Commit graph

2895 commits

Author SHA1 Message Date
Eileen Lai
6e56542845 Merge "kernel metrics: add selinux policy about modem_boot_duration for kernel metrics feature" into main 2025-01-02 17:48:40 -08:00
Eileen Lai
ca670f1106 kernel metrics: add selinux policy for kernel metrics feature
Add selinux policy for modem_wakeup_ap, pcie_link_state, pcie_link_duration, pcie_link_stats, pcie_link_updown

Bug: 368510043

01-03 00:28:02.216   952   952 I binder:952_2: type=1400 audit(0.0:1550): avc:  denied  { read } for  name="modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:28:02.216   952   952 I binder:952_2: type=1400 audit(0.0:1551): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:28:02.216   952   952 I binder:952_2: type=1400 audit(0.0:1552): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:36:43.740   988   988 I binder:988_2: type=1400 audit(0.0:970): avc:  denied  { read } for  name="pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740   988   988 I binder:988_2: type=1400 audit(0.0:971): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740   988   988 I binder:988_2: type=1400 audit(0.0:972): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:44:06.248  1001  1001 I binder:1001_2: type=1400 audit(0.0:1045): avc:  denied  { read } for  name="pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248  1001  1001 I binder:1001_2: type=1400 audit(0.0:1046): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248  1001  1001 I binder:1001_2: type=1400 audit(0.0:1047): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:49:48.640   966   966 I binder:966_2: type=1400 audit(0.0:1124): avc:  denied  { read } for  name="pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640   966   966 I binder:966_2: type=1400 audit(0.0:1125): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640   966   966 I binder:966_2: type=1400 audit(0.0:1126): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:58:31.152   945   945 I binder:945_2: type=1400 audit(0.0:973): avc:  denied  { read } for  name="pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152   945   945 I binder:945_2: type=1400 audit(0.0:974): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152   945   945 I binder:945_2: type=1400 audit(0.0:975): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

Flag: EXEMPT update sepolicy
Change-Id: I86908fccb65944a8bbc779b5bae38d08c1776c45
2025-01-02 18:09:35 +00:00
Treehugger Robot
e57feb6c21 Merge "Revert "Set up access control rule for aocxd"" into main 2024-12-30 17:42:21 -08:00
Leonardo Blanger
57c69f455f twoshay: Add AIDL api v4 to compat. matrices and manifest files
Bug: 384567963

Test: atest vts_treble_vintf_vendor_test

Flag: EXEMPT AIDL API version change

Change-Id: I01e1487a324c5d930364ff20fb5120a92db62afc
Signed-off-by: Leonardo Blanger <leoblanger@google.com>
2024-12-30 15:23:38 +08:00
Wilson Sung
132d2f2515 Revert "Set up access control rule for aocxd"
This reverts commit f3564e9b91.

Reason for revert: BB

Change-Id: If529dbe90cdae4cd9266af85de63bb8a4f808977
Fix: 386696682
2024-12-29 19:41:00 -08:00
Hung-Yeh Lee
06d1a53ceb Merge changes from topic "b376426334-dump-display" into main
* changes:
  display-dump: sepolicy for new secondary display dump
  display-dump: sepolicy for legacy secondary display dump
  display-dump: sepolicy for new primary display dump
  display-dump: sepolicy for legacy primary display dump
  display-dump: update project-specific crtc sysfs node
2024-12-29 18:31:49 -08:00
Bowen Lai
09f71b4f37 Merge "Set up access control rule for aocxd" into main 2024-12-26 22:39:47 -08:00
Hung-Yeh Lee
0dcf585cd6 display-dump: sepolicy for new secondary display dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I5186dfa9de755caa5023d159cb3cc1601268aa6a
2024-12-26 22:16:12 -08:00
Hung-Yeh Lee
c980a0a5c1 display-dump: sepolicy for legacy secondary display dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I903eb0d954f18b1501787d1292497696f1886437
2024-12-26 22:15:51 -08:00
Hung-Yeh Lee
19268ffb20 display-dump: sepolicy for new primary display dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I3b1d1f46ddea4882f028d9314cfd174371039925
2024-12-26 22:14:20 -08:00
Hung-Yeh Lee
33f5985af3 display-dump: sepolicy for legacy primary display dump
Create sub-directory for project-specific sepolicy files, and move
legacy sepolicy files to sub-directory.

Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I7de8667b666d7f47c05b147a1f9e7da62ba35e1c
2024-12-26 22:13:48 -08:00
Bowen Lai
f3564e9b91 Set up access control rule for aocxd
Test: make -j64
Bug: 385663354
Flag: EXEMPT bugfix
Change-Id: I1b6584a0643085e9d69c85b27a0ba3667aacf1cf
2024-12-26 04:23:08 +00:00
Jooyung Han
72bec82019 Merge "Move lyric sysconfig to vendor" into main 2024-12-25 17:24:55 -08:00
Treehugger Robot
338f8db4dc Merge "Rename sysfs_gpu_uevent to sysfs_gpu" into main 2024-12-25 02:11:21 -08:00
Wilson Sung
e3c536e772 Rename sysfs_gpu_uevent to sysfs_gpu
Fix: 385248542
Fix: 385248720
Fix: 385248893
Fix: 385248956
Fix: 385808247
Fix: 385978257
Test: make selinux_policy
Flag: EXEMPT bugfix
Change-Id: I8395401e50905bdcabd4858442238570edb916e9
2024-12-25 00:20:24 -08:00
Todd Poynor
cfa4033ecc Merge "Revert "sepolicy: edgetpu: add debugfs contexts"" into main 2024-12-24 05:46:01 -08:00
Pechetty Sravani (xWF)
19b79e1312 Revert "sepolicy: edgetpu: add debugfs contexts"
This reverts commit 4b68ad6e8d.

Reason for revert: <Droidmonitor created revert due to b/385827654.Will be verified through ABTD for standard investigation.>

Change-Id: I0fbdcd276c9e20010b3bfbbcad5203bf276859a4
2024-12-24 01:42:39 -08:00
Robin Peng
c7b8062120 Merge "check_current_prebuilt: Move symlink file into out/pixel" into main 2024-12-23 19:59:52 -08:00
Treehugger Robot
896ea46985 Merge "sepolicy: edgetpu: add debugfs contexts" into main 2024-12-23 19:56:58 -08:00
Jooyung Han
31e885a477 Move lyric sysconfig to vendor
This sysconfig is about the apex (com.google.pixel.camera.hal). So it
should be installed with the apex, not in /product.

Bug: 375357389
Test: SysConfigTest#testVendorApexAllowlist
Change-Id: I551870fcff576527d3fdfff3d17a5e7b0ce198a9
2024-12-24 10:38:36 +09:00
Liz Prucka
327eb5b7eb Merge "Add Mali SELinux build flag for Pixel" into main 2024-12-23 09:09:23 -08:00
Robin Peng
6940a61c92 check_current_prebuilt: Move symlink file into out/pixel
From Android Build System, it's improper to update the source tree during
'lunch'. Move symlink files into out/pixel folder

Bug: 364831620
Flag: EXEMPT export current prebuilt path
Change-Id: I5024788e169abb8f117a289c6a07e7c47527fe60
Signed-off-by: Robin Peng <robinpeng@google.com>
2024-12-20 23:08:43 -08:00
Kai Hsieh
b24840ba97 Merge "Solve SEPolicy issue with the Troubleshooting Wizard" into main 2024-12-20 22:34:57 -08:00
Kai Hsieh
13dcd24c48 Solve SEPolicy issue with the Troubleshooting Wizard
- Allow pixelsystemservice_app to access GIA
- Allow GIA to execute a callback for pixelsystemservice_app

[avc error]
12-09 20:39:51.287   416   416 E SELinux : avc:  denied  { find } for pid=5454 uid=10285 name=com.google.input.gia.core.IGiaService/default scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:object_r:hal_gia_service:s0 tclass=service_manager permissive=1
12-09 20:39:51.280  5454  5454 I pool-4-thread-1: type=1400 audit(0.0:19): avc:  denied  { call } for  scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:r:gia:s0 tclass=binder permissive=1 app=com.google.android.pixelsystemservice
12-09 20:39:51.280  5454  5454 I pool-4-thread-1: type=1400 audit(0.0:20): avc:  denied  { transfer } for  scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:r:gia:s0 tclass=binder permissive=1 app=com.google.android.pixelsystemservice
12-09 20:39:51.280  1341  1341 I binder:1341_3: type=1400 audit(0.0:21): avc:  denied  { call } for  scontext=u:r:gia:s0 tcontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tclass=binder permissive=1

Flag: EXEMPT, bug-fix only.
Bug: 379991501
Change-Id: I14942cc0df9b9032b2c054fc87d29fc8098aa455
Signed-off-by: Kai Hsieh <kaihsieh@google.com>
2024-12-19 23:39:24 -08:00
Todd Poynor
4b68ad6e8d sepolicy: edgetpu: add debugfs contexts
Add vendor_edgetpu_debugfs contexts for dumpstate dump_tpu.sh access.

Bug: 349699101
Test: adb bugreport, check dumpstate_board.txt
Flag: NONE dumpstate support bundled with device
Change-Id: I42b7eb2391c42323c7da0b544402e9a08b9d56f3
Signed-off-by: Todd Poynor <toddpoynor@google.com>
2024-12-20 01:27:48 +00:00
Chintan Pandya
c5c4f1ef81 Disable redundant trace event for performance reasons
It's been found that every GIA trace events takes about
0.7 us. GIA driver throws 5 trace events for every IRQ
via GIA. Reducing some events would make IRQ handler
flow a but more optimized.

Bug: 380463996
Test: observed the trace and the disabled trace entries
      are not longer present, reducing pressure on runtime
      performance as well as memory pressure on trace buffer.
Flag: EXEMPT, optimize interrupt tracing.

Change-Id: I233d82da7a6eb75344afe3798c9f850a74e5e16b
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:37 +00:00
Chintan Pandya
60a9a7b17b Optimize interrupts trace buffer size
Reduce the trace buffer size further

Bug: 383121598
Test: Manually observed the optimized trace settings
Flag: EXEMPT, optimize interrupt tracing.
Change-Id: Id6e02df4d73a97b99a019b210dbd508b115462fc
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:37 +00:00
Chintan Pandya
a67610e46e Update irq_gia_google permission
Current permission 666 blocks bugreport use-case be able to
copy interrupt traces into bugreport. Provide required
permissions.

Bug: 376124648
Test: Captured bugreport and traces are visible in that.
Flag: EXEMPT, init rc change to modify permission
Change-Id: Ib03ab97fcd65d18e2420421f8fc997eefd55570f
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:25 +00:00
Hung-Yeh Lee
bbe22a1056 display-dump: update project-specific crtc sysfs node
Refactor and rename project-specific dump

Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I7bf470e5784e0fd726c49823b55aae6235aceaec
2024-12-18 21:59:42 -08:00
Liz Prucka
bfa32da350 Add Mali SELinux build flag for Pixel
Created initial Pixel SELinux flag module.
Added Mali release flag to build be built by soong.

Bug: 384720119
Test: make
Change-Id: Iffcae7bc64114b80b2750da8823768a15efff9b3
2024-12-17 23:11:31 +00:00
Richard Chang
e67bff18e9 Merge "sepolicy: update init.te for zram device" into main 2024-12-16 17:34:47 -08:00
Minche Li
a12a209a03 Merge "Updates TTS voice packs in gs-common 202412" into main 2024-12-16 02:34:58 -08:00
Richard Chang
cf29787f8d sepolicy: update init.te for zram device
Sync patch from zuma: ag/21578379, but move to gs-common.

Avc denied log:
avc:  denied  { write } for  comm="init" name="zram0" dev="tmpfs" ino=1306 scontext=u:r:init:s0 tcontext=u:object_r:ram_device:s0 tclass=blk_file permissive=1

Verify on PBuilds:
https://android-build.corp.google.com/abtd/run/L32800030008398424/

Bug: 370643878
Test: Boot and check avc denied logs
Flag: EXEMPT sepolicy
Change-Id: I90ea0b248835fa51fe07cfa23e5f819fd8422c08
2024-12-16 01:32:02 -08:00
Eileen Lai
a8634006fb kernel metrics: add selinux policy about modem_boot_duration for kernel metrics feature
Bug: 368510043

12-13 23:10:00.604   993   993 I binder:993_2: type=1400 audit(0.0:327): avc:  denied  { read } for  name="modem_boot_duration" dev="sysfs" ino=72272 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs_kernel_metrics:s0 tclass=file permissive=1
12-13 23:10:00.604   993   993 I binder:993_2: type=1400 audit(0.0:328): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/modem_boot_duration" dev="sysfs" ino=72272 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs_kernel_metrics:s0 tclass=file permissive=1
12-13 23:10:00.604   993   993 I binder:993_2: type=1400 audit(0.0:329): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/modem_boot_duration" dev="sysfs" ino=72272 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs_kernel_metrics:s0 tclass=file permissive=1

Flag: EXEMPT update sepolicy

Change-Id: Id50146858f84d3716855b9010e95c7232c6accfa
2024-12-16 07:09:01 +00:00
Xiaofan Jiang
da6c722022 Merge "modem_uart: add modem uart log to bugreport" into main 2024-12-14 00:08:31 -08:00
Xin Li
aa687b7c4c [automerger skipped] Merge 24Q4 into AOSP main am: b61a4f4345 -s ours am: 261899fc1b -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/29954999

Change-Id: I461895b52139d919f3bdc7b4475e117e110cb816
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-13 21:45:19 -08:00
Xin Li
261899fc1b [automerger skipped] Merge 24Q4 into AOSP main am: b61a4f4345 -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs-common/+/3413779

Change-Id: Ia0e940e4a7404c36f40cfb677226e1fe508951c6
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-13 18:51:51 -08:00
Xin Li
b61a4f4345 Merge 24Q4 into AOSP main
Bug: 370570306
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I8967334343407bc9eab73bb0ade0b939e3aa7873
2024-12-13 11:15:09 -08:00
Kieran Cyphus
d2295d66e6 Merge "pms: Create mk file in gs-common" into main 2024-12-13 00:41:27 -08:00
kierancyphus
9a52810bab pms: Create mk file in gs-common
Bug: 382192979

Test: ran abtd test with both git_main and git_main-without-vendor
Flag: EXEMPT Cannot flag mk file changes
Change-Id: Ic7fc13ad191abb1147f35d8d4bd1fd02dc56e772
2024-12-13 10:27:37 +08:00
mincheli
ae9ffbc0b3 Updates TTS voice packs in gs-common 202412
ag/30871748 updates GoogleTTS.
So preloaded TTS voice packs should be also updated.

And see doc, Preload Google Text-to-Speech (TTS) Voice Packs:
The voice packs are dowloanded follow the steps.

Flag: EXEMPT update preloaded files
Bug: 333626474
Test: build passed and manual test
Change-Id: I982df07d49c4be47e819ebe561d5d53212c40b32
2024-12-13 00:27:55 +00:00
Treehugger Robot
5a51adbdd3 Merge "allow power hal to access vendor_mm files" into main 2024-12-12 15:11:48 -08:00
Martin Liu
437d35e7cb allow power hal to access vendor_mm files
I auditd  : type=1400 audit(0.0:79): avc:  denied  { write } for  comm="NodeLooperThrea" name="vendor_mm" dev="sysfs" ino=56518 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_vendor_mm:s0 tclass=dir permissive=0

Bug: 357995885
Test: check avc error
Flag: EXEMPT adding avc rule
Change-Id: I1261aa14f2cd912ede51edc2e1a547d2e182ca46
Signed-off-by: Martin Liu <liumartin@google.com>
2024-12-12 13:38:20 +00:00
Xiaofan Jiang
e319e6c3e4 modem_uart: add modem uart log to bugreport
Bug: 353397822

Flag: NONE, config
Change-Id: I9668f70859796ca4475dfa0456a955ac3a7ada5d
2024-12-11 18:40:52 -08:00
Piotr Klasa
78f0d4c8e6 Move all vendor_sched parameters and permissions to init.pixel.perf.rc
Bug: 335874870
Test: Checked that permissions and values ​​for all affected files are correct (ls -l, cat)
Flag: EXEMPT not supported by this component yet

Change-Id: Ia6dedcb49534d6be9007addca0d8d1080f219315
2024-12-11 06:35:06 -08:00
Michael Bestas
4460098bc5 Android 15.0.0 Release 6 (AP4A.241205.013)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
 eIS/AJ9ojetnDXDlslBpaDU7nNPVrNv+WgCeMKWKeHmJn6acS37FiZBS9+jvpec=
 =JvPS
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmdY7O4XHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmnGCw//XCwIcPsFqQSwygK76wo5ZsCO
 Mex6U5SdmtBecQ2VmIZKofe4/HIog9Wne3GFE6Xjj1bZHxtp/W4uURp6BQ8LuqA5
 zqhkzc/Ijz6W+8wJ7n4k+V+N33N9ZYrbxQdqmBbMzLO0kOv86vC0HbKHLLgvT5d4
 yYTe3TmGUMXTysky8+Y5YJoIHXqy847ohsOg7yzo9wtEzNZpDXLjDCfp4H8Gei8c
 RIw/g+P2WwXGEntlXMtt6lajLF5m2GOtGLL5S+IrtoskpISC6jOmnD+WDwG8VJRW
 dts4yqRtB47uz53sLE618zOXE/Tz3Akppq73bJ9I5dk3qHCx7NBVy5HLFE8O6rJL
 KVjMj88sMShd4wMbHEy+Sh0jVlcKXuxFJeU0MZ0bqoM5/MDDZXQvJDOOQK7noQHS
 RGnsXFwgZnLZEW375FJv4T8S19logSJqAYEkjSdrzU3oIUZqNgFHqQcGDLC8ukOc
 79PbK53RvmzyEedYonH7Zn/ImGwmJxlyVey5jFX+O1S9RsVD4AyrgT1dn3s0KniK
 1UiPi7sHBsL2yE4rp63UEysFZU9uj2gy3xf4PxBi97LV7mLUfE2YqsDwOrII82Ao
 xjyEKTxSMADdwHHI15yf52eNRCf3eBakL54TbZZJ184FZYeTGvOpvc5yCuiITqm9
 RauADk94HVdaaMJXyk4=
 =l74W
 -----END PGP SIGNATURE-----

Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6

Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eIS/AJ9ojetnDXDlslBpaDU7nNPVrNv+WgCeMKWKeHmJn6acS37FiZBS9+jvpec=
# =JvPS
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Randall Huang (12) and others
# Via Android (Google) Code Review (58) and others
* tag 'android-15.0.0_r6': (91 commits)
  gsc: Change the criteria for building GSC targets
  sepolicy: remove irregular policy
  Revert^2 "Allow devices that use HIDL to find AIDL radio_ext_service"
  Revert "Allow devices that use HIDL to find AIDL radio_ext_service"
  gs-common: add rules for euiccpixel_app
  audio: allow set_prop for vendor_audio_prop_restricted
  Allow devices that use HIDL to find AIDL radio_ext_service
  Add sepolicy for NNAPI HAL to access hal_graphics_allocator_service, This is required for AHardwareBuffer allocation.
  storage: fix ota selinux error
  Storage: add sepolicy for recovery mode
  Add sepolicy for gcam app
  check_current_prebuilt: Symlink current prebuilt folder to android root
  shamp: Update shared_modem_platform HAL version to 3
  dumpstate: gsa: Add GSA logs to dumpstate
  storage: fix vendor_init avc denied
  storage: fix vold avc denied
  storage: fix adb bugreport and refactor the existing rules
  storage: fix PowerStats avc denied
  storage: move sepolicy to common folder
  shamp: Update shared_modem_platform HAL version to 2
  ...

 Conflicts:
	camera/lyric.mk
	storage/init.storage.rc

Change-Id: I5ed6cff3b54261c949ec6ba60b32820b264b4ec2
2024-12-11 03:37:46 +02:00
Joe Tessler
737725ba27 Support IAudioExtension AIDL v4 and v5
We unfroze the v4 IAudioExtension AIDL API and modified it in
ag/30424231 and incremented the version to v5 in ag/30702418 to fix the
tests. This broke the -next builds, which expected the previously frozen
version (v4).

This change modifies the compatibility matrix to support both v4 and v5.
This fixes both the local tests and -next builds.

Bug: 378303588
Bug: 383213634
Test: atest vts_treble_vintf_vendor_test
Flag: vendor.google.whitechapel.audio.flags.enable_always_available_display
Change-Id: I467434ccb41ab71dc1b230e64dc09fc0959a8b8a
2024-12-10 04:15:21 +00:00
Joe Tessler
7ee457daf9 Merge "Update IAudioExtension AIDL to v5" into main 2024-12-10 02:56:27 +00:00
Android Build Coastguard Worker
c16a334052 Snap for 12770256 from db9f7e0d38 to 25Q1-release
Change-Id: I85393c3de41fee214d075d98dae2ca217abd1b23
2024-12-10 00:32:23 +00:00
Dmitry Skiba
ae00670e9c Merge "Reapply "Add amm experiment."" into main 2024-12-09 23:57:53 +00:00