Android Build Coastguard Worker
57d93abcf2
Snap for 12573674 from 78464c33d1
to 25Q1-release
...
Change-Id: I8d5fc45b82bcdcf995f2d522245ada06ca6db033
2024-10-29 23:03:55 +00:00
Bill Yang
4d9237bf48
Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong
...
Set the full module path of libacryl_hdr_plugin and the include dir for
lobacryl conversion to soong. It will take effect after aosp/3286932 and
aosp/3287183 merged.
Bug: 370414334
Test: lunch aosp_riole-trunk_staging-userdebug ; m libacryl_hdr_plugin libacryl
Change-Id: I67339b5420d523d9a61e0457d77a1412ae6b3582
2024-10-30 00:47:02 +02:00
Bill Yang
78464c33d1
Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong am: ce576fa1be
am: 528e9aeb31
...
Original change: https://android-review.googlesource.com/c/device/google/gs101/+/3287269
Change-Id: I2c458175aa452feb012b2af94e8f4a108dfabe91
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-29 03:12:00 +00:00
Bill Yang
528e9aeb31
Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong am: ce576fa1be
...
Original change: https://android-review.googlesource.com/c/device/google/gs101/+/3287269
Change-Id: Iea03fb4b0569ced31e68a6109dfdcfa172e033c5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-10-29 02:50:15 +00:00
Bill Yang
ce576fa1be
Set BOARD_LIBACRYL_G2D_HDR_PLUGIN for soong
...
Set the full module path of libacryl_hdr_plugin and the include dir for
lobacryl conversion to soong. It will take effect after aosp/3286932 and
aosp/3287183 merged.
Bug: 370414334
Test: lunch aosp_riole-trunk_staging-userdebug ; m libacryl_hdr_plugin libacryl
Change-Id: I67339b5420d523d9a61e0457d77a1412ae6b3582
2024-10-25 03:36:29 +00:00
Android Build Coastguard Worker
ad8d84c72e
Snap for 12551711 from 47aaa4bfac
to 25Q1-release
...
Change-Id: I36fcbc26505898d1aae85dac0b2afd5393456527
2024-10-24 23:03:12 +00:00
kellyhung
47aaa4bfac
Add a soong config variable for CitadelProvision
...
Bug: 373235487
Test: Presubmits
Flag: EXEMPT bugfix
Change-Id: I3033873be99890a1229861c3ed767480de9fa033
2024-10-24 12:34:13 +00:00
Richard Chang
838d1086c9
gs101: MCP: Set the vendor customized max cached processes to 1024.
...
Bug: 374891496
Test: adb shell dumpsys activity | grep CUR_MAX_CACHED_PROCESSES
Flag: EXEMPT config XML change
Change-Id: I072c8de8bc78ac6888cb6bbf0344678ac03de3a9
2024-10-23 04:10:41 +00:00
Ethan Chen
30885811ec
Disable userdebug diagnostics
...
* We can't make use of most of the debug features on userdebug builds.
Change-Id: I31df2090b31243b742c4e82dc08cd8491dada54f
2024-10-20 05:01:11 +03:00
basamaryan
1e568cb3ba
gs101: Drop unnecessary BOARD_USERDATAIMAGE_FILE_SYSTEM_TYPE flag
...
Change-Id: Ibb96c529ac64239d7bb919e46f5a625a6deebf98
2024-10-20 05:01:11 +03:00
Michael Bestas
1a406939d0
gs101: overlay: Disable Wi-Fi verbose logging by default
...
Change-Id: Iafe9f4b83d157906ca6b9114db52ab27b1a01878
2024-10-20 05:01:11 +03:00
Michael Bestas
83c2fccfd1
gs101: overlay: Enable battery cycle count
...
Change-Id: I92bc8363e1c9e2ad54c29a0a30dce992e25f697d
2024-10-20 05:01:11 +03:00
Michael Bestas
7c3c38d5fe
Add lineage.dependencies
...
Change-Id: I69ea95e240cca3f3b700ae68a4853e5a4d4fd5bc
2024-10-20 05:01:10 +03:00
Michael Bestas
07d9b27865
gs101: Inherit common partition reserved sizes
...
Change-Id: I444ce2fcd37cdfa58d83a7e872dc547fb05a2a89
2024-10-20 05:01:10 +03:00
Rashed Abdel-Tawab
6eab34d3ec
gs101: Build a disabled vbmeta image
...
Co-authored-by: Nolen Johnson <johnsonnolen@gmail.com>
Change-Id: Ie8f1e0929b037b35b5e45c2e31be9253fa0bb097
2024-10-20 05:01:10 +03:00
Neel Chauhan
899e4a029b
Revert "Enable compressed snapshots/VABc."
...
Virtual AB compression prevents GApps from being installed to
raviole/bluejay.
This reverts commit 2bfa6d3ba0
.
Change-Id: I119b8e042e4cdeec27a19ab5dd4f0666cc115ae1
2024-10-20 05:01:10 +03:00
Michael Bestas
708353ecbe
Label vendor.dolby.media.c2@1.0-service
...
Change-Id: I89fb4c149aed94cf2f7c3d34f7fde5877175b1e2
2024-10-20 05:01:10 +03:00
Michael Bestas
9755c57d0a
Include missing vendor sepolicy
...
Change-Id: Id35fb4b22e2ee8dfafdfb8ae601ab823435d2b94
2024-10-20 05:01:10 +03:00
Danny Lin
4ede65e7df
Update seapp certificates to match stock presigned apps
...
Certificates extracted from stock vendor_mac_permissions.xml using
adevtool: https://github.com/kdrag0n/adevtool
Change-Id: Iaf59f1548905d16fe7ad231c039ba43941c15710
2024-10-20 05:01:10 +03:00
ReallySnow
89d909aec9
Add AiAi allowlist
...
* In Android 12, Android System Intelligence (com.google.android.as) uses
some of the Private Compute Service (com.google.android.as.oss) services.
The absence of these Allowlists will cause Android System Intelligence
to fail to connect to the network and cause collapse.
* We don't need to extract google.xml to fix it, just extract the AiAi part
Change-Id: I446ae5d243cff134901094f82c90a0bbf3bb4381
2024-10-20 05:01:10 +03:00
Danny Lin
f694f31cda
overlay: Import AiAi configs
...
Extracted from stock raven AP3A.241005.015
Co-authored-by: Alessandro Astone <ales.astone@gmail.com>
Co-authored-by: Michael Bestas <mkbestas@lineageos.org>
Change-Id: I78bd7d04cbd0b35f6a8c01df3a8c1013d99bbf42
2024-10-20 05:00:59 +03:00
razorloves
288e89f5cc
overlay: Hide user facing crash dialog for EUICC app
...
The GoogleParts app disables the EUICC app when there's no GMS, but it
doesn't happen quick enough. The crash dialog pops up a few times right
after initial boot up. There's no need to alarm the user, so hide it.
Change-Id: Ia06b336b30a8886bae522c6e8a76a1ca15da5edd
2024-10-20 04:48:56 +03:00
Peter Cai
1e56ae9f1c
Disable Euicc when GMS and GSF are not installed
...
* This avoids EuiccGoogle / GoogleCarrierServices crashing, taking the
whole telephony stack with them when no GMS or GSF is installed.
* Compared to change 274251, this approach is no-op when GAPPS add-on is
flashed before the first boot, and thus should not cause issues with
eSIM when GAPPS is flashed.
* With microG, this also works after installing the microG GMS & GSF
packages and rebooting, although manual activation of the eSIM is
needed via Settings - Network.
* The only downside is that users will still see one or two crashes
during the first boot because our application only starts after the
device is booted.
Change-Id: I4a11c93e855978abbf8d84fdbe4ffc8b2aedc27c
2024-10-20 04:48:56 +03:00
Michael Bestas
9e6928be12
Include missing ConnectivityThermalPowerManager sepolicy
...
Change-Id: I1e0f05159a6797251ed85360966aa45246005bbd
2024-10-20 04:48:56 +03:00
Danny Lin
09ef3ecd9c
overlay: Allow ConnectivityThermalPowerManager to request thermal mitigation
...
ConnectivityThermalPowerManager mainly exists to manage thermal
mitigation.
Change-Id: I7d1ad7cb45a24697e444ac1f85ccfb507cb1ce49
2024-10-20 04:48:55 +03:00
Danny Lin
78b501c9b3
overlay: Configure ConnectivityThermalPowerManager
...
Extracted from stock raven AP3A.241005.015
Change-Id: I71ad5adf9bf64bb1e30354446220d5769a9d44ca
2024-10-20 04:48:24 +03:00
Android Build Coastguard Worker
61ee8a8e9b
Snap for 12524026 from 541b51e17b
to 25Q1-release
...
Change-Id: Ic8cbc3207e6139ad0a588d8acec567aa58ec73d3
2024-10-19 01:08:10 +00:00
Thiébaud Weksteen
541b51e17b
Merge "Remove duplicate service entries" into main
2024-10-18 00:56:10 +00:00
Android Build Coastguard Worker
51b393cdaa
Snap for 12508860 from 172a703bbf
to 25Q1-release
...
Change-Id: I4351bdcb70df18eae017e08e18df53ce872a08e5
2024-10-16 23:02:57 +00:00
Android Build Coastguard Worker
e24463e49c
Snap for 12508860 from b2af325920
to 25Q1-release
...
Change-Id: I4848454b7097eb42d7791bdbeff2c6cd9d159a2f
2024-10-16 23:02:56 +00:00
Treehugger Robot
172a703bbf
Merge "Remove cgroup_desc_file bugs." into main
2024-10-16 11:02:04 +00:00
Robert Luo
b2af325920
[Pixel RR] Apply reviewed default permissions
...
Pregrantting below permission(s):
CALL_PHONE
Flag: EXEMPT add pregranted permission in b/371912006
Bug: 336203918
Test: presubmit
Change-Id: I5804b3d3289519f19ca9acb232ecc0a715ad00a5
2024-10-16 08:42:30 +00:00
Android Build Coastguard Worker
a255f26ca3
Merge cherrypicks of ['googleplex-android-review.googlesource.com/29699292'] into 24Q4-release.
...
Change-Id: If0bed40e379de3c888b5bf9c6c0e84547c25491f
2024-10-15 23:38:17 +00:00
samou
bc766489dc
sepolicy: allow dumpstate to execute dump_power
...
10-04 19:36:47.308 7141 7141 I android.hardwar: type=1400 audit(0.0:6974): avc: denied { execute_no_trans } for path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6975): avc: denied { read } for name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6976): avc: denied { open } for path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6977): avc: denied { search } for name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6978): avc: denied { read } for name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6979): avc: denied { open } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6980): avc: denied { getattr } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336 7141 7141 I dump_power: type=1400 audit(0.0:6981): avc: denied { read } for name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc: denied { read } for name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc: denied { read } for name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc: denied { read } for name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc: denied { read } for name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc: denied { read } for name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc: denied { read } for name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:29): avc: denied { search } for name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:30): avc: denied { search } for name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:31): avc: denied { search } for name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:32): avc: denied { search } for name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:33): avc: denied { search } for name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc: denied { search } for name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc: denied { read } for name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc: denied { getattr } for path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc: denied { search } for name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc: denied { read } for name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc: denied { read } for name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc: denied { open } for path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6191): avc: denied { search } for name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6192): avc: denied { read } for name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6193): avc: denied { open } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6194): avc: denied { getattr } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6195): avc: denied { search } for name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6196): avc: denied { read } for name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6197): avc: denied { open } for path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6198): avc: denied { read } for name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616 6976 6976 I dump_power: type=1400 audit(0.0:875): avc: denied { read } for name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616 6976 6976 I dump_power: type=1400 audit(0.0:876): avc: denied { open } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616 6976 6976 I dump_power: type=1400 audit(0.0:877): avc: denied { getattr } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540 7085 7085 I dump_power: type=1400 audit(0.0:878): avc: denied { read } for name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540 7085 7085 I dump_power: type=1400 audit(0.0:879): avc: denied { open } for path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540 7085 7085 I dump_power: type=1400 audit(0.0:880): avc: denied { search } for name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:881): avc: denied { read } for name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:882): avc: denied { open } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:883): avc: denied { getattr } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:884): avc: denied { read } for name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:885): avc: denied { open } for path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
Flag: EXEMPT refactor
Bug: 364989823
Signed-off-by: samou <samou@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e746382d7834745023401c638e5367ed2b48a163 )
Merged-In: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
Change-Id: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
2024-10-15 23:37:11 +00:00
Android Build Coastguard Worker
6de62fe57f
Snap for 12502765 from 60ef8d6949
to 25Q1-release
...
Change-Id: I2be3194076ac3132981cc88958f515345c1b7e5b
2024-10-15 23:03:34 +00:00
Krzysztof Kosiński
c8f947bea6
Remove cgroup_desc_file bugs.
...
These denials were caused by b/372273614. The culprit CL
has been reverted and the denials do not reproduce on HEAD.
Fix: 372347927
Test: presubmit
Flag: EXEMPT sepolicy bug map update
Change-Id: Ic83101b2b64a96f7e37349f30a902789f05bb26e
2024-10-15 06:26:15 +00:00
Android Build Coastguard Worker
b21028adc8
Snap for 12496712 from 34b85728f7
to 25Q1-release
...
Change-Id: I9fc687eba858f5e2ab09f1147af57f32afefc410
2024-10-14 23:03:16 +00:00
Eileen Lai
34b85728f7
Merge "modem_svc: use shared_modem_platform to replace all modem_svc_sit" into main
2024-10-14 07:27:51 +00:00
Robin Hsu
60ef8d6949
gs101: Disable kmem cgroup accounting
...
Disable cgroup kernel memory accounting to avoid unnecessary overhead
similar change ag/22891292 but now back-port to gs101
Flag: NONE kernel config
Bug: 373232814
Test: pts-tradefed run commandAndExit pts -m PtsPerfWbsTestCases
-t com.google.android.perfwbs.pts.KernelModuleTest
and alternative tests on forrest.
Change-Id: I4ab5d20a2d74c023c6fca26b32c8acc67fcd2582
Signed-off-by: Robin Hsu <robinhsu@google.com>
2024-10-14 03:00:11 +00:00
Android Build Coastguard Worker
aaebcc961e
Snap for 12477291 from d338373cfd
to 25Q1-release
...
Change-Id: I93f2b08a3606051b9c93c0909b4deb060c5a65f5
2024-10-09 21:02:47 +00:00
Android Build Coastguard Worker
c846b82faf
Snap for 12477291 from 7ed8a55835
to 25Q1-release
...
Change-Id: Ie5374bb870801242e06d6458fdf870d9a09692ed
2024-10-09 21:02:46 +00:00
Eileen Lai
af68091abc
modem_svc: use shared_modem_platform to replace all modem_svc_sit
...
Bug: 368257019
Flag: NONE local testing only
Change-Id: I657afb4a6271865d62f63c67d3096714e525a689
2024-10-09 08:25:55 +00:00
Kuen-Han Tsai
7ed8a55835
Usb: Add status check to prevent NPE
...
This patch prevents a Null Pointer Exception in
queryMoistureDetectionStatus() when getPortStatusHelper() fails to open
the /sys/class/typec file. The failure results in an empty
currentPortStatus vector, causing the NPE when accessing its first
element.
Bug: 361097811
Flag: EXEMPT bugfix
Test: NPE does not occur when getPortStatusHelper() fails
Change-Id: Id6886283d6f2f9179b3a9c5d535646874e9f277b
Signed-off-by: Kuen-Han Tsai <khtsai@google.com>
2024-10-09 15:14:38 +08:00
Nina Chen
d338373cfd
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 372347927
Bug: 372348503
Bug: 372348558
Test: scanBugreport
Bug: 369735133
Bug: 372348545
Test: scanAvcDeniedLogRightAfterReboot
Bug: 372348067
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I578b04408d24c8a32079728673ea3b7af5fe0b3b
2024-10-09 03:24:17 +00:00
Android Build Coastguard Worker
92e46364bb
Snap for 12470893 from a5766d4202
to 25Q1-release
...
Change-Id: Ibf75765d3e9fb0ba9512f28e3893d0efeb45f2b4
2024-10-08 23:03:21 +00:00
Nina Chen
a5766d4202
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 372122654
Test: scanBugreport
Bug: 369735133
Test: scanAvcDeniedLogRightAfterReboot
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I9ca82172decbb61a4582aab33d498e67ff048e12
2024-10-08 03:30:57 +00:00
Android Build Coastguard Worker
fd109f2eb0
Snap for 12465365 from e746382d78
to 25Q1-release
...
Change-Id: If76f1fd0d128612a0aee056c00131f3466643b80
2024-10-07 23:03:11 +00:00
Android Build Coastguard Worker
8b89c99246
Snap for 12465365 from e471d73857
to 25Q1-release
...
Change-Id: Id914eb19caa46c5790b0f107078f829ad0571089
2024-10-07 23:03:10 +00:00
Android Build Coastguard Worker
d1c30b33c7
Snap for 12462067 from e746382d78
to mainline-tzdata6-release
...
Change-Id: Ibd5996e81a6fd85ba472ae955584a5b4a3f749b0
2024-10-07 08:57:13 +00:00
Android Build Coastguard Worker
ea81bedd27
Snap for 12462067 from 164d01e0d4
to mainline-tzdata6-release
...
Change-Id: I1a814b828a625384372c952869a557f50ba1395e
2024-10-07 08:57:09 +00:00