Commit graph

2800 commits

Author SHA1 Message Date
Jaegeuk Kim
787e3b81dd Mount rw to get restorecon_recursive working
Bug: 378120929
Test: Boot and check selabel in /data/vendor/intelligence
Flag: EXEMPT bugfix
Change-Id: I0d3d391629248f7014c28b5f74bb95b50626c99d
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2025-01-07 16:42:24 -08:00
Richard Chang
cc790dd80c Merge "dumpstate: add readtracefs group permission for vendor dumpstate service" into main 2025-01-06 22:10:06 -08:00
Richard Chang
0c57ab86da dumpstate: add readtracefs group permission for vendor dumpstate service
Fix the permission problem when bugreport wants to read pixel trace
node /sys/kernel/tracing/instances/pixel/trace.

Bug: 387943504
Test: adb bugreport
Test: adb shell dumpsys android.hardware.dumpstate.IDumpstateDevice/default dump_memory
Test: system-ui trigger bugreport
Flag: EXEMPT bugfix
Change-Id: I2e666e8a1e40bce83b1f8c1b447e2d64e8912098
2025-01-06 03:27:35 -08:00
Martin Yan
7bc11b8bba Merge "Add Bluetooth extension HAL - CCO" into main 2025-01-06 01:07:53 -08:00
Martin Yan
b25c089c59 Add Bluetooth extension HAL - CCO
Bug: 361443653
Test: build pass
Flag: EXEMPT, this feature is related to CS which is controlled
      by com.android.bluetooth.flags.channel_sounding_in_stack
Change-Id: I92d27664c05ed1c2ec043b9b2efa186ff5405170
2025-01-06 09:04:46 +00:00
Treehugger Robot
9b0da94086 Merge "Add feature recording critical timestamps to track to predump latency." into main 2025-01-05 23:58:06 -08:00
Midas Chien
f2ebdb354d Merge "allow power hal to access display files" into main 2025-01-05 23:12:53 -08:00
Kai Hsieh
a736c0013e Add feature recording critical timestamps to track to predump latency.
Test: Manually, flash and trigger predump and check the timestamp recorded under: /data/vendor/dump_touch/ folder
Bug: 387909187
Flag: EXEMPT log only update
Change-Id: Ib926efecb27e6df02927eba0353a1c18cb04d27d
Signed-off-by: Kai Hsieh <kaihsieh@google.com>
2025-01-05 22:54:40 -08:00
Midas Chien
6a918f2bd3 allow power hal to access display files
avc:  denied  { write } for  name="early_wakeup" dev="sysfs" ino=110609 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1
avc:  denied  { open } for path="/sys/devices/platform/sswrp_dpu@ec00000/ee00000.dc9x00/early_wakeup" dev="sysfs" ino=110609 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_display:s0
 class=file permissive=1

Bug: 350981178
Test: PowerHAL can access early_wakeup node in enforcing mode
Flag: EXEMPT bugfix
Change-Id: Ic9d619e971059d9b496a9e5c146089a01f6a0431
2025-01-05 20:22:27 -08:00
Eileen Lai
8ada857980 Merge "kernel metrics: add selinux policy for kernel metrics feature" into main 2025-01-05 19:41:56 -08:00
TeYuan Wang
d6d0daa2fa thermal: update sepolicy for thermal powercap framework
Bug: 381132895
Test: check no selinux denied log
Flag: EXEMPT sepolicy change
Change-Id: Id6578c3f3eefdc6dc09fe0d7b469da7c8877d9d2
2025-01-03 23:10:25 -08:00
Cheng Chang
72d5eb8a6e Merge "dump_gps: Support thinmd logs collect" into main 2025-01-03 01:02:14 -08:00
Leonardo Blanger
2d245f83c6 Merge "twoshay: Add AIDL api v4 to compat. matrices and manifest files" into main 2025-01-02 22:36:47 -08:00
Cheng Chang
fe1d00ff58 dump_gps: Support thinmd logs collect
Flag: EXEMPT logs collection.
Bug: 386286230
Test: b/386286230#comment3 bugreport example.
Change-Id: I93d385cd1a03aa55f63520626072d1bf7ccedb86
2025-01-03 04:54:53 +00:00
Eileen Lai
6e56542845 Merge "kernel metrics: add selinux policy about modem_boot_duration for kernel metrics feature" into main 2025-01-02 17:48:40 -08:00
Eileen Lai
ca670f1106 kernel metrics: add selinux policy for kernel metrics feature
Add selinux policy for modem_wakeup_ap, pcie_link_state, pcie_link_duration, pcie_link_stats, pcie_link_updown

Bug: 368510043

01-03 00:28:02.216   952   952 I binder:952_2: type=1400 audit(0.0:1550): avc:  denied  { read } for  name="modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:28:02.216   952   952 I binder:952_2: type=1400 audit(0.0:1551): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:28:02.216   952   952 I binder:952_2: type=1400 audit(0.0:1552): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/modem_wakeup_ap" dev="sysfs" ino=146476 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:36:43.740   988   988 I binder:988_2: type=1400 audit(0.0:970): avc:  denied  { read } for  name="pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740   988   988 I binder:988_2: type=1400 audit(0.0:971): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:36:43.740   988   988 I binder:988_2: type=1400 audit(0.0:972): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_state" dev="sysfs" ino=153493 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:44:06.248  1001  1001 I binder:1001_2: type=1400 audit(0.0:1045): avc:  denied  { read } for  name="pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248  1001  1001 I binder:1001_2: type=1400 audit(0.0:1046): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:44:06.248  1001  1001 I binder:1001_2: type=1400 audit(0.0:1047): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_duration" dev="sysfs" ino=153542 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:49:48.640   966   966 I binder:966_2: type=1400 audit(0.0:1124): avc:  denied  { read } for  name="pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640   966   966 I binder:966_2: type=1400 audit(0.0:1125): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:49:48.640   966   966 I binder:966_2: type=1400 audit(0.0:1126): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_stats" dev="sysfs" ino=153354 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

01-03 00:58:31.152   945   945 I binder:945_2: type=1400 audit(0.0:973): avc:  denied  { read } for  name="pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152   945   945 I binder:945_2: type=1400 audit(0.0:974): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902
01-03 00:58:31.152   945   945 I binder:945_2: type=1400 audit(0.0:975): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/pcie_link_updown" dev="sysfs" ino=153308 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 bug=b/369735902

Flag: EXEMPT update sepolicy
Change-Id: I86908fccb65944a8bbc779b5bae38d08c1776c45
2025-01-02 18:09:35 +00:00
Treehugger Robot
e57feb6c21 Merge "Revert "Set up access control rule for aocxd"" into main 2024-12-30 17:42:21 -08:00
Leonardo Blanger
57c69f455f twoshay: Add AIDL api v4 to compat. matrices and manifest files
Bug: 384567963

Test: atest vts_treble_vintf_vendor_test

Flag: EXEMPT AIDL API version change

Change-Id: I01e1487a324c5d930364ff20fb5120a92db62afc
Signed-off-by: Leonardo Blanger <leoblanger@google.com>
2024-12-30 15:23:38 +08:00
Wilson Sung
132d2f2515 Revert "Set up access control rule for aocxd"
This reverts commit f3564e9b91.

Reason for revert: BB

Change-Id: If529dbe90cdae4cd9266af85de63bb8a4f808977
Fix: 386696682
2024-12-29 19:41:00 -08:00
Hung-Yeh Lee
06d1a53ceb Merge changes from topic "b376426334-dump-display" into main
* changes:
  display-dump: sepolicy for new secondary display dump
  display-dump: sepolicy for legacy secondary display dump
  display-dump: sepolicy for new primary display dump
  display-dump: sepolicy for legacy primary display dump
  display-dump: update project-specific crtc sysfs node
2024-12-29 18:31:49 -08:00
Bowen Lai
09f71b4f37 Merge "Set up access control rule for aocxd" into main 2024-12-26 22:39:47 -08:00
Hung-Yeh Lee
0dcf585cd6 display-dump: sepolicy for new secondary display dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I5186dfa9de755caa5023d159cb3cc1601268aa6a
2024-12-26 22:16:12 -08:00
Hung-Yeh Lee
c980a0a5c1 display-dump: sepolicy for legacy secondary display dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I903eb0d954f18b1501787d1292497696f1886437
2024-12-26 22:15:51 -08:00
Hung-Yeh Lee
19268ffb20 display-dump: sepolicy for new primary display dump
Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I3b1d1f46ddea4882f028d9314cfd174371039925
2024-12-26 22:14:20 -08:00
Hung-Yeh Lee
33f5985af3 display-dump: sepolicy for legacy primary display dump
Create sub-directory for project-specific sepolicy files, and move
legacy sepolicy files to sub-directory.

Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I7de8667b666d7f47c05b147a1f9e7da62ba35e1c
2024-12-26 22:13:48 -08:00
Bowen Lai
f3564e9b91 Set up access control rule for aocxd
Test: make -j64
Bug: 385663354
Flag: EXEMPT bugfix
Change-Id: I1b6584a0643085e9d69c85b27a0ba3667aacf1cf
2024-12-26 04:23:08 +00:00
Jooyung Han
72bec82019 Merge "Move lyric sysconfig to vendor" into main 2024-12-25 17:24:55 -08:00
Treehugger Robot
338f8db4dc Merge "Rename sysfs_gpu_uevent to sysfs_gpu" into main 2024-12-25 02:11:21 -08:00
Wilson Sung
e3c536e772 Rename sysfs_gpu_uevent to sysfs_gpu
Fix: 385248542
Fix: 385248720
Fix: 385248893
Fix: 385248956
Fix: 385808247
Fix: 385978257
Test: make selinux_policy
Flag: EXEMPT bugfix
Change-Id: I8395401e50905bdcabd4858442238570edb916e9
2024-12-25 00:20:24 -08:00
Todd Poynor
cfa4033ecc Merge "Revert "sepolicy: edgetpu: add debugfs contexts"" into main 2024-12-24 05:46:01 -08:00
Pechetty Sravani (xWF)
19b79e1312 Revert "sepolicy: edgetpu: add debugfs contexts"
This reverts commit 4b68ad6e8d.

Reason for revert: <Droidmonitor created revert due to b/385827654.Will be verified through ABTD for standard investigation.>

Change-Id: I0fbdcd276c9e20010b3bfbbcad5203bf276859a4
2024-12-24 01:42:39 -08:00
Robin Peng
c7b8062120 Merge "check_current_prebuilt: Move symlink file into out/pixel" into main 2024-12-23 19:59:52 -08:00
Treehugger Robot
896ea46985 Merge "sepolicy: edgetpu: add debugfs contexts" into main 2024-12-23 19:56:58 -08:00
Jooyung Han
31e885a477 Move lyric sysconfig to vendor
This sysconfig is about the apex (com.google.pixel.camera.hal). So it
should be installed with the apex, not in /product.

Bug: 375357389
Test: SysConfigTest#testVendorApexAllowlist
Change-Id: I551870fcff576527d3fdfff3d17a5e7b0ce198a9
2024-12-24 10:38:36 +09:00
Liz Prucka
327eb5b7eb Merge "Add Mali SELinux build flag for Pixel" into main 2024-12-23 09:09:23 -08:00
Robin Peng
6940a61c92 check_current_prebuilt: Move symlink file into out/pixel
From Android Build System, it's improper to update the source tree during
'lunch'. Move symlink files into out/pixel folder

Bug: 364831620
Flag: EXEMPT export current prebuilt path
Change-Id: I5024788e169abb8f117a289c6a07e7c47527fe60
Signed-off-by: Robin Peng <robinpeng@google.com>
2024-12-20 23:08:43 -08:00
Kai Hsieh
b24840ba97 Merge "Solve SEPolicy issue with the Troubleshooting Wizard" into main 2024-12-20 22:34:57 -08:00
Kai Hsieh
13dcd24c48 Solve SEPolicy issue with the Troubleshooting Wizard
- Allow pixelsystemservice_app to access GIA
- Allow GIA to execute a callback for pixelsystemservice_app

[avc error]
12-09 20:39:51.287   416   416 E SELinux : avc:  denied  { find } for pid=5454 uid=10285 name=com.google.input.gia.core.IGiaService/default scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:object_r:hal_gia_service:s0 tclass=service_manager permissive=1
12-09 20:39:51.280  5454  5454 I pool-4-thread-1: type=1400 audit(0.0:19): avc:  denied  { call } for  scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:r:gia:s0 tclass=binder permissive=1 app=com.google.android.pixelsystemservice
12-09 20:39:51.280  5454  5454 I pool-4-thread-1: type=1400 audit(0.0:20): avc:  denied  { transfer } for  scontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tcontext=u:r:gia:s0 tclass=binder permissive=1 app=com.google.android.pixelsystemservice
12-09 20:39:51.280  1341  1341 I binder:1341_3: type=1400 audit(0.0:21): avc:  denied  { call } for  scontext=u:r:gia:s0 tcontext=u:r:pixelsystemservice_app:s0:c29,c257,c512,c768 tclass=binder permissive=1

Flag: EXEMPT, bug-fix only.
Bug: 379991501
Change-Id: I14942cc0df9b9032b2c054fc87d29fc8098aa455
Signed-off-by: Kai Hsieh <kaihsieh@google.com>
2024-12-19 23:39:24 -08:00
Todd Poynor
4b68ad6e8d sepolicy: edgetpu: add debugfs contexts
Add vendor_edgetpu_debugfs contexts for dumpstate dump_tpu.sh access.

Bug: 349699101
Test: adb bugreport, check dumpstate_board.txt
Flag: NONE dumpstate support bundled with device
Change-Id: I42b7eb2391c42323c7da0b544402e9a08b9d56f3
Signed-off-by: Todd Poynor <toddpoynor@google.com>
2024-12-20 01:27:48 +00:00
Chintan Pandya
c5c4f1ef81 Disable redundant trace event for performance reasons
It's been found that every GIA trace events takes about
0.7 us. GIA driver throws 5 trace events for every IRQ
via GIA. Reducing some events would make IRQ handler
flow a but more optimized.

Bug: 380463996
Test: observed the trace and the disabled trace entries
      are not longer present, reducing pressure on runtime
      performance as well as memory pressure on trace buffer.
Flag: EXEMPT, optimize interrupt tracing.

Change-Id: I233d82da7a6eb75344afe3798c9f850a74e5e16b
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:37 +00:00
Chintan Pandya
60a9a7b17b Optimize interrupts trace buffer size
Reduce the trace buffer size further

Bug: 383121598
Test: Manually observed the optimized trace settings
Flag: EXEMPT, optimize interrupt tracing.
Change-Id: Id6e02df4d73a97b99a019b210dbd508b115462fc
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:37 +00:00
Chintan Pandya
a67610e46e Update irq_gia_google permission
Current permission 666 blocks bugreport use-case be able to
copy interrupt traces into bugreport. Provide required
permissions.

Bug: 376124648
Test: Captured bugreport and traces are visible in that.
Flag: EXEMPT, init rc change to modify permission
Change-Id: Ib03ab97fcd65d18e2420421f8fc997eefd55570f
Signed-off-by: Chintan Pandya <chintanpandya@google.com>
2024-12-19 22:59:25 +00:00
Hung-Yeh Lee
bbe22a1056 display-dump: update project-specific crtc sysfs node
Refactor and rename project-specific dump

Bug: 376426334
Test: adb bugreport
Test: adb shell /vendor/bin/dump/dump_*_display
Test: adb shell /vendor/bin/dump/dump_*_second_display
Flag: EXEMPT bugfix
Change-Id: I7bf470e5784e0fd726c49823b55aae6235aceaec
2024-12-18 21:59:42 -08:00
Liz Prucka
bfa32da350 Add Mali SELinux build flag for Pixel
Created initial Pixel SELinux flag module.
Added Mali release flag to build be built by soong.

Bug: 384720119
Test: make
Change-Id: Iffcae7bc64114b80b2750da8823768a15efff9b3
2024-12-17 23:11:31 +00:00
Richard Chang
e67bff18e9 Merge "sepolicy: update init.te for zram device" into main 2024-12-16 17:34:47 -08:00
Minche Li
a12a209a03 Merge "Updates TTS voice packs in gs-common 202412" into main 2024-12-16 02:34:58 -08:00
Richard Chang
cf29787f8d sepolicy: update init.te for zram device
Sync patch from zuma: ag/21578379, but move to gs-common.

Avc denied log:
avc:  denied  { write } for  comm="init" name="zram0" dev="tmpfs" ino=1306 scontext=u:r:init:s0 tcontext=u:object_r:ram_device:s0 tclass=blk_file permissive=1

Verify on PBuilds:
https://android-build.corp.google.com/abtd/run/L32800030008398424/

Bug: 370643878
Test: Boot and check avc denied logs
Flag: EXEMPT sepolicy
Change-Id: I90ea0b248835fa51fe07cfa23e5f819fd8422c08
2024-12-16 01:32:02 -08:00
Eileen Lai
a8634006fb kernel metrics: add selinux policy about modem_boot_duration for kernel metrics feature
Bug: 368510043

12-13 23:10:00.604   993   993 I binder:993_2: type=1400 audit(0.0:327): avc:  denied  { read } for  name="modem_boot_duration" dev="sysfs" ino=72272 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs_kernel_metrics:s0 tclass=file permissive=1
12-13 23:10:00.604   993   993 I binder:993_2: type=1400 audit(0.0:328): avc:  denied  { open } for  path="/sys/kernel/pixel_metrics/modem/modem_boot_duration" dev="sysfs" ino=72272 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs_kernel_metrics:s0 tclass=file permissive=1
12-13 23:10:00.604   993   993 I binder:993_2: type=1400 audit(0.0:329): avc:  denied  { getattr } for  path="/sys/kernel/pixel_metrics/modem/modem_boot_duration" dev="sysfs" ino=72272 scontext=u:r:shared_modem_platform:s0 tcontext=u:object_r:sysfs_kernel_metrics:s0 tclass=file permissive=1

Flag: EXEMPT update sepolicy

Change-Id: Id50146858f84d3716855b9010e95c7232c6accfa
2024-12-16 07:09:01 +00:00
Xiaofan Jiang
da6c722022 Merge "modem_uart: add modem uart log to bugreport" into main 2024-12-14 00:08:31 -08:00
Xin Li
aa687b7c4c [automerger skipped] Merge 24Q4 into AOSP main am: b61a4f4345 -s ours am: 261899fc1b -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/29954999

Change-Id: I461895b52139d919f3bdc7b4475e117e110cb816
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-13 21:45:19 -08:00