Commit Graph

26 Commits

Author SHA1 Message Date
Sundong Ahn
11a113a67e Add disable_configstore
The disable_configstore is added to disable configstore when API level
is less than or equal to 29.

Bug: 150761042
Test: Add disable_configstore to PRODUCT_PACKAGES && build && check
configstore service

Change-Id: Iac01bb375a5c4080c0e110213c64041ea823ed68
Merged-In: Iac01bb375a5c4080c0e110213c64041ea823ed68
(cherry picked from commit d864334675e83a75c0343510cff3fc90ffb14c51)
2020-03-18 09:06:19 +09:00
Mitch Phillips
7f3cdad0f1 Add gettid() to SELinux policy in prep for GWP-ASan.
GWP-ASan is a sampled allocator framework that is planned for rollout in
Android R. It instruments the bionic allocator, and requires gettid()
during its initialisation.

Ensure that we can call gettid() from configstore.

Bug: 135634846
Test: N/A

Change-Id: I4a92c989ffde9051831e858e805fc20ae993dc01
2019-11-13 10:45:12 -08:00
Steven Moreland
b3a4d3832e Remove libhwbinder/libhidltransport deps
Since these were combined into libhidlbase.

Bug: 135686713
Test: build only (libhwbinder/libhidltransport are empty)
Change-Id: I075670b64eebbbbd6a6ae0e84ad51bf1c6f5ba36
2019-09-06 01:07:02 +00:00
Felix
37298a7616 Merge "Add interface info to .rc files"
am: 98d0f4d52c

Change-Id: Ie6cfbacd523c4b09f77bee3369ec8e88b3fa0419
2019-07-08 12:22:23 -07:00
Felix
551b8d15ce Add interface info to .rc files
Signed-off-by: Felix <google@ix5.org>
Change-Id: I6d70bbdb66c3dce280bf6908c3750316a6f6cf70
2019-06-25 20:00:07 +02:00
Sundong Ahn
e64a228861 Remove configstore 1.2
the configstore functionality was added in Q. But The configstore will
be deleted. So additional function is deleted.

Bug: 124531214
Test: build & boot
Test: adb shell lshal | grep configstore & check configstore 1.2
Change-Id: Idbb00b972bc082bd75bba94dbff9cee19df48b89
2019-02-27 12:22:54 +09:00
Peiyong Lin
2b3f82672a [ConfigStore] Add useColorManagement method.
Previously we couple wide color gamut display and color management together,
which is because we only do color management when we have wide color gamut
display. However, we would also want display that doesn't support wide color
gamut but is calibrated and is capable of managing sRGB gamut to have color
management. This means we will decouple wide color gamut display from color
management, a device can indicate that it's color managed without having wide
color gamut display and only manage color within sRGB gamut.

BUG: 111505327
Test: BUild, flash and check Natural/Boosted mode.
Change-Id: If1241ce040a6f691609d8f8d72a2d6f3141557cf
2018-08-21 15:21:54 -07:00
Jeffrey Vander Stoep
1850703a5e Merge "Revert "configstore: include crash_dump seccomp policy""
am: aeb792be28

Change-Id: I636f1db4864b0c20a113f7a82e4ecda5ee253f40
2018-06-15 10:02:44 -07:00
Jeff Vander Stoep
ca8d5c9250 Merge "configstore: include crash_dump seccomp policy"
am: 25080b1fff

Change-Id: I54535004faf8beebef7222989d025fa0b999f9a6
2018-06-13 11:16:58 -07:00
Jaesoo Lee
ff866b9b0d Merge "configstore: configstore HAL uprev'ed to 1.1" into pi-dev
am: ce7d394935

Change-Id: I610b46eb5a8d959e7ebacbc2beecb953b9e5383c
2018-05-23 18:20:47 -07:00
Jaesoo Lee
712ee82162 configstore: configstore HAL uprev'ed to 1.1
This change provides a reference implementation of the configstore HAL
v1.1.

Bug: 69691076
Test: tested on walleye-userdebug
Change-Id: I68ee224bcbda64f6fef91e8a0f95adb32d504aad
2018-05-23 15:48:36 -07:00
Sundong Ahn
b162f3f8dd Configstore HAL is down-revisioned to 1.0
Configstore was up-revisioned from 1.0 to 1.1. However no new
APIs were added to 1.1. Therefore configstore in master will be down
revisioned to 1.0.

Bug: 71555815
Test: lshal | grep configsotre
Test: "cat proc/<configstore pid>/status | grep Seccomp " return:
    Seccomp: 2

Change-Id: I65d2dc06fbe12d0c0ccc020bbd287e0b14320f2f
2018-01-04 16:15:56 +09:00
Martijn Coenen
b6fa3ae638 Fix library loading order in .mk files.
Test: angler boots again
Bug: 69180318
Change-Id: Id71e2348eabf5101d1fd286bbc0076154703d159
2017-11-13 19:59:54 +01:00
TreeHugger Robot
448beed214 Merge "configstore: reduce restrictions in prctl()" 2017-10-24 23:04:02 +00:00
Jeff Vander Stoep
41534729e5 configstore: reduce restrictions in prctl()
Prevent configstore from crash-looping due to:
/vendor/bin/hw/android.hardware.configstore@1.0-service:
libminijail[22988]: blocked syscall: prctl

Bug: 68162846
Test: Launch photos.
Change-Id: I1593ea1e03ec5f688ec7311e586178f2f952fed9
2017-10-24 10:34:46 -07:00
Elliott Hughes
2e924e753c Add sched_setscheduler to the arm64 policy.
To support pthread_attr_setinheritsched for any code that uses pthread_create.

Bug: http://b/67471710
Test: no rolling configstore crashes when booting with the pthread change
Change-Id: I5847adba36b6a5d13b7bd20f955e432c14ce78b8
2017-10-20 17:52:00 -07:00
Jeff Vander Stoep
19eb208a45 Merge "Allow clock_gettime syscall for logging" into oc-mr1-dev am: 3816306137
am: 9942d5e495

Change-Id: I2e81116a46a7025f2cb15e696a155a3320b19471
2017-09-14 06:00:39 +00:00
Jaekyun Seok
81104ae5ef Add 'vendor.' prefix to a vendor HAL service name
To prevent property name collisions between properties of system and
vendor, 'vendor.' prefix must be added to a vendor HAL service name.
You can see the details in http://go/treble-sysprop-compatibility.

Test: succeeded building and tested on a walleye device
Bug: 36796459
Change-Id: I4e8fbee791ec917a8f627a1366f4d44ec7e6febc
2017-09-12 08:01:42 +09:00
Sundong Ahn
169eeecb08 Configstore HAL is down-revisioned to 1.0
Configstore was up-revisioned from 1.0 to 1.1. However no new
APIs were added to 1.1. Therefore configstore in mr1 will be down
revisioned to 1.0.

Bug: 64999074
Test: lshal | grep configsotre
Test: "cat proc/<configstore pid>/status | grep Seccomp " return:
    Seccomp: 2
Change-Id: Ia2614439cd620fbe5fbd427571ab55a15089cc47
2017-08-25 17:05:29 +00:00
Jeff Vander Stoep
f378b7ffe2 configstore: Allow syscalls needed by crash_dump
Information such as tombstones and callstack are important when
debugging why a process crashed. configstore's seccomp filter
and selinux policy are currently overly strict and are blocking
the collection of crash data.

In order to keep configstore's sandbox as strict as possible, use
Crash_dump's fallback mechanism to collect crash data. This uses a
local socket to send crash data to tombstoned.

Bug: 64768925
Test: killall -ABRT android.hardware.configstore@1.1-service
    Verify that configstore callstack gets dumped to logcat.
    Verify that a crash tombstone gets recorded to /data/tombstones
Test: proto_fuzzer runs without crashing

Change-Id: I3c3e13d6aa1c1e2dda2a619dfa815375ee7ebff6
(cherry picked from commit 60ced29112)
2017-08-23 21:22:07 -07:00
Jeff Vander Stoep
60ced29112 configstore: Allow syscalls needed by crash_dump
Information such as tombstones and callstack are important when
debugging why a process crashed. configstore's seccomp filter
and selinux policy are currently overly strict and are blocking
the collection of crash data.

In order to keep configstore's sandbox as strict as possible, use
Crash_dump's fallback mechanism to collect crash data. This uses a
local socket to send crash data to tombstoned.

Bug: 64768925
Test: killall -ABRT android.hardware.configstore@1.1-service
    Verify that configstore callstack gets dumped to logcat.
    Verify that a crash tombstone gets recorded to /data/tombstones
Test: proto_fuzzer runs without crashing

Change-Id: I3c3e13d6aa1c1e2dda2a619dfa815375ee7ebff6
2017-08-18 13:51:43 -07:00
Jeff Vander Stoep
03253b48c9 configstore: sandbox with seccomp filter
Configstore HAL is accessible to third party apps and thus requires
a tight sandbox that reflects the limited system access this HAL
needs.

We use two primary mechanisms to sandbox configstore, selinux and
seccomp, with the goal of restricting its access to userspace and
the kernel. The addition of a seccomp filter is primarily aimed
at reducing the kernel's attack surface that is reachable by
configstore HAL.

Seccomp filters are architecture dependent, so filters need to be
added for each architecture. This change adds a seccomp filter for
arm64 and issues a non-fatal runtime warning for other architectures
which still require a seccomp filter.

Bug: 36453956
Test: boot Marlin and Angler. Verify that configstore is not aborting
    due to seccomp violations.
Test: "cat proc/<configstore pid>/status | grep seccomp " returns:
    seccomp: 2
    Which indicates that configstore is using seccomp-bpf.

Change-Id: Iab014ff357b7329085a5e18a92f51838d2c72371
(cherry picked from commit ed95043d64)
2017-08-10 10:34:08 -07:00
TreeHugger Robot
cf3dd6faed Merge "configstore: sandbox with seccomp filter" 2017-08-07 21:07:57 +00:00
Jiyong Park
e786494ff3 Remove TODO comment for configstore threadpool size
No problem with current configuration has been reported.

Bug: 34857894
Test: not required
Change-Id: Ie23b234eccb2707323032e37b27b387eb96918e5
2017-07-14 10:53:26 +09:00
Jeff Vander Stoep
ed95043d64 configstore: sandbox with seccomp filter
Configstore HAL is accessible to third party apps and thus requires
a tight sandbox that reflects the limited system access this HAL
needs.

We use two primary mechanisms to sandbox configstore, selinux and
seccomp, with the goal of restricting its access to userspace and
the kernel. The addition of a seccomp filter is primarily aimed
at reducing the kernel's attack surface that is reachable by
configstore HAL.

Seccomp filters are architecture dependent, so filters need to be
added for each architecture. This change adds a seccomp filter for
arm64 and issues a non-fatal runtime warning for other architectures
which still require a seccomp filter.

Bug: 36453956
Test: boot Marlin and Angler. Verify that configstore is not aborting
    due to seccomp violations.
Test: "cat proc/<configstore pid>/status | grep seccomp " returns:
    seccomp: 2
    Which indicates that configstore is using seccomp-bpf.

Change-Id: Iab014ff357b7329085a5e18a92f51838d2c72371
2017-07-12 12:58:01 -07:00
Jaesoo Lee
812e85e126 configstore: configstore HAL is up-revisioned to 1.1
This change provides a reference implementation of the configstore HAL
v1.1.

Bug: 37727469
Test: Built sailfish-userdebug and configstore-1.1 works
Change-Id: I75e7fd1da8e90ae48d779a3ba28957c5a93a5529
2017-05-17 15:30:17 +09:00