Commit graph

2829 commits

Author SHA1 Message Date
Eileen Lai
2833eecc49 modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I8b08e5b7789a5b2bf027deed0afc97f87ca25f3f
Flag: NONE local testing only
2024-12-06 10:15:18 +00:00
Jaegeuk Kim
3bcf1e5891 Add Intelligence rc
By persist.vendor.intelligence,

 # on  -> mount(ok)    -> on
 # off -> write_zeroes -> remove -> rm(ok) -> disable
 # on  -> mount(fail)  -> remove -> rm(ok) -> disable

For SEpolicy,

type=1400 audit(1731445557.444:32): avc:  denied  { read } for  comm="kworker/u16:3" path="/dev/block/sda33" dev="tmpfs" ino=1050 scontext=u:r:kernel:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1

type=1400 audit(1731445557.476:33): avc:  denied  { execute_no_trans } for  comm="storage_intelli" path="/vendor/bin/toolbox" dev="dm-11" ino=368 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1

type=1400 audit(1731448933.292:16): avc:  denied  { search } for  comm="dd" name="block" dev="tmpfs" ino=12 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1

type=1400 audit(1731461590.844:16): avc:  denied  { write } for  comm="dd" name="sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
type=1400 audit(1731461590.844:17): avc:  denied  { open } for  comm="dd" path="/dev/block/sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1

Bug: 378120929
Flag: build.RELEASE_PIXEL_VENDOR_INTELLIGENCE_AID
Change-Id: If9d2f067e29b6c574d3b827ea509fec92c6d8028
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2024-12-05 19:31:26 -08:00
Treehugger Robot
2021b27dcc Merge "Always include camera calibration tools in debug builds." into main 2024-12-05 23:13:29 +00:00
Krzysztof Kosiński
f7eae2a946 Always include camera calibration tools in debug builds.
These statements will be ignored if the packages are
unavailable, such as in the PDK build.

Bug: 380373922
Test: presubmit, check that tools exist in husky-userdebug
Flag: EXEMPT debug-only tool
Change-Id: Id3a524a6adaf1f719a23eb91ebad161ce0551af4
2024-12-05 20:11:21 +00:00
Dmitry Skiba
4250b91047 Add kswapd experiment.
See go/pixel-perf-25q1-experiments for the info.

Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=0, set .Perf__kswapd_experiment=true, observe /sys/kernel/vendor_mm/kswapd_cpu_affinity changes
Flag: NONE controlled by Mendel instead
Change-Id: Id63690f0dcd38de92e4c2fde5b0ab814ed3d9db1
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-05 17:59:34 +00:00
Dmitry Skiba
d530f11290 Merge "Add recovery support for perf experiments." into main 2024-12-05 17:35:19 +00:00
Piotr Klasa
2c41fdac32 Add Proc Vendor Sched Sepolicy Fix
Bug: 361092565

Test: m atest && atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Test: adb shell dmesg | grep proc_vendor_sched ; adb logcat -d | grep proc_vendor_sched

Evidences

12-02 19:31:34.952   279   279 W init    : type=1400 audit(0.0:7): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:8): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:9): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:10): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:11): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956   279   279 W init    : type=1400 audit(0.0:12): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:13): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:14): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:15): avc:  denied  { associate } for  name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960   279   279 W init    : type=1400 audit(0.0:16): avc:  denied  { associate } for  name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0

Flag: EXEMPT bugfix
Change-Id: Iad58e23abc1a7e27c3f5f4130e50d7e4aa0b6cf8
2024-12-05 12:05:19 +01:00
Dmitry Skiba
afc6c28401 Add recovery support for perf experiments.
This change establishes a place for perf experiments and adds a
script to delay experiments for recovery purposes. For more info
see go/pixel-perf-experiment-whatif.

Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=10, verify that vendor.perf.allow_experiments=1 after 10 seconds
Flag: NONE controlled by Mendel instead
Change-Id: I78db482542066d5d5646d8c303dbe88054cfe66d
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-05 09:07:27 +00:00
Dinesh Yadav
42fd113c8b Merge "Revert "Allow tachyon service to make binder calls to GCA"" into main 2024-12-05 08:11:09 +00:00
Dinesh Yadav
6711886008 Revert "Allow tachyon service to make binder calls to GCA"
This reverts commit 97f50223aa.

Reason for revert: This change breaks git_main-without-vendor  as google_camera_app & debug_camera_app are not supported in non-vendor builds.

Change-Id: I9bf47c59aa036caf66e2f3fe5d7b6ea0938e4442
2024-12-05 08:02:02 +00:00
Dinesh Yadav
9c65d0ceaa Merge "Allow tachyon service to make binder calls to GCA" into main 2024-12-05 06:02:06 +00:00
Joe Tessler
ae42297f0f Update IAudioExtension AIDL to v5
We unfroze the v4 IAudioExtension AIDL API and modified it in
ag/30424231, meaning we need to increment references AIDL version
elsewhere to take advantage of the new functionality (and to make tests
happy).

We will freeze the IAudioExtension AIDL API as v5 at a later date.

Bug: 378303588
Test: atest vts_treble_vintf_vendor_test
Flag: vendor.google.whitechapel.audio.flags.enable_always_available_display
Change-Id: I94434fcc2802c8759b59a0004aca1be603e7e88e
2024-12-05 04:27:25 +00:00
Bowen Lai
8a3ec83793 Merge "Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL" into main 2024-12-05 03:05:46 +00:00
Xin Li
5f10a44aab [automerger skipped] Merge ab/AP4A.241205.013 into aosp-main-future am: c0a71b7d0e -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30626201

Change-Id: I4eed38d9ea2b766b1e6312c4ac510fcb51ac4234
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-03 18:22:09 +00:00
Dinesh Yadav
97f50223aa Allow tachyon service to make binder calls to GCA
This permission is needed for tachyon service to call callbacks.

AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212  6987  6987 W com.google.edge: type=1400 audit(0.0:17): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424  4166  4166 W com.google.edge: type=1400 audit(0.0:254): avc:  denied  { call } for  scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0

Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: Id27ecd53e9ea7fbf273be098749cdaece55d00cb
2024-12-03 06:20:57 +00:00
Krzysztof Kosiński
5085275f71 Add libg3a logging initrc files.
These files are installed on the vendor partition regardless
of whether we use a prebuilt APEX or build it from source.

History links (Google internal only):
libg3a_gabc.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gABC/libg3a_gabc.rc;drc=82654c90cc30d21948d0be24931edda10739caf0
libg3a_gaf.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gAF/libg3a_gaf.rc;drc=1e01ef4606e8553866d803a30e4284485ff12741
libg3a_ghawb.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gHAWB/libg3a_ghawb.rc;drc=82654c90cc30d21948d0be24931edda10739caf0

Bug: 380379803
Test: presubmit, check husky logs when prebuilt APEX is used
Flag: EXEMPT build system fix
Change-Id: I405c0e3ad78d63e3faee8723c2ba7ba7cf0dd6db
2024-12-02 20:42:13 +00:00
Zhengyuan Cui
419a3d8812 Merge "Allow command line tools to access Tachyon service in user builds." into main 2024-11-29 04:13:12 +00:00
bowenlai
e93068e6ca Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL
Also add framework_compatibility_matrix.xml for aoc stable AIDL

Bug: 380993517
Flag: EXEMPT HAL interface change
Test: local build
Change-Id: I8a41ff1bdd4ffc8e5d7da08879738aa11fb81813
2024-11-28 15:01:26 +08:00
Xin Li
c0a71b7d0e Merge ab/AP4A.241205.013 into aosp-main-future
Bug: 370570306
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I15a1c680b1877aa299e5c865a5a78c6ce2bd4a62
2024-11-27 12:53:10 -08:00
Lucas Wei
75eed3f8c2 Merge "dump_chip_info: dump more tables from chip-info driver" into main 2024-11-27 03:40:59 +00:00
Lucas Wei
219845f0d9 dump_chip_info: dump more tables from chip-info driver
Add instructions to dump more tables from chip-info driver and grant
permissions by sepolicy.

Flag: EXEMPT, add more table entries for dumping
Test: adb shell dumpsys android.hardware.dumpstate.IDumpstateDevice/default dump_chip_info
Bug: 376346526
Change-Id: Ic9d0bb2059271e95e615e8f64cab129fa8358484
2024-11-27 03:40:47 +00:00
Kiwon Park
1dc746078a Merge "gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode" into main 2024-11-27 03:33:01 +00:00
Aleks Rozman
fa32332a55 Merge "Build lyric from source if prebuilt directory is missing." into main 2024-11-26 18:50:12 +00:00
Treehugger Robot
0a669d77cf Merge "Document radioext_interface_type soong variable usage" into main 2024-11-26 05:17:15 +00:00
Treehugger Robot
5367ab60fc Merge "dump_gps: collect gps logs in ascending order" into main 2024-11-26 04:34:59 +00:00
Treehugger Robot
1b957304b3 Merge "Introduce interrupts module for debug and trace" into main 2024-11-24 16:04:01 +00:00
Will Song
d3f90503f7 Merge changes from topic "reland_common_perf_config" into main
* changes:
  Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
  Revert^2 "gs-common: Added common perf init.rc"
2024-11-23 07:29:48 +00:00
Chintan Pandya
d6b9cc46bf Introduce interrupts module for debug and trace
Interrupts module has following functions to perform:

1. Apply boot time configuration
	- Create a new trace instance
	- Enable required irq and irq_gia events in the
          instance
	- Apply required filters on the high frequency
          events
	- Set instance's trace buffer size
	- Enable tracing
2. Sepolicy for every required access
3. Copy interrupts trace buffer to dumpsys whenever triggered

AVC denials:
avc:  denied  { search } for  comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { write } for  comm="dump_interrupts" name="all_logs" dev="dm-53" ino=7808 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { add_name } for  comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { create } for  comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { search } for  comm="dump_interrupts" name="instances" dev="tracefs" ino=2151 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
avc:  denied  { search } for  comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc:  denied  { read } for  comm="dump_interrupts" name="trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc:  denied  { open } for  comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc:  denied  { create } for  comm="dump_interrupts" name="interrupts_trace" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { write open } for  comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=8102 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=141578 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc:  denied  { getattr } for  comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=7965 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

Flag: EXEMPT, add interrupts traces dump program to bugreport
Bug: 376124648
Test: Manually checked boot time trace configuration. Collected
      `adb bugreport`. And checked interrupt traces are dumped
      into and extracted out from the bugreport. More details
      in the bug.
Change-Id: I08872a321fa9726b50a54aeb0a91ed63c0652a3a
2024-11-22 21:38:57 +00:00
Will Song
db25f03ec3 Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
Re-land after making SELinux corrections.

7606e41504

Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com>
Change-Id: I8721e1fb7f9df5b476a27e2db8aea8a5c395b233
2024-11-22 09:08:17 -08:00
Will Song
168f30d8a1 Revert^2 "gs-common: Added common perf init.rc"
Re-land after making SELinux corrections.

98e6a61c1f

Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com>

Change-Id: I4ae6407e7edeeed4b62774698b5cb85d32a01c2d
2024-11-22 09:08:08 -08:00
Liana Kazanova (xWF)
cafe80b310 Merge "Revert "modem_svc: move shared_modem_platform related sepolicy t..."" into main 2024-11-21 20:16:06 +00:00
Meng Wang
8fb8122f3b gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode
So all eSIM bootstrap configs are included in one shot.

This change is no-op for devices already including esim.mk because the sysproop was already set so.

Flag: NONE no-op mk change
Bug: 380280915
Change-Id: Ic1e83e4cd2ad546ddecbef7234457559894217e1
2024-11-21 18:19:31 +00:00
Liana Kazanova (xWF)
74283c5cbe Revert "modem_svc: move shared_modem_platform related sepolicy t..."
Revert submission 30519089-move_modem_sepolicy

Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:30519089-move_modem_sepolicy

Change-Id: I241b3aba370f77c705ca3890151e760b4764beca
2024-11-21 17:54:12 +00:00
Eileen Lai
6db7e6756d Merge "modem_svc: move shared_modem_platform related sepolicy to gs-common" into main 2024-11-21 17:03:11 +00:00
Edwin Tung
e8884c92fb dump_gps: collect gps logs in ascending order
Bug: 359797762
Test: Check gps file in dumpstate
Flag: EXEMPT, add gps dump to bugreport
Change-Id: Ia869e634c5f526f217fd24595a6f415c30046980
2024-11-21 10:19:39 +00:00
Eileen Lai
20bb32819d modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955


Flag: NONE local testing only
Change-Id: Ia23ff9f43ee855c2a758714d025123c071e9c288
2024-11-21 08:27:55 +00:00
Dinesh Yadav
acf0eb0ee5 Merge "Add sepolicy for edgetpu_tachyon_service to report metrics" into main 2024-11-21 08:25:01 +00:00
Dinesh Yadav
064b50e43b Add sepolicy for edgetpu_tachyon_service to report metrics
This permission is needed to report errors encountered while running gxp workloads to telemetry services.

AVC Error seen while reporting errors:
11-21 09:30:05.711   406   406 E SELinux : avc:  denied  { find } for pid=1821 uid=1000 name=android.frameworks.stats.IStats/default scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=0

Bug: 359404493
Flag: EXEMPT updates device sepolicy only
Change-Id: Ic282928aad6283077e183f931230f79eea49053d
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2024-11-21 06:39:00 +00:00
Boon Jun
e3df39e77c Document radioext_interface_type soong variable usage
Bug: 377991853
Bug: 371878208
Test: None
Flag: EXEMPT DOCS_ONLY
Change-Id: Ibb722d63ee726aeead0f7c89bdfa21c0ad3ae6b3
2024-11-21 05:38:22 +00:00
Wesley Lee
9cb50229d9 Merge "mediacodec: add GPU access policy" into main 2024-11-21 03:31:04 +00:00
Cheng Chang
90398dea27 Merge "sepolicy: Allow hal_gnss_pixel create file" into main 2024-11-21 00:39:46 +00:00
Aleks Rozman
83e7cc5a7f Build lyric from source if prebuilt directory is missing.
On select branches, like the camera-stability, the prebuilt directory is missing so we want to make sure that it is building from source even if the flags tell us that a prebuilt should be used.

Bug: 380099804
Change-Id: I8832451c1f7ff6d6de3c2991e9f63317966a2f83
Test: Make on camera-stability-dev and verify warning
Flag: EXEMPT (not applicable)
2024-11-20 22:48:19 +00:00
Wesley Lee
0649754278 mediacodec: add GPU access policy
avc:  denied  { read write }
for  comm="binder:757_6" name="renderD128" dev="tmpfs"
ino=1566 scontext=u:r:mediacodec_google:s0
tcontext=u:object_r:gpu_device:s0 tclass=chr_file permissive=1

Bug: 378609071

Flag: EXEMPT bugfix

Test: run cts -m CtsMediaV2TestCases -t
android.mediav2.cts.CodecEncoderSurfaceTest#testSimpleEncodeFromSurface[26_c2.google.av1.encoder_video/av01_c2.google.av1.decoder_video/av01_512kbps_30fps_yuv420flexible_tonemapyes_persistentsurface]

Change-Id: I2af4f53c9ff8aca0d3c7fd721738f2044d4772fd
Signed-off-by: Wesley Lee <szuweilee@google.com>
2024-11-20 06:29:09 +00:00
Daniel Lee
0cf5a2a95d Merge "storage: turn off writebooster flags upon init" into main 2024-11-20 05:12:10 +00:00
Julius Snipes
993506e4f1 GRIL sepolicy for aidl radioext v2.1
avc:  denied  { find } for pid=2019 uid=10269 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c13,c257,c512,c768 tcontext=u:object_r:hal_aidl_radio_ext_service:s0 tclass=service_manager permissive=1

avc:  denied  { find } for pid=6500 uid=10242 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0

avc:  denied  { find } for interface=vendor.google.radioext::IRadioExt sid=u:r:grilservice_app:s0:c242,c256,c512,c768 pid=6500 scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=0

avc:  denied  { read write } for  comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1

avc:  denied  { search } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1

avc:  denied  { read write } for  name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1

avc:  denied  { create } for  name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1

avc:  denied  { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1

avc:  denied  { read } for  name="link_rate" dev="sysfs" ino=111840 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 355774451
Change-Id: Iea5e0cdff82b140caa1e8b6717e94d6d78076b28
Test: verify with test roms
Flag: EXEMPT sepolicy
2024-11-19 23:27:20 +00:00
Daniel Lee
350e262415 storage: turn off writebooster flags upon init
Enabling writebooster capability for Pixel UFS (pa/2994670)
enabled the following flags in Android Common Kernel:

  - wb_flush_en
  - wb_flush_during_h8
  - wb_enable

This patch disables these writebooster-related flags to restore the
intended behavior for Pixel devices. This overrides the default Android
Common Kernel behavior.

While 'wb_flush_en' and 'wb_enable' have corresponding sysfs entries
('enable_wb_buf_flush' and 'wb_on') for toggling,
'wb_flush_during_h8' currently lacks this functionality in the Android
Common Kernel. Pixel provides the 'manual_gc' sysfs entry as a
workaround. Setting 'manual_gc' to 0 disables 'wb_flush_during_h8'.

Bug: 377958570
Flag: EXEMPT bugfix
Test: check if all writebooster-realated flags are false upon init
Change-Id: I918bf6939de3e208b715f554a96ccbd053f68a18
Signed-off-by: Daniel Lee <chullee@google.com>
2024-11-19 17:22:10 +00:00
Tommy Chiu
fa76c993b7 [automerger skipped] gsc: Change the criteria for building GSC targets am: 421324351c -s ours
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 8af77ef942 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30467455

Change-Id: I008809abb19974fc20f8f5047d08b017d9d3ae3d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-18 21:45:44 +00:00
Tommy Chiu
421324351c gsc: Change the criteria for building GSC targets
There can be a case where vendor directory exists but vendor/google_nos
does not.

Bug: 371059500
Test: manual
Flag: EXEMPT refactor
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8af77ef94228bf37bd7be4d8db496f7084e0333d)
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-11-18 18:10:31 +00:00
Robert Lee
32569fc7e5 Merge "audio: update hdmi audio path" into main 2024-11-18 03:10:31 +00:00
Robert Lee
5a063cc17b audio: update hdmi audio path
Add permission to read HDMI states by audio hal.

For new project is using
/devices/platform/dwc_dptx-audio/extcon/hdmi_audio

For old projects are using
/devices/platform/drmdp-adma/extcon/hdmi_audio

Bug: 328784922
Test: builds
Flag: EXEMPT update sepolocy
Change-Id: I3bd0ccf1ee804de3157e759eac275673c9fc96a2
Signed-off-by: Robert Lee <lerobert@google.com>
2024-11-18 03:08:08 +00:00