbug folder to gs-common" into 24D1-dev 2024-04-17 17:57:26 +00:00
Shinru Han
84de7535b5 gps: Update gps makefile
Test: on-device
Bug: 326527903
Change-Id: I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668
Merged-In: I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668
2024-04-17 10:16:01 +00:00
David Lin
f0c3c420ab Merge "[Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet" into 24D1-dev 2024-04-17 08:16:45 +00:00
Enzo Liao
69e58738af Remove unsed apps (RamdumpService and SSRestartDetector) from AOSP.
After ag/26620507, the two apps are built in AOSP.
AOSP doesn't need them so we should not build them.

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Flag: NONE N/A
Change-Id: I93cf92de91e1880739e0593b84f6343d152682f8
2024-04-17 16:16:38 +08:00
Treehugger Robot
867995284c Merge "gs_watchdogd: Support multiple watchdog char devices" into main 2024-04-17 02:58:40 +00:00
Android Build Coastguard Worker
0d5dc3718b Snap for 11722130 from 46b6ca82a7 to 24Q3-release
Change-Id: I58e44981a406d4dd391feae318d0f0aea2d1c779
2024-04-16 23:02:28 +00:00
Hongyang Jiao
099d9ea0a9 Add betterbug folder to gs-common
Better Bug was previously labeled as priv_app, here we kept the same 'type=privapp_data_file levelFrom=user'

Copied some Better Bug used rules from system/sepolicy/private/priv_app.te.
(https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:system/sepolicy/private/priv_app.te;l=1?q=priv_app.te)

Test: local test
Bug: 322543833
Change-Id: Ia029e855dd46e65b9eec31835ccaabb3cb903058
2024-04-16 22:57:09 +00:00
Hongyang Jiao
1e6e41664f Merge "Revert "Add betterbug folder to gs-common"" into 24D1-dev 2024-04-16 22:47:41 +00:00
Sam Ou
46b6ca82a7 Merge "sepolicy: allow dumpstate to call battery_mitigation" into 24D1-dev am: d8f09cbcef
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26963893

Change-Id: Iedb6b43c11ebf57fab3a1d578834772eaa10bd98
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-16 07:54:27 +00:00
Klines Jiang
3133d362a4 [Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet
Pixel 5a (barbet) does not support Pixel dump, we need to exclude build
Pixel dump for Pixel 5a (barbet). The git_24Q2-beta-release TARGET_PRODUCT is barbet_beta, updated to barbet% for all barbet target products.

Bug: 330819191

Test: Local build and trigger a new build the result passed
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:d4de4ddf902f75ebcb6b0e1079e78b8a96410ed5)
Merged-In: I2c1785105bab74a483bc68893d96a8a88eabfd90
Change-Id: I2c1785105bab74a483bc68893d96a8a88eabfd90
24D1-dev is based on 24Q2-release. Therefore, we merged this CL to 24D1-dev.
2024-04-16 07:41:19 +00:00
Sam Ou
d8f09cbcef Merge "sepolicy: allow dumpstate to call battery_mitigation" into 24D1-dev 2024-04-16 07:37:10 +00:00
samou
d7c33cef92 sepolicy: allow dumpstate to call battery_mitigation
Bug: 322141931
Change-Id: I5a6d013df754d3f6d6e9d1ee3ea335176450069b
Signed-off-by: samou <samou@google.com>
2024-04-16 03:54:45 +00:00
Ravi Jain
42f418b147 touch: moving ical related sepolicies to independent folder am: ea5ec69b79
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26957229

Change-Id: Ic92ed487646286266f021eedc4abf125e0d62549
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-16 02:53:34 +00:00
Chienyuan Huang
1a2d7ae821 Add Bluetooth Ranging HAL
Bug: 333984281
Test: Manual
Change-Id: Id4877463d5e465e91a8e321ffc6fe0cb07390ebd
2024-04-15 06:26:08 +00:00
Woody Lin
de061720c3 gs_watchdogd: Support multiple watchdog char devices
Handles systems with multiple watchdog hardware blocks. Identifies
each watchdog via the glob pattern
`/sys/devices/platform/*.watchdog_cl*/watchdog/watchdog*` to sysfs
path, and initializes and services each of them.

Bug: 295364297
Change-Id: I785c84e492a2286a5155a5b4692dae2a95df0cc4
2024-04-15 05:17:06 +00:00
Ravi Jain
ea5ec69b79 touch: moving ical related sepolicies to independent folder
Bug: 331139251
Test: Manually verify the result.
Change-Id: I53b5c8eb73f1ce775ec83a06b43c0b4993f31e69
2024-04-15 03:49:41 +00:00
Android Build Coastguard Worker
c21db60802 Snap for 11710546 from c7955c7eea to 24Q3-release
Change-Id: I613480bf140175d7c30390761bf7c59658f953cb
2024-04-13 01:02:30 +00:00
Android Build Coastguard Worker
fbbb4085b8 Snap for 11704135 from 725b775c76 to 24Q3-release
Change-Id: I15e704396442dcaa3e6c95104e5f791c63671953
2024-04-11 23:02:17 +00:00
Eliot Wong
c7955c7eea Merge "Add SEPolicy for vendor_camera_image_processing_hal_service" into 24D1-dev am: 46f7fe3e61
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26604585

Change-Id: I5afe3ce331f9182b4202be2510c0708c3053a63d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-11 20:30:29 +00:00
Eliot Wong
46f7fe3e61 Merge "Add SEPolicy for vendor_camera_image_processing_hal_service" into 24D1-dev 2024-04-11 20:15:58 +00:00
Enzo Liao
725b775c76 Merge "Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag." into main 2024-04-11 02:03:26 +00:00
Android Build Coastguard Worker
076b43d60e Snap for 11697857 from 80f7772326 to 24Q3-release
Change-Id: I24bafef978b855c0e3a3325c98c36c190518814f
2024-04-10 23:02:14 +00:00
Minche Li
68ef072a54 Updates TTS voice packs in gs-common
TTS voice packs are better to be common for all devices
So the other device configs can have the common TTS voice packs
  for the device build  by "gs-common/device.mk"

And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.

Bug: 333626474
Test: build passed and manual test
Change-Id: Idebba7ef2e69d0e9d2f30a94cbbcf70d2e3568d5
2024-04-10 07:07:03 +00:00
Tommy Chiu
80f7772326 mDL: Remove mDL HAL am: aab9ec8424
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26784702

Change-Id: Idbb0ccfc601753b12ed71f265f4a143e862df701
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-10 03:48:03 +00:00
Enzo Liao
7d7c8ebaeb Centralize SELinux policies for deamons and apps related to ramdumps and coredumps according to go/pixel-defrag.
They include the domains:
1. dump_ramdump
2. ramdump
3. ramdump_app
4. sscoredump
5. ssr_detector_app

We copy policies of domains of ramdump and sscoredump from hardware/google/pixel-sepolicy to gs-common but don't remove them there to keep compatibility for other projects.

New SELinux policies:
1. Create a new file context of /data/vendor/ssrdump/logcat for SSRestartDetector to write device logs when it detects new coredumps.
2. RamdumpService will also access the path to compress device logs to zip files of coredumps.

Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Change-Id: I02c2e1569a95ea90901d9476ef75bca74a4f43e1
2024-04-08 14:10:15 +00:00
Daniel Chapin
a0708c2723 Revert "Add betterbug folder to gs-common"
Revert submission 26348985-bb-sepolicy-poc

Reason for revert: Droidfood blocking bug: b/327991669

Bug: 327991669

Reverted changes: /q/submissionid:26348985-bb-sepolicy-poc
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:aca06d61c64f947252808f73fbe01fdda5109c0e)
Merged-In: I0fe0bb22e293093d941b4d8ba826c8c8689a370d
Change-Id: I0fe0bb22e293093d941b4d8ba826c8c8689a370d
24D1-dev is based on 24Q2-release. Therefore, we merged this CL to 24D1-dev.
2024-04-08 06:19:44 +00:00
Android Build Coastguard Worker
4408c87187 Snap for 11666018 from da16cb987c to 24Q3-release
Change-Id: I168c0c9dc0ecfa6b70b90c6b92f477a70d3ac049
2024-04-03 23:02:10 +00:00
Android Build Coastguard Worker
c2491e5a64 Snap for 11661060 from 819230aee3 to 24Q3-release
Change-Id: I5dcd10efa2def528cc9d7c952f35b9345e68bc65
2024-04-02 23:02:24 +00:00
Treehugger Robot
da16cb987c Merge "shamp: Add SEPolicy and compat matrix for shamp" into main 2024-04-02 20:42:01 +00:00
Tommy Chiu
aab9ec8424 mDL: Remove mDL HAL
Since the gsc firmware doens't support mDL since MAIN-00009, we'll need
to remove HAL accordingly to avoid inteface confusion.

Bug: 330415816
Test: PTE release test
Change-Id: Ie91817c926d77209c8ac1119dc74053cb0f6215a
2024-04-02 06:46:01 +00:00
Treehugger Robot
819230aee3 Merge "shamp: Create soong config variable for vendors" into main 2024-04-02 05:16:53 +00:00
Android Build Coastguard Worker
80b5e64aa5 Snap for 11654651 from 8c3d9d51c4 to 24Q3-release
Change-Id: Ie6eda38e30831993d02bbeb70280f64eb6a7db7f
2024-04-01 23:02:01 +00:00
Ted Wang
8c3d9d51c4 Merge "Switch to new Bluetooth Finder HAL" into main 2024-04-01 06:21:34 +00:00
Android Build Coastguard Worker
8cebcfd988 Snap for 11648291 from cd05e58009 to 24Q3-release
Change-Id: Ia5c5f5f58531c9b2fa3ab5565c5977e6091b0589
2024-03-30 01:02:18 +00:00
Mike Wang
cd05e58009 Merge "Move the sysfs_modem_state from a product folder to gs-common" into main 2024-03-29 15:16:19 +00:00
Android Build Coastguard Worker
3c5df18d11 Snap for 11641371 from a6cd2c4a8d to 24Q3-release
Change-Id: I6701e54ee0d48b34322a5f3d8dd2feeb00e7bc06
2024-03-28 23:02:07 +00:00
mikeyuewang
29035f24bc Move the sysfs_modem_state from a product folder to gs-common
Bug: 331202327

Change-Id: Id9176ef2b8aa50b178e0cadf60d8a34876433377
2024-03-28 21:10:23 +00:00
Priyanka Advani
5f3cd46270 Merge "Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"" into 24D1-dev am: ce1c82e3b1
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26750103

Change-Id: Id97441ee75a43f418e589a15d8335ba14bd281d2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-28 20:20:53 +00:00
Priyanka Advani
ce1c82e3b1 Merge "Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"" into 24D1-dev 2024-03-28 20:01:53 +00:00
Priyanka Advani
406eea24ba Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"
Revert submission 26593083-lassen_pps

Reason for revert: Culprit for test breakages in b/331680556. Will be verifying through ABTD for confirmation and before submitting the revert.

Bug: b/331680556

Reverted changes: /q/submissionid:26593083-lassen_pps

Change-Id: I97e29eaf09238d708fb9d941a5988ad42d583655
2024-03-28 19:53:52 +00:00
Samridhi
a6cd2c4a8d Add SEPolicy domain for cavalry app am: 6561e3b343
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26554888

Change-Id: I8af4282ac6904d01d7acd5647e97070445c0bff0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-28 13:53:22 +00:00
Samridhi
6561e3b343 Add SEPolicy domain for cavalry app
AVC error logs: https://paste.googleplex.com/4870439005847552
Test: make selinux_policy, flash build and test
Bug: 329276535
Change-Id: I2ccb4d9205125f02f12cc26ea9e6e6e40b8d6ba2
2024-03-28 09:43:36 +00:00
Super Liu
8b74330011 [automerger skipped] touch: init service to access gti interactive_calibrate sysfs am: 58b64ca3fb -s ours
am skip reason: Merged-In I6296b9533dd0209e66832bfbbed6030a30077b96 with SHA-1 28754e355a is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26741130

Change-Id: Ice0917bc4bc31793e0ec835b95eab217f6600a69
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-28 08:40:48 +00:00
Super Liu
58b64ca3fb touch: init service to access gti interactive_calibrate sysfs
Write usage: setprop vendor.touch.gti0.ical VALUE

Any VALUE(e.g. 20X or 30X) set through this property will write
into gti interactive_calibrate sysfs except for the VALUE `read`.

Read usage: setprop vendor.touch.gti0.ical read
            getprop vendor.touch.gti0.ical.result
setprop with VALUE `read` will read the gti
interactive_calibrate sysfs and save the result to
vendor.touch.gti0.ical.result.

Besides, please add your DOMAIN to access vendor_gti_prop.
set_prop(DOMAIN, vendor_gti_prop)

Bug: 331139251
Test: Manually verify the result.
Change-Id: I6296b9533dd0209e66832bfbbed6030a30077b96
Merged-In: I6296b9533dd0209e66832bfbbed6030a30077b96
Signed-off-by: Super Liu <supercjliu@google.com>
(cherry picked from commit 28754e355a)
2024-03-28 07:27:32 +00:00
Treehugger Robot
83f398f4e8 Merge "touch: init service to access gti interactive_calibrate sysfs" into main 2024-03-28 07:26:12 +00:00
Eliot Wong
c387a9b7ac Add SEPolicy for vendor_camera_image_processing_hal_service
avc message:
03-15 17:48:21.744   440   440 E SELinux : avc:  denied  { add } for pid=863 uid=1000 name=com.google.android.imageprocessing.IImageProcessingHal scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_image_processing_hal_service:s0 tclass=service_manager permissive=1

Bug: 323402267
Test: atest liblyric.services_image_processing_hal_test
Test: demo app
Change-Id: Idc9752a1a3f4b18de5f720a384fae97f0f160e98
2024-03-28 01:50:02 +00:00
Android Build Coastguard Worker
581273075f Snap for 11635697 from 709c2f596d to 24Q3-release
Change-Id: I2ec8a5a9045f357e3a4557e58cb2cc4876bfab08
2024-03-27 23:02:31 +00:00
Charles Yeh
709c2f596d Merge "Add a factoryota-watch.mk file to include the OtaClient for wearable device." into main 2024-03-27 06:03:33 +00:00
Charles Yeh
c979d12d72 Add a factoryota-watch.mk file to include the OtaClient for wearable
device.

Bug: 303001898
Test: build rom and check it works
Change-Id: Ifcd7da3eabbddfa903662d26609a2e6a5248ece9
2024-03-27 03:11:31 +00:00
Super Liu
28754e355a touch: init service to access gti interactive_calibrate sysfs
Write usage: setprop vendor.touch.gti0.ical VALUE

Any VALUE(e.g. 20X or 30X) set through this property will write
into gti interactive_calibrate sysfs except for the VALUE `read`.

Read usage: setprop vendor.touch.gti0.ical read
            getprop vendor.touch.gti0.ical.result
setprop with VALUE `read` will read the gti
interactive_calibrate sysfs and save the result to
vendor.touch.gti0.ical.result.

Besides, please add your DOMAIN to access vendor_gti_prop.
set_prop(DOMAIN, vendor_gti_prop)

Bug: 331139251
Test: Manually verify the result.
Change-Id: I6296b9533dd0209e66832bfbbed6030a30077b96
Signed-off-by: Super Liu <supercjliu@google.com>
2024-03-27 01:01:40 +00:00
Android Build Coastguard Worker
ef4291032a Snap for 11623990 from d4de4ddf90 to 24Q3-release
Change-Id: I5e186a8cecff5af268b00d81f60f58d718c5eaac
2024-03-25 23:02:22 +00:00
Klines Jiang
d4de4ddf90 [Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet
Pixel 5a (barbet) does not support Pixel dump, we need to exclude build
Pixel dump for Pixel 5a (barbet). The git_24Q2-beta-release TARGET_PRODUCT is barbet_beta, updated to barbet% for all barbet target products.

Bug: 330819191

Test: Local build and trigger a new build the result passed

Change-Id: I2c1785105bab74a483bc68893d96a8a88eabfd90
2024-03-25 14:41:13 +00:00
Chia-Chi Teng
7429882fba sepolicy: Allow PixelGnss to connect to Chre HAL am: 9a7af460a5
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26617900

Change-Id: If756d3473fa9b6ac556a16766220033c2fd53e63
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-25 13:09:33 +00:00
Android Build Coastguard Worker
7477e940f9 Snap for 11617975 from ec93f458c6 to 24Q3-release
Change-Id: I42223feb5bc464b198ea391e2a967f8d7ff26073
2024-03-23 01:01:54 +00:00
Chia-Chi Teng
9a7af460a5 sepolicy: Allow PixelGnss to connect to Chre HAL
avc:  denied  { read } for  name="u:object_r:vendor_chre_hal_prop:s0" dev="tmpfs" ino=401 scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:vendor_chre_hal_prop:s0 tclass=file permissive=0
avc:  denied  { find } for pid=900 uid=1021 name=android.hardware.contexthub.IContextHub/default scontext=u:r:hal_gnss_pixel:s0 tcontext=u:object_r:hal_contexthub_service:s0 tclass=service_manager permissive=0
avc:  denied  { call } for  scontext=u:r:hal_gnss_pixel:s0 tcontext=u:r:hal_contexthub_default:s0 tclass=binder permissive=0
avc:  denied  { call } for  scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder permissive=0

Bug: 316227249
Test: Verify PixelGnss HAL can connect to Chre HAL.
Test: Function test verification b/330120749 without disable selinux.
Test: No avc error log in logcat.
Change-Id: Ia1052dbc14fdbb6287cd0958b30e1a1a116b7a80
2024-03-22 03:04:04 +00:00
Treehugger Robot
ec93f458c6 Merge "dumpstate: thermal: Add tmu intpend dumps" into 24D1-dev am: 4055216656
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26593649

Change-Id: Icc99ec08cc2e8da6de4e99c9d8d02bd92268c4af
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-22 01:31:09 +00:00
Treehugger Robot
4055216656 Merge "dumpstate: thermal: Add tmu intpend dumps" into 24D1-dev 2024-03-22 01:12:45 +00:00
Android Build Coastguard Worker
43224e0300 Snap for 11610847 from 7a5eea3546 to 24Q3-release
Change-Id: I293b1b8667efdb179fc3b5b4265d381d54f52735
2024-03-21 23:02:01 +00:00
Sam Ou
7a5eea3546 Merge "sepolicy: allow the communication between audio and battery_mitigation hal" into 24D1-dev am: 5a78c395eb
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26543992

Change-Id: I4aa587059c650eae8afc774380efd60a9dd3cc3f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-21 11:57:33 +00:00
Sam Ou
5a78c395eb Merge "sepolicy: allow the communication between audio and battery_mitigation hal" into 24D1-dev 2024-03-21 11:41:43 +00:00
JJ Lee
8147b44aba Dumpstate: add DVFSA32 and lengthen timeouts for memory_votes_* am: eee8e04b92
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26593440

Change-Id: I8017a2540ddb1c4c1f9ab0c0bdb6fc1349ff5ae5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-21 02:40:16 +00:00
Android Build Coastguard Worker
d3138f6651 Snap for 11603317 from ca1efb166e to 24Q3-release
Change-Id: Ie0b678e4296a6dfb866fedb563f39b554937c79c
2024-03-20 23:02:29 +00:00
Devika Krishnadas
2997e4f81b Merge "Add pixel mapper service context" into main 2024-03-20 20:37:59 +00:00
Treehugger Robot
0e52931311 Merge "Revert "Enable MTE workaround for b/324412910"" into main 2024-03-20 18:44:32 +00:00
Devika Krishnadas
9357dd1314 Add pixel mapper service context
Bug: 267352318
Test: Build & check SELinux denials

Change-Id: I763f49d2ef38ae0ab5c1ee1652957f6512f8fbc6
Signed-off-by: Devika Krishnadas <kdevika@google.com>
2024-03-20 18:12:29 +00:00
Yurii Shutkin
ca1efb166e rpmb_dev: add rpmb_dev package am: f02f35fa9c am: 2120172acc
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3001224

Change-Id: Ie7dd866a919ead418e8e411a8e0f8d5ca8f99eed
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-20 15:07:42 +00:00
Mitch Phillips
78662f8356 Revert "Enable MTE workaround for b/324412910"
This reverts commit 442f99acaf.

Re-enable MTE in this process now that the underlying issue has been
fixed.

Bug: 324412910
Test: Boot the device, observe no crashes.
Change-Id: I8b9e093f25b33b94e0c9635815d9b0a6e2f91b70
2024-03-20 14:54:04 +00:00
Yurii Shutkin
2120172acc rpmb_dev: add rpmb_dev package am: f02f35fa9c
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3001224

Change-Id: Ia2a0d785d9988b2ab661ada8c0c23f28c472fc30
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-20 14:37:56 +00:00
Sandeep Bandaru
5a574f45ab Merge "Adding policies for allowing inference services with TPU from isolated_compute_app" into main 2024-03-20 11:28:50 +00:00
sandeepbandaru
76ed6d8a6d Adding policies for allowing inference services with TPU from isolated_compute_app
Test: make
Bug:309953452
Change-Id: I2b0dc17f1debc71ed78d37007213210a7a1aed77
2024-03-19 21:28:56 +00:00
samou
0d88550486 sepolicy: allow the communication between audio and battery_mitigation hal
Bug: 330302105
Change-Id: I28a3b67594319d857a8c46bc8c02cddc539caaf8
Signed-off-by: samou <samou@google.com>
2024-03-19 12:01:46 +00:00
JJ Lee
eee8e04b92 Dumpstate: add DVFSA32 and lengthen timeouts for memory_votes_*
Bug: 328362738
Test: build pass
Change-Id: I0db129604911794e0fbdaf91b67b2e6fbda07e4d
Signed-off-by: JJ Lee <leejj@google.com>
2024-03-19 08:19:10 +00:00
YiHo Cheng
8051099b42 dumpstate: thermal: Add tmu intpend dumps
tmu intpend register dump sysfs is added so add the sysfs in thermal
dump script as well

Bug: 271619423
Test: adb bugreport
Change-Id: I9d5fe4302ce6101837a075ab46798e5f49a61d7d
2024-03-15 18:04:10 +08:00
kierancyphus
d26d8270ff shamp: Add SEPolicy and compat matrix for shamp
Bug: 329367768

This is the basic SELinux setup for a HAL. Since this lives in
gs-common and not all pixel devices will have the corresponding vendor
manifest, this hal will have to be marked as optional.

Test: If this was configured incorrectly, then the build should fail
Doc: go/shared-modem-platform-cpp-backend
Change-Id: I6dd0ee3d68ff226e14e3bdffe2e828c1184c1a01
2024-03-14 01:50:33 +00:00
Android Build Coastguard Worker
5e3dbdf6d4 Snap for 11571437 from 210f14f36d to 24Q3-release
Change-Id: Ic14da60f3937ff1de26e2ffc824e0e52f5b79cba
2024-03-13 23:02:06 +00:00
Zheng Pan
210f14f36d Merge "Support conditional insmod" into main 2024-03-13 18:40:41 +00:00
Yurii Shutkin
f02f35fa9c rpmb_dev: add rpmb_dev package
rpmb_dev is a mock implementation of rpmb for storageproxy.
It is used on emulation platforms where we don't have
real rpmb support in ufs.

Change-Id: I7a0d9e3ae2fef4c7652df9558c1d0aaaea328949
Test: storageproxyd
Bug: 328769740
Signed-off-by: Yurii Shutkin <shutkin@google.com>
2024-03-13 17:49:16 +01:00
kierancyphus
c14a6a75cc shamp: Create soong config variable for vendors
Bug: 328704096

The soong config variable should be defined for all pixel products to
enforce backwards compatability (ensure that this is never built for non
enabled devices). In the case where `SHARED_MODEM_PLATFORM` is not
defined, then the soong config variable will choose the default
placeholder implmentation.

Doc: go/shared-modem-platform-cpp-backend
Test: Build for enabled and disabled targets and ensure that the
correct version of `shared_modem_platform` is being built.

Change-Id: I06ebdada2324fdd86cbb7718fd66602dd52070ea
2024-03-13 18:48:01 +08:00
Hongyang Jiao
19a7c4cda0 Merge "Add betterbug folder to gs-common" into main 2024-03-13 04:30:06 +00:00
Zheng Pan
b2a04f23d6 Support conditional insmod
Conditional insmod config file format

condinsmod|system_property_name|module1|module2

if getprop system_property_name == true;
    load module1
else
    load module2

Bug: 325647677
Change-Id: I0f2dd92caaefd707a626b9f80923aeab495d31a2
2024-03-12 18:21:05 -07:00
Wei Wang
16cadfdc02 Merge "sepolicy: allow setprop for thermal_controld" into 24D1-dev am: 212df1bf25
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26541909

Change-Id: I959f37b3a25e5923efb6fd29b77019a263debfde
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-13 00:56:13 +00:00
Wei Wang
212df1bf25 Merge "sepolicy: allow setprop for thermal_controld" into 24D1-dev 2024-03-13 00:16:31 +00:00
Android Build Coastguard Worker
9889b39458 Snap for 11565217 from ce4e42d661 to 24Q3-release
Change-Id: Id9d00e8d77bb114bfb7b7446e1f2c8979c19a686
2024-03-12 23:02:23 +00:00
Hongyang Jiao
9b300b02b1 Add betterbug folder to gs-common
Better Bug was previously labeled as priv_app, here we kept the same 'type=privapp_data_file levelFrom=user'

Copied some Better Bug used rules from system/sepolicy/private/priv_app.te.
(https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:system/sepolicy/private/priv_app.te;l=1?q=priv_app.te)

Test: local test
Bug: 322543833
Change-Id: Ia029e855dd46e65b9eec31835ccaabb3cb903058
2024-03-12 21:34:08 +00:00
Richard Hsu
ce4e42d661 Merge "[mlock] Allow edgetpu_app_service to call mlock()" into 24D1-dev am: 7462c63bdf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26481028

Change-Id: I4db9f953995528712eb71d8a4cdf9549509b2e12
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-12 18:41:46 +00:00
Richard Hsu
7462c63bdf Merge "[mlock] Allow edgetpu_app_service to call mlock()" into 24D1-dev 2024-03-12 18:03:20 +00:00
Shinru Han
4aa81ec2aa Merge "gps: Update gps makefile" into main 2024-03-12 07:06:17 +00:00
Android Build Coastguard Worker
c276b9635a Snap for 11558480 from 39617f5731 to 24Q3-release
Change-Id: I81c65d99ada90f9bab7ee26c23da81297b2ef108
2024-03-11 23:02:02 +00:00
Richard Hsu
f9c4631891 [mlock] Allow edgetpu_app_service to call mlock()
This CL references keunyoung's ag/25999220

This is to support the GenAI effort, allowing file backed large models to be mlocked, satisfying the memory accounting on Android.

AVC error message:
https://paste.googleplex.com/5844645780652032

Bug: 322229786

Tested:
end-to-end on ZUM and ZPR.

Change-Id: I6abef85eebbc051cb5e41b8f11f70f7ae1b489ab
2024-03-11 12:16:02 -07:00
TeYuan Wang
2e4c437b43 sepolicy: allow setprop for thermal_controld
selinux denied log:
[   53.774820] type=1400 audit(1709683991.036:9): avc:  denied  { write } for  comm="setprop" name="property_service" dev="tmpfs" ino=842 scontext=u:r:pixel-thermal-control-sh:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0

Bug: 328118301
Test: adb shell getprop vendor.disable.thermalhal.control
Change-Id: I590f05d1119d11400b0115fff63b3420790e7332
2024-03-11 19:00:11 +00:00
Poomarin Phloyphisut
39617f5731 [HDMI Audio] Fix SEPolicy issue that prevent HDMI audio functionality. am: 292145d81e
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/26495841

Change-Id: I4e4365c8b8a87360b954aa2e5749fc039cce7f5f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-11 13:06:33 +00:00
Shinru Han
3647a441ad gps: Update gps makefile
Test: on-device
Bug: 326527903
Change-Id: I4357e7a7c5c35c9bdfd94fa8c1fd59d21bbcd668
2024-03-11 06:33:02 +00:00
Poomarin Phloyphisut
292145d81e [HDMI Audio] Fix SEPolicy issue that prevent HDMI audio functionality.
Error:
avc:  denied  { search } for  comm="binder:845_2" name="hdmi_audio" dev="sysfs" ino=77907 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:sysfs_extcon:s0 tclass=dir permissive=0

Test: Local test.
Bug: 327710671
Change-Id: I413f4edae98cb0b868a4b6b7c62f6d4ae6f17727
2024-03-11 01:51:06 +00:00
Android Build Coastguard Worker
70a47a29ee Snap for 11551442 from 197c60eb8b to 24Q3-release
Change-Id: Ib2dec8975874c4b1d82800b13aa023a30e1b8aa4
2024-03-09 02:02:20 +00:00
Cole Faust
197c60eb8b Use soong_config_get/set instead of raw variable accesses am: c44cfe952d am: ee24fe5dbf
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2995000

Change-Id: I4d31d554656b31ff9c67de9e396e64530287e9ba
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-08 20:15:11 +00:00
Cole Faust
ee24fe5dbf Use soong_config_get/set instead of raw variable accesses am: c44cfe952d
Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2995000

Change-Id: Id99e9d82b159e17504d6f1272a3a990757baa1a0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-08 19:30:32 +00:00
TeYuan Wang
b878885499 sepolicy: allow setprop for thermal_controld
selinux denied log:
[   53.774820] type=1400 audit(1709683991.036:9): avc:  denied  { write } for  comm="setprop" name="property_service" dev="tmpfs" ino=842 scontext=u:r:pixel-thermal-control-sh:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0

Bug: 328118301
Test: adb shell getprop vendor.disable.thermalhal.control
Change-Id: I590f05d1119d11400b0115fff63b3420790e7332
2024-03-08 04:05:07 +00:00
Android Build Coastguard Worker
3be4f236f1 Snap for 11545716 from bc4933eeb1 to 24Q3-release
Change-Id: Ibbbad8af7534d747c0c22a25d92e3a52764d184c
2024-03-08 00:01:57 +00:00
Cole Faust
c44cfe952d Use soong_config_get/set instead of raw variable accesses
The raw variable accesses are breaking the rbc product config CI.

Test: ./build/bazel/ci/rbc_dashboard.py --quick factory_husky-trunk_staging-userdebug factory_ripcurrent factory_shiba
Change-Id: Ied0b29d9eeae65fb94900258627247b0a4145bc5
2024-03-07 10:17:32 -08:00
Xin Li
bc4933eeb1 [automerger skipped] Merge Android 14 QPR2 to AOSP main am: dca283b418 -s ours am: 78d1620fb8 -s ours
am skip reason: Merged-In Ib12b30703f889fb1b0172fbe40415f4e6936d63e with SHA-1 1eaa8b8952 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2989219

Change-Id: I0ba7385cf8cc72ca80bc00d1004abf34600ceb99
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-07 10:46:25 +00:00
Xin Li
78d1620fb8 [automerger skipped] Merge Android 14 QPR2 to AOSP main am: dca283b418 -s ours
am skip reason: Merged-In Ib12b30703f889fb1b0172fbe40415f4e6936d63e with SHA-1 1eaa8b8952 is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/2989219

Change-Id: I3c10177382487e613a5ef95fc9691f6eb2a3342b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-07 09:55:00 +00:00
Xin Li
dca283b418 Merge Android 14 QPR2 to AOSP main
Bug: 319669529
Merged-In: Ib12b30703f889fb1b0172fbe40415f4e6936d63e
Change-Id: I9b746fcebbdff92a2fa86ca2fff0452cc234e067
2024-03-06 09:29:48 -08:00
Android Build Coastguard Worker
5e9ee8f596 Snap for 11533280 from d996312839 to 24Q3-release
Change-Id: Iebffbf0e81742620909a33ef9fc94783f5de74db
2024-03-06 00:02:06 +00:00
Bart Sears
d996312839 Merge "Revert "Add betterbug folder to gs-common"" into main 2024-03-05 20:38:11 +00:00
Daniel Chapin
aca06d61c6 Revert "Add betterbug folder to gs-common"
Revert submission 26348985-bb-sepolicy-poc

Reason for revert: Droidfood blocking bug: b/327991669

Bug: b/327991669

Reverted changes: /q/submissionid:26348985-bb-sepolicy-poc

Change-Id: I0fe0bb22e293093d941b4d8ba826c8c8689a370d
2024-03-05 20:35:50 +00:00
Mark Chang
5c635e51a8 Merge "Move sepolicy files from hardware/google/pixel-sepolicy." into main 2024-03-05 05:31:47 +00:00
Android Build Coastguard Worker
fea4114f34 Snap for 11526283 from c093a56797 to 24Q3-release
Change-Id: Ib7e2166c8f326f8d8473d03985a26e69b30d32a3
2024-03-05 00:26:05 +00:00
Ted Wang
56581adeb7 Switch to new Bluetooth Finder HAL
Bug: 310790725
Test: Manual
Change-Id: I7a0a766fa3e0f02daff496c2370722f85b6e6740
2024-03-04 05:29:17 +00:00
Android Build Coastguard Worker
12b05d3ca8 Snap for 11520864 from f507e4a7f7 to 24Q3-release
Change-Id: Ie9784a157e138d46c06a3810bc1892069d77e21e
2024-03-02 02:02:30 +00:00
Mark Chang
542efdc2b9 Move sepolicy files from hardware/google/pixel-sepolicy.
Bug: 325422902
Test: Manual, system booted without sepolicy denied error.

Change-Id: I2146a2b1524d6d5a3d4a17635cce21c29c56c248
Signed-off-by: Mark Chang <changmark@google.com>
2024-03-01 11:59:40 +00:00
Android Build Coastguard Worker
fea3bc4814 Snap for 11517216 from 792837721c to 24Q3-release
Change-Id: I1e26b602b7441586252e99d8ddd39d91a94b5a58
2024-03-01 00:02:49 +00:00
Android Build Coastguard Worker
53bfb2c06e Snap for 11510413 from c66788d5a7 to 24Q3-release
Change-Id: Ibbe217ccef47c96ea7ad50a6327ae406307278d4
2024-02-29 00:02:48 +00:00
Android Build Coastguard Worker
0fdd17eb38 Snap for 11504269 from 525803fc3e to 24Q3-release
Change-Id: I20759f283e847b1752e47fbc3b9b79f17071295e
2024-02-28 00:02:51 +00:00
Android Build Coastguard Worker
fc2353a384 Snap for 11492556 from 5cb8b637f6 to 24Q3-release
Change-Id: I431e2fb344b05a75a431f82065f919f6e11517fc
2024-02-24 02:16:48 +00:00
Android Build Coastguard Worker
b0774364a1 Snap for 11486189 from 1f9b2775bd to 24Q3-release
Change-Id: I349468a3cc288b991451a18f4e3c877af9fa9cde
2024-02-23 00:02:46 +00:00
Android Build Coastguard Worker
bfa3b63647 Snap for 11479750 from 2ce657ec4f to 24Q3-release
Change-Id: If6b216e478603dcea381e2ef32f4c93850d4fbc7
2024-02-22 00:03:03 +00:00
Android Build Coastguard Worker
746dc7b36d Snap for 11469542 from 64ede7b44c to 24Q3-release
Change-Id: I091dd3baf9b8026f4971bdef4707fdf68919c852
2024-02-20 00:02:37 +00:00
Android Build Coastguard Worker
a2f3dec8c0 Snap for 11463929 from ec7b492ebd to 24Q3-release
Change-Id: Id80125bdde9f81cb0eba2eefb3e22e6346ff10c1
2024-02-17 02:03:04 +00:00
Android Build Coastguard Worker
4caf74726f Snap for 11449429 from 0cdeb7aed1 to 24Q3-release
Change-Id: I45d26ec3bc673f078f5dc59da79d71fb1f5e8ee4
2024-02-15 00:02:33 +00:00
Android Build Coastguard Worker
b79d120c94 Snap for 11444718 from fb4b82b874 to 24Q3-release
Change-Id: I08730fc6621706c307a55e02d29d0e1a0848d0f1
2024-02-14 00:03:11 +00:00
Android Build Coastguard Worker
664da34aed Snap for 11438798 from 14c6c627ef to 24Q3-release
Change-Id: I88ee266132fd4bd4aced05df1cf4b966ae565473
2024-02-13 00:03:19 +00:00
499 changed files with 4372 additions and 360 deletions

1
.gitupstream Normal file
View File

@@ -0,0 +1 @@
https://android.googlesource.com/device/google/gs-common

11
FSTAB_OWNERS Normal file
View File

@@ -0,0 +1,11 @@
# NOTE: CHANGE THIS FILE WITH CAUTIOUS
# - this file is referenced by other OWNERS file, e.g. device/google/*/OWNERS
# - changing this file might break the function, check go/gerrit-code-owners-syntax first
jaegeuk@google.com
huangrandall@google.com
bvanassche@google.com
daehojeong@google.com
chullee@google.com
vkon@google.com
thomasyen@google.com

20
MK_OWNERS Normal file
View File

@@ -0,0 +1,20 @@
# NOTE: CHANGE THIS FILE WITH CAUTIOUS
# - this file is referenced by other OWNERS file, e.g. device/google/*/OWNERS
# - changing this file might break the function, check go/gerrit-code-owners-syntax first
#
# Makefile Review Guide for OWNERS: go/pixel-device-mk-owner-checklist
aaronding@google.com
rurumihong@google.com
adamshih@google.com
wilsonsung@google.com
cyanhsieh@google.com
cyuanjen@google.com
robinpeng@google.com
achant@google.com
etam@google.com
pattjin@google.com
bkhalife@google.com
lokeshgoel@google.com
jainne@google.com
pscovanner@google.com

5
OWNERS
View File

@@ -1,6 +1,5 @@
per-file *.te,*_contexts,te_macros,global_macros=set noparent
per-file *.te,*_contexts,te_macros,global_macros=file:/sepolicy/OWNERS
per-file *.mk=set noparent
per-file *.mk=aaronding@google.com,rurumihong@google.com,adamshih@google.com,wilsonsung@google.com,cyanhsieh@google.com,cyuanjen@google.com,robinpeng@google.com,achant@google.com,etam@google.com,pattjin@google.com,bkhalife@google.com,lokeshgoel@google.com,jainne@google.com,pscovanner@google.com
per-file *.mk,{**/,}Android.bp=set noparent
per-file *.mk,{**/,}Android.bp=file:MK_OWNERS

View File

@@ -4,23 +4,17 @@ PRODUCT_PACKAGES += dump_aoc \
aocd \
aocxd
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
# If AoC Daemon is not present on this build, load firmware at boot via rc
ifeq ($(wildcard vendor/google/whitechapel/aoc/aocd),)
PRODUCT_COPY_FILES += \
device/google/gs-common/aoc/conf/init.aoc.nodaemon.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.aoc.rc
else
PRODUCT_COPY_FILES += \
device/google/gs-common/aoc/conf/init.aoc.daemon.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.aoc.rc
ifneq ($(wildcard vendor/google/whitechapel/aoc/aocx/aidl/aocx/framework_compatibility_matrix.xml),)
DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE += \
vendor/google/whitechapel/aoc/aocx/aidl/aocx/framework_compatibility_matrix.xml
endif
# AoC debug support
PRODUCT_PACKAGES_DEBUG += \
PRODUCT_PACKAGES_ENG += \
aocdump \
aocutil \
aoc_audio_cfg \

View File

@@ -29,9 +29,10 @@ int main() {
runCommand("AoC logging wake", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/logging_wakeup");
runCommand("AoC hotword wake", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/hotword_wakeup");
runCommand("AoC memory exception wake", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/memory_exception");
runCommand("AoC memory votes", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/memory_votes_a32");
runCommand("AoC memory votes", "timeout 0.1 cat /sys/devices/platform/*.aoc/control/memory_votes_ff1");
runCommand("AoC memory votes", "timeout 0.5 cat /sys/devices/platform/*.aoc/control/memory_votes_a32");
runCommand("AoC memory votes", "timeout 0.5 cat /sys/devices/platform/*.aoc/control/memory_votes_ff1");
runCommand("clean AoC buffer","echo ' ' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
runCommand("AoC DVFS (A32)", "echo 'dbg info -c 1 DVFSA32' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
runCommand("AoC DVFS (FF1)", "echo 'dbg info -c 2 DVFSFF1' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
runCommand("AoC Monitor Mode Status", "echo 'monitor_mode status' > /dev/acd-debug; timeout 0.1 cat /dev/acd-debug");
return 0;

View File

@@ -26,3 +26,6 @@ add_service(aocxd, aocx);
# allow managing thread priority
allow aocxd self:global_capability_class_set sys_nice;
allow aocxd dumpstate:fd use;
allow aocxd dumpstate:fifo_file write;

View File

@@ -0,0 +1,2 @@
# Allow dumpstate to talk to aocxd over binder
binder_call(dumpstate, aocxd)

View File

@@ -28,7 +28,15 @@
/dev/acd-audio_ap_offload_tx u:object_r:aoc_device:s0
/dev/acd-mel_processor u:object_r:aoc_device:s0
/dev/acd-aocx_control u:object_r:aoc_device:s0
/dev/acd-aocx_inject[0-9]* u:object_r:aoc_device:s0
/dev/acd-aocx_tapout[0-9]* u:object_r:aoc_device:s0
/dev/acd-mc_headpos u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_ctl u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_data_tx u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_data_rx u:object_r:aoc_device:s0
/dev/acd-chre_ctl u:object_r:aoc_device:s0
/dev/acd-chre_data_tx u:object_r:aoc_device:s0
/dev/acd-chre_data_rx u:object_r:aoc_device:s0
# AoC vendor binaries
/vendor/bin/aocd u:object_r:aocd_exec:s0

1
aoc/sepolicy/service.te Normal file
View File

@@ -0,0 +1 @@
type aocx, service_manager_type;

View File

@@ -0,0 +1 @@
aocx.IAocx/default u:object_r:aocx:s0

View File

@@ -1 +0,0 @@
type aocx, vndservice_manager_type;

View File

@@ -1 +0,0 @@
aocx.IAocx u:object_r:aocx:s0

View File

@@ -6,9 +6,6 @@ PRODUCT_PACKAGES += \
android.hardware.audio.service-aidl.aoc \
vendor.google.whitechapel.audio.hal.parserservice \
# AIDL software effects. These are the effects supporting in all projects.
# For the project-specific effects, such as haptic generator, please add them
# to makefile in the project's device folder.
PRODUCT_PACKAGES += \
libvisualizeraidl \
libbundleaidl \
@@ -16,9 +13,14 @@ PRODUCT_PACKAGES += \
libdynamicsprocessingaidl \
libloudnessenhanceraidl \
libdownmixaidl \
libhapticgeneratoraidl \
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/aidl
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio
ifeq ($(AUDIO_USE_DPTX_SEPOLICY),true)
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio/dptx
else
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio/drmdp
endif
include device/google/gs-common/audio/common.mk
@@ -29,4 +31,11 @@ PRODUCT_PROPERTY_OVERRIDES += \
PRODUCT_SYSTEM_EXT_PROPERTIES += \
ro.audio.ihaladaptervendorextension_enabled=true
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
$(call soong_config_set,aoc_audio_func,dump_usecase_data,true)
$(call soong_config_set,aoc_audio_func,hal_socket_control,true)
$(call soong_config_set,aoc_audio_func,record_tuning_keys,true)
$(call soong_config_set,aoc_audio_func,aidl_command_interface,true)
endif
$(call soong_config_set,pixel_audio_hal_type,aidl_build,true)

View File

@@ -1,15 +1,7 @@
<compatibility-matrix version="1.0" type="framework">
<hal format="hidl">
<name>vendor.google.audiometricext</name>
<version>1.0</version>
<interface>
<name>IAudioMetricExt</name>
<instance>default</instance>
</interface>
</hal>
<hal format="aidl">
<name>vendor.google.whitechapel.audio.extension</name>
<version>1</version>
<version>4</version>
<interface>
<name>IAudioExtension</name>
<instance>default</instance>

View File

@@ -1,11 +1,2 @@
<manifest version="1.0" type="device">
<hal format="hidl">
<name>vendor.google.audiometricext</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IAudioMetricExt</name>
<instance>default</instance>
</interface>
</hal>
</manifest>

View File

@@ -3,8 +3,15 @@ BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/common
#Audio Vendor libraries
PRODUCT_PACKAGES += \
libfvsam_prm_parser \
libmahalcontroller \
libmahalcontroller
ifeq ($(USE_MAM_V4_ABOVE),true)
PRODUCT_PACKAGES += \
libMAM_Google_Pixel_Android
else
PRODUCT_PACKAGES += \
libAlgFx_HiFi3z
endif
ifneq ($(USE_AUDIO_HAL_AIDL),true)
## AudioHAL Configurations

View File

@@ -32,8 +32,14 @@ PRODUCT_PACKAGES += \
libamcsextfile \
audio_amcs_ext \
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hidl
include device/google/gs-common/audio/common.mk
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/audio/hidl/device_framework_matrix_product_gs101.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/audio/hidl/device_framework_matrix_product_gs101.xml

View File

@@ -32,6 +32,12 @@ PRODUCT_PACKAGES += \
audio_spk_35l41 \
sound_trigger.primary.$(TARGET_BOARD_PLATFORM)
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hidl
include device/google/gs-common/audio/common.mk

View File

@@ -35,8 +35,14 @@ PRODUCT_PACKAGES += \
audio_hdmi_aoc \
sound_trigger.primary.$(TARGET_BOARD_PLATFORM)
ifeq (,$(filter aosp_%,$(TARGET_PRODUCT)))
# IAudioMetricExt HIDL
PRODUCT_PACKAGES += \
vendor.google.audiometricext@1.0-service-vendor
endif
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hidl
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/hdmi_audio/drmdp
include device/google/gs-common/audio/common.mk

View File

@@ -1 +1,4 @@
add_service(hal_audio_default, hal_audio_ext_service)
# Allow audio-hal to register battery_mitigation service
allow hal_audio_default hal_battery_mitigation_service:service_manager find;
binder_call(hal_audio_default, battery_mitigation)

View File

@@ -21,3 +21,4 @@ genfscon sysfs /devices/platform/audiometrics/call_count u:ob
genfscon sysfs /devices/platform/audiometrics/offload_effects_id u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/offload_effects_duration u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/bt_usage u:object_r:sysfs_pixelstats:s0
genfscon sysfs /devices/platform/audiometrics/speaker_version u:object_r:sysfs_pixelstats:s0

View File

@@ -1,3 +1,4 @@
# allow access to folders
allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms;
allow hal_audio_default audio_vendor_data_file:file create_file_perms;
@@ -12,6 +13,9 @@ allow hal_audio_default aoc_device:chr_file rw_file_perms;
allow hal_audio_default amcs_device:file rw_file_perms;
allow hal_audio_default amcs_device:chr_file rw_file_perms;
allow hal_audio_default sysfs_pixelstats:file rw_file_perms;
allow hal_audio_default sysfs_extcon:dir search;
allow hal_audio_default sysfs_extcon:file r_file_perms;
allow hal_audio_default vendor_usb_debugfs:dir search;
#allow access to aoc and kernel boottime
allow hal_audio_default sysfs_aoc:dir { search };
@@ -21,6 +25,7 @@ allow hal_audio_default sysfs_aoc_boottime:file r_file_perms;
allow hal_audio_default dmabuf_heap_device:chr_file r_file_perms;
set_prop(hal_audio_default, vendor_audio_prop);
set_prop(hal_audio_default, vendor_audio_prop_restricted);
hal_client_domain(hal_audio_default, hal_health);
hal_client_domain(hal_audio_default, hal_thermal);

View File

@@ -1,2 +1,5 @@
# Audio
vendor_internal_prop(vendor_audio_prop)
# The property for Audio App
vendor_restricted_prop(vendor_audio_prop_restricted)

View File

@@ -1,3 +1,6 @@
# for serial no
vendor.audio_hal.device.serialno u:object_r:vendor_audio_prop:s0
# for audio
vendor.audio_hal.period_multiplier u:object_r:vendor_audio_prop:s0
vendor.audiodump.enable u:object_r:vendor_audio_prop:s0
@@ -9,3 +12,6 @@ vendor.audiodump.encode.disable u:object_r:vendor_audio_prop:s0
vendor.audiodump.log.cca.updated u:object_r:vendor_audio_prop:s0
vendor.audiodump.cca.config u:object_r:vendor_audio_prop:s0
vendor.audio_hal.aidl.enable u:object_r:vendor_audio_prop:s0
# for audio app
persist.vendor.app.audio. u:object_r:vendor_audio_prop_restricted:s0

View File

@@ -1,2 +1,5 @@
# Audio property
set_prop(vendor_init, vendor_audio_prop)
# Audio App property
set_prop(vendor_init, vendor_audio_prop_restricted)

View File

@@ -0,0 +1 @@
genfscon sysfs /devices/platform/dwc_dptx-audio/extcon/hdmi_audio u:object_r:sysfs_extcon:s0

View File

@@ -1,7 +1,7 @@
ifeq (,$(filter factory_%,$(TARGET_PRODUCT)))
PRODUCT_PACKAGES += battery_mitigation
endif
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
ifneq (,$(filter eng, $(TARGET_BUILD_VARIANT)))
ifeq (,$(filter factory_%,$(TARGET_PRODUCT)))
PRODUCT_PACKAGES += BrownoutDetection
endif

View File

@@ -24,6 +24,8 @@ allow battery_mitigation sysfs_bcl:lnk_file r_file_perms;
allow battery_mitigation sysfs_thermal:lnk_file r_file_perms;
allow battery_mitigation mitigation_vendor_data_file:dir rw_dir_perms;
allow battery_mitigation mitigation_vendor_data_file:file create_file_perms;
allow battery_mitigation dumpstate:fd use;
allow battery_mitigation dumpstate:fifo_file rw_file_perms;
# Allow battery_mitigation to use Binder IPC so that service manager can notify it for callbacks
binder_use(battery_mitigation)
@@ -31,3 +33,6 @@ binder_use(battery_mitigation)
wakelock_use(battery_mitigation)
# Allow battery_mitigation to run aidl service
add_service(battery_mitigation, hal_battery_mitigation_service)
# Allow battery_mitigation to run audio mitigation callback
binder_call(battery_mitigation, hal_audio_default)
binder_call(battery_mitigation, servicemanager)

View File

@@ -0,0 +1,3 @@
# To call battery_mitigation hal
allow dumpstate hal_battery_mitigation_service:service_manager find;
binder_call(dumpstate, battery_mitigation);

View File

@@ -1 +1 @@
type hal_battery_mitigation_service, protected_service, hal_service_type, service_manager_type;
type hal_battery_mitigation_service, hal_service_type, service_manager_type;

View File

@@ -1,6 +1,8 @@
PRODUCT_SOONG_NAMESPACES += vendor/broadcom/bluetooth
PRODUCT_PACKAGES += \
android.hardware.bluetooth-V1-ndk.so \
android.hardware.bluetooth.finder-V1-ndk.so \
android.hardware.bluetooth.ranging-V1-ndk.so \
android.hardware.bluetooth-service.bcmbtlinux \
vendor.google.bluetooth_ext-V1-ndk.so \
bt_vendor.conf \
@@ -9,6 +11,7 @@ PRODUCT_PACKAGES += \
BOARD_SEPOLICY_DIRS += device/google/gs-common/bcmbt/sepolicy
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/powerstats
DEVICE_MANIFEST_FILE += device/google/gs-common/bcmbt/manifest_bluetooth.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/bcmbt/compatibility_matrix.xml

View File

@@ -6,7 +6,6 @@
<name>IBluetoothFinder</name>
<instance>default</instance>
</interface>
<fqname>IBluetoothFinder/default</fqname>
<interface>
<name>IBluetoothCcc</name>
<instance>default</instance>

View File

@@ -34,7 +34,8 @@ int main() {
return 0;
}
dumpLogs(BCMBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 2, BCMBT_SNOOP_LOG_PREFIX);
dumpLogs(BCMBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 4,
BCMBT_SNOOP_LOG_PREFIX);
dumpLogs(BCMBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 2, BCMBT_BACKUP_SNOOP_LOG_PREFIX);
dumpLogs(BCMBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, BCMBT_FW_DUMP_LOG_PREFIX);
dumpLogs(BCMBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, BCMBT_CHRE_DUMP_LOG_PREFIX);

View File

@@ -1,3 +1,3 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/bcmbt/dump/sepolicy/
PRODUCT_PACKAGES_DEBUG += dump_bcmbt
PRODUCT_PACKAGES_ENG += dump_bcmbt

View File

@@ -4,6 +4,16 @@
<version>1</version>
<fqname>IBluetoothHci/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.finder</name>
<version>1</version>
<fqname>IBluetoothFinder/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.ranging</name>
<version>1</version>
<fqname>IBluetoothChannelSounding/default</fqname>
</hal>
<hal format="aidl">
<name>vendor.google.bluetooth_ext</name>
<version>1</version>

8
betterbug/betterbug.mk Normal file
View File

@@ -0,0 +1,8 @@
# When neither AOSP nor factory targets
ifeq (,$(filter aosp_% factory_% lineage_%, $(TARGET_PRODUCT)))
PRODUCT_PACKAGES += BetterBugStub
PRODUCT_PACKAGES_DEBUG += $(RELEASE_PACKAGE_BETTER_BUG)
endif
PRODUCT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/betterbug/sepolicy/product/public
PRODUCT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/betterbug/sepolicy/product/private

View File

@@ -0,0 +1,47 @@
typeattribute better_bug_app coredomain;
app_domain(better_bug_app)
net_domain(better_bug_app)
allow better_bug_app app_api_service:service_manager find;
allow better_bug_app mediaserver_service:service_manager find;
allow better_bug_app radio_service:service_manager find;
allow better_bug_app system_api_service:service_manager find;
allow better_bug_app privapp_data_file:file execute;
allow better_bug_app privapp_data_file:lnk_file r_file_perms;
allow better_bug_app shell_data_file:file r_file_perms;
allow better_bug_app shell_data_file:dir r_dir_perms;
# Allow traceur to pass file descriptors through a content provider to betterbug
allow better_bug_app trace_data_file:file { getattr read };
# Allow betterbug to read profile reports generated by profcollect.
userdebug_or_eng(`
allow better_bug_app profcollectd_data_file:file r_file_perms;
')
# Allow BetterBug access to WM traces attributes
allow better_bug_app wm_trace_data_file:dir r_dir_perms;
allow better_bug_app wm_trace_data_file:file getattr;
# Allow the bug reporting frontend to read the presence and timestamp of the
# trace attached to the bugreport (but not its contents, which will go in the
# usual bugreport .zip file). This is used by the bug reporting UI to tell if
# the bugreport will contain a system trace or not while the bugreport is still
# in progress.
allow better_bug_app perfetto_traces_bugreport_data_file:dir r_dir_perms;
allow better_bug_app perfetto_traces_bugreport_data_file:file { getattr };
# Allow BetterBug to receive Perfetto traces through the framework
# (i.e. TracingServiceProxy) and sendfile them into their private
# directories for reporting when network and battery conditions are
# appropriate.
allow better_bug_app perfetto:fd use;
allow better_bug_app perfetto_traces_data_file:file { read getattr };
# Allow BetterBug to set property to start vendor.touch_dumpstate
set_prop(better_bug_app, ctl_start_prop)
# Allow BetterBug to read system boot reason
get_prop(better_bug_app, system_boot_reason_prop)

View File

@@ -0,0 +1,2 @@
# BetterBug
user=_app isPrivApp=true name=com.google.android.apps.internal.betterbug domain=better_bug_app type=privapp_data_file levelFrom=user

View File

@@ -0,0 +1 @@
type better_bug_app, domain;

16
bluetooth/bluetooth.mk Normal file
View File

@@ -0,0 +1,16 @@
PRODUCT_SOONG_NAMESPACES += vendor/google/connectivity/bluetooth/common
PRODUCT_PACKAGES += \
android.hardware.bluetooth-V1-ndk.so \
android.hardware.bluetooth.finder-V1-ndk.so \
android.hardware.bluetooth.ranging-V1-ndk.so \
android.hardware.bluetooth-service.pixel \
vendor.google.bluetooth_ext-V1-ndk.so \
bt_vendor.conf \
android.hardware.bluetooth.prebuilt.xml \
android.hardware.bluetooth_le.prebuilt.xml
BOARD_SEPOLICY_DIRS += device/google/gs-common/bluetooth/sepolicy
BOARD_SEPOLICY_DIRS += hardware/google/pixel-sepolicy/powerstats
DEVICE_MANIFEST_FILE += device/google/gs-common/bluetooth/manifest_bluetooth.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/bluetooth/compatibility_matrix.xml

View File

@@ -0,0 +1,30 @@
<compatibility-matrix version="1.0" type="framework">
<hal format="aidl" optional="true">
<name>vendor.google.bluetooth_ext</name>
<version>1</version>
<interface>
<name>IBluetoothFinder</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothCcc</name>
<instance>default</instance>
</interface>
<interface>
<name>IBTChannelAvoidance</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothSar</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothExt</name>
<instance>default</instance>
</interface>
<interface>
<name>IBluetoothEwp</name>
<instance>default</instance>
</interface>
</hal>
</compatibility-matrix>

20
bluetooth/dump/Android.bp Normal file
View File

@@ -0,0 +1,20 @@
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
cc_binary {
name: "dump_bt",
srcs: ["dump.cpp"],
cflags: [
"-Wall",
"-Wextra",
"-Werror",
],
shared_libs: [
"libbase",
"libdump",
"liblog",
],
vendor: true,
relative_install_path: "dump",
}

44
bluetooth/dump/dump.cpp Normal file
View File

@@ -0,0 +1,44 @@
/*
* Copyright 2023 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <dump/pixel_dump.h>
#include <android-base/file.h>
#define PIXELBT_ACTIVITY_LOG_DIRECTORY "/data/vendor/bluetooth"
#define PIXELBT_SNOOP_LOG_DIRECTORY "/data/vendor/bluetooth"
#define PIXELBT_FW_LOG_DIRECTORY "/data/vendor/ssrdump/coredump"
#define PIXELBT_SNOOP_LOG_PREFIX "btsnoop_hci_vnd"
#define PIXELBT_BACKUP_SNOOP_LOG_PREFIX "backup_btsnoop_hci_vnd"
#define PIXELBT_FW_DUMP_LOG_PREFIX "coredump_bt_socdump_"
#define PIXELBT_CHRE_DUMP_LOG_PREFIX "coredump_bt_chredump_"
#define PIXELBT_HAL_DUMP_LOG_PREFIX "coredump_bt_"
#define PIXELBT_ACTIVITY_LOG_PREFIX "bt_activity_"
int main() {
std::string outputDir = concatenatePath(BUGREPORT_PACKING_DIR, "bt");
if (mkdir(outputDir.c_str(), 0777) == -1) {
printf("Unable to create folder: %s\n", outputDir.c_str());
return 0;
}
dumpLogs(PIXELBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 4,
PIXELBT_SNOOP_LOG_PREFIX);
dumpLogs(PIXELBT_SNOOP_LOG_DIRECTORY, outputDir.c_str(), 2, PIXELBT_BACKUP_SNOOP_LOG_PREFIX);
dumpLogs(PIXELBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_FW_DUMP_LOG_PREFIX);
dumpLogs(PIXELBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_CHRE_DUMP_LOG_PREFIX);
dumpLogs(PIXELBT_FW_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_HAL_DUMP_LOG_PREFIX);
dumpLogs(PIXELBT_ACTIVITY_LOG_DIRECTORY, outputDir.c_str(), 10, PIXELBT_ACTIVITY_LOG_PREFIX);
return 0;
}

View File

@@ -0,0 +1,3 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/bluetooth/dump/sepolicy/
PRODUCT_PACKAGES_DEBUG += dump_bt

View File

@@ -0,0 +1,12 @@
# pixel bluetooth common hal service
pixel_bugreport(dump_bt)
allow hal_dumpstate_default vendor_bt_data_file:dir { open read search };
allow hal_dumpstate_default vendor_bt_data_file:file read;
allow dump_bt radio_vendor_data_file:dir create_dir_perms;
allow dump_bt radio_vendor_data_file:file create_file_perms;
allow dump_bt vendor_bt_data_file:dir r_dir_perms;
allow dump_bt vendor_bt_data_file:file r_file_perms;
allow dump_bt sscoredump_vendor_data_crashinfo_file:dir search;
allow dump_bt sscoredump_vendor_data_coredump_file:dir r_dir_perms;
allow dump_bt sscoredump_vendor_data_coredump_file:file r_file_perms;

View File

@@ -0,0 +1,2 @@
# bt common hal dump_bt service
/vendor/bin/dump/dump_bt u:object_r:dump_bt_exec:s0

View File

@@ -0,0 +1,27 @@
<manifest version="1.0" type="device">
<hal format="aidl">
<name>android.hardware.bluetooth</name>
<version>1</version>
<fqname>IBluetoothHci/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.finder</name>
<version>1</version>
<fqname>IBluetoothFinder/default</fqname>
</hal>
<hal format="aidl">
<name>android.hardware.bluetooth.ranging</name>
<version>1</version>
<fqname>IBluetoothChannelSounding/default</fqname>
</hal>
<hal format="aidl">
<name>vendor.google.bluetooth_ext</name>
<version>1</version>
<fqname>IBTChannelAvoidance/default</fqname>
<fqname>IBluetoothCcc/default</fqname>
<fqname>IBluetoothEwp/default</fqname>
<fqname>IBluetoothExt/default</fqname>
<fqname>IBluetoothFinder/default</fqname>
<fqname>IBluetoothSar/default</fqname>
</hal>
</manifest>

View File

@@ -0,0 +1,3 @@
# Bt Wifi Coexistence device
type wb_coexistence_dev, dev_type;

View File

@@ -0,0 +1,6 @@
# Bluetooth
/vendor/bin/hw/android\.hardware\.bluetooth-service\.pixel u:object_r:hal_bluetooth_btlinux_exec:s0
/dev/wbrc u:object_r:wb_coexistence_dev:s0
/dev/ttySAC16 u:object_r:hci_attach_dev:s0

View File

@@ -0,0 +1,8 @@
# Bluetooth pin control device node
genfscon sysfs /devices/platform/odm/odm:btbcm/rfkill/rfkill0/state u:object_r:sysfs_bluetooth_writable:s0
genfscon sysfs /devices/platform/odm/odm:btbcm/rfkill/rfkill2/state u:object_r:sysfs_bluetooth_writable:s0
genfscon proc /bluetooth/sleep/lpm u:object_r:proc_bluetooth_writable:s0
genfscon proc /bluetooth/sleep/btwrite u:object_r:proc_bluetooth_writable:s0
genfscon proc /bluetooth/sleep/btwake u:object_r:proc_bluetooth_writable:s0
genfscon proc /bluetooth/timesync u:object_r:proc_bluetooth_writable:s0

View File

@@ -0,0 +1,19 @@
# coexistence device file node
add_hwservice(hal_bluetooth_btlinux, hal_bluetooth_coexistence_hwservice);
add_service(hal_bluetooth_btlinux, hal_bluetooth_coexistence_service);
allow hal_bluetooth_btlinux wb_coexistence_dev:chr_file rw_file_perms;
# power stats
allow hal_bluetooth_btlinux hal_power_stats_vendor_service:service_manager find;
binder_call(hal_bluetooth_btlinux, hal_power_stats_default)
# bt firmware dump
allow hal_bluetooth_btlinux aconfig_storage_metadata_file:dir search;
allow hal_bluetooth_btlinux sscoredump_vendor_data_crashinfo_file:dir rw_dir_perms;
allow hal_bluetooth_btlinux sscoredump_vendor_data_crashinfo_file:file rw_file_perms;
userdebug_or_eng(`
allow hal_bluetooth_btlinux sscoredump_vendor_data_coredump_file:dir create_dir_perms;
allow hal_bluetooth_btlinux sscoredump_vendor_data_coredump_file:file create_file_perms;
allow hal_bluetooth_btlinux logbuffer_device:chr_file r_file_perms;
')

View File

@@ -0,0 +1,3 @@
# Bluetooth HAL extension
type hal_bluetooth_coexistence_hwservice, hwservice_manager_type, vendor_hwservice_type;

View File

@@ -0,0 +1,6 @@
# Bluetooth HAL extension
hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.sar::IBluetoothSar u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.ccc::IBluetoothCcc u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.ewp::IBluetoothEwp u:object_r:hal_bluetooth_coexistence_hwservice:s0
hardware.google.bluetooth.ext::IBluetoothExt u:object_r:hal_bluetooth_coexistence_hwservice:s0

View File

@@ -0,0 +1,2 @@
# Bluetooth HAL extension
type hal_bluetooth_coexistence_service, hal_service_type, service_manager_type;

View File

@@ -0,0 +1,7 @@
# Bluetooth HAL extension
vendor.google.bluetooth_ext.IBTChannelAvoidance/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothSar/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothCcc/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothEwp/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothExt/default u:object_r:hal_bluetooth_coexistence_service:s0
vendor.google.bluetooth_ext.IBluetoothFinder/default u:object_r:hal_bluetooth_coexistence_service:s0

View File

@@ -19,6 +19,7 @@
#include "BootControl.h"
#include <android-base/file.h>
#include <android-base/properties.h>
#include <android-base/unique_fd.h>
#include <bootloader_message/bootloader_message.h>
#include <cutils/properties.h>
@@ -254,16 +255,15 @@ static bool blowAR_gs101() {
}
static bool blowAR() {
char platform[PROPERTY_VALUE_MAX];
property_get("ro.boot.hardware.platform", platform, "");
const auto& platform = ::android::base::GetProperty("ro.boot.hardware.platform", "");
if (std::string(platform) == "gs101") {
if (platform == "gs101") {
return blowAR_gs101();
} else if (std::string(platform) == "gs201" || std::string(platform) == "zuma") {
} else if (platform == "gs201" || platform == "zuma" || platform == "zumapro") {
return blowAR_zuma();
}
return true;
return false;
}
} // namespace

View File

@@ -20,6 +20,7 @@
#include <android-base/file.h>
#include <android-base/logging.h>
#include <android-base/properties.h>
#include <android-base/unique_fd.h>
#include <bootloader_message/bootloader_message.h>
#include <cutils/properties.h>
@@ -251,16 +252,15 @@ static bool blowAR_gs101() {
}
static bool blowAR() {
char platform[PROPERTY_VALUE_MAX];
property_get("ro.boot.hardware.platform", platform, "");
const auto& platform = ::android::base::GetProperty("ro.boot.hardware.platform", "");
if (std::string(platform) == "gs101") {
if (platform == "gs101") {
return blowAR_gs101();
} else if (std::string(platform) == "gs201" || std::string(platform) == "zuma") {
} else if (platform == "gs201" || platform == "zuma" || platform == "zumapro") {
return blowAR_zuma();
}
return true;
return false;
}
static constexpr MergeStatus ToAIDLMergeStatus(HIDLMergeStatus status) {
@@ -384,7 +384,7 @@ ScopedAStatus BootControl::isSlotMarkedSuccessful(int32_t in_slot, bool* _aidl_r
*_aidl_return = true;
return ScopedAStatus::ok();
}
if (in_slot >= slots)
if (in_slot < 0 || in_slot >= slots)
return ScopedAStatus::fromServiceSpecificErrorWithMessage(
INVALID_SLOT, (std::string("Invalid slot ") + std::to_string(in_slot)).c_str());

View File

@@ -12,8 +12,8 @@ cc_binary {
],
shared_libs: [
"libbase",
"libdump",
"liblog",
"libdump",
"liblog",
],
vendor: true,
relative_install_path: "dump",
@@ -26,3 +26,35 @@ prebuilt_etc {
src: "vendor.android.hardware.camera.preview-dis.xml",
sub_dir: "permissions",
}
prebuilt_etc {
name: "concurrent_foldable_dual_front_xml",
vendor: true,
filename: "com.google.pixel.camera.concurrent_foldable_dual_front.xml",
src: "com.google.pixel.camera.concurrent_foldable_dual_front.xml",
sub_dir: "permissions",
}
prebuilt_etc {
name: "libg3a_standalone_gabc_rc",
vendor: true,
proprietary: true,
init_rc: ["libg3a_gabc.rc"],
src: "libg3a_gabc.rc",
}
prebuilt_etc {
name: "libg3a_standalone_gaf_rc",
vendor: true,
proprietary: true,
init_rc: ["libg3a_gaf.rc"],
src: "libg3a_gaf.rc",
}
prebuilt_etc {
name: "libg3a_standalone_ghawb_rc",
vendor: true,
proprietary: true,
init_rc: ["libg3a_ghawb.rc"],
src: "libg3a_ghawb.rc",
}

View File

@@ -0,0 +1,7 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- The feature on Pixel devices which supports concurrent foldable
dual front streaming -->
<permissions>
<feature name="com.google.pixel.camera.concurrent_foldable_dual_front" />
</permissions>

View File

@@ -2,5 +2,5 @@ BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/vendor
PRODUCT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/product/public
PRODUCT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/camera/sepolicy/product/private
PRODUCT_PACKAGES_DEBUG += dump_camera
PRODUCT_PACKAGES_ENG += dump_camera

View File

@@ -42,12 +42,15 @@ int main() {
// Attach multiple latest sessions (in case the user is running concurrent
// sessions or starts a new session after the one with performance issues).
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 10, "session-ended-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 10, "multicam-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "high-drop-rate-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "watchdog-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "camera-ended-");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 5, "fatal-error-");
dumpLogs(kGraphStateDumpDir.data(), cameraDestDir.c_str(), 5,
"hal_graph_state_");
dumpLogs(kCameraLogDir.data(), cameraDestDir.c_str(), 10,
"fd_state_tracker-");
return 0;
}

28
camera/libg3a_gabc.rc Normal file
View File

@@ -0,0 +1,28 @@
# override default log levels.
on boot
setprop log.tag.GABC E
# backward-compatible system props.
on property:persist.vendor.camera.gabc.debug_level=0
setprop log.tag.GABC S
on property:persist.vendor.camera.gabc.debug_level=1
setprop log.tag.GABC V
on property:persist.vendor.camera.gabc.debug_level=2
setprop log.tag.GABC V
on property:persist.vendor.camera.gabc.debug_level=3
setprop log.tag.GABC D
on property:persist.vendor.camera.gabc.debug_level=4
setprop log.tag.GABC I
on property:persist.vendor.camera.gabc.debug_level=5
setprop log.tag.GABC W
on property:persist.vendor.camera.gabc.debug_level=6
setprop log.tag.GABC E
on property:persist.vendor.camera.gabc.debug_level=7
setprop log.tag.GABC A

83
camera/libg3a_gaf.rc Normal file
View File

@@ -0,0 +1,83 @@
# override default log levels.
on boot
setprop log.tag.GAF E
# backward-compatible system props.
on property:persist.vendor.camera.af.debug_level=0
setprop log.tag.GAF S
on property:persist.vendor.camera.af.debug_level=1
setprop log.tag.GAF V
on property:persist.vendor.camera.af.debug_level=2
setprop log.tag.GAF V
on property:persist.vendor.camera.af.debug_level=3
setprop log.tag.GAF D
on property:persist.vendor.camera.af.debug_level=4
setprop log.tag.GAF I
on property:persist.vendor.camera.af.debug_level=5
setprop log.tag.GAF W
on property:persist.vendor.camera.af.debug_level=6
setprop log.tag.GAF E
on property:persist.vendor.camera.af.debug_level=7
setprop log.tag.GAF A
on property:persist.vendor.camera.af.video_debug_enable=2
setprop vendor.camera.3a.log_level 1
setprop log.tag.3a.gcrd.af.parser.input V
setprop log.tag.3a.gcrd.af.parser.output V
setprop log.tag.3a.gcrd.af.processor V
setprop log.tag.3a.gcrd.af.engine V
setprop log.tag.3a.gcrd.dtm V
on property:persist.vendor.camera.af.video_debug_enable=0
setprop vendor.camera.3a.log_level 6
setprop log.tag.3a.gcrd.af.parser.input E
setprop log.tag.3a.gcrd.af.parser.output E
setprop log.tag.3a.gcrd.af.processor E
setprop log.tag.3a.gcrd.af.engine E
setprop log.tag.3a.gcrd.dtm E
on property:persist.vendor.camera.af.default_focus_only=false
setprop persist.vendor.camera.af.ignore_ctrl_focus_region false
setprop persist.vendor.camera.af.ignore_face 0
setprop persist.vendor.camera.af.force_saliency_consumption ""
on property:persist.vendor.camera.af.default_focus_only=true
setprop persist.vendor.camera.af.ignore_ctrl_focus_region true
setprop persist.vendor.camera.af.ignore_face 1
setprop persist.vendor.camera.af.force_saliency_consumption false
# Reset every related properties
on property:persist.vendor.camera.af.standalone_searchlet=reset
setprop persist.vendor.camera.af.ignore_pd \"\"
setprop persist.vendor.camera.af.ignore_tof \"\"
setprop persist.vendor.camera.af.ignore_cdaf \"\"
setprop persist.vendor.camera.af.ignore_gyro \"\"
setprop persist.vendor.camera.af.ignore_3a \"\"
setprop vendor.camera.debug.enable_saliency \"\"
# Standalone framework: PDAF
on property:persist.vendor.camera.af.standalone_searchlet=pdaf
setprop persist.vendor.camera.af.ignore_tof 1
setprop persist.vendor.camera.af.ignore_gyro 1
setprop persist.vendor.camera.af.ignore_3a 1
setprop vendor.camera.debug.enable_saliency 0
# Standalone framework: LDAF
on property:persist.vendor.camera.af.standalone_searchlet=ldaf
setprop persist.vendor.camera.af.ignore_pd 7
setprop persist.vendor.camera.af.ignore_gyro 1
setprop persist.vendor.camera.af.ignore_3a 1
setprop vendor.camera.debug.enable_saliency 0
# Standalone framework: CDAF
on property:persist.vendor.camera.af.standalone_searchlet=cdaf
setprop persist.vendor.camera.af.ignore_pd 7
setprop persist.vendor.camera.af.ignore_tof 1
setprop vendor.camera.debug.enable_saliency 0

28
camera/libg3a_ghawb.rc Normal file
View File

@@ -0,0 +1,28 @@
# override default log levels.
on boot
setprop log.tag.GHAWB E
# backward-compatible system props.
on property:persist.vendor.camera.ghawb.debug_level=0
setprop log.tag.GHAWB S
on property:persist.vendor.camera.ghawb.debug_level=1
setprop log.tag.GHAWB V
on property:persist.vendor.camera.ghawb.debug_level=2
setprop log.tag.GHAWB V
on property:persist.vendor.camera.ghawb.debug_level=3
setprop log.tag.GHAWB D
on property:persist.vendor.camera.ghawb.debug_level=4
setprop log.tag.GHAWB I
on property:persist.vendor.camera.ghawb.debug_level=5
setprop log.tag.GHAWB W
on property:persist.vendor.camera.ghawb.debug_level=6
setprop log.tag.GHAWB E
on property:persist.vendor.camera.ghawb.debug_level=7
setprop log.tag.GHAWB A

View File

@@ -5,20 +5,35 @@ $(call soong_config_set,lyric,use_lyric_camera_hal,true)
$(call soong_config_set,google3a_config,gcam_awb,true)
$(call soong_config_set,google3a_config,ghawb_truetone,true)
# Flag controls whether Lyric apex can be located in the dist-directory.
$(call soong_config_set, lyric, dist_lyric_apex, $(RELEASE_PIXEL_DIST_LYRIC_APEX))
# Select GCH backend.
# TODO(b/192681010): This dependency inversion should be removed.
ifneq ($(wildcard vendor/google/services/LyricCameraHAL/src),)
$(call soong_config_set,gch,hwl_library,lyric)
endif
# Check if we're in PDK build
ifeq ($(wildcard vendor/google/camera),)
# If vendor/google/camera doesn't exist, it's a PDK build.
$(call soong_config_set,lyric,pdk_build,true)
else
# Otherwise, it's an internal Google build.
$(call soong_config_set,lyric,pdk_build,false)
# Use build-time flag to select whether to build from source
# or ingest prebuilt-apex. We would want the development teams
# using release configuration: (trunk-staging) to build from source.
# All shipping releases will switch to prebuilts (trunk+)
# if this condition is not true, then build from source.
# Fallback if the prebuilts directory does not exist, then we must
# build from source no matter what, so we log a warning
ifeq ($(RELEASE_PIXEL_CAMERA_ENABLE_PREBUILT),true)
ifeq ($(wildcard vendor/google/services/LyricCameraHAL/prebuilt),)
$(warning Lyric prebuilt directory is missing, it will be built from source)
BUILD_LYRIC_FROM_SOURCE := true
else
BUILD_LYRIC_FROM_SOURCE := false
endif
else
BUILD_LYRIC_FROM_SOURCE := true
endif # RELEASE_PIXEL_CAMERA_ENABLE_PREBUILT
ifeq ($(BUILD_LYRIC_FROM_SOURCE),true)
PRODUCT_SOONG_NAMESPACES += \
vendor/google/camera \
vendor/google/camera/google_3a/libs_v4 \
@@ -34,12 +49,7 @@ PRODUCT_SOONG_NAMESPACES += \
vendor/google/camera/google_3a/libs_v4/gAF \
vendor/google/camera/google_3a/libs_v4/gafd \
vendor/google/camera/google_3a/libs_v4/gHAWB/native_coverage
# Calibration tool for debug builds
PRODUCT_PACKAGES_DEBUG += tarasque_test
PRODUCT_PACKAGES_DEBUG += ProtoCalibGenerator
endif # vendor/google/camera check
endif # BUILD_LYRIC_FROM_SOURCE
# Init-time log settings for Google 3A
PRODUCT_PACKAGES += libg3a_standalone_gabc_rc
@@ -59,3 +69,7 @@ DEVICE_MATRIX_FILE += \
# sepolicy dir is added in dump.mk.
# Make doesn't deduplicate sepolicy dirs, so including it here causes build errors.
# Calibration tools for debug builds
PRODUCT_PACKAGES_DEBUG += tarasque_test
PRODUCT_PACKAGES_DEBUG += ProtoCalibGenerator

View File

@@ -44,3 +44,13 @@ Example:
$(call soong_config_set,google3a_config,target_device,oriole)
```
A mixture of `camera_hardware` and `tuning_product` used by 3A.
## `radioext_interface_type`
Example:
```
$(call soong_config_set,lyric,radioext_interface_type,aidl)
```
Specifies which interface type to use in the RadioExt client when communicating
with the RadioExt service. The possible values are "hidl" and "aidl".
Devices launching with Android 15 no longer support HIDL.

View File

@@ -1 +1,5 @@
com.google.pixel.camera.services.binder.IServiceBinder/default u:object_r:camera_binder_service:s0
com.google.pixel.camera.services.binder.IServiceBinder/default u:object_r:camera_binder_service:s0
com.google.pixel.camera.services.cameraidremapper.ICameraIdRemapper/default u:object_r:camera_cameraidremapper_service:s0
com.google.pixel.camera.services.lyricconfigprovider.ILyricConfigProvider/default u:object_r:camera_lyricconfigprovider_service:s0

View File

@@ -9,4 +9,10 @@ allow vendor_pbcs_app app_api_service:service_manager find;
allow vendor_pbcs_app cameraserver_service:service_manager find;
# Allow PBCS to add the ServiceBinder service to ServiceManager.
add_service(vendor_pbcs_app, camera_binder_service);
add_service(vendor_pbcs_app, camera_binder_service);
# Allow PBCS to add the CameraIdRemapper service to ServiceManager.
add_service(vendor_pbcs_app, camera_cameraidremapper_service);
# Allow PBCS to add the LyricConfigProvider service to ServiceManager.
add_service(vendor_pbcs_app, camera_lyricconfigprovider_service);

View File

@@ -8,6 +8,8 @@ allow vendor_pcs_app {
app_api_service
audioserver_service
cameraserver_service
camera_cameraidremapper_service
camera_lyricconfigprovider_service
drmserver_service
mediametrics_service
mediaserver_service

View File

@@ -1 +1,5 @@
type camera_binder_service, hal_service_type, protected_service, service_manager_type;
type camera_binder_service, hal_service_type, protected_service, service_manager_type;
type camera_cameraidremapper_service, hal_service_type, protected_service, service_manager_type;
type camera_lyricconfigprovider_service, hal_service_type, protected_service, service_manager_type;

View File

@@ -1,6 +1,6 @@
allow hal_camera_default camera_binder_service:service_manager find;
# Allow Lyric Hal to find the LyricConfigProvider service through ServiceManager.
allow hal_camera_default vendor_camera_lyricconfigprovider_service:service_manager find;
allow hal_camera_default camera_lyricconfigprovider_service:service_manager find;
allow hal_camera_default hal_pixel_remote_camera_service:service_manager find;
@@ -8,5 +8,5 @@ binder_call(hal_camera_default, vendor_pbcs_app);
binder_call(hal_camera_default, vendor_pcs_app);
# Allow Lyric HAL to start ISP Service
add_service(hal_camera_default, vendor_camera_isp_service)
# Allow Lyric HAL to start Image Processing HAL
add_service(hal_camera_default, vendor_image_processing_hal_service)

View File

@@ -1,7 +1,3 @@
type hal_pixel_remote_camera_service, hal_service_type, protected_service, service_manager_type;
type vendor_camera_lyricconfigprovider_service, hal_service_type, protected_service, service_manager_type;
type vendor_camera_isp_service, hal_service_type, protected_service, service_manager_type;
type vendor_camera_cameraidremapper_service, hal_service_type, protected_service, service_manager_type;
type vendor_image_processing_hal_service, hal_service_type, protected_service, service_manager_type;

View File

@@ -1,7 +1,3 @@
com.google.pixel.camera.connectivity.hal.provider.ICameraProvider/default u:object_r:hal_pixel_remote_camera_service:s0
com.google.pixel.camera.services.lyricconfigprovider.ILyricConfigProvider/default u:object_r:vendor_camera_lyricconfigprovider_service:s0
com.google.pixel.camera.isp.IIspService/default u:object_r:vendor_camera_isp_service:s0
com.google.pixel.camera.services.cameraidremapper.ICameraIdRemapper/default u:object_r:vendor_camera_cameraidremapper_service:s0
com.google.android.imageprocessing.hal.IImageProcessingHal/default u:object_r:vendor_image_processing_hal_service:s0

View File

@@ -1,9 +1,9 @@
# Allow PBCS to add the ServiceBinder service to ServiceManager.
add_service(vendor_pbcs_app, camera_binder_service);
# Allow PBCS to add the LyricConfigProvider service to ServiceManager.
add_service(vendor_pbcs_app, vendor_camera_lyricconfigprovider_service);
add_service(vendor_pbcs_app, camera_lyricconfigprovider_service);
# Allow PBCS to add the CameraIdRemapper service to ServiceManager.
add_service(vendor_pbcs_app, vendor_camera_cameraidremapper_service);
add_service(vendor_pbcs_app, camera_cameraidremapper_service);
# Allow PBCS to read debug system properties of the form vendor.camera.pbcs.debug.*
# and persist.vendor.camera.pbcs.debug.*

View File

@@ -1,6 +1,6 @@
allow vendor_pcs_app {
vendor_camera_lyricconfigprovider_service
vendor_camera_cameraidremapper_service
camera_lyricconfigprovider_service
camera_cameraidremapper_service
edgetpu_app_service
}:service_manager find;

View File

@@ -0,0 +1,27 @@
# Create symlink for bootloader
$(shell rm -f "pixel_current_bootloader")
ifdef BOOTLOADER_FILE_PATH
$(shell ln -sf ${BOOTLOADER_FILE_PATH} "pixel_current_bootloader")
else ifdef BOOTLOADER_RADIO_FILE_PATH
$(shell ln -sf ${BOOTLOADER_RADIO_FILE_PATH} "pixel_current_bootloader")
endif
# Create symlink for kernel
$(shell rm -f "pixel_current_kernel")
ifdef TARGET_KERNEL_DIR
$(shell ln -sf ${TARGET_KERNEL_DIR} "pixel_current_kernel")
endif
# Create symlink for radio
$(shell rm -f "pixel_current_radio")
ifdef RADIO_FILE_PATH
$(shell ln -sf ${RADIO_FILE_PATH} "pixel_current_radio")
else ifdef BOOTLOADER_RADIO_FILE_PATH
$(shell ln -sf ${BOOTLOADER_RADIO_FILE_PATH} "pixel_current_radio")
endif
# Create symlink for radiocfg
$(shell rm -f "pixel_current_radiocfg")
ifdef SRC_MDM_CFG_DIR
$(shell ln -sf ${SRC_MDM_CFG_DIR} "pixel_current_radiocfg")
endif

View File

@@ -35,3 +35,6 @@ allow hal_contexthub_default self:global_capability2_class_set block_suspend;
# Allow binder calls with clients
binder_call(hal_contexthub_default, hal_sensors_default)
# Allow access for AoC properties.
get_prop(hal_contexthub_default, vendor_aoc_prop)

View File

@@ -1,6 +1,6 @@
# Dauntless
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/dauntless/sepolicy
ifneq ($(wildcard vendor),)
ifneq ($(wildcard vendor/google_nos),)
PRODUCT_SOONG_NAMESPACES += vendor/google_nos/init/dauntless
PRODUCT_PACKAGES += \
@@ -9,16 +9,87 @@ PRODUCT_PACKAGES += \
android.hardware.weaver-service.citadel \
android.hardware.authsecret-service.citadel \
android.hardware.oemlock-service.citadel \
android.hardware.identity@1.0-service.citadel \
init_citadel \
android.hardware.strongbox_keystore.xml \
android.hardware.security.keymint-service.citadel \
dump_gsc.sh
# USERDEBUG ONLY: Install test packages
PRODUCT_PACKAGES_DEBUG += citadel_integration_tests \
PRODUCT_PACKAGES_ENG += citadel_integration_tests \
pwntest \
nugget_targeted_tests \
CitadelProvision \
nugget_aidl_test_weaver
# Assign default value for RELEASE_GOOGLE_DAUNTLESS_DIR if no trunk flags support
RELEASE_GOOGLE_DAUNTLESS_DIR ?= vendor/google_nos/prebuilts/dauntless
# The production Dauntless firmware will be of flavors evt and d3m2.
# There are also several flavors of pre-release chips. Each flavor
# (production and pre-release) requires the firmware to be signed differently.
DAUNTLESS_FIRMWARE_SIZE := 1048576
# The nearly-production Dauntless chips are "proto1.1"
ifneq (,$(wildcard $(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" $(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin))
$(error GSC firmware size check fail)
endif
PRODUCT_COPY_FILES += \
$(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/dauntless/proto11.ec.bin
$(call dist-for-goals,droid,$(RELEASE_GOOGLE_DAUNTLESS_DIR)/proto11.ec.bin)
else
$(error GSC firmware not found in $(RELEASE_GOOGLE_DAUNTLESS_DIR))
endif
# The production Dauntless chips are "evt"
ifneq (,$(wildcard $(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" $(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin))
$(error GSC firmware size check fail)
endif
PRODUCT_COPY_FILES += \
$(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/dauntless/evt.ec.bin
$(call dist-for-goals,droid,$(RELEASE_GOOGLE_DAUNTLESS_DIR)/evt.ec.bin)
else
$(error GSC firmware not found in $(RELEASE_GOOGLE_DAUNTLESS_DIR))
endif
# New 2023 production Dauntless chips are "d3m2"
ifneq (,$(wildcard $(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" $(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin))
$(error GSC firmware size check fail)
endif
PRODUCT_COPY_FILES += \
$(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin:$(TARGET_COPY_OUT_VENDOR)/firmware/dauntless/d3m2.ec.bin
$(call dist-for-goals,droid,$(RELEASE_GOOGLE_DAUNTLESS_DIR)/d3m2.ec.bin)
else
$(error GSC firmware not found in $(RELEASE_GOOGLE_DAUNTLESS_DIR))
endif
# Intermediate image artifacts are published, but aren't included in /vendor/firmware/dauntless
# in PRODUCT_COPY_FILES
# This is because intermediate images aren't needed on user devices, but the published artifact
# is useful for flashstation purposes.
# proto11 chips need an intermediate image prior to upgrading to newever versions of the firmware
ifneq (,$(wildcard vendor/google_nos/prebuilts/dauntless/intermediate_images/proto11_intermediate.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" vendor/google_nos/prebuilts/dauntless/intermediate_images/proto11_intermediate.ec.bin))
$(error GSC firmware size check fail)
endif
$(call dist-for-goals,droid,vendor/google_nos/prebuilts/dauntless/intermediate_images/proto11_intermediate.ec.bin)
endif
# evt chips need an intermediate image prior to upgrading to newever versions of the firmware
ifneq (,$(wildcard vendor/google_nos/prebuilts/dauntless/intermediate_images/evt_intermediate.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" vendor/google_nos/prebuilts/dauntless/intermediate_images/evt_intermediate.ec.bin))
$(error GSC firmware size check fail)
endif
$(call dist-for-goals,droid,vendor/google_nos/prebuilts/dauntless/intermediate_images/evt_intermediate.ec.bin)
endif
# d3m2 chips need an intermediate image prior to upgrading to newever versions of the firmware
ifneq (,$(wildcard vendor/google_nos/prebuilts/dauntless/intermediate_images/d3m2_intermediate.ec.bin))
ifneq ($(DAUNTLESS_FIRMWARE_SIZE), $(shell stat -c "%s" vendor/google_nos/prebuilts/dauntless/intermediate_images/d3m2_intermediate.ec.bin))
$(error GSC firmware size check fail)
endif
$(call dist-for-goals,droid,vendor/google_nos/prebuilts/dauntless/intermediate_images/d3m2_intermediate.ec.bin)
endif
endif # $(wildcard vendor/google_nos)

View File

@@ -30,3 +30,6 @@ $(call inherit-product, $(SRC_TARGET_DIR)/product/developer_gsi_keys.mk)
PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.software.ipsec_tunnel_migration.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.ipsec_tunnel_migration.xml
DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += \
device/google/gs-common/vintf/framework_compatibility_matrix.xml

View File

@@ -1,4 +1,4 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/display/sepolicy
PRODUCT_PACKAGES_DEBUG += dump_display_userdebug.sh
PRODUCT_PACKAGES_ENG += dump_display_userdebug.sh
PRODUCT_PACKAGES += dump_display

View File

@@ -16,15 +16,15 @@
#include <dump/pixel_dump.h>
#include <android-base/file.h>
int main() {
setbuf(stdout, NULL);
dumpFileContent("DECON-0 counters /sys/class/drm/card0/device/decon0/counters", "/sys/class/drm/card0/device/decon0/counters");
dumpFileContent("CRTC-0 event log", "/sys/kernel/debug/dri/0/crtc-0/event");
runCommand("libdisplaycolor", "/vendor/bin/dumpsys displaycolor -v");
dumpFileContent("Primary panel name", "/sys/devices/platform/exynos-drm/primary-panel/panel_name");
dumpFileContent("Primary panel extra info", "/sys/devices/platform/exynos-drm/primary-panel/panel_extinfo");
dumpFileContent("Primary panel power Vreg", "/sys/devices/platform/exynos-drm/primary-panel/panel_pwr_vreg");
dumpFileContent("Primary panel name", "/sys/class/drm/card0/device/primary-panel/panel_name");
dumpFileContent("Primary panel extra info", "/sys/class/drm/card0/device/primary-panel/panel_extinfo");
dumpFileContent("Primary panel power Vreg", "/sys/class/drm/card0/device/primary-panel/panel_pwr_vreg");
dumpFileContent("Primary panel power mode register", "/sys/class/drm/card0/device/primary-panel/power_mode");
return 0;
}

View File

@@ -1,4 +1,8 @@
#!/vendor/bin/sh
display_trace_path="/sys/kernel/tracing/instances/pixel-display/trace"
echo "------ Display Trace ($display_trace_path)------"
cat $display_trace_path
echo "------ HWC Fence States ------"
for f in $(ls /data/vendor/log/hwc/*_hwc_fence_state*.txt)
do

View File

@@ -18,8 +18,9 @@
int main() {
dumpFileContent("DECON-1 counters /sys/class/drm/card0/device/decon1/counters", "/sys/class/drm/card0/device/decon1/counters");
dumpFileContent("CRTC-1 event log", "/sys/kernel/debug/dri/0/crtc-1/event");
dumpFileContent("Secondary panel name", "/sys/devices/platform/exynos-drm/secondary-panel/panel_name");
dumpFileContent("Secondary panel extra info", "/sys/devices/platform/exynos-drm/secondary-panel/panel_extinfo");
dumpFileContent("Secondary panel name", "/sys/class/drm/card0/device/secondary-panel/panel_name");
dumpFileContent("Secondary panel extra info", "/sys/class/drm/card0/device/secondary-panel/panel_extinfo");
dumpFileContent("Secondary panel power mode register", "/sys/class/drm/card0/device/secondary-panel/power_mode");
return 0;
}

View File

@@ -1,3 +1,4 @@
# Display (dump for bugreport)
pixel_bugreport(dump_display)
allow dump_display sysfs_display:file r_file_perms;

View File

@@ -1,3 +1,4 @@
# Display eng/userdebug (dump for bugreport)
pixel_bugreport(dump_display_userdebug)
userdebug_or_eng(`
@@ -5,4 +6,6 @@ userdebug_or_eng(`
allow dump_display_userdebug vendor_log_file:dir search;
allow dump_display_userdebug vendor_hwc_log_file:dir r_dir_perms;
allow dump_display_userdebug vendor_hwc_log_file:file r_file_perms;
allow dump_display_userdebug debugfs_tracing_instances:dir search;
allow dump_display_userdebug debugfs_tracing_instances:file r_file_perms;
')

View File

@@ -1,3 +1,3 @@
on property:ro.build.type=userdebug
on property:ro.build.type=eng
chown system system /dev/logbuffer_dsim0
chown system system /dev/logbuffer_dsim1

20
dump_chip_info/Android.bp Normal file
View File

@@ -0,0 +1,20 @@
package {
default_applicable_licenses: ["Android-Apache-2.0"],
}
cc_binary {
name: "dump_chip_info",
srcs: ["dump_chip_info.cpp"],
cflags: [
"-Wall",
"-Wextra",
"-Werror",
],
shared_libs: [
"libbase",
"libdump",
"liblog",
],
vendor: true,
relative_install_path: "dump",
}

View File

@@ -0,0 +1,3 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/dump_chip_info/sepolicy
PRODUCT_PACKAGES += dump_chip_info

View File

@@ -0,0 +1,28 @@
/*
* Copyright 2024 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <dump/pixel_dump.h>
#include <android-base/file.h>
int main() {
dumpFileContent("ap_rom_patch_ver", "/sys/devices/system/goog-chip-info/ap_rom_patch_ver");
dumpFileContent("gpcm_asic_id", "/sys/devices/system/goog-chip-info/gpcm_asic_id");
dumpFileContent("device_table", "/sys/devices/system/goog-chip-info/device_table");
dumpFileContent("dvfs_table", "/sys/devices/system/goog-chip-info/dvfs_table");
dumpFileContent("hw_feature_table", "/sys/devices/system/goog-chip-info/hw_feature_table");
dumpFileContent("ids_table", "/sys/devices/system/goog-chip-info/ids_table");
return 0;
}

View File

@@ -0,0 +1,3 @@
#
pixel_bugreport(dump_chip_info)
allow dump_chip_info sysfs_chip_info:file r_file_perms;

View File

@@ -0,0 +1,2 @@
#
type sysfs_chip_info, sysfs_type, fs_type;

View File

@@ -0,0 +1 @@
/vendor/bin/dump/dump_chip_info u:object_r:dump_chip_info_exec:s0

View File

@@ -0,0 +1,6 @@
genfscon sysfs /devices/system/goog-chip-info/ap_rom_patch_ver u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/gpcm_asic_id u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/device_table u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/dvfs_table u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/hw_feature_table u:object_r:sysfs_chip_info:s0
genfscon sysfs /devices/system/goog-chip-info/ids_table u:object_r:sysfs_chip_info:s0

View File

@@ -19,10 +19,6 @@ PRODUCT_PACKAGES += \
# TPU TFlite Delegate
PRODUCT_PACKAGES += \
libedgetpu_util
# TPU DBA AIDL HAL service
PRODUCT_PACKAGES += com.google.edgetpu.dba-service
# TPU DBA C API library
PRODUCT_PACKAGES += libedgetpu_dba.google
# TPU Tachyon HAL service
PRODUCT_PACKAGES += com.google.edgetpu.tachyon-service
# TPU Tachyon C API library

View File

@@ -1,2 +1,2 @@
# EdgeTPU device (DarwiNN)
type edgetpu_device, dev_type, mlstrustedobject;
type edgetpu_device, dev_type, mlstrustedobject, isolated_compute_allowed_device;

View File

@@ -38,3 +38,12 @@ binder_call(edgetpu_app_server, edgetpu_vendor_server);
# Allow EdgeTPU service to log to stats service. (metrics)
allow edgetpu_app_server fwk_stats_service:service_manager find;
# Allow mlock without size restriction
allow edgetpu_app_server self:capability ipc_lock;
# Need to effectively read file mapped file when mmap + mlocked.
allow edgetpu_app_server privapp_data_file:file { map read};
# For shell level testing of mlock
allow edgetpu_app_server shell_data_file:file { map read};

View File

@@ -27,6 +27,9 @@ allow edgetpu_tachyon_server gpu_device:chr_file rw_file_perms;
allow edgetpu_tachyon_server gpu_device:dir r_dir_perms;
allow edgetpu_tachyon_server ion_device:chr_file r_file_perms;
# Allow Tachyon service to access camera hal via binder.
binder_call(edgetpu_tachyon_server, hal_camera_default);
# Allow Tachyon service to access dmabuf sysytem.
allow edgetpu_tachyon_server dmabuf_system_heap_device:chr_file r_file_perms;
@@ -39,7 +42,7 @@ allow edgetpu_tachyon_server proc_version:file r_file_perms;
# Allow Tachyon service to send trace packets to Perfetto with SELinux enabled
# under userdebug builds.
userdebug_or_eng(`perfetto_producer(edgetpu_tachyon_server)')
perfetto_producer(edgetpu_tachyon_server)
# Allow Tachyon service to read tflite DarwiNN delegate properties
get_prop(edgetpu_tachyon_server, vendor_tflite_delegate_prop)
@@ -49,3 +52,17 @@ get_prop(edgetpu_tachyon_server, vendor_edgetpu_runtime_prop)
get_prop(edgetpu_tachyon_server, vendor_hetero_runtime_prop)
# Allow Tachyon service to read EdgeTPU CPU scheduler properties
get_prop(edgetpu_tachyon_server, vendor_edgetpu_cpu_scheduler_prop)
# Allow mlock without size restriction
allow edgetpu_tachyon_server self:capability ipc_lock;
# Need to effectively read file mapped file when mmap + mlocked.
allow edgetpu_tachyon_server privapp_data_file:file { map read};
# For shell level testing of mlock
userdebug_or_eng(`
allow edgetpu_tachyon_server shell_data_file:file { map read};
')
# For shell level testing
binder_call(edgetpu_tachyon_server, shell);

View File

@@ -15,8 +15,10 @@
/vendor/lib64/libmetrics_logger\.so u:object_r:same_process_hal_file:s0
/vendor/lib64/libedgetpu_util\.so u:object_r:same_process_hal_file:s0
# EdgeTPU runtime libraries
/vendor/lib64/com\.google\.edgetpu_app_service-V[1-3]-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib64/com\.google\.edgetpu_app_service-V[1-4]-ndk\.so u:object_r:same_process_hal_file:s0
/vendor/lib64/com\.google\.edgetpu_vendor_service-V[1-2]-ndk\.so u:object_r:same_process_hal_file:s0
# EdgeTPU Tachyon libraries
/vendor/lib64/libedgetpu_tachyon\.google\.so u:object_r:same_process_hal_file:s0
# EdgeTPU data files
/data/vendor/hal_neuralnetworks_darwinn(/.*)? u:object_r:hal_neuralnetworks_darwinn_data_file:s0
@@ -27,3 +29,6 @@
# Tachyon service
/vendor/bin/hw/com\.google\.edgetpu.tachyon-service u:object_r:edgetpu_tachyon_server_exec:s0
# libfmq.so is dynamically loaded by the Tachyon client-side library libedgetpu_tachyon.google.so
/vendor/lib64/libfmq\.so u:object_r:same_process_hal_file:s0

Some files were not shown because too many files have changed in this diff Show More