317b4024a2a46b8c57abfa08f2a649df13572bd3 |
|
06-Feb-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Make encryption configurable" This reverts commit bda6272446454886339841a62daaa1b66c07ad60. The original fix seems to have led to boot failures in QA. Rather than risk shipping, revert the change. Bug 18764230 reopened. Requires change https://googleplex-android-review.git.corp.google.com/#/c/629764/ Bug: 19278390 Bug: 19199624 Change-Id: I8b6ab585666f2b0f585ffb2a5f61ac2e3462e06e
/system/core/rootdir/init.rc
|
bda6272446454886339841a62daaa1b66c07ad60 |
|
21-Jan-2015 |
Paul Lawrence <paullawrence@google.com> |
Make encryption configurable Delay mounting encryptable but unencrypted volumes until we can check the ro.vold.forceencrypt flag, then optionally encrypt. Requires matching vold change from https://googleplex-android-review.git.corp.google.com/#/c/615309/ Bug: 18764230 Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
/system/core/rootdir/init.rc
|
ac12f25004d728fe117c058446fccb0ca0a397c9 |
|
05-Nov-2014 |
Nick Kralevich <nnk@google.com> |
Ensure /data/adb exists automerge: 6672300 * commit '667230074b6e4e306a50d84a88a57bf4f1ec0291': Ensure /data/adb exists
|
667230074b6e4e306a50d84a88a57bf4f1ec0291 |
|
21-Oct-2014 |
Nick Kralevich <nnk@google.com> |
Ensure /data/adb exists Ensure that /data/adb always exists. This directory is used for writing adb debugging information when persist.adb.trace_mask is set. Bug: https://code.google.com/p/android/issues/detail?id=72895 (cherry picked from commit 89252ce31aacb27248e708b6487f730d3a024943) Change-Id: I44e01bee50125f4e6e5fff6e74c53bb2022ce355
/system/core/rootdir/init.rc
|
522d72b7020a7d2f975531c7214ff34225391aba |
|
04-Oct-2014 |
Riley Andrews <riandrews@google.com> |
Make the default cgroup, the foreground cgroup. All kernel services will now be in the same cgroup as foreground applications. This will now make kernel threads not implicitly higher priority than android foreground services. Bug 17681097 Change-Id: I28e81c7aade50428d5395df86f00ce01c1e7af02
/system/core/rootdir/init.rc
|
7e58899bcfd83152581867b05bb012c5c4ec4b46 |
|
29-Sep-2014 |
Mike Lockwood <lockwood@google.com> |
Add bootanimation to audio group so it can play boot sound Bug: 17674304 Change-Id: I5d31bc024fa36fedac2c0ba5c4a8b100937183ad
/system/core/rootdir/init.rc
|
c692410e1607a39cd6d55f4be8164fc630d9772c |
|
28-Aug-2014 |
Alex Light <allight@google.com> |
Change /dalvik-cache to be owned by root. Bug: 16875245 (cherry picked from commit 3878ebd72493427ea5537b36dfb9cd7cb38677bb) Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
/system/core/rootdir/init.rc
|
314313a9915c9a274f580c0fcf535a4db2ba0a9a |
|
26-Aug-2014 |
Andres Morales <anmorales@google.com> |
Move bootanim and surfaceflinger to class core They have no dependencies on /data so can be started early. This permits us to unmount /data while bootanimation is running, allowing an uninterrupted first boot encryption sequence. Bug: 17260550 Change-Id: I323fe23e8cf488d8bc136387efdd9fcea96625eb
/system/core/rootdir/init.rc
|
a005e7795e3dfb7cc0bd2bc65208d2490bfc89d8 |
|
25-Aug-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Enable not rebooting during default encryption" into lmp-dev
|
c23074f386ded6cd28b2f8ba2331814b7491c802 |
|
18-Aug-2014 |
Paul Lawrence <paullawrence@google.com> |
Enable not rebooting during default encryption Need to not set this property) during mount, since it can't be changed later (ro property) Also no reason to start class main on encryption cycle - we'll show surfaceflinger, which is enough UI for this short cycle. Bug: 17041092 Change-Id: Ica5339c54e45716d0fe20e23c0ab857f388d23ed
/system/core/rootdir/init.rc
|
82b76249fbc339e82ab47a956f7e17160247e4c4 |
|
04-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove obsolete tcp buffer size system properties. Change-Id: If6fb6fdcf8975e6102e84594ee3f64a5be6166f6
/system/core/rootdir/init.rc
|
4fe327b902a1d5ff48878c1801cce8cdbe718d31 |
|
19-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Merge "Remove inputflinger from init. DO NOT MERGE" into lmp-dev
|
1de92cffc7ac1e1654bdef5e3849fe542b1fd9fc |
|
19-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Remove inputflinger from init. DO NOT MERGE Change-Id: I6ae2815a0c3f6b9c69e712af3ed6ce9d455ef3d3
/system/core/rootdir/init.rc
|
67cb1aeaa5bb8dbd43d5a1bfb21d1a8c39822fb6 |
|
16-Jul-2014 |
Riley Andrews <riandrews@google.com> |
Remove the /dev/.booting file before triggering boot. On mako only, there is a race condition such that core + main services must be started after releasing ueventd (by removing /dev/.booting). bug 16304711 bug 16333352
/system/core/rootdir/init.rc
|
80c7a5e8a861de42ddade15704f1785953cee345 |
|
12-Jul-2014 |
Riley Andrews <riandrews@google.com> |
Move unlink("/dev/.booting") until after filesystems are mounted. Move the unlink out of init.c and into init.rc, so that the file will be removed after all the filesystems with firmware are up. Change-Id: Ifdd5dd1e95d7e064dde5c80b70198882d949a710
/system/core/rootdir/init.rc
|
ee0388e768bb27eb845809a0b3ba85f4f7f21885 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
am f89ddf76: am d05245a4: am c87237f5: Merge "restorecon_recursive /cache" * commit 'f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15': restorecon_recursive /cache
|
f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
am d05245a4: am c87237f5: Merge "restorecon_recursive /cache" * commit 'd05245a4b10044670ed8456c5c869490fd90583f': restorecon_recursive /cache
|
b12e40da2526881c1730a3d3387556e4600c7040 |
|
08-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files." * commit '0a7b44d55b9e9d038de390457246ec7fd0999cad': Create a data directory for netd and other network-related files.
|
e1695914d55d9ced3645fc532191970c9450e9e9 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
restorecon_recursive /cache Make sure all files / directories within /cache are properly labeled, not just the directory itself. Addresses the following denial: type=1400 audit(0.0:26): avc: denied { getattr } for comm="Thread-85" path="/cache/lost+found" dev="mmcblk0p27" ino=11 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir Change-Id: I5937b30043efeb696ffaa77258b7294d20d1494e
/system/core/rootdir/init.rc
|
cddb15b8a9057e7efacf2de9c9a6a887fd666663 |
|
08-Jul-2014 |
dcashman <dcashman@google.com> |
am b4e74db7: am 3fa71b8e: Merge "Remove sshd." * commit 'b4e74db79c9fda5e63ae49f299df3c0dd80a87f9': Remove sshd.
|
b4cbff47ad4c8f15213189959c2ea33cb0ee529f |
|
08-Jul-2014 |
dcashman <dcashman@google.com> |
Remove sshd. This may require changes to other code, such as fastbootd, which relies on this service. sshd is not currently, used, however, so this change will force any such code to be changed. Bug: 11594902 Change-Id: I07e52008290dab5825be2ad062cbe730fa7dff71
/system/core/rootdir/init.rc
|
b46efdb08ef8a700654d28be94b90550b8d90822 |
|
08-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Create a data directory for netd and other network-related files. Allows the 'shell' group (which is what dumpstate uses) to read the files in this directory. Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
/system/core/rootdir/init.rc
|
14253c1aab42e4e4ec4e68798c068436b4260288 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: add seclabel to flash_recovery"
|
a1d97e5d1c15e0adf40b5853f2f85db7008baa77 |
|
08-Jul-2014 |
Nick Kralevich <nnk@google.com> |
init.rc: add seclabel to flash_recovery Make sure flash_recovery is always running in the install_recovery SELinux domain. Change-Id: I9495eedd03f6b5dfcf2e78c03d1102f6032b327a
/system/core/rootdir/init.rc
|
85449d360f86ed9faaf1403f972f9657698a8289 |
|
08-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am b12e40da: am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files." * commit 'b12e40da2526881c1730a3d3387556e4600c7040': Create a data directory for netd and other network-related files.
|
9f3a11edde07af068217581cf11c004f1cdca3f0 |
|
08-Jul-2014 |
dcashman <dcashman@google.com> |
am cddb15b8: am b4e74db7: am 3fa71b8e: Merge "Remove sshd." * commit 'cddb15b8a9057e7efacf2de9c9a6a887fd666663': Remove sshd.
|
24912dc446439b0aaa1c3417a8159af758f76ff6 |
|
27-Jun-2014 |
Riley Andrews <riandrews@google.com> |
resolved conflicts for merge of fa6f2543 to master Change-Id: I04ce82e5d245e90e2cc62b76d688ec902c1a471d
|
fa6f25432b45958af870674529ce79e84986e0fa |
|
27-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am 23340d8a: am 10f8cd1d: Merge changes Ia15b2110,I5498c725 * commit '23340d8adac7bf68a6e47064ab7b48c1e227a077': Add ability to adjust init log level at runtime. Improve init's debug printing.
|
f67d6bd3c0fb41d167c675b9d2b5d377b6f38a74 |
|
26-Jun-2014 |
Daniel Rosenberg <drosen@google.com> |
Moved symlink back up. Moving the vendor symlink down was causing issues with some devices. Moved it back up, and adjusted mount to remove symlinks if necessary. Change-Id: I77126d77cfbef32250012bea3960c99b55db4cbb Signed-off-by: Daniel Rosenberg <drosen@google.com>
/system/core/rootdir/init.rc
|
1bbef88e8011805f7a3995a4d81928a853cb5cff |
|
26-Jun-2014 |
Riley Andrews <riandrews@google.com> |
Add ability to adjust init log level at runtime. + Add a new property, sys.init_log_level, which can be set after init bootstrap. This will control the level at which init does prints to klog. Change-Id: Ia15b2110157b5e6b713785ece9b0fb94889be6c8
/system/core/rootdir/init.rc
|
f530c93c4aab818de51fd7123199bef6621047f8 |
|
28-May-2014 |
Daniel Rosenberg <drosen@google.com> |
Added support for vendor partition and image Modified fastboot to flash vendor.img as well. Moved symlink for /vendor to occur after mounting partitions. Changed mount to also create the mount point. Change-Id: I78e1ba24e6bb8b4af96a67ee0569af579439e682 Signed-off-by: Daniel Rosenberg <drosen@google.com>
/system/core/rootdir/init.rc
|
6bd4588d65977956cadf2e5d384673c64329c8e8 |
|
24-Jun-2014 |
Riley Andrews <riandrews@google.com> |
resolved conflicts for merge of 079c637f to master Change-Id: Iab9a857026de954d7497d6b0eaf3751d2d3904c7
|
079c637f3d269242bbc772b9207179b8cf56738a |
|
23-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am 5b45e08a: am 7950fc47: Merge "Add ability to boot from charger mode." * commit '5b45e08aabd6dcbab527d221584fe348c73c70d4': Add ability to boot from charger mode.
|
e4b7b294f37d9b64d6b7c1931e2c9bfb1a500d68 |
|
17-Jun-2014 |
Riley Andrews <riandrews@google.com> |
Add ability to boot from charger mode. Add the ability to boot up directly from charger mode, instead of forcing charger mode to initiate a full restart to launch 'full' android. This should shave a few seconds off of boot time on supported devices (just manta for now). Change-Id: Ieec4494d929e92806e039f834d78b9002afd15c4
/system/core/rootdir/init.rc
|
aab0d57d18b202d059fec57c832d6443faff6ee3 |
|
20-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc" * commit '94fa20058fbd0e4f7e3c6d1381cdb9718dd90cde': Make indentation sane in init.rc
|
6dfdc7cd0c9d1b266b599b3ee7f5dd3a60e45c39 |
|
19-Jun-2014 |
Riley Andrews <riandrews@google.com> |
Make indentation sane in init.rc Change-Id: Ic632fbe1423eeef7ec958877d74db7b87fc385c6
/system/core/rootdir/init.rc
|
53f24c2f940b946805821db1036466d95061b1e1 |
|
20-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am aab0d57d: am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc" * commit 'aab0d57d18b202d059fec57c832d6443faff6ee3': Make indentation sane in init.rc
|
8ffe8eac5b4f04ce82ae553f2155959a8b165a61 |
|
13-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am f8cb68e1: am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles" * commit 'f8cb68e15ba242200e3525fffa2f969960e18a50': Create /data/dalvik-cache/profiles
|
f8cb68e15ba242200e3525fffa2f969960e18a50 |
|
13-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles" * commit '3bff77a8f90e673dbf41d97b7b842a3e4a6986bf': Create /data/dalvik-cache/profiles
|
511998fcdb3d35847f1222aec956e6ac6f5a17ba |
|
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 44aadc4d: am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell" * commit '44aadc4daf926155bf06bcf9d8f2daa96f861cdf': make console shell run as GID=shell
|
44aadc4daf926155bf06bcf9d8f2daa96f861cdf |
|
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell" * commit '1eebf538d3e5465bbec84d86017bb9ca250a052b': make console shell run as GID=shell
|
f2cb352412252f8e609986520cff830096248b9f |
|
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
make console shell run as GID=shell Change-Id: I240bec07b04de1b26eef14e4f590af56c1aaa276
/system/core/rootdir/init.rc
|
875dc8f3f31fe9f5ee42d900737149bdeb95f1c7 |
|
13-Jun-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Create /data/dalvik-cache/profiles"
|
347ee511e44a4b6419c144917e079c78fde46f32 |
|
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
Create /data/dalvik-cache/profiles Make sure /data/dalvik-cache/profiles gets the correct permissions and SELinux context, and ownership is properly assigned to the system UID. Change-Id: Ic1b44009faa30d704855e97631006c4b990a4ad3
/system/core/rootdir/init.rc
|
a54b7ca1565d314c88eb31e1f2375948b3c5616a |
|
05-Jun-2014 |
Robin Lee <rgl@google.com> |
am b7c07da2: am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory" * commit 'b7c07da2f4606ca36b93c2b9221e43e6ebe68831': Create world-searchable /data/misc/user directory
|
b7c07da2f4606ca36b93c2b9221e43e6ebe68831 |
|
05-Jun-2014 |
Robin Lee <rgl@google.com> |
am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory" * commit '33154817e274a4c7c381e2f5ef73ead7093e3985': Create world-searchable /data/misc/user directory
|
46fbaf062fd94e3fecc7165f4b42d42145e0603d |
|
05-Jun-2014 |
Robin Lee <rgl@google.com> |
Merge "Create world-searchable /data/misc/user directory"
|
e7fd4078a225fdfa92edcb6be6d79ba2fd6e8eb9 |
|
28-May-2014 |
Nick Kralevich <nnk@google.com> |
am 7206eccb: am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict" * commit '7206eccbd904508a199c7ec302d7395b3b674968': Remove dmesg_restrict
|
f9ff246dd7d4d44ad65d7f9690780eddaf74bde0 |
|
28-May-2014 |
Torne (Richard Coles) <torne@google.com> |
am 4f3ad823: am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support." * commit '4f3ad823eaf97fcbcbb1afac67371aff76677b1d': Add UID and directory for RELRO sharing support.
|
7206eccbd904508a199c7ec302d7395b3b674968 |
|
28-May-2014 |
Nick Kralevich <nnk@google.com> |
am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict" * commit 'c4ffa5f62ef256ff286122d0ceea61364aa67e13': Remove dmesg_restrict
|
c4ffa5f62ef256ff286122d0ceea61364aa67e13 |
|
28-May-2014 |
Nick Kralevich <nnk@google.com> |
am c290bed0: Merge "Remove dmesg_restrict" * commit 'c290bed0350cded5620ed8dbb68b1cfb07d9828c': Remove dmesg_restrict
|
c290bed0350cded5620ed8dbb68b1cfb07d9828c |
|
28-May-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Remove dmesg_restrict"
|
4f3ad823eaf97fcbcbb1afac67371aff76677b1d |
|
28-May-2014 |
Torne (Richard Coles) <torne@google.com> |
am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support." * commit 'a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9': Add UID and directory for RELRO sharing support.
|
a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9 |
|
28-May-2014 |
Torne (Richard Coles) <torne@google.com> |
am 96109cf3: Merge "Add UID and directory for RELRO sharing support." * commit '96109cf36c3dd44e9ecfe4b810e21e77eaf834dc': Add UID and directory for RELRO sharing support.
|
1a6184baf3e01bf7786fb14de4216bcb4e3b2f70 |
|
28-May-2014 |
Nick Kralevich <nnk@google.com> |
Remove dmesg_restrict dmesg_restrict is too coarse of a control. In Android's case, we want to allow the shell user to see dmesg output, but disallow others from seeing it. Rather than rely on dmesg_restrict, use SELinux to control access to dmesg instead. See corresponding change in external/sepolicy . Bug: 10020939 Change-Id: I9d4bbbd41cb02b707cdfee79f826a39c1ec2f177
/system/core/rootdir/init.rc
|
234f696ea7f97dc489290827c1c68f26279de294 |
|
22-May-2014 |
Torne (Richard Coles) <torne@google.com> |
Add UID and directory for RELRO sharing support. Define a UID to be used by the process responsible for creating shared RELRO files for the WebView native library, and create a directory owned by that UID to use to store the files. Bug: 13005501 Change-Id: I5bbb1e1035405e5534b2681f554fe16f74e3da1a
/system/core/rootdir/init.rc
|
373d9fa0824226c721c7b0c07952ebe3e3af770e |
|
10-Mar-2014 |
Jaewan Kim <jaewan@google.com> |
Support static IP config on Ethernet Bug: 7606609 Bug: 8687763 Change-Id: I1d76b5783e8511a8e3f5d981e6b4b9fb4fbecdf4
/system/core/rootdir/init.rc
|
066c9b5a005fdb84ea72a6d27a40ab5bf5e6f0e2 |
|
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 9743f097: am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets." * commit '9743f09724162186fb280627c3c125a55534a219': Introduce fwmarkd: a service to set the fwmark of sockets.
|
9743f09724162186fb280627c3c125a55534a219 |
|
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets." * commit '09eaad793a8cec9196255d740ecb89a1426c0bf7': Introduce fwmarkd: a service to set the fwmark of sockets.
|
e38d4707141174a8c211d5cb01ff78da8ef1baff |
|
11-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Introduce fwmarkd: a service to set the fwmark of sockets. (cherry picked from commit d5121e212c1f53b1cb6458ee83be892d94fdfef3) Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
/system/core/rootdir/init.rc
|
76202a2dfaeb9ec6a23dfbc4a382b65820a52132 |
|
11-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Introduce fwmarkd: a service to set the fwmark of sockets. Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
/system/core/rootdir/init.rc
|
3c1c730f206d1d2dc25ac555d48513d6a3e5fb7f |
|
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am ca61b484: am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs." * commit 'ca61b484b6eb1bf92b05bc5386668ec51999e55a': Set kernel proc files for fwmark reflection and table numbers for RAs.
|
ca61b484b6eb1bf92b05bc5386668ec51999e55a |
|
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs." * commit 'b8cfcf3d9beb6ae09512941a182c326723b3ef41': Set kernel proc files for fwmark reflection and table numbers for RAs.
|
b8cfcf3d9beb6ae09512941a182c326723b3ef41 |
|
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs." * commit '32e4479d5535887d03625b43b7e3574b458dfc8d': Set kernel proc files for fwmark reflection and table numbers for RAs.
|
fd94922329a83c257dd8c65a4b1417a24d67db88 |
|
10-Apr-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Set kernel proc files for fwmark reflection and table numbers for RAs. (cherry picked from commit 2c2807ac1041751583e0c3b6892ca56eae423fa2) Change-Id: I5f0d759cb9b8590555af7f5503f00d3e455ece54
/system/core/rootdir/init.rc
|
1333e012ee65fef59f5f43f33744230574dfc2a2 |
|
30-Apr-2014 |
Bill Yi <byi@google.com> |
Merge commit '4102af05a86aae36d2560fd8b3f740a52399342c' into HEAD
|
3094f82a8a4d4b8d2725df85a6af9d306b9f8800 |
|
25-Apr-2014 |
Robin Lee <rgl@google.com> |
Create world-searchable /data/misc/user directory installd will create a separate subdirectory for each user. Change-Id: I95ec09169ea70f35443bbb3209237611e174ca29
/system/core/rootdir/init.rc
|
0aee64f614d5eae0e50f5e24a1c790dd172b663f |
|
17-Apr-2014 |
Paul Lawrence <paullawrence@google.com> |
Make Volantis devices encryptable Volantis SurfaceFlinger holds open a file on data partition. SurfaceFlinger is not running when we trigger_default_encryption but if we start it before starting defaultcrypto it locks open data, so we can't unmount it. It will start anyway when main starts, so not starting it here is safe - it will just cause a 1-2 second delay in the graphics appearing. Change-Id: Idd546a578e62a24f999367b1407b37ad0f00f3a2
/system/core/rootdir/init.rc
|
e29590b08bce1667c6bddebeb80991b7d16344c4 |
|
18-Apr-2014 |
JP Abgrall <jpa@google.com> |
am 46e6b4f7: am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks" * commit '46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e': rootdir: init.rc: update max TCP window sizes for mobile networks
|
46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e |
|
18-Apr-2014 |
JP Abgrall <jpa@google.com> |
am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks" * commit 'b0397d55a2ff4b3c6664c9545be18ba88c07dea4': rootdir: init.rc: update max TCP window sizes for mobile networks
|
ce898489e4ff2567b297c8f8776504b9924f432a |
|
24-Mar-2014 |
Narayan Reddy <narayanr@nvidia.com> |
rootdir: init.rc: update max TCP window sizes for mobile networks GRPS: RTT=600ms, max tput=80kbps (class 12 GMSK 4+1) EDGE: RTT=300ms, max tput=236kbps (class 12 8PSK) UMTS: RTT=200ms, max tput=384kbps (R99) HSDPA: RTT=75ms, max tput=14Mbps (cat 10) HSUPA: RTT=50ms, max tput=14Mbps HSPA: RTT=50ms, max tput=14Mbps HSPA+: RTT=50ms, max tput=42Mbps (cat 20) LTE: RTT=20ms, max tput=100Mbps (class 3) bug 67569 Change-Id: I9d62359bbd11dc68e3649a7ea2295d0d4e25e3f2 Signed-off-by: Narayan Reddy <narayanr@nvidia.com> Signed-off-by: Steve Lin <stlin@nvidia.com>
/system/core/rootdir/init.rc
|
f24aab7d744b708a897e70e2cbdb76a81bc069b7 |
|
10-Apr-2014 |
Paul Lawrence <paullawrence@google.com> |
Fix forceencrypt When changing vdc cryptfs enablecrypto inplace default in https://googleplex-android-review.git.corp.google.com/#/c/445001/ forgot to change init.rc Change-Id: I2a937d3c302ab8eab4829a36101145d6fe726ab1
/system/core/rootdir/init.rc
|
11673a03e05c21bd254868466e6736b02ef1097e |
|
09-Apr-2014 |
dcashman <dcashman@google.com> |
am 8b4ea5a4: am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary." * commit '8b4ea5a49dda2767af87604713053e1bc418e96f': Enable world-readable selinuxfs policy binary.
|
8b4ea5a49dda2767af87604713053e1bc418e96f |
|
09-Apr-2014 |
dcashman <dcashman@google.com> |
am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary." * commit '39a5b812904ec13390d6261bafccf823729ae21d': Enable world-readable selinuxfs policy binary.
|
5822a4af8406fb6e9ecc675297af19852b378ca0 |
|
26-Mar-2014 |
dcashman <dcashman@google.com> |
Enable world-readable selinuxfs policy binary. Change-Id: I1eefb457cea1164a8aa9eeb7683b3d99ee56ca99
/system/core/rootdir/init.rc
|
dc9af896f011698949cf9237094e52eaec9d4e8e |
|
01-Apr-2014 |
Narayan Kamath <narayan@google.com> |
resolved conflicts for merge of 6a949b45 to master Change-Id: Ie123b4fff76ef43e2b1c0583731e88997504320e
|
6a949b45e9166bcd4fc4b18e795085126a937c7b |
|
01-Apr-2014 |
Narayan Kamath <narayan@google.com> |
am ffca173c: am 5da2dbbc: Merge "Move zygote init config to its own file." * commit 'ffca173c853a2e312610d87f40957f696ac8364a': Move zygote init config to its own file.
|
4456a55ce69cd5b8ad39349ed55d3efc3512bffa |
|
31-Mar-2014 |
Narayan Kamath <narayan@google.com> |
Move zygote init config to its own file. This allows us to choose different configs depending on whether or not the target is 64 capable, and what its preferred default is. bug: 13647418 Change-Id: Ie1ce4245a3add7544c87d27c635ee390f4062523
/system/core/rootdir/init.rc
|
5c789b8a31a1924a346b1485410b692b82781406 |
|
24-Mar-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Auto-encrypt drive at startup"
|
166fa3de7060198252b43a4a9ddd841fb6d65cf7 |
|
03-Feb-2014 |
Paul Lawrence <paullawrence@google.com> |
Auto-encrypt drive at startup Modify fs_mgr to unmount encryptable drives after test mounting them and then trigger an auto-encrypt via the init script Needs matching vold changes from https://googleplex-android-review.googlesource.com/#/c/414200/ Feature is limited to list of serial numbers with this change Bug: 11985952 Change-Id: I84f85a258b6a7e9809467c9149249302e203c41b
/system/core/rootdir/init.rc
|
bd28bb69c7e52f44743745562f10573c1814ff3c |
|
24-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am b5f9e65a: am 0a0cc719: init.rc: Add lmkd service back * commit 'b5f9e65ad127261df2f7c9ed40d73b9024f492f6': init.rc: Add lmkd service back
|
44983ace850dd47384fa7698c362b4cfc9ca7f4c |
|
24-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 68b9d5f0: am bdef5499: resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp * commit '68b9d5f07a443b44d81e09f65a45fea8c8f4984b': logd: core requirement
|
0a0cc7192e1081acff483ae4f455c3aad6370546 |
|
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: Add lmkd service back - not impressed with conflict for merge f8f0531b Change-Id: I5b9a1a93ea0cf7eda4ced8dcfc9d0ad70f7aa6c8
/system/core/rootdir/init.rc
|
bdef5499d4eb0c4f5e6853471373acd610798c7c |
|
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp Change-Id: I87228aa0dbd0b909437c85812f2404ca8be39f38
|
9a305cd168abea5d0eaad0f1b1e65466b9a823c9 |
|
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am f8f0531b: Merge "logd: core requirement" * commit 'f8f0531bb69a90e87f1bafa875e665e3935610b1': logd: core requirement
|
3c253dc88f3e1decb055340c84fd6234b422c409 |
|
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
logd: core requirement - has no dependency on /data, switch from main to core Change-Id: I4bfe3e67d4cbd31e943c609f5626e533857a27a9
/system/core/rootdir/init.rc
|
d94ed2c8fea4733684e4ebbf55c112828562b7a7 |
|
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am 7283db6d: am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60 * commit '7283db6d2694c8deae644a0d815cf292309a6176': init.rc: prep tcp_default_init_rwnd, set the default to 60
|
7283db6d2694c8deae644a0d815cf292309a6176 |
|
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60 * commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781': init.rc: prep tcp_default_init_rwnd, set the default to 60
|
10f229d4291da55c379ce7ae0e87b1a1878199e8 |
|
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60 * commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781': init.rc: prep tcp_default_init_rwnd, set the default to 60
|
efbf36f2dad8f083de6f48dbb682461d7cfa9781 |
|
21-Feb-2014 |
JP Abgrall <jpa@google.com> |
init.rc: prep tcp_default_init_rwnd, set the default to 60 The kernel's default is between 4~20. Prepare for javaland to modify the value at runtime. It can be done via setprop sys.sysctl.tcp_def_init_rwnd <value> Bug: 12020135 Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2 (cherry picked from commit 7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4)
/system/core/rootdir/init.rc
|
f447c1b3ae6d467392500a985e3974facb1b095f |
|
11-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value" * commit '858d0dd1e529575181abd8de607e46f7b273cc9d': set /proc/sys/net/unix/max_dgram_qlen to large value
|
9509103cd4f28cf05a9fc6c5b6fd97504875097c |
|
11-Mar-2014 |
Nick Kralevich <nnk@google.com> |
am 9453bce4: Merge "Apply restorecon_recursive to all of /data." * commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5': Apply restorecon_recursive to all of /data.
|
01c5199665cfa5c6631696d410c077c3dceb871e |
|
11-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am e9c8fb90: Merge "logd: initial checkin." * commit 'e9c8fb900a460699201208870ce9997a734261cc': logd: initial checkin.
|
dfda9b0b4703329745fc873a78034868937921ea |
|
07-Mar-2014 |
Colin Cross <ccross@android.com> |
am 27fd413d: Merge "Start debuggerd64 for 64-bit processes" * commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32': Start debuggerd64 for 64-bit processes
|
c1f1eb374e3153e71419b50e8e9642a0ffaaea1e |
|
07-Mar-2014 |
Nick Kralevich <nnk@google.com> |
am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file." * commit 'ba023b063d25b73923f2df536b6258967f756ff6': Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
|
1d39c53e29a9c56893d170f1eac3d720076e0e55 |
|
04-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 00eaae3a: am 556c9c24: am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value" * commit '00eaae3aaa6ea3ca2c9c00e0559fa6937ce33e37': set /proc/sys/net/unix/max_dgram_qlen to large value
|
556c9c245de257efe8bda09ff23d2c4f7add5e49 |
|
04-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value" * commit '858d0dd1e529575181abd8de607e46f7b273cc9d': set /proc/sys/net/unix/max_dgram_qlen to large value
|
581edc1b6c3799238cfb674dfddb97db44f2818e |
|
20-Nov-2013 |
Mark Salyzyn <salyzyn@google.com> |
set /proc/sys/net/unix/max_dgram_qlen to large value - init: set /proc/sys/net/unix/max_dgram_qlen to 300 - libsysutils: Add listen backlog argument to startListener - logd: set listen backlog to 300 Change-Id: Id6d37d6c937ba2d221e76258d89c9516619caeec
/system/core/rootdir/init.rc
|
5c3c77ed7855d262645c44b7e239476d9b66393d |
|
29-Jan-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file. mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed in the various device-specific init*.rc files but seems generic. Move it to the main init.rc file. Drop the separate chown for /data/misc/dhcp as this is handled by mkdir built-in if the directory already exists. Add a restorecon_recursive /data/misc/wifi/sockets. Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
d7ce27e8ae637b9bbaf0a31cd469a461b6651ab0 |
|
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am e6fb169f: am e570fd3a: am 9453bce4: Merge "Apply restorecon_recursive to all of /data." * commit 'e6fb169fd69bfa6775737f37d45041c5b229321c': Apply restorecon_recursive to all of /data.
|
e570fd3a32a3a3525a2e6a069d2b69c6184db56e |
|
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am 9453bce4: Merge "Apply restorecon_recursive to all of /data." * commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5': Apply restorecon_recursive to all of /data.
|
1bb3489e600876979146a6222ac5bb2a684702bf |
|
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
resolved conflicts for merge of e9c8fb90 to klp-modular-dev-plus-aosp Change-Id: I9ee9908a915258937b343de90dce5774d914f03a
|
9453bce4cff952aab5c90f5b30c6c12d3e1521e5 |
|
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Apply restorecon_recursive to all of /data."
|
0175b0747a1f55329109e84c9a1322dcb95e2848 |
|
26-Feb-2014 |
Mark Salyzyn <salyzyn@google.com> |
logd: initial checkin. * Create a new userspace log daemon for handling logging messages. Original-Change-Id: I75267df16359684490121e6c31cca48614d79856 Signed-off-by: Nick Kralevich <nnk@google.com> * Merge conflicts * rename new syslog daemon to logd to prevent confusion with bionic syslog * replace racy getGroups call with KISS call to client->getGid() * Timestamps are filed at logging source * insert entries into list in timestamp order * Added LogTimeEntry tail filtration handling * Added region locking around LogWriter list * separate threads for each writer * /dev/socket/logd* permissions Signed-off-by: Mark Salyzyn <salyzyn@google.com> (cherry picked from commit 3e76e0a49760c4970b7cda6153e51026af98e4f3) Author: Nick Kralevich <nnk@google.com> Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
/system/core/rootdir/init.rc
|
7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4 |
|
21-Feb-2014 |
JP Abgrall <jpa@google.com> |
init.rc: prep tcp_default_init_rwnd, set the default to 60 The kernel's default is between 4~20. Prepare for javaland to modify the value at runtime. It can be done via setprop sys.sysctl.tcp_def_init_rwnd <value> Bug: 12020135 Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2
/system/core/rootdir/init.rc
|
4046c132dc385fb9f2ae2e2198fd32269dd14a20 |
|
20-Feb-2014 |
Mark Salyzyn <salyzyn@google.com> |
Merge changes I929dddc7,Ice88b141,I243b1338 * changes: logd: prune more aggressively when over the top logd: initial checkin. logcat: test: add clear and blocking check
|
b6391ce26b6e5f7360efc7aba0fac8455cba53b4 |
|
16-Feb-2014 |
Colin Cross <ccross@android.com> |
am ee9de136: am bb2da79f: am 27fd413d: Merge "Start debuggerd64 for 64-bit processes" * commit 'ee9de136c52555e8775611ad32fc8ee47c75e3d1': Start debuggerd64 for 64-bit processes
|
bb2da79fdab68c9643a30f5156e7dcabb379b139 |
|
16-Feb-2014 |
Colin Cross <ccross@android.com> |
am 27fd413d: Merge "Start debuggerd64 for 64-bit processes" * commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32': Start debuggerd64 for 64-bit processes
|
78ef91aa5ec29cc45bf3f0d4b32cd92db000a95a |
|
16-Feb-2014 |
Dan Willemsen <dwillemsen@nvidia.com> |
Start debuggerd64 for 64-bit processes Change-Id: I2fc33d9eb2726b043d2f13bfab0c605dbb6083c7
/system/core/rootdir/init.rc
|
3e76e0a49760c4970b7cda6153e51026af98e4f3 |
|
15-Dec-2011 |
Nick Kralevich <nnk@google.com> |
logd: initial checkin. * Create a new userspace log daemon for handling logging messages. Original-Change-Id: I75267df16359684490121e6c31cca48614d79856 Signed-off-by: Nick Kralevich <nnk@google.com> * Merge conflicts * rename new syslog daemon to logd to prevent confusion with bionic syslog * replace racy getGroups call with KISS call to client->getGid() * Timestamps are filed at logging source * insert entries into list in timestamp order * Added LogTimeEntry tail filtration handling * Added region locking around LogWriter list * separate threads for each writer * /dev/socket/logd* permissions Signed-off-by: Mark Salyzyn <salyzyn@google.com> Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
/system/core/rootdir/init.rc
|
b6e3b3cea2c2606fcff0364d680335fc3433247b |
|
14-Feb-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Mount default encrypted devices at boot"
|
b3739735b84a88cccfe08c0d69b1017a07004470 |
|
13-Feb-2014 |
Nick Kralevich <nnk@google.com> |
lowmemorykiller: make perms 0220 Set * /sys/module/lowmemorykiller/parameters/adj * /sys/module/lowmemorykiller/parameters/minfree to 0220. This better indicates that these files are only intended to be written to, never read. Change-Id: I9ef054f032b3955e04128fc1a472a17c7b1fa792
/system/core/rootdir/init.rc
|
13d5bb4badf59e22d9d983d104596da3ec4f2753 |
|
30-Jan-2014 |
Paul Lawrence <paullawrence@google.com> |
Mount default encrypted devices at boot If userdata is default encrypted, we should mount it at boot to avoid bringing the framework up and then down unnecessarily. Needs matching vold changes from https://googleplex-android-review.googlesource.com/#/c/412649/ Bug: 8769627 Change-Id: I4b8276befd832cd788e15c36edfbf8f0e18d7e6b
/system/core/rootdir/init.rc
|
f2b7ee765516c84a9995e3acdc8fbcd7dc1b33cc |
|
06-Feb-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Apply restorecon_recursive to all of /data. With the following prior changes: I77bf2a0c4c34b1feef6fdf4d6c3bd92dbf32f4a1 I698b1b2c3f00f31fbb2015edf23d33b51aa5bba1 I8dd915d9bb80067339621b905ea2b4ea0fa8d71e it should now be safe (will correctly label all files) and reasonably performant (will skip processing unless file_contexts has changed since the last call) to call restorecon_recursive /data from init.rc. The call is placed after the setprop selinux.policy_reload 1 so that we use any policy update under /data/security if present. Change-Id: Ib8d9751a47c8e0238cf499fcec61898937945d9d Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
6edd1bdf53fe6fdeeca3b4031896df4f8007de3e |
|
04-Feb-2014 |
Doug Zongker <dougz@android.com> |
Merge "set permissions of recovery install script"
|
9526202d84387df3950bf526bbbaeac1ede129d2 |
|
04-Feb-2014 |
Doug Zongker <dougz@android.com> |
set permissions of recovery install script The script that writes the recovery partition after a successful update of system needs to be made executable. This change also moves it from /system/etc to /system/bin. Bug: 12893978 Change-Id: I686e2392a2392515a6859a7381b735de1007b7ea
/system/core/rootdir/init.rc
|
d9d8a60e42b0acc8ad6285fb8d6244d508ad0250 |
|
04-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am fbca9d94: am 7e3d72d9: am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file." * commit 'fbca9d9449231839b805ef4b11e4b2d968e601e3': Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
|
7e3d72d974d21932c2a6a0323c59fed2f689d323 |
|
04-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file." * commit 'ba023b063d25b73923f2df536b6258967f756ff6': Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
|
82e87ed4799b12b7bd2e20a6fe5fdc19e0350fc3 |
|
29-Jan-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file. mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed in the various device-specific init*.rc files but seems generic. Move it to the main init.rc file. Drop the separate chown for /data/misc/dhcp as this is handled by mkdir built-in if the directory already exists. Add a restorecon_recursive /data/misc/wifi/sockets. Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
35ef36456d89b4e823f32c328c4d0e6d15ae41e2 |
|
24-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am c3af60af: am c7e28899: am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root" * commit 'c3af60aff5d097c717b19721f143499891d5ca3d': adbd: switch to su domain when running as root
|
c7e28899c3917ad6e72d5dc99401bcd133cbd475 |
|
24-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root" * commit '16384312244b8dccd53478a7bdeeb9a492821807': adbd: switch to su domain when running as root
|
16384312244b8dccd53478a7bdeeb9a492821807 |
|
24-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 0620e3dd: Merge "adbd: switch to su domain when running as root" * commit '0620e3ddb85582f66612d046d1295dc20bf1a4f5': adbd: switch to su domain when running as root
|
d49aa2537cf0b454dfaa4b0312a403ebff202d70 |
|
18-Jan-2014 |
Nick Kralevich <nnk@google.com> |
adbd: switch to su domain when running as root When adbd runs as root, it should transition into the su domain. This is needed to run the adbd and shell domains in enforcing on userdebug / eng devices without breaking developer workflows. Introduce a new device_banner command line option. Change-Id: Ib33c0dd2dd6172035230514ac84fcaed2ecf44d6
/system/core/rootdir/init.rc
|
d0f2c265d8b7457bbb9b809e00b6e8b18bbef7c9 |
|
16-Jan-2014 |
Doug Zongker <dougz@android.com> |
Merge "add the pre-recovery service"
|
7baebf1345ff9e861ea8ccf9712128a3b7cd9fcc |
|
14-Jan-2014 |
Doug Zongker <dougz@android.com> |
add the pre-recovery service Add a service called "pre-recovery" which is normally stopped but can be started by the system server when we want to go into recovery. It will do any preparation needed (currently needed to handle update packages that reside on an encrypted /data partition) and then set sys.powerctl when it's ready to actually reboot. Bug: 12188746 Change-Id: I894a4cb200395a0f6d7fe643ed4c2ac0a45d2052
/system/core/rootdir/init.rc
|
32a32c9eb2b6975d76dae1dc5a2dbc73bb05f757 |
|
15-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 11190d0c: am 4552987e: am c93904b4: am e847f429: Merge "restorecon /data/misc/media." * commit '11190d0ccb1216307043ceecf5360f1a1a946cd1': restorecon /data/misc/media.
|
4552987e6a1338dac26f13f0851657335d998ffb |
|
15-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am c93904b4: am e847f429: Merge "restorecon /data/misc/media." * commit 'c93904b445830cd17fd9dd6d4fe236987577a478': restorecon /data/misc/media.
|
c93904b445830cd17fd9dd6d4fe236987577a478 |
|
15-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am e847f429: Merge "restorecon /data/misc/media." * commit 'e847f429f43ae56aaa406697ca603c8469e2100b': restorecon /data/misc/media.
|
9e9f05e5ebf72a60930a53e5cf45f575534fc29d |
|
15-Jan-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
restorecon /data/misc/media. Otherwise it will be mislabeled on upgrades with existing userdata. Change-Id: Ibde88d5d692ead45b480bb34cfe0831baeffbf94 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
0969ec3a558723ae55f033c163b052e1dbf97669 |
|
09-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 218878d4: am df8d0ffd: am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files." * commit '218878d447b58b357f0dc97bfe6b77196d35a729': Label existing /data/mediadrm files.
|
df8d0ffd73f8359def90d2f79d25059023018213 |
|
08-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files." * commit '72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7': Label existing /data/mediadrm files.
|
72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7 |
|
08-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 8830b53b: Merge "Label existing /data/mediadrm files." * commit '8830b53b76c05416c021df3eb0cea1dd541bc3ac': Label existing /data/mediadrm files.
|
2dcbb81d89c86144b38c0f0b56ea7420c74a7f5a |
|
08-Jan-2014 |
rpcraig <rpcraig rpcraig@tycho.ncsc.mil> |
Label existing /data/mediadrm files. Use restorecon_recursive to label devices where the directory and subfiles have already been built and labeled. Change-Id: I0dfe1e542fb153ad20adf7b2b1f1c087b4956a12 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/core/rootdir/init.rc
|
950909c301e316783e5b4687dbc422ed845cb69a |
|
11-Jul-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: start lmkd Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
/system/core/rootdir/init.rc
|
cb1f0147d729d1a3e9b4898ea98de3e6761233e4 |
|
02-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 88d040a3: am 3df76c0c: am 6bec36ec: am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls." * commit '88d040a32feac727a7e11658198c32d9cc563d8e': Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
|
6bec36ecc92af488f0193e03c386eaab409ca17c |
|
02-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls." * commit '5b8abdf6278a4142736d918d1371d10c54c91db3': Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
|
5b8abdf6278a4142736d918d1371d10c54c91db3 |
|
02-Jan-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."
|
3dd470552c6b1c88cd344c3a366666ba464bd994 |
|
27-Dec-2013 |
Colin Cross <ccross@android.com> |
am 469035b8: am fed48bb6: am 6604f2d1: am 2dcc2759: Merge "Run the console service shell in the shell domain." * commit '469035b83546a847a1f12c1feca50a1c7e5e1062': Run the console service shell in the shell domain.
|
6604f2d1ef5e78e7f129f94abe7a763dd0e0dd1d |
|
27-Dec-2013 |
Colin Cross <ccross@android.com> |
am 2dcc2759: Merge "Run the console service shell in the shell domain." * commit '2dcc275936aefbb5badf3b4822d492260077144d': Run the console service shell in the shell domain.
|
5e1461dc906f68f6590df1c79f2f4d69e0af18c5 |
|
23-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls. If checkreqprot == 1, SELinux only checks the protection flags passed by the application, even if the kernel internally adds PROT_EXEC for READ_IMPLIES_EXEC personality flags. Switch to checkreqprot == 0 to check the final protection flags applied by the kernel. Change-Id: Ic39242bbbd104fc9a1bcf2cd2ded7ce1aeadfac4 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
610653fe930d016e1d962661c4fcbe2a8747e5ac |
|
23-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Run the console service shell in the shell domain. This allows it to be permissive in userdebug/eng builds but confined/enforcing in user builds. Change-Id: Ie322eaa0acdbefea2de4e71ae386778c929d042b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
f7f823e46b285169637c1f1a9c17e16ae1566b92 |
|
16-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am 8b0d10c8: am a24e9a86: am 02ad8700: am e4335483: Merge "Relabel /data/misc/zoneinfo" * commit '8b0d10c870efbe8254f407e02c406c05bedfa0b5': Relabel /data/misc/zoneinfo
|
02ad8700dd22d5bf5d73c638e3a45c35d5ef3d1d |
|
16-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am e4335483: Merge "Relabel /data/misc/zoneinfo" * commit 'e4335483e78292800e27c7bf0a67d23bee47dc84': Relabel /data/misc/zoneinfo
|
354e9edbd73ad9453e6c284c0551105ccf6aac14 |
|
14-Dec-2013 |
Nick Kralevich <nnk@google.com> |
Relabel /data/misc/zoneinfo The files in zoneinfo changed from system_data_file to zoneinfo_data_file. Fixup pre-existing files. Change-Id: Idddbd6c2ecf66cd16b057a9ff288cd586a109949
/system/core/rootdir/init.rc
|
6b3867fc6b3cb45e6163c15cc831fd150a8b104c |
|
09-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am 7d1f3a3d: am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce." * commit '7d1f3a3daa721892b3247e847f72f1e948a0a68f': Do not change ownership on /sys/fs/selinux/enforce.
|
7d1f3a3daa721892b3247e847f72f1e948a0a68f |
|
09-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce." * commit 'bdf53e2a59654d2b1e8469616f1b0175b275219d': Do not change ownership on /sys/fs/selinux/enforce.
|
17bec835d5cf1dfd3fa94df3b0da84a1e731e447 |
|
09-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Do not change ownership on /sys/fs/selinux/enforce. There is no longer any reason to permit system UID to set enforcing mode. Change-Id: Ie28beed1ca2b215c71f2847e2390cee1af1713c3 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
7fc7a07b237e0887f3815822c4551b9968267b37 |
|
05-Dec-2013 |
The Android Open Source Project <initial-contribution@android.com> |
Merge commit '252d9030cd4b2e3e6cf13fa33f328eccedb5e26c' into HEAD
|
66ed50af6870210ce013a5588a688434a5d48ee9 |
|
22-Nov-2013 |
The Android Open Source Project <initial-contribution@android.com> |
Merge commit '536dea9d61a032e64bbe584a97463c6638ead009' into HEAD Change-Id: I5c469a4b738629d99d721cad7ded02d6c35f56d5
|
fabe8716f81ec419ec854799d0a63c444e91edd3 |
|
22-Nov-2013 |
Todd Poynor <toddpoynor@google.com> |
am fd1dd864: am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions * commit 'fd1dd864a896bd6233ee8c75b84d9771148dd9b3': init.rc: mount pstore fs, set console-ramoops permissions
|
fd1dd864a896bd6233ee8c75b84d9771148dd9b3 |
|
22-Nov-2013 |
Todd Poynor <toddpoynor@google.com> |
am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions * commit '479efb540a198a9b7cd278387b0d45009a05bb2b': init.rc: mount pstore fs, set console-ramoops permissions
|
9350d80e706f385c8a4dc6bc4fd9be15e6e0a850 |
|
22-Nov-2013 |
Elliott Hughes <enh@google.com> |
am b6ee39bc: am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi" * commit 'b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9': split setptop ethernet tcp buffer from wifi
|
479efb540a198a9b7cd278387b0d45009a05bb2b |
|
22-Nov-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: mount pstore fs, set console-ramoops permissions Change-Id: I44cb00f9123c6044a03de926b6a616da753bb549
/system/core/rootdir/init.rc
|
b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9 |
|
22-Nov-2013 |
Elliott Hughes <enh@google.com> |
am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi" * commit '4a4616f6450f191faf168a10b6e2ffaba14803bd': split setptop ethernet tcp buffer from wifi
|
4a4616f6450f191faf168a10b6e2ffaba14803bd |
|
21-Nov-2013 |
Elliott Hughes <enh@google.com> |
am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi" * commit '048bb92f3f33196d96a51b446c73805e208a5333': split setptop ethernet tcp buffer from wifi
|
52ea510f8fa84b634ffff18b75b5a3f95e302ba6 |
|
15-Nov-2013 |
Jianzheng Zhou <jianzheng.zhou@freescale.com> |
split setptop ethernet tcp buffer from wifi Change-Id: I0582ec75fddb904ca14b9cbddf593ddbd4195c41 Signed-off-by: Jianzheng Zhou <jianzheng.zhou@freescale.com>
/system/core/rootdir/init.rc
|
fb7e395455c9a2acee13aaa527768558d0a58b7c |
|
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 9b41f452: am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev * commit '9b41f452013123d0a394e696f597467da73108ed': vold no longer does MS_MOVE; remove tmpfs.
|
9b41f452013123d0a394e696f597467da73108ed |
|
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev * commit 'a9e453f1b552699f69dca19599c7624a581089bd': vold no longer does MS_MOVE; remove tmpfs.
|
00c8e1a2199b2f9c50935bb4ea8bb3b86ba1bbef |
|
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
vold no longer does MS_MOVE; remove tmpfs. MS_MOVE was used when staging external storage devices, which no longer occurs. In fact, having a writable tmpfs was masking a vold bug around moving apps to SD cards. Bug: 11175082 Change-Id: Ib2d7561c3a0b6fde94f651a496cb0c1f12f88d96
/system/core/rootdir/init.rc
|
eef6fca832c7270dfe48a9bb2aad632bba3d0ea8 |
|
09-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am a5fdea71: am e93a0517: Set GID required to write, media_rw mount point. * commit 'a5fdea7189239d7edeafa528c299306cba55e6c6': Set GID required to write, media_rw mount point.
|
a5fdea7189239d7edeafa528c299306cba55e6c6 |
|
08-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am e93a0517: Set GID required to write, media_rw mount point. * commit 'e93a0517f4c88310066ac39c6b268ebfcceef44e': Set GID required to write, media_rw mount point.
|
e93a0517f4c88310066ac39c6b268ebfcceef44e |
|
08-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Set GID required to write, media_rw mount point. Add sdcard FUSE daemon flag to specify the GID required for a package to have write access. Normally sdcard_rw, but it will be media_rw for secondary external storage devices, so DefaultContainerService can still clean up package directories after uninstall. Create /mnt/media_rw which is where vold will mount raw secondary external storage devices before wrapping them in a FUSE instance. Bug: 10330128, 10330229 Change-Id: I4385c36fd9035cdf56892aaf7b36ef4b81f4418a
/system/core/rootdir/init.rc
|
ecb2e3903bf24a511032654532f44486362de765 |
|
04-Oct-2013 |
Colin Cross <ccross@android.com> |
am ad296139: am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys." * commit 'ad2961397f1c7b79b114672108a3bc9b87dc8174': Set security context of /adb_keys and /data/misc/adb/adb_keys.
|
ad2961397f1c7b79b114672108a3bc9b87dc8174 |
|
04-Oct-2013 |
Colin Cross <ccross@android.com> |
am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys." * commit '410f8c305b416484f17f068c37b785605a2f69eb': Set security context of /adb_keys and /data/misc/adb/adb_keys.
|
410f8c305b416484f17f068c37b785605a2f69eb |
|
04-Oct-2013 |
Colin Cross <ccross@android.com> |
am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys." * commit '79b277ab73711313690d03a9fb2e9cb3f9242b39': Set security context of /adb_keys and /data/misc/adb/adb_keys.
|
41c9fd6480771ec7ab4c160aef046e0d27a085a0 |
|
02-Oct-2013 |
Colin Cross <ccross@android.com> |
am 0d3ac55d: am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data." * commit '0d3ac55d0654fe4f6d37923782dcd41f0590c741': Trigger a policy reload from post-fs-data.
|
0d3ac55d0654fe4f6d37923782dcd41f0590c741 |
|
02-Oct-2013 |
Colin Cross <ccross@android.com> |
am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data." * commit '230252d5cd70f5be4c24046c7a409e9498ac97f5': Trigger a policy reload from post-fs-data.
|
230252d5cd70f5be4c24046c7a409e9498ac97f5 |
|
02-Oct-2013 |
Colin Cross <ccross@android.com> |
am 61afb07b: Merge "Trigger a policy reload from post-fs-data." * commit '61afb07b9b14233f76a969840f74ce1ced22bf58': Trigger a policy reload from post-fs-data.
|
deb41e512760f9d18cb718b007ced367018b3667 |
|
01-Oct-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Set security context of /adb_keys and /data/misc/adb/adb_keys. I97b3d86a69681330bba549491a2fb39df6cf20ef introduced a separate type for the adb_keys file. Set the security context of the adb_keys file accordingly by adding restorecon commands to init.rc. Change-Id: I30e4d2a1ae223a03eadee58a883c79932fff59fe Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
61afb07b9b14233f76a969840f74ce1ced22bf58 |
|
30-Sep-2013 |
Colin Cross <ccross@android.com> |
Merge "Trigger a policy reload from post-fs-data."
|
63144019468b2043393aabd7cba6f03b2e9a4234 |
|
24-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
am dfcbf02b: am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev * commit 'dfcbf02bb0a6705e3714a59e42e052fbb0ce8799': Create a separate copy of the fsck logs
|
dfcbf02bb0a6705e3714a59e42e052fbb0ce8799 |
|
24-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev * commit '6b1a027239689a817aa5ca44a2bcbfe48ed21408': Create a separate copy of the fsck logs
|
6b1a027239689a817aa5ca44a2bcbfe48ed21408 |
|
23-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
Merge "Create a separate copy of the fsck logs" into klp-dev
|
4676550b5684da8355f9ee0b2db964005ce9ea4f |
|
17-Sep-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: use oom_score_adj instead of oom_adj Use kernel oom_score_adj interface to make init and children unkillable. Stop using older, deprecated oom_adj interface. Use OOM_SCORE_ADJ_MIN to make the processes unkillable (previously the processes were set to a very low score, but not unkillable). Change-Id: I680965009585c2a5a580859fb946f2d0caa95d9c
/system/core/rootdir/init.rc
|
4eaf905858c6a1d7cf0639bed3e8de3bd7987646 |
|
19-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
Create a separate copy of the fsck logs The log_target parameter of android_fork_execvp_ext() is now a bit field, and multiple targets can be set to log to multiple places at the same time. The new target LOG_FILE will log to a file specified by the new parameter file_path. Set LOG_FILE and log to a file in /dev (the only writable filesystem avilable when e2fsck runs) when invoking e2fsck in fs_mgr. Bug: 10021342 Change-Id: I63baf644cc8c3afccc8345df27a74203b44d0400
/system/core/rootdir/init.rc
|
aa4a3228f00fedd870c25dc37a112e439682dbde |
|
21-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 9729b415: am 44d6342c: Remove mkdir() side effect, add .nomedia, utils. * commit '9729b41574ca5e5e87c86b203a2096cbdc72cfea': Remove mkdir() side effect, add .nomedia, utils.
|
9729b41574ca5e5e87c86b203a2096cbdc72cfea |
|
21-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 44d6342c: Remove mkdir() side effect, add .nomedia, utils. * commit '44d6342caa0db1f613809e9ba1ea8d9af0183b74': Remove mkdir() side effect, add .nomedia, utils.
|
44d6342caa0db1f613809e9ba1ea8d9af0183b74 |
|
12-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
Remove mkdir() side effect, add .nomedia, utils. Before this change, FUSE lookup() would have the side effect of creating the directory on behalf of apps. This resulted in most directories being created just by Settings trying to measure disk space. Instead, we're switching to have vold do directory creation when an app doesn't have enough permissions. Create fs_mkdirs() utility to create all parent directories in a path as needed. Allow traversal (+x) into /storage directories. Fix FUSE derived permissions to be case insensitive. Mark well-known directories as .nomedia when created. Bug: 10577808, 10330221 Change-Id: I53114f2e63ffbe6de4ba6a72d94a232523231cad
/system/core/rootdir/init.rc
|
5660da25b9cd0b2e8d4e5d89de5b1cc281bce9bd |
|
19-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 1998e505: am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID." * commit '1998e505a98ad445bead87c2bb047053f1aea648': Do not change ownership of /sys/fs/selinux/load to system UID.
|
1998e505a98ad445bead87c2bb047053f1aea648 |
|
19-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID." * commit '2e9402863b40fe8bf2ddd8169c62f2419d968ff9': Do not change ownership of /sys/fs/selinux/load to system UID.
|
2e9402863b40fe8bf2ddd8169c62f2419d968ff9 |
|
19-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID." * commit '0f507339ec474a2f67227466efc9045630f1f1a4': Do not change ownership of /sys/fs/selinux/load to system UID.
|
cc13e8ab87f74143293722e5301480fbe31b788d |
|
26-Aug-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Do not change ownership of /sys/fs/selinux/load to system UID. Policy reload is handled by setting the selinux.reload_policy property and letting the init process perform the actual loading of policy into the kernel. Thus, there should be no need for the system UID to directly write to /sys/fs/selinux/load. Change-Id: I240c5bb2deaee757a2e1e396e14dea9e5d9286f5 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
5d4be690935ea7970a53837914f31de0a4f0690d |
|
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 0e7bd81c: am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev * commit '0e7bd81c938611cfa4ebf44870668300a5bba875': Initialize /dev/urandom earlier in boot.
|
0e7bd81c938611cfa4ebf44870668300a5bba875 |
|
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev * commit '4f18183bd6d3d2ed5d698c176ecc239211bdb82e': Initialize /dev/urandom earlier in boot.
|
b410eb19130cf1eca158a672bba8f515e7627f11 |
|
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
Initialize /dev/urandom earlier in boot. It's a security best practice to carry entropy across reboots. (see "man 4 random"). Currently, entropy saving and mixing occur in the system_server, via the EntropyMixer code. Unfortunately, the EntropyMixer code runs fairly late in the boot process, which means early boot doesn't have high quality entropy. This has caused security problems in the past. Load entropy data as soon as we can in the early boot process, so that we can get /dev/random / /dev/urandom into a "random" state earlier. Bug: 9983133 Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
/system/core/rootdir/init.rc
|
59e51e792a13e017d0f1b85a02fcc56815ea83d6 |
|
11-Sep-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: no longer start healthd in charger mode Being moved to healthd/charger mode in board-specific init.rc. Change-Id: Ie9fc2e5abc1737fbffec8fb071c73f5fd96e4d17
/system/core/rootdir/init.rc
|
8d0a92ddc568c4fb065d8e9ec098f1ef4ff9e6ac |
|
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
am 342077e7: am 67b00d8b: init.rc: change mem cgroups permissions * commit '342077e78da9411c252232313bc40fb4ce5f6137': init.rc: change mem cgroups permissions
|
342077e78da9411c252232313bc40fb4ce5f6137 |
|
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
am 67b00d8b: init.rc: change mem cgroups permissions * commit '67b00d8b2d96e8133c249bcbc0fb63c49e10e022': init.rc: change mem cgroups permissions
|
67b00d8b2d96e8133c249bcbc0fb63c49e10e022 |
|
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
init.rc: change mem cgroups permissions Changing mem cgroups permissions to only be accessible by root and system. Bug: 10210529 Bug: 10210900 Change-Id: Ib4fff6f49b33013b3629d40ae98a5e2464571b2d
/system/core/rootdir/init.rc
|
aacded70196acf958ddd26149dec9709571f1f56 |
|
11-Jul-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: start lmkd Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
/system/core/rootdir/init.rc
|
6552f6885fc2a94501ca064bffc4c18ad40caad8 |
|
26-Aug-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Trigger a policy reload from post-fs-data. Once userdata is available and decrypted, trigger a policy reload to pick up any policy update files stored under /data/security. Change-Id: Ic2b3121c3395429b108c40d1d7f5a3124a5896c5 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
a34f1391bd9c368aceecb3f8dec158b2cb8b2dd4 |
|
23-Aug-2013 |
Colin Cross <ccross@android.com> |
am 30caffc0: resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp * commit '30caffc025aff450ebb354ee693174cc1732732b': Handle policy reloads within ueventd rather than restarting it.
|
30caffc025aff450ebb354ee693174cc1732732b |
|
23-Aug-2013 |
Colin Cross <ccross@android.com> |
resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp Change-Id: I08e9898940f7cdd466469b76760807cc5d5c67e4
|
a1af5cf6d1c008dbde2e40121940d65faa0816bf |
|
23-Aug-2013 |
Colin Cross <ccross@android.com> |
am d8d99c45: Merge "Handle policy reloads within ueventd rather than restarting it." * commit 'd8d99c45b704399d50ae0a5e4df938d825c70cfa': Handle policy reloads within ueventd rather than restarting it.
|
46a24db563f46736f6e02c4d80656ab51d94ff77 |
|
23-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Remove input flinger stubs. (DO NOT MERGE) Bug: 10446930 Change-Id: I88b926380dbe1e866c0b87ec95b3489d87c5907b
/system/core/rootdir/init.rc
|
13f4c9fb279f1b34a3b47a6eac80b8a09d2d3a79 |
|
20-Jun-2013 |
Todd Poynor <toddpoynor@google.com> |
healthd: normal and charger mode startup Command line flag -n tells healthd not to use (or wait for) servicemanager in charger mode. Change-Id: I255f9597dff6fc904f5ed20fd02f52c0531d14f8
/system/core/rootdir/init.rc
|
5ba57f9a951728593aed559ece93ba821c33e45c |
|
27-Jul-2013 |
Colin Cross <ccross@android.com> |
Merge "add property to adjust extra_free_kbytes kernel vm tunable"
|
e2eb69db6d818b41f5c0f2090cc643f7cff31734 |
|
16-Apr-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Handle policy reloads within ueventd rather than restarting it. Restarting ueventd upon policy reloads has reportedly created stability problems for some users and could cause events to be lost. Stop restarting ueventd and instead handle policy reloads within ueventd. Also stops restarting installd upon policy reloads. Change-Id: Ic7f310d69a7c420e48fbc974000cf4a5b9ab4a3b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
57fdb5cfd2b20f47299a12c2050ff8bb2707c788 |
|
25-Jul-2013 |
Colin Cross <ccross@android.com> |
add property to adjust extra_free_kbytes kernel vm tunable ActivityManager can't directly write to extra_free_kbytes because /proc/sys rejects all chown and chmod syscalls. Proxy the writes through init by using the sys.sysctl.extra_free_kbytes property. Bug: 10024467 Change-Id: I441e00478421254355fcafb252bc878166483d4c
/system/core/rootdir/init.rc
|
5748ee972de22e3a53bd3ef7d998ed15ea726a69 |
|
24-Jul-2013 |
Ying Wang <wangying@google.com> |
Generate init.environ.rc by populating BOOTCLASSPATH - BOOTCLASSPATH now is derived from PRODUCT_BOOT_JARS, which is a product configuration variable set up by the core build system. - Moved files from the legacy ALL_PREBUILT to PRODUCT_COPY_FILES in build/target/product/embedded.mk. Bug: 9990214 Change-Id: I98bac36c1ca8c779dda572a0a5e0a22b7e4c4a7a
/system/core/rootdir/init.rc
|
f498ec8fafcce6fe30ba3a80bbdbce6577b6b921 |
|
20-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am dafa66af: am 2aa33a3d: Add writable data space for radio. * commit 'dafa66afdd3729e2c65ccb8dced8ca3e137db437': Add writable data space for radio.
|
dafa66afdd3729e2c65ccb8dced8ca3e137db437 |
|
19-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am 2aa33a3d: Add writable data space for radio. * commit '2aa33a3dbd1147558098d9a2948450d363ffe468': Add writable data space for radio.
|
57fc1ceebc6a8c84fa6e9cbf268b5ffca3052c2d |
|
18-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
Split framework jar. Change-Id: I590de05f23669cf625030b479c786423f21c6159
/system/core/rootdir/init.rc
|
2aa33a3dbd1147558098d9a2948450d363ffe468 |
|
16-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Add writable data space for radio. Storing carrier provisioning urls updates in /data/misc/radio. bug:9623159 Change-Id: I8d62d4638229733dea0f11f1729c4d22ae2295d1 I36697ed341353b7a3dbec5afe20241102e76f6f1
/system/core/rootdir/init.rc
|
3884a9b252c1852e88a2ad75c22b042d25a633f4 |
|
13-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
init.rc: Add input flinger. Change-Id: Ibcb1116bdcd9189272db620910b9958c8ffb4552
/system/core/rootdir/init.rc
|
4a291b339e1ab682609485aef6fbb46b66b0de90 |
|
15-Jul-2013 |
Rom Lemarchand <romlem@google.com> |
Merge "init.rc: configure memory cgroups"
|
56adf992676e39175f227ac1a542d841bb6c0c24 |
|
15-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am 9a4913d4: init.rc: remove "on fs" section * commit '9a4913d422f4c18033333afe8e2e1d699b112d44': init.rc: remove "on fs" section
|
435a52ef07a5c97bdd717f20cb3115a585eb6d3c |
|
10-Jul-2013 |
Rom Lemarchand <romlem@google.com> |
init.rc: configure memory cgroups Create the memory cgroups folders and configure them Change-Id: I06c4bb486b204f7e98b0bc6757deec8bd7f6349e
/system/core/rootdir/init.rc
|
9a4913d422f4c18033333afe8e2e1d699b112d44 |
|
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
init.rc: remove "on fs" section This was only ever used by the emulator. Now the emulator uses an fstab file. Change-Id: I1a071e567e1f1a379f9c8079cc2dc17660d8455f
/system/core/rootdir/init.rc
|
e1dbdd697894f84e2cb8882160f0e4104f739064 |
|
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am 7d6ddc7d: am 2713be91: am fb1c9cf6: Merge "use ext4 instead of yaffs" * commit '7d6ddc7d395e909d841bb7eadfc12a167076aecf': use ext4 instead of yaffs
|
2713be91a84078e8b0b9b755ce17881b750e85a7 |
|
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am fb1c9cf6: Merge "use ext4 instead of yaffs" * commit 'fb1c9cf6fa4efafb3e0c6b0bc93c7f087d926a48': use ext4 instead of yaffs
|
f4c1512db8f0d2fd19d80487d96db3af7ceaacb5 |
|
10-Jul-2013 |
Nick Kralevich <nnk@google.com> |
use ext4 instead of yaffs This is needed to allow the emulator to use ext4 images. Bug: https://code.google.com/p/android/issues/detail?id=38561 Change-Id: I02fde6382ad67cf7f4f3b695396841f70bb9301d
/system/core/rootdir/init.rc
|
317ec9246b28c8be373d2915be5fbfd85b2854e2 |
|
04-Jun-2013 |
Torne (Richard Coles) <torne@google.com> |
Add webviewchromium to BOOTCLASSPATH. Add /system/framework/webviewchromium.jar to BOOTCLASSPATH. This jar contains the implementation classes for the new WebView. It has been processed with jarjar to ensure that it doesn't define any classes outside of com.android. Change-Id: If65913638df0088f4dd7d62a087750b90038a7fb
/system/core/rootdir/init.rc
|
71952461310cff9f35a4852415c608d14c92236a |
|
21-May-2013 |
Colin Cross <ccross@android.com> |
am 5f1a938e: am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '5f1a938e9c65829c3afebb4d92c8e93caecc3e11': init.rc: remove duplicated led-related nodes
|
5f1a938e9c65829c3afebb4d92c8e93caecc3e11 |
|
21-May-2013 |
Colin Cross <ccross@android.com> |
am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2': init.rc: remove duplicated led-related nodes
|
3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2 |
|
21-May-2013 |
Colin Cross <ccross@android.com> |
am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '9246f8d6def40a50933a980fac773a909f2138d7': init.rc: remove duplicated led-related nodes
|
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '253e91b4ffb631b188fdac0c1624786103471f05': Revert "Add persistent property for SELinux enforcment status."
|
acef650dbc11355f9792923b69d8277a4ce89fab |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition." * commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1': Revert "Reload policy after setting up the data partition."
|
9a8cb3abf8985586172d8f891933b04ff419f81c |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am b9866649: am 52351300: Revert "Add a version check for SELinux policy on device." * commit 'b9866649e24d7b6eedcaf2e03ffc605a3417537d': Revert "Add a version check for SELinux policy on device."
|
253e91b4ffb631b188fdac0c1624786103471f05 |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6': Revert "Add persistent property for SELinux enforcment status."
|
43329bc1c99c0f5f3670a8aaab39e54df34819a1 |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 8a387870: Revert "Reload policy after setting up the data partition." * commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8': Revert "Reload policy after setting up the data partition."
|
b9866649e24d7b6eedcaf2e03ffc605a3417537d |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 52351300: Revert "Add a version check for SELinux policy on device." * commit '52351300d156826bf22c493828571f45a1cea16a': Revert "Add a version check for SELinux policy on device."
|
a8d392da915b46a59dc5eab82a2b6cf17a9b3a86 |
|
20-May-2013 |
Sungmin Choi <sungmin.choi@lge.com> |
init.rc: remove duplicated led-related nodes Change-Id: Ibee7ef9137594fc4c30d3ab6ee7bdf3515836c62
/system/core/rootdir/init.rc
|
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add persistent property for SELinux enforcment status." This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
/system/core/rootdir/init.rc
|
8a3878700eb9cd8ecf495cd01f15face5c3879c8 |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Reload policy after setting up the data partition." This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
/system/core/rootdir/init.rc
|
52351300d156826bf22c493828571f45a1cea16a |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add a version check for SELinux policy on device." This reverts commit 921be8b6568df0057c4eacbac2e1022b71e09620.
/system/core/rootdir/init.rc
|
e45710f19f3843dd0ec02d1a5c7f679f34a33846 |
|
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 5a98566d: am 921be8b6: Add a version check for SELinux policy on device. * commit '5a98566d589408c78e35f4476f478a2fa1c13e78': Add a version check for SELinux policy on device.
|
5a98566d589408c78e35f4476f478a2fa1c13e78 |
|
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 921be8b6: Add a version check for SELinux policy on device. * commit '921be8b6568df0057c4eacbac2e1022b71e09620': Add a version check for SELinux policy on device.
|
921be8b6568df0057c4eacbac2e1022b71e09620 |
|
10-May-2013 |
repo sync <gcondra@google.com> |
Add a version check for SELinux policy on device. This helps to ensure that when a new system image is installed, old userdata policy isn't applied over the top of it. Bug: 8841348 Change-Id: I135af32250aa62979763e775842ce0af3c8b6f9f
/system/core/rootdir/init.rc
|
8577e8649062953a59e0ac652b5ac16c96c1c1f4 |
|
09-May-2013 |
Mathias Agopian <mathias@google.com> |
surfaceflinger is now always running in its own process Change-Id: I1ae63347a8b6d406306ed894665674dd726b7d51
/system/core/rootdir/init.rc
|
69e9b17fa1a7ac4dea56963008096a4961245277 |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
am cb4b9605: am 8794b2ee: Merge "Fix perms on /data/security" * commit 'cb4b9605cb923d071a546b444d10cbe21367d878': Fix perms on /data/security
|
cb4b9605cb923d071a546b444d10cbe21367d878 |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
am 8794b2ee: Merge "Fix perms on /data/security" * commit '8794b2eeb2bbd717ca18b8bef5d853f99334aabc': Fix perms on /data/security
|
8794b2eeb2bbd717ca18b8bef5d853f99334aabc |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
Merge "Fix perms on /data/security"
|
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a |
|
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 63577d92: am fee250d2: Reload policy after setting up the data partition. * commit '63577d9280e7919bfb7221030d211b833e66bb1e': Reload policy after setting up the data partition.
|
63577d9280e7919bfb7221030d211b833e66bb1e |
|
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am fee250d2: Reload policy after setting up the data partition. * commit 'fee250d27a9c03af1ba439047b976d89563b1887': Reload policy after setting up the data partition.
|
fee250d27a9c03af1ba439047b976d89563b1887 |
|
30-Apr-2013 |
repo sync <gcondra@google.com> |
Reload policy after setting up the data partition. This forces a policy reload + fixcon to deal with dynamically delivered policy changing labels on device nodes. It's implemented as a new keyword in init. Bug: 8702843 Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
/system/core/rootdir/init.rc
|
152a43215143f62ee4bedda96ce73604530a6f1d |
|
30-Apr-2013 |
Kenny Root <kroot@google.com> |
am d14586e3: resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp * commit 'd14586e35a3df39cc3aa6aff6a54463270a5e1a7': Track change to JSSE provider
|
d14586e35a3df39cc3aa6aff6a54463270a5e1a7 |
|
30-Apr-2013 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp Change-Id: If41560f0fef3103cad2172061a7988ceb5556377
|
ca0404b83e9e5712531e040675212a4bd0d7f6a8 |
|
24-Apr-2013 |
Kenny Root <kroot@google.com> |
Track change to JSSE provider Change-Id: Iff9103fff3591983f2b172f83fd2a6e924986aa7
/system/core/rootdir/init.rc
|
ada3291c8d13a9c3896102932abefed155a5b3fe |
|
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '14ad786183455ad9c8298e24946d4da0f24458d7': Add persistent property for SELinux enforcment status.
|
14ad786183455ad9c8298e24946d4da0f24458d7 |
|
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '538b5d4e8e4c480b2120aa957fe3e11a2836a1b3': Add persistent property for SELinux enforcment status.
|
538b5d4e8e4c480b2120aa957fe3e11a2836a1b3 |
|
26-Apr-2013 |
repo sync <gcondra@google.com> |
Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev
|
b89bdfde422eff751b3f939f10ab57e22af83eaa |
|
24-Apr-2013 |
repo sync <gcondra@google.com> |
Add persistent property for SELinux enforcment status. Also adds triggers for going between enforcing and permissive status. Bug: 8702843 Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
/system/core/rootdir/init.rc
|
7629bf19a139cbc204e8ae78cb82c2faeba6d2f0 |
|
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
am 9e9ed1b4: am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev * commit '9e9ed1b40010745e709157a6977ba6d053d46c49': Add a new group for MediaDrm engine plugins
|
9e9ed1b40010745e709157a6977ba6d053d46c49 |
|
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev * commit '131ee07b77e0250c16cebe2b0e226c5bff8e9587': Add a new group for MediaDrm engine plugins
|
08d64308b93594c587036cffcd8f6780eaf2c417 |
|
24-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
Add a new group for MediaDrm engine plugins bug: 8702754 Change-Id: I3b7988b64b1dcf4685624e4c1af938e132b82696
/system/core/rootdir/init.rc
|
ca8e66a8b0f843812014a28d49208f9f6f64ecbc |
|
18-Apr-2013 |
Nick Kralevich <nnk@google.com> |
Make init handle reboots Move the responsibility for rebooting the system from the reboot command to init. Init is in a better position to take actions to bring the system down cleanly, including making sure filesystems are mounted read-only. The only UIDs which can perform an init triggered reboot are root, system, and shell. Modify the reboot command so that it calls into init to perform the reboot. The reboot command no longer requires CAP_SYS_BOOT. Remove the -n reboot option and code which supports it. Anyone needing to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'. Modify adb so that it calls into init to perform a shutdown. Bug: 8646621 Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
/system/core/rootdir/init.rc
|
d43bab7b98d329ead0b5304be79d430b5a92ad10 |
|
15-Apr-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Fix perms on /data/security installd and zygote need to be able to search the directory to access the policy files. Change-Id: I0679fd2084d2664dfb5a594f493317eff058415d
/system/core/rootdir/init.rc
|
76c674451c831c1e9c3e3ee134ea8af26ae19ac1 |
|
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
Merge "resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp" into jb-mr2-dev-plus-aosp
|
d3f0e0ae379f4420b01bb9de932a764c035ff2a6 |
|
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp Change-Id: I63d6a2f975a6c0df5c238a2f7592f357441eb767
|
c2594f36e789bbd49cbeeb9421a7b6a16cd30ba4 |
|
31-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Give system ownership of selinux load and enforce files. This is necessary to enable remote updates. Change-Id: I05fb979c0360eca4cc6e4add48bb42f712a1ba17
/system/core/rootdir/init.rc
|
8637e8186ac572df92a34253f93bf405bf634b03 |
|
30-Mar-2013 |
jwilson <jwilson@squareup.com> |
Add OkHttp to the boot classpath. Change-Id: I185b803b5b804ff8680ef928ce5163727adbf0bd
/system/core/rootdir/init.rc
|
6b5de1cda2e5c4946aa08a11a38ad0a7eee115ce |
|
25-Mar-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set owner/perm for interactive governor io_is_busy Change-Id: I7537d56a23ca787daf92a9d91778056f987097bd
/system/core/rootdir/init.rc
|
fb39c0d19860fe48bc598d5d180a8cce9f59e33b |
|
23-Mar-2013 |
Geremy Condra <gcondra@google.com> |
am 4d71493e: am e849970c: Merge "Fix mode on /data/security." * commit '4d71493e74ed1ea39e554146351cc39e47cb5d02': Fix mode on /data/security.
|
bfd71b489b283fe54669dc5d1ccdc97b453d2fb4 |
|
23-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Create a new location for /data policy files Adding a new location for policy files under /data, the new location is /data/security. The new location is used before attempting to use any other location. This requires a new directory to be created by the init script and an update to the location of the property_contexts file for property service. Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
/system/core/rootdir/init.rc
|
c0317a75793ecbcd4a8e19f477458eb677024869 |
|
28-Jan-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Fix mode on /data/security. Change-Id: Id97d06a1c360c7871361db147f76b8a2eaceca42 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
46e1bd89b457713bf91d2dc751795822cc202658 |
|
23-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Create a new location for /data policy files Adding a new location for policy files under /data, the new location is /data/security. The new location is used before attempting to use any other location. This requires a new directory to be created by the init script and an update to the location of the property_contexts file for property service. Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
/system/core/rootdir/init.rc
|
fb4f7acefb31a51679cec194562c7aeb3922f728 |
|
14-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add symlink to bugreport storage location. Change-Id: I16f024c24767cfa1f5800d568d39fb098a408127
/system/core/rootdir/init.rc
|
65e203070c0cb25f5401502d60e924ff2b5bdae5 |
|
23-Feb-2013 |
Glenn Kasten <gkasten@google.com> |
Merge "Add directory for mediaserver"
|
b0f908a95714fbbfd63ee498e5773c44712b30e2 |
|
22-Feb-2013 |
Glenn Kasten <gkasten@google.com> |
Add directory for mediaserver Bug: 8223560 Change-Id: Iccc6d439a848445cac0f5b30d1d663aed3f5344e
/system/core/rootdir/init.rc
|
fe8425b5c5156c60691927a982672abd7927b777 |
|
22-Feb-2013 |
Nick Kralevich <nnk@google.com> |
am c5ce4108: am 1b64957a: Merge "init.rc: allow IPPROTO_ICMP support" * commit 'c5ce4108facc5a1b94fcf9469a189b2cbdfd5e76': init.rc: allow IPPROTO_ICMP support
|
be341cc348257a07c68bcbfdc526835d49283329 |
|
22-Feb-2013 |
Nick Kralevich <nnk@google.com> |
init.rc: allow IPPROTO_ICMP support Allow userspace programs to create IPPROTO_ICMP sockets. This socket type allows an unprivileged program to safely send ICMP_ECHO messages and receive the corresponding ICMP_ECHOREPLY messages, without relying on raw sockets or setuid programs. Please see http://lwn.net/Articles/443051/ for details. In particular, this allows us to use a version of ping which doesn't have any capabilities (https://android-review.googlesource.com/52072). In addition, this allows us to safely implement an IPv4 ICMP based version of InetAddress.isReachable() (https://code.google.com/p/android/issues/detail?id=20106) Change-Id: I876718151efa8219c4f34f573e35e21256fe2316
/system/core/rootdir/init.rc
|
c0d399df697850712432cb6092d63669ffa0fc23 |
|
29-Jan-2013 |
Wink Saville <wink@google.com> |
Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip Add voip-common to BOOTCLASSPATH Change-Id: Ieaba759a0f69b45c4b8839cbed1fe757cdf190c5
/system/core/rootdir/init.rc
|
a44404154730e54615d44c389b11cec9dd86c001 |
|
05-Jan-2013 |
JP Abgrall <jpa@google.com> |
am ba900f2e: am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files" * commit 'ba900f2e708f0b654cdaa827804cbb21af4e4fb4': init.rc: setup qtaguid group ownership of ctrl and stat files
|
ba900f2e708f0b654cdaa827804cbb21af4e4fb4 |
|
05-Jan-2013 |
JP Abgrall <jpa@google.com> |
am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files" * commit 'fb69c2e2577e056bb7a054343a9f6d781cedbf3d': init.rc: setup qtaguid group ownership of ctrl and stat files
|
3e54aabc63535572242477fadbf13ec42b06649e |
|
04-Jan-2013 |
JP Abgrall <jpa@google.com> |
init.rc: setup qtaguid group ownership of ctrl and stat files This will help get rid of android_aid.h in the kernel. The group of the proc entries will be used in place of the default values picked up by the xt_qtaguid netfilter module (AID_NET_BW_STATS, AID_NET_BW_ACCT). This change has no effect until the matching kernel changes are submitted. Change-Id: I3c177e7b5caf9c59300eba6bd4a976634b333674
/system/core/rootdir/init.rc
|
2b5b3bb103f59d9d3bf25c0c1f8035db036917da |
|
21-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
rootdir: init.rc: set perms for new interactive governor attrs /sys/devices/system/cpu/cpufreq/interactive/timer_slack /sys/devices/system/cpu/cpufreq/interactive/target_loads Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
/system/core/rootdir/init.rc
|
191af2f2c3effc5a60f1643dd6283ecc5a521603 |
|
21-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
am 367f1e4b: am 4f247d75: rootdir: init.rc: set perms for cpufreq governor boostpulse_duration * commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42': rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
|
4f247d753a8865cd16292ff0b720b72c28049786 |
|
20-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
rootdir: init.rc: set perms for cpufreq governor boostpulse_duration Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
/system/core/rootdir/init.rc
|
92781808bab8f045752aa1824a57956ddd52fcbd |
|
13-Nov-2012 |
Kenny Root <kroot@google.com> |
Switch keystore to binder Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
/system/core/rootdir/init.rc
|
066d3f9b3bd77df71542b132adda8eb25bc013c0 |
|
22-Oct-2012 |
Elliott Hughes <enh@google.com> |
resolved conflicts for merge of 3e5e9e9e to jb-mr1-dev-plus-aosp Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
|
f820e85164a1863e4384f5e1ca8b6f46902bd74e |
|
20-Oct-2012 |
Elliott Hughes <enh@google.com> |
Add a directory for tzdata updates. Bug: 7012465 Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
/system/core/rootdir/init.rc
|
c6f8bd396614d422d80ac9f24c91fa44a713894a |
|
08-Oct-2012 |
Dima Zavin <dima@android.com> |
Merge "rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups" into jb-mr1-dev
|
ece565cca2a4babe897f5fd68ab14a7af5071b30 |
|
05-Oct-2012 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups This is necessary for some HWC hals to be able to communicate with secure side to grant protected access to hardware owned by the hwc. This is necessary on some architectures to grant access to secure buffers to overlay/csc hardware Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
971153aa4a65c4fbc8d916c619a17d3912b2cb02 |
|
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Create bluetooth stack aid for sharing gid between all bluetooth processes bug 6925422 Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
/system/core/rootdir/init.rc
|
d6d478058fc201bfc70f353019477e17c71a29d4 |
|
27-Sep-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Add writable data space for radio. Storing Premium SMS regex's in /data/misc/sms. bug:7221402 Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
/system/core/rootdir/init.rc
|
9481266ea360e0a8f326fec1106ea445f2ef883c |
|
25-Sep-2012 |
Dima Zavin <dima@android.com> |
init.rc: chmod slabinfo to 440 to capture slabinfo in BRs Bug: 7232205 Change-Id: I0d785302818a37b722e79bf740644ede52c60148 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
f1c50bf63857b9cdabcf930363c372defc6383a8 |
|
21-Sep-2012 |
Todd Poynor <toddpoynor@google.com> |
init: import init.trace.rc after h/w-specific rc Board-specific .rc file mounts debugfs, then fixup perms on tracing sysfs files for systrace. Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
/system/core/rootdir/init.rc
|
5054417c1025b0f3f36f4b537e51ddd3eea981c8 |
|
09-Sep-2012 |
Kenny Root <kroot@google.com> |
Add /data/app-lib for native library sharing Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
/system/core/rootdir/init.rc
|
58d3980f314d08f86347ba83db85c2d4c6066599 |
|
06-Sep-2012 |
Jeff Sharkey <jsharkey@android.com> |
Keep /mnt/secure private to default namespace. When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE those mountpoints when vetting is finished. However, the kernel doesn't allow MS_MOVE when the source is shared to child namespaces. To work around this, create a tmpfs at /mnt/secure and mark it as private (not shared). Verified that vold can now successfully move from the staging area. Bug: 7094858 Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
/system/core/rootdir/init.rc
|
35ea5e4f2365ad791824ee49d1c999be81b705c5 |
|
28-Aug-2012 |
Mike Lockwood <lockwood@google.com> |
import init.${ro.hardware}.rc last to allow overriding default USB configuration Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
/system/core/rootdir/init.rc
|
f824ad7b35c3bf866d60662404be0d55fe753e3d |
|
23-Aug-2012 |
Wink Saville <wink@google.com> |
am 582b1152: am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" * commit '582b11527cd6d968f163fbee73f92d82b679e330': Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
42a1e6c9d827fc3d64ad3b0750b87de1f4c436e7 |
|
23-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Iteration on multi-user external storage." into jb-mr1-dev
|
582b11527cd6d968f163fbee73f92d82b679e330 |
|
23-Aug-2012 |
Wink Saville <wink@google.com> |
am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" * commit 'baba99840400f5b835d44b6d91e2190136277988': Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
baba99840400f5b835d44b6d91e2190136277988 |
|
23-Aug-2012 |
Wink Saville <wink@google.com> |
Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
|
bfcd810b792f7ffbb2ec1360c0c2662725fd0362 |
|
22-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Iteration on multi-user external storage. Define /storage as top-level concept, so that we enforce permissions uniformly. Moves external storage paths from headers to per-device environment variables. Added missing mount flags, and we no longer have adb-specific external storage. Bug: 6925012 Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
/system/core/rootdir/init.rc
|
61f1359486e578bc0fc12bc4f42c7cd65991fc5c |
|
20-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Remove sdcard groups from services. Even with the groups, services no longer have access. Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
/system/core/rootdir/init.rc
|
5dd0f86fbfed631b31c9055109889f1d9559a3ea |
|
18-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate sdcard0 to shell-accessible location. Also remove mount() from adb, since it can come online long before data partition is ready. Set EXTERNAL_STORAGE environment variable to point to owner for backwards compatibility. Bug: 7005701 Change-Id: I63444f6636624eb7ad89f053daa289663424639e
/system/core/rootdir/init.rc
|
885342a0f2c834a6b680284047c47c9d04b32565 |
|
15-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Multi-user external storage support. Remount rootfs as recursively shared, so that mount changes are propagated into child namespaces. Mount external storage for access from adb. Clean multi-user dependencies for use in Dalvik. Also define external storage paths. Bug: 6925012 Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
/system/core/rootdir/init.rc
|
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa |
|
13-Aug-2012 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 4dcd52ab to jb-mr1-dev Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
4dcd52ab11d25fe3d53aab52b6c233e692da4eae |
|
13-Aug-2012 |
Kenny Root <kroot@android.com> |
am 297f802f: Merge "Add support for reloading policy from /data/system." * commit '297f802f25d093274c1f5fb890ee8dfacfbf159e': Add support for reloading policy from /data/system.
|
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 |
|
01-May-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add support for reloading policy from /data/system. To support runtime policy management, add support for reloading policy from /data/system. This can be triggered by setting the selinux.loadpolicy property to 1, whether from init.rc after mounting /data or from the system_server (e.g. upon invocation of a new device admin API for provisioning policy). ueventd and installd are restarted upon policy reloads to pick up the new policy configurations relevant to their operation. Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
b35e36e5a92ac984a57ec15b14dc6ad3b0ecf1c5 |
|
03-Aug-2012 |
Colin Cross <ccross@android.com> |
init.rc: make last_kmsg readable only by user system and group log chown /proc/last_kmsg to user system group log during init, and chmod it to readable only by user and group. Bug: 6925227 Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
/system/core/rootdir/init.rc
|
35fc46d8e338181ee3caedc30f3627bad2ffe35e |
|
01-Aug-2012 |
Dima Zavin <dima@android.com> |
am 018227f5: am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android." * commit '018227f5394c3126f4a858596cb85dee1893b895': Modify init.rc and init.goldfish.rc for SE Android.
|
018227f5394c3126f4a858596cb85dee1893b895 |
|
01-Aug-2012 |
Dima Zavin <dima@android.com> |
am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android." * commit 'ce76e2d00e63339083ea693db33de05cbba5600e': Modify init.rc and init.goldfish.rc for SE Android.
|
ce76e2d00e63339083ea693db33de05cbba5600e |
|
01-Aug-2012 |
Dima Zavin <dima@android.com> |
Merge "Modify init.rc and init.goldfish.rc for SE Android."
|
0245e15bb78cf08b3225b31c77bda77d43995bd4 |
|
10-May-2012 |
Benoit Goby <benoit@android.com> |
rootdir: Create /data/misc/adb on boot Change-Id: I0f8d11391cdcfbaa50f87f637a2962c6663b2767
/system/core/rootdir/init.rc
|
0574d6b07711e90547d8166c222e09d80f702620 |
|
25-Apr-2012 |
Benoit Goby <benoit@android.com> |
init.rc: Add socket for adbd Change-Id: Ic97fd464440ff4a29fc9da7ad15949ac5215ade3
/system/core/rootdir/init.rc
|
1eee419e7a1c5789f81e1e3a19693403495e70f1 |
|
13-Jan-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Modify init.rc and init.goldfish.rc for SE Android. Set the security context for the init process. Restore the security contexts of /cache and /data in case they were reset. Specify the security context for services launched from the rootfs since we cannot label their executables. If on the emulator, set a policy boolean and restore the context of /sys/qemu_trace to allow accesses not normally permitted on a device. Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
|
e8b76a36bacd11ab54332ba5a25d8593d9c3f57f |
|
26-Jul-2012 |
Naveen Kalla <nkalla@codeaurora.org> |
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
/system/core/rootdir/init.rc
|
b3a679386d26677290a09fdf4e3406c57e835fd0 |
|
13-Jun-2012 |
Wink Saville <wink@google.com> |
Add telephony-common and mms-common to BOOTCLASSPATH - DO NOT MERGE Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
/system/core/rootdir/init.rc
|
4c3ac516ff391d9fc93ec997ce254f83af722a1a |
|
08-Apr-2012 |
Matthew Xie <mattx@google.com> |
remove dbus and bluetoothd, create bluedroid data dirs Change-Id: Ifacd570dbadc075e498a626935e035c76a0d83c4
/system/core/rootdir/init.rc
|
5acf1d6625e3e45ccdc29fd49222defc2788ada0 |
|
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
am 87314036: am 55b763ff: Grant sdcard_r to ril-daemon. * commit '873140368613af2d1c06e18ac2fd6fe24623b9bb': Grant sdcard_r to ril-daemon.
|
873140368613af2d1c06e18ac2fd6fe24623b9bb |
|
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
am 55b763ff: Grant sdcard_r to ril-daemon. * commit '55b763ff7b779d7ee91f245e0887332db8782afe': Grant sdcard_r to ril-daemon.
|
55b763ff7b779d7ee91f245e0887332db8782afe |
|
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
Grant sdcard_r to ril-daemon. Bug: 6793799 Change-Id: Ife23c98c30d7b08479d75798c7075005bf281119
/system/core/rootdir/init.rc
|
557ed7a487795b2b3ac441bbbbe619788c93b78f |
|
12-Jul-2012 |
Wink Saville <wink@google.com> |
Merge commit 'de016eef' into mit * commit 'de016eef': Add telephony-common and mms-common to BOOTCLASSPATH
|
de016eef3366739d69d7908e4e6dbd54785632ab |
|
13-Jun-2012 |
Wink Saville <wink@google.com> |
Add telephony-common and mms-common to BOOTCLASSPATH Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
/system/core/rootdir/init.rc
|
c06be8a15d8d89bcc8ac505b25b5e828e90a5be6 |
|
12-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
am 1e96e16f: am 0f3974c3: Merge "Enable tracing on user builds" into jb-dev * commit '1e96e16f81ce46adf5329b1db4662b53b927d4e2': Enable tracing on user builds
|
0f3974c3d0ee2ffe5e0cb9a56658ba18d511f6ea |
|
11-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
Merge "Enable tracing on user builds" into jb-dev
|
1279013dee790c84758e5fc5bed33b5c9df2af9b |
|
07-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
Enable tracing on user builds This change adds init.rc steps to: * allow kernel tracing to be enabled via adb * allow a limited set of kernel trace events to be enabled via adb * allow the kernel trace to be read via adb * allow all users to write to the kernel trace from userland Bug: 6513400 Change-Id: Ic3c189b5697aa5edf88d2f507c932971bed6caff
/system/core/rootdir/init.rc
|
6ba76f019040a0445575deb6995cd32ea72903dd |
|
07-Jun-2012 |
Arve Hjønnevåg <arve@android.com> |
Merge "init.rc: Set owner for /sys/power/autosleep"
|
5f2d00b0677cbe9ad42ea0394def0a51aef7bdda |
|
04-Jun-2012 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: remove audio app/sys groups, merge to fg With this change, the audio rr/fifo threads will just run in the fg cgroup. Also, the RR budget for the apps fg/bg threads has been bumped to 80%. Ideally, the bg budget would be much smaller but there are legacy libraries that seem to be very sensitive to this so for now keep it at this value. Bug: 6528015 Change-Id: I08f295e7ba195a449b96cd79d954b0529cee8636 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
df44b88621f60e933d7d31090bf0bb892e88142c |
|
04-Jun-2012 |
Dima Zavin <dima@android.com> |
core: init.rc: create apps cgroup for fg tasks, move bg under it Bug: 6538553 Change-Id: I7c29975aa376bcdda9d6bbd1fd3e04fdb1c1b1fe Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
4c48025c484e9fb0e10bb9c6a1b9bbd5a2def555 |
|
16-May-2012 |
Colin Cross <ccross@android.com> |
Increase cpu.rt_runtime_us to 10% for fg and bg groups GPS on yakju puts SCHED_RR threads in the fg and bg groups, and is unhappy with 0.1% limits. Increase the limits to 10%. Change-Id: I971c9b0a815890d41694b965fdd2b023937a4411
/system/core/rootdir/init.rc
|
50efaf2f7fc87692649497dba5615e54efd9c637 |
|
12-May-2012 |
Todd Poynor <toddpoynor@google.com> |
Merge "init: Set perms for interactive cpufreq governor boostpulse" into jb-dev
|
367e7b195b144772464e560352caa2017a53058c |
|
10-May-2012 |
Colin Cross <ccross@android.com> |
Increase rt_runtime_us to 1000 for foreground and bg_non_interactive rt_runtime_us=0 can cause deadlocks if a SCHED_FIFO/SCHED_RR thread is moved into the wrong cgroup. Change-Id: I4633392fb529039dff6ba5d3a6b672e0de9fc2d9
/system/core/rootdir/init.rc
|
4ff10e63c3814f7b40c6e4e672c895135a1b1a3d |
|
04-May-2012 |
Todd Poynor <toddpoynor@google.com> |
init: Set perms for interactive cpufreq governor boostpulse Change-Id: Ia4b028f58f9d48bad2525744497f10884d11c5d6
/system/core/rootdir/init.rc
|
70a163f519db14532b7dcde4bc65d1d658a760e4 |
|
03-May-2012 |
Arve Hjønnevåg <arve@android.com> |
init.rc: Set owner for /sys/power/autosleep Change-Id: Ia18cce973c71e7561ca84b23e37b0b8e056a7143
/system/core/rootdir/init.rc
|
7e057eb0047819ee4d8af52d2747a7bf29b0cc56 |
|
02-May-2012 |
Glenn Kasten <gkasten@google.com> |
Merge "Increase budget" into jb-dev
|
94a55df34d917492cb3613b9445ffb1659459186 |
|
02-May-2012 |
Jeff Tinker <jtinker@google.com> |
Merge "Fix failure to play pinned movies" into jb-dev
|
59e6eb09997125aecc122c7d7d9a6e3ec00be4c4 |
|
01-May-2012 |
Glenn Kasten <gkasten@google.com> |
Increase budget Change-Id: I6706a408990abf8d420db73280df2818b8827140
/system/core/rootdir/init.rc
|
65f1fbcad3247997cf0f0eca54b88f0692781109 |
|
01-May-2012 |
Jeff Tinker <jtinker@google.com> |
Fix failure to play pinned movies DRM server process needs to be able to access movies on sdcard to acquire rights. related-to-bug: 6414503 Change-Id: If90404e32fd437b8fb7d5a6ec8dfb30a499ef733
/system/core/rootdir/init.rc
|
33045a627d4dac8c4c8a910241298ca5da02f87b |
|
28-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init: Set perms for cpufreq interactive governor input boost sysfs Change-Id: Ie475c95d81635a068db11e7018895024247878b4
/system/core/rootdir/init.rc
|
25dd43a9a5073f0e59102750cb0410b8e9bc9847 |
|
27-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Restrict zygote to system user. CVE-2011-3918: Address denial of service attack against Android's zygote process. This change enforces that only UID=system can directly connect to zygote to spawn processes. Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
/system/core/rootdir/init.rc
|
8d3ea1d1e198e71ca3f856c6f397faf40922f562 |
|
25-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init: set perms for cpufreq interactive governor boost -- DO NOT MERGE Change-Id: I6509cda358b4a75706afd01a5b5a36eabe492554 Signed-off-by: Todd Poynor <toddpoynor@google.com>
/system/core/rootdir/init.rc
|
f8bbaba57bf309fec83dc9842176d996831e6db1 |
|
13-Apr-2012 |
Kenny Root <kroot@google.com> |
Add directory for forward locked apps in ASECs Forward locked apps on internal storage will be stored in ASEC containers using ext4. This way permissions can be preserved whether on internal or external storage. Change-Id: I942f8f0743c210330a11e2b1d0204df7a5ddb2ae
/system/core/rootdir/init.rc
|
b91bd9f599c43b602eac334244173000a6ce011a |
|
20-Apr-2012 |
Glenn Kasten <gkasten@google.com> |
Update cgroups Change-Id: If4488944e8a1c8af7b13847069d03b7ea4a30785
/system/core/rootdir/init.rc
|
f35c203558b0648c351a5262568b383d41639a8b |
|
19-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set perms for cpufreq interactive governor above_hispeed_delay Change-Id: Ib9c3fb4e43759af590a6e033b8ba04c0023d5f07
/system/core/rootdir/init.rc
|
b47cd10acf6eb9449fc12a93f17f720b21e998c8 |
|
17-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
Merge "init.rc: Add support for new USB accessory configurations"
|
5fa860dea3618d5397bb580645f057a6e975786e |
|
13-Apr-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Add MDNS service"
|
6a35bb3529520dd1a47a5d0f58abf91d38eb0222 |
|
12-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
Merge "init.rc: Set owner and permissions for cpufreq files"
|
0653b97b2594d5e3f21c6326fb121741bfbf65f7 |
|
11-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set owner and permissions for cpufreq files Change-Id: Iaaf8491915567dbe22cab1798081a00fed4fb2e2
/system/core/rootdir/init.rc
|
4f5d5176a3d732baebe92ab3748a12166406a198 |
|
04-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
init.rc: Add support for new USB accessory configurations Also moved USB scripts to new file init.usb.rc Change-Id: I98e099fbd8de3eb3e1e18c9ef69312608033a50c Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
|
db49739f390992a3d68303765ac36f14ed09b68a |
|
10-Apr-2012 |
Jamie Gennis <jgennis@google.com> |
Add tracing initialization to init.rc. This change adds init.rc steps to allow kernel tracing to support inserting messages from any userland process. Change-Id: I01970728d7132a25408fed09a213a015ac05ccaf
/system/core/rootdir/init.rc
|
1d91fcf7c0a31d27097b196579a37873ba1c0934 |
|
28-Mar-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Add MDNS service Adds both the new service and another socket for netd. Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
/system/core/rootdir/init.rc
|
71513567dc0249af1b304e458ceac391ffcbeff5 |
|
27-Mar-2012 |
Marius Renn <renn@google.com> |
Multi-Project Commit: Move of filterfw out of system/media (6 of 7) This is part of the multi-project commit to move the filter-framework from system/media/mca to frameworks/base/media/mca. Note that the filter-framework will soon be replaced with a refactored version currently under API review (also to go under frameworks/base). This move is done now to unblock the PDK efforts. Change-Id: I87d034a30bb4b98a85a028cb728e37fb97256039
/system/core/rootdir/init.rc
|
31fb85865431f98008608b62964cb1c975ca4b71 |
|
26-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "drmserver: add group drm"
|
62e5cbaebc29d83148dd1ce30a620a37dcdbe7ed |
|
26-Mar-2012 |
Benoit Goby <benoit@android.com> |
Merge "Revert "Reimplement the "adb root" command to more closely match its previous behavior""
|
3c9eed88c529374c8d80e1daa62ad9bf25c9670e |
|
26-Mar-2012 |
Nick Kralevich <nnk@google.com> |
drmserver: add group drm Make the drm server run as UID=drm, GID=drm. This ensures that any files created by the drmserver app do not have GID=system. Bug: 5834297 Change-Id: I3409ad350e9cc82bb0982cdbe470ec1f10b1ca67
/system/core/rootdir/init.rc
|
2affe824ba249b532c5b39941bcdc15800900f6c |
|
22-Mar-2012 |
Kenny Root <kroot@google.com> |
Merge "Put keystore into the drmrpc group"
|
9865be95cf60848d91364b42c2cadd90e63fec66 |
|
22-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '19155b5' Do not start sshd by default Change-Id: I22e6dbb6834321709e9b7c5ae49846d7f9f7c67a
|
a9bb7261b4db2372ee0f339d250079c967262758 |
|
22-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '9dd2eef' sshd to init.rc Change-Id: I8eedc3b47f1260502034067d9006cac827cb1089
|
19155b5cd3ee8674a13f7bf111e06b05f0114433 |
|
21-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
init.rc: Do not start sshd by default Change-Id: Ieacd4e8fbfcd91ed2342b7a104a9b1f4114fc6d5 Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
|
1670f831a56f7232f337407c746e97c5929ee417 |
|
21-Mar-2012 |
Arve Hjønnevåg <arve@android.com> |
init.rc: Fix permissions on /sys/power/state and /sys/power/wakeup_count Change-Id: I06a1a2affebdf64f008eaa61a0851f1e832059c5
/system/core/rootdir/init.rc
|
7941cf87f624e7747b5bb868a27904c7a3be0ca4 |
|
16-Mar-2012 |
Benoit Goby <benoit@android.com> |
Revert "Reimplement the "adb root" command to more closely match its previous behavior" This reverts commit 535164e9d9649a83d4d63829f3389f2bea339fe1.
/system/core/rootdir/init.rc
|
f3ef1271f225d9f00bb4ebb0573eb3e03829f9a8 |
|
14-Mar-2012 |
Nick Kralevich <nnk@google.com> |
init.rc: Add documentation Android developers should never place files in /data/local/tmp. Files or directories in /data/local/tmp can be minipulated by the shell user. Android developers should never create world-writable files or directories. This is a common source of security vulnerabilities. Change-Id: I6d2cd620ab49d8ca3f39282f7d2ed682a9ba91c3
/system/core/rootdir/init.rc
|
ad5b9c7205ac2a9ac500c6d455bf46f8ab3aafe0 |
|
24-Feb-2012 |
Kenny Root <kroot@google.com> |
Put keystore into the drmrpc group The keystore service needs to access hardware crypto devices to fulfill its function on devices with hardware crypto. This role was assigned to the (now misnamed) drmrpc group. Change-Id: Ia32f9e96b4372f0974984451680f9a0f6157aa01
/system/core/rootdir/init.rc
|
89c5926f08fdf551c33ccbfbec5d6bb7d911f067 |
|
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 0b32a75b: am c8d1a0e1: am 5ebced39: init.rc: update the permission of /data/local. * commit '0b32a75b7c7f25bd9ab325f44626c402fd9b9b23': init.rc: update the permission of /data/local.
|
c8d1a0e18e008009fe75aa2cc7d3deace0479fce |
|
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 5ebced39: init.rc: update the permission of /data/local. * commit '5ebced39093d1223566166b8cc6abfe6729c487d': init.rc: update the permission of /data/local.
|
5383476727659544875b90d49a5371886a31c1fe |
|
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 5ebced39: init.rc: update the permission of /data/local. * commit '5ebced39093d1223566166b8cc6abfe6729c487d': init.rc: update the permission of /data/local.
|
5ebced39093d1223566166b8cc6abfe6729c487d |
|
07-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: update the permission of /data/local. Bug: 6131945 Change-Id: I3094a471dcfb02b786f47b6778c8fed3726325ec
/system/core/rootdir/init.rc
|
e7fd911fd42b1f8bea6a004e2bcc1d2dda4ec718 |
|
27-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Restrict zygote to system user. CVE-2011-3918: Address denial of service attack against Android's zygote process. This change enforces that only UID=system can directly connect to zygote to spawn processes. Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
/system/core/rootdir/init.rc
|
dae26c6ac44e9c47cc60fcaa3d04c54d68d66760 |
|
12-Jan-2012 |
James Dong <jdong@google.com> |
am 3e9c9ac5: am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '3e9c9ac5ee7a36653b90cb86eb6445496b536c16': Close a security hole - do not give world readable/writable access to /data/drm
|
d95c6152197cf3976797267ad40e61b7344933de |
|
12-Jan-2012 |
James Dong <jdong@google.com> |
am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '032afc1d52289f486538c9ed53f17b9889ea94df': Close a security hole - do not give world readable/writable access to /data/drm
|
3e9c9ac5ee7a36653b90cb86eb6445496b536c16 |
|
12-Jan-2012 |
James Dong <jdong@google.com> |
am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '032afc1d52289f486538c9ed53f17b9889ea94df': Close a security hole - do not give world readable/writable access to /data/drm
|
f90b0e04a61ab3bf5239afb2f7157aabe5fbca8f |
|
10-Jan-2012 |
Dima Zavin <dima@android.com> |
rootdir: convert all usages of $prop to ${prop} Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
3e7b7739e3d4d7aaaa363645501036dafcc30ed3 |
|
16-Dec-2011 |
Dima Zavin <dima@android.com> |
init: import the hardware specific init file in init.rc This removes the hardcoding of the file import in init and instead allows the init.rc file to fully control what is loaded. Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
683a09352a0adf8924d67c9aa80bce244592aa25 |
|
10-Jan-2012 |
Dima Zavin <dima@android.com> |
rootdir: convert all usages of $prop to ${prop} Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
09cdc0ea12598651d1c074974c9b593fd1c0e4ba |
|
07-Jan-2012 |
James Dong <jdong@google.com> |
Close a security hole - do not give world readable/writable access to /data/drm o related-to-bug: 5834297 Change-Id: I8e459610b4f69999be37364c2359b2bac82d4a2a
/system/core/rootdir/init.rc
|
7634bf87cf6490e5544f040fb403eb164cf0ee5f |
|
16-Dec-2011 |
Dima Zavin <dima@android.com> |
init: import the hardware specific init file in init.rc This removes the hardcoding of the file import in init and instead allows the init.rc file to fully control what is loaded. Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
9dd2eef07bbee6ff5b1d1a9ccda6e3499391ecb6 |
|
12-Dec-2011 |
Mike Lockwood <lockwood@google.com> |
add sshd to init.rc Change-Id: Ide6e8cca58f090e84d85d0298058c523863d1c43 Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
|
27cca21a5d0a6beff31d2f9ff1441afc1271a346 |
|
05-Dec-2011 |
Nick Kralevich <nnk@google.com> |
set mmap_min_addr to 32768 Bug: 5712789 Change-Id: I586a99cd63d8fba06bc2562b1cfce531ee4f554c
/system/core/rootdir/init.rc
|
f9557fba347bcb837892458fabd7454e1a1a4d6a |
|
08-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Set /proc/sys/kernel/dmesg_restrict to 1 Set dmesg_restrict to 1 to help limit inadvertent information leaks from the kernel to non-privileged programs. Root and programs with CAP_SYSLOG will continue to have access to dmesg output. See "dmesg_restrict" in Documentation/sysctl/kernel.txt from the Linux kernel source code. Bug: 5585365 Change-Id: Iffcf060ea4bd446ab9acf62b8b61d315d4ec4633
/system/core/rootdir/init.rc
|
1e339a710e0993c18c8b96f9224ebd3aa29cf8cd |
|
08-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Merge "Set kptr_restrict to 2."
|
3c58933aa785ab26f77284f6a1a4e93d2ebfcf04 |
|
07-Nov-2011 |
Dima Zavin <dima@android.com> |
am 4a253908: rootdir: init.rc: write default oom_adj before starting ueventd * commit '4a2539085062a715b0d345eb50ea48738423c909': rootdir: init.rc: write default oom_adj before starting ueventd
|
4a2539085062a715b0d345eb50ea48738423c909 |
|
04-Nov-2011 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: write default oom_adj before starting ueventd Otherwise, ueventd's oom_adj value would have been 0 and it could easily get killed early during low memory events Change-Id: I1adbd18c37215b26ae77e70f7b8dbd1e143fc2d4 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
2e7c833279349a694af15f2447cc214dc30bcc01 |
|
02-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Set kptr_restrict to 2. To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms Bug: 5555668 Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b
/system/core/rootdir/init.rc
|
04a875902ece07769101a5202e3af554af31a911 |
|
31-Oct-2011 |
Mathias Agopian <mathias@google.com> |
restart surfaceflinger and drmserver when servicemanager dies Bug: 5450389 Change-Id: Ib4e73836721e25e2a88185167b030ea75e0d74e3
/system/core/rootdir/init.rc
|
8cdd4c335f0d6e35e6def5ea73dcefb9687071b0 |
|
18-Oct-2011 |
sinikang <sinikang@samsung.com> |
am aa75df74: [maguro] : add setprop net.tcp.buffersize.hspa * commit 'aa75df74db5beffd25821ed6c360c36197d7bac1': [maguro] : add setprop net.tcp.buffersize.hspa
|
aa75df74db5beffd25821ed6c360c36197d7bac1 |
|
16-Oct-2011 |
sinikang <sinikang@samsung.com> |
[maguro] : add setprop net.tcp.buffersize.hspa -window size optimized for hspa -Patchset2 : space removed Change-Id: Ia4d1043d1a93c929721a4d7cca60ce9ff8bbf67a Signed-off-by: sinikang <sinikang@samsung.com>
/system/core/rootdir/init.rc
|
d707fb3fb6448be04d6e14f7e478df7e298ebf35 |
|
06-Oct-2011 |
Nick Kralevich <nnk@google.com> |
enable heap randomization. Bug: 5250555 Change-Id: I7acb0645402611875c481aec33ece85fced7a336
/system/core/rootdir/init.rc
|
4e803c3c18ad6a0cebbb16e2cf623a174f5201e1 |
|
10-Oct-2011 |
Wink Saville <wink@google.com> |
Merge "Add log group to rild to improve log collection on modem issue"
|
65c4df51f895b79fc599d3bfa796ddfc660d47e4 |
|
07-Oct-2011 |
Jeffrey Tinker <jtinker@google.com> |
Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls Bug 4598045 Implementing secure video path on TI OMAP4 chip for ICS Change-Id: Iacfe3e79f067172085b96bb4cd4484101aa5be1e
/system/core/rootdir/init.rc
|
e65e946382033a94f99f0f05678bb1e6329e3182 |
|
29-Sep-2011 |
Kazuhiro Ondo <kazuhiro.ondo@motorola.com> |
Add log group to rild to improve log collection on modem issue Add log group to ril-daemon service. rild is the best place to know the issue on the modem in many time. It would be helpful if rild alone can capture the snapshot of logcat buffers at the moment of problem. Change-Id: Ie0dcda126fb748a00e650427de35541672359287
/system/core/rootdir/init.rc
|
8e3ff70444ac919d0b70eaa1fbe97a3ef5bdb9ef |
|
12-Sep-2011 |
JP Abgrall <jpa@google.com> |
init.rc: allow all users to open the qtaguid misc dev The netfilter xt_qtaguid module uses a misc dev so that processes that use the module can be tracked. Every process that does socket tagging must open that dev. Change-Id: I6af3e0f0180637b14455dd9607724523f142c402
/system/core/rootdir/init.rc
|
1ac40f4ef18799e252115d9c9ad17396ffb68f3d |
|
08-Sep-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Increase the window sizes on wifi and lte. Set to 524288,1048576,2097152, 262144,524288,1048576. bug:5226360 Change-Id: Id9d4257c51a355d78246b4ca59ab462fbe5b72be
/system/core/rootdir/init.rc
|
ca47cef7491caf6072984d9d64c768717baad09a |
|
25-Aug-2011 |
Dima Zavin <dima@android.com> |
init: add charge mode handling Introduces a 'charger' section that is processed when androidboot.mode supplied on the kernel commandline is "charger". In this mode, sections such as fs, post-fs, etc are skipped. Only the 'early-init' and 'init' sections of the init rc files are processed before processing the 'charger' section. Change-Id: If9eb6334de18f04cbcf2aab784578e2993615242 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
|
85e37b0a81f2f24f223c8917db69221779f0d2b0 |
|
18-Aug-2011 |
JP Abgrall <jpa@google.com> |
init: allow mediaserver to tag socket (group net_bw_acct) The mediaserver needs to do communication on behalf of other apps (browser, ...). It needs to be able to tag sockets. The kernel will check for net_bw_acct group membership. Change-Id: I7fb063fdb7d9435d7f979df6622ff17f34049cbc
/system/core/rootdir/init.rc
|
d09196d00cb5bf3bffb22d3aae45c8797f1ddf4c |
|
08-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Merge "Activity Manager now takes care of setting OOM values."
|
a24687197d69ac677d176dbc41d5cfd65d1afc44 |
|
08-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: add inet permission to VPN daemons explicitly. Racoon still needs it after dropping root privilege, or pure IPSec VPN will fail. Mtpd works without it because net_raw implies inet. However it would be better to set all of them clearly without the assumption. Change-Id: I50762af2c25ec9cc559e528c7b14f469494fd553
/system/core/rootdir/init.rc
|
06787f4089093fed8a01ec3a3d2092e10919b77e |
|
08-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Activity Manager now takes care of setting OOM values. All init needs to do is make these files writeable so that the activity manager can set them. Change-Id: Ieea43208fadc01504d813be379aecbafcadf0d34
/system/core/rootdir/init.rc
|
7804cbf4833cba82bd38f6adaf567bcb8262c3ad |
|
29-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
Move some common USB configuration logic to init.rc Change-Id: Ib75ccfd9c4aa8aace936370c33f33a922ca3c51f Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
3507616870acd71bbd26e045528b0cfe716d37cd |
|
24-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Fix issue 4604090: notification sound interrupted. Removed system from mediaserver groups. Not needed anymore now that AudioFlinger acquires wake locks via PowerManagerService. Change-Id: I177b968a0a30557d871188bf3991b96d9b391d3c
/system/core/rootdir/init.rc
|
4a2b0fcd6e166499fe51e920aca5f9640dd05939 |
|
15-Jul-2011 |
Conley Owens <cco3@android.com> |
am aa4a66a1: am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache." * commit 'aa4a66a16dd9b97fb876bb296366442b8745a10b': Create world readable, system writeable /data/resource-cache.
|
aa4a66a16dd9b97fb876bb296366442b8745a10b |
|
15-Jul-2011 |
Conley Owens <cco3@android.com> |
am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache." * commit '1e5e2d7673a9ea915283f6626fa692cc169b0e67': Create world readable, system writeable /data/resource-cache.
|
56286d6fdb07d8b1310c27eeb59bdf05500f166e |
|
11-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "init: update permissions for VPN."
|
9bb4d411e01c8e6330b5c27c489485592360576b |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: update permissions for VPN. VPN no longer uses system properties to keep network parameters. Besides, profiles are now stored and encrypted by keystore. Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/rootdir/init.rc
|
50d9819ef49c2d557ad0b33a7880a7a3b72e3fb8 |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "init: clean up init.rc as now mkdir handles EEXIST."
|
ea7441415997faf34f7ae44f462f916f5f7ea0df |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: clean up init.rc as now mkdir handles EEXIST. Change-Id: I3fa2a618ef27197315fc128738a284ac644e86c0
/system/core/rootdir/init.rc
|
f48fd5d403d77c4586ad0e715affd601a0934334 |
|
07-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Temporary workaround for issue 4604090 There was a regression caused by a change in Honeycomb that removed mediaserver process from system group to improve security: This prevents the audio HAL (which runs in mediaserver process) from taking wake locks while audio is playing thus causing the pcm stream to get unexpectedly suspended. This temporary workaround is just to allow ICS dogfood in better conditions until a real fix taking into account the security issue is implemented. Change-Id: Ic19a23da4b4383559188b6f5c3a82604c3d95d74
/system/core/rootdir/init.rc
|
e89675584df1f02dd4642585493a19ac3e691bc5 |
|
07-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "init.rc: Allow system process to configure RNDIS USB ethernet address"
|
64416c816cbe1161a09d6e6a65732399fac4e3ca |
|
06-Jul-2011 |
Mathias Agopian <mathias@google.com> |
Merge "don't restart surfaceflinger when the window manager dies"
|
9350a00ce65a6425ba4566fe943c954373240f6c |
|
06-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
init.rc: Allow system process to configure RNDIS USB ethernet address Change-Id: Id339d8359e592dbc1279e423d9a5adc3a775949d Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
b4daef45310891d550ea9cfb89ab4bf5b3e15ef5 |
|
02-Jul-2011 |
Mathias Agopian <mathias@google.com> |
don't restart surfaceflinger when the window manager dies Change-Id: Ia3c60e6c5471e2b72d53c936de44b730c68095e0
/system/core/rootdir/init.rc
|
856f63c0df9cd4e8783ca65140fe386e3a98a274 |
|
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Merge "Revert "Add keychain user""
|
1c9a996c50e096eb9f54dc806aae6d82fa3cc2e8 |
|
20-Jun-2011 |
Eino-Ville Talvala <etalvala@google.com> |
Add mobile filter framework library into the bootclasspath. Change-Id: Ia9ae45de5d58ba5e98821fd04add96c6062c1a18
/system/core/rootdir/init.rc
|
04918930236981a6d2a096a73854caa96cb94bda |
|
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Revert "Add keychain user" This reverts commit 6541ef1562ccf93e498d653598330a7fc80ad2b2. Bug:4970237 Change-Id: I23a90eb89c1d19893d2ba7065fc624c0521cb06e
/system/core/rootdir/init.rc
|
9d94942bcd6347d6ee8524b23bc94b95ba32d8e0 |
|
27-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
am 6a18a077: am 04cf629b: Move RILD to class main * commit '6a18a07774123c409cefd9a92f1c4c6504f4edfd': Move RILD to class main
|
04cf629be5e99a3a920aecc0b059444bd07e9d84 |
|
24-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
Move RILD to class main -- This is needed so the modems (LTE & CDMA) are powered on and running before unlocking encrypted devices Change-Id: I842f5286499fd76abc554ded550fb837d12b324e
/system/core/rootdir/init.rc
|
535164e9d9649a83d4d63829f3389f2bea339fe1 |
|
22-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
Reimplement the "adb root" command to more closely match its previous behavior The adb gadget driver used to reset the USB bus when the adbd daemon exited, and the host side adb relied on this behavior to force it to reconnect with the new adbd instance after init relaunches it. The new gadget drivers no longer automatically reset the USB bus when adbd is restarted which caused adb to hang since it was no longer forced to reconnect with the device. We attempted to work around this on the host side adb, but that work around has not been reliable. This change adds a property trigger on the service.adb.root system property which will reset the USB bus and restart the adbd daemon when adbd sets the property to 1. This should be much closer to the previous behavior and will hopefully fix some problems with automated testing. Change-Id: I177c37400009a3d83f21a5f9431f94fd1cc19b9b Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
352dfdfaea55601f2c36fe7286a158e84028bcf3 |
|
09-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
init.rc: Changes for new USB gadget drivers Change-Id: I68fcf167c9fc71bb5f44793648a35d3181fd36d7 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
b45280d259c5036dd066782d725c55284c7dae90 |
|
30-May-2011 |
MÃ¥rten Kongstad <marten.kongstad@sonyericsson.com> |
Create world readable, system writeable /data/resource-cache. /data/resource-cache is used to store idmap files. Change-Id: I9b1dbc8d607333b71c05f55a4a402ae92193c36c
/system/core/rootdir/init.rc
|
2b8f76cdbb254ac1170087a40dbf30b7627f3516 |
|
05-May-2011 |
jeffhao <jeffhao@google.com> |
Tracking merge of dalvik-dev to master Reordered bootclasspath to allow verification of all framework methods. git cherry-pick --no-commit ec164a0170955fe63106c2576a65bc4ffb1df425 Address CVE-2011-1090. git cherry-pick --no-commit 3365288d3c00072689cd9d733e055561cadc87b5 Change-Id: I6a89bc600ced06a0cb84ae1670cb7a6ea39de9c8
/system/core/rootdir/init.rc
|
a31a3511825375177d26ab27067352c2c8f42038 |
|
05-May-2011 |
Brian Carlstrom <bdc@google.com> |
Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6) frameworks/base Adding IKeyChainService APIs for CertInstaller and Settings use keystore/java/android/security/IKeyChainService.aidl libcore Improve exceptions to include more information luni/src/main/java/javax/security/auth/x500/X500Principal.java Move guts of RootKeyStoreSpi to TrustedCertificateStore, leaving only KeyStoreSpi methods. Added support for adding user CAs in a separate directory for system. Added support for removing system CAs by placing a copy in a sytem directory luni/src/main/java/org/apache/harmony/xnet/provider/jsse/RootKeyStoreSpi.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStore.java Formerly static methods on RootKeyStoreSpi are now instance methods on TrustedCertificateStore luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java Added test for NativeCrypto.X509_NAME_hash_old and X509_NAME_hash to make sure the implementing algorithms doe not change since TrustedCertificateStore depend on X509_NAME_hash_old (OpenSSL changed the algorithm from MD5 to SHA1 when moving from 0.9.8 to 1.0.0) luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java Extensive test of new TrustedCertificateStore behavior luni/src/test/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStoreTest.java TestKeyStore improvements - Refactored TestKeyStore to provide simpler createCA method (and internal createCertificate) - Cleaned up to remove use of BouncyCastle specific X509Principal in the TestKeyStore API when the public X500Principal would do. - Cleaned up TestKeyStore support methods to not throw Exception to remove need for static blocks for catch clauses in tests. support/src/test/java/libcore/java/security/TestKeyStore.java luni/src/test/java/libcore/java/security/KeyStoreTest.java luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java Added private PKIXParameters contructor for use by IndexedPKIXParameters to avoid wart of having to lookup and pass a TrustAnchor to satisfy the super-class sanity check. luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/IndexedPKIXParameters.java luni/src/main/java/java/security/cert/PKIXParameters.java packages/apps/CertInstaller Change CertInstaller to call IKeyChainService.installCertificate for CA certs to pass them to the KeyChainServiceTest which will make them available to all apps through the TrustedCertificateStore. Change PKCS12 extraction to use AsyncTask. src/com/android/certinstaller/CertInstaller.java Added installCaCertsToKeyChain and hasCaCerts accessor for use by CertInstaller. Use hasUserCertificate() internally. Cleanup coding style. src/com/android/certinstaller/CredentialHelper.java packages/apps/KeyChain Added MANAGE_ACCOUNTS so that IKeyChainService.reset implementation can remove KeyChain accounts. AndroidManifest.xml Implement new IKeyChainService methods: - Added IKeyChainService.installCaCertificate to install certs provided by CertInstaller using the TrustedCertificateStore. - Added IKeyChainService.reset to allow Settings to remove the KeyChain accounts so that any app granted access to keystore credentials are revoked when the keystore is reset. src/com/android/keychain/KeyChainService.java packages/apps/Settings Changed com.android.credentials.RESET credential reset action to also call IKeyChainService.reset to remove any installed user CAs and remove KeyChain accounts to have AccountManager revoke credential granted to private keys removed during the RESET. src/com/android/settings/CredentialStorage.java Added toast text value for failure case res/values/strings.xml system/core Have init create world readable /data/misc/keychain to allow apps to access user added CA certificates installed by the CertInstaller. rootdir/init.rc Change-Id: I768ca8e8e990ff333ce0f7069a0935173498c5ed
/system/core/rootdir/init.rc
|
f642c3d12f4cffdc349b9ebfc4107de254ad8db9 |
|
17-Mar-2011 |
Jeffrey Tinker <jtinker@google.com> |
Make drmserver's primary group be system, so setgid is not required in ueventd.stingray.rc Change-Id: Ie8a287620d22b5c1bdc459fb288b7403589ab474
/system/core/rootdir/init.rc
|
cfce2826780dc1c4811619b89ba8d358e3f30f11 |
|
14-Mar-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 4089635 mediaserver fewer supplementary groups Change-Id: I90111567564397ca08e87dcfcbdf23337bf79ae6
/system/core/rootdir/init.rc
|
b7b770dd76d664b1e44adb2f98b8caf594f6d3c8 |
|
11-Mar-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 4086255 drmserver process needs system group Change-Id: If9a325b9e716abe00f3ad6f20b012861308abd2d
/system/core/rootdir/init.rc
|
5db0897c6530502e1343a75b258868122030e4a5 |
|
11-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Load the persistent properties after decrypting the /data partition" into honeycomb-mr1
|
c5c51033c86353d1a448c72e0e9388906eed7114 |
|
09-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Load the persistent properties after decrypting the /data partition Fix for bug 3415286. The persistent properties are normally read early in the boot process after /data is mounted. However, for an encrypted system, at that point /data is a tmpfs ramdisk. This change adds a new command to init (load_persist_props) to read the persistent properties, and adds an action to init.rc to load the persistent properties. This action is triggered by setting a property in vold, but that's in a different CL. Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/rootdir/init.rc
|
a40481b2cc604b8b278d509f120cf496c4c318f2 |
|
04-Mar-2011 |
Mathias Agopian <mathias@google.com> |
Run surfaceflinger in its own process. [DO NOT MERGE] This is to allow OpenGL ES rendering from the system process, and help with debugging. Bug: 4086003 Change-Id: I732e95f4fcaa358f430cc195d8e63a69263bffdc
/system/core/rootdir/init.rc
|
9ac8484e0b677802474e2fd73edb9cbac02d98a6 |
|
08-Feb-2011 |
Ying Wang <wangying@google.com> |
Merge "Reorder BOOTCLASSPATH to match change 7eff81df2a"
|
04e5232ac2b3fc87596c6d82c07c667e52e2d7c2 |
|
08-Feb-2011 |
Ying Wang <wangying@google.com> |
Reorder BOOTCLASSPATH to match change 7eff81df2a Bug: 3385161 Change-Id: I8bb91753c02c031c32ab0070dd424a6ac859311a
/system/core/rootdir/init.rc
|
b03afaafb542e84a6ae9b09d89f7eb3a9d1ccf7a |
|
03-Feb-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Bug 3381298 Remove old /data/drm/plugins/native"
|
63e99f447fed821b57f3f13e33abd740b3b04c03 |
|
30-Jan-2011 |
Rebecca Schultz Zavin <rebecca@android.com> |
am e442cff0: am 58fb8220: Raise the viking killer min free values to match the system properties * commit 'e442cff05ff9f083c91caa3bed74e37318a69fda': Raise the viking killer min free values to match the system properties
|
58fb822024a04641d5ca1d0341456a2706aee853 |
|
29-Jan-2011 |
Rebecca Schultz Zavin <rebecca@android.com> |
Raise the viking killer min free values to match the system properties Change-Id: Idcbdb106d704ef63c9a44e635b6e995e0e5f6479 Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
/system/core/rootdir/init.rc
|
24823cfa84d1a4dcb719c1949092facf8c92804a |
|
29-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am fee2cfb0: am 9efdcd96: Fix issue #3401380: Raise OOM killer limits * commit 'fee2cfb01165f6797d783c6a8c0b1fba4f591355': Fix issue #3401380: Raise OOM killer limits
|
9efdcd969ed03cfbe8cfa692b8adcc46d954914a |
|
29-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #3401380: Raise OOM killer limits Change-Id: Ia9c82e7d31b7f1b89bf9650ebea697d9b3a64506
/system/core/rootdir/init.rc
|
b81dfcb4f6275bf675e7afe64ccecc29c1b8c3ae |
|
23-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 3381298 Remove old /data/drm/plugins/native Change-Id: Ic299d328f2e04a65a9dce68909c7b83f3ac03b20
/system/core/rootdir/init.rc
|
328c0d4a89d7c04c829c587657b95b3241f64f60 |
|
23-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Bug 3361124 Remove drmioserver"
|
b29b33841bd2f5143e2705525bfc4f8a2d2b6316 |
|
20-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 3361124 Remove drmioserver Change-Id: Ie3b20b487c1466737921567ab2d043e230356bf4 Note: safe to re-use the drmio uid/gid as no files were ever created.
/system/core/rootdir/init.rc
|
852c13d1b2404e5a360375ae75291ac1a9dae026 |
|
20-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am afa099a1: am 3a159d62: Move rild to the late_start class * commit 'afa099a1909c02196574d125d735adb0c8918392': Move rild to the late_start class
|
3a159d62a9d771f2a2d38129f1db56d873598696 |
|
20-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the late_start class Now that rild can be killed in a reasonable amount of time, move it from the core class to late_start. I was going to move it to main, but it would get killed and restarted right after the disk crypto password was entered, which is when the late_start class is started, and I was seeing issues with rild not re-connecting to the network when it was killed and restarted. Change-Id: I60479ddb853953029890fc816538d615ef5a96ab
/system/core/rootdir/init.rc
|
701d40f721573c5c9e0b45b59a383e04c582f6d0 |
|
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 383b76f8: am e4349157: Add a new trigger to support a progress bar UI for encrypt in place. * commit '383b76f86af48d4a1a502d7767ab79f024483864': Add a new trigger to support a progress bar UI for encrypt in place.
|
e434915787c38a6d84e1058044fed3be2ed02235 |
|
17-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Add a new trigger to support a progress bar UI for encrypt in place. Change-Id: I6a14eb43462505cb7fecfee9fd1ecdea50065963
/system/core/rootdir/init.rc
|
30d5d038a94b09bd906d8a07a9c4b79640d36c2e |
|
14-Jan-2011 |
Jesse Wilson <jessewilson@google.com> |
Move apache-xml to external. (project 4 of 4) Change-Id: I8e1ea723481ae6d8e609563331c187576f306bce http://b/3351604
/system/core/rootdir/init.rc
|
63990cf56fc64033c0382ac19a3ffba7f525fb30 |
|
13-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Move rild to the core class." into honeycomb
|
a02714bd3e8e75298c6e684ef375407fe02dd9b0 |
|
11-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the core class. Changes in init.stingray.rc now prevent rild from making sockets or named pipes on /data. Now that rild no longer prevents /data from being unmounted, we can put it in the core class, which doesn't restart when we enable encryption. This speeds up the boot by 20+ seconds. Change-Id: I737baf804e089f4ddbd664eaa1e675a7bd62e699
/system/core/rootdir/init.rc
|
f3c42b6ee4f0bb042cf93e1ac6c9c4d72e1558fa |
|
11-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the core class. Changes in init.stingray.rc now prevent rild from making sockets or named pipes on /data. Now that rild no longer prevents /data from being unmounted, we can put it in the core class, which doesn't restart when we enable encryption. This speeds up the boot by 20+ seconds. Change-Id: I71c426dab1b725e401116234167d41c7ccd958c1
/system/core/rootdir/init.rc
|
a44aca6580b6f39459195275f4631682410aae4b |
|
11-Jan-2011 |
Gloria Wang <gwang@google.com> |
Temporarily disable the drm service. do not merge Change-Id: I5cb04a9c2cc5b95443c6c0ea77132a4102ca47fc
/system/core/rootdir/init.rc
|
60b5b408cfcac450ce0cc56952d3b1c087b25428 |
|
07-Jan-2011 |
Gloria Wang <gwang@google.com> |
To remove drm service from groups of "system" and "root". Change-Id: Ieac11c667c72465f7082baab0787dc740797049f
/system/core/rootdir/init.rc
|
a2a1f3149fb32d95bc81ddfd713d5bba9d6cbc61 |
|
27-Oct-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Let SocketClient users write binary data to clients. This is a dependency for the DNS proxy CLs. This CL also adds a new socket for the netd process to inherit which is owned by the inet group. (so only apps with the INTERNET permission can use the DNS proxy...) Change-Id: I8a51924e0ed56c6066f77e6f1b02d39bdadac51e
/system/core/rootdir/init.rc
|
752923c168009d03e9e00e590155fbd0a2880ccb |
|
04-Dec-2010 |
Ken Sumrall <ksumrall@android.com> |
Changes to init to support encrypted filesystems. These are the changes to init and init.rc necessary to support booting with and encrypted /data filesystem. A corresponding change to init.<device>.rc goes along with this change. Change-Id: I0c7e2cc39568358014a82e317735c0eae14dd683
/system/core/rootdir/init.rc
|
333f24bfbd9eea1347f20c2e88c5c1565b84aafe |
|
10-Dec-2010 |
Nick Kralevich <nnk@google.com> |
don't run services with gid=0 Ensure that we drop privileges for servicemanager and drmioserver. These should not be running with gid=0. Bug: 3275526 Testing: Applied change and successfully rebooted the device. No obvious bugs. Change-Id: I782fbda812cb88e0a365788b45b3b32894623177
/system/core/rootdir/init.rc
|
1612425c50d2728542cac607fc71a4c8781bf1df |
|
13-Dec-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove services for adding SDP records. This was an inefficient way of doing things and was temporary. There are now direct calls to Bluez to add reserved SDP records. This improves connection time after turning on BT by 6-8 secs. Change-Id: I8750f44e1de73c9cc935d68710b8964e3f50c3a6
/system/core/rootdir/init.rc
|
6388cfe03c1d5695d7cabe244b031af02ef686a8 |
|
08-Dec-2010 |
Iliyan Malchev <malchev@google.com> |
Revert "HACK: slow_start for mediaserver to prevent restart race condition" This reverts commit 9db7945ed2f9eb5756aa0c1e5e72fa6240f74847.
/system/core/rootdir/init.rc
|
9db7945ed2f9eb5756aa0c1e5e72fa6240f74847 |
|
05-Dec-2010 |
Paul Eastham <eastham@google.com> |
HACK: slow_start for mediaserver to prevent restart race condition Change-Id: Ia76385612fd127c5f11b3d64205e350f27acfd82
/system/core/rootdir/init.rc
|
d49b4ef51eeba026e77f51e9c454464d0c5b9cd9 |
|
19-Nov-2010 |
Mike Lockwood <lockwood@android.com> |
init.rc: Allow console in userdebug builds Change-Id: Ib5734c6d3e2bf5a9da3d44721c529971f2345120 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
4640fc0504ec69446b00dfb7ffcca48b085bf916 |
|
26-Oct-2010 |
Gloria Wang <gwang@google.com> |
Create directory for DRM plug-ins. Change-Id: I1bfef96b1949f288852cd88222e0ce2bbb186f40
/system/core/rootdir/init.rc
|
a215823fc92d6c0f8623fe18a407d9853aef87cf |
|
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
am b7171987: am b4d65399: disable console in user builds
|
b7171987382b768466a472c4c5f84cc496c95aea |
|
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
am b4d65399: disable console in user builds
|
b4d65399fde02280b718e3b5b5cb1464a885c4b0 |
|
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
disable console in user builds Also, run console as shell/log instead of root/root. Change-Id: I6104f1edddfd5e11843ff41d7839d0c296e6a6f9
/system/core/rootdir/init.rc
|
8c5669f9f9a228efebf4059fd4ceace5cece578b |
|
27-Oct-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Let SocketClient users write binary data to clients. This is a dependency for the DNS proxy CLs. This CL also adds a new socket for the netd process to inherit which is owned by the inet group. (so only apps with the INTERNET permission can use the DNS proxy...) Change-Id: Ic3475c697913ba85805b4e49801b65e7a1d59289
/system/core/rootdir/init.rc
|
98b1378606780c28501708ca02560c82bb1fda53 |
|
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
am f3c29f0c: am 5988ea72: add sdcard access permission to ril daemon Merge commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6' * commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6': add sdcard access permission to ril daemon
|
f3c29f0cf287ec3d329b012a2d48808b064632f6 |
|
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
am 5988ea72: add sdcard access permission to ril daemon Merge commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6' into gingerbread-plus-aosp * commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6': add sdcard access permission to ril daemon
|
5988ea726e91fbdc69485b729ea2f532fedfa1d6 |
|
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
add sdcard access permission to ril daemon Some RIL daemons write crashdumps to sdcard. Change-Id: I49a8d2cb342fd7f8bd23dbb1bcc378726e10a579
/system/core/rootdir/init.rc
|
d7482b2f4cdd6a35f8707d94536801a958120b6b |
|
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 33357f54: am 6490257d: Make netd restart when system server hangs on it. Merge commit '33357f5477a24cb16bd3dd692fe5ca14755ab033' * commit '33357f5477a24cb16bd3dd692fe5ca14755ab033': Make netd restart when system server hangs on it.
|
33357f5477a24cb16bd3dd692fe5ca14755ab033 |
|
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 6490257d: Make netd restart when system server hangs on it. Merge commit '6490257d116c35d3da927ee7b91179dde64ef713' into gingerbread-plus-aosp * commit '6490257d116c35d3da927ee7b91179dde64ef713': Make netd restart when system server hangs on it.
|
6490257d116c35d3da927ee7b91179dde64ef713 |
|
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Make netd restart when system server hangs on it. netd has been seen hanging (cause suspected but unconfirmed) which then brings down the system server which blocks forever on its main thread trying to connect to netd with its hung event loop. This then results in an infinite watchdog runtime restart loop because the situation never improves: netd is still borked. Instead, we should kill netd and give it another chance when the system server dies. Bug: 3018996 Bug: 3017876 Change-Id: Ibf9ecf0ffcb78e48c38e5167f21cbeefe0e2a47f
/system/core/rootdir/init.rc
|
d06df51bcd7bcc2656089a529fa6a455bad00d37 |
|
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
resolved conflicts for merge of 3b5214a6 to master Change-Id: Id73c53c6c2e9c21eb9b1d1e624aaeb25097ea7a4
|
3b5214a67f43e2e4f69428e98d3a2c130c7c87d8 |
|
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 02863b95: add /vendor support Merge commit '02863b957cfbfc302d3136ed78c0cba86accacd8' into gingerbread-plus-aosp * commit '02863b957cfbfc302d3136ed78c0cba86accacd8': add /vendor support
|
02863b957cfbfc302d3136ed78c0cba86accacd8 |
|
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
add /vendor support - look in /vendor/firmware/... in addition to /system/etc/firmware/... for firmware loading - add /vendor/bin to path before /system/bin - add /vendor/lib to ldpath before /system/lib - configure appropriate permissions for /system/vendor/bin - symlink /vendor -> /system/vendor Change-Id: I0c06ca1e38a44f0c7024cee6cea8907aa93a4532
/system/core/rootdir/init.rc
|
a5220b24d1b17b142e373aacbadf79a00effbbf0 |
|
10-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 26ce6e0e: manual merge from readonly-korg-master Merge commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1' * commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1': - Add drm and drmio service
|
26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1 |
|
10-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
manual merge from readonly-korg-master Change-Id: Id17f69d22fbbc84578be5aadd5e8e906ff0eb548
|
e6d8a5f1dfb81113b9421ea353915cde426023ed |
|
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 8df3a4a5: am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread Merge commit '8df3a4a554184afba71887995c5f0983ce81196f' * commit '8df3a4a554184afba71887995c5f0983ce81196f': remount / as read-only only on post-fs to allow per-target config of /
|
56de7a1263431819ff9a53dcd9e8e3306149ed99 |
|
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
remount / as read-only only on post-fs to allow per-target config of / Change-Id: Ia89dd2021e0f960201b4cee573227f0addd48431
/system/core/rootdir/init.rc
|
f2af88e81af5efb2d585963507f798d5a8b93d67 |
|
05-Aug-2010 |
Brian Carlstrom <bdc@google.com> |
Tracking merge of dalvik-dev to gingerbread git cherry-pick --no-commit b99a099c git cherry-pick --no-commit 9811671e023ceb82029040f7acf599013c773e6b git cherry-pick --no-commit d0645bf0cc76ef7be11cf77a8e1995233a1972e4 Change-Id: Ie70fecaeaba97a25f114cd2717e381b5107533b1
/system/core/rootdir/init.rc
|
e572d596b3715198fb48b3d8cef4939a71d58db2 |
|
27-Jul-2010 |
aimitakeshi <aimitakeshi@gmail.com> |
- Add drm and drmio service - Add /data/drm directory for storing DRM related data Change-Id: Ifd8922a3de109dbf5cd3f9cabbf4e5689b16c1d7
/system/core/rootdir/init.rc
|
f848a429dde741742988e2365d257058d57acbf8 |
|
15-Jul-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 3cac9cb3 to master Change-Id: I86b5173ad49522eae082bf2a3d096dbfb5240129
|
c7858a3dde9db1c4cf2563a4388f422ff1bcb334 |
|
15-Jul-2010 |
Kenny Root <kroot@google.com> |
Add directories for OBB mounting Change-Id: Ib73e9bca50fb168ab5d147cc260666a770092961
/system/core/rootdir/init.rc
|
d0645bf0cc76ef7be11cf77a8e1995233a1972e4 |
|
30-Jun-2010 |
Brian Carlstrom <bdc@google.com> |
updated BOOTCLASSPATH to track merge from dalvik-dev Change-Id: I10e6895ad3647dd789fe5fc7a7d37c4b71c61717
/system/core/rootdir/init.rc
|
a2dffa9db6c08c240e9511faee1c16fea535ef3e |
|
16-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
init.rc: Move SD card support to device specific init.rc files Change-Id: I5745e91df2b7c5722bd6e650931d3d2d7d0eadcb Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
c5947806740172e66c1fd5259e86bc5543d873ac |
|
11-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
am 0c6672c6: am 8b0ec20d: Update OOM adj levels. Merge commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c' * commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c': Update OOM adj levels.
|
8b0ec20d6f9636def6740085b203302c1680fa81 |
|
11-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Update OOM adj levels. This introduces some new buckets that will be used by the activity manager, and adjusts the default levels to match what we had been setting for Droid. It turns out Passion has been using the old levels, which makes no sense for how much memory it has. Also it is a problem with these definitions spreading to other projects for different devices, so I am going to update the defaults to be appropriate for our newer devices, and put here a file to tune them down for something like the sapphire. Change-Id: Ia4f33c4c3b94aeb3656f60b9222072a1d11e9e68
/system/core/rootdir/init.rc
|
f96e700b338e9a0edee6c2114cc7310f7be48bc4 |
|
03-Jun-2010 |
Christopher Tate <ctate@google.com> |
am 25e7b8fc: am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
|
25e7b8fcc3708b58736c7825ecf612d04020716e |
|
02-Jun-2010 |
Christopher Tate <ctate@google.com> |
am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable Merge commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163' into kraken * commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163': Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
|
230cb33fd1ab335c6f808c72db891993b00110a0 |
|
02-Jun-2010 |
Christopher Tate <ctate@google.com> |
Make /proc/kmsg and /proc/sysrq-trigger system-process-readable This is so that the system process can capture kernel thread stacks when the watchdog detects a deadlock. Previously, /proc/kmsg was root/root and mode 0400, and /proc/sysrq-trigger was root/root and mode 0200. With this change, /proc/kmsg becomes root/system and 0440, and /proc/sysrq-trigger becomes root/system and 0220. Change-Id: Iac46bd10bd11d495024afeb5d693107ce5074791
/system/core/rootdir/init.rc
|
9811671e023ceb82029040f7acf599013c773e6b |
|
05-May-2010 |
Jesse Wilson <jessewilson@google.com> |
Moving junit out of core.jar and into core-junit.jar. Change-Id: I603cba084c06ddbec21fc88bbaab7cde96952cb1
/system/core/rootdir/init.rc
|
f83d0b9af5cbe4440cc41ceaa8a7806a13c86282 |
|
21-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move uevent handling to an external ueventd process Change-Id: Iea6c56013062ade633a1754f7bcf8cf09b3dedc1
/system/core/rootdir/init.rc
|
31712beaf7de127a1249b909cdefffbc25fff076 |
|
09-Apr-2010 |
Colin Cross <ccross@android.com> |
Move filesystem mounting into a new "fs" init level Devices with non-MTD storage need to override the filesystem mounting commands in init.rc. Moving them to a new "fs" init level allows a custom init.<device>.rc to handle the mounting. Change-Id: If0e655139b9734650fb798b6eb0a90e2241fc29b
/system/core/rootdir/init.rc
|
c741f22d8533226ce60903649a7a57b3f05a65af |
|
24-Mar-2010 |
Nick Pelly <npelly@google.com> |
Add NET_RAW to mediaserver so that it can open a raw HCI socket to configure BT chip. Change-Id: I22065b313c7af28b4791c74ea3d403a628738102
/system/core/rootdir/init.rc
|
bbf3ea46fb6df3b666cb66a09104d3a7694926dc |
|
13-Mar-2010 |
Jean-Baptiste Queru <jbq@google.com> |
cleanup init.rc Change-Id: I7f7fefd61c6032c84fa63e597ea0e6bbe66d2e79
/system/core/rootdir/init.rc
|
89f235c5e028466bb273dbaacb3346f1f0ba9f1e |
|
01-Mar-2010 |
Mike Chan <mike@android.com> |
init.rc: Add cpuacct to cgroup mount for cpu statistic Cpu accounting statistics expored in /acct Change-Id: I8a35816e94b69d9e67a3dd65aae16520864777d7 Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
|
b91bf4ba864a392412397913ee09a8c1f2e7cc87 |
|
27-Feb-2010 |
San Mehat <san@google.com> |
Revert "init.rc: Add cpuacct to cgroup mount for cpu statistics" This reverts commit a7d88224ff7283c210c25ce6d57239b4053b5f14. This cgroup subsys should be mounted on it's own mount-point, since it's addition to /dev/cpuctl causes the cpu subsys to EPERM
/system/core/rootdir/init.rc
|
a7d88224ff7283c210c25ce6d57239b4053b5f14 |
|
26-Feb-2010 |
Mike Chan <mike@android.com> |
init.rc: Add cpuacct to cgroup mount for cpu statistics Change-Id: Ic1893e1bf7b2c45659419b0bc55d42f50d030c9f Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
|
f0cb74e3b07d5de49dc875f8405e21d2a102e749 |
|
26-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Enable I/O priorities for media server and vold Sets the media-server to class 'real-time' pri 4, and vold to class 'best effort' pri 2 Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
eafdd86f4d8f4ccc69f0c16550c65aa392f678d6 |
|
08-Jan-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Update bluetooth data files path.
/system/core/rootdir/init.rc
|
a9db22f1228996d8f81e4f4903fa5c598a606fbd |
|
24-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Add 'ASEC_MOUNTPOINT' environment variable. Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
bbfe1368d909be470f919b2349a974bee8dd0a9c |
|
17-Feb-2010 |
Chia-chi Yeh <chiachi@android.com> |
Remove dead services from init.rc.
/system/core/rootdir/init.rc
|
6ea3cc6089393286ab8b6cc459cfa9d7e58fc203 |
|
20-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Create secure staging directories, and a compat symlink Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
55a1f0827be9920b093152cffb6eddd613d04bc9 |
|
27-Jan-2010 |
Vasu Nori <vnori@google.com> |
dont create sqlite_stmt_journals dir. this shoudl not be required any longer. in fact, some test-writers are abusing this dir.
/system/core/rootdir/init.rc
|
92175e04a56db804d4dae75fc49fdd5edc6a2968 |
|
17-Jan-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Fix typo in chown of /dev/cpuctl Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
192277c0154eff542ddbce27d7c35995c0671748 |
|
15-Jan-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Add netd to startup services list Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
1851d80959bd314af730451ebfb2a5e00bb0a83a |
|
07-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Adjust perms on /asec Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
d0aa32c3d99aeb0e6949ab1c4fae83283a946567 |
|
06-Jan-2010 |
Oscar Montemayor <oam@google.com> |
Apps on SD project. Small change to support apps on SD file system key storage.
/system/core/rootdir/init.rc
|
900570e2a833bde0683cce5254d9dc102509cabc |
|
06-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Create a small tmpfs on /asec so we can create mountpoints Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
37c71dd9a7f488563c97fdca88cca701e2962e45 |
|
04-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Add new /asec mount point Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
37c586e6b11138beab400d1208183d49c12a9ef2 |
|
03-Dec-2009 |
Oscar Montemayor <oam@google.com> |
Encrypted File Systems Project. Temporarily creating emulated encrypted directories manually. Will remove those lines once a true encrypted FS is mounted, and proper framework chanfes have been made. This is required for the feature to work with the other changes.
/system/core/rootdir/init.rc
|
7359c16a852c23740ef2874aa6b66f629d1473b7 |
|
24-Nov-2009 |
Dan Egnor <egnor@google.com> |
Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg -- it gets generated on every boot, so this is a bunch of writing for no particularly good reason.
/system/core/rootdir/init.rc
|
eb67fac4723892ac8ae3fae87c05e776c49029c5 |
|
20-Nov-2009 |
Doug Zongker <dougz@android.com> |
change /cache/recovery group to cache To unbundle system update, we need users other than system to be able to write the /cache/recovery directory.
/system/core/rootdir/init.rc
|
5e7db233004a0869125d0f2d64a9e747faf252da |
|
03-Nov-2009 |
Jean-Michel Trivi <jmtrivi@google.com> |
Make the RIL daemon part of the audio group so it can load region-specific acoustic parameters.
/system/core/rootdir/init.rc
|
831d8e1e3a08520369561087112ebf898e31704c |
|
13-Oct-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Adjust background dirty writeout policy Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d |
|
09-Oct-2009 |
Dan Bornstein <danfuzz@android.com> |
Force the mediaserver process to restart whenever the zygote or system server do. Change-Id: I16ce4ae656473055e7e244ccd4af7055959e3c1c
/system/core/rootdir/init.rc
|
14d898e0141287cd9d8991bea5b63650bb8f5145 |
|
09-Oct-2009 |
Rebecca Schultz Zavin <rebecca@android.com> |
Make vmallocinfo readable by group log so we can put it in bugreports Change-Id: I7b04795c029c51108132e7a9eaf46b97de06de6f Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
/system/core/rootdir/init.rc
|
aa7d97106abf8c390e1aed71f7c175fb77fead38 |
|
07-Oct-2009 |
Brian Swetland <swetland@google.com> |
init.rc: don't mount debugfs We'll do this in the product-specific init files.
/system/core/rootdir/init.rc
|
529520e8240e6865aca77ae9abf78dacbaa72e2c |
|
06-Oct-2009 |
San Mehat <san@google.com> |
Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support" This reverts commit 35ad5f41c39c5f3af7a8f00185a13366f4901e69.
/system/core/rootdir/init.rc
|
9b4f1ff210c449920890581b191da3568c10fbd1 |
|
18-Sep-2009 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: specify keystore directory and fix permissions.
/system/core/rootdir/init.rc
|
1320687bdb6df2de1c27fb03c827b69384d26f87 |
|
19-Sep-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove logwrapper for Bluetoothd. Change-Id: I6d16bc0dbdf9f3aff2080f8c7968ff3cb592811e
/system/core/rootdir/init.rc
|
bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4 |
|
19-Sep-2009 |
Brian Swetland <swetland@google.com> |
init.rc: mount debugfs for debugging - put it at /sys/kernel/debug so Arve will be happy - symlink /d to /sys/kernel/debug so Brian will be happy.
/system/core/rootdir/init.rc
|
35ad5f41c39c5f3af7a8f00185a13366f4901e69 |
|
16-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
7baff71b0d8fe320df9143b2fa59db0af1b7aa96 |
|
16-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: tweak cfs scheduler - disable child_runs_first Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940 |
|
11-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root Change-Id: Iff83310f9411c39e1833b3d710b029b12f702993 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
9332482ed2945174d94615f0720f88702cb92667 |
|
09-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Make /data/dontpanic files readable only by the system process. Change-Id: If87470b7bcbb1c0774d10296ac82605db3dd9bf0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
82a6014d90c94a2032e014901917e1d503475d5e |
|
06-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Allow all processes access to /data/dontpanic ***STOPSHIP*** Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
abe3a9c30595846b7e3d705dd4b0aca37fb2f748 |
|
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Add dumpstate service Change-Id: Iaf7094dd4693c47566c1acf860b750b762af840c Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
020f35f274594f55eec956fdcfec90ad3d7a5c65 |
|
02-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data. This is a temporary measure until bugreports are taken as root. *****STOPSHIP***** Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa |
|
01-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Clean up dump collection Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
21541872c3cdc93e60e18ba496715f8307f990b2 |
|
27-Aug-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Copy kernel crash dumps to /data and free kernel resources Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
6bc6794f97aa4368237f23c3d3f7cafd6a796bf3 |
|
07-Aug-2009 |
San Mehat <san@google.com> |
am ee40fc4e: rootdir: init.rc: Bump up background cpu shares to 5.0% Merge commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5' * commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5': rootdir: init.rc: Bump up background cpu shares to 5.0%
|
ee40fc4e64e1656a16603778bee895ea389ec7d5 |
|
06-Aug-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Bump up background cpu shares to 5.0% Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
630f5f049b53c8586cca5a1acb928f83332baef5 |
|
24-Jul-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Add Bluetooth PBAP service.
/system/core/rootdir/init.rc
|
d39e972831d45d4f8f8effd11691fd2c52d235c6 |
|
24-Jul-2009 |
Doug Zongker <dougz@android.com> |
am d52f54c4: install recovery image using patch mechanism Merge commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f' * commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f': install recovery image using patch mechanism
|
d52f54c4552d2f35b3c2c2ac60350ac83760222f |
|
24-Jul-2009 |
Doug Zongker <dougz@android.com> |
install recovery image using patch mechanism With the corresponding change in build/tools, the recovery image is installed via a shell script that is emitted by the OTA builder.
/system/core/rootdir/init.rc
|
b44aeb7b6ad8799c31d87a6304d20f41387081a7 |
|
15-Jul-2009 |
Nick Pelly <npelly@google.com> |
Add OPUSH to register obex server.
/system/core/rootdir/init.rc
|
3338e5511402c395d0f771e16f92a7a95c0cab82 |
|
09-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
am 48d116ed: init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf Merge commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67' * commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67': init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf
|
48d116edf9c785ed284626cbe0bbf5c958cf5e67 |
|
09-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf The touch command does not exist, and the chown commands are unnecessary because the system_server is in the WIFI group. Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
|
3bbaec5a7b7aea8a4e1bb5bde3e0b1d2bbc461c1 |
|
06-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
am eefef323: Set the permissions of wifi supplicant file so that system can access it. Merge commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa' * commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa': Set the permissions of wifi supplicant file so that system can access it.
|
91217ca5cbbf3ca2a96d596713e79f072da2c491 |
|
02-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 5c49135b: Merge change 5852 into donut Merge commit '5c49135b032235f82560d5e55b0e4c547506516b' * commit '5c49135b032235f82560d5e55b0e4c547506516b': rootdir: Modify init.rc to run mtpd/racoon as a non-root user.
|
eefef3234ae1e3b0f2db71415f134c7ec49899fa |
|
02-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
Set the permissions of wifi supplicant file so that system can access it. Create the required directories and set the correct owner and permissions.
/system/core/rootdir/init.rc
|
51afbf583819f3bdfc96f3c66c9c3444803e792a |
|
01-Jul-2009 |
Chia-chi Yeh <chiachi@android.com> |
rootdir: Modify init.rc to run mtpd/racoon as a non-root user. Note that this change requires a new prebuilt kernel for AID_NET_ADMIN.
/system/core/rootdir/init.rc
|
acc9a25ef745fce040e2e4e7adfa3d9e200aee99 |
|
30-Jun-2009 |
San Mehat <san@google.com> |
am 4322f2d7: init: Enable sched_yield() compatability mode on boot. Merge commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029' * commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029': init: Enable sched_yield() compatability mode on boot.
|
4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029 |
|
29-Jun-2009 |
San Mehat <san@google.com> |
init: Enable sched_yield() compatability mode on boot. In CFS, the (somewhat undefined) behavior of sched_yield() changed. See: http://kerneltrap.org/Linux/CFS_and_sched_yield This change enables 'compat' mode for sched_yield() Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
f1d63f3751ca787b2ebe76b6680342aa1ff3ca49 |
|
18-Jun-2009 |
San Mehat <san@google.com> |
am bfa2f8e9: init: Bump up the max cpu bandwidth shares ratio for background. Merge commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34' * commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34': init: Bump up the max cpu bandwidth shares ratio for background.
|
bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34 |
|
17-Jun-2009 |
San Mehat <san@google.com> |
init: Bump up the max cpu bandwidth shares ratio for background. New ratio is 1024/16 (1.5625% for background when cpu is under load) Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
6df2e9fc2e04fc1e908935190837675d6f7599a6 |
|
15-Jun-2009 |
Mike Chan <mike@android.com> |
am d709b582: remove 3G timeout values from init.rc, this should be device specific Merge commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56' * commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56': remove 3G timeout values from init.rc, this should be device specific
|
d709b582604e7f9d53b97f9ae13c5e12b2466c56 |
|
12-Jun-2009 |
Mike Chan <mike@android.com> |
remove 3G timeout values from init.rc, this should be device specific Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
|
6f5fb6fda101cac4208e4caecee0f70680e2d996 |
|
10-Jun-2009 |
San Mehat <san@google.com> |
am 3d6f16e5: init.rc: Set default cpu shares for background scheduler group to < 1% Merge commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919' * commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919': init.rc: Set default cpu shares for background scheduler group to < 1%
|
3d6f16e5edc9834b13a0bcc8a33c98e25518d919 |
|
10-Jun-2009 |
San Mehat <san@google.com> |
init.rc: Set default cpu shares for background scheduler group to < 1% Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
1d36696821cd81ed7b668bb9d2b0b8a43540ccd2 |
|
06-May-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Bluez4 changes Rename hcid to bluetoothd and change permissions.
/system/core/rootdir/init.rc
|
720f08f3ffb27084f2a9c98d661dae53d7191ebf |
|
09-Jun-2009 |
Dmitry Shmidt <dimitrysh@google.com> |
Add /config mounting point Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/system/core/rootdir/init.rc
|
1f75d709c10f49d2e2390b888e766bcfd17da860 |
|
01-Jun-2009 |
Chung-yih Wang <cywang@google.com> |
Add VPN and Keystore services and data directories. -- changed the default mode to 0770 for keystore with the new user 'keystore'. -- add the keystore service providing the basic key lookup/install/remove, but only keystore user can access the key content.
/system/core/rootdir/init.rc
|
17df71e0b277372de1d915c168c07c8877e82395 |
|
06-Jun-2009 |
Christopher Tate <ctate@google.com> |
Add an OOM adjustment category for apps undergoing backup In this initial commit, apps undergoing backup are treated equivalently to apps hosting services: more important than anything other than the foreground app.
/system/core/rootdir/init.rc
|
8b2cf9f04b924f299d2d250ae4d6826627847842 |
|
21-May-2009 |
Mathias Agopian <mathias@google.com> |
add bootanimation service to init.rc
/system/core/rootdir/init.rc
|
269946c09faaff88403289bcfa2519e994f75c21 |
|
06-May-2009 |
San Mehat <san@google.com> |
init.rc: Add Nexus to services (disabled for now) Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
4933098e22747a9066b5352273c38856b0203931 |
|
21-Apr-2009 |
San Mehat <san@google.com> |
cgroups: Initialize cgroups at startup. Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
|
01161168aa87ea9f1513d2b7b1232521c84e1ea4 |
|
26-Mar-2009 |
Nick Pelly <> |
Automated import from //branches/donutburger/...@142809,142809
/system/core/rootdir/init.rc
|
f614d64d4b4dfcd20c77ac3ccf2d9c9090a49303 |
|
19-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@140373
/system/core/rootdir/init.rc
|
e037fd7e193ecccbb5c0888e49f6d58c224bc11d |
|
13-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@138607
/system/core/rootdir/init.rc
|
2015549667fb77706a9879e974a3875ebccd8198 |
|
11-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137873
/system/core/rootdir/init.rc
|
e4749f30e5bd8cec727a6d7504b10fc80426316a |
|
09-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137197
/system/core/rootdir/init.rc
|
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/rootdir/init.rc
|
e54eebbf1a908d65ee8cf80bab62821c05666d70 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/rootdir/init.rc
|
35237d135807af84bf9b0e5b8d7f8633e58db6f5 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/system/core/rootdir/init.rc
|
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/system/core/rootdir/init.rc
|