Eileen Lai
2833eecc49
modem_svc: move shared_modem_platform related sepolicy to gs-common
...
Bug: 372400955
Change-Id: I8b08e5b7789a5b2bf027deed0afc97f87ca25f3f
Flag: NONE local testing only
2024-12-06 10:15:18 +00:00
Jaegeuk Kim
3bcf1e5891
Add Intelligence rc
...
By persist.vendor.intelligence,
# on -> mount(ok) -> on
# off -> write_zeroes -> remove -> rm(ok) -> disable
# on -> mount(fail) -> remove -> rm(ok) -> disable
For SEpolicy,
type=1400 audit(1731445557.444:32): avc: denied { read } for comm="kworker/u16:3" path="/dev/block/sda33" dev="tmpfs" ino=1050 scontext=u:r:kernel:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
type=1400 audit(1731445557.476:33): avc: denied { execute_no_trans } for comm="storage_intelli" path="/vendor/bin/toolbox" dev="dm-11" ino=368 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
type=1400 audit(1731448933.292:16): avc: denied { search } for comm="dd" name="block" dev="tmpfs" ino=12 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
type=1400 audit(1731461590.844:16): avc: denied { write } for comm="dd" name="sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
type=1400 audit(1731461590.844:17): avc: denied { open } for comm="dd" path="/dev/block/sda33" dev="tmpfs" ino=1052 scontext=u:r:storage_intelligence:s0 tcontext=u:object_r:userdata_exp_block_device:s0 tclass=blk_file permissive=1
Bug: 378120929
Flag: build.RELEASE_PIXEL_VENDOR_INTELLIGENCE_AID
Change-Id: If9d2f067e29b6c574d3b827ea509fec92c6d8028
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2024-12-05 19:31:26 -08:00
Treehugger Robot
2021b27dcc
Merge "Always include camera calibration tools in debug builds." into main
2024-12-05 23:13:29 +00:00
Krzysztof Kosiński
f7eae2a946
Always include camera calibration tools in debug builds.
...
These statements will be ignored if the packages are
unavailable, such as in the PDK build.
Bug: 380373922
Test: presubmit, check that tools exist in husky-userdebug
Flag: EXEMPT debug-only tool
Change-Id: Id3a524a6adaf1f719a23eb91ebad161ce0551af4
2024-12-05 20:11:21 +00:00
Dmitry Skiba
4250b91047
Add kswapd experiment.
...
See go/pixel-perf-25q1-experiments for the info.
Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=0, set .Perf__kswapd_experiment=true, observe /sys/kernel/vendor_mm/kswapd_cpu_affinity changes
Flag: NONE controlled by Mendel instead
Change-Id: Id63690f0dcd38de92e4c2fde5b0ab814ed3d9db1
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-05 17:59:34 +00:00
Dmitry Skiba
d530f11290
Merge "Add recovery support for perf experiments." into main
2024-12-05 17:35:19 +00:00
Piotr Klasa
2c41fdac32
Add Proc Vendor Sched Sepolicy Fix
...
Bug: 361092565
Test: m atest && atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Test: adb shell dmesg | grep proc_vendor_sched ; adb logcat -d | grep proc_vendor_sched
Evidences
12-02 19:31:34.952 279 279 W init : type=1400 audit(0.0:7): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:8): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:9): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:10): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:11): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.956 279 279 W init : type=1400 audit(0.0:12): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:13): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:14): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:15): avc: denied { associate } for name="prefer_idle" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
12-02 19:31:34.960 279 279 W init : type=1400 audit(0.0:16): avc: denied { associate } for name="uclamp_min" scontext=u:object_r:proc_vendor_sched:s0 tcontext=u:object_r:proc:s0 tclass=filesystem permissive=0
Flag: EXEMPT bugfix
Change-Id: Iad58e23abc1a7e27c3f5f4130e50d7e4aa0b6cf8
2024-12-05 12:05:19 +01:00
Dmitry Skiba
afc6c28401
Add recovery support for perf experiments.
...
This change establishes a place for perf experiments and adds a
script to delay experiments for recovery purposes. For more info
see go/pixel-perf-experiment-whatif.
Bug: 365855872
Test: build/flash, set .Perf__experiments_delay_seconds=10, verify that vendor.perf.allow_experiments=1 after 10 seconds
Flag: NONE controlled by Mendel instead
Change-Id: I78db482542066d5d5646d8c303dbe88054cfe66d
Signed-off-by: Dmitry Skiba <dskiba@google.com>
2024-12-05 09:07:27 +00:00
Dinesh Yadav
42fd113c8b
Merge "Revert "Allow tachyon service to make binder calls to GCA"" into main
2024-12-05 08:11:09 +00:00
Dinesh Yadav
6711886008
Revert "Allow tachyon service to make binder calls to GCA"
...
This reverts commit 97f50223aa
.
Reason for revert: This change breaks git_main-without-vendor as google_camera_app & debug_camera_app are not supported in non-vendor builds.
Change-Id: I9bf47c59aa036caf66e2f3fe5d7b6ea0938e4442
2024-12-05 08:02:02 +00:00
Dinesh Yadav
9c65d0ceaa
Merge "Allow tachyon service to make binder calls to GCA" into main
2024-12-05 06:02:06 +00:00
Joe Tessler
ae42297f0f
Update IAudioExtension AIDL to v5
...
We unfroze the v4 IAudioExtension AIDL API and modified it in
ag/30424231, meaning we need to increment references AIDL version
elsewhere to take advantage of the new functionality (and to make tests
happy).
We will freeze the IAudioExtension AIDL API as v5 at a later date.
Bug: 378303588
Test: atest vts_treble_vintf_vendor_test
Flag: vendor.google.whitechapel.audio.flags.enable_always_available_display
Change-Id: I94434fcc2802c8759b59a0004aca1be603e7e88e
2024-12-05 04:27:25 +00:00
Bowen Lai
8a3ec83793
Merge "Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL" into main
2024-12-05 03:05:46 +00:00
Xin Li
5f10a44aab
[automerger skipped] Merge ab/AP4A.241205.013 into aosp-main-future am: c0a71b7d0e
-s ours
...
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 421324351c
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30626201
Change-Id: I4eed38d9ea2b766b1e6312c4ac510fcb51ac4234
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-12-03 18:22:09 +00:00
Dinesh Yadav
97f50223aa
Allow tachyon service to make binder calls to GCA
...
This permission is needed for tachyon service to call callbacks.
AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212 6987 6987 W com.google.edge: type=1400 audit(0.0:17): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424 4166 4166 W com.google.edge: type=1400 audit(0.0:254): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0
Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: Id27ecd53e9ea7fbf273be098749cdaece55d00cb
2024-12-03 06:20:57 +00:00
Krzysztof Kosiński
5085275f71
Add libg3a logging initrc files.
...
These files are installed on the vendor partition regardless
of whether we use a prebuilt APEX or build it from source.
History links (Google internal only):
libg3a_gabc.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gABC/libg3a_gabc.rc;drc=82654c90cc30d21948d0be24931edda10739caf0
libg3a_gaf.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gAF/libg3a_gaf.rc;drc=1e01ef4606e8553866d803a30e4284485ff12741
libg3a_ghawb.rc: https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/camera/google_3a/libs_v4/gHAWB/libg3a_ghawb.rc;drc=82654c90cc30d21948d0be24931edda10739caf0
Bug: 380379803
Test: presubmit, check husky logs when prebuilt APEX is used
Flag: EXEMPT build system fix
Change-Id: I405c0e3ad78d63e3faee8723c2ba7ba7cf0dd6db
2024-12-02 20:42:13 +00:00
Zhengyuan Cui
419a3d8812
Merge "Allow command line tools to access Tachyon service in user builds." into main
2024-11-29 04:13:12 +00:00
bowenlai
e93068e6ca
Rename aocx.IAoc to aocx.IAoc/default to support stable AIDL
...
Also add framework_compatibility_matrix.xml for aoc stable AIDL
Bug: 380993517
Flag: EXEMPT HAL interface change
Test: local build
Change-Id: I8a41ff1bdd4ffc8e5d7da08879738aa11fb81813
2024-11-28 15:01:26 +08:00
Xin Li
c0a71b7d0e
Merge ab/AP4A.241205.013 into aosp-main-future
...
Bug: 370570306
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I15a1c680b1877aa299e5c865a5a78c6ce2bd4a62
2024-11-27 12:53:10 -08:00
Lucas Wei
75eed3f8c2
Merge "dump_chip_info: dump more tables from chip-info driver" into main
2024-11-27 03:40:59 +00:00
Lucas Wei
219845f0d9
dump_chip_info: dump more tables from chip-info driver
...
Add instructions to dump more tables from chip-info driver and grant
permissions by sepolicy.
Flag: EXEMPT, add more table entries for dumping
Test: adb shell dumpsys android.hardware.dumpstate.IDumpstateDevice/default dump_chip_info
Bug: 376346526
Change-Id: Ic9d0bb2059271e95e615e8f64cab129fa8358484
2024-11-27 03:40:47 +00:00
Kiwon Park
1dc746078a
Merge "gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode" into main
2024-11-27 03:33:01 +00:00
Aleks Rozman
fa32332a55
Merge "Build lyric from source if prebuilt directory is missing." into main
2024-11-26 18:50:12 +00:00
Treehugger Robot
0a669d77cf
Merge "Document radioext_interface_type soong variable usage" into main
2024-11-26 05:17:15 +00:00
Treehugger Robot
5367ab60fc
Merge "dump_gps: collect gps logs in ascending order" into main
2024-11-26 04:34:59 +00:00
Treehugger Robot
1b957304b3
Merge "Introduce interrupts module for debug and trace" into main
2024-11-24 16:04:01 +00:00
Will Song
d3f90503f7
Merge changes from topic "reland_common_perf_config" into main
...
* changes:
Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
Revert^2 "gs-common: Added common perf init.rc"
2024-11-23 07:29:48 +00:00
Chintan Pandya
d6b9cc46bf
Introduce interrupts module for debug and trace
...
Interrupts module has following functions to perform:
1. Apply boot time configuration
- Create a new trace instance
- Enable required irq and irq_gia events in the
instance
- Apply required filters on the high frequency
events
- Set instance's trace buffer size
- Enable tracing
2. Sepolicy for every required access
3. Copy interrupts trace buffer to dumpsys whenever triggered
AVC denials:
avc: denied { search } for comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { write } for comm="dump_interrupts" name="all_logs" dev="dm-53" ino=7808 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { add_name } for comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { create } for comm="dump_interrupts" name="interrupts" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { search } for comm="dump_interrupts" name="instances" dev="tracefs" ino=2151 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
avc: denied { search } for comm="dump_interrupts" name="radio" dev="dm-53" ino=373 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { read } for comm="dump_interrupts" name="trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc: denied { open } for comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=143409 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc: denied { create } for comm="dump_interrupts" name="interrupts_trace" scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { write open } for comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=8102 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_interrupts" path="/sys/kernel/tracing/instances/irq_gia_google/trace" dev="tracefs" ino=141578 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:tracefs_instances_interrupts:s0 tclass=file permissive=1
avc: denied { getattr } for comm="dump_interrupts" path="/data/vendor/radio/logs/always-on/all_logs/interrupts/interrupts_trace" dev="dm-53" ino=7965 scontext=u:r:dump_interrupts_traces:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
Flag: EXEMPT, add interrupts traces dump program to bugreport
Bug: 376124648
Test: Manually checked boot time trace configuration. Collected
`adb bugreport`. And checked interrupt traces are dumped
into and extracted out from the bugreport. More details
in the bug.
Change-Id: I08872a321fa9726b50a54aeb0a91ed63c0652a3a
2024-11-22 21:38:57 +00:00
Will Song
db25f03ec3
Revert^2 "gs-common: Move cpufreq perf settings to gs-common"
...
Re-land after making SELinux corrections.
7606e41504
Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com>
Change-Id: I8721e1fb7f9df5b476a27e2db8aea8a5c395b233
2024-11-22 09:08:17 -08:00
Will Song
168f30d8a1
Revert^2 "gs-common: Added common perf init.rc"
...
Re-land after making SELinux corrections.
98e6a61c1f
Bug: 335874870
Flag: NONE code refactor
Test: Boot and check parameters
Signed-off-by: Will Song <jinpengsong@google.com>
Change-Id: I4ae6407e7edeeed4b62774698b5cb85d32a01c2d
2024-11-22 09:08:08 -08:00
Liana Kazanova (xWF)
cafe80b310
Merge "Revert "modem_svc: move shared_modem_platform related sepolicy t..."" into main
2024-11-21 20:16:06 +00:00
Meng Wang
8fb8122f3b
gs-common/esim: include sysprop setupwizard.feature.provisioning_profile_mode
...
So all eSIM bootstrap configs are included in one shot.
This change is no-op for devices already including esim.mk because the sysproop was already set so.
Flag: NONE no-op mk change
Bug: 380280915
Change-Id: Ic1e83e4cd2ad546ddecbef7234457559894217e1
2024-11-21 18:19:31 +00:00
Liana Kazanova (xWF)
74283c5cbe
Revert "modem_svc: move shared_modem_platform related sepolicy t..."
...
Revert submission 30519089-move_modem_sepolicy
Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.
Reverted changes: /q/submissionid:30519089-move_modem_sepolicy
Change-Id: I241b3aba370f77c705ca3890151e760b4764beca
2024-11-21 17:54:12 +00:00
Eileen Lai
6db7e6756d
Merge "modem_svc: move shared_modem_platform related sepolicy to gs-common" into main
2024-11-21 17:03:11 +00:00
Edwin Tung
e8884c92fb
dump_gps: collect gps logs in ascending order
...
Bug: 359797762
Test: Check gps file in dumpstate
Flag: EXEMPT, add gps dump to bugreport
Change-Id: Ia869e634c5f526f217fd24595a6f415c30046980
2024-11-21 10:19:39 +00:00
Eileen Lai
20bb32819d
modem_svc: move shared_modem_platform related sepolicy to gs-common
...
Bug: 372400955
Flag: NONE local testing only
Change-Id: Ia23ff9f43ee855c2a758714d025123c071e9c288
2024-11-21 08:27:55 +00:00
Dinesh Yadav
acf0eb0ee5
Merge "Add sepolicy for edgetpu_tachyon_service to report metrics" into main
2024-11-21 08:25:01 +00:00
Dinesh Yadav
064b50e43b
Add sepolicy for edgetpu_tachyon_service to report metrics
...
This permission is needed to report errors encountered while running gxp workloads to telemetry services.
AVC Error seen while reporting errors:
11-21 09:30:05.711 406 406 E SELinux : avc: denied { find } for pid=1821 uid=1000 name=android.frameworks.stats.IStats/default scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=0
Bug: 359404493
Flag: EXEMPT updates device sepolicy only
Change-Id: Ic282928aad6283077e183f931230f79eea49053d
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2024-11-21 06:39:00 +00:00
Boon Jun
e3df39e77c
Document radioext_interface_type soong variable usage
...
Bug: 377991853
Bug: 371878208
Test: None
Flag: EXEMPT DOCS_ONLY
Change-Id: Ibb722d63ee726aeead0f7c89bdfa21c0ad3ae6b3
2024-11-21 05:38:22 +00:00
Wesley Lee
9cb50229d9
Merge "mediacodec: add GPU access policy" into main
2024-11-21 03:31:04 +00:00
Cheng Chang
90398dea27
Merge "sepolicy: Allow hal_gnss_pixel create file" into main
2024-11-21 00:39:46 +00:00
Aleks Rozman
83e7cc5a7f
Build lyric from source if prebuilt directory is missing.
...
On select branches, like the camera-stability, the prebuilt directory is missing so we want to make sure that it is building from source even if the flags tell us that a prebuilt should be used.
Bug: 380099804
Change-Id: I8832451c1f7ff6d6de3c2991e9f63317966a2f83
Test: Make on camera-stability-dev and verify warning
Flag: EXEMPT (not applicable)
2024-11-20 22:48:19 +00:00
Wesley Lee
0649754278
mediacodec: add GPU access policy
...
avc: denied { read write }
for comm="binder:757_6" name="renderD128" dev="tmpfs"
ino=1566 scontext=u:r:mediacodec_google:s0
tcontext=u:object_r:gpu_device:s0 tclass=chr_file permissive=1
Bug: 378609071
Flag: EXEMPT bugfix
Test: run cts -m CtsMediaV2TestCases -t
android.mediav2.cts.CodecEncoderSurfaceTest#testSimpleEncodeFromSurface[26_c2.google.av1.encoder_video/av01_c2.google.av1.decoder_video/av01_512kbps_30fps_yuv420flexible_tonemapyes_persistentsurface]
Change-Id: I2af4f53c9ff8aca0d3c7fd721738f2044d4772fd
Signed-off-by: Wesley Lee <szuweilee@google.com>
2024-11-20 06:29:09 +00:00
Daniel Lee
0cf5a2a95d
Merge "storage: turn off writebooster flags upon init" into main
2024-11-20 05:12:10 +00:00
Julius Snipes
993506e4f1
GRIL sepolicy for aidl radioext v2.1
...
avc: denied { find } for pid=2019 uid=10269 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c13,c257,c512,c768 tcontext=u:object_r:hal_aidl_radio_ext_service:s0 tclass=service_manager permissive=1
avc: denied { find } for pid=6500 uid=10242 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0
avc: denied { find } for interface=vendor.google.radioext::IRadioExt sid=u:r:grilservice_app:s0:c242,c256,c512,c768 pid=6500 scontext=u:r:grilservice_app:s0:c242,c256,c512,c768 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=0
avc: denied { read write } for comm="vendor.google.r" name="umts_boot0" dev="tmpfs" ino=1352 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file permissive=1
avc: denied { search } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1
avc: denied { read write } for name="backlight" dev="sysfs" ino=83794 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1
avc: denied { create } for name="radio" dev="dm-53" ino=379 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_hwservice:s0 tclass=hwservice_manager permissive=1
avc: denied { find } for interface=hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance sid=u:r:hal_aidl_radio_ext:s0 pid=792 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:hal_bluetooth_coexistence_service:s0 tclass=service_manager permissive=1
avc: denied { read } for name="link_rate" dev="sysfs" ino=111840 scontext=u:r:hal_aidl_radio_ext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Bug: 355774451
Change-Id: Iea5e0cdff82b140caa1e8b6717e94d6d78076b28
Test: verify with test roms
Flag: EXEMPT sepolicy
2024-11-19 23:27:20 +00:00
Daniel Lee
350e262415
storage: turn off writebooster flags upon init
...
Enabling writebooster capability for Pixel UFS (pa/2994670)
enabled the following flags in Android Common Kernel:
- wb_flush_en
- wb_flush_during_h8
- wb_enable
This patch disables these writebooster-related flags to restore the
intended behavior for Pixel devices. This overrides the default Android
Common Kernel behavior.
While 'wb_flush_en' and 'wb_enable' have corresponding sysfs entries
('enable_wb_buf_flush' and 'wb_on') for toggling,
'wb_flush_during_h8' currently lacks this functionality in the Android
Common Kernel. Pixel provides the 'manual_gc' sysfs entry as a
workaround. Setting 'manual_gc' to 0 disables 'wb_flush_during_h8'.
Bug: 377958570
Flag: EXEMPT bugfix
Test: check if all writebooster-realated flags are false upon init
Change-Id: I918bf6939de3e208b715f554a96ccbd053f68a18
Signed-off-by: Daniel Lee <chullee@google.com>
2024-11-19 17:22:10 +00:00
Tommy Chiu
fa76c993b7
[automerger skipped] gsc: Change the criteria for building GSC targets am: 421324351c
-s ours
...
am skip reason: Merged-In I96f429ec3284114868ad220ea308a6920930c065 with SHA-1 8af77ef942
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs-common/+/30467455
Change-Id: I008809abb19974fc20f8f5047d08b017d9d3ae3d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-18 21:45:44 +00:00
Tommy Chiu
421324351c
gsc: Change the criteria for building GSC targets
...
There can be a case where vendor directory exists but vendor/google_nos
does not.
Bug: 371059500
Test: manual
Flag: EXEMPT refactor
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8af77ef94228bf37bd7be4d8db496f7084e0333d )
Merged-In: I96f429ec3284114868ad220ea308a6920930c065
Change-Id: I96f429ec3284114868ad220ea308a6920930c065
2024-11-18 18:10:31 +00:00
Robert Lee
32569fc7e5
Merge "audio: update hdmi audio path" into main
2024-11-18 03:10:31 +00:00
Robert Lee
5a063cc17b
audio: update hdmi audio path
...
Add permission to read HDMI states by audio hal.
For new project is using
/devices/platform/dwc_dptx-audio/extcon/hdmi_audio
For old projects are using
/devices/platform/drmdp-adma/extcon/hdmi_audio
Bug: 328784922
Test: builds
Flag: EXEMPT update sepolocy
Change-Id: I3bd0ccf1ee804de3157e759eac275673c9fc96a2
Signed-off-by: Robert Lee <lerobert@google.com>
2024-11-18 03:08:08 +00:00