Brian Norris
83637f6db5
Merge "insmod.sh: Fix 'setprop' syntax" into main
2025-01-08 14:04:49 -08:00
Treehugger Robot
a5d9d5630b
Merge "gs-common: nfc: Add rules for hal_nfc_service" into main
2025-01-08 12:45:08 -08:00
Brian Norris
17719c9da4
insmod.sh: Fix 'setprop' syntax
...
These all require a value.
Bug: 360934165
Test: run `/vendor/bin/insmod.sh` with a missing cfg file
Flag: EXEMPT bugfix
Change-Id: If6b3b95f1eb4fcc21ca9d3f47c174af80ee98187
2025-01-08 10:14:32 -08:00
Treehugger Robot
dda10db0c0
Merge "dump_gps: fix dump fail if gps folder existed" into main
2025-01-08 00:14:16 -08:00
George Chang
dfe9a2d4b5
gs-common: nfc: Add rules for hal_nfc_service
...
avc: denied { set } for property=persist.vendor.nfc.antenna.am_value pid=13816 uid=1027 gid=1027 scontext=u:r:hal_nfc_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0
avc: denied { set } for property=persist.vendor.nfc.antenna.i_value pid=13816 uid=1027 gid=1027 scontext=u:r:hal_nfc_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0
avc: denied { set } for property=persist.vendor.nfc.antenna.se1_value pid=13816 uid=1027 gid=1027 scontext=u:r:hal_nfc_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0
avc: denied { set } for property=persist.vendor.nfc.antenna.se2_value pid=13816 uid=1027 gid=1027 scontext=u:r:hal_nfc_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0
avc: denied { set } for property=persist.vendor.se.reset pid=14792 uid=1027 gid=1027 scontext=u:r:hal_nfc_default:s0 tcontext=u:object_r:vendor_secure_element_prop:s0 tclass=property_service permissive=0
avc: denied { read } for name="u:object_r:vendor_nfc_antenna_prop:s0" dev="tmpfs" ino=414 scontext=u:r:untrusted_app:s0:c79,c257,c512,c768 tcontext=u:object_r:vendor_nfc_antenna_prop:s0 tclass=file permissive=0 app=com.google.android.apps.internal.nfcassistancetool
Bug: 381405365
Flag: EXEMPT update sepolicy
Test: manual
Change-Id: Ib02cebc625965928286dba7be278f6998ecdabe4
2025-01-08 07:33:39 +00:00
Hyungwoo Yang
f720f9e87e
Add sepolicy for Twoshay Notification Service
...
Test: The notification service is successfully running.
Flag: com.google.android.input.twoshay.flags.enable_notification_service
Bug: 385001604
Change-Id: I8bb8a894ecc88d588e867022a0c61d8d8a5560ca
Signed-off-by: Hyungwoo Yang <hyungwooyang@google.com>
2025-01-08 07:16:16 +00:00
Edwin Tung
8e3e5d6db1
dump_gps: fix dump fail if gps folder existed
...
Flag: EXEMPT logs collection.
Bug: 387195808
Test: check gps files in dumpstate
Change-Id: I972645e70827de0aad949d607809d655351c121a
2025-01-08 13:58:18 +08:00
Jaegeuk Kim
787e3b81dd
Mount rw to get restorecon_recursive working
...
Bug: 378120929
Test: Boot and check selabel in /data/vendor/intelligence
Flag: EXEMPT bugfix
Change-Id: I0d3d391629248f7014c28b5f74bb95b50626c99d
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2025-01-07 16:42:24 -08:00
Richard Chang
cc790dd80c
Merge "dumpstate: add readtracefs group permission for vendor dumpstate service" into main
2025-01-06 22:10:06 -08:00
Richard Chang
0c57ab86da
dumpstate: add readtracefs group permission for vendor dumpstate service
...
Fix the permission problem when bugreport wants to read pixel trace
node /sys/kernel/tracing/instances/pixel/trace.
Bug: 387943504
Test: adb bugreport
Test: adb shell dumpsys android.hardware.dumpstate.IDumpstateDevice/default dump_memory
Test: system-ui trigger bugreport
Flag: EXEMPT bugfix
Change-Id: I2e666e8a1e40bce83b1f8c1b447e2d64e8912098
2025-01-06 03:27:35 -08:00
Martin Yan
7bc11b8bba
Merge "Add Bluetooth extension HAL - CCO" into main
2025-01-06 01:07:53 -08:00
Martin Yan
b25c089c59
Add Bluetooth extension HAL - CCO
...
Bug: 361443653
Test: build pass
Flag: EXEMPT, this feature is related to CS which is controlled
by com.android.bluetooth.flags.channel_sounding_in_stack
Change-Id: I92d27664c05ed1c2ec043b9b2efa186ff5405170
2025-01-06 09:04:46 +00:00
Treehugger Robot
9b0da94086
Merge "Add feature recording critical timestamps to track to predump latency." into main
2025-01-05 23:58:06 -08:00
Midas Chien
f2ebdb354d
Merge "allow power hal to access display files" into main
2025-01-05 23:12:53 -08:00
Kai Hsieh
a736c0013e
Add feature recording critical timestamps to track to predump latency.
...
Test: Manually, flash and trigger predump and check the timestamp recorded under: /data/vendor/dump_touch/ folder
Bug: 387909187
Flag: EXEMPT log only update
Change-Id: Ib926efecb27e6df02927eba0353a1c18cb04d27d
Signed-off-by: Kai Hsieh <kaihsieh@google.com>
2025-01-05 22:54:40 -08:00
Midas Chien
6a918f2bd3
allow power hal to access display files
...
avc: denied { write } for name="early_wakeup" dev="sysfs" ino=110609 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/devices/platform/sswrp_dpu@ec00000/ee00000.dc9x00/early_wakeup" dev="sysfs" ino=110609 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_display:s0
class=file permissive=1
Bug: 350981178
Test: PowerHAL can access early_wakeup node in enforcing mode
Flag: EXEMPT bugfix
Change-Id: Ic9d619e971059d9b496a9e5c146089a01f6a0431
2025-01-05 20:22:27 -08:00
Eileen Lai
8ada857980
Merge "kernel metrics: add selinux policy for kernel metrics feature" into main
2025-01-05 19:41:56 -08:00
TeYuan Wang
d6d0daa2fa
thermal: update sepolicy for thermal powercap framework
...
Bug: 381132895
Test: check no selinux denied log
Flag: EXEMPT sepolicy change
Change-Id: Id6578c3f3eefdc6dc09fe0d7b469da7c8877d9d2
2025-01-03 23:10:25 -08:00
Cheng Chang
72d5eb8a6e
Merge "dump_gps: Support thinmd logs collect" into main
2025-01-03 01:02:14 -08:00
Leonardo Blanger
2d245f83c6
Merge "twoshay: Add AIDL api v4 to compat. matrices and manifest files" into main
2025-01-02 22:36:47 -08:00
Cheng Chang
fe1d00ff58
dump_gps: Support thinmd logs collect
...
Flag: EXEMPT logs collection.
Bug: 386286230
Test: b/386286230#comment3 bugreport example.
Change-Id: I93d385cd1a03aa55f63520626072d1bf7ccedb86
2025-01-03 04:54:53 +00:00
Eileen Lai
6e56542845
Merge "kernel metrics: add selinux policy about modem_boot_duration for kernel metrics feature" into main
2025-01-02 17:48:40 -08:00
Eileen Lai
ca670f1106
kernel metrics: add selinux policy for kernel metrics feature
...
Add selinux policy for modem_wakeup_ap, pcie_link_state, pcie_link_duration, pcie_link_stats, pcie_link_updown
Bug: 368510043
01-03 00:28:02.216 952 952 I binder:952_2: type=1400 audit(0.0:1550): avc: denied { read } for name="modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:28:02.216 952 952 I binder:952_2: type=1400 audit(0.0:1551): avc: denied { open } for path="/sys/kernel/pixel_metrics/modem/modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:28:02.216 952 952 I binder:952_2: type=1400 audit(0.0:1552): avc: denied { getattr } for path="/sys/kernel/pixel_metrics/modem/modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740 988 988 I binder:988_2: type=1400 audit(0.0:970): avc: denied { read } for name="pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740 988 988 I binder:988_2: type=1400 audit(0.0:971): avc: denied { open } for path="/sys/kernel/pixel_metrics/modem/pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740 988 988 I binder:988_2: type=1400 audit(0.0:972): avc: denied { getattr } for path="/sys/kernel/pixel_metrics/modem/pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248 1001 1001 I binder:1001_2: type=1400 audit(0.0:1045): avc: denied { read } for name="pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248 1001 1001 I binder:1001_2: type=1400 audit(0.0:1046): avc: denied { open } for path="/sys/kernel/pixel_metrics/modem/pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248 1001 1001 I binder:1001_2: type=1400 audit(0.0:1047): avc: denied { getattr } for path="/sys/kernel/pixel_metrics/modem/pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640 966 966 I binder:966_2: type=1400 audit(0.0:1124): avc: denied { read } for name="pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640 966 966 I binder:966_2: type=1400 audit(0.0:1125): avc: denied { open } for path="/sys/kernel/pixel_metrics/modem/pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640 966 966 I binder:966_2: type=1400 audit(0.0:1126): avc: denied { getattr } for path="/sys/kernel/pixel_metrics/modem/pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152 945 945 I binder:945_2: type=1400 audit(0.0:973): avc: denied { read } for name="pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152 945 945 I binder:945_2: type=1400 audit(0.0:974): avc: denied { open } for path="/sys/kernel/pixel_metrics/modem/pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152 945 945 I binder:945_2: type=1400 audit(0.0:975): avc: denied { getattr } for path="/sys/kernel/pixel_metrics/modem/pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
Flag: EXEMPT update sepolicy
Change-Id: I86908fccb65944a8bbc779b5bae38d08c1776c45
2025-01-02 18:09:35 +00:00
Treehugger Robot
e57feb6c21
Merge "Revert "Set up access control rule for aocxd"" into main
2024-12-30 17:42:21 -08:00
Leonardo Blanger
57c69f455f
twoshay: Add AIDL api v4 to compat. matrices and manifest files
...
Bug: 384567963
Test: atest vts_treble_vintf_vendor_test
Flag: EXEMPT AIDL API version change
Change-Id: I01e1487a324c5d930364ff20fb5120a92db62afc
Signed-off-by: Leonardo Blanger <leoblanger@google.com>
2024-12-30 15:23:38 +08:00
Wilson Sung
132d2f2515
Revert "Set up access control rule for aocxd"
...
This reverts commit f3564e9b91
.
Reason for revert: BB
Change-Id: If529dbe90cdae4cd9266af85de63bb8a4f808977
Fix: 386696682
2024-12-29 19:41:00 -08:00
Hung-Yeh Lee
06d1a53ceb
Merge changes from topic "b376426334-dump-display" into main
...
* changes:
display-dump: sepolicy for new secondary display dump
display-dump: sepolicy for legacy secondary display dump
display-dump: sepolicy for new primary display dump
display-dump: sepolicy for legacy primary display dump
display-dump: update project-specific crtc sysfs node
2024-12-29 18:31:49 -08:00
Bowen Lai
09f71b4f37
Merge "Set up access control rule for aocxd" into main
2024-12-26 22:39:47 -08:00
Hung-Yeh Lee
0dcf585cd6
display-dump: sepolicy for new secondary display dump
...
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I5186dfa9de755caa5023d159cb3cc1601268aa6a
2024-12-26 22:16:12 -08:00
Hung-Yeh Lee
c980a0a5c1
display-dump: sepolicy for legacy secondary display dump
...
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I903eb0d954f18b1501787d1292497696f1886437
2024-12-26 22:15:51 -08:00
Hung-Yeh Lee
19268ffb20
display-dump: sepolicy for new primary display dump
...
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I3b1d1f46ddea4882f028d9314cfd174371039925
2024-12-26 22:14:20 -08:00
Hung-Yeh Lee
33f5985af3
display-dump: sepolicy for legacy primary display dump
...
Create sub-directory for project-specific sepolicy files, and move
legacy sepolicy files to sub-directory.
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I7de8667b666d7f47c05b147a1f9e7da62ba35e1c
2024-12-26 22:13:48 -08:00
Bowen Lai
f3564e9b91
Set up access control rule for aocxd
...
Test: make -j64
Bug: 385663354
Flag: EXEMPT bugfix
Change-Id: I1b6584a0643085e9d69c85b27a0ba3667aacf1cf
2024-12-26 04:23:08 +00:00
Jooyung Han
72bec82019
Merge "Move lyric sysconfig to vendor" into main
2024-12-25 17:24:55 -08:00
Treehugger Robot
338f8db4dc
Merge "Rename sysfs_gpu_uevent to sysfs_gpu" into main
2024-12-25 02:11:21 -08:00
Wilson Sung
e3c536e772
Rename sysfs_gpu_uevent to sysfs_gpu
...
Fix: 385248542
Fix: 385248720
Fix: 385248893
Fix: 385248956
Fix: 385808247
Fix: 385978257
Test: make selinux_policy
Flag: EXEMPT bugfix
Change-Id: I8395401e50905bdcabd4858442238570edb916e9
2024-12-25 00:20:24 -08:00
Todd Poynor
cfa4033ecc
Merge "Revert "sepolicy: edgetpu: add debugfs contexts"" into main
2024-12-24 05:46:01 -08:00
Pechetty Sravani (xWF)
19b79e1312
Revert "sepolicy: edgetpu: add debugfs contexts"
...
This reverts commit 4b68ad6e8d
.
Reason for revert: <Droidmonitor created revert due to b/385827654.Will be verified through ABTD for standard investigation.>
Change-Id: I0fbdcd276c9e20010b3bfbbcad5203bf276859a4
2024-12-24 01:42:39 -08:00
Robin Peng
c7b8062120
Merge "check_current_prebuilt: Move symlink file into out/pixel" into main
2024-12-23 19:59:52 -08:00
Treehugger Robot
896ea46985
Merge "sepolicy: edgetpu: add debugfs contexts" into main
2024-12-23 19:56:58 -08:00
Jooyung Han
31e885a477
Move lyric sysconfig to vendor
...
This sysconfig is about the apex (com.google.pixel.camera.hal). So it
should be installed with the apex, not in /product.
Bug: 375357389
Test: SysConfigTest#testVendorApexAllowlist
Change-Id: I551870fcff576527d3fdfff3d17a5e7b0ce198a9
2024-12-24 10:38:36 +09:00
Liz Prucka
327eb5b7eb
Merge "Add Mali SELinux build flag for Pixel" into main
2024-12-23 09:09:23 -08:00
Robin Peng
6940a61c92
check_current_prebuilt: Move symlink file into out/pixel
...
From Android Build System, it's improper to update the source tree during
'lunch'. Move symlink files into out/pixel folder
Bug: 364831620
Flag: EXEMPT export current prebuilt path
Change-Id: I5024788e169abb8f117a289c6a07e7c47527fe60
Signed-off-by: Robin Peng <robinpeng@google.com>
2024-12-20 23:08:43 -08:00
Kai Hsieh
b24840ba97
Merge "Solve SEPolicy issue with the Troubleshooting Wizard" into main
2024-12-20 22:34:57 -08:00
Kai Hsieh
13dcd24c48
Solve SEPolicy issue with the Troubleshooting Wizard
...
- Allow pixelsystemservice_app to access GIA
- Allow GIA to execute a callback for pixelsystemservice_app
[avc error]
12-09 20:39:51.287 416 416 E SELinux : avc: denied { find } for pid=5454 uid=10285 name=com.google.input.gia.core.IGiaService/default scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:object_r:hal_gia_service:s0 tclass=service_manager permissive=1
12-09 20:39:51.280 5454 5454 I pool-4-thread-1: type=1400 audit(0.0:19): avc: denied { call } for scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:r:gia:s0 tclass=binder permissive=1 app=com.google.android.pixelsystemservice
12-09 20:39:51.280 5454 5454 I pool-4-thread-1: type=1400 audit(0.0:20): avc: denied { transfer } for scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:r:gia:s0 tclass=binder permissive=1 app=com.google.android.pixelsystemservice
12-09 20:39:51.280 1341 1341 I binder:1341_3: type=1400 audit(0.0:21): avc: denied { call } for scontext=u:r:gia:s0 tcontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tclass=binder permissive=1
Flag: EXEMPT, bug-fix only.
Bug: 379991501
Change-Id: I14942cc0df9b9032b2c054fc87d29fc8098aa455
Signed-off-by: Kai Hsieh <kaihsieh@google.com>
2024-12-19 23:39:24 -08:00
Todd Poynor
4b68ad6e8d
sepolicy: edgetpu: add debugfs contexts
...
Add vendor_edgetpu_debugfs contexts for dumpstate dump_tpu.sh access.
Bug: 349699101
Test: adb bugreport, check dumpstate_board.txt
Flag: NONE dumpstate support bundled with device
Change-Id: I42b7eb2391c42323c7da0b544402e9a08b9d56f3
Signed-off-by: Todd Poynor <toddpoynor@google.com>
2024-12-20 01:27:48 +00:00
Chintan Pandya
c5c4f1ef81
Disable redundant trace event for performance reasons
...
It's been found that every GIA trace events takes about
0.7 us. GIA driver throws 5 trace events for every IRQ
via GIA. Reducing some events would make IRQ handler
flow a but more optimized.
Bug: 380463996
Test: observed the trace and the disabled trace entries
are not longer present, reducing pressure on runtime
performance as well as memory pressure on trace buffer.
Flag: EXEMPT, optimize interrupt tracing.
Change-Id: I233d82da7a6eb75344afe3798c9f850a74e5e16b
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:37 +00:00
Chintan Pandya
60a9a7b17b
Optimize interrupts trace buffer size
...
Reduce the trace buffer size further
Bug: 383121598
Test: Manually observed the optimized trace settings
Flag: EXEMPT, optimize interrupt tracing.
Change-Id: Id6e02df4d73a97b99a019b210dbd508b115462fc
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:37 +00:00
Chintan Pandya
a67610e46e
Update irq_gia_google permission
...
Current permission 666 blocks bugreport use-case be able to
copy interrupt traces into bugreport. Provide required
permissions.
Bug: 376124648
Test: Captured bugreport and traces are visible in that.
Flag: EXEMPT, init rc change to modify permission
Change-Id: Ib03ab97fcd65d18e2420421f8fc997eefd55570f
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:25 +00:00
Hung-Yeh Lee
bbe22a1056
display-dump: update project-specific crtc sysfs node
...
Refactor and rename project-specific dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I7bf470e5784e0fd726c49823b55aae6235aceaec
2024-12-18 21:59:42 -08:00