History log of /system/core/include/private/android_filesystem_config.h
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
33e4f4d81a23fa501fe9f8cd22f657097fa3fe55 15-Jan-2015 Dmitry Shmidt <dimitrysh@google.com> android_filesystem: Remove setuid bits from tcpdump

Bug: 18669116

Change-Id: I25486f2fe0e994f569b788fc9f03ef6d383f54d4
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/system/core/include/private/android_filesystem_config.h
c692410e1607a39cd6d55f4be8164fc630d9772c 28-Aug-2014 Alex Light <allight@google.com> Change /dalvik-cache to be owned by root.

Bug: 16875245

(cherry picked from commit 3878ebd72493427ea5537b36dfb9cd7cb38677bb)

Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
/system/core/include/private/android_filesystem_config.h
b14ab71f0e7b08dfe0b4e23e0d1e7d28b3727efb 11-Jun-2014 Nick Kralevich <nnk@google.com> am 0487e50a: am 24fc60c7: am 304d31f0: Merge "Make su 04750"

* commit '0487e50accf44f13acafad5fb5d76b4958d86550':
Make su 04750
c3df8d756291b5258c21335e1266efb941fd7d0a 09-Jun-2014 Nick Kralevich <nnk@google.com> Make su 04750

Currently, /system/xbin/su is world executable. Prior to SELinux
enforcement, anyone (including third party apps) could run su.
The su code itself checks to see if the calling UID is root or shell.

Rather than relying on enforcement within the su binary, modify the
binary so it has group=shell, and remove world-execute permission.
This helps avoid some annoying SELinux denial messages as third party
apps call su on userdebug/eng builds.

Change-Id: I61c9231bb7e201d14ee3a5b6fe81b3fa7b12599f
/system/core/include/private/android_filesystem_config.h
f086a8134c059d32e19a60baf970e0f5b76f8592 04-Jun-2014 Robin Lee <rgl@google.com> am 63cdd840: am e948c9fa: am 489797c2: Merge "Add new AID shared by all apps in a profile"

* commit '63cdd840f81839bf6ce6e3723c42f09256cf4b3e':
Add new AID shared by all apps in a profile
489797c2cbf9e22ea64dc9b88dec8271129e77bd 04-Jun-2014 Robin Lee <rgl@google.com> Merge "Add new AID shared by all apps in a profile"
f9ff246dd7d4d44ad65d7f9690780eddaf74bde0 28-May-2014 Torne (Richard Coles) <torne@google.com> am 4f3ad823: am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit '4f3ad823eaf97fcbcbb1afac67371aff76677b1d':
Add UID and directory for RELRO sharing support.
234f696ea7f97dc489290827c1c68f26279de294 22-May-2014 Torne (Richard Coles) <torne@google.com> Add UID and directory for RELRO sharing support.

Define a UID to be used by the process responsible for creating shared
RELRO files for the WebView native library, and create a directory owned
by that UID to use to store the files.

Bug: 13005501
Change-Id: I5bbb1e1035405e5534b2681f554fe16f74e3da1a
/system/core/include/private/android_filesystem_config.h
b3ef03951cecf4515d0cba759fb1b94c34111adc 25-Apr-2014 Robin Lee <rgl@google.com> Add new AID shared by all apps in a profile

Automatically assigned as a GID to all apps running under the same
Android profile. Used for exposing to or sharing files with apps
running in a specific profile.

Analogous to AID_SHARED_GID only the sharing is between processes with
the same userId rather than with the same appId.

The name to be displayed for uids/gids with this AID is 'u*_everyone'.

Change-Id: I46efb749f74cb86868c5609a0ce1a6aab2f9e9c9
/system/core/include/private/android_filesystem_config.h
8d56ff5d12548ac463877fa8dc3554d02a145f97 14-Apr-2014 Narayan Kamath <narayan@google.com> am c5aff686: am cda31324: am 4706320e: Merge "Include 64bit valgrind in the android_filesystem_config."

* commit 'c5aff68693dee788a28a0d0256782cc8521aa2a5':
Include 64bit valgrind in the android_filesystem_config.
6b7ab90ca9e67324c4f07bfc46e1b6ed86c741c5 12-Apr-2014 Narayan Kamath <narayan@google.com> Include 64bit valgrind in the android_filesystem_config.

Required so that we set the exectuable bit correctly.

Change-Id: If59bd0ff47d2b4b2b8f92a1c007b4ba414ea1876
/system/core/include/private/android_filesystem_config.h
0175b0747a1f55329109e84c9a1322dcb95e2848 26-Feb-2014 Mark Salyzyn <salyzyn@google.com> logd: initial checkin.

* Create a new userspace log daemon for handling logging messages.

Original-Change-Id: I75267df16359684490121e6c31cca48614d79856
Signed-off-by: Nick Kralevich <nnk@google.com>

* Merge conflicts
* rename new syslog daemon to logd to prevent confusion with bionic syslog
* replace racy getGroups call with KISS call to client->getGid()
* Timestamps are filed at logging source
* insert entries into list in timestamp order
* Added LogTimeEntry tail filtration handling
* Added region locking around LogWriter list
* separate threads for each writer
* /dev/socket/logd* permissions

Signed-off-by: Mark Salyzyn <salyzyn@google.com>

(cherry picked from commit 3e76e0a49760c4970b7cda6153e51026af98e4f3)

Author: Nick Kralevich <nnk@google.com>
Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
/system/core/include/private/android_filesystem_config.h
3e76e0a49760c4970b7cda6153e51026af98e4f3 15-Dec-2011 Nick Kralevich <nnk@google.com> logd: initial checkin.

* Create a new userspace log daemon for handling logging messages.

Original-Change-Id: I75267df16359684490121e6c31cca48614d79856
Signed-off-by: Nick Kralevich <nnk@google.com>

* Merge conflicts
* rename new syslog daemon to logd to prevent confusion with bionic syslog
* replace racy getGroups call with KISS call to client->getGid()
* Timestamps are filed at logging source
* insert entries into list in timestamp order
* Added LogTimeEntry tail filtration handling
* Added region locking around LogWriter list
* separate threads for each writer
* /dev/socket/logd* permissions

Signed-off-by: Mark Salyzyn <salyzyn@google.com>

Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
/system/core/include/private/android_filesystem_config.h
9526202d84387df3950bf526bbbaeac1ede129d2 04-Feb-2014 Doug Zongker <dougz@android.com> set permissions of recovery install script

The script that writes the recovery partition after a successful
update of system needs to be made executable. This change also moves
it from /system/etc to /system/bin.

Bug: 12893978
Change-Id: I686e2392a2392515a6859a7381b735de1007b7ea
/system/core/include/private/android_filesystem_config.h
7baebf1345ff9e861ea8ccf9712128a3b7cd9fcc 14-Jan-2014 Doug Zongker <dougz@android.com> add the pre-recovery service

Add a service called "pre-recovery" which is normally stopped but can
be started by the system server when we want to go into recovery. It
will do any preparation needed (currently needed to handle update
packages that reside on an encrypted /data partition) and then set
sys.powerctl when it's ready to actually reboot.

Bug: 12188746
Change-Id: I894a4cb200395a0f6d7fe643ed4c2ac0a45d2052
/system/core/include/private/android_filesystem_config.h
fea5b4d44b2f646a4befb6be92ddc3987b38bb36 09-Sep-2013 Todd Poynor <toddpoynor@google.com> healthd: move charger executable to healthd charger mode

* Add healthd charger mode ops
* Check for executable invocation as "charger", set charger mode if so
* Incorporate charger executable as healthd charger mode

Change-Id: I4a44e7a4c3a65ae9be94491f7f498aa48d4f8a84
/system/core/include/private/android_filesystem_config.h
dfe0cbab3f9039f34af1dc9e31faf8155737ec2d 04-Jul-2013 Jeff Sharkey <jsharkey@android.com> Richer SD card permissions through FUSE.

Changes the FUSE daemon to synthesize an Android-specific set of
filesystem permissions, even when the underlying media storage is
permissionless. This is designed to support several features:

First, apps can access their own files in /Android/data/com.example/
without requiring any external storage permissions. This is enabled
by allowing o+x on parent directories, and assigning the UID owner
based on the directory name (package name). The mapping from package
to appId is parsed from packages.list, which is updated when apps are
added/removed. Changes are observed through inotify. It creates
missing package name directories when requested and valid.

Second, support for separate permissions for photos and audio/video
content on the device through new GIDs which are assigned based on
top-level directory names.

Finally, support for multi-user separation on the same physical media
through new /Android/user/ directory, which will be bind-mounted
into place. It recursively applies the above rules to each secondary
user.

rwxrwx--x root:sdcard_rw /
rwxrwx--- root:sdcard_pics /Pictures
rwxrwx--- root:sdcard_av /Music

rwxrwx--x root:sdcard_rw /Android
rwxrwx--x root:sdcard_rw /Android/data
rwxrwx--- u0_a12:sdcard_rw /Android/data/com.example
rwxrwx--x root:sdcard_rw /Android/obb/
rwxrwx--- u0_a12:sdcard_rw /Android/obb/com.example

rwxrwx--- root:sdcard_all /Android/user
rwxrwx--x root:sdcard_rw /Android/user/10
rwxrwx--- u10_a12:sdcard_rw /Android/user/10/Android/data/com.example

These derived permissions are disabled by default. Switched option
parsing to getopt().

Change-Id: I21bf5d79d13f0f07a6a116122b16395f4f97505b
/system/core/include/private/android_filesystem_config.h
7629bf19a139cbc204e8ae78cb82c2faeba6d2f0 25-Apr-2013 Jeff Tinker <jtinker@google.com> am 9e9ed1b4: am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev

* commit '9e9ed1b40010745e709157a6977ba6d053d46c49':
Add a new group for MediaDrm engine plugins
131ee07b77e0250c16cebe2b0e226c5bff8e9587 25-Apr-2013 Jeff Tinker <jtinker@google.com> Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev
af1cbd4c10cfc28235d7a60941290986a77affda 24-Apr-2013 Matthew Xie <mattx@google.com> am 0db6600a: am 7ee2e26e: Remove DBUS from make and header files

* commit '0db6600a60e8d604aaef5e43db9ae52ed7380979':
Remove DBUS from make and header files
08d64308b93594c587036cffcd8f6780eaf2c417 24-Apr-2013 Jeff Tinker <jtinker@google.com> Add a new group for MediaDrm engine plugins

bug: 8702754
Change-Id: I3b7988b64b1dcf4685624e4c1af938e132b82696
/system/core/include/private/android_filesystem_config.h
7ee2e26eb98da10eaddf5a8e864d508cceab946b 23-Apr-2013 Matthew Xie <mattx@google.com> Remove DBUS from make and header files

DBUS had been needed by bluetooth bluz stack. It is not needed after
we replaced bluez stack with bluedroid stack.
bug 6872904

Change-Id: I3fa41c1dd4ac80bc679d5950b3b20c7f6d12265f
/system/core/include/private/android_filesystem_config.h
ca8e66a8b0f843812014a28d49208f9f6f64ecbc 18-Apr-2013 Nick Kralevich <nnk@google.com> Make init handle reboots

Move the responsibility for rebooting the system from the
reboot command to init. Init is in a better position to take
actions to bring the system down cleanly, including making sure
filesystems are mounted read-only.

The only UIDs which can perform an init triggered reboot are
root, system, and shell.

Modify the reboot command so that it calls into init to perform
the reboot. The reboot command no longer requires CAP_SYS_BOOT.

Remove the -n reboot option and code which supports it. Anyone needing
to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'.

Modify adb so that it calls into init to perform a shutdown.

Bug: 8646621
Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
/system/core/include/private/android_filesystem_config.h
c6d7e200eddd620d8ac55259ab3aa5f8bfa2aadb 23-Mar-2013 Benoit Goby <benoit@android.com> toolbox: Make reboot a separate command from toolbox

Set the CAP_SYS_BOOT filesystem capability on the new reboot
command and keep CAP_SYS_BOOT in adb bounding set so that the
shell user can run it.

Change-Id: I1dd6143445ee2a952254f0452ab6e544318431dd
/system/core/include/private/android_filesystem_config.h
0b56fc769dc193e8714d6c1f304cfbc90d593dc5 20-Mar-2013 Colin Cross <ccross@android.com> android_filesystem_config: add /vendor

Make /vendor have the same permissions as /system/vendor for devices
that have a vendor partition.

Bug: 8341435
Change-Id: I077a2caf9da41fc072a4d3e334be28c24b70c7cd
/system/core/include/private/android_filesystem_config.h
fe8135739c5a9195e74786205c077964ba4f9c44 12-Feb-2013 Nick Kralevich <nnk@google.com> android_filesystem_config.h: change ping and run-as

/system/bin/ping no longer requires CAP_NET_RAW, as we're now
using IPPROTO_ICMP. Please see the following for more details:

* http://lwn.net/Articles/443051/
* https://android-review.googlesource.com/52090
* https://android-review.googlesource.com/52072

We can now make ping a normal, unprivileged program.

/system/bin/run-as only requires CAP_SETUID and CAP_SETGID.
Explicitly set the capabilities of this file, and remove
the setuid bit.

This is equivalent to running the following commands:

* chmod 750 /system/bin/run-as
* chown root:shell /system/bin/run-as
* setcap cap_setgid,cap_setuid+ep /system/bin/run-as

Change-Id: I65df858b45e6de4e2190ac9d6d592c06ea9d28cf
/system/core/include/private/android_filesystem_config.h
bb05a92cb11d18e7cbd412d8838bb1d0aef4cbfe 23-Feb-2013 Nick Kralevich <nnk@google.com> fix mac sdk build.

For now, remove linux/capability.h . We're haven't started using
capabilities yet, and this file doesn't exist on mac builds.

Change-Id: Id6ec7fdb408bcdfdd538dac65187194c8ee226ff
/system/core/include/private/android_filesystem_config.h
e9e74f3c881bd73bd86be4db8b12200a61f143e1 07-Feb-2013 Nick Kralevich <nnk@google.com> Add support for filesystem capabilities.

Modify android_filesystem_config.h and add a capabilities
field. This field can be used to add filesystem capabilities
to a particular file.

Change-Id: If8953a322457ea7275aa6df75660b714e6dc678a
/system/core/include/private/android_filesystem_config.h
8cc97302b2cc42d70af3c6d84a6a46984a09fe24 29-Jan-2013 Doug Zongker <dougz@google.com> resolved conflicts for merge of 0fe9742e to jb-mr1-dev-plus-aosp

Change-Id: Ie7a8b642dec0f07d4c8bfd9d8f736fd66c4febe0
0fe9742e385f7641a1f6272699349510ac57da9d 29-Jan-2013 Doug Zongker <dougz@android.com> add AID_LOOP_RADIO for control of loop radio device

Change-Id: I1e996dfbaa0f187ec87b5318a214ab0b852193cc
/system/core/include/private/android_filesystem_config.h
04aaf5a424b1f88a481a17a6bc3518e2116250e2 21-Dec-2012 Colin Cross <ccross@android.com> android_filesystem_config: allow absolute paths

SELinux policies use absolute paths, allow absolute paths in fs_config
as well.

Change-Id: Ic97ee0b4eb4df9eac965a8e819fde01df473de7e
/system/core/include/private/android_filesystem_config.h
3ddc0059bb897c4d7d2e0c6d9812d590388480d1 13-Nov-2012 jp abgrall <jpa@google.com> am ee854b07: Merge "Allocate a UID for clatd"

* commit 'ee854b077766a85279fa1849b537c50837d1a204':
Allocate a UID for clatd
b49183f122956137b8eb3487a19ae980540842c8 16-Feb-2012 Daniel Drown <dan-android@drown.org> Allocate a UID for clatd

clatd(464xlat) runs as its own UID after it drops root privs

Change-Id: I2392f8127dcd90d16b0f20ff31bcc5aa096db464
Signed-off-by: Daniel Drown <dan-android@drown.org>
/system/core/include/private/android_filesystem_config.h
971153aa4a65c4fbc8d916c619a17d3912b2cb02 04-Oct-2012 Matthew Xie <mattx@google.com> Create bluetooth stack aid for sharing gid between all bluetooth processes

bug 6925422

Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
/system/core/include/private/android_filesystem_config.h
c2f59d87d85e4c7ec9a7f899dd4f55a36b3627f5 19-Sep-2012 Zhihai Xu <zhihaixu@google.com> ISSUE 6849488 Bluedroid stack, remove system/bluetooth.

remove system/bluetooth stuff.

bug 6849488
Change-Id: I81a94d34a4363562a74fa2e574828fd919cfe18c
/system/core/include/private/android_filesystem_config.h
7e41c8420e015f6b96e35e90c8a9a8ebf643cdac 12-Sep-2012 Kenny Root <kroot@google.com> Add shared app gid to fs config

This will allow native tools to be able to know where the shared app
gids start and end.

Change-Id: Ie4529baf36b361c51c42f079b259c352e316647f
/system/core/include/private/android_filesystem_config.h
0e6056d0126cad2e082b4702e60dfb242aa6bf65 08-May-2012 Doug Zongker <dougz@android.com> change /fstab.* perms to 0640

It's safe to change the permissions on files in the root partitions;
incremental OTA now knows how to handle this case.

This reverts commit 08c370cc50e4bdae5a59f4ddfd1e3874bb36579d.

Change-Id: I503bf8ebd037fa9715494c6539e5430eee47acfe
/system/core/include/private/android_filesystem_config.h
08c370cc50e4bdae5a59f4ddfd1e3874bb36579d 03-May-2012 Doug Zongker <dougz@android.com> change /fstab.* perms back to 0644, to unbreak incremental OTAs

Change-Id: I21a991148fd1de604ecf87abad0b49970d2abe84
/system/core/include/private/android_filesystem_config.h
c1bf89663ca71949b508007d4df2b5b06038f96d 07-Jan-2012 Ken Sumrall <ksumrall@android.com> A filesystem manager library to mount filesystems for init.

Instead of specifying in init what to mount, and having various hacks in init
itself to deal with encryption, use a filesystem manager library to do the
work, that can also be invoked by vold when mounting an encrypted volume.
Keep all the magic filesystem info an a device specific fstab file.

Change-Id: Ib988f1e4fb0638ba1d5fd98407fa6d8cf862aaca
/system/core/include/private/android_filesystem_config.h
1d91fcf7c0a31d27097b196579a37873ba1c0934 28-Mar-2012 Robert Greenwalt <rgreenwalt@google.com> Add MDNS service

Adds both the new service and another socket for netd.

Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
/system/core/include/private/android_filesystem_config.h
5d3aadbeca442b482a132371a46f3356489370b1 12-Mar-2012 Dianne Hackborn <hackbod@google.com> Forget name for AID_SDCARD_R.

Change-Id: Ib65fdf4211bef77057009e31295e610f8ba64b44
/system/core/include/private/android_filesystem_config.h
50458cf76ea7b0b03598c785acb1481ed0ae5b1d 07-Mar-2012 Dianne Hackborn <hackbod@google.com> Add AID_SDCARD_R.

Change-Id: I47f650e415e06c0b69790ffefea7f208c910ebd7
/system/core/include/private/android_filesystem_config.h
ca185abcb58582ab58805f792eb868681ebdb55e 09-Feb-2012 Dianne Hackborn <hackbod@google.com> New user definitions for isolated sandboxes.

Change-Id: I302f89c102bc35dcd70168748e205b41fdbf6576
/system/core/include/private/android_filesystem_config.h
097b4ed4100369862793cf4f0fbbb969b50c154e 21-Nov-2011 Nick Pelly <npelly@google.com> Replace vendor specific NfcGoogle.apk with generic Nfc.apk

The access control changes allow us to just use Nfc.apk with
the regular platform certificate, instead of the custom signed
NfcGoogle.apk. So we can compeltely get rid of vendor/google/apps/NfcGoogle
and just build it out of packages/apps/Nfc now.

The package name is also reverted from com.android.nfc3 to com.android.nfc

The NFC uid needs to get bumped (25 to 27) to allow the cert change.

Bug: 5608249
Change-Id: I5e178b469e5210cd231ba5f4ea57aa666b3d8893
/system/core/include/private/android_filesystem_config.h
7005c0375416abb595721fe9c1324ed7356beb02 30-Sep-2011 Jeffrey Tinker <jtinker@google.com> Create drmrpc group for security services

Bug 4598045

Change-Id: I5550203927146fd6864408b3ac2f5e6f5d2b1d77
/system/core/include/private/android_filesystem_config.h
f48b23688c1303212c65e470af9f9f3892e98f8e 30-Aug-2011 Dima Zavin <dima@android.com> core: Add a standalone charger UI binary

This can be launched from an 'on charger' section in init, which
is processed if androidboot.mode=charger is supplied on kernel
command line.

This is a standalone binary that has a simple "user interface"
and allows the standard production kernel to run while charging.
This removes the burden from the bootloader to get low-power mode
working.

Currently, the device will "power-on" (i.e. reboot) into normal
mode if the power key is pressed for X seconds, and will also
power down the device if the usb/ac cable is removed for Y seconds.

Change-Id: I780594b99211cb09de7f8519a69c5962eb91348a
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/include/private/android_filesystem_config.h
04918930236981a6d2a096a73854caa96cb94bda 01-Jul-2011 Brian Carlstrom <bdc@google.com> Revert "Add keychain user"

This reverts commit 6541ef1562ccf93e498d653598330a7fc80ad2b2.

Bug:4970237
Change-Id: I23a90eb89c1d19893d2ba7065fc624c0521cb06e
/system/core/include/private/android_filesystem_config.h
4f1df18766fa13959f347f9c0cbb3dfa67273fa7 03-May-2011 Jeff Sharkey <jsharkey@android.com> Create groups to protect bandwidth statistics.

Introduces new "net_bw_stats" group which will protect reading
detailed bandwidth statistics. Also introduce "net_bw_acct" group
which will enable specific applications to request that their network
traffic be counted against other UIDs.

Change-Id: Ic0ec04e0d2bb9573f3c2a094ebd6d6a8cae0aae6
/system/core/include/private/android_filesystem_config.h
6541ef1562ccf93e498d653598330a7fc80ad2b2 15-Feb-2011 Brian Carlstrom <bdc@google.com> Add keychain user

Change-Id: Id6738d7c97dd58b2043e2cba018797e3b2b4d77a
/system/core/include/private/android_filesystem_config.h
ee3420bc124613827af474684c3015d12742c70d 05-Apr-2011 Jeff Hamilton <jham@android.com> resolved conflicts for merge of 65475f89 to honeycomb-plus-aosp

Change-Id: I9f77e84d887dbe84bb94de0fdd369d8de24fbec3
65475f89e14cb0914db336652c345e2847c7cb92 04-Apr-2011 Jeff Hamilton <jham@android.com> am 336bc321: Make the NFC UID forward compatible.

* commit '336bc321a6e978a273098148e13a82c5e7ec3be5':
Make the NFC UID forward compatible.
336bc321a6e978a273098148e13a82c5e7ec3be5 01-Apr-2011 Jeff Hamilton <jham@android.com> Make the NFC UID forward compatible.

Change-Id: Icfa302c22151b3d722ad0da7e58806f74730e1a3
/system/core/include/private/android_filesystem_config.h
be61f39a6b3b92fd6f0a9d1e732f59fa08e95da6 25-Mar-2011 Jeff Hamilton <jham@android.com> am a6a36c0b: Update the value for the NFC shared UID.

* commit 'a6a36c0b799b84d06b695027d205f21d13a3275b':
Update the value for the NFC shared UID.
a6a36c0b799b84d06b695027d205f21d13a3275b 25-Mar-2011 Jeff Hamilton <jham@android.com> Update the value for the NFC shared UID.

Change-Id: I47edf39dbdf2ebd41f44ca69aac250d8991dec4c
/system/core/include/private/android_filesystem_config.h
8d1c6e76859e1dd51644f5f0f7f21f3950430157 02-Mar-2011 Brad Fitzpatrick <bradfitz@android.com> Make optional valgrind binaries +x.

Change-Id: If3417e0c8728c7c74badb12de734cf06e794619d
/system/core/include/private/android_filesystem_config.h
4fe0bc5cf618e53d29941cd4a36b635621f743ce 07-Feb-2011 Paul Eastham <eastham@google.com> am 57cd87d9: am 1ace223f: Set default permissions for preloaded /data/media aka /sdcard content.

* commit '57cd87d9ccf57a2c874fafd1a0b8cab7ebea646f':
Set default permissions for preloaded /data/media aka /sdcard content.
1ace223fcbf8da9e0d22e31c1b3129a7a8276cb1 04-Feb-2011 Paul Eastham <eastham@google.com> Set default permissions for preloaded /data/media aka /sdcard content.

Change-Id: Ia67cbdbfbcd423cf163f0fce5c6edc215564e782
/system/core/include/private/android_filesystem_config.h
b29b33841bd2f5143e2705525bfc4f8a2d2b6316 20-Jan-2011 Glenn Kasten <gkasten@google.com> Bug 3361124 Remove drmioserver

Change-Id: Ie3b20b487c1466737921567ab2d043e230356bf4
Note: safe to re-use the drmio uid/gid as no files were ever created.
/system/core/include/private/android_filesystem_config.h
af7bdc646088e3112052f4fd35061bb720393287 10-Jan-2011 Mike Lockwood <lockwood@android.com> Add separate permission and group for access to MTP USB driver

Since the "usb" group and ACCESS_USB permission will be used by regular apps
to access USB devices in host mode, we need a separate permission for the
device side MTP driver.

Change-Id: Ibb546b8726d61e041fc7c273f71929624ad1575b
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/include/private/android_filesystem_config.h
2e0047bdc067006d1e38418b2a0e24612d8068ba 29-Oct-2010 Mike Lockwood <lockwood@android.com> Add new AID_MEDIA_RW group to control write access to /data/media

BUG: 3113970

Change-Id: I233bd57e36d1e65847ead503e378304a958f492d
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/include/private/android_filesystem_config.h
457ce8f67224529a6f3524e8bbca2ecba3a80cc3 17-Oct-2010 Jean-Baptiste Queru <jbq@google.com> am 67672e04: Merge a775965b from gingerbread

Merge commit '67672e04111a6cfdf572023a154675749c3fb550'

* commit '67672e04111a6cfdf572023a154675749c3fb550':
Add AID_NFC for use by the NFC service.
67672e04111a6cfdf572023a154675749c3fb550 16-Oct-2010 Jean-Baptiste Queru <jbq@google.com> Merge a775965b from gingerbread

Change-Id: I8c08cca033ef3efe6badd2a7ba4674dfb02d6b60
85905a6ab4d970f04d421bd2077ba4ad6fe67c3e 15-Oct-2010 Nick Pelly <npelly@google.com> Add AID_NFC for use by the NFC service.

Change-Id: I5b92f87dbacb9d855d99e10b3811f290fb64a144
Signed-off-by: Nick Pelly <npelly@google.com>
/system/core/include/private/android_filesystem_config.h
b07c78aa942a09fb1a3ae4eecaca793be9c431d1 27-Sep-2010 Mike Lockwood <lockwood@android.com> am d1971c4c: resolved conflicts for merge of c29919c8 to gingerbread-plus-aosp

Merge commit 'd1971c4cac37fccdccd105f78f7252582685ccd9'

* commit 'd1971c4cac37fccdccd105f78f7252582685ccd9':
Add AID_GPS user ID for GPS daemon
d1971c4cac37fccdccd105f78f7252582685ccd9 27-Sep-2010 Mike Lockwood <lockwood@android.com> resolved conflicts for merge of c29919c8 to gingerbread-plus-aosp

Change-Id: I860b7690c40428839e45e2c2b122661b00d47e0e
c29919c8d75ad218012daeda62e1e62200cad889 27-Sep-2010 Mike Lockwood <lockwood@android.com> Add AID_GPS user ID for GPS daemon

Change-Id: I2f8ffba40e3f5145b37296f19c698e08d768ce59
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/include/private/android_filesystem_config.h
d06df51bcd7bcc2656089a529fa6a455bad00d37 19-Sep-2010 Brian Swetland <swetland@google.com> resolved conflicts for merge of 3b5214a6 to master

Change-Id: Id73c53c6c2e9c21eb9b1d1e624aaeb25097ea7a4
3b5214a67f43e2e4f69428e98d3a2c130c7c87d8 19-Sep-2010 Brian Swetland <swetland@google.com> am 02863b95: add /vendor support

Merge commit '02863b957cfbfc302d3136ed78c0cba86accacd8' into gingerbread-plus-aosp

* commit '02863b957cfbfc302d3136ed78c0cba86accacd8':
add /vendor support
02863b957cfbfc302d3136ed78c0cba86accacd8 19-Sep-2010 Brian Swetland <swetland@google.com> add /vendor support

- look in /vendor/firmware/... in addition to /system/etc/firmware/... for firmware loading
- add /vendor/bin to path before /system/bin
- add /vendor/lib to ldpath before /system/lib
- configure appropriate permissions for /system/vendor/bin
- symlink /vendor -> /system/vendor

Change-Id: I0c06ca1e38a44f0c7024cee6cea8907aa93a4532
/system/core/include/private/android_filesystem_config.h
a5220b24d1b17b142e373aacbadf79a00effbbf0 10-Sep-2010 Jean-Baptiste Queru <jbq@google.com> am 26ce6e0e: manual merge from readonly-korg-master

Merge commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1'

* commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1':
- Add drm and drmio service
26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1 10-Sep-2010 Jean-Baptiste Queru <jbq@google.com> manual merge from readonly-korg-master

Change-Id: Id17f69d22fbbc84578be5aadd5e8e906ff0eb548
c34f1951496a0debd89477d088f5f2d664760fbf 01-Sep-2010 Nick Kralevich <nnk@google.com> am 095a6a6e: am 739cd9d2: Merge "get rid of compile time warning: "warning: ‘android_ids’ defined but not used"" into gingerbread

Merge commit '095a6a6ecb8039067c077db381bd02abc2496422'

* commit '095a6a6ecb8039067c077db381bd02abc2496422':
get rid of compile time warning: "warning: ‘android_ids’ defined but not used"
095a6a6ecb8039067c077db381bd02abc2496422 01-Sep-2010 Nick Kralevich <nnk@google.com> am 739cd9d2: Merge "get rid of compile time warning: "warning: ‘android_ids’ defined but not used"" into gingerbread

Merge commit '739cd9d2d4718913889a15d95c840506a2af04d1' into gingerbread-plus-aosp

* commit '739cd9d2d4718913889a15d95c840506a2af04d1':
get rid of compile time warning: "warning: ‘android_ids’ defined but not used"
4688ac5b73abf15798415f7260f21bd87d23dd2b 31-Aug-2010 Nick Kralevich <nnk@google.com> get rid of compile time warning: "warning: ‘android_ids’ defined but not used"

Change-Id: If365bd88f735d425f37d61bcd5a6903f99f6a454
/system/core/include/private/android_filesystem_config.h
78fdd23c92b6d92396f64d99f38939f3990c2175 13-Aug-2010 Danica Chang <danicachang@google.com> added network.conf to android_filesystem_config

Change-Id: I393720a2c1632c311f794e14c17b197083a70621
/system/core/include/private/android_filesystem_config.h
e572d596b3715198fb48b3d8cef4939a71d58db2 27-Jul-2010 aimitakeshi <aimitakeshi@gmail.com> - Add drm and drmio service
- Add /data/drm directory for storing DRM related data

Change-Id: Ifd8922a3de109dbf5cd3f9cabbf4e5689b16c1d7
/system/core/include/private/android_filesystem_config.h
96a2bb622d38f3c875997e4cacb423fa9ef4ea76 24-Jun-2010 Bruce Beare <brucex.j.beare@intel.com> Set the modes for rc.* files in /system/etc

Change-Id: I0897897cdffa66afa4f818f7ebcf0a9b70c517ea
Signed-off-by: Bruce Beare <brucex.j.beare@intel.com>
/system/core/include/private/android_filesystem_config.h
e95aad61d841e7a472b4141808bbca0c7135b0f5 17-May-2010 The Android Open Source Project <initial-contribution@android.com> merge from open-source master

Change-Id: I414c9479f4f913c777ef18b7ff27e410f49d35b9
93ac1559b8c7ad3125ddcd896082b030faadbbd4 06-May-2010 Mike Lockwood <lockwood@android.com> init: Add support for /dev/bus/usb/ file system and add new unix group AID_USB.

init now creates files in /dev/bus/usb/ for user access to USB devices.
Files are chmod 660 with group AID_USB.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/include/private/android_filesystem_config.h
3555019d783089084d8cb4ceca6609152db445d3 16-Mar-2010 Eric Olsen <eolsen@android.com> Add Bluetooth SCO connection blacklist

Change-Id: Ieb11debfea66ec715f48e8069619c2c15acf2035
Signed-off-by: Eric Olsen <eolsen@android.com>
/system/core/include/private/android_filesystem_config.h
1f4d95296acf34a93128332441782a80c10845b4 03-Mar-2010 David 'Digit' Turner <digit@google.com> Add 'run-as' command implementation as set-uid program.

Typical usage is 'run-as <package-name> <command>' to run <command>
in the data directory, and the user id, of <package-name> if, and only
if <package-name> is the name of an installed and debuggable application.

This relies on the /data/system/packages.list file generated by the
PackageManager service.

BEWARE: This is intended to be available on production devices !
/system/core/include/private/android_filesystem_config.h
bbf1c64527dde837a236b4d6b9f75343adbca119 12-Mar-2010 Wink Saville <wink@google.com> Change permissions on pppd-ril

On devices that use a pppd for cellular network access, a pppd-ril
process needs to run as root to configure the connection. Changing
the process to suid-root in the build image is the only known way
to avoid needing to remount the system image at boot to accomplish
the same thing.

Change-Id: I6c778391b8040ee818343e304891e7d341cc729b
/system/core/include/private/android_filesystem_config.h
3e1aac6c4d656d09043cef114e38e4b3f42378f5 08-Mar-2010 Nick Kralevich <nnk@google.com> Change netcfg permissions to 2750.
Fix bug 2104034.

Change-Id: I30bcc41f33623cadc63693fd54206ccbb1886a5a
/system/core/include/private/android_filesystem_config.h
eafdd86f4d8f4ccc69f0c16550c65aa392f678d6 08-Jan-2010 Jaikumar Ganesh <jaikumar@google.com> Update bluetooth data files path.
/system/core/include/private/android_filesystem_config.h
f184b94ad32c50ccf5bb1792a963551b5841e772 05-Oct-2009 Jean-Baptiste Queru <jbq@google.com> am b084929f: Make AudioPara4 world-readable

Merge commit 'b084929f5dd57b878f6debe6567a6c8888061fa0' into eclair

* commit 'b084929f5dd57b878f6debe6567a6c8888061fa0':
Make AudioPara4 world-readable
b084929f5dd57b878f6debe6567a6c8888061fa0 02-Oct-2009 Jean-Baptiste Queru <jbq@google.com> Make AudioPara4 world-readable

This way adb pull can get to it on user builds.

BUG=1869158
/system/core/include/private/android_filesystem_config.h
60a4cd5e348ae263d209a7f64510826825848208 30-Jun-2009 repo sync <chiachi@android.com> resolved conflicts for merge of abb08550 to master
88dc657d50cb3289a9011828c497eee996ed958c 19-Jun-2009 Chia-chi Yeh <chiachi@android.com> Add device, property, directory, and file permissions for VPN.
/system/core/include/private/android_filesystem_config.h
1d36696821cd81ed7b668bb9d2b0b8a43540ccd2 06-May-2009 Jaikumar Ganesh <jaikumar@google.com> Bluez4 changes

Rename hcid to bluetoothd and change permissions.
/system/core/include/private/android_filesystem_config.h
1f75d709c10f49d2e2390b888e766bcfd17da860 01-Jun-2009 Chung-yih Wang <cywang@google.com> Add VPN and Keystore services and data directories.

-- changed the default mode to 0770 for keystore with the new user 'keystore'.
-- add the keystore service providing the basic key lookup/install/remove, but
only keystore user can access the key content.
/system/core/include/private/android_filesystem_config.h
328a4fb5354318783a41d78f2a6201d0d4912761 15-May-2009 Dan Egnor <egnor@google.com> Make /system/xbin/tcpdump setuid root.
/system/core/include/private/android_filesystem_config.h
4a6f2321e76685b9489d020980dffb1d9ac73fc0 15-May-2009 San Mehat <san@google.com> init: Create new 'vpn' user/group and set owner of '/dev/tun' to it.

Signed-off-by: San Mehat <san@google.com>
/system/core/include/private/android_filesystem_config.h
6e1f21584f43311f35ae7f6a4737c6a7e846083a 23-Apr-2009 San Mehat <san@google.com> filesystem: Add new group 'sdcard_rw' for restricting sd card write access

Signed-off-by: San Mehat <san@google.com>
/system/core/include/private/android_filesystem_config.h
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/include/private/android_filesystem_config.h
e54eebbf1a908d65ee8cf80bab62821c05666d70 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/include/private/android_filesystem_config.h
35237d135807af84bf9b0e5b8d7f8633e58db6f5 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
/system/core/include/private/android_filesystem_config.h
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
/system/core/include/private/android_filesystem_config.h