Commit graph

11223 commits

Author SHA1 Message Date
Rick Yiu
e8d7fb7f88 gs101: Change LogFailures to string
To match the definition of proto file.

Bug: 184715843
Test: function works
Change-Id: I8d6106bdc6978edb292e1f3ef0237469a77fe902
2021-04-10 04:19:36 +00:00
Jaegeuk Kim
52599b6dcb gs101: set readahead_size_kb=128 to system and data am: 3bc597748b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14084126

Change-Id: I98275969d5311011200bc985c87a41924f7d7b38
2021-04-09 18:32:38 +00:00
Jaegeuk Kim
3bc597748b gs101: set readahead_size_kb=128 to system and data
This can avoid memory pressure.

Bug: 181567573
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
Change-Id: I654c4d3bf24fa741c3fb0255431a26d8dcf5f153
2021-04-09 17:45:42 +00:00
millerliang
b67548e8cf Fix avc denied in MMAP audio exclusive mode am: b4bab832f9
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14063265

Change-Id: Ib5a43be93cfcff6ec0a4f2a6e10db267f7c2047c
2021-04-09 14:36:47 +00:00
millerliang
981578740c audio: set the permission for dma heap am: 1868e419d5
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14031649

Change-Id: Id13ad581cf5c0e21e24c761ac21d91c4d0b682d4
2021-04-09 14:36:47 +00:00
millerliang
b4bab832f9 Fix avc denied in MMAP audio exclusive mode
04-01 15:26:30.936 16390 16390 I auditd  : type=1400 audit(0.0:55): avc:
denied { read } for comm="HwBinder:16390_" name="aaudio_playback_heap"
dev="tmpfs" ino=400 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=1

Bug: 165737390
Test: Build and use OboeTester to run MMAP audio
Change-Id: I22201dfd4a3f579b52d4cfbc86fc6148dc481cb0
2021-04-09 20:43:54 +08:00
millerliang
1868e419d5 audio: set the permission for dma heap
Set the permission for the two dma heap.
They are used for mmap audio in exclusive mode.
 /dev/dma_heap/aaudio_playback_heap
 /dev/dma_heap/aaudio_capture_heap

Bug: 165737390
Test: make
Change-Id: Ie8d35d59fb3bde10915dd0e0746852849acbad8c
2021-04-09 20:43:11 +08:00
samou
e694ba3c3c powerstats: Fill in P21 GPU power profile number am: 9db455e69d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14031652

Change-Id: Icfa0aaada99de87ebcfe57ac654849b61ce94205
2021-04-09 10:58:23 +00:00
Jack Nudelman
97f101493c [automerger skipped] Update CbrsNetworkMonitor package name. am: e36b41e17f -s ours
am skip reason: skip tag Change-Id I474401de47892c97c3fcf4a5471773cd0474e1ef with SHA-1 f960fc6c46 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14135245

Change-Id: Icd150c9cc9a8fd00d40ce108c3cc7639a5d0bedd
2021-04-09 10:58:07 +00:00
Shinru Han
ef9fb8c905 gps: remove lhd log in on-chip PVT mode am: 188be4a5e3
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14111135

Change-Id: I68f92d074899e537860ef2e83240b57c9ce98349
2021-04-09 10:58:01 +00:00
Tsung-Mao Fang
209ce14790 [automerger skipped] Have a consistent permission configuration with other devices am: 7dd7ceba38 -s ours
am skip reason: skipped by user tmfang

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14123765

Change-Id: I9586124193ad54b1e089497bc2a71ad788464368
2021-04-09 10:57:56 +00:00
Jenny Ho
b94e7586ce Fix avc denied for maxfg_base/flip and wireless dump
Bug: 184780667
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: Ice4102cf541dc80c85beb05ad5c523a4306a77bc
2021-04-09 18:24:32 +08:00
samou
9db455e69d powerstats: Fill in P21 GPU power profile number
Bug: 184042446
Change-Id: Ifbc00ed0a9de98f65e7f0c4b1981e45f0b1887ba
2021-04-09 10:13:01 +00:00
andychou
b370d9d2c3 Remove sepolicy of Wirecutter
Bug: 184886787
Test: build pass
Change-Id: Ibe539d31dc70cc4ea478f074ef4bf75d918bcb67
2021-04-09 17:06:51 +08:00
Ocean Chen
57f56b76c6 pixelstats: start service on boot completed
Sometims the init needs to take more time to
change the compr_saved_block and compr_new_inode
from root:root to system:system

Otherwise, pixelstats cannot write these two sysnode

Bug: 173399386
Test: pixel/022
Signed-off-by: Ocean Chen <oceanchen@google.com>
Change-Id: I35625b94540baf637db07db3147839a79536378c
2021-04-09 08:18:58 +00:00
TreeHugger Robot
95d168126d Merge "Fix avc denied for Silent Logging" into sc-dev am: 60a2a6c09b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14103373

Change-Id: I77f2d19f407e8b0e0bcda835885b50218da6ad1c
2021-04-09 06:53:47 +00:00
TreeHugger Robot
60a2a6c09b Merge "Fix avc denied for Silent Logging" into sc-dev 2021-04-09 06:20:41 +00:00
TreeHugger Robot
70ba745b79 Merge "cbd: Grant to access slog file" into sc-dev am: 5c9b9d882f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14119811

Change-Id: Ia792e85b0627e4134db6dc784bc3d3c7e3831ae3
2021-04-09 05:54:29 +00:00
TreeHugger Robot
5c9b9d882f Merge "cbd: Grant to access slog file" into sc-dev 2021-04-09 05:15:34 +00:00
Jack Nudelman
e36b41e17f Update CbrsNetworkMonitor package name.
Bug: 184313658
Test: make
Change-Id: I474401de47892c97c3fcf4a5471773cd0474e1ef
Merged-In: I474401de47892c97c3fcf4a5471773cd0474e1ef
2021-04-09 04:52:33 +00:00
Aaron Tsai
06b410dc4a Fix avc denied for Silent Logging
04-06 15:18:31.513  root     1     1 E init    : Do not have permissions to set 'persist.vendor.sys.silentlog.tcp' to 'On' in property file '/vendor/build.prop': SELinux permission check failed
04-06 15:20:17.988  root     1     1 W /system/bin/init: type=1107 audit(0.0:33): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog.ap pid=8917 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'
04-06 15:20:23.256  root     1     1 W /system/bin/init: type=1107 audit(0.0:38): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog.cp pid=9025 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'
04-06 15:20:51.340  root     1     1 W /system/bin/init: type=1107 audit(0.0:43): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog pid=9291 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'
04-06 15:21:03.608  root     1     1 W /system/bin/init: type=1107 audit(0.0:54): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog.tcp pid=9473 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'

04-06 20:17:08.060  1000  5754  5754 W Thread-3: type=1400 audit(0.0:21): avc: denied { write } for name="slog" dev="dm-7" ino=245 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=0
04-06 20:17:09.194  1000   398   398 E SELinux : avc:  denied  { find } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 pid=5754 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=0
04-06 21:07:18.376  7458  7458 I auditd  : type=1400 audit(0.0:20): avc: denied { call } for comm="y.silentlogging" scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:r:dmd:s0 tclass=binder permissive=0

04-06 21:16:53.200  8873  8873 W Thread-4: type=1400 audit(0.0:85): avc: denied { create } for name="NNEXT_PROFILE.nprf" scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0:c232,c259,c512,c768 tclass=file permissive=0


Bug: 184608648
Test: verified with the forrest ROM and error log gone
Change-Id: Id9cdf15478c751de92a9a84bcfdc8233d6e9d294
2021-04-09 04:33:13 +00:00
TreeHugger Robot
b415e72482 Merge "init: allow to set tcpdump property" into sc-dev am: 83d6ee82fb
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14124655

Change-Id: Ia3dd270c6ea9f90658f1657051c19a4732c4b38d
2021-04-09 04:30:36 +00:00
Shinru Han
188be4a5e3 gps: remove lhd log in on-chip PVT mode
bug: 183559343
Test: No lhd log in on-chip PVT mode
Change-Id: I4e46721650dd43e356555716150dc6dd1935ae04
2021-04-09 04:08:56 +00:00
TreeHugger Robot
83d6ee82fb Merge "init: allow to set tcpdump property" into sc-dev 2021-04-09 03:54:18 +00:00
Tsung-Mao Fang
7dd7ceba38 Have a consistent permission configuration with other devices
Change-Id: I346370bbc9e1fcddef7dc9c64a03954cddf97264
Test: Run presubmit
Fix: 184312606
(cherry picked from commit 967e140f534064ef6fbe01c7c65167a033c95ee7)
2021-04-09 03:34:38 +00:00
Speth Chang
7d74437b07 Merge "allow camera to connect stats service" into sc-dev am: 6c4d851d28
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14108661

Change-Id: I008cdb58623b13e644ad0f2d5e76261271b54dd8
2021-04-09 03:21:05 +00:00
SalmaxChang
6dd6d9872e cbd: Grant to access slog file
Bug: 184646743
Change-Id: I06ecfbc8b9276b3801725f0965b03b849eddbdfc
2021-04-09 03:11:25 +00:00
Speth Chang
6c4d851d28 Merge "allow camera to connect stats service" into sc-dev 2021-04-09 03:01:14 +00:00
TreeHugger Robot
8f541049bc Merge "Create sepolicy for the fingerprint GHBM sysprop" into sc-dev am: 4a3f3550f5
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14105112

Change-Id: I627caec9927f15bc7f88af0ab298ad876a01f169
2021-04-09 02:59:26 +00:00
jimsun
17f08b3cba gs101: fix grilservice context
The app is no longer signed with the platform key.

Bug: 162313924
Test: verify gril service function works normally
Change-Id: I9bf0494e65cafca9432665be199c30508d36417e
2021-04-09 02:48:30 +00:00
SalmaxChang
5feb916e47 init: allow to set tcpdump property
init: Unable to set property 'persist.vendor.tcpdump.log.alwayson' from uid:10273 gid:10273 pid:7074: SELinux permission check failed

Bug: 184411489

Change-Id: If449e0d883fa4cbf8dd5ac3a6a84d205e7ac1f31
2021-04-09 10:47:56 +08:00
Nick Sanders
d59ea41ac8 gs101-sepolicy: Allow platform_app to call uwb
This is to fix below avc denial:
  SELinux : avc: denied { find } for pid=10783 uid=10294 name=uwb
  scontext=u:r:platform_app:s0:c512,c768
  tcontext=u:object_r:uwb_service:s0 tclass=service_manager permissive=0

Bug: 184286788
Test: Run Qorvo app without failure
Change-Id: I9673a3eef3f0b0bedb50ef2a5c336d8bfe7620e7
2021-04-09 02:21:20 +00:00
TreeHugger Robot
4a3f3550f5 Merge "Create sepolicy for the fingerprint GHBM sysprop" into sc-dev 2021-04-09 02:11:57 +00:00
Ilya Matyukhin
b9e10feefb Create sepolicy for the fingerprint GHBM sysprop
Bug: 184761756
Bug: 183728349
Test: adb logcat | grep "avc: denied"
Change-Id: I5209bdf859e86a83ac3fa29ecf8bfd8d5b6d88ce
2021-04-08 23:21:22 +00:00
Jack Nudelman
4208bf3074 Update CbrsNetworkMonitor package name.
Bug: 184313658
Test: make
Change-Id: I474401de47892c97c3fcf4a5471773cd0474e1ef
2021-04-08 15:46:15 -07:00
TreeHugger Robot
5d9cf2c7ee Merge "Give hal_dumpstate_default read access to slog files" into sc-dev am: f15b8edbd1
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14127725

Change-Id: I523ad11883f342ac65d868a04cbb498d6cfb4609
2021-04-08 22:10:28 +00:00
TreeHugger Robot
f15b8edbd1 Merge "Give hal_dumpstate_default read access to slog files" into sc-dev 2021-04-08 21:40:31 +00:00
Eddie Tashjian
ce90dbfb57 Merge "Add TCP dump permissions." into sc-dev am: 5bbdd82a4e
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14119567

Change-Id: I7ca93885708d1ca028aa6addc56da126a0635a87
2021-04-08 18:38:47 +00:00
Eddie Tashjian
5bbdd82a4e Merge "Add TCP dump permissions." into sc-dev 2021-04-08 18:25:30 +00:00
Craig Dooley
784e50d1f1 Add the aoc persist folder am: 2762231fdf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14117035

Change-Id: I354ea117f57afa9bb1730193cee01438f07837db
2021-04-08 18:11:31 +00:00
Craig Dooley
cf558dbf33 Merge "Fix SELinux errors with aocd" into sc-dev am: cd888e847f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14105108

Change-Id: Ie4bbc58c3471209486cf380fb6f5ed209bda789c
2021-04-08 18:11:31 +00:00
Craig Dooley
cd888e847f Merge "Fix SELinux errors with aocd" into sc-dev 2021-04-08 17:27:56 +00:00
Craig Dooley
2762231fdf Add the aoc persist folder
Bug: 184173298
Change-Id: Ia66797e2220ef4ba728b2eb21e123b36566adf1c
2021-04-08 17:27:55 +00:00
Chris Fries
1d379dfbc9 Give hal_dumpstate_default read access to slog files
Bug: 184821900

Bugreports require access to "silent log" files.

cp      : type=1400 audit(0.0:20): avc: denied { getattr } for path="/data/vendor/radio/logs/always-on/sbuff_20210408191538.sdm" dev="dm-11" ino=9075 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=file permissive=0

Change-Id: Iacc4778d1242f304e9519180437ceb0f0e9d350d
2021-04-08 16:27:29 +00:00
Roger Wang
fed6658c2a Enable wakeup packet mask and marker config am: a0342c45ce
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/14124688

Change-Id: I5cacdd36f93461bc19564fdcebf21755338b223f
2021-04-08 15:48:57 +00:00
Cliff Wu
816fefcd34 Merge "[Bug] Change the sepolicy name for exo_camera_injection" into sc-dev am: ec6bd9449b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14112451

Change-Id: Ice4fe2982eeef2ef8c6f45eebcf4df4305e9bfa0
2021-04-08 14:41:08 +00:00
Cliff Wu
ec6bd9449b Merge "[Bug] Change the sepolicy name for exo_camera_injection" into sc-dev 2021-04-08 14:09:47 +00:00
Roger Wang
a0342c45ce Enable wakeup packet mask and marker config
In this commit, we enable wakeup packet mask
and marker config. Then, connectivity can do
the proper accounting of the Wakeup statistics
which will be included in the bugreport.

BUG: 184807534
Test: adb shell dumpsys connmetrics
```
WakeupStats(wlan0, 1022s, total: 6, root: 0, system: 1, apps: 5, non-apps: 0, no uid: 0, l2 unicast/multicast/broadcast: 6/0/0, ethertype 0x800: 6, ipNxtHdr 6: 6)
WakeupEvent(19:45:36.879, wlan0, uid: 1010151, eth=0x800, dstHw=10:7b:44:3c:30:88, ipNxtHdr=6, srcIp=216.58.200.42, dstIp=192.168.50.51, srcPort=443, dstPort=49572)
WakeupEvent(19:47:36.741, wlan0, uid: 1010151, eth=0x800, dstHw=10:7b:44:3c:30:88, ipNxtHdr=6, srcIp=172.217.24.8, dstIp=192.168.50.51, srcPort=443, dstPort=53436)
WakeupEvent(19:49:25.241, wlan0, uid: 10151, eth=0x800, dstHw=10:7b:44:3c:30:88, ipNxtHdr=6, srcIp=74.125.204.188, dstIp=192.168.50.51, srcPort=5228, dstPort=38444)
//...
```

Change-Id: Ifabc2edd5425794d9e0af200eaec8baad44d6689
2021-04-08 20:07:47 +08:00
Craig Dooley
3d4d9159c9 Fix SELinux errors with aocd
Add inotify support for /dev
Fix the aoc vendor property

Bug: 184173298
Change-Id: I40a71edd56b2d51f848085c43ae1d10a4c2c0c4b
2021-04-08 03:59:23 +00:00
Speth Chang
1c64cd89a2 allow camera to connect stats service
Bug: 177076189
Test: build pass
Change-Id: I1132e8a6794d09306b70fe902fc82fbdb7bf9bb4
2021-04-08 11:48:08 +08:00