e93a0517f4c88310066ac39c6b268ebfcceef44e |
|
08-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Set GID required to write, media_rw mount point. Add sdcard FUSE daemon flag to specify the GID required for a package to have write access. Normally sdcard_rw, but it will be media_rw for secondary external storage devices, so DefaultContainerService can still clean up package directories after uninstall. Create /mnt/media_rw which is where vold will mount raw secondary external storage devices before wrapping them in a FUSE instance. Bug: 10330128, 10330229 Change-Id: I4385c36fd9035cdf56892aaf7b36ef4b81f4418a
/system/core/rootdir/init.rc
|
6b1a027239689a817aa5ca44a2bcbfe48ed21408 |
|
23-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
Merge "Create a separate copy of the fsck logs" into klp-dev
|
4eaf905858c6a1d7cf0639bed3e8de3bd7987646 |
|
19-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
Create a separate copy of the fsck logs The log_target parameter of android_fork_execvp_ext() is now a bit field, and multiple targets can be set to log to multiple places at the same time. The new target LOG_FILE will log to a file specified by the new parameter file_path. Set LOG_FILE and log to a file in /dev (the only writable filesystem avilable when e2fsck runs) when invoking e2fsck in fs_mgr. Bug: 10021342 Change-Id: I63baf644cc8c3afccc8345df27a74203b44d0400
/system/core/rootdir/init.rc
|
44d6342caa0db1f613809e9ba1ea8d9af0183b74 |
|
12-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
Remove mkdir() side effect, add .nomedia, utils. Before this change, FUSE lookup() would have the side effect of creating the directory on behalf of apps. This resulted in most directories being created just by Settings trying to measure disk space. Instead, we're switching to have vold do directory creation when an app doesn't have enough permissions. Create fs_mkdirs() utility to create all parent directories in a path as needed. Allow traversal (+x) into /storage directories. Fix FUSE derived permissions to be case insensitive. Mark well-known directories as .nomedia when created. Bug: 10577808, 10330221 Change-Id: I53114f2e63ffbe6de4ba6a72d94a232523231cad
/system/core/rootdir/init.rc
|
b410eb19130cf1eca158a672bba8f515e7627f11 |
|
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
Initialize /dev/urandom earlier in boot. It's a security best practice to carry entropy across reboots. (see "man 4 random"). Currently, entropy saving and mixing occur in the system_server, via the EntropyMixer code. Unfortunately, the EntropyMixer code runs fairly late in the boot process, which means early boot doesn't have high quality entropy. This has caused security problems in the past. Load entropy data as soon as we can in the early boot process, so that we can get /dev/random / /dev/urandom into a "random" state earlier. Bug: 9983133 Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
/system/core/rootdir/init.rc
|
67b00d8b2d96e8133c249bcbc0fb63c49e10e022 |
|
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
init.rc: change mem cgroups permissions Changing mem cgroups permissions to only be accessible by root and system. Bug: 10210529 Bug: 10210900 Change-Id: Ib4fff6f49b33013b3629d40ae98a5e2464571b2d
/system/core/rootdir/init.rc
|
46a24db563f46736f6e02c4d80656ab51d94ff77 |
|
23-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Remove input flinger stubs. (DO NOT MERGE) Bug: 10446930 Change-Id: I88b926380dbe1e866c0b87ec95b3489d87c5907b
/system/core/rootdir/init.rc
|
13f4c9fb279f1b34a3b47a6eac80b8a09d2d3a79 |
|
20-Jun-2013 |
Todd Poynor <toddpoynor@google.com> |
healthd: normal and charger mode startup Command line flag -n tells healthd not to use (or wait for) servicemanager in charger mode. Change-Id: I255f9597dff6fc904f5ed20fd02f52c0531d14f8
/system/core/rootdir/init.rc
|
5ba57f9a951728593aed559ece93ba821c33e45c |
|
27-Jul-2013 |
Colin Cross <ccross@android.com> |
Merge "add property to adjust extra_free_kbytes kernel vm tunable"
|
57fdb5cfd2b20f47299a12c2050ff8bb2707c788 |
|
25-Jul-2013 |
Colin Cross <ccross@android.com> |
add property to adjust extra_free_kbytes kernel vm tunable ActivityManager can't directly write to extra_free_kbytes because /proc/sys rejects all chown and chmod syscalls. Proxy the writes through init by using the sys.sysctl.extra_free_kbytes property. Bug: 10024467 Change-Id: I441e00478421254355fcafb252bc878166483d4c
/system/core/rootdir/init.rc
|
5748ee972de22e3a53bd3ef7d998ed15ea726a69 |
|
24-Jul-2013 |
Ying Wang <wangying@google.com> |
Generate init.environ.rc by populating BOOTCLASSPATH - BOOTCLASSPATH now is derived from PRODUCT_BOOT_JARS, which is a product configuration variable set up by the core build system. - Moved files from the legacy ALL_PREBUILT to PRODUCT_COPY_FILES in build/target/product/embedded.mk. Bug: 9990214 Change-Id: I98bac36c1ca8c779dda572a0a5e0a22b7e4c4a7a
/system/core/rootdir/init.rc
|
f498ec8fafcce6fe30ba3a80bbdbce6577b6b921 |
|
20-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am dafa66af: am 2aa33a3d: Add writable data space for radio. * commit 'dafa66afdd3729e2c65ccb8dced8ca3e137db437': Add writable data space for radio.
|
dafa66afdd3729e2c65ccb8dced8ca3e137db437 |
|
19-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am 2aa33a3d: Add writable data space for radio. * commit '2aa33a3dbd1147558098d9a2948450d363ffe468': Add writable data space for radio.
|
57fc1ceebc6a8c84fa6e9cbf268b5ffca3052c2d |
|
18-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
Split framework jar. Change-Id: I590de05f23669cf625030b479c786423f21c6159
/system/core/rootdir/init.rc
|
2aa33a3dbd1147558098d9a2948450d363ffe468 |
|
16-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Add writable data space for radio. Storing carrier provisioning urls updates in /data/misc/radio. bug:9623159 Change-Id: I8d62d4638229733dea0f11f1729c4d22ae2295d1 I36697ed341353b7a3dbec5afe20241102e76f6f1
/system/core/rootdir/init.rc
|
3884a9b252c1852e88a2ad75c22b042d25a633f4 |
|
13-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
init.rc: Add input flinger. Change-Id: Ibcb1116bdcd9189272db620910b9958c8ffb4552
/system/core/rootdir/init.rc
|
4a291b339e1ab682609485aef6fbb46b66b0de90 |
|
15-Jul-2013 |
Rom Lemarchand <romlem@google.com> |
Merge "init.rc: configure memory cgroups"
|
56adf992676e39175f227ac1a542d841bb6c0c24 |
|
15-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am 9a4913d4: init.rc: remove "on fs" section * commit '9a4913d422f4c18033333afe8e2e1d699b112d44': init.rc: remove "on fs" section
|
435a52ef07a5c97bdd717f20cb3115a585eb6d3c |
|
10-Jul-2013 |
Rom Lemarchand <romlem@google.com> |
init.rc: configure memory cgroups Create the memory cgroups folders and configure them Change-Id: I06c4bb486b204f7e98b0bc6757deec8bd7f6349e
/system/core/rootdir/init.rc
|
9a4913d422f4c18033333afe8e2e1d699b112d44 |
|
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
init.rc: remove "on fs" section This was only ever used by the emulator. Now the emulator uses an fstab file. Change-Id: I1a071e567e1f1a379f9c8079cc2dc17660d8455f
/system/core/rootdir/init.rc
|
e1dbdd697894f84e2cb8882160f0e4104f739064 |
|
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am 7d6ddc7d: am 2713be91: am fb1c9cf6: Merge "use ext4 instead of yaffs" * commit '7d6ddc7d395e909d841bb7eadfc12a167076aecf': use ext4 instead of yaffs
|
2713be91a84078e8b0b9b755ce17881b750e85a7 |
|
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am fb1c9cf6: Merge "use ext4 instead of yaffs" * commit 'fb1c9cf6fa4efafb3e0c6b0bc93c7f087d926a48': use ext4 instead of yaffs
|
f4c1512db8f0d2fd19d80487d96db3af7ceaacb5 |
|
10-Jul-2013 |
Nick Kralevich <nnk@google.com> |
use ext4 instead of yaffs This is needed to allow the emulator to use ext4 images. Bug: https://code.google.com/p/android/issues/detail?id=38561 Change-Id: I02fde6382ad67cf7f4f3b695396841f70bb9301d
/system/core/rootdir/init.rc
|
317ec9246b28c8be373d2915be5fbfd85b2854e2 |
|
04-Jun-2013 |
Torne (Richard Coles) <torne@google.com> |
Add webviewchromium to BOOTCLASSPATH. Add /system/framework/webviewchromium.jar to BOOTCLASSPATH. This jar contains the implementation classes for the new WebView. It has been processed with jarjar to ensure that it doesn't define any classes outside of com.android. Change-Id: If65913638df0088f4dd7d62a087750b90038a7fb
/system/core/rootdir/init.rc
|
71952461310cff9f35a4852415c608d14c92236a |
|
21-May-2013 |
Colin Cross <ccross@android.com> |
am 5f1a938e: am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '5f1a938e9c65829c3afebb4d92c8e93caecc3e11': init.rc: remove duplicated led-related nodes
|
5f1a938e9c65829c3afebb4d92c8e93caecc3e11 |
|
21-May-2013 |
Colin Cross <ccross@android.com> |
am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2': init.rc: remove duplicated led-related nodes
|
3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2 |
|
21-May-2013 |
Colin Cross <ccross@android.com> |
am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '9246f8d6def40a50933a980fac773a909f2138d7': init.rc: remove duplicated led-related nodes
|
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '253e91b4ffb631b188fdac0c1624786103471f05': Revert "Add persistent property for SELinux enforcment status."
|
acef650dbc11355f9792923b69d8277a4ce89fab |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition." * commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1': Revert "Reload policy after setting up the data partition."
|
9a8cb3abf8985586172d8f891933b04ff419f81c |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am b9866649: am 52351300: Revert "Add a version check for SELinux policy on device." * commit 'b9866649e24d7b6eedcaf2e03ffc605a3417537d': Revert "Add a version check for SELinux policy on device."
|
253e91b4ffb631b188fdac0c1624786103471f05 |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6': Revert "Add persistent property for SELinux enforcment status."
|
43329bc1c99c0f5f3670a8aaab39e54df34819a1 |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 8a387870: Revert "Reload policy after setting up the data partition." * commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8': Revert "Reload policy after setting up the data partition."
|
b9866649e24d7b6eedcaf2e03ffc605a3417537d |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 52351300: Revert "Add a version check for SELinux policy on device." * commit '52351300d156826bf22c493828571f45a1cea16a': Revert "Add a version check for SELinux policy on device."
|
a8d392da915b46a59dc5eab82a2b6cf17a9b3a86 |
|
20-May-2013 |
Sungmin Choi <sungmin.choi@lge.com> |
init.rc: remove duplicated led-related nodes Change-Id: Ibee7ef9137594fc4c30d3ab6ee7bdf3515836c62
/system/core/rootdir/init.rc
|
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add persistent property for SELinux enforcment status." This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
/system/core/rootdir/init.rc
|
8a3878700eb9cd8ecf495cd01f15face5c3879c8 |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Reload policy after setting up the data partition." This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
/system/core/rootdir/init.rc
|
52351300d156826bf22c493828571f45a1cea16a |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add a version check for SELinux policy on device." This reverts commit 921be8b6568df0057c4eacbac2e1022b71e09620.
/system/core/rootdir/init.rc
|
e45710f19f3843dd0ec02d1a5c7f679f34a33846 |
|
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 5a98566d: am 921be8b6: Add a version check for SELinux policy on device. * commit '5a98566d589408c78e35f4476f478a2fa1c13e78': Add a version check for SELinux policy on device.
|
5a98566d589408c78e35f4476f478a2fa1c13e78 |
|
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 921be8b6: Add a version check for SELinux policy on device. * commit '921be8b6568df0057c4eacbac2e1022b71e09620': Add a version check for SELinux policy on device.
|
921be8b6568df0057c4eacbac2e1022b71e09620 |
|
10-May-2013 |
repo sync <gcondra@google.com> |
Add a version check for SELinux policy on device. This helps to ensure that when a new system image is installed, old userdata policy isn't applied over the top of it. Bug: 8841348 Change-Id: I135af32250aa62979763e775842ce0af3c8b6f9f
/system/core/rootdir/init.rc
|
8577e8649062953a59e0ac652b5ac16c96c1c1f4 |
|
09-May-2013 |
Mathias Agopian <mathias@google.com> |
surfaceflinger is now always running in its own process Change-Id: I1ae63347a8b6d406306ed894665674dd726b7d51
/system/core/rootdir/init.rc
|
69e9b17fa1a7ac4dea56963008096a4961245277 |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
am cb4b9605: am 8794b2ee: Merge "Fix perms on /data/security" * commit 'cb4b9605cb923d071a546b444d10cbe21367d878': Fix perms on /data/security
|
cb4b9605cb923d071a546b444d10cbe21367d878 |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
am 8794b2ee: Merge "Fix perms on /data/security" * commit '8794b2eeb2bbd717ca18b8bef5d853f99334aabc': Fix perms on /data/security
|
8794b2eeb2bbd717ca18b8bef5d853f99334aabc |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
Merge "Fix perms on /data/security"
|
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a |
|
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 63577d92: am fee250d2: Reload policy after setting up the data partition. * commit '63577d9280e7919bfb7221030d211b833e66bb1e': Reload policy after setting up the data partition.
|
63577d9280e7919bfb7221030d211b833e66bb1e |
|
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am fee250d2: Reload policy after setting up the data partition. * commit 'fee250d27a9c03af1ba439047b976d89563b1887': Reload policy after setting up the data partition.
|
fee250d27a9c03af1ba439047b976d89563b1887 |
|
30-Apr-2013 |
repo sync <gcondra@google.com> |
Reload policy after setting up the data partition. This forces a policy reload + fixcon to deal with dynamically delivered policy changing labels on device nodes. It's implemented as a new keyword in init. Bug: 8702843 Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
/system/core/rootdir/init.rc
|
152a43215143f62ee4bedda96ce73604530a6f1d |
|
30-Apr-2013 |
Kenny Root <kroot@google.com> |
am d14586e3: resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp * commit 'd14586e35a3df39cc3aa6aff6a54463270a5e1a7': Track change to JSSE provider
|
d14586e35a3df39cc3aa6aff6a54463270a5e1a7 |
|
30-Apr-2013 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp Change-Id: If41560f0fef3103cad2172061a7988ceb5556377
|
ca0404b83e9e5712531e040675212a4bd0d7f6a8 |
|
24-Apr-2013 |
Kenny Root <kroot@google.com> |
Track change to JSSE provider Change-Id: Iff9103fff3591983f2b172f83fd2a6e924986aa7
/system/core/rootdir/init.rc
|
ada3291c8d13a9c3896102932abefed155a5b3fe |
|
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '14ad786183455ad9c8298e24946d4da0f24458d7': Add persistent property for SELinux enforcment status.
|
14ad786183455ad9c8298e24946d4da0f24458d7 |
|
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '538b5d4e8e4c480b2120aa957fe3e11a2836a1b3': Add persistent property for SELinux enforcment status.
|
538b5d4e8e4c480b2120aa957fe3e11a2836a1b3 |
|
26-Apr-2013 |
repo sync <gcondra@google.com> |
Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev
|
b89bdfde422eff751b3f939f10ab57e22af83eaa |
|
24-Apr-2013 |
repo sync <gcondra@google.com> |
Add persistent property for SELinux enforcment status. Also adds triggers for going between enforcing and permissive status. Bug: 8702843 Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
/system/core/rootdir/init.rc
|
7629bf19a139cbc204e8ae78cb82c2faeba6d2f0 |
|
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
am 9e9ed1b4: am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev * commit '9e9ed1b40010745e709157a6977ba6d053d46c49': Add a new group for MediaDrm engine plugins
|
9e9ed1b40010745e709157a6977ba6d053d46c49 |
|
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev * commit '131ee07b77e0250c16cebe2b0e226c5bff8e9587': Add a new group for MediaDrm engine plugins
|
08d64308b93594c587036cffcd8f6780eaf2c417 |
|
24-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
Add a new group for MediaDrm engine plugins bug: 8702754 Change-Id: I3b7988b64b1dcf4685624e4c1af938e132b82696
/system/core/rootdir/init.rc
|
ca8e66a8b0f843812014a28d49208f9f6f64ecbc |
|
18-Apr-2013 |
Nick Kralevich <nnk@google.com> |
Make init handle reboots Move the responsibility for rebooting the system from the reboot command to init. Init is in a better position to take actions to bring the system down cleanly, including making sure filesystems are mounted read-only. The only UIDs which can perform an init triggered reboot are root, system, and shell. Modify the reboot command so that it calls into init to perform the reboot. The reboot command no longer requires CAP_SYS_BOOT. Remove the -n reboot option and code which supports it. Anyone needing to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'. Modify adb so that it calls into init to perform a shutdown. Bug: 8646621 Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
/system/core/rootdir/init.rc
|
d43bab7b98d329ead0b5304be79d430b5a92ad10 |
|
15-Apr-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Fix perms on /data/security installd and zygote need to be able to search the directory to access the policy files. Change-Id: I0679fd2084d2664dfb5a594f493317eff058415d
/system/core/rootdir/init.rc
|
76c674451c831c1e9c3e3ee134ea8af26ae19ac1 |
|
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
Merge "resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp" into jb-mr2-dev-plus-aosp
|
d3f0e0ae379f4420b01bb9de932a764c035ff2a6 |
|
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp Change-Id: I63d6a2f975a6c0df5c238a2f7592f357441eb767
|
c2594f36e789bbd49cbeeb9421a7b6a16cd30ba4 |
|
31-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Give system ownership of selinux load and enforce files. This is necessary to enable remote updates. Change-Id: I05fb979c0360eca4cc6e4add48bb42f712a1ba17
/system/core/rootdir/init.rc
|
8637e8186ac572df92a34253f93bf405bf634b03 |
|
30-Mar-2013 |
jwilson <jwilson@squareup.com> |
Add OkHttp to the boot classpath. Change-Id: I185b803b5b804ff8680ef928ce5163727adbf0bd
/system/core/rootdir/init.rc
|
6b5de1cda2e5c4946aa08a11a38ad0a7eee115ce |
|
25-Mar-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set owner/perm for interactive governor io_is_busy Change-Id: I7537d56a23ca787daf92a9d91778056f987097bd
/system/core/rootdir/init.rc
|
fb39c0d19860fe48bc598d5d180a8cce9f59e33b |
|
23-Mar-2013 |
Geremy Condra <gcondra@google.com> |
am 4d71493e: am e849970c: Merge "Fix mode on /data/security." * commit '4d71493e74ed1ea39e554146351cc39e47cb5d02': Fix mode on /data/security.
|
bfd71b489b283fe54669dc5d1ccdc97b453d2fb4 |
|
23-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Create a new location for /data policy files Adding a new location for policy files under /data, the new location is /data/security. The new location is used before attempting to use any other location. This requires a new directory to be created by the init script and an update to the location of the property_contexts file for property service. Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
/system/core/rootdir/init.rc
|
c0317a75793ecbcd4a8e19f477458eb677024869 |
|
28-Jan-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Fix mode on /data/security. Change-Id: Id97d06a1c360c7871361db147f76b8a2eaceca42 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
46e1bd89b457713bf91d2dc751795822cc202658 |
|
23-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Create a new location for /data policy files Adding a new location for policy files under /data, the new location is /data/security. The new location is used before attempting to use any other location. This requires a new directory to be created by the init script and an update to the location of the property_contexts file for property service. Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
/system/core/rootdir/init.rc
|
fb4f7acefb31a51679cec194562c7aeb3922f728 |
|
14-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add symlink to bugreport storage location. Change-Id: I16f024c24767cfa1f5800d568d39fb098a408127
/system/core/rootdir/init.rc
|
65e203070c0cb25f5401502d60e924ff2b5bdae5 |
|
23-Feb-2013 |
Glenn Kasten <gkasten@google.com> |
Merge "Add directory for mediaserver"
|
b0f908a95714fbbfd63ee498e5773c44712b30e2 |
|
22-Feb-2013 |
Glenn Kasten <gkasten@google.com> |
Add directory for mediaserver Bug: 8223560 Change-Id: Iccc6d439a848445cac0f5b30d1d663aed3f5344e
/system/core/rootdir/init.rc
|
fe8425b5c5156c60691927a982672abd7927b777 |
|
22-Feb-2013 |
Nick Kralevich <nnk@google.com> |
am c5ce4108: am 1b64957a: Merge "init.rc: allow IPPROTO_ICMP support" * commit 'c5ce4108facc5a1b94fcf9469a189b2cbdfd5e76': init.rc: allow IPPROTO_ICMP support
|
be341cc348257a07c68bcbfdc526835d49283329 |
|
22-Feb-2013 |
Nick Kralevich <nnk@google.com> |
init.rc: allow IPPROTO_ICMP support Allow userspace programs to create IPPROTO_ICMP sockets. This socket type allows an unprivileged program to safely send ICMP_ECHO messages and receive the corresponding ICMP_ECHOREPLY messages, without relying on raw sockets or setuid programs. Please see http://lwn.net/Articles/443051/ for details. In particular, this allows us to use a version of ping which doesn't have any capabilities (https://android-review.googlesource.com/52072). In addition, this allows us to safely implement an IPv4 ICMP based version of InetAddress.isReachable() (https://code.google.com/p/android/issues/detail?id=20106) Change-Id: I876718151efa8219c4f34f573e35e21256fe2316
/system/core/rootdir/init.rc
|
c0d399df697850712432cb6092d63669ffa0fc23 |
|
29-Jan-2013 |
Wink Saville <wink@google.com> |
Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip Add voip-common to BOOTCLASSPATH Change-Id: Ieaba759a0f69b45c4b8839cbed1fe757cdf190c5
/system/core/rootdir/init.rc
|
a44404154730e54615d44c389b11cec9dd86c001 |
|
05-Jan-2013 |
JP Abgrall <jpa@google.com> |
am ba900f2e: am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files" * commit 'ba900f2e708f0b654cdaa827804cbb21af4e4fb4': init.rc: setup qtaguid group ownership of ctrl and stat files
|
ba900f2e708f0b654cdaa827804cbb21af4e4fb4 |
|
05-Jan-2013 |
JP Abgrall <jpa@google.com> |
am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files" * commit 'fb69c2e2577e056bb7a054343a9f6d781cedbf3d': init.rc: setup qtaguid group ownership of ctrl and stat files
|
3e54aabc63535572242477fadbf13ec42b06649e |
|
04-Jan-2013 |
JP Abgrall <jpa@google.com> |
init.rc: setup qtaguid group ownership of ctrl and stat files This will help get rid of android_aid.h in the kernel. The group of the proc entries will be used in place of the default values picked up by the xt_qtaguid netfilter module (AID_NET_BW_STATS, AID_NET_BW_ACCT). This change has no effect until the matching kernel changes are submitted. Change-Id: I3c177e7b5caf9c59300eba6bd4a976634b333674
/system/core/rootdir/init.rc
|
2b5b3bb103f59d9d3bf25c0c1f8035db036917da |
|
21-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
rootdir: init.rc: set perms for new interactive governor attrs /sys/devices/system/cpu/cpufreq/interactive/timer_slack /sys/devices/system/cpu/cpufreq/interactive/target_loads Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
/system/core/rootdir/init.rc
|
191af2f2c3effc5a60f1643dd6283ecc5a521603 |
|
21-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
am 367f1e4b: am 4f247d75: rootdir: init.rc: set perms for cpufreq governor boostpulse_duration * commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42': rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
|
4f247d753a8865cd16292ff0b720b72c28049786 |
|
20-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
rootdir: init.rc: set perms for cpufreq governor boostpulse_duration Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
/system/core/rootdir/init.rc
|
92781808bab8f045752aa1824a57956ddd52fcbd |
|
13-Nov-2012 |
Kenny Root <kroot@google.com> |
Switch keystore to binder Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
/system/core/rootdir/init.rc
|
066d3f9b3bd77df71542b132adda8eb25bc013c0 |
|
22-Oct-2012 |
Elliott Hughes <enh@google.com> |
resolved conflicts for merge of 3e5e9e9e to jb-mr1-dev-plus-aosp Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
|
f820e85164a1863e4384f5e1ca8b6f46902bd74e |
|
20-Oct-2012 |
Elliott Hughes <enh@google.com> |
Add a directory for tzdata updates. Bug: 7012465 Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
/system/core/rootdir/init.rc
|
c6f8bd396614d422d80ac9f24c91fa44a713894a |
|
08-Oct-2012 |
Dima Zavin <dima@android.com> |
Merge "rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups" into jb-mr1-dev
|
ece565cca2a4babe897f5fd68ab14a7af5071b30 |
|
05-Oct-2012 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups This is necessary for some HWC hals to be able to communicate with secure side to grant protected access to hardware owned by the hwc. This is necessary on some architectures to grant access to secure buffers to overlay/csc hardware Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
971153aa4a65c4fbc8d916c619a17d3912b2cb02 |
|
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Create bluetooth stack aid for sharing gid between all bluetooth processes bug 6925422 Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
/system/core/rootdir/init.rc
|
d6d478058fc201bfc70f353019477e17c71a29d4 |
|
27-Sep-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Add writable data space for radio. Storing Premium SMS regex's in /data/misc/sms. bug:7221402 Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
/system/core/rootdir/init.rc
|
9481266ea360e0a8f326fec1106ea445f2ef883c |
|
25-Sep-2012 |
Dima Zavin <dima@android.com> |
init.rc: chmod slabinfo to 440 to capture slabinfo in BRs Bug: 7232205 Change-Id: I0d785302818a37b722e79bf740644ede52c60148 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
f1c50bf63857b9cdabcf930363c372defc6383a8 |
|
21-Sep-2012 |
Todd Poynor <toddpoynor@google.com> |
init: import init.trace.rc after h/w-specific rc Board-specific .rc file mounts debugfs, then fixup perms on tracing sysfs files for systrace. Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
/system/core/rootdir/init.rc
|
5054417c1025b0f3f36f4b537e51ddd3eea981c8 |
|
09-Sep-2012 |
Kenny Root <kroot@google.com> |
Add /data/app-lib for native library sharing Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
/system/core/rootdir/init.rc
|
58d3980f314d08f86347ba83db85c2d4c6066599 |
|
06-Sep-2012 |
Jeff Sharkey <jsharkey@android.com> |
Keep /mnt/secure private to default namespace. When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE those mountpoints when vetting is finished. However, the kernel doesn't allow MS_MOVE when the source is shared to child namespaces. To work around this, create a tmpfs at /mnt/secure and mark it as private (not shared). Verified that vold can now successfully move from the staging area. Bug: 7094858 Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
/system/core/rootdir/init.rc
|
35ea5e4f2365ad791824ee49d1c999be81b705c5 |
|
28-Aug-2012 |
Mike Lockwood <lockwood@google.com> |
import init.${ro.hardware}.rc last to allow overriding default USB configuration Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
/system/core/rootdir/init.rc
|
f824ad7b35c3bf866d60662404be0d55fe753e3d |
|
23-Aug-2012 |
Wink Saville <wink@google.com> |
am 582b1152: am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" * commit '582b11527cd6d968f163fbee73f92d82b679e330': Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
42a1e6c9d827fc3d64ad3b0750b87de1f4c436e7 |
|
23-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Iteration on multi-user external storage." into jb-mr1-dev
|
582b11527cd6d968f163fbee73f92d82b679e330 |
|
23-Aug-2012 |
Wink Saville <wink@google.com> |
am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" * commit 'baba99840400f5b835d44b6d91e2190136277988': Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
baba99840400f5b835d44b6d91e2190136277988 |
|
23-Aug-2012 |
Wink Saville <wink@google.com> |
Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
|
bfcd810b792f7ffbb2ec1360c0c2662725fd0362 |
|
22-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Iteration on multi-user external storage. Define /storage as top-level concept, so that we enforce permissions uniformly. Moves external storage paths from headers to per-device environment variables. Added missing mount flags, and we no longer have adb-specific external storage. Bug: 6925012 Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
/system/core/rootdir/init.rc
|
61f1359486e578bc0fc12bc4f42c7cd65991fc5c |
|
20-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Remove sdcard groups from services. Even with the groups, services no longer have access. Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
/system/core/rootdir/init.rc
|
5dd0f86fbfed631b31c9055109889f1d9559a3ea |
|
18-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate sdcard0 to shell-accessible location. Also remove mount() from adb, since it can come online long before data partition is ready. Set EXTERNAL_STORAGE environment variable to point to owner for backwards compatibility. Bug: 7005701 Change-Id: I63444f6636624eb7ad89f053daa289663424639e
/system/core/rootdir/init.rc
|
885342a0f2c834a6b680284047c47c9d04b32565 |
|
15-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Multi-user external storage support. Remount rootfs as recursively shared, so that mount changes are propagated into child namespaces. Mount external storage for access from adb. Clean multi-user dependencies for use in Dalvik. Also define external storage paths. Bug: 6925012 Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
/system/core/rootdir/init.rc
|
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa |
|
13-Aug-2012 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 4dcd52ab to jb-mr1-dev Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
4dcd52ab11d25fe3d53aab52b6c233e692da4eae |
|
13-Aug-2012 |
Kenny Root <kroot@android.com> |
am 297f802f: Merge "Add support for reloading policy from /data/system." * commit '297f802f25d093274c1f5fb890ee8dfacfbf159e': Add support for reloading policy from /data/system.
|
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 |
|
01-May-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add support for reloading policy from /data/system. To support runtime policy management, add support for reloading policy from /data/system. This can be triggered by setting the selinux.loadpolicy property to 1, whether from init.rc after mounting /data or from the system_server (e.g. upon invocation of a new device admin API for provisioning policy). ueventd and installd are restarted upon policy reloads to pick up the new policy configurations relevant to their operation. Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
b35e36e5a92ac984a57ec15b14dc6ad3b0ecf1c5 |
|
03-Aug-2012 |
Colin Cross <ccross@android.com> |
init.rc: make last_kmsg readable only by user system and group log chown /proc/last_kmsg to user system group log during init, and chmod it to readable only by user and group. Bug: 6925227 Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
/system/core/rootdir/init.rc
|
35fc46d8e338181ee3caedc30f3627bad2ffe35e |
|
01-Aug-2012 |
Dima Zavin <dima@android.com> |
am 018227f5: am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android." * commit '018227f5394c3126f4a858596cb85dee1893b895': Modify init.rc and init.goldfish.rc for SE Android.
|
018227f5394c3126f4a858596cb85dee1893b895 |
|
01-Aug-2012 |
Dima Zavin <dima@android.com> |
am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android." * commit 'ce76e2d00e63339083ea693db33de05cbba5600e': Modify init.rc and init.goldfish.rc for SE Android.
|
ce76e2d00e63339083ea693db33de05cbba5600e |
|
01-Aug-2012 |
Dima Zavin <dima@android.com> |
Merge "Modify init.rc and init.goldfish.rc for SE Android."
|
0245e15bb78cf08b3225b31c77bda77d43995bd4 |
|
10-May-2012 |
Benoit Goby <benoit@android.com> |
rootdir: Create /data/misc/adb on boot Change-Id: I0f8d11391cdcfbaa50f87f637a2962c6663b2767
/system/core/rootdir/init.rc
|
0574d6b07711e90547d8166c222e09d80f702620 |
|
25-Apr-2012 |
Benoit Goby <benoit@android.com> |
init.rc: Add socket for adbd Change-Id: Ic97fd464440ff4a29fc9da7ad15949ac5215ade3
/system/core/rootdir/init.rc
|
1eee419e7a1c5789f81e1e3a19693403495e70f1 |
|
13-Jan-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Modify init.rc and init.goldfish.rc for SE Android. Set the security context for the init process. Restore the security contexts of /cache and /data in case they were reset. Specify the security context for services launched from the rootfs since we cannot label their executables. If on the emulator, set a policy boolean and restore the context of /sys/qemu_trace to allow accesses not normally permitted on a device. Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
e8b76a36bacd11ab54332ba5a25d8593d9c3f57f |
|
26-Jul-2012 |
Naveen Kalla <nkalla@codeaurora.org> |
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
/system/core/rootdir/init.rc
|
b3a679386d26677290a09fdf4e3406c57e835fd0 |
|
13-Jun-2012 |
Wink Saville <wink@google.com> |
Add telephony-common and mms-common to BOOTCLASSPATH - DO NOT MERGE Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
/system/core/rootdir/init.rc
|
4c3ac516ff391d9fc93ec997ce254f83af722a1a |
|
08-Apr-2012 |
Matthew Xie <mattx@google.com> |
remove dbus and bluetoothd, create bluedroid data dirs Change-Id: Ifacd570dbadc075e498a626935e035c76a0d83c4
/system/core/rootdir/init.rc
|
5acf1d6625e3e45ccdc29fd49222defc2788ada0 |
|
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
am 87314036: am 55b763ff: Grant sdcard_r to ril-daemon. * commit '873140368613af2d1c06e18ac2fd6fe24623b9bb': Grant sdcard_r to ril-daemon.
|
873140368613af2d1c06e18ac2fd6fe24623b9bb |
|
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
am 55b763ff: Grant sdcard_r to ril-daemon. * commit '55b763ff7b779d7ee91f245e0887332db8782afe': Grant sdcard_r to ril-daemon.
|
55b763ff7b779d7ee91f245e0887332db8782afe |
|
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
Grant sdcard_r to ril-daemon. Bug: 6793799 Change-Id: Ife23c98c30d7b08479d75798c7075005bf281119
/system/core/rootdir/init.rc
|
557ed7a487795b2b3ac441bbbbe619788c93b78f |
|
12-Jul-2012 |
Wink Saville <wink@google.com> |
Merge commit 'de016eef' into mit * commit 'de016eef': Add telephony-common and mms-common to BOOTCLASSPATH
|
de016eef3366739d69d7908e4e6dbd54785632ab |
|
13-Jun-2012 |
Wink Saville <wink@google.com> |
Add telephony-common and mms-common to BOOTCLASSPATH Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
/system/core/rootdir/init.rc
|
c06be8a15d8d89bcc8ac505b25b5e828e90a5be6 |
|
12-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
am 1e96e16f: am 0f3974c3: Merge "Enable tracing on user builds" into jb-dev * commit '1e96e16f81ce46adf5329b1db4662b53b927d4e2': Enable tracing on user builds
|
0f3974c3d0ee2ffe5e0cb9a56658ba18d511f6ea |
|
11-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
Merge "Enable tracing on user builds" into jb-dev
|
1279013dee790c84758e5fc5bed33b5c9df2af9b |
|
07-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
Enable tracing on user builds This change adds init.rc steps to: * allow kernel tracing to be enabled via adb * allow a limited set of kernel trace events to be enabled via adb * allow the kernel trace to be read via adb * allow all users to write to the kernel trace from userland Bug: 6513400 Change-Id: Ic3c189b5697aa5edf88d2f507c932971bed6caff
/system/core/rootdir/init.rc
|
6ba76f019040a0445575deb6995cd32ea72903dd |
|
07-Jun-2012 |
Arve Hjønnevåg <arve@android.com> |
Merge "init.rc: Set owner for /sys/power/autosleep"
|
5f2d00b0677cbe9ad42ea0394def0a51aef7bdda |
|
04-Jun-2012 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: remove audio app/sys groups, merge to fg With this change, the audio rr/fifo threads will just run in the fg cgroup. Also, the RR budget for the apps fg/bg threads has been bumped to 80%. Ideally, the bg budget would be much smaller but there are legacy libraries that seem to be very sensitive to this so for now keep it at this value. Bug: 6528015 Change-Id: I08f295e7ba195a449b96cd79d954b0529cee8636 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
df44b88621f60e933d7d31090bf0bb892e88142c |
|
04-Jun-2012 |
Dima Zavin <dima@android.com> |
core: init.rc: create apps cgroup for fg tasks, move bg under it Bug: 6538553 Change-Id: I7c29975aa376bcdda9d6bbd1fd3e04fdb1c1b1fe Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
4c48025c484e9fb0e10bb9c6a1b9bbd5a2def555 |
|
16-May-2012 |
Colin Cross <ccross@android.com> |
Increase cpu.rt_runtime_us to 10% for fg and bg groups GPS on yakju puts SCHED_RR threads in the fg and bg groups, and is unhappy with 0.1% limits. Increase the limits to 10%. Change-Id: I971c9b0a815890d41694b965fdd2b023937a4411
/system/core/rootdir/init.rc
|
50efaf2f7fc87692649497dba5615e54efd9c637 |
|
12-May-2012 |
Todd Poynor <toddpoynor@google.com> |
Merge "init: Set perms for interactive cpufreq governor boostpulse" into jb-dev
|
367e7b195b144772464e560352caa2017a53058c |
|
10-May-2012 |
Colin Cross <ccross@android.com> |
Increase rt_runtime_us to 1000 for foreground and bg_non_interactive rt_runtime_us=0 can cause deadlocks if a SCHED_FIFO/SCHED_RR thread is moved into the wrong cgroup. Change-Id: I4633392fb529039dff6ba5d3a6b672e0de9fc2d9
/system/core/rootdir/init.rc
|
4ff10e63c3814f7b40c6e4e672c895135a1b1a3d |
|
04-May-2012 |
Todd Poynor <toddpoynor@google.com> |
init: Set perms for interactive cpufreq governor boostpulse Change-Id: Ia4b028f58f9d48bad2525744497f10884d11c5d6
/system/core/rootdir/init.rc
|
70a163f519db14532b7dcde4bc65d1d658a760e4 |
|
03-May-2012 |
Arve Hjønnevåg <arve@android.com> |
init.rc: Set owner for /sys/power/autosleep Change-Id: Ia18cce973c71e7561ca84b23e37b0b8e056a7143
/system/core/rootdir/init.rc
|
7e057eb0047819ee4d8af52d2747a7bf29b0cc56 |
|
02-May-2012 |
Glenn Kasten <gkasten@google.com> |
Merge "Increase budget" into jb-dev
|
94a55df34d917492cb3613b9445ffb1659459186 |
|
02-May-2012 |
Jeff Tinker <jtinker@google.com> |
Merge "Fix failure to play pinned movies" into jb-dev
|
59e6eb09997125aecc122c7d7d9a6e3ec00be4c4 |
|
01-May-2012 |
Glenn Kasten <gkasten@google.com> |
Increase budget Change-Id: I6706a408990abf8d420db73280df2818b8827140
/system/core/rootdir/init.rc
|
65f1fbcad3247997cf0f0eca54b88f0692781109 |
|
01-May-2012 |
Jeff Tinker <jtinker@google.com> |
Fix failure to play pinned movies DRM server process needs to be able to access movies on sdcard to acquire rights. related-to-bug: 6414503 Change-Id: If90404e32fd437b8fb7d5a6ec8dfb30a499ef733
/system/core/rootdir/init.rc
|
33045a627d4dac8c4c8a910241298ca5da02f87b |
|
28-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init: Set perms for cpufreq interactive governor input boost sysfs Change-Id: Ie475c95d81635a068db11e7018895024247878b4
/system/core/rootdir/init.rc
|
25dd43a9a5073f0e59102750cb0410b8e9bc9847 |
|
27-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Restrict zygote to system user. CVE-2011-3918: Address denial of service attack against Android's zygote process. This change enforces that only UID=system can directly connect to zygote to spawn processes. Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
/system/core/rootdir/init.rc
|
8d3ea1d1e198e71ca3f856c6f397faf40922f562 |
|
25-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init: set perms for cpufreq interactive governor boost -- DO NOT MERGE Change-Id: I6509cda358b4a75706afd01a5b5a36eabe492554 Signed-off-by: Todd Poynor <toddpoynor@google.com>
/system/core/rootdir/init.rc
|
f8bbaba57bf309fec83dc9842176d996831e6db1 |
|
13-Apr-2012 |
Kenny Root <kroot@google.com> |
Add directory for forward locked apps in ASECs Forward locked apps on internal storage will be stored in ASEC containers using ext4. This way permissions can be preserved whether on internal or external storage. Change-Id: I942f8f0743c210330a11e2b1d0204df7a5ddb2ae
/system/core/rootdir/init.rc
|
b91bd9f599c43b602eac334244173000a6ce011a |
|
20-Apr-2012 |
Glenn Kasten <gkasten@google.com> |
Update cgroups Change-Id: If4488944e8a1c8af7b13847069d03b7ea4a30785
/system/core/rootdir/init.rc
|
f35c203558b0648c351a5262568b383d41639a8b |
|
19-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set perms for cpufreq interactive governor above_hispeed_delay Change-Id: Ib9c3fb4e43759af590a6e033b8ba04c0023d5f07
/system/core/rootdir/init.rc
|
b47cd10acf6eb9449fc12a93f17f720b21e998c8 |
|
17-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
Merge "init.rc: Add support for new USB accessory configurations"
|
5fa860dea3618d5397bb580645f057a6e975786e |
|
13-Apr-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Add MDNS service"
|
6a35bb3529520dd1a47a5d0f58abf91d38eb0222 |
|
12-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
Merge "init.rc: Set owner and permissions for cpufreq files"
|
0653b97b2594d5e3f21c6326fb121741bfbf65f7 |
|
11-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set owner and permissions for cpufreq files Change-Id: Iaaf8491915567dbe22cab1798081a00fed4fb2e2
/system/core/rootdir/init.rc
|
4f5d5176a3d732baebe92ab3748a12166406a198 |
|
04-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
init.rc: Add support for new USB accessory configurations Also moved USB scripts to new file init.usb.rc Change-Id: I98e099fbd8de3eb3e1e18c9ef69312608033a50c Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
|
db49739f390992a3d68303765ac36f14ed09b68a |
|
10-Apr-2012 |
Jamie Gennis <jgennis@google.com> |
Add tracing initialization to init.rc. This change adds init.rc steps to allow kernel tracing to support inserting messages from any userland process. Change-Id: I01970728d7132a25408fed09a213a015ac05ccaf
/system/core/rootdir/init.rc
|
1d91fcf7c0a31d27097b196579a37873ba1c0934 |
|
28-Mar-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Add MDNS service Adds both the new service and another socket for netd. Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
/system/core/rootdir/init.rc
|
71513567dc0249af1b304e458ceac391ffcbeff5 |
|
27-Mar-2012 |
Marius Renn <renn@google.com> |
Multi-Project Commit: Move of filterfw out of system/media (6 of 7) This is part of the multi-project commit to move the filter-framework from system/media/mca to frameworks/base/media/mca. Note that the filter-framework will soon be replaced with a refactored version currently under API review (also to go under frameworks/base). This move is done now to unblock the PDK efforts. Change-Id: I87d034a30bb4b98a85a028cb728e37fb97256039
/system/core/rootdir/init.rc
|
31fb85865431f98008608b62964cb1c975ca4b71 |
|
26-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "drmserver: add group drm"
|
62e5cbaebc29d83148dd1ce30a620a37dcdbe7ed |
|
26-Mar-2012 |
Benoit Goby <benoit@android.com> |
Merge "Revert "Reimplement the "adb root" command to more closely match its previous behavior""
|
3c9eed88c529374c8d80e1daa62ad9bf25c9670e |
|
26-Mar-2012 |
Nick Kralevich <nnk@google.com> |
drmserver: add group drm Make the drm server run as UID=drm, GID=drm. This ensures that any files created by the drmserver app do not have GID=system. Bug: 5834297 Change-Id: I3409ad350e9cc82bb0982cdbe470ec1f10b1ca67
/system/core/rootdir/init.rc
|
2affe824ba249b532c5b39941bcdc15800900f6c |
|
22-Mar-2012 |
Kenny Root <kroot@google.com> |
Merge "Put keystore into the drmrpc group"
|
9865be95cf60848d91364b42c2cadd90e63fec66 |
|
22-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '19155b5' Do not start sshd by default Change-Id: I22e6dbb6834321709e9b7c5ae49846d7f9f7c67a
|
a9bb7261b4db2372ee0f339d250079c967262758 |
|
22-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '9dd2eef' sshd to init.rc Change-Id: I8eedc3b47f1260502034067d9006cac827cb1089
|
19155b5cd3ee8674a13f7bf111e06b05f0114433 |
|
21-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
init.rc: Do not start sshd by default Change-Id: Ieacd4e8fbfcd91ed2342b7a104a9b1f4114fc6d5 Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
|
1670f831a56f7232f337407c746e97c5929ee417 |
|
21-Mar-2012 |
Arve Hjønnevåg <arve@android.com> |
init.rc: Fix permissions on /sys/power/state and /sys/power/wakeup_count Change-Id: I06a1a2affebdf64f008eaa61a0851f1e832059c5
/system/core/rootdir/init.rc
|
7941cf87f624e7747b5bb868a27904c7a3be0ca4 |
|
16-Mar-2012 |
Benoit Goby <benoit@android.com> |
Revert "Reimplement the "adb root" command to more closely match its previous behavior" This reverts commit 535164e9d9649a83d4d63829f3389f2bea339fe1.
/system/core/rootdir/init.rc
|
f3ef1271f225d9f00bb4ebb0573eb3e03829f9a8 |
|
14-Mar-2012 |
Nick Kralevich <nnk@google.com> |
init.rc: Add documentation Android developers should never place files in /data/local/tmp. Files or directories in /data/local/tmp can be minipulated by the shell user. Android developers should never create world-writable files or directories. This is a common source of security vulnerabilities. Change-Id: I6d2cd620ab49d8ca3f39282f7d2ed682a9ba91c3
/system/core/rootdir/init.rc
|
ad5b9c7205ac2a9ac500c6d455bf46f8ab3aafe0 |
|
24-Feb-2012 |
Kenny Root <kroot@google.com> |
Put keystore into the drmrpc group The keystore service needs to access hardware crypto devices to fulfill its function on devices with hardware crypto. This role was assigned to the (now misnamed) drmrpc group. Change-Id: Ia32f9e96b4372f0974984451680f9a0f6157aa01
/system/core/rootdir/init.rc
|
89c5926f08fdf551c33ccbfbec5d6bb7d911f067 |
|
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 0b32a75b: am c8d1a0e1: am 5ebced39: init.rc: update the permission of /data/local. * commit '0b32a75b7c7f25bd9ab325f44626c402fd9b9b23': init.rc: update the permission of /data/local.
|
c8d1a0e18e008009fe75aa2cc7d3deace0479fce |
|
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 5ebced39: init.rc: update the permission of /data/local. * commit '5ebced39093d1223566166b8cc6abfe6729c487d': init.rc: update the permission of /data/local.
|
5383476727659544875b90d49a5371886a31c1fe |
|
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 5ebced39: init.rc: update the permission of /data/local. * commit '5ebced39093d1223566166b8cc6abfe6729c487d': init.rc: update the permission of /data/local.
|
5ebced39093d1223566166b8cc6abfe6729c487d |
|
07-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: update the permission of /data/local. Bug: 6131945 Change-Id: I3094a471dcfb02b786f47b6778c8fed3726325ec
/system/core/rootdir/init.rc
|
e7fd911fd42b1f8bea6a004e2bcc1d2dda4ec718 |
|
27-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Restrict zygote to system user. CVE-2011-3918: Address denial of service attack against Android's zygote process. This change enforces that only UID=system can directly connect to zygote to spawn processes. Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
/system/core/rootdir/init.rc
|
dae26c6ac44e9c47cc60fcaa3d04c54d68d66760 |
|
12-Jan-2012 |
James Dong <jdong@google.com> |
am 3e9c9ac5: am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '3e9c9ac5ee7a36653b90cb86eb6445496b536c16': Close a security hole - do not give world readable/writable access to /data/drm
|
d95c6152197cf3976797267ad40e61b7344933de |
|
12-Jan-2012 |
James Dong <jdong@google.com> |
am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '032afc1d52289f486538c9ed53f17b9889ea94df': Close a security hole - do not give world readable/writable access to /data/drm
|
3e9c9ac5ee7a36653b90cb86eb6445496b536c16 |
|
12-Jan-2012 |
James Dong <jdong@google.com> |
am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '032afc1d52289f486538c9ed53f17b9889ea94df': Close a security hole - do not give world readable/writable access to /data/drm
|
f90b0e04a61ab3bf5239afb2f7157aabe5fbca8f |
|
10-Jan-2012 |
Dima Zavin <dima@android.com> |
rootdir: convert all usages of $prop to ${prop} Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
3e7b7739e3d4d7aaaa363645501036dafcc30ed3 |
|
16-Dec-2011 |
Dima Zavin <dima@android.com> |
init: import the hardware specific init file in init.rc This removes the hardcoding of the file import in init and instead allows the init.rc file to fully control what is loaded. Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
683a09352a0adf8924d67c9aa80bce244592aa25 |
|
10-Jan-2012 |
Dima Zavin <dima@android.com> |
rootdir: convert all usages of $prop to ${prop} Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
09cdc0ea12598651d1c074974c9b593fd1c0e4ba |
|
07-Jan-2012 |
James Dong <jdong@google.com> |
Close a security hole - do not give world readable/writable access to /data/drm o related-to-bug: 5834297 Change-Id: I8e459610b4f69999be37364c2359b2bac82d4a2a
/system/core/rootdir/init.rc
|
7634bf87cf6490e5544f040fb403eb164cf0ee5f |
|
16-Dec-2011 |
Dima Zavin <dima@android.com> |
init: import the hardware specific init file in init.rc This removes the hardcoding of the file import in init and instead allows the init.rc file to fully control what is loaded. Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
9dd2eef07bbee6ff5b1d1a9ccda6e3499391ecb6 |
|
12-Dec-2011 |
Mike Lockwood <lockwood@google.com> |
add sshd to init.rc Change-Id: Ide6e8cca58f090e84d85d0298058c523863d1c43 Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
|
27cca21a5d0a6beff31d2f9ff1441afc1271a346 |
|
05-Dec-2011 |
Nick Kralevich <nnk@google.com> |
set mmap_min_addr to 32768 Bug: 5712789 Change-Id: I586a99cd63d8fba06bc2562b1cfce531ee4f554c
/system/core/rootdir/init.rc
|
f9557fba347bcb837892458fabd7454e1a1a4d6a |
|
08-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Set /proc/sys/kernel/dmesg_restrict to 1 Set dmesg_restrict to 1 to help limit inadvertent information leaks from the kernel to non-privileged programs. Root and programs with CAP_SYSLOG will continue to have access to dmesg output. See "dmesg_restrict" in Documentation/sysctl/kernel.txt from the Linux kernel source code. Bug: 5585365 Change-Id: Iffcf060ea4bd446ab9acf62b8b61d315d4ec4633
/system/core/rootdir/init.rc
|
1e339a710e0993c18c8b96f9224ebd3aa29cf8cd |
|
08-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Merge "Set kptr_restrict to 2."
|
3c58933aa785ab26f77284f6a1a4e93d2ebfcf04 |
|
07-Nov-2011 |
Dima Zavin <dima@android.com> |
am 4a253908: rootdir: init.rc: write default oom_adj before starting ueventd * commit '4a2539085062a715b0d345eb50ea48738423c909': rootdir: init.rc: write default oom_adj before starting ueventd
|
4a2539085062a715b0d345eb50ea48738423c909 |
|
04-Nov-2011 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: write default oom_adj before starting ueventd Otherwise, ueventd's oom_adj value would have been 0 and it could easily get killed early during low memory events Change-Id: I1adbd18c37215b26ae77e70f7b8dbd1e143fc2d4 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
2e7c833279349a694af15f2447cc214dc30bcc01 |
|
02-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Set kptr_restrict to 2. To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms Bug: 5555668 Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b
/system/core/rootdir/init.rc
|
04a875902ece07769101a5202e3af554af31a911 |
|
31-Oct-2011 |
Mathias Agopian <mathias@google.com> |
restart surfaceflinger and drmserver when servicemanager dies Bug: 5450389 Change-Id: Ib4e73836721e25e2a88185167b030ea75e0d74e3
/system/core/rootdir/init.rc
|
8cdd4c335f0d6e35e6def5ea73dcefb9687071b0 |
|
18-Oct-2011 |
sinikang <sinikang@samsung.com> |
am aa75df74: [maguro] : add setprop net.tcp.buffersize.hspa * commit 'aa75df74db5beffd25821ed6c360c36197d7bac1': [maguro] : add setprop net.tcp.buffersize.hspa
|
aa75df74db5beffd25821ed6c360c36197d7bac1 |
|
16-Oct-2011 |
sinikang <sinikang@samsung.com> |
[maguro] : add setprop net.tcp.buffersize.hspa -window size optimized for hspa -Patchset2 : space removed Change-Id: Ia4d1043d1a93c929721a4d7cca60ce9ff8bbf67a Signed-off-by: sinikang <sinikang@samsung.com>
/system/core/rootdir/init.rc
|
d707fb3fb6448be04d6e14f7e478df7e298ebf35 |
|
06-Oct-2011 |
Nick Kralevich <nnk@google.com> |
enable heap randomization. Bug: 5250555 Change-Id: I7acb0645402611875c481aec33ece85fced7a336
/system/core/rootdir/init.rc
|
4e803c3c18ad6a0cebbb16e2cf623a174f5201e1 |
|
10-Oct-2011 |
Wink Saville <wink@google.com> |
Merge "Add log group to rild to improve log collection on modem issue"
|
65c4df51f895b79fc599d3bfa796ddfc660d47e4 |
|
07-Oct-2011 |
Jeffrey Tinker <jtinker@google.com> |
Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls Bug 4598045 Implementing secure video path on TI OMAP4 chip for ICS Change-Id: Iacfe3e79f067172085b96bb4cd4484101aa5be1e
/system/core/rootdir/init.rc
|
e65e946382033a94f99f0f05678bb1e6329e3182 |
|
29-Sep-2011 |
Kazuhiro Ondo <kazuhiro.ondo@motorola.com> |
Add log group to rild to improve log collection on modem issue Add log group to ril-daemon service. rild is the best place to know the issue on the modem in many time. It would be helpful if rild alone can capture the snapshot of logcat buffers at the moment of problem. Change-Id: Ie0dcda126fb748a00e650427de35541672359287
/system/core/rootdir/init.rc
|
8e3ff70444ac919d0b70eaa1fbe97a3ef5bdb9ef |
|
12-Sep-2011 |
JP Abgrall <jpa@google.com> |
init.rc: allow all users to open the qtaguid misc dev The netfilter xt_qtaguid module uses a misc dev so that processes that use the module can be tracked. Every process that does socket tagging must open that dev. Change-Id: I6af3e0f0180637b14455dd9607724523f142c402
/system/core/rootdir/init.rc
|
1ac40f4ef18799e252115d9c9ad17396ffb68f3d |
|
08-Sep-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Increase the window sizes on wifi and lte. Set to 524288,1048576,2097152, 262144,524288,1048576. bug:5226360 Change-Id: Id9d4257c51a355d78246b4ca59ab462fbe5b72be
/system/core/rootdir/init.rc
|
ca47cef7491caf6072984d9d64c768717baad09a |
|
25-Aug-2011 |
Dima Zavin <dima@android.com> |
init: add charge mode handling Introduces a 'charger' section that is processed when androidboot.mode supplied on the kernel commandline is "charger". In this mode, sections such as fs, post-fs, etc are skipped. Only the 'early-init' and 'init' sections of the init rc files are processed before processing the 'charger' section. Change-Id: If9eb6334de18f04cbcf2aab784578e2993615242 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
85e37b0a81f2f24f223c8917db69221779f0d2b0 |
|
18-Aug-2011 |
JP Abgrall <jpa@google.com> |
init: allow mediaserver to tag socket (group net_bw_acct) The mediaserver needs to do communication on behalf of other apps (browser, ...). It needs to be able to tag sockets. The kernel will check for net_bw_acct group membership. Change-Id: I7fb063fdb7d9435d7f979df6622ff17f34049cbc
/system/core/rootdir/init.rc
|
d09196d00cb5bf3bffb22d3aae45c8797f1ddf4c |
|
08-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Merge "Activity Manager now takes care of setting OOM values."
|
a24687197d69ac677d176dbc41d5cfd65d1afc44 |
|
08-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: add inet permission to VPN daemons explicitly. Racoon still needs it after dropping root privilege, or pure IPSec VPN will fail. Mtpd works without it because net_raw implies inet. However it would be better to set all of them clearly without the assumption. Change-Id: I50762af2c25ec9cc559e528c7b14f469494fd553
/system/core/rootdir/init.rc
|
06787f4089093fed8a01ec3a3d2092e10919b77e |
|
08-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Activity Manager now takes care of setting OOM values. All init needs to do is make these files writeable so that the activity manager can set them. Change-Id: Ieea43208fadc01504d813be379aecbafcadf0d34
/system/core/rootdir/init.rc
|
7804cbf4833cba82bd38f6adaf567bcb8262c3ad |
|
29-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
Move some common USB configuration logic to init.rc Change-Id: Ib75ccfd9c4aa8aace936370c33f33a922ca3c51f Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
3507616870acd71bbd26e045528b0cfe716d37cd |
|
24-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Fix issue 4604090: notification sound interrupted. Removed system from mediaserver groups. Not needed anymore now that AudioFlinger acquires wake locks via PowerManagerService. Change-Id: I177b968a0a30557d871188bf3991b96d9b391d3c
/system/core/rootdir/init.rc
|
4a2b0fcd6e166499fe51e920aca5f9640dd05939 |
|
15-Jul-2011 |
Conley Owens <cco3@android.com> |
am aa4a66a1: am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache." * commit 'aa4a66a16dd9b97fb876bb296366442b8745a10b': Create world readable, system writeable /data/resource-cache.
|
aa4a66a16dd9b97fb876bb296366442b8745a10b |
|
15-Jul-2011 |
Conley Owens <cco3@android.com> |
am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache." * commit '1e5e2d7673a9ea915283f6626fa692cc169b0e67': Create world readable, system writeable /data/resource-cache.
|
56286d6fdb07d8b1310c27eeb59bdf05500f166e |
|
11-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "init: update permissions for VPN."
|
9bb4d411e01c8e6330b5c27c489485592360576b |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: update permissions for VPN. VPN no longer uses system properties to keep network parameters. Besides, profiles are now stored and encrypted by keystore. Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/rootdir/init.rc
|
50d9819ef49c2d557ad0b33a7880a7a3b72e3fb8 |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "init: clean up init.rc as now mkdir handles EEXIST."
|
ea7441415997faf34f7ae44f462f916f5f7ea0df |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: clean up init.rc as now mkdir handles EEXIST. Change-Id: I3fa2a618ef27197315fc128738a284ac644e86c0
/system/core/rootdir/init.rc
|
f48fd5d403d77c4586ad0e715affd601a0934334 |
|
07-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Temporary workaround for issue 4604090 There was a regression caused by a change in Honeycomb that removed mediaserver process from system group to improve security: This prevents the audio HAL (which runs in mediaserver process) from taking wake locks while audio is playing thus causing the pcm stream to get unexpectedly suspended. This temporary workaround is just to allow ICS dogfood in better conditions until a real fix taking into account the security issue is implemented. Change-Id: Ic19a23da4b4383559188b6f5c3a82604c3d95d74
/system/core/rootdir/init.rc
|
e89675584df1f02dd4642585493a19ac3e691bc5 |
|
07-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "init.rc: Allow system process to configure RNDIS USB ethernet address"
|
64416c816cbe1161a09d6e6a65732399fac4e3ca |
|
06-Jul-2011 |
Mathias Agopian <mathias@google.com> |
Merge "don't restart surfaceflinger when the window manager dies"
|
9350a00ce65a6425ba4566fe943c954373240f6c |
|
06-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
init.rc: Allow system process to configure RNDIS USB ethernet address Change-Id: Id339d8359e592dbc1279e423d9a5adc3a775949d Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
b4daef45310891d550ea9cfb89ab4bf5b3e15ef5 |
|
02-Jul-2011 |
Mathias Agopian <mathias@google.com> |
don't restart surfaceflinger when the window manager dies Change-Id: Ia3c60e6c5471e2b72d53c936de44b730c68095e0
/system/core/rootdir/init.rc
|
856f63c0df9cd4e8783ca65140fe386e3a98a274 |
|
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Merge "Revert "Add keychain user""
|
1c9a996c50e096eb9f54dc806aae6d82fa3cc2e8 |
|
20-Jun-2011 |
Eino-Ville Talvala <etalvala@google.com> |
Add mobile filter framework library into the bootclasspath. Change-Id: Ia9ae45de5d58ba5e98821fd04add96c6062c1a18
/system/core/rootdir/init.rc
|
04918930236981a6d2a096a73854caa96cb94bda |
|
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Revert "Add keychain user" This reverts commit 6541ef1562ccf93e498d653598330a7fc80ad2b2. Bug:4970237 Change-Id: I23a90eb89c1d19893d2ba7065fc624c0521cb06e
/system/core/rootdir/init.rc
|
9d94942bcd6347d6ee8524b23bc94b95ba32d8e0 |
|
27-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
am 6a18a077: am 04cf629b: Move RILD to class main * commit '6a18a07774123c409cefd9a92f1c4c6504f4edfd': Move RILD to class main
|
04cf629be5e99a3a920aecc0b059444bd07e9d84 |
|
24-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
Move RILD to class main -- This is needed so the modems (LTE & CDMA) are powered on and running before unlocking encrypted devices Change-Id: I842f5286499fd76abc554ded550fb837d12b324e
/system/core/rootdir/init.rc
|
535164e9d9649a83d4d63829f3389f2bea339fe1 |
|
22-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
Reimplement the "adb root" command to more closely match its previous behavior The adb gadget driver used to reset the USB bus when the adbd daemon exited, and the host side adb relied on this behavior to force it to reconnect with the new adbd instance after init relaunches it. The new gadget drivers no longer automatically reset the USB bus when adbd is restarted which caused adb to hang since it was no longer forced to reconnect with the device. We attempted to work around this on the host side adb, but that work around has not been reliable. This change adds a property trigger on the service.adb.root system property which will reset the USB bus and restart the adbd daemon when adbd sets the property to 1. This should be much closer to the previous behavior and will hopefully fix some problems with automated testing. Change-Id: I177c37400009a3d83f21a5f9431f94fd1cc19b9b Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
352dfdfaea55601f2c36fe7286a158e84028bcf3 |
|
09-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
init.rc: Changes for new USB gadget drivers Change-Id: I68fcf167c9fc71bb5f44793648a35d3181fd36d7 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
b45280d259c5036dd066782d725c55284c7dae90 |
|
30-May-2011 |
MÃ¥rten Kongstad <marten.kongstad@sonyericsson.com> |
Create world readable, system writeable /data/resource-cache. /data/resource-cache is used to store idmap files. Change-Id: I9b1dbc8d607333b71c05f55a4a402ae92193c36c
/system/core/rootdir/init.rc
|
2b8f76cdbb254ac1170087a40dbf30b7627f3516 |
|
05-May-2011 |
jeffhao <jeffhao@google.com> |
Tracking merge of dalvik-dev to master Reordered bootclasspath to allow verification of all framework methods. git cherry-pick --no-commit ec164a0170955fe63106c2576a65bc4ffb1df425 Address CVE-2011-1090. git cherry-pick --no-commit 3365288d3c00072689cd9d733e055561cadc87b5 Change-Id: I6a89bc600ced06a0cb84ae1670cb7a6ea39de9c8
/system/core/rootdir/init.rc
|
a31a3511825375177d26ab27067352c2c8f42038 |
|
05-May-2011 |
Brian Carlstrom <bdc@google.com> |
Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6) frameworks/base Adding IKeyChainService APIs for CertInstaller and Settings use keystore/java/android/security/IKeyChainService.aidl libcore Improve exceptions to include more information luni/src/main/java/javax/security/auth/x500/X500Principal.java Move guts of RootKeyStoreSpi to TrustedCertificateStore, leaving only KeyStoreSpi methods. Added support for adding user CAs in a separate directory for system. Added support for removing system CAs by placing a copy in a sytem directory luni/src/main/java/org/apache/harmony/xnet/provider/jsse/RootKeyStoreSpi.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStore.java Formerly static methods on RootKeyStoreSpi are now instance methods on TrustedCertificateStore luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java Added test for NativeCrypto.X509_NAME_hash_old and X509_NAME_hash to make sure the implementing algorithms doe not change since TrustedCertificateStore depend on X509_NAME_hash_old (OpenSSL changed the algorithm from MD5 to SHA1 when moving from 0.9.8 to 1.0.0) luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java Extensive test of new TrustedCertificateStore behavior luni/src/test/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStoreTest.java TestKeyStore improvements - Refactored TestKeyStore to provide simpler createCA method (and internal createCertificate) - Cleaned up to remove use of BouncyCastle specific X509Principal in the TestKeyStore API when the public X500Principal would do. - Cleaned up TestKeyStore support methods to not throw Exception to remove need for static blocks for catch clauses in tests. support/src/test/java/libcore/java/security/TestKeyStore.java luni/src/test/java/libcore/java/security/KeyStoreTest.java luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java Added private PKIXParameters contructor for use by IndexedPKIXParameters to avoid wart of having to lookup and pass a TrustAnchor to satisfy the super-class sanity check. luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/IndexedPKIXParameters.java luni/src/main/java/java/security/cert/PKIXParameters.java packages/apps/CertInstaller Change CertInstaller to call IKeyChainService.installCertificate for CA certs to pass them to the KeyChainServiceTest which will make them available to all apps through the TrustedCertificateStore. Change PKCS12 extraction to use AsyncTask. src/com/android/certinstaller/CertInstaller.java Added installCaCertsToKeyChain and hasCaCerts accessor for use by CertInstaller. Use hasUserCertificate() internally. Cleanup coding style. src/com/android/certinstaller/CredentialHelper.java packages/apps/KeyChain Added MANAGE_ACCOUNTS so that IKeyChainService.reset implementation can remove KeyChain accounts. AndroidManifest.xml Implement new IKeyChainService methods: - Added IKeyChainService.installCaCertificate to install certs provided by CertInstaller using the TrustedCertificateStore. - Added IKeyChainService.reset to allow Settings to remove the KeyChain accounts so that any app granted access to keystore credentials are revoked when the keystore is reset. src/com/android/keychain/KeyChainService.java packages/apps/Settings Changed com.android.credentials.RESET credential reset action to also call IKeyChainService.reset to remove any installed user CAs and remove KeyChain accounts to have AccountManager revoke credential granted to private keys removed during the RESET. src/com/android/settings/CredentialStorage.java Added toast text value for failure case res/values/strings.xml system/core Have init create world readable /data/misc/keychain to allow apps to access user added CA certificates installed by the CertInstaller. rootdir/init.rc Change-Id: I768ca8e8e990ff333ce0f7069a0935173498c5ed
/system/core/rootdir/init.rc
|
f642c3d12f4cffdc349b9ebfc4107de254ad8db9 |
|
17-Mar-2011 |
Jeffrey Tinker <jtinker@google.com> |
Make drmserver's primary group be system, so setgid is not required in ueventd.stingray.rc Change-Id: Ie8a287620d22b5c1bdc459fb288b7403589ab474
/system/core/rootdir/init.rc
|
cfce2826780dc1c4811619b89ba8d358e3f30f11 |
|
14-Mar-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 4089635 mediaserver fewer supplementary groups Change-Id: I90111567564397ca08e87dcfcbdf23337bf79ae6
/system/core/rootdir/init.rc
|
b7b770dd76d664b1e44adb2f98b8caf594f6d3c8 |
|
11-Mar-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 4086255 drmserver process needs system group Change-Id: If9a325b9e716abe00f3ad6f20b012861308abd2d
/system/core/rootdir/init.rc
|
5db0897c6530502e1343a75b258868122030e4a5 |
|
11-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Load the persistent properties after decrypting the /data partition" into honeycomb-mr1
|
c5c51033c86353d1a448c72e0e9388906eed7114 |
|
09-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Load the persistent properties after decrypting the /data partition Fix for bug 3415286. The persistent properties are normally read early in the boot process after /data is mounted. However, for an encrypted system, at that point /data is a tmpfs ramdisk. This change adds a new command to init (load_persist_props) to read the persistent properties, and adds an action to init.rc to load the persistent properties. This action is triggered by setting a property in vold, but that's in a different CL. Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/rootdir/init.rc
|
a40481b2cc604b8b278d509f120cf496c4c318f2 |
|
04-Mar-2011 |
Mathias Agopian <mathias@google.com> |
Run surfaceflinger in its own process. [DO NOT MERGE] This is to allow OpenGL ES rendering from the system process, and help with debugging. Bug: 4086003 Change-Id: I732e95f4fcaa358f430cc195d8e63a69263bffdc
/system/core/rootdir/init.rc
|
9ac8484e0b677802474e2fd73edb9cbac02d98a6 |
|
08-Feb-2011 |
Ying Wang <wangying@google.com> |
Merge "Reorder BOOTCLASSPATH to match change 7eff81df2a"
|
04e5232ac2b3fc87596c6d82c07c667e52e2d7c2 |
|
08-Feb-2011 |
Ying Wang <wangying@google.com> |
Reorder BOOTCLASSPATH to match change 7eff81df2a Bug: 3385161 Change-Id: I8bb91753c02c031c32ab0070dd424a6ac859311a
/system/core/rootdir/init.rc
|
b03afaafb542e84a6ae9b09d89f7eb3a9d1ccf7a |
|
03-Feb-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Bug 3381298 Remove old /data/drm/plugins/native"
|
63e99f447fed821b57f3f13e33abd740b3b04c03 |
|
30-Jan-2011 |
Rebecca Schultz Zavin <rebecca@android.com> |
am e442cff0: am 58fb8220: Raise the viking killer min free values to match the system properties * commit 'e442cff05ff9f083c91caa3bed74e37318a69fda': Raise the viking killer min free values to match the system properties
|
58fb822024a04641d5ca1d0341456a2706aee853 |
|
29-Jan-2011 |
Rebecca Schultz Zavin <rebecca@android.com> |
Raise the viking killer min free values to match the system properties Change-Id: Idcbdb106d704ef63c9a44e635b6e995e0e5f6479 Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
/system/core/rootdir/init.rc
|
24823cfa84d1a4dcb719c1949092facf8c92804a |
|
29-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am fee2cfb0: am 9efdcd96: Fix issue #3401380: Raise OOM killer limits * commit 'fee2cfb01165f6797d783c6a8c0b1fba4f591355': Fix issue #3401380: Raise OOM killer limits
|
9efdcd969ed03cfbe8cfa692b8adcc46d954914a |
|
29-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #3401380: Raise OOM killer limits Change-Id: Ia9c82e7d31b7f1b89bf9650ebea697d9b3a64506
/system/core/rootdir/init.rc
|
b81dfcb4f6275bf675e7afe64ccecc29c1b8c3ae |
|
23-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 3381298 Remove old /data/drm/plugins/native Change-Id: Ic299d328f2e04a65a9dce68909c7b83f3ac03b20
/system/core/rootdir/init.rc
|
328c0d4a89d7c04c829c587657b95b3241f64f60 |
|
23-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Bug 3361124 Remove drmioserver"
|
b29b33841bd2f5143e2705525bfc4f8a2d2b6316 |
|
20-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 3361124 Remove drmioserver Change-Id: Ie3b20b487c1466737921567ab2d043e230356bf4 Note: safe to re-use the drmio uid/gid as no files were ever created.
/system/core/rootdir/init.rc
|
852c13d1b2404e5a360375ae75291ac1a9dae026 |
|
20-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am afa099a1: am 3a159d62: Move rild to the late_start class * commit 'afa099a1909c02196574d125d735adb0c8918392': Move rild to the late_start class
|
3a159d62a9d771f2a2d38129f1db56d873598696 |
|
20-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the late_start class Now that rild can be killed in a reasonable amount of time, move it from the core class to late_start. I was going to move it to main, but it would get killed and restarted right after the disk crypto password was entered, which is when the late_start class is started, and I was seeing issues with rild not re-connecting to the network when it was killed and restarted. Change-Id: I60479ddb853953029890fc816538d615ef5a96ab
/system/core/rootdir/init.rc
|
701d40f721573c5c9e0b45b59a383e04c582f6d0 |
|
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 383b76f8: am e4349157: Add a new trigger to support a progress bar UI for encrypt in place. * commit '383b76f86af48d4a1a502d7767ab79f024483864': Add a new trigger to support a progress bar UI for encrypt in place.
|
e434915787c38a6d84e1058044fed3be2ed02235 |
|
17-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Add a new trigger to support a progress bar UI for encrypt in place. Change-Id: I6a14eb43462505cb7fecfee9fd1ecdea50065963
/system/core/rootdir/init.rc
|
30d5d038a94b09bd906d8a07a9c4b79640d36c2e |
|
14-Jan-2011 |
Jesse Wilson <jessewilson@google.com> |
Move apache-xml to external. (project 4 of 4) Change-Id: I8e1ea723481ae6d8e609563331c187576f306bce http://b/3351604
/system/core/rootdir/init.rc
|
63990cf56fc64033c0382ac19a3ffba7f525fb30 |
|
13-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Move rild to the core class." into honeycomb
|
a02714bd3e8e75298c6e684ef375407fe02dd9b0 |
|
11-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the core class. Changes in init.stingray.rc now prevent rild from making sockets or named pipes on /data. Now that rild no longer prevents /data from being unmounted, we can put it in the core class, which doesn't restart when we enable encryption. This speeds up the boot by 20+ seconds. Change-Id: I737baf804e089f4ddbd664eaa1e675a7bd62e699
/system/core/rootdir/init.rc
|
f3c42b6ee4f0bb042cf93e1ac6c9c4d72e1558fa |
|
11-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the core class. Changes in init.stingray.rc now prevent rild from making sockets or named pipes on /data. Now that rild no longer prevents /data from being unmounted, we can put it in the core class, which doesn't restart when we enable encryption. This speeds up the boot by 20+ seconds. Change-Id: I71c426dab1b725e401116234167d41c7ccd958c1
/system/core/rootdir/init.rc
|
a44aca6580b6f39459195275f4631682410aae4b |
|
11-Jan-2011 |
Gloria Wang <gwang@google.com> |
Temporarily disable the drm service. do not merge Change-Id: I5cb04a9c2cc5b95443c6c0ea77132a4102ca47fc
/system/core/rootdir/init.rc
|
60b5b408cfcac450ce0cc56952d3b1c087b25428 |
|
07-Jan-2011 |
Gloria Wang <gwang@google.com> |
To remove drm service from groups of "system" and "root". Change-Id: Ieac11c667c72465f7082baab0787dc740797049f
/system/core/rootdir/init.rc
|
a2a1f3149fb32d95bc81ddfd713d5bba9d6cbc61 |
|
27-Oct-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Let SocketClient users write binary data to clients. This is a dependency for the DNS proxy CLs. This CL also adds a new socket for the netd process to inherit which is owned by the inet group. (so only apps with the INTERNET permission can use the DNS proxy...) Change-Id: I8a51924e0ed56c6066f77e6f1b02d39bdadac51e
/system/core/rootdir/init.rc
|
752923c168009d03e9e00e590155fbd0a2880ccb |
|
04-Dec-2010 |
Ken Sumrall <ksumrall@android.com> |
Changes to init to support encrypted filesystems. These are the changes to init and init.rc necessary to support booting with and encrypted /data filesystem. A corresponding change to init.<device>.rc goes along with this change. Change-Id: I0c7e2cc39568358014a82e317735c0eae14dd683
/system/core/rootdir/init.rc
|
333f24bfbd9eea1347f20c2e88c5c1565b84aafe |
|
10-Dec-2010 |
Nick Kralevich <nnk@google.com> |
don't run services with gid=0 Ensure that we drop privileges for servicemanager and drmioserver. These should not be running with gid=0. Bug: 3275526 Testing: Applied change and successfully rebooted the device. No obvious bugs. Change-Id: I782fbda812cb88e0a365788b45b3b32894623177
/system/core/rootdir/init.rc
|
1612425c50d2728542cac607fc71a4c8781bf1df |
|
13-Dec-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove services for adding SDP records. This was an inefficient way of doing things and was temporary. There are now direct calls to Bluez to add reserved SDP records. This improves connection time after turning on BT by 6-8 secs. Change-Id: I8750f44e1de73c9cc935d68710b8964e3f50c3a6
/system/core/rootdir/init.rc
|
6388cfe03c1d5695d7cabe244b031af02ef686a8 |
|
08-Dec-2010 |
Iliyan Malchev <malchev@google.com> |
Revert "HACK: slow_start for mediaserver to prevent restart race condition" This reverts commit 9db7945ed2f9eb5756aa0c1e5e72fa6240f74847.
/system/core/rootdir/init.rc
|
9db7945ed2f9eb5756aa0c1e5e72fa6240f74847 |
|
05-Dec-2010 |
Paul Eastham <eastham@google.com> |
HACK: slow_start for mediaserver to prevent restart race condition Change-Id: Ia76385612fd127c5f11b3d64205e350f27acfd82
/system/core/rootdir/init.rc
|
d49b4ef51eeba026e77f51e9c454464d0c5b9cd9 |
|
19-Nov-2010 |
Mike Lockwood <lockwood@android.com> |
init.rc: Allow console in userdebug builds Change-Id: Ib5734c6d3e2bf5a9da3d44721c529971f2345120 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
4640fc0504ec69446b00dfb7ffcca48b085bf916 |
|
26-Oct-2010 |
Gloria Wang <gwang@google.com> |
Create directory for DRM plug-ins. Change-Id: I1bfef96b1949f288852cd88222e0ce2bbb186f40
/system/core/rootdir/init.rc
|
a215823fc92d6c0f8623fe18a407d9853aef87cf |
|
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
am b7171987: am b4d65399: disable console in user builds
|
b7171987382b768466a472c4c5f84cc496c95aea |
|
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
am b4d65399: disable console in user builds
|
b4d65399fde02280b718e3b5b5cb1464a885c4b0 |
|
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
disable console in user builds Also, run console as shell/log instead of root/root. Change-Id: I6104f1edddfd5e11843ff41d7839d0c296e6a6f9
/system/core/rootdir/init.rc
|
8c5669f9f9a228efebf4059fd4ceace5cece578b |
|
27-Oct-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Let SocketClient users write binary data to clients. This is a dependency for the DNS proxy CLs. This CL also adds a new socket for the netd process to inherit which is owned by the inet group. (so only apps with the INTERNET permission can use the DNS proxy...) Change-Id: Ic3475c697913ba85805b4e49801b65e7a1d59289
/system/core/rootdir/init.rc
|
98b1378606780c28501708ca02560c82bb1fda53 |
|
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
am f3c29f0c: am 5988ea72: add sdcard access permission to ril daemon Merge commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6' * commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6': add sdcard access permission to ril daemon
|
f3c29f0cf287ec3d329b012a2d48808b064632f6 |
|
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
am 5988ea72: add sdcard access permission to ril daemon Merge commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6' into gingerbread-plus-aosp * commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6': add sdcard access permission to ril daemon
|
5988ea726e91fbdc69485b729ea2f532fedfa1d6 |
|
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
add sdcard access permission to ril daemon Some RIL daemons write crashdumps to sdcard. Change-Id: I49a8d2cb342fd7f8bd23dbb1bcc378726e10a579
/system/core/rootdir/init.rc
|
d7482b2f4cdd6a35f8707d94536801a958120b6b |
|
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 33357f54: am 6490257d: Make netd restart when system server hangs on it. Merge commit '33357f5477a24cb16bd3dd692fe5ca14755ab033' * commit '33357f5477a24cb16bd3dd692fe5ca14755ab033': Make netd restart when system server hangs on it.
|
33357f5477a24cb16bd3dd692fe5ca14755ab033 |
|
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 6490257d: Make netd restart when system server hangs on it. Merge commit '6490257d116c35d3da927ee7b91179dde64ef713' into gingerbread-plus-aosp * commit '6490257d116c35d3da927ee7b91179dde64ef713': Make netd restart when system server hangs on it.
|
6490257d116c35d3da927ee7b91179dde64ef713 |
|
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Make netd restart when system server hangs on it. netd has been seen hanging (cause suspected but unconfirmed) which then brings down the system server which blocks forever on its main thread trying to connect to netd with its hung event loop. This then results in an infinite watchdog runtime restart loop because the situation never improves: netd is still borked. Instead, we should kill netd and give it another chance when the system server dies. Bug: 3018996 Bug: 3017876 Change-Id: Ibf9ecf0ffcb78e48c38e5167f21cbeefe0e2a47f
/system/core/rootdir/init.rc
|
d06df51bcd7bcc2656089a529fa6a455bad00d37 |
|
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
resolved conflicts for merge of 3b5214a6 to master Change-Id: Id73c53c6c2e9c21eb9b1d1e624aaeb25097ea7a4
|
3b5214a67f43e2e4f69428e98d3a2c130c7c87d8 |
|
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 02863b95: add /vendor support Merge commit '02863b957cfbfc302d3136ed78c0cba86accacd8' into gingerbread-plus-aosp * commit '02863b957cfbfc302d3136ed78c0cba86accacd8': add /vendor support
|
02863b957cfbfc302d3136ed78c0cba86accacd8 |
|
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
add /vendor support - look in /vendor/firmware/... in addition to /system/etc/firmware/... for firmware loading - add /vendor/bin to path before /system/bin - add /vendor/lib to ldpath before /system/lib - configure appropriate permissions for /system/vendor/bin - symlink /vendor -> /system/vendor Change-Id: I0c06ca1e38a44f0c7024cee6cea8907aa93a4532
/system/core/rootdir/init.rc
|
a5220b24d1b17b142e373aacbadf79a00effbbf0 |
|
10-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 26ce6e0e: manual merge from readonly-korg-master Merge commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1' * commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1': - Add drm and drmio service
|
26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1 |
|
10-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
manual merge from readonly-korg-master Change-Id: Id17f69d22fbbc84578be5aadd5e8e906ff0eb548
|
e6d8a5f1dfb81113b9421ea353915cde426023ed |
|
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 8df3a4a5: am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread Merge commit '8df3a4a554184afba71887995c5f0983ce81196f' * commit '8df3a4a554184afba71887995c5f0983ce81196f': remount / as read-only only on post-fs to allow per-target config of /
|
56de7a1263431819ff9a53dcd9e8e3306149ed99 |
|
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
remount / as read-only only on post-fs to allow per-target config of / Change-Id: Ia89dd2021e0f960201b4cee573227f0addd48431
/system/core/rootdir/init.rc
|
f2af88e81af5efb2d585963507f798d5a8b93d67 |
|
05-Aug-2010 |
Brian Carlstrom <bdc@google.com> |
Tracking merge of dalvik-dev to gingerbread git cherry-pick --no-commit b99a099c git cherry-pick --no-commit 9811671e023ceb82029040f7acf599013c773e6b git cherry-pick --no-commit d0645bf0cc76ef7be11cf77a8e1995233a1972e4 Change-Id: Ie70fecaeaba97a25f114cd2717e381b5107533b1
/system/core/rootdir/init.rc
|
e572d596b3715198fb48b3d8cef4939a71d58db2 |
|
27-Jul-2010 |
aimitakeshi <aimitakeshi@gmail.com> |
- Add drm and drmio service - Add /data/drm directory for storing DRM related data Change-Id: Ifd8922a3de109dbf5cd3f9cabbf4e5689b16c1d7
/system/core/rootdir/init.rc
|
f848a429dde741742988e2365d257058d57acbf8 |
|
15-Jul-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 3cac9cb3 to master Change-Id: I86b5173ad49522eae082bf2a3d096dbfb5240129
|
c7858a3dde9db1c4cf2563a4388f422ff1bcb334 |
|
15-Jul-2010 |
Kenny Root <kroot@google.com> |
Add directories for OBB mounting Change-Id: Ib73e9bca50fb168ab5d147cc260666a770092961
/system/core/rootdir/init.rc
|
d0645bf0cc76ef7be11cf77a8e1995233a1972e4 |
|
30-Jun-2010 |
Brian Carlstrom <bdc@google.com> |
updated BOOTCLASSPATH to track merge from dalvik-dev Change-Id: I10e6895ad3647dd789fe5fc7a7d37c4b71c61717
/system/core/rootdir/init.rc
|
a2dffa9db6c08c240e9511faee1c16fea535ef3e |
|
16-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
init.rc: Move SD card support to device specific init.rc files Change-Id: I5745e91df2b7c5722bd6e650931d3d2d7d0eadcb Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
c5947806740172e66c1fd5259e86bc5543d873ac |
|
11-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
am 0c6672c6: am 8b0ec20d: Update OOM adj levels. Merge commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c' * commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c': Update OOM adj levels.
|
8b0ec20d6f9636def6740085b203302c1680fa81 |
|
11-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Update OOM adj levels. This introduces some new buckets that will be used by the activity manager, and adjusts the default levels to match what we had been setting for Droid. It turns out Passion has been using the old levels, which makes no sense for how much memory it has. Also it is a problem with these definitions spreading to other projects for different devices, so I am going to update the defaults to be appropriate for our newer devices, and put here a file to tune them down for something like the sapphire. Change-Id: Ia4f33c4c3b94aeb3656f60b9222072a1d11e9e68
/system/core/rootdir/init.rc
|
f96e700b338e9a0edee6c2114cc7310f7be48bc4 |
|
03-Jun-2010 |
Christopher Tate <ctate@google.com> |
am 25e7b8fc: am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
|
25e7b8fcc3708b58736c7825ecf612d04020716e |
|
02-Jun-2010 |
Christopher Tate <ctate@google.com> |
am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable Merge commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163' into kraken * commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163': Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
|
230cb33fd1ab335c6f808c72db891993b00110a0 |
|
02-Jun-2010 |
Christopher Tate <ctate@google.com> |
Make /proc/kmsg and /proc/sysrq-trigger system-process-readable This is so that the system process can capture kernel thread stacks when the watchdog detects a deadlock. Previously, /proc/kmsg was root/root and mode 0400, and /proc/sysrq-trigger was root/root and mode 0200. With this change, /proc/kmsg becomes root/system and 0440, and /proc/sysrq-trigger becomes root/system and 0220. Change-Id: Iac46bd10bd11d495024afeb5d693107ce5074791
/system/core/rootdir/init.rc
|
9811671e023ceb82029040f7acf599013c773e6b |
|
05-May-2010 |
Jesse Wilson <jessewilson@google.com> |
Moving junit out of core.jar and into core-junit.jar. Change-Id: I603cba084c06ddbec21fc88bbaab7cde96952cb1
/system/core/rootdir/init.rc
|
f83d0b9af5cbe4440cc41ceaa8a7806a13c86282 |
|
21-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move uevent handling to an external ueventd process Change-Id: Iea6c56013062ade633a1754f7bcf8cf09b3dedc1
/system/core/rootdir/init.rc
|
31712beaf7de127a1249b909cdefffbc25fff076 |
|
09-Apr-2010 |
Colin Cross <ccross@android.com> |
Move filesystem mounting into a new "fs" init level Devices with non-MTD storage need to override the filesystem mounting commands in init.rc. Moving them to a new "fs" init level allows a custom init.<device>.rc to handle the mounting. Change-Id: If0e655139b9734650fb798b6eb0a90e2241fc29b
/system/core/rootdir/init.rc
|
c741f22d8533226ce60903649a7a57b3f05a65af |
|
24-Mar-2010 |
Nick Pelly <npelly@google.com> |
Add NET_RAW to mediaserver so that it can open a raw HCI socket to configure BT chip. Change-Id: I22065b313c7af28b4791c74ea3d403a628738102
/system/core/rootdir/init.rc
|
bbf3ea46fb6df3b666cb66a09104d3a7694926dc |
|
13-Mar-2010 |
Jean-Baptiste Queru <jbq@google.com> |
cleanup init.rc Change-Id: I7f7fefd61c6032c84fa63e597ea0e6bbe66d2e79
/system/core/rootdir/init.rc
|
89f235c5e028466bb273dbaacb3346f1f0ba9f1e |
|
01-Mar-2010 |
Mike Chan <mike@android.com> |
init.rc: Add cpuacct to cgroup mount for cpu statistic Cpu accounting statistics expored in /acct Change-Id: I8a35816e94b69d9e67a3dd65aae16520864777d7 Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
|
b91bf4ba864a392412397913ee09a8c1f2e7cc87 |
|
27-Feb-2010 |
San Mehat <san@google.com> |
Revert "init.rc: Add cpuacct to cgroup mount for cpu statistics" This reverts commit a7d88224ff7283c210c25ce6d57239b4053b5f14. This cgroup subsys should be mounted on it's own mount-point, since it's addition to /dev/cpuctl causes the cpu subsys to EPERM
/system/core/rootdir/init.rc
|
a7d88224ff7283c210c25ce6d57239b4053b5f14 |
|
26-Feb-2010 |
Mike Chan <mike@android.com> |
init.rc: Add cpuacct to cgroup mount for cpu statistics Change-Id: Ic1893e1bf7b2c45659419b0bc55d42f50d030c9f Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
|
f0cb74e3b07d5de49dc875f8405e21d2a102e749 |
|
26-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Enable I/O priorities for media server and vold Sets the media-server to class 'real-time' pri 4, and vold to class 'best effort' pri 2 Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
eafdd86f4d8f4ccc69f0c16550c65aa392f678d6 |
|
08-Jan-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Update bluetooth data files path.
/system/core/rootdir/init.rc
|
a9db22f1228996d8f81e4f4903fa5c598a606fbd |
|
24-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Add 'ASEC_MOUNTPOINT' environment variable. Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
bbfe1368d909be470f919b2349a974bee8dd0a9c |
|
17-Feb-2010 |
Chia-chi Yeh <chiachi@android.com> |
Remove dead services from init.rc.
/system/core/rootdir/init.rc
|
6ea3cc6089393286ab8b6cc459cfa9d7e58fc203 |
|
20-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Create secure staging directories, and a compat symlink Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
55a1f0827be9920b093152cffb6eddd613d04bc9 |
|
27-Jan-2010 |
Vasu Nori <vnori@google.com> |
dont create sqlite_stmt_journals dir. this shoudl not be required any longer. in fact, some test-writers are abusing this dir.
/system/core/rootdir/init.rc
|
92175e04a56db804d4dae75fc49fdd5edc6a2968 |
|
17-Jan-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Fix typo in chown of /dev/cpuctl Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
192277c0154eff542ddbce27d7c35995c0671748 |
|
15-Jan-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Add netd to startup services list Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
1851d80959bd314af730451ebfb2a5e00bb0a83a |
|
07-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Adjust perms on /asec Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
d0aa32c3d99aeb0e6949ab1c4fae83283a946567 |
|
06-Jan-2010 |
Oscar Montemayor <oam@google.com> |
Apps on SD project. Small change to support apps on SD file system key storage.
/system/core/rootdir/init.rc
|
900570e2a833bde0683cce5254d9dc102509cabc |
|
06-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Create a small tmpfs on /asec so we can create mountpoints Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
37c71dd9a7f488563c97fdca88cca701e2962e45 |
|
04-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Add new /asec mount point Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
37c586e6b11138beab400d1208183d49c12a9ef2 |
|
03-Dec-2009 |
Oscar Montemayor <oam@google.com> |
Encrypted File Systems Project. Temporarily creating emulated encrypted directories manually. Will remove those lines once a true encrypted FS is mounted, and proper framework chanfes have been made. This is required for the feature to work with the other changes.
/system/core/rootdir/init.rc
|
7359c16a852c23740ef2874aa6b66f629d1473b7 |
|
24-Nov-2009 |
Dan Egnor <egnor@google.com> |
Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg -- it gets generated on every boot, so this is a bunch of writing for no particularly good reason.
/system/core/rootdir/init.rc
|
eb67fac4723892ac8ae3fae87c05e776c49029c5 |
|
20-Nov-2009 |
Doug Zongker <dougz@android.com> |
change /cache/recovery group to cache To unbundle system update, we need users other than system to be able to write the /cache/recovery directory.
/system/core/rootdir/init.rc
|
5e7db233004a0869125d0f2d64a9e747faf252da |
|
03-Nov-2009 |
Jean-Michel Trivi <jmtrivi@google.com> |
Make the RIL daemon part of the audio group so it can load region-specific acoustic parameters.
/system/core/rootdir/init.rc
|
831d8e1e3a08520369561087112ebf898e31704c |
|
13-Oct-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Adjust background dirty writeout policy Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d |
|
09-Oct-2009 |
Dan Bornstein <danfuzz@android.com> |
Force the mediaserver process to restart whenever the zygote or system server do. Change-Id: I16ce4ae656473055e7e244ccd4af7055959e3c1c
/system/core/rootdir/init.rc
|
14d898e0141287cd9d8991bea5b63650bb8f5145 |
|
09-Oct-2009 |
Rebecca Schultz Zavin <rebecca@android.com> |
Make vmallocinfo readable by group log so we can put it in bugreports Change-Id: I7b04795c029c51108132e7a9eaf46b97de06de6f Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
/system/core/rootdir/init.rc
|
aa7d97106abf8c390e1aed71f7c175fb77fead38 |
|
07-Oct-2009 |
Brian Swetland <swetland@google.com> |
init.rc: don't mount debugfs We'll do this in the product-specific init files.
/system/core/rootdir/init.rc
|
529520e8240e6865aca77ae9abf78dacbaa72e2c |
|
06-Oct-2009 |
San Mehat <san@google.com> |
Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support" This reverts commit 35ad5f41c39c5f3af7a8f00185a13366f4901e69.
/system/core/rootdir/init.rc
|
9b4f1ff210c449920890581b191da3568c10fbd1 |
|
18-Sep-2009 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: specify keystore directory and fix permissions.
/system/core/rootdir/init.rc
|
1320687bdb6df2de1c27fb03c827b69384d26f87 |
|
19-Sep-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove logwrapper for Bluetoothd. Change-Id: I6d16bc0dbdf9f3aff2080f8c7968ff3cb592811e
/system/core/rootdir/init.rc
|
bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4 |
|
19-Sep-2009 |
Brian Swetland <swetland@google.com> |
init.rc: mount debugfs for debugging - put it at /sys/kernel/debug so Arve will be happy - symlink /d to /sys/kernel/debug so Brian will be happy.
/system/core/rootdir/init.rc
|
35ad5f41c39c5f3af7a8f00185a13366f4901e69 |
|
16-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
7baff71b0d8fe320df9143b2fa59db0af1b7aa96 |
|
16-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: tweak cfs scheduler - disable child_runs_first Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940 |
|
11-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root Change-Id: Iff83310f9411c39e1833b3d710b029b12f702993 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
9332482ed2945174d94615f0720f88702cb92667 |
|
09-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Make /data/dontpanic files readable only by the system process. Change-Id: If87470b7bcbb1c0774d10296ac82605db3dd9bf0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
82a6014d90c94a2032e014901917e1d503475d5e |
|
06-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Allow all processes access to /data/dontpanic ***STOPSHIP*** Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
abe3a9c30595846b7e3d705dd4b0aca37fb2f748 |
|
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Add dumpstate service Change-Id: Iaf7094dd4693c47566c1acf860b750b762af840c Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
020f35f274594f55eec956fdcfec90ad3d7a5c65 |
|
02-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data. This is a temporary measure until bugreports are taken as root. *****STOPSHIP***** Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa |
|
01-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Clean up dump collection Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
21541872c3cdc93e60e18ba496715f8307f990b2 |
|
27-Aug-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Copy kernel crash dumps to /data and free kernel resources Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
6bc6794f97aa4368237f23c3d3f7cafd6a796bf3 |
|
07-Aug-2009 |
San Mehat <san@google.com> |
am ee40fc4e: rootdir: init.rc: Bump up background cpu shares to 5.0% Merge commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5' * commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5': rootdir: init.rc: Bump up background cpu shares to 5.0%
|
ee40fc4e64e1656a16603778bee895ea389ec7d5 |
|
06-Aug-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Bump up background cpu shares to 5.0% Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
630f5f049b53c8586cca5a1acb928f83332baef5 |
|
24-Jul-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Add Bluetooth PBAP service.
/system/core/rootdir/init.rc
|
d39e972831d45d4f8f8effd11691fd2c52d235c6 |
|
24-Jul-2009 |
Doug Zongker <dougz@android.com> |
am d52f54c4: install recovery image using patch mechanism Merge commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f' * commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f': install recovery image using patch mechanism
|
d52f54c4552d2f35b3c2c2ac60350ac83760222f |
|
24-Jul-2009 |
Doug Zongker <dougz@android.com> |
install recovery image using patch mechanism With the corresponding change in build/tools, the recovery image is installed via a shell script that is emitted by the OTA builder.
/system/core/rootdir/init.rc
|
b44aeb7b6ad8799c31d87a6304d20f41387081a7 |
|
15-Jul-2009 |
Nick Pelly <npelly@google.com> |
Add OPUSH to register obex server.
/system/core/rootdir/init.rc
|
3338e5511402c395d0f771e16f92a7a95c0cab82 |
|
09-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
am 48d116ed: init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf Merge commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67' * commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67': init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf
|
48d116edf9c785ed284626cbe0bbf5c958cf5e67 |
|
09-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf The touch command does not exist, and the chown commands are unnecessary because the system_server is in the WIFI group. Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
3bbaec5a7b7aea8a4e1bb5bde3e0b1d2bbc461c1 |
|
06-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
am eefef323: Set the permissions of wifi supplicant file so that system can access it. Merge commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa' * commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa': Set the permissions of wifi supplicant file so that system can access it.
|
91217ca5cbbf3ca2a96d596713e79f072da2c491 |
|
02-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 5c49135b: Merge change 5852 into donut Merge commit '5c49135b032235f82560d5e55b0e4c547506516b' * commit '5c49135b032235f82560d5e55b0e4c547506516b': rootdir: Modify init.rc to run mtpd/racoon as a non-root user.
|
eefef3234ae1e3b0f2db71415f134c7ec49899fa |
|
02-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
Set the permissions of wifi supplicant file so that system can access it. Create the required directories and set the correct owner and permissions.
/system/core/rootdir/init.rc
|
51afbf583819f3bdfc96f3c66c9c3444803e792a |
|
01-Jul-2009 |
Chia-chi Yeh <chiachi@android.com> |
rootdir: Modify init.rc to run mtpd/racoon as a non-root user. Note that this change requires a new prebuilt kernel for AID_NET_ADMIN.
/system/core/rootdir/init.rc
|
acc9a25ef745fce040e2e4e7adfa3d9e200aee99 |
|
30-Jun-2009 |
San Mehat <san@google.com> |
am 4322f2d7: init: Enable sched_yield() compatability mode on boot. Merge commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029' * commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029': init: Enable sched_yield() compatability mode on boot.
|
4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029 |
|
29-Jun-2009 |
San Mehat <san@google.com> |
init: Enable sched_yield() compatability mode on boot. In CFS, the (somewhat undefined) behavior of sched_yield() changed. See: http://kerneltrap.org/Linux/CFS_and_sched_yield This change enables 'compat' mode for sched_yield() Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
f1d63f3751ca787b2ebe76b6680342aa1ff3ca49 |
|
18-Jun-2009 |
San Mehat <san@google.com> |
am bfa2f8e9: init: Bump up the max cpu bandwidth shares ratio for background. Merge commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34' * commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34': init: Bump up the max cpu bandwidth shares ratio for background.
|
bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34 |
|
17-Jun-2009 |
San Mehat <san@google.com> |
init: Bump up the max cpu bandwidth shares ratio for background. New ratio is 1024/16 (1.5625% for background when cpu is under load) Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
6df2e9fc2e04fc1e908935190837675d6f7599a6 |
|
15-Jun-2009 |
Mike Chan <mike@android.com> |
am d709b582: remove 3G timeout values from init.rc, this should be device specific Merge commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56' * commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56': remove 3G timeout values from init.rc, this should be device specific
|
d709b582604e7f9d53b97f9ae13c5e12b2466c56 |
|
12-Jun-2009 |
Mike Chan <mike@android.com> |
remove 3G timeout values from init.rc, this should be device specific Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
|
6f5fb6fda101cac4208e4caecee0f70680e2d996 |
|
10-Jun-2009 |
San Mehat <san@google.com> |
am 3d6f16e5: init.rc: Set default cpu shares for background scheduler group to < 1% Merge commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919' * commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919': init.rc: Set default cpu shares for background scheduler group to < 1%
|
3d6f16e5edc9834b13a0bcc8a33c98e25518d919 |
|
10-Jun-2009 |
San Mehat <san@google.com> |
init.rc: Set default cpu shares for background scheduler group to < 1% Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
1d36696821cd81ed7b668bb9d2b0b8a43540ccd2 |
|
06-May-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Bluez4 changes Rename hcid to bluetoothd and change permissions.
/system/core/rootdir/init.rc
|
720f08f3ffb27084f2a9c98d661dae53d7191ebf |
|
09-Jun-2009 |
Dmitry Shmidt <dimitrysh@google.com> |
Add /config mounting point Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/system/core/rootdir/init.rc
|
1f75d709c10f49d2e2390b888e766bcfd17da860 |
|
01-Jun-2009 |
Chung-yih Wang <cywang@google.com> |
Add VPN and Keystore services and data directories. -- changed the default mode to 0770 for keystore with the new user 'keystore'. -- add the keystore service providing the basic key lookup/install/remove, but only keystore user can access the key content.
/system/core/rootdir/init.rc
|
17df71e0b277372de1d915c168c07c8877e82395 |
|
06-Jun-2009 |
Christopher Tate <ctate@google.com> |
Add an OOM adjustment category for apps undergoing backup In this initial commit, apps undergoing backup are treated equivalently to apps hosting services: more important than anything other than the foreground app.
/system/core/rootdir/init.rc
|
8b2cf9f04b924f299d2d250ae4d6826627847842 |
|
21-May-2009 |
Mathias Agopian <mathias@google.com> |
add bootanimation service to init.rc
/system/core/rootdir/init.rc
|
269946c09faaff88403289bcfa2519e994f75c21 |
|
06-May-2009 |
San Mehat <san@google.com> |
init.rc: Add Nexus to services (disabled for now) Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
4933098e22747a9066b5352273c38856b0203931 |
|
21-Apr-2009 |
San Mehat <san@google.com> |
cgroups: Initialize cgroups at startup. Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
01161168aa87ea9f1513d2b7b1232521c84e1ea4 |
|
26-Mar-2009 |
Nick Pelly <> |
Automated import from //branches/donutburger/...@142809,142809
/system/core/rootdir/init.rc
|
f614d64d4b4dfcd20c77ac3ccf2d9c9090a49303 |
|
19-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@140373
/system/core/rootdir/init.rc
|
e037fd7e193ecccbb5c0888e49f6d58c224bc11d |
|
13-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@138607
/system/core/rootdir/init.rc
|
2015549667fb77706a9879e974a3875ebccd8198 |
|
11-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137873
/system/core/rootdir/init.rc
|
e4749f30e5bd8cec727a6d7504b10fc80426316a |
|
09-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137197
/system/core/rootdir/init.rc
|
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/rootdir/init.rc
|
e54eebbf1a908d65ee8cf80bab62821c05666d70 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/rootdir/init.rc
|
35237d135807af84bf9b0e5b8d7f8633e58db6f5 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/system/core/rootdir/init.rc
|
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/system/core/rootdir/init.rc
|