Commit graph

11611 commits

Author SHA1 Message Date
Android Build Coastguard Worker
57d93abcf2 Snap for 12573674 from 78464c33d1 to 25Q1-release
Change-Id: I8d5fc45b82bcdcf995f2d522245ada06ca6db033
2024-10-29 23:03:55 +00:00
Bill Yang
4d9237bf48
Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong
Set the full module path of libacryl_hdr_plugin and the include dir for
lobacryl conversion to soong. It will take effect after aosp/3286932 and
aosp/3287183 merged.

Bug: 370414334
Test: lunch aosp_riole-trunk_staging-userdebug ; m libacryl_hdr_plugin libacryl
Change-Id: I67339b5420d523d9a61e0457d77a1412ae6b3582
2024-10-30 00:47:02 +02:00
Bill Yang
78464c33d1 Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong am: ce576fa1be am: 528e9aeb31
Original change: https://android-review.googlesource.com/c/device/google/gs101/+/3287269

Change-Id: I2c458175aa452feb012b2af94e8f4a108dfabe91
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-29 03:12:00 +00:00
Bill Yang
528e9aeb31 Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong am: ce576fa1be
Original change: https://android-review.googlesource.com/c/device/google/gs101/+/3287269

Change-Id: Iea03fb4b0569ced31e68a6109dfdcfa172e033c5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-29 02:50:15 +00:00
Bill Yang
ce576fa1be Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong
Set the full module path of libacryl_hdr_plugin and the include dir for
lobacryl conversion to soong. It will take effect after aosp/3286932 and
aosp/3287183 merged.

Bug: 370414334
Test: lunch aosp_riole-trunk_staging-userdebug ; m libacryl_hdr_plugin libacryl
Change-Id: I67339b5420d523d9a61e0457d77a1412ae6b3582
2024-10-25 03:36:29 +00:00
Android Build Coastguard Worker
ad8d84c72e Snap for 12551711 from 47aaa4bfac to 25Q1-release
Change-Id: I36fcbc26505898d1aae85dac0b2afd5393456527
2024-10-24 23:03:12 +00:00
kellyhung
47aaa4bfac Add a soong config variable for CitadelProvision
Bug: 373235487
Test: Presubmits
Flag: EXEMPT bugfix
Change-Id: I3033873be99890a1229861c3ed767480de9fa033
2024-10-24 12:34:13 +00:00
Richard Chang
838d1086c9 gs101: MCP: Set the vendor customized max cached processes to 1024.
Bug: 374891496
Test: adb shell dumpsys activity | grep CUR_MAX_CACHED_PROCESSES
Flag: EXEMPT config XML change
Change-Id: I072c8de8bc78ac6888cb6bbf0344678ac03de3a9
2024-10-23 04:10:41 +00:00
Ethan Chen
30885811ec
Disable userdebug diagnostics
* We can't make use of most of the debug features on userdebug builds.

Change-Id: I31df2090b31243b742c4e82dc08cd8491dada54f
2024-10-20 05:01:11 +03:00
basamaryan
1e568cb3ba
gs101: Drop unnecessary BOARD_USERDATAIMAGE_FILE_SYSTEM_TYPE flag
Change-Id: Ibb96c529ac64239d7bb919e46f5a625a6deebf98
2024-10-20 05:01:11 +03:00
Michael Bestas
1a406939d0
gs101: overlay: Disable Wi-Fi verbose logging by default
Change-Id: Iafe9f4b83d157906ca6b9114db52ab27b1a01878
2024-10-20 05:01:11 +03:00
Michael Bestas
83c2fccfd1
gs101: overlay: Enable battery cycle count
Change-Id: I92bc8363e1c9e2ad54c29a0a30dce992e25f697d
2024-10-20 05:01:11 +03:00
Michael Bestas
7c3c38d5fe
Add lineage.dependencies
Change-Id: I69ea95e240cca3f3b700ae68a4853e5a4d4fd5bc
2024-10-20 05:01:10 +03:00
Michael Bestas
07d9b27865
gs101: Inherit common partition reserved sizes
Change-Id: I444ce2fcd37cdfa58d83a7e872dc547fb05a2a89
2024-10-20 05:01:10 +03:00
Rashed Abdel-Tawab
6eab34d3ec
gs101: Build a disabled vbmeta image
Co-authored-by: Nolen Johnson <johnsonnolen@gmail.com>
Change-Id: Ie8f1e0929b037b35b5e45c2e31be9253fa0bb097
2024-10-20 05:01:10 +03:00
Neel Chauhan
899e4a029b
Revert "Enable compressed snapshots/VABc."
Virtual AB compression prevents GApps from being installed to
raviole/bluejay.

This reverts commit 2bfa6d3ba0.

Change-Id: I119b8e042e4cdeec27a19ab5dd4f0666cc115ae1
2024-10-20 05:01:10 +03:00
Michael Bestas
708353ecbe
Label vendor.dolby.media.c2@1.0-service
Change-Id: I89fb4c149aed94cf2f7c3d34f7fde5877175b1e2
2024-10-20 05:01:10 +03:00
Michael Bestas
9755c57d0a
Include missing vendor sepolicy
Change-Id: Id35fb4b22e2ee8dfafdfb8ae601ab823435d2b94
2024-10-20 05:01:10 +03:00
Danny Lin
4ede65e7df
Update seapp certificates to match stock presigned apps
Certificates extracted from stock vendor_mac_permissions.xml using
adevtool: https://github.com/kdrag0n/adevtool

Change-Id: Iaf59f1548905d16fe7ad231c039ba43941c15710
2024-10-20 05:01:10 +03:00
ReallySnow
89d909aec9
Add AiAi allowlist
* In Android 12, Android System Intelligence (com.google.android.as) uses
  some of the Private Compute Service (com.google.android.as.oss) services.
  The absence of these Allowlists will cause Android System Intelligence
  to fail to connect to the network and cause collapse.
* We don't need to extract google.xml to fix it, just extract the AiAi part

Change-Id: I446ae5d243cff134901094f82c90a0bbf3bb4381
2024-10-20 05:01:10 +03:00
Danny Lin
f694f31cda
overlay: Import AiAi configs
Extracted from stock raven AP3A.241005.015

Co-authored-by: Alessandro Astone <ales.astone@gmail.com>
Co-authored-by: Michael Bestas <mkbestas@lineageos.org>
Change-Id: I78bd7d04cbd0b35f6a8c01df3a8c1013d99bbf42
2024-10-20 05:00:59 +03:00
razorloves
288e89f5cc
overlay: Hide user facing crash dialog for EUICC app
The GoogleParts app disables the EUICC app when there's no GMS, but it
doesn't happen quick enough. The crash dialog pops up a few times right
after initial boot up. There's no need to alarm the user, so hide it.

Change-Id: Ia06b336b30a8886bae522c6e8a76a1ca15da5edd
2024-10-20 04:48:56 +03:00
Peter Cai
1e56ae9f1c
Disable Euicc when GMS and GSF are not installed
* This avoids EuiccGoogle / GoogleCarrierServices crashing, taking the
  whole telephony stack with them when no GMS or GSF is installed.
* Compared to change 274251, this approach is no-op when GAPPS add-on is
  flashed before the first boot, and thus should not cause issues with
  eSIM when GAPPS is flashed.
* With microG, this also works after installing the microG GMS & GSF
  packages and rebooting, although manual activation of the eSIM is
  needed via Settings - Network.
* The only downside is that users will still see one or two crashes
  during the first boot because our application only starts after the
  device is booted.

Change-Id: I4a11c93e855978abbf8d84fdbe4ffc8b2aedc27c
2024-10-20 04:48:56 +03:00
Michael Bestas
9e6928be12
Include missing ConnectivityThermalPowerManager sepolicy
Change-Id: I1e0f05159a6797251ed85360966aa45246005bbd
2024-10-20 04:48:56 +03:00
Danny Lin
09ef3ecd9c
overlay: Allow ConnectivityThermalPowerManager to request thermal mitigation
ConnectivityThermalPowerManager mainly exists to manage thermal
mitigation.

Change-Id: I7d1ad7cb45a24697e444ac1f85ccfb507cb1ce49
2024-10-20 04:48:55 +03:00
Danny Lin
78b501c9b3
overlay: Configure ConnectivityThermalPowerManager
Extracted from stock raven AP3A.241005.015

Change-Id: I71ad5adf9bf64bb1e30354446220d5769a9d44ca
2024-10-20 04:48:24 +03:00
Android Build Coastguard Worker
61ee8a8e9b Snap for 12524026 from 541b51e17b to 25Q1-release
Change-Id: Ic8cbc3207e6139ad0a588d8acec567aa58ec73d3
2024-10-19 01:08:10 +00:00
Thiébaud Weksteen
541b51e17b Merge "Remove duplicate service entries" into main 2024-10-18 00:56:10 +00:00
Android Build Coastguard Worker
51b393cdaa Snap for 12508860 from 172a703bbf to 25Q1-release
Change-Id: I4351bdcb70df18eae017e08e18df53ce872a08e5
2024-10-16 23:02:57 +00:00
Android Build Coastguard Worker
e24463e49c Snap for 12508860 from b2af325920 to 25Q1-release
Change-Id: I4848454b7097eb42d7791bdbeff2c6cd9d159a2f
2024-10-16 23:02:56 +00:00
Treehugger Robot
172a703bbf Merge "Remove cgroup_desc_file bugs." into main 2024-10-16 11:02:04 +00:00
Robert Luo
b2af325920 [Pixel RR] Apply reviewed default permissions
Pregrantting below permission(s):
CALL_PHONE

Flag: EXEMPT add pregranted permission in b/371912006
Bug: 336203918
Test: presubmit
Change-Id: I5804b3d3289519f19ca9acb232ecc0a715ad00a5
2024-10-16 08:42:30 +00:00
Android Build Coastguard Worker
a255f26ca3 Merge cherrypicks of ['googleplex-android-review.googlesource.com/29699292'] into 24Q4-release.
Change-Id: If0bed40e379de3c888b5bf9c6c0e84547c25491f
2024-10-15 23:38:17 +00:00
samou
bc766489dc sepolicy: allow dumpstate to execute dump_power
10-04 19:36:47.308  7141  7141 I android.hardwar: type=1400 audit(0.0:6974): avc:  denied  { execute_no_trans } for  path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6975): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6976): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6977): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6978): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6979): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6980): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336  7141  7141 I dump_power: type=1400 audit(0.0:6981): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:29): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:30): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:31): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:32): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:33): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc:  denied  { open } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc:  denied  { getattr } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc:  denied  { search } for  name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc:  denied  { read } for  name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc:  denied  { read } for  name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc:  denied  { open } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6191): avc:  denied  { search } for  name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6192): avc:  denied  { read } for  name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6193): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6194): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6195): avc:  denied  { search } for  name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6196): avc:  denied  { read } for  name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6197): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6198): avc:  denied  { read } for  name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:875): avc:  denied  { read } for  name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:876): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:877): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:878): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:879): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:880): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:881): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:882): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:883): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:884): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:885): avc:  denied  { open } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1

Flag: EXEMPT refactor
Bug: 364989823
Signed-off-by: samou <samou@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e746382d7834745023401c638e5367ed2b48a163)
Merged-In: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
Change-Id: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
2024-10-15 23:37:11 +00:00
Android Build Coastguard Worker
6de62fe57f Snap for 12502765 from 60ef8d6949 to 25Q1-release
Change-Id: I2be3194076ac3132981cc88958f515345c1b7e5b
2024-10-15 23:03:34 +00:00
Krzysztof Kosiński
c8f947bea6 Remove cgroup_desc_file bugs.
These denials were caused by b/372273614. The culprit CL
has been reverted and the denials do not reproduce on HEAD.

Fix: 372347927
Test: presubmit
Flag: EXEMPT sepolicy bug map update
Change-Id: Ic83101b2b64a96f7e37349f30a902789f05bb26e
2024-10-15 06:26:15 +00:00
Android Build Coastguard Worker
b21028adc8 Snap for 12496712 from 34b85728f7 to 25Q1-release
Change-Id: I9fc687eba858f5e2ab09f1147af57f32afefc410
2024-10-14 23:03:16 +00:00
Eileen Lai
34b85728f7 Merge "modem_svc: use shared_modem_platform to replace all modem_svc_sit" into main 2024-10-14 07:27:51 +00:00
Robin Hsu
60ef8d6949 gs101: Disable kmem cgroup accounting
Disable cgroup kernel memory accounting to avoid unnecessary overhead

similar change ag/22891292 but now back-port to gs101

Flag: NONE kernel config
Bug: 373232814
Test: pts-tradefed run commandAndExit pts -m PtsPerfWbsTestCases
      -t com.google.android.perfwbs.pts.KernelModuleTest
      and alternative tests on forrest.
Change-Id: I4ab5d20a2d74c023c6fca26b32c8acc67fcd2582
Signed-off-by: Robin Hsu <robinhsu@google.com>
2024-10-14 03:00:11 +00:00
Android Build Coastguard Worker
aaebcc961e Snap for 12477291 from d338373cfd to 25Q1-release
Change-Id: I93f2b08a3606051b9c93c0909b4deb060c5a65f5
2024-10-09 21:02:47 +00:00
Android Build Coastguard Worker
c846b82faf Snap for 12477291 from 7ed8a55835 to 25Q1-release
Change-Id: Ie5374bb870801242e06d6458fdf870d9a09692ed
2024-10-09 21:02:46 +00:00
Eileen Lai
af68091abc modem_svc: use shared_modem_platform to replace all modem_svc_sit
Bug: 368257019

Flag: NONE local testing only
Change-Id: I657afb4a6271865d62f63c67d3096714e525a689
2024-10-09 08:25:55 +00:00
Kuen-Han Tsai
7ed8a55835 Usb: Add status check to prevent NPE
This patch prevents a Null Pointer Exception in
queryMoistureDetectionStatus() when getPortStatusHelper() fails to open
the /sys/class/typec file. The failure results in an empty
currentPortStatus vector, causing the NPE when accessing its first
element.

Bug: 361097811
Flag: EXEMPT bugfix
Test: NPE does not occur when getPortStatusHelper() fails
Change-Id: Id6886283d6f2f9179b3a9c5d535646874e9f277b
Signed-off-by: Kuen-Han Tsai <khtsai@google.com>
2024-10-09 15:14:38 +08:00
Nina Chen
d338373cfd Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 372347927
Bug: 372348503
Bug: 372348558
Test: scanBugreport
Bug: 369735133
Bug: 372348545
Test: scanAvcDeniedLogRightAfterReboot
Bug: 372348067
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I578b04408d24c8a32079728673ea3b7af5fe0b3b
2024-10-09 03:24:17 +00:00
Android Build Coastguard Worker
92e46364bb Snap for 12470893 from a5766d4202 to 25Q1-release
Change-Id: Ibf75765d3e9fb0ba9512f28e3893d0efeb45f2b4
2024-10-08 23:03:21 +00:00
Nina Chen
a5766d4202 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 372122654
Test: scanBugreport
Bug: 369735133
Test: scanAvcDeniedLogRightAfterReboot
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I9ca82172decbb61a4582aab33d498e67ff048e12
2024-10-08 03:30:57 +00:00
Android Build Coastguard Worker
fd109f2eb0 Snap for 12465365 from e746382d78 to 25Q1-release
Change-Id: If76f1fd0d128612a0aee056c00131f3466643b80
2024-10-07 23:03:11 +00:00
Android Build Coastguard Worker
8b89c99246 Snap for 12465365 from e471d73857 to 25Q1-release
Change-Id: Id914eb19caa46c5790b0f107078f829ad0571089
2024-10-07 23:03:10 +00:00
Android Build Coastguard Worker
d1c30b33c7 Snap for 12462067 from e746382d78 to mainline-tzdata6-release
Change-Id: Ibd5996e81a6fd85ba472ae955584a5b4a3f749b0
2024-10-07 08:57:13 +00:00
Android Build Coastguard Worker
ea81bedd27 Snap for 12462067 from 164d01e0d4 to mainline-tzdata6-release
Change-Id: I1a814b828a625384372c952869a557f50ba1395e
2024-10-07 08:57:09 +00:00