History log of /system/core/rootdir/init.rc
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
317b4024a2a46b8c57abfa08f2a649df13572bd3 06-Feb-2015 Paul Lawrence <paullawrence@google.com> Revert "Make encryption configurable"

This reverts commit bda6272446454886339841a62daaa1b66c07ad60.

The original fix seems to have led to boot failures in QA. Rather than
risk shipping, revert the change. Bug 18764230 reopened.

Requires change
https://googleplex-android-review.git.corp.google.com/#/c/629764/

Bug: 19278390
Bug: 19199624

Change-Id: I8b6ab585666f2b0f585ffb2a5f61ac2e3462e06e
/system/core/rootdir/init.rc
bda6272446454886339841a62daaa1b66c07ad60 21-Jan-2015 Paul Lawrence <paullawrence@google.com> Make encryption configurable

Delay mounting encryptable but unencrypted volumes until we can
check the ro.vold.forceencrypt flag, then optionally encrypt.

Requires matching vold change from
https://googleplex-android-review.git.corp.google.com/#/c/615309/

Bug: 18764230
Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
/system/core/rootdir/init.rc
ac12f25004d728fe117c058446fccb0ca0a397c9 05-Nov-2014 Nick Kralevich <nnk@google.com> Ensure /data/adb exists
automerge: 6672300

* commit '667230074b6e4e306a50d84a88a57bf4f1ec0291':
Ensure /data/adb exists
667230074b6e4e306a50d84a88a57bf4f1ec0291 21-Oct-2014 Nick Kralevich <nnk@google.com> Ensure /data/adb exists

Ensure that /data/adb always exists. This directory is used
for writing adb debugging information when persist.adb.trace_mask
is set.

Bug: https://code.google.com/p/android/issues/detail?id=72895

(cherry picked from commit 89252ce31aacb27248e708b6487f730d3a024943)

Change-Id: I44e01bee50125f4e6e5fff6e74c53bb2022ce355
/system/core/rootdir/init.rc
522d72b7020a7d2f975531c7214ff34225391aba 04-Oct-2014 Riley Andrews <riandrews@google.com> Make the default cgroup, the foreground cgroup.

All kernel services will now be in the same cgroup as
foreground applications. This will now make kernel threads
not implicitly higher priority than android foreground
services.

Bug 17681097

Change-Id: I28e81c7aade50428d5395df86f00ce01c1e7af02
/system/core/rootdir/init.rc
7e58899bcfd83152581867b05bb012c5c4ec4b46 29-Sep-2014 Mike Lockwood <lockwood@google.com> Add bootanimation to audio group so it can play boot sound

Bug: 17674304

Change-Id: I5d31bc024fa36fedac2c0ba5c4a8b100937183ad
/system/core/rootdir/init.rc
c692410e1607a39cd6d55f4be8164fc630d9772c 28-Aug-2014 Alex Light <allight@google.com> Change /dalvik-cache to be owned by root.

Bug: 16875245

(cherry picked from commit 3878ebd72493427ea5537b36dfb9cd7cb38677bb)

Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
/system/core/rootdir/init.rc
314313a9915c9a274f580c0fcf535a4db2ba0a9a 26-Aug-2014 Andres Morales <anmorales@google.com> Move bootanim and surfaceflinger to class core

They have no dependencies on /data so can be started early.
This permits us to unmount /data while bootanimation is running,
allowing an uninterrupted first boot encryption sequence.

Bug: 17260550
Change-Id: I323fe23e8cf488d8bc136387efdd9fcea96625eb
/system/core/rootdir/init.rc
a005e7795e3dfb7cc0bd2bc65208d2490bfc89d8 25-Aug-2014 Paul Lawrence <paullawrence@google.com> Merge "Enable not rebooting during default encryption" into lmp-dev
c23074f386ded6cd28b2f8ba2331814b7491c802 18-Aug-2014 Paul Lawrence <paullawrence@google.com> Enable not rebooting during default encryption

Need to not set this property) during mount, since it can't
be changed later (ro property)

Also no reason to start class main on encryption cycle - we'll
show surfaceflinger, which is enough UI for this short cycle.

Bug: 17041092
Change-Id: Ica5339c54e45716d0fe20e23c0ab857f388d23ed
/system/core/rootdir/init.rc
82b76249fbc339e82ab47a956f7e17160247e4c4 04-Aug-2014 Robert Greenwalt <rgreenwalt@google.com> Remove obsolete tcp buffer size system properties.

Change-Id: If6fb6fdcf8975e6102e84594ee3f64a5be6166f6
/system/core/rootdir/init.rc
4fe327b902a1d5ff48878c1801cce8cdbe718d31 19-Aug-2014 Michael Wright <michaelwr@google.com> Merge "Remove inputflinger from init. DO NOT MERGE" into lmp-dev
1de92cffc7ac1e1654bdef5e3849fe542b1fd9fc 19-Aug-2014 Michael Wright <michaelwr@google.com> Remove inputflinger from init. DO NOT MERGE

Change-Id: I6ae2815a0c3f6b9c69e712af3ed6ce9d455ef3d3
/system/core/rootdir/init.rc
67cb1aeaa5bb8dbd43d5a1bfb21d1a8c39822fb6 16-Jul-2014 Riley Andrews <riandrews@google.com> Remove the /dev/.booting file before triggering boot.

On mako only, there is a race condition such that
core + main services must be started after releasing
ueventd (by removing /dev/.booting).

bug 16304711
bug 16333352
/system/core/rootdir/init.rc
80c7a5e8a861de42ddade15704f1785953cee345 12-Jul-2014 Riley Andrews <riandrews@google.com> Move unlink("/dev/.booting") until after filesystems are mounted.

Move the unlink out of init.c and into init.rc, so that the file
will be removed after all the filesystems with firmware are up.

Change-Id: Ifdd5dd1e95d7e064dde5c80b70198882d949a710
/system/core/rootdir/init.rc
ee0388e768bb27eb845809a0b3ba85f4f7f21885 09-Jul-2014 Nick Kralevich <nnk@google.com> am f89ddf76: am d05245a4: am c87237f5: Merge "restorecon_recursive /cache"

* commit 'f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15':
restorecon_recursive /cache
f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15 09-Jul-2014 Nick Kralevich <nnk@google.com> am d05245a4: am c87237f5: Merge "restorecon_recursive /cache"

* commit 'd05245a4b10044670ed8456c5c869490fd90583f':
restorecon_recursive /cache
b12e40da2526881c1730a3d3387556e4600c7040 08-Jul-2014 Sreeram Ramachandran <sreeram@google.com> am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files."

* commit '0a7b44d55b9e9d038de390457246ec7fd0999cad':
Create a data directory for netd and other network-related files.
e1695914d55d9ced3645fc532191970c9450e9e9 09-Jul-2014 Nick Kralevich <nnk@google.com> restorecon_recursive /cache

Make sure all files / directories within /cache are properly
labeled, not just the directory itself.

Addresses the following denial:

type=1400 audit(0.0:26): avc: denied { getattr } for comm="Thread-85" path="/cache/lost+found" dev="mmcblk0p27" ino=11 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir

Change-Id: I5937b30043efeb696ffaa77258b7294d20d1494e
/system/core/rootdir/init.rc
cddb15b8a9057e7efacf2de9c9a6a887fd666663 08-Jul-2014 dcashman <dcashman@google.com> am b4e74db7: am 3fa71b8e: Merge "Remove sshd."

* commit 'b4e74db79c9fda5e63ae49f299df3c0dd80a87f9':
Remove sshd.
b4cbff47ad4c8f15213189959c2ea33cb0ee529f 08-Jul-2014 dcashman <dcashman@google.com> Remove sshd.

This may require changes to other code, such as fastbootd, which relies on this
service. sshd is not currently, used, however, so this change will force any
such code to be changed.

Bug: 11594902
Change-Id: I07e52008290dab5825be2ad062cbe730fa7dff71
/system/core/rootdir/init.rc
b46efdb08ef8a700654d28be94b90550b8d90822 08-Jul-2014 Sreeram Ramachandran <sreeram@google.com> Create a data directory for netd and other network-related files.

Allows the 'shell' group (which is what dumpstate uses) to read the files in
this directory.

Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
/system/core/rootdir/init.rc
14253c1aab42e4e4ec4e68798c068436b4260288 09-Jul-2014 Nick Kralevich <nnk@google.com> Merge "init.rc: add seclabel to flash_recovery"
a1d97e5d1c15e0adf40b5853f2f85db7008baa77 08-Jul-2014 Nick Kralevich <nnk@google.com> init.rc: add seclabel to flash_recovery

Make sure flash_recovery is always running in the
install_recovery SELinux domain.

Change-Id: I9495eedd03f6b5dfcf2e78c03d1102f6032b327a
/system/core/rootdir/init.rc
85449d360f86ed9faaf1403f972f9657698a8289 08-Jul-2014 Sreeram Ramachandran <sreeram@google.com> am b12e40da: am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files."

* commit 'b12e40da2526881c1730a3d3387556e4600c7040':
Create a data directory for netd and other network-related files.
9f3a11edde07af068217581cf11c004f1cdca3f0 08-Jul-2014 dcashman <dcashman@google.com> am cddb15b8: am b4e74db7: am 3fa71b8e: Merge "Remove sshd."

* commit 'cddb15b8a9057e7efacf2de9c9a6a887fd666663':
Remove sshd.
24912dc446439b0aaa1c3417a8159af758f76ff6 27-Jun-2014 Riley Andrews <riandrews@google.com> resolved conflicts for merge of fa6f2543 to master

Change-Id: I04ce82e5d245e90e2cc62b76d688ec902c1a471d
fa6f25432b45958af870674529ce79e84986e0fa 27-Jun-2014 Riley Andrews <riandrews@google.com> am 23340d8a: am 10f8cd1d: Merge changes Ia15b2110,I5498c725

* commit '23340d8adac7bf68a6e47064ab7b48c1e227a077':
Add ability to adjust init log level at runtime.
Improve init's debug printing.
f67d6bd3c0fb41d167c675b9d2b5d377b6f38a74 26-Jun-2014 Daniel Rosenberg <drosen@google.com> Moved symlink back up.

Moving the vendor symlink down was causing issues with some devices.
Moved it back up, and adjusted mount to remove symlinks if necessary.

Change-Id: I77126d77cfbef32250012bea3960c99b55db4cbb
Signed-off-by: Daniel Rosenberg <drosen@google.com>
/system/core/rootdir/init.rc
1bbef88e8011805f7a3995a4d81928a853cb5cff 26-Jun-2014 Riley Andrews <riandrews@google.com> Add ability to adjust init log level at runtime.

+ Add a new property, sys.init_log_level, which can be set after init
bootstrap. This will control the level at which init does prints to klog.

Change-Id: Ia15b2110157b5e6b713785ece9b0fb94889be6c8
/system/core/rootdir/init.rc
f530c93c4aab818de51fd7123199bef6621047f8 28-May-2014 Daniel Rosenberg <drosen@google.com> Added support for vendor partition and image

Modified fastboot to flash vendor.img as well. Moved symlink
for /vendor to occur after mounting partitions. Changed mount
to also create the mount point.

Change-Id: I78e1ba24e6bb8b4af96a67ee0569af579439e682
Signed-off-by: Daniel Rosenberg <drosen@google.com>
/system/core/rootdir/init.rc
6bd4588d65977956cadf2e5d384673c64329c8e8 24-Jun-2014 Riley Andrews <riandrews@google.com> resolved conflicts for merge of 079c637f to master

Change-Id: Iab9a857026de954d7497d6b0eaf3751d2d3904c7
079c637f3d269242bbc772b9207179b8cf56738a 23-Jun-2014 Riley Andrews <riandrews@google.com> am 5b45e08a: am 7950fc47: Merge "Add ability to boot from charger mode."

* commit '5b45e08aabd6dcbab527d221584fe348c73c70d4':
Add ability to boot from charger mode.
e4b7b294f37d9b64d6b7c1931e2c9bfb1a500d68 17-Jun-2014 Riley Andrews <riandrews@google.com> Add ability to boot from charger mode.

Add the ability to boot up directly from charger mode, instead of forcing
charger mode to initiate a full restart to launch 'full' android. This
should shave a few seconds off of boot time on supported devices (just
manta for now).

Change-Id: Ieec4494d929e92806e039f834d78b9002afd15c4
/system/core/rootdir/init.rc
aab0d57d18b202d059fec57c832d6443faff6ee3 20-Jun-2014 Riley Andrews <riandrews@google.com> am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc"

* commit '94fa20058fbd0e4f7e3c6d1381cdb9718dd90cde':
Make indentation sane in init.rc
6dfdc7cd0c9d1b266b599b3ee7f5dd3a60e45c39 19-Jun-2014 Riley Andrews <riandrews@google.com> Make indentation sane in init.rc

Change-Id: Ic632fbe1423eeef7ec958877d74db7b87fc385c6
/system/core/rootdir/init.rc
53f24c2f940b946805821db1036466d95061b1e1 20-Jun-2014 Riley Andrews <riandrews@google.com> am aab0d57d: am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc"

* commit 'aab0d57d18b202d059fec57c832d6443faff6ee3':
Make indentation sane in init.rc
8ffe8eac5b4f04ce82ae553f2155959a8b165a61 13-Jun-2014 Nick Kralevich <nnk@google.com> am f8cb68e1: am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles"

* commit 'f8cb68e15ba242200e3525fffa2f969960e18a50':
Create /data/dalvik-cache/profiles
f8cb68e15ba242200e3525fffa2f969960e18a50 13-Jun-2014 Nick Kralevich <nnk@google.com> am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles"

* commit '3bff77a8f90e673dbf41d97b7b842a3e4a6986bf':
Create /data/dalvik-cache/profiles
511998fcdb3d35847f1222aec956e6ac6f5a17ba 12-Jun-2014 Nick Kralevich <nnk@google.com> am 44aadc4d: am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell"

* commit '44aadc4daf926155bf06bcf9d8f2daa96f861cdf':
make console shell run as GID=shell
44aadc4daf926155bf06bcf9d8f2daa96f861cdf 12-Jun-2014 Nick Kralevich <nnk@google.com> am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell"

* commit '1eebf538d3e5465bbec84d86017bb9ca250a052b':
make console shell run as GID=shell
f2cb352412252f8e609986520cff830096248b9f 12-Jun-2014 Nick Kralevich <nnk@google.com> make console shell run as GID=shell

Change-Id: I240bec07b04de1b26eef14e4f590af56c1aaa276
/system/core/rootdir/init.rc
875dc8f3f31fe9f5ee42d900737149bdeb95f1c7 13-Jun-2014 Nick Kralevich <nnk@google.com> Merge "Create /data/dalvik-cache/profiles"
347ee511e44a4b6419c144917e079c78fde46f32 12-Jun-2014 Nick Kralevich <nnk@google.com> Create /data/dalvik-cache/profiles

Make sure /data/dalvik-cache/profiles gets the correct
permissions and SELinux context, and ownership is properly
assigned to the system UID.

Change-Id: Ic1b44009faa30d704855e97631006c4b990a4ad3
/system/core/rootdir/init.rc
a54b7ca1565d314c88eb31e1f2375948b3c5616a 05-Jun-2014 Robin Lee <rgl@google.com> am b7c07da2: am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory"

* commit 'b7c07da2f4606ca36b93c2b9221e43e6ebe68831':
Create world-searchable /data/misc/user directory
b7c07da2f4606ca36b93c2b9221e43e6ebe68831 05-Jun-2014 Robin Lee <rgl@google.com> am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory"

* commit '33154817e274a4c7c381e2f5ef73ead7093e3985':
Create world-searchable /data/misc/user directory
46fbaf062fd94e3fecc7165f4b42d42145e0603d 05-Jun-2014 Robin Lee <rgl@google.com> Merge "Create world-searchable /data/misc/user directory"
e7fd4078a225fdfa92edcb6be6d79ba2fd6e8eb9 28-May-2014 Nick Kralevich <nnk@google.com> am 7206eccb: am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict"

* commit '7206eccbd904508a199c7ec302d7395b3b674968':
Remove dmesg_restrict
f9ff246dd7d4d44ad65d7f9690780eddaf74bde0 28-May-2014 Torne (Richard Coles) <torne@google.com> am 4f3ad823: am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit '4f3ad823eaf97fcbcbb1afac67371aff76677b1d':
Add UID and directory for RELRO sharing support.
7206eccbd904508a199c7ec302d7395b3b674968 28-May-2014 Nick Kralevich <nnk@google.com> am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict"

* commit 'c4ffa5f62ef256ff286122d0ceea61364aa67e13':
Remove dmesg_restrict
c4ffa5f62ef256ff286122d0ceea61364aa67e13 28-May-2014 Nick Kralevich <nnk@google.com> am c290bed0: Merge "Remove dmesg_restrict"

* commit 'c290bed0350cded5620ed8dbb68b1cfb07d9828c':
Remove dmesg_restrict
c290bed0350cded5620ed8dbb68b1cfb07d9828c 28-May-2014 Nick Kralevich <nnk@google.com> Merge "Remove dmesg_restrict"
4f3ad823eaf97fcbcbb1afac67371aff76677b1d 28-May-2014 Torne (Richard Coles) <torne@google.com> am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit 'a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9':
Add UID and directory for RELRO sharing support.
a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9 28-May-2014 Torne (Richard Coles) <torne@google.com> am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit '96109cf36c3dd44e9ecfe4b810e21e77eaf834dc':
Add UID and directory for RELRO sharing support.
1a6184baf3e01bf7786fb14de4216bcb4e3b2f70 28-May-2014 Nick Kralevich <nnk@google.com> Remove dmesg_restrict

dmesg_restrict is too coarse of a control. In Android's case,
we want to allow the shell user to see dmesg output, but disallow
others from seeing it.

Rather than rely on dmesg_restrict, use SELinux to control access
to dmesg instead. See corresponding change in external/sepolicy .

Bug: 10020939
Change-Id: I9d4bbbd41cb02b707cdfee79f826a39c1ec2f177
/system/core/rootdir/init.rc
234f696ea7f97dc489290827c1c68f26279de294 22-May-2014 Torne (Richard Coles) <torne@google.com> Add UID and directory for RELRO sharing support.

Define a UID to be used by the process responsible for creating shared
RELRO files for the WebView native library, and create a directory owned
by that UID to use to store the files.

Bug: 13005501
Change-Id: I5bbb1e1035405e5534b2681f554fe16f74e3da1a
/system/core/rootdir/init.rc
373d9fa0824226c721c7b0c07952ebe3e3af770e 10-Mar-2014 Jaewan Kim <jaewan@google.com> Support static IP config on Ethernet

Bug: 7606609
Bug: 8687763
Change-Id: I1d76b5783e8511a8e3f5d981e6b4b9fb4fbecdf4
/system/core/rootdir/init.rc
066c9b5a005fdb84ea72a6d27a40ab5bf5e6f0e2 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am 9743f097: am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets."

* commit '9743f09724162186fb280627c3c125a55534a219':
Introduce fwmarkd: a service to set the fwmark of sockets.
9743f09724162186fb280627c3c125a55534a219 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets."

* commit '09eaad793a8cec9196255d740ecb89a1426c0bf7':
Introduce fwmarkd: a service to set the fwmark of sockets.
e38d4707141174a8c211d5cb01ff78da8ef1baff 11-May-2014 Sreeram Ramachandran <sreeram@google.com> Introduce fwmarkd: a service to set the fwmark of sockets.

(cherry picked from commit d5121e212c1f53b1cb6458ee83be892d94fdfef3)

Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
/system/core/rootdir/init.rc
76202a2dfaeb9ec6a23dfbc4a382b65820a52132 11-May-2014 Sreeram Ramachandran <sreeram@google.com> Introduce fwmarkd: a service to set the fwmark of sockets.

Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
/system/core/rootdir/init.rc
3c1c730f206d1d2dc25ac555d48513d6a3e5fb7f 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am ca61b484: am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs."

* commit 'ca61b484b6eb1bf92b05bc5386668ec51999e55a':
Set kernel proc files for fwmark reflection and table numbers for RAs.
ca61b484b6eb1bf92b05bc5386668ec51999e55a 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs."

* commit 'b8cfcf3d9beb6ae09512941a182c326723b3ef41':
Set kernel proc files for fwmark reflection and table numbers for RAs.
b8cfcf3d9beb6ae09512941a182c326723b3ef41 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs."

* commit '32e4479d5535887d03625b43b7e3574b458dfc8d':
Set kernel proc files for fwmark reflection and table numbers for RAs.
fd94922329a83c257dd8c65a4b1417a24d67db88 10-Apr-2014 Sreeram Ramachandran <sreeram@google.com> Set kernel proc files for fwmark reflection and table numbers for RAs.

(cherry picked from commit 2c2807ac1041751583e0c3b6892ca56eae423fa2)

Change-Id: I5f0d759cb9b8590555af7f5503f00d3e455ece54
/system/core/rootdir/init.rc
1333e012ee65fef59f5f43f33744230574dfc2a2 30-Apr-2014 Bill Yi <byi@google.com> Merge commit '4102af05a86aae36d2560fd8b3f740a52399342c' into HEAD
3094f82a8a4d4b8d2725df85a6af9d306b9f8800 25-Apr-2014 Robin Lee <rgl@google.com> Create world-searchable /data/misc/user directory

installd will create a separate subdirectory for each user.

Change-Id: I95ec09169ea70f35443bbb3209237611e174ca29
/system/core/rootdir/init.rc
0aee64f614d5eae0e50f5e24a1c790dd172b663f 17-Apr-2014 Paul Lawrence <paullawrence@google.com> Make Volantis devices encryptable

Volantis SurfaceFlinger holds open a file on data partition.
SurfaceFlinger is not running when we trigger_default_encryption
but if we start it before starting defaultcrypto it locks open
data, so we can't unmount it.

It will start anyway when main starts, so not starting it here
is safe - it will just cause a 1-2 second delay in the graphics
appearing.

Change-Id: Idd546a578e62a24f999367b1407b37ad0f00f3a2
/system/core/rootdir/init.rc
e29590b08bce1667c6bddebeb80991b7d16344c4 18-Apr-2014 JP Abgrall <jpa@google.com> am 46e6b4f7: am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks"

* commit '46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e':
rootdir: init.rc: update max TCP window sizes for mobile networks
46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e 18-Apr-2014 JP Abgrall <jpa@google.com> am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks"

* commit 'b0397d55a2ff4b3c6664c9545be18ba88c07dea4':
rootdir: init.rc: update max TCP window sizes for mobile networks
ce898489e4ff2567b297c8f8776504b9924f432a 24-Mar-2014 Narayan Reddy <narayanr@nvidia.com> rootdir: init.rc: update max TCP window sizes for mobile networks

GRPS: RTT=600ms, max tput=80kbps (class 12 GMSK 4+1)
EDGE: RTT=300ms, max tput=236kbps (class 12 8PSK)
UMTS: RTT=200ms, max tput=384kbps (R99)
HSDPA: RTT=75ms, max tput=14Mbps (cat 10)
HSUPA: RTT=50ms, max tput=14Mbps
HSPA: RTT=50ms, max tput=14Mbps
HSPA+: RTT=50ms, max tput=42Mbps (cat 20)
LTE: RTT=20ms, max tput=100Mbps (class 3)

bug 67569

Change-Id: I9d62359bbd11dc68e3649a7ea2295d0d4e25e3f2
Signed-off-by: Narayan Reddy <narayanr@nvidia.com>
Signed-off-by: Steve Lin <stlin@nvidia.com>
/system/core/rootdir/init.rc
f24aab7d744b708a897e70e2cbdb76a81bc069b7 10-Apr-2014 Paul Lawrence <paullawrence@google.com> Fix forceencrypt

When changing vdc cryptfs enablecrypto inplace default in
https://googleplex-android-review.git.corp.google.com/#/c/445001/
forgot to change init.rc

Change-Id: I2a937d3c302ab8eab4829a36101145d6fe726ab1
/system/core/rootdir/init.rc
11673a03e05c21bd254868466e6736b02ef1097e 09-Apr-2014 dcashman <dcashman@google.com> am 8b4ea5a4: am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary."

* commit '8b4ea5a49dda2767af87604713053e1bc418e96f':
Enable world-readable selinuxfs policy binary.
8b4ea5a49dda2767af87604713053e1bc418e96f 09-Apr-2014 dcashman <dcashman@google.com> am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary."

* commit '39a5b812904ec13390d6261bafccf823729ae21d':
Enable world-readable selinuxfs policy binary.
5822a4af8406fb6e9ecc675297af19852b378ca0 26-Mar-2014 dcashman <dcashman@google.com> Enable world-readable selinuxfs policy binary.

Change-Id: I1eefb457cea1164a8aa9eeb7683b3d99ee56ca99
/system/core/rootdir/init.rc
dc9af896f011698949cf9237094e52eaec9d4e8e 01-Apr-2014 Narayan Kamath <narayan@google.com> resolved conflicts for merge of 6a949b45 to master

Change-Id: Ie123b4fff76ef43e2b1c0583731e88997504320e
6a949b45e9166bcd4fc4b18e795085126a937c7b 01-Apr-2014 Narayan Kamath <narayan@google.com> am ffca173c: am 5da2dbbc: Merge "Move zygote init config to its own file."

* commit 'ffca173c853a2e312610d87f40957f696ac8364a':
Move zygote init config to its own file.
4456a55ce69cd5b8ad39349ed55d3efc3512bffa 31-Mar-2014 Narayan Kamath <narayan@google.com> Move zygote init config to its own file.

This allows us to choose different configs depending on
whether or not the target is 64 capable, and what its preferred
default is.

bug: 13647418
Change-Id: Ie1ce4245a3add7544c87d27c635ee390f4062523
/system/core/rootdir/init.rc
5c789b8a31a1924a346b1485410b692b82781406 24-Mar-2014 Paul Lawrence <paullawrence@google.com> Merge "Auto-encrypt drive at startup"
166fa3de7060198252b43a4a9ddd841fb6d65cf7 03-Feb-2014 Paul Lawrence <paullawrence@google.com> Auto-encrypt drive at startup

Modify fs_mgr to unmount encryptable drives after test mounting them and
then trigger an auto-encrypt via the init script

Needs matching vold changes from
https://googleplex-android-review.googlesource.com/#/c/414200/

Feature is limited to list of serial numbers with this change

Bug: 11985952
Change-Id: I84f85a258b6a7e9809467c9149249302e203c41b
/system/core/rootdir/init.rc
bd28bb69c7e52f44743745562f10573c1814ff3c 24-Mar-2014 Mark Salyzyn <salyzyn@google.com> am b5f9e65a: am 0a0cc719: init.rc: Add lmkd service back

* commit 'b5f9e65ad127261df2f7c9ed40d73b9024f492f6':
init.rc: Add lmkd service back
44983ace850dd47384fa7698c362b4cfc9ca7f4c 24-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 68b9d5f0: am bdef5499: resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp

* commit '68b9d5f07a443b44d81e09f65a45fea8c8f4984b':
logd: core requirement
0a0cc7192e1081acff483ae4f455c3aad6370546 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> init.rc: Add lmkd service back

- not impressed with conflict for merge f8f0531b

Change-Id: I5b9a1a93ea0cf7eda4ced8dcfc9d0ad70f7aa6c8
/system/core/rootdir/init.rc
bdef5499d4eb0c4f5e6853471373acd610798c7c 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp

Change-Id: I87228aa0dbd0b909437c85812f2404ca8be39f38
9a305cd168abea5d0eaad0f1b1e65466b9a823c9 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> am f8f0531b: Merge "logd: core requirement"

* commit 'f8f0531bb69a90e87f1bafa875e665e3935610b1':
logd: core requirement
3c253dc88f3e1decb055340c84fd6234b422c409 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> logd: core requirement

- has no dependency on /data, switch from main to core

Change-Id: I4bfe3e67d4cbd31e943c609f5626e533857a27a9
/system/core/rootdir/init.rc
d94ed2c8fea4733684e4ebbf55c112828562b7a7 14-Mar-2014 JP Abgrall <jpa@google.com> am 7283db6d: am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60

* commit '7283db6d2694c8deae644a0d815cf292309a6176':
init.rc: prep tcp_default_init_rwnd, set the default to 60
7283db6d2694c8deae644a0d815cf292309a6176 14-Mar-2014 JP Abgrall <jpa@google.com> am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60

* commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781':
init.rc: prep tcp_default_init_rwnd, set the default to 60
10f229d4291da55c379ce7ae0e87b1a1878199e8 14-Mar-2014 JP Abgrall <jpa@google.com> am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60

* commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781':
init.rc: prep tcp_default_init_rwnd, set the default to 60
efbf36f2dad8f083de6f48dbb682461d7cfa9781 21-Feb-2014 JP Abgrall <jpa@google.com> init.rc: prep tcp_default_init_rwnd, set the default to 60

The kernel's default is between 4~20.

Prepare for javaland to modify the value at runtime.

It can be done via
setprop sys.sysctl.tcp_def_init_rwnd <value>


Bug: 12020135
Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2
(cherry picked from commit 7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4)
/system/core/rootdir/init.rc
f447c1b3ae6d467392500a985e3974facb1b095f 11-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value"

* commit '858d0dd1e529575181abd8de607e46f7b273cc9d':
set /proc/sys/net/unix/max_dgram_qlen to large value
9509103cd4f28cf05a9fc6c5b6fd97504875097c 11-Mar-2014 Nick Kralevich <nnk@google.com> am 9453bce4: Merge "Apply restorecon_recursive to all of /data."

* commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5':
Apply restorecon_recursive to all of /data.
01c5199665cfa5c6631696d410c077c3dceb871e 11-Mar-2014 Mark Salyzyn <salyzyn@google.com> am e9c8fb90: Merge "logd: initial checkin."

* commit 'e9c8fb900a460699201208870ce9997a734261cc':
logd: initial checkin.
dfda9b0b4703329745fc873a78034868937921ea 07-Mar-2014 Colin Cross <ccross@android.com> am 27fd413d: Merge "Start debuggerd64 for 64-bit processes"

* commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32':
Start debuggerd64 for 64-bit processes
c1f1eb374e3153e71419b50e8e9642a0ffaaea1e 07-Mar-2014 Nick Kralevich <nnk@google.com> am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file."

* commit 'ba023b063d25b73923f2df536b6258967f756ff6':
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
1d39c53e29a9c56893d170f1eac3d720076e0e55 04-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 00eaae3a: am 556c9c24: am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value"

* commit '00eaae3aaa6ea3ca2c9c00e0559fa6937ce33e37':
set /proc/sys/net/unix/max_dgram_qlen to large value
556c9c245de257efe8bda09ff23d2c4f7add5e49 04-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value"

* commit '858d0dd1e529575181abd8de607e46f7b273cc9d':
set /proc/sys/net/unix/max_dgram_qlen to large value
581edc1b6c3799238cfb674dfddb97db44f2818e 20-Nov-2013 Mark Salyzyn <salyzyn@google.com> set /proc/sys/net/unix/max_dgram_qlen to large value

- init: set /proc/sys/net/unix/max_dgram_qlen to 300
- libsysutils: Add listen backlog argument to startListener
- logd: set listen backlog to 300

Change-Id: Id6d37d6c937ba2d221e76258d89c9516619caeec
/system/core/rootdir/init.rc
5c3c77ed7855d262645c44b7e239476d9b66393d 29-Jan-2014 Stephen Smalley <sds@tycho.nsa.gov> Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.

mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed
in the various device-specific init*.rc files but seems generic.
Move it to the main init.rc file.

Drop the separate chown for /data/misc/dhcp as this is handled by mkdir
built-in if the directory already exists.

Add a restorecon_recursive /data/misc/wifi/sockets.

Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
d7ce27e8ae637b9bbaf0a31cd469a461b6651ab0 26-Feb-2014 Nick Kralevich <nnk@google.com> am e6fb169f: am e570fd3a: am 9453bce4: Merge "Apply restorecon_recursive to all of /data."

* commit 'e6fb169fd69bfa6775737f37d45041c5b229321c':
Apply restorecon_recursive to all of /data.
e570fd3a32a3a3525a2e6a069d2b69c6184db56e 26-Feb-2014 Nick Kralevich <nnk@google.com> am 9453bce4: Merge "Apply restorecon_recursive to all of /data."

* commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5':
Apply restorecon_recursive to all of /data.
1bb3489e600876979146a6222ac5bb2a684702bf 26-Feb-2014 Nick Kralevich <nnk@google.com> resolved conflicts for merge of e9c8fb90 to klp-modular-dev-plus-aosp

Change-Id: I9ee9908a915258937b343de90dce5774d914f03a
9453bce4cff952aab5c90f5b30c6c12d3e1521e5 26-Feb-2014 Nick Kralevich <nnk@google.com> Merge "Apply restorecon_recursive to all of /data."
0175b0747a1f55329109e84c9a1322dcb95e2848 26-Feb-2014 Mark Salyzyn <salyzyn@google.com> logd: initial checkin.

* Create a new userspace log daemon for handling logging messages.

Original-Change-Id: I75267df16359684490121e6c31cca48614d79856
Signed-off-by: Nick Kralevich <nnk@google.com>

* Merge conflicts
* rename new syslog daemon to logd to prevent confusion with bionic syslog
* replace racy getGroups call with KISS call to client->getGid()
* Timestamps are filed at logging source
* insert entries into list in timestamp order
* Added LogTimeEntry tail filtration handling
* Added region locking around LogWriter list
* separate threads for each writer
* /dev/socket/logd* permissions

Signed-off-by: Mark Salyzyn <salyzyn@google.com>

(cherry picked from commit 3e76e0a49760c4970b7cda6153e51026af98e4f3)

Author: Nick Kralevich <nnk@google.com>
Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
/system/core/rootdir/init.rc
7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4 21-Feb-2014 JP Abgrall <jpa@google.com> init.rc: prep tcp_default_init_rwnd, set the default to 60

The kernel's default is between 4~20.

Prepare for javaland to modify the value at runtime.

It can be done via
setprop sys.sysctl.tcp_def_init_rwnd <value>


Bug: 12020135
Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2
/system/core/rootdir/init.rc
4046c132dc385fb9f2ae2e2198fd32269dd14a20 20-Feb-2014 Mark Salyzyn <salyzyn@google.com> Merge changes I929dddc7,Ice88b141,I243b1338

* changes:
logd: prune more aggressively when over the top
logd: initial checkin.
logcat: test: add clear and blocking check
b6391ce26b6e5f7360efc7aba0fac8455cba53b4 16-Feb-2014 Colin Cross <ccross@android.com> am ee9de136: am bb2da79f: am 27fd413d: Merge "Start debuggerd64 for 64-bit processes"

* commit 'ee9de136c52555e8775611ad32fc8ee47c75e3d1':
Start debuggerd64 for 64-bit processes
bb2da79fdab68c9643a30f5156e7dcabb379b139 16-Feb-2014 Colin Cross <ccross@android.com> am 27fd413d: Merge "Start debuggerd64 for 64-bit processes"

* commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32':
Start debuggerd64 for 64-bit processes
78ef91aa5ec29cc45bf3f0d4b32cd92db000a95a 16-Feb-2014 Dan Willemsen <dwillemsen@nvidia.com> Start debuggerd64 for 64-bit processes

Change-Id: I2fc33d9eb2726b043d2f13bfab0c605dbb6083c7
/system/core/rootdir/init.rc
3e76e0a49760c4970b7cda6153e51026af98e4f3 15-Dec-2011 Nick Kralevich <nnk@google.com> logd: initial checkin.

* Create a new userspace log daemon for handling logging messages.

Original-Change-Id: I75267df16359684490121e6c31cca48614d79856
Signed-off-by: Nick Kralevich <nnk@google.com>

* Merge conflicts
* rename new syslog daemon to logd to prevent confusion with bionic syslog
* replace racy getGroups call with KISS call to client->getGid()
* Timestamps are filed at logging source
* insert entries into list in timestamp order
* Added LogTimeEntry tail filtration handling
* Added region locking around LogWriter list
* separate threads for each writer
* /dev/socket/logd* permissions

Signed-off-by: Mark Salyzyn <salyzyn@google.com>

Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
/system/core/rootdir/init.rc
b6e3b3cea2c2606fcff0364d680335fc3433247b 14-Feb-2014 Paul Lawrence <paullawrence@google.com> Merge "Mount default encrypted devices at boot"
b3739735b84a88cccfe08c0d69b1017a07004470 13-Feb-2014 Nick Kralevich <nnk@google.com> lowmemorykiller: make perms 0220

Set

* /sys/module/lowmemorykiller/parameters/adj
* /sys/module/lowmemorykiller/parameters/minfree

to 0220. This better indicates that these files are only intended
to be written to, never read.

Change-Id: I9ef054f032b3955e04128fc1a472a17c7b1fa792
/system/core/rootdir/init.rc
13d5bb4badf59e22d9d983d104596da3ec4f2753 30-Jan-2014 Paul Lawrence <paullawrence@google.com> Mount default encrypted devices at boot

If userdata is default encrypted, we should mount it at boot
to avoid bringing the framework up and then down unnecessarily.

Needs matching vold changes from
https://googleplex-android-review.googlesource.com/#/c/412649/

Bug: 8769627
Change-Id: I4b8276befd832cd788e15c36edfbf8f0e18d7e6b
/system/core/rootdir/init.rc
f2b7ee765516c84a9995e3acdc8fbcd7dc1b33cc 06-Feb-2014 Stephen Smalley <sds@tycho.nsa.gov> Apply restorecon_recursive to all of /data.

With the following prior changes:
I77bf2a0c4c34b1feef6fdf4d6c3bd92dbf32f4a1
I698b1b2c3f00f31fbb2015edf23d33b51aa5bba1
I8dd915d9bb80067339621b905ea2b4ea0fa8d71e
it should now be safe (will correctly label all files)
and reasonably performant (will skip processing unless
file_contexts has changed since the last call) to call
restorecon_recursive /data from init.rc.

The call is placed after the setprop selinux.policy_reload 1 so that
we use any policy update under /data/security if present.

Change-Id: Ib8d9751a47c8e0238cf499fcec61898937945d9d
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
6edd1bdf53fe6fdeeca3b4031896df4f8007de3e 04-Feb-2014 Doug Zongker <dougz@android.com> Merge "set permissions of recovery install script"
9526202d84387df3950bf526bbbaeac1ede129d2 04-Feb-2014 Doug Zongker <dougz@android.com> set permissions of recovery install script

The script that writes the recovery partition after a successful
update of system needs to be made executable. This change also moves
it from /system/etc to /system/bin.

Bug: 12893978
Change-Id: I686e2392a2392515a6859a7381b735de1007b7ea
/system/core/rootdir/init.rc
d9d8a60e42b0acc8ad6285fb8d6244d508ad0250 04-Feb-2014 Nick Kralevich <nnk@google.com> am fbca9d94: am 7e3d72d9: am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file."

* commit 'fbca9d9449231839b805ef4b11e4b2d968e601e3':
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
7e3d72d974d21932c2a6a0323c59fed2f689d323 04-Feb-2014 Nick Kralevich <nnk@google.com> am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file."

* commit 'ba023b063d25b73923f2df536b6258967f756ff6':
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
82e87ed4799b12b7bd2e20a6fe5fdc19e0350fc3 29-Jan-2014 Stephen Smalley <sds@tycho.nsa.gov> Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.

mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed
in the various device-specific init*.rc files but seems generic.
Move it to the main init.rc file.

Drop the separate chown for /data/misc/dhcp as this is handled by mkdir
built-in if the directory already exists.

Add a restorecon_recursive /data/misc/wifi/sockets.

Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
35ef36456d89b4e823f32c328c4d0e6d15ae41e2 24-Jan-2014 Nick Kralevich <nnk@google.com> am c3af60af: am c7e28899: am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root"

* commit 'c3af60aff5d097c717b19721f143499891d5ca3d':
adbd: switch to su domain when running as root
c7e28899c3917ad6e72d5dc99401bcd133cbd475 24-Jan-2014 Nick Kralevich <nnk@google.com> am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root"

* commit '16384312244b8dccd53478a7bdeeb9a492821807':
adbd: switch to su domain when running as root
16384312244b8dccd53478a7bdeeb9a492821807 24-Jan-2014 Nick Kralevich <nnk@google.com> am 0620e3dd: Merge "adbd: switch to su domain when running as root"

* commit '0620e3ddb85582f66612d046d1295dc20bf1a4f5':
adbd: switch to su domain when running as root
d49aa2537cf0b454dfaa4b0312a403ebff202d70 18-Jan-2014 Nick Kralevich <nnk@google.com> adbd: switch to su domain when running as root

When adbd runs as root, it should transition into the
su domain. This is needed to run the adbd and shell
domains in enforcing on userdebug / eng devices without
breaking developer workflows.

Introduce a new device_banner command line option.

Change-Id: Ib33c0dd2dd6172035230514ac84fcaed2ecf44d6
/system/core/rootdir/init.rc
d0f2c265d8b7457bbb9b809e00b6e8b18bbef7c9 16-Jan-2014 Doug Zongker <dougz@android.com> Merge "add the pre-recovery service"
7baebf1345ff9e861ea8ccf9712128a3b7cd9fcc 14-Jan-2014 Doug Zongker <dougz@android.com> add the pre-recovery service

Add a service called "pre-recovery" which is normally stopped but can
be started by the system server when we want to go into recovery. It
will do any preparation needed (currently needed to handle update
packages that reside on an encrypted /data partition) and then set
sys.powerctl when it's ready to actually reboot.

Bug: 12188746
Change-Id: I894a4cb200395a0f6d7fe643ed4c2ac0a45d2052
/system/core/rootdir/init.rc
32a32c9eb2b6975d76dae1dc5a2dbc73bb05f757 15-Jan-2014 Nick Kralevich <nnk@google.com> am 11190d0c: am 4552987e: am c93904b4: am e847f429: Merge "restorecon /data/misc/media."

* commit '11190d0ccb1216307043ceecf5360f1a1a946cd1':
restorecon /data/misc/media.
4552987e6a1338dac26f13f0851657335d998ffb 15-Jan-2014 Nick Kralevich <nnk@google.com> am c93904b4: am e847f429: Merge "restorecon /data/misc/media."

* commit 'c93904b445830cd17fd9dd6d4fe236987577a478':
restorecon /data/misc/media.
c93904b445830cd17fd9dd6d4fe236987577a478 15-Jan-2014 Nick Kralevich <nnk@google.com> am e847f429: Merge "restorecon /data/misc/media."

* commit 'e847f429f43ae56aaa406697ca603c8469e2100b':
restorecon /data/misc/media.
9e9f05e5ebf72a60930a53e5cf45f575534fc29d 15-Jan-2014 Stephen Smalley <sds@tycho.nsa.gov> restorecon /data/misc/media.

Otherwise it will be mislabeled on upgrades with existing userdata.

Change-Id: Ibde88d5d692ead45b480bb34cfe0831baeffbf94
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
0969ec3a558723ae55f033c163b052e1dbf97669 09-Jan-2014 Nick Kralevich <nnk@google.com> am 218878d4: am df8d0ffd: am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files."

* commit '218878d447b58b357f0dc97bfe6b77196d35a729':
Label existing /data/mediadrm files.
df8d0ffd73f8359def90d2f79d25059023018213 08-Jan-2014 Nick Kralevich <nnk@google.com> am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files."

* commit '72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7':
Label existing /data/mediadrm files.
72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7 08-Jan-2014 Nick Kralevich <nnk@google.com> am 8830b53b: Merge "Label existing /data/mediadrm files."

* commit '8830b53b76c05416c021df3eb0cea1dd541bc3ac':
Label existing /data/mediadrm files.
2dcbb81d89c86144b38c0f0b56ea7420c74a7f5a 08-Jan-2014 rpcraig <rpcraig rpcraig@tycho.ncsc.mil> Label existing /data/mediadrm files.

Use restorecon_recursive to label devices
where the directory and subfiles have
already been built and labeled.

Change-Id: I0dfe1e542fb153ad20adf7b2b1f1c087b4956a12
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/core/rootdir/init.rc
950909c301e316783e5b4687dbc422ed845cb69a 11-Jul-2013 Todd Poynor <toddpoynor@google.com> init.rc: start lmkd

Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
/system/core/rootdir/init.rc
cb1f0147d729d1a3e9b4898ea98de3e6761233e4 02-Jan-2014 Nick Kralevich <nnk@google.com> am 88d040a3: am 3df76c0c: am 6bec36ec: am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."

* commit '88d040a32feac727a7e11658198c32d9cc563d8e':
Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
6bec36ecc92af488f0193e03c386eaab409ca17c 02-Jan-2014 Nick Kralevich <nnk@google.com> am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."

* commit '5b8abdf6278a4142736d918d1371d10c54c91db3':
Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
5b8abdf6278a4142736d918d1371d10c54c91db3 02-Jan-2014 Nick Kralevich <nnk@google.com> Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."
3dd470552c6b1c88cd344c3a366666ba464bd994 27-Dec-2013 Colin Cross <ccross@android.com> am 469035b8: am fed48bb6: am 6604f2d1: am 2dcc2759: Merge "Run the console service shell in the shell domain."

* commit '469035b83546a847a1f12c1feca50a1c7e5e1062':
Run the console service shell in the shell domain.
6604f2d1ef5e78e7f129f94abe7a763dd0e0dd1d 27-Dec-2013 Colin Cross <ccross@android.com> am 2dcc2759: Merge "Run the console service shell in the shell domain."

* commit '2dcc275936aefbb5badf3b4822d492260077144d':
Run the console service shell in the shell domain.
5e1461dc906f68f6590df1c79f2f4d69e0af18c5 23-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.

If checkreqprot == 1, SELinux only checks the protection flags passed
by the application, even if the kernel internally adds PROT_EXEC for
READ_IMPLIES_EXEC personality flags. Switch to checkreqprot == 0
to check the final protection flags applied by the kernel.

Change-Id: Ic39242bbbd104fc9a1bcf2cd2ded7ce1aeadfac4
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
610653fe930d016e1d962661c4fcbe2a8747e5ac 23-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Run the console service shell in the shell domain.

This allows it to be permissive in userdebug/eng builds
but confined/enforcing in user builds.

Change-Id: Ie322eaa0acdbefea2de4e71ae386778c929d042b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
f7f823e46b285169637c1f1a9c17e16ae1566b92 16-Dec-2013 Nick Kralevich <nnk@google.com> am 8b0d10c8: am a24e9a86: am 02ad8700: am e4335483: Merge "Relabel /data/misc/zoneinfo"

* commit '8b0d10c870efbe8254f407e02c406c05bedfa0b5':
Relabel /data/misc/zoneinfo
02ad8700dd22d5bf5d73c638e3a45c35d5ef3d1d 16-Dec-2013 Nick Kralevich <nnk@google.com> am e4335483: Merge "Relabel /data/misc/zoneinfo"

* commit 'e4335483e78292800e27c7bf0a67d23bee47dc84':
Relabel /data/misc/zoneinfo
354e9edbd73ad9453e6c284c0551105ccf6aac14 14-Dec-2013 Nick Kralevich <nnk@google.com> Relabel /data/misc/zoneinfo

The files in zoneinfo changed from system_data_file to
zoneinfo_data_file. Fixup pre-existing files.

Change-Id: Idddbd6c2ecf66cd16b057a9ff288cd586a109949
/system/core/rootdir/init.rc
6b3867fc6b3cb45e6163c15cc831fd150a8b104c 09-Dec-2013 Nick Kralevich <nnk@google.com> am 7d1f3a3d: am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce."

* commit '7d1f3a3daa721892b3247e847f72f1e948a0a68f':
Do not change ownership on /sys/fs/selinux/enforce.
7d1f3a3daa721892b3247e847f72f1e948a0a68f 09-Dec-2013 Nick Kralevich <nnk@google.com> am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce."

* commit 'bdf53e2a59654d2b1e8469616f1b0175b275219d':
Do not change ownership on /sys/fs/selinux/enforce.
17bec835d5cf1dfd3fa94df3b0da84a1e731e447 09-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Do not change ownership on /sys/fs/selinux/enforce.

There is no longer any reason to permit system UID to set enforcing mode.

Change-Id: Ie28beed1ca2b215c71f2847e2390cee1af1713c3
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
7fc7a07b237e0887f3815822c4551b9968267b37 05-Dec-2013 The Android Open Source Project <initial-contribution@android.com> Merge commit '252d9030cd4b2e3e6cf13fa33f328eccedb5e26c' into HEAD
66ed50af6870210ce013a5588a688434a5d48ee9 22-Nov-2013 The Android Open Source Project <initial-contribution@android.com> Merge commit '536dea9d61a032e64bbe584a97463c6638ead009' into HEAD

Change-Id: I5c469a4b738629d99d721cad7ded02d6c35f56d5
fabe8716f81ec419ec854799d0a63c444e91edd3 22-Nov-2013 Todd Poynor <toddpoynor@google.com> am fd1dd864: am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions

* commit 'fd1dd864a896bd6233ee8c75b84d9771148dd9b3':
init.rc: mount pstore fs, set console-ramoops permissions
fd1dd864a896bd6233ee8c75b84d9771148dd9b3 22-Nov-2013 Todd Poynor <toddpoynor@google.com> am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions

* commit '479efb540a198a9b7cd278387b0d45009a05bb2b':
init.rc: mount pstore fs, set console-ramoops permissions
9350d80e706f385c8a4dc6bc4fd9be15e6e0a850 22-Nov-2013 Elliott Hughes <enh@google.com> am b6ee39bc: am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi"

* commit 'b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9':
split setptop ethernet tcp buffer from wifi
479efb540a198a9b7cd278387b0d45009a05bb2b 22-Nov-2013 Todd Poynor <toddpoynor@google.com> init.rc: mount pstore fs, set console-ramoops permissions

Change-Id: I44cb00f9123c6044a03de926b6a616da753bb549
/system/core/rootdir/init.rc
b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9 22-Nov-2013 Elliott Hughes <enh@google.com> am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi"

* commit '4a4616f6450f191faf168a10b6e2ffaba14803bd':
split setptop ethernet tcp buffer from wifi
4a4616f6450f191faf168a10b6e2ffaba14803bd 21-Nov-2013 Elliott Hughes <enh@google.com> am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi"

* commit '048bb92f3f33196d96a51b446c73805e208a5333':
split setptop ethernet tcp buffer from wifi
52ea510f8fa84b634ffff18b75b5a3f95e302ba6 15-Nov-2013 Jianzheng Zhou <jianzheng.zhou@freescale.com> split setptop ethernet tcp buffer from wifi

Change-Id: I0582ec75fddb904ca14b9cbddf593ddbd4195c41
Signed-off-by: Jianzheng Zhou <jianzheng.zhou@freescale.com>
/system/core/rootdir/init.rc
fb7e395455c9a2acee13aaa527768558d0a58b7c 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> am 9b41f452: am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev

* commit '9b41f452013123d0a394e696f597467da73108ed':
vold no longer does MS_MOVE; remove tmpfs.
9b41f452013123d0a394e696f597467da73108ed 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev

* commit 'a9e453f1b552699f69dca19599c7624a581089bd':
vold no longer does MS_MOVE; remove tmpfs.
00c8e1a2199b2f9c50935bb4ea8bb3b86ba1bbef 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> vold no longer does MS_MOVE; remove tmpfs.

MS_MOVE was used when staging external storage devices, which no
longer occurs. In fact, having a writable tmpfs was masking a vold
bug around moving apps to SD cards.

Bug: 11175082
Change-Id: Ib2d7561c3a0b6fde94f651a496cb0c1f12f88d96
/system/core/rootdir/init.rc
eef6fca832c7270dfe48a9bb2aad632bba3d0ea8 09-Oct-2013 Jeff Sharkey <jsharkey@android.com> am a5fdea71: am e93a0517: Set GID required to write, media_rw mount point.

* commit 'a5fdea7189239d7edeafa528c299306cba55e6c6':
Set GID required to write, media_rw mount point.
a5fdea7189239d7edeafa528c299306cba55e6c6 08-Oct-2013 Jeff Sharkey <jsharkey@android.com> am e93a0517: Set GID required to write, media_rw mount point.

* commit 'e93a0517f4c88310066ac39c6b268ebfcceef44e':
Set GID required to write, media_rw mount point.
e93a0517f4c88310066ac39c6b268ebfcceef44e 08-Oct-2013 Jeff Sharkey <jsharkey@android.com> Set GID required to write, media_rw mount point.

Add sdcard FUSE daemon flag to specify the GID required for a package
to have write access. Normally sdcard_rw, but it will be media_rw
for secondary external storage devices, so DefaultContainerService
can still clean up package directories after uninstall.

Create /mnt/media_rw which is where vold will mount raw secondary
external storage devices before wrapping them in a FUSE instance.

Bug: 10330128, 10330229
Change-Id: I4385c36fd9035cdf56892aaf7b36ef4b81f4418a
/system/core/rootdir/init.rc
ecb2e3903bf24a511032654532f44486362de765 04-Oct-2013 Colin Cross <ccross@android.com> am ad296139: am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."

* commit 'ad2961397f1c7b79b114672108a3bc9b87dc8174':
Set security context of /adb_keys and /data/misc/adb/adb_keys.
ad2961397f1c7b79b114672108a3bc9b87dc8174 04-Oct-2013 Colin Cross <ccross@android.com> am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."

* commit '410f8c305b416484f17f068c37b785605a2f69eb':
Set security context of /adb_keys and /data/misc/adb/adb_keys.
410f8c305b416484f17f068c37b785605a2f69eb 04-Oct-2013 Colin Cross <ccross@android.com> am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."

* commit '79b277ab73711313690d03a9fb2e9cb3f9242b39':
Set security context of /adb_keys and /data/misc/adb/adb_keys.
41c9fd6480771ec7ab4c160aef046e0d27a085a0 02-Oct-2013 Colin Cross <ccross@android.com> am 0d3ac55d: am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data."

* commit '0d3ac55d0654fe4f6d37923782dcd41f0590c741':
Trigger a policy reload from post-fs-data.
0d3ac55d0654fe4f6d37923782dcd41f0590c741 02-Oct-2013 Colin Cross <ccross@android.com> am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data."

* commit '230252d5cd70f5be4c24046c7a409e9498ac97f5':
Trigger a policy reload from post-fs-data.
230252d5cd70f5be4c24046c7a409e9498ac97f5 02-Oct-2013 Colin Cross <ccross@android.com> am 61afb07b: Merge "Trigger a policy reload from post-fs-data."

* commit '61afb07b9b14233f76a969840f74ce1ced22bf58':
Trigger a policy reload from post-fs-data.
deb41e512760f9d18cb718b007ced367018b3667 01-Oct-2013 Stephen Smalley <sds@tycho.nsa.gov> Set security context of /adb_keys and /data/misc/adb/adb_keys.

I97b3d86a69681330bba549491a2fb39df6cf20ef introduced a separate type
for the adb_keys file. Set the security context of the adb_keys file
accordingly by adding restorecon commands to init.rc.

Change-Id: I30e4d2a1ae223a03eadee58a883c79932fff59fe
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
61afb07b9b14233f76a969840f74ce1ced22bf58 30-Sep-2013 Colin Cross <ccross@android.com> Merge "Trigger a policy reload from post-fs-data."
63144019468b2043393aabd7cba6f03b2e9a4234 24-Sep-2013 Ken Sumrall <ksumrall@android.com> am dfcbf02b: am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev

* commit 'dfcbf02bb0a6705e3714a59e42e052fbb0ce8799':
Create a separate copy of the fsck logs
dfcbf02bb0a6705e3714a59e42e052fbb0ce8799 24-Sep-2013 Ken Sumrall <ksumrall@android.com> am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev

* commit '6b1a027239689a817aa5ca44a2bcbfe48ed21408':
Create a separate copy of the fsck logs
6b1a027239689a817aa5ca44a2bcbfe48ed21408 23-Sep-2013 Ken Sumrall <ksumrall@android.com> Merge "Create a separate copy of the fsck logs" into klp-dev
4676550b5684da8355f9ee0b2db964005ce9ea4f 17-Sep-2013 Todd Poynor <toddpoynor@google.com> init.rc: use oom_score_adj instead of oom_adj

Use kernel oom_score_adj interface to make init and children unkillable.

Stop using older, deprecated oom_adj interface.

Use OOM_SCORE_ADJ_MIN to make the processes unkillable (previously the processes
were set to a very low score, but not unkillable).

Change-Id: I680965009585c2a5a580859fb946f2d0caa95d9c
/system/core/rootdir/init.rc
4eaf905858c6a1d7cf0639bed3e8de3bd7987646 19-Sep-2013 Ken Sumrall <ksumrall@android.com> Create a separate copy of the fsck logs

The log_target parameter of android_fork_execvp_ext() is now a
bit field, and multiple targets can be set to log to multiple
places at the same time.

The new target LOG_FILE will log to a file specified by the new
parameter file_path.

Set LOG_FILE and log to a file in /dev (the only writable filesystem
avilable when e2fsck runs) when invoking e2fsck in fs_mgr.

Bug: 10021342

Change-Id: I63baf644cc8c3afccc8345df27a74203b44d0400
/system/core/rootdir/init.rc
aa4a3228f00fedd870c25dc37a112e439682dbde 21-Sep-2013 Jeff Sharkey <jsharkey@android.com> am 9729b415: am 44d6342c: Remove mkdir() side effect, add .nomedia, utils.

* commit '9729b41574ca5e5e87c86b203a2096cbdc72cfea':
Remove mkdir() side effect, add .nomedia, utils.
9729b41574ca5e5e87c86b203a2096cbdc72cfea 21-Sep-2013 Jeff Sharkey <jsharkey@android.com> am 44d6342c: Remove mkdir() side effect, add .nomedia, utils.

* commit '44d6342caa0db1f613809e9ba1ea8d9af0183b74':
Remove mkdir() side effect, add .nomedia, utils.
44d6342caa0db1f613809e9ba1ea8d9af0183b74 12-Sep-2013 Jeff Sharkey <jsharkey@android.com> Remove mkdir() side effect, add .nomedia, utils.

Before this change, FUSE lookup() would have the side effect of
creating the directory on behalf of apps. This resulted in most
directories being created just by Settings trying to measure disk
space. Instead, we're switching to have vold do directory creation
when an app doesn't have enough permissions.

Create fs_mkdirs() utility to create all parent directories in a
path as needed. Allow traversal (+x) into /storage directories.

Fix FUSE derived permissions to be case insensitive. Mark well-known
directories as .nomedia when created.

Bug: 10577808, 10330221
Change-Id: I53114f2e63ffbe6de4ba6a72d94a232523231cad
/system/core/rootdir/init.rc
5660da25b9cd0b2e8d4e5d89de5b1cc281bce9bd 19-Sep-2013 Nick Kralevich <nnk@google.com> am 1998e505: am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."

* commit '1998e505a98ad445bead87c2bb047053f1aea648':
Do not change ownership of /sys/fs/selinux/load to system UID.
1998e505a98ad445bead87c2bb047053f1aea648 19-Sep-2013 Nick Kralevich <nnk@google.com> am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."

* commit '2e9402863b40fe8bf2ddd8169c62f2419d968ff9':
Do not change ownership of /sys/fs/selinux/load to system UID.
2e9402863b40fe8bf2ddd8169c62f2419d968ff9 19-Sep-2013 Nick Kralevich <nnk@google.com> am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."

* commit '0f507339ec474a2f67227466efc9045630f1f1a4':
Do not change ownership of /sys/fs/selinux/load to system UID.
cc13e8ab87f74143293722e5301480fbe31b788d 26-Aug-2013 Stephen Smalley <sds@tycho.nsa.gov> Do not change ownership of /sys/fs/selinux/load to system UID.

Policy reload is handled by setting the selinux.reload_policy property
and letting the init process perform the actual loading of policy into
the kernel. Thus, there should be no need for the system UID to directly
write to /sys/fs/selinux/load.

Change-Id: I240c5bb2deaee757a2e1e396e14dea9e5d9286f5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
5d4be690935ea7970a53837914f31de0a4f0690d 18-Sep-2013 Nick Kralevich <nnk@google.com> am 0e7bd81c: am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev

* commit '0e7bd81c938611cfa4ebf44870668300a5bba875':
Initialize /dev/urandom earlier in boot.
0e7bd81c938611cfa4ebf44870668300a5bba875 18-Sep-2013 Nick Kralevich <nnk@google.com> am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev

* commit '4f18183bd6d3d2ed5d698c176ecc239211bdb82e':
Initialize /dev/urandom earlier in boot.
b410eb19130cf1eca158a672bba8f515e7627f11 18-Sep-2013 Nick Kralevich <nnk@google.com> Initialize /dev/urandom earlier in boot.

It's a security best practice to carry entropy across reboots.
(see "man 4 random"). Currently, entropy saving and mixing occur
in the system_server, via the EntropyMixer code. Unfortunately, the
EntropyMixer code runs fairly late in the boot process, which means
early boot doesn't have high quality entropy. This has caused security
problems in the past.

Load entropy data as soon as we can in the early boot process, so that
we can get /dev/random / /dev/urandom into a "random" state earlier.

Bug: 9983133
Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
/system/core/rootdir/init.rc
59e51e792a13e017d0f1b85a02fcc56815ea83d6 11-Sep-2013 Todd Poynor <toddpoynor@google.com> init.rc: no longer start healthd in charger mode

Being moved to healthd/charger mode in board-specific init.rc.

Change-Id: Ie9fc2e5abc1737fbffec8fb071c73f5fd96e4d17
/system/core/rootdir/init.rc
8d0a92ddc568c4fb065d8e9ec098f1ef4ff9e6ac 11-Sep-2013 Rom Lemarchand <romlem@google.com> am 342077e7: am 67b00d8b: init.rc: change mem cgroups permissions

* commit '342077e78da9411c252232313bc40fb4ce5f6137':
init.rc: change mem cgroups permissions
342077e78da9411c252232313bc40fb4ce5f6137 11-Sep-2013 Rom Lemarchand <romlem@google.com> am 67b00d8b: init.rc: change mem cgroups permissions

* commit '67b00d8b2d96e8133c249bcbc0fb63c49e10e022':
init.rc: change mem cgroups permissions
67b00d8b2d96e8133c249bcbc0fb63c49e10e022 11-Sep-2013 Rom Lemarchand <romlem@google.com> init.rc: change mem cgroups permissions

Changing mem cgroups permissions to only be accessible by root and system.

Bug: 10210529
Bug: 10210900
Change-Id: Ib4fff6f49b33013b3629d40ae98a5e2464571b2d
/system/core/rootdir/init.rc
aacded70196acf958ddd26149dec9709571f1f56 11-Jul-2013 Todd Poynor <toddpoynor@google.com> init.rc: start lmkd

Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
/system/core/rootdir/init.rc
6552f6885fc2a94501ca064bffc4c18ad40caad8 26-Aug-2013 Stephen Smalley <sds@tycho.nsa.gov> Trigger a policy reload from post-fs-data.

Once userdata is available and decrypted, trigger a policy reload to pick
up any policy update files stored under /data/security.

Change-Id: Ic2b3121c3395429b108c40d1d7f5a3124a5896c5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
a34f1391bd9c368aceecb3f8dec158b2cb8b2dd4 23-Aug-2013 Colin Cross <ccross@android.com> am 30caffc0: resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp

* commit '30caffc025aff450ebb354ee693174cc1732732b':
Handle policy reloads within ueventd rather than restarting it.
30caffc025aff450ebb354ee693174cc1732732b 23-Aug-2013 Colin Cross <ccross@android.com> resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp

Change-Id: I08e9898940f7cdd466469b76760807cc5d5c67e4
a1af5cf6d1c008dbde2e40121940d65faa0816bf 23-Aug-2013 Colin Cross <ccross@android.com> am d8d99c45: Merge "Handle policy reloads within ueventd rather than restarting it."

* commit 'd8d99c45b704399d50ae0a5e4df938d825c70cfa':
Handle policy reloads within ueventd rather than restarting it.
46a24db563f46736f6e02c4d80656ab51d94ff77 23-Aug-2013 Jeff Brown <jeffbrown@google.com> Remove input flinger stubs. (DO NOT MERGE)

Bug: 10446930
Change-Id: I88b926380dbe1e866c0b87ec95b3489d87c5907b
/system/core/rootdir/init.rc
13f4c9fb279f1b34a3b47a6eac80b8a09d2d3a79 20-Jun-2013 Todd Poynor <toddpoynor@google.com> healthd: normal and charger mode startup

Command line flag -n tells healthd not to use (or wait for) servicemanager
in charger mode.

Change-Id: I255f9597dff6fc904f5ed20fd02f52c0531d14f8
/system/core/rootdir/init.rc
5ba57f9a951728593aed559ece93ba821c33e45c 27-Jul-2013 Colin Cross <ccross@android.com> Merge "add property to adjust extra_free_kbytes kernel vm tunable"
e2eb69db6d818b41f5c0f2090cc643f7cff31734 16-Apr-2013 Stephen Smalley <sds@tycho.nsa.gov> Handle policy reloads within ueventd rather than restarting it.

Restarting ueventd upon policy reloads has reportedly created
stability problems for some users and could cause events to be lost.
Stop restarting ueventd and instead handle policy reloads within ueventd.

Also stops restarting installd upon policy reloads.

Change-Id: Ic7f310d69a7c420e48fbc974000cf4a5b9ab4a3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
57fdb5cfd2b20f47299a12c2050ff8bb2707c788 25-Jul-2013 Colin Cross <ccross@android.com> add property to adjust extra_free_kbytes kernel vm tunable

ActivityManager can't directly write to extra_free_kbytes because
/proc/sys rejects all chown and chmod syscalls. Proxy the writes
through init by using the sys.sysctl.extra_free_kbytes property.

Bug: 10024467
Change-Id: I441e00478421254355fcafb252bc878166483d4c
/system/core/rootdir/init.rc
5748ee972de22e3a53bd3ef7d998ed15ea726a69 24-Jul-2013 Ying Wang <wangying@google.com> Generate init.environ.rc by populating BOOTCLASSPATH

- BOOTCLASSPATH now is derived from PRODUCT_BOOT_JARS, which is a product
configuration variable set up by the core build system.
- Moved files from the legacy ALL_PREBUILT to PRODUCT_COPY_FILES in
build/target/product/embedded.mk.

Bug: 9990214
Change-Id: I98bac36c1ca8c779dda572a0a5e0a22b7e4c4a7a
/system/core/rootdir/init.rc
f498ec8fafcce6fe30ba3a80bbdbce6577b6b921 20-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> am dafa66af: am 2aa33a3d: Add writable data space for radio.

* commit 'dafa66afdd3729e2c65ccb8dced8ca3e137db437':
Add writable data space for radio.
dafa66afdd3729e2c65ccb8dced8ca3e137db437 19-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> am 2aa33a3d: Add writable data space for radio.

* commit '2aa33a3dbd1147558098d9a2948450d363ffe468':
Add writable data space for radio.
57fc1ceebc6a8c84fa6e9cbf268b5ffca3052c2d 18-Jul-2013 Jeff Brown <jeffbrown@google.com> Split framework jar.

Change-Id: I590de05f23669cf625030b479c786423f21c6159
/system/core/rootdir/init.rc
2aa33a3dbd1147558098d9a2948450d363ffe468 16-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> Add writable data space for radio.

Storing carrier provisioning urls updates in /data/misc/radio.
bug:9623159

Change-Id: I8d62d4638229733dea0f11f1729c4d22ae2295d1
I36697ed341353b7a3dbec5afe20241102e76f6f1
/system/core/rootdir/init.rc
3884a9b252c1852e88a2ad75c22b042d25a633f4 13-Jul-2013 Jeff Brown <jeffbrown@google.com> init.rc: Add input flinger.

Change-Id: Ibcb1116bdcd9189272db620910b9958c8ffb4552
/system/core/rootdir/init.rc
4a291b339e1ab682609485aef6fbb46b66b0de90 15-Jul-2013 Rom Lemarchand <romlem@google.com> Merge "init.rc: configure memory cgroups"
56adf992676e39175f227ac1a542d841bb6c0c24 15-Jul-2013 Nick Kralevich <nnk@google.com> am 9a4913d4: init.rc: remove "on fs" section

* commit '9a4913d422f4c18033333afe8e2e1d699b112d44':
init.rc: remove "on fs" section
435a52ef07a5c97bdd717f20cb3115a585eb6d3c 10-Jul-2013 Rom Lemarchand <romlem@google.com> init.rc: configure memory cgroups

Create the memory cgroups folders and configure them

Change-Id: I06c4bb486b204f7e98b0bc6757deec8bd7f6349e
/system/core/rootdir/init.rc
9a4913d422f4c18033333afe8e2e1d699b112d44 12-Jul-2013 Nick Kralevich <nnk@google.com> init.rc: remove "on fs" section

This was only ever used by the emulator. Now the emulator
uses an fstab file.

Change-Id: I1a071e567e1f1a379f9c8079cc2dc17660d8455f
/system/core/rootdir/init.rc
e1dbdd697894f84e2cb8882160f0e4104f739064 12-Jul-2013 Nick Kralevich <nnk@google.com> am 7d6ddc7d: am 2713be91: am fb1c9cf6: Merge "use ext4 instead of yaffs"

* commit '7d6ddc7d395e909d841bb7eadfc12a167076aecf':
use ext4 instead of yaffs
2713be91a84078e8b0b9b755ce17881b750e85a7 12-Jul-2013 Nick Kralevich <nnk@google.com> am fb1c9cf6: Merge "use ext4 instead of yaffs"

* commit 'fb1c9cf6fa4efafb3e0c6b0bc93c7f087d926a48':
use ext4 instead of yaffs
f4c1512db8f0d2fd19d80487d96db3af7ceaacb5 10-Jul-2013 Nick Kralevich <nnk@google.com> use ext4 instead of yaffs

This is needed to allow the emulator to use ext4 images.

Bug: https://code.google.com/p/android/issues/detail?id=38561
Change-Id: I02fde6382ad67cf7f4f3b695396841f70bb9301d
/system/core/rootdir/init.rc
317ec9246b28c8be373d2915be5fbfd85b2854e2 04-Jun-2013 Torne (Richard Coles) <torne@google.com> Add webviewchromium to BOOTCLASSPATH.

Add /system/framework/webviewchromium.jar to BOOTCLASSPATH. This jar
contains the implementation classes for the new WebView. It has been
processed with jarjar to ensure that it doesn't define any classes
outside of com.android.

Change-Id: If65913638df0088f4dd7d62a087750b90038a7fb
/system/core/rootdir/init.rc
71952461310cff9f35a4852415c608d14c92236a 21-May-2013 Colin Cross <ccross@android.com> am 5f1a938e: am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"

* commit '5f1a938e9c65829c3afebb4d92c8e93caecc3e11':
init.rc: remove duplicated led-related nodes
5f1a938e9c65829c3afebb4d92c8e93caecc3e11 21-May-2013 Colin Cross <ccross@android.com> am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"

* commit '3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2':
init.rc: remove duplicated led-related nodes
3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2 21-May-2013 Colin Cross <ccross@android.com> am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"

* commit '9246f8d6def40a50933a980fac773a909f2138d7':
init.rc: remove duplicated led-related nodes
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae 21-May-2013 gcondra@google.com <gcondra@google.com> am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status."

* commit '253e91b4ffb631b188fdac0c1624786103471f05':
Revert "Add persistent property for SELinux enforcment status."
acef650dbc11355f9792923b69d8277a4ce89fab 21-May-2013 gcondra@google.com <gcondra@google.com> am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition."

* commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1':
Revert "Reload policy after setting up the data partition."
9a8cb3abf8985586172d8f891933b04ff419f81c 21-May-2013 gcondra@google.com <gcondra@google.com> am b9866649: am 52351300: Revert "Add a version check for SELinux policy on device."

* commit 'b9866649e24d7b6eedcaf2e03ffc605a3417537d':
Revert "Add a version check for SELinux policy on device."
253e91b4ffb631b188fdac0c1624786103471f05 21-May-2013 gcondra@google.com <gcondra@google.com> am 477e35d6: Revert "Add persistent property for SELinux enforcment status."

* commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6':
Revert "Add persistent property for SELinux enforcment status."
43329bc1c99c0f5f3670a8aaab39e54df34819a1 21-May-2013 gcondra@google.com <gcondra@google.com> am 8a387870: Revert "Reload policy after setting up the data partition."

* commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8':
Revert "Reload policy after setting up the data partition."
b9866649e24d7b6eedcaf2e03ffc605a3417537d 21-May-2013 gcondra@google.com <gcondra@google.com> am 52351300: Revert "Add a version check for SELinux policy on device."

* commit '52351300d156826bf22c493828571f45a1cea16a':
Revert "Add a version check for SELinux policy on device."
a8d392da915b46a59dc5eab82a2b6cf17a9b3a86 20-May-2013 Sungmin Choi <sungmin.choi@lge.com> init.rc: remove duplicated led-related nodes

Change-Id: Ibee7ef9137594fc4c30d3ab6ee7bdf3515836c62
/system/core/rootdir/init.rc
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 17-May-2013 repo sync <gcondra@google.com> Revert "Add persistent property for SELinux enforcment status."

This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
/system/core/rootdir/init.rc
8a3878700eb9cd8ecf495cd01f15face5c3879c8 17-May-2013 repo sync <gcondra@google.com> Revert "Reload policy after setting up the data partition."

This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
/system/core/rootdir/init.rc
52351300d156826bf22c493828571f45a1cea16a 17-May-2013 repo sync <gcondra@google.com> Revert "Add a version check for SELinux policy on device."

This reverts commit 921be8b6568df0057c4eacbac2e1022b71e09620.
/system/core/rootdir/init.rc
e45710f19f3843dd0ec02d1a5c7f679f34a33846 15-May-2013 gcondra@google.com <gcondra@google.com> am 5a98566d: am 921be8b6: Add a version check for SELinux policy on device.

* commit '5a98566d589408c78e35f4476f478a2fa1c13e78':
Add a version check for SELinux policy on device.
5a98566d589408c78e35f4476f478a2fa1c13e78 15-May-2013 gcondra@google.com <gcondra@google.com> am 921be8b6: Add a version check for SELinux policy on device.

* commit '921be8b6568df0057c4eacbac2e1022b71e09620':
Add a version check for SELinux policy on device.
921be8b6568df0057c4eacbac2e1022b71e09620 10-May-2013 repo sync <gcondra@google.com> Add a version check for SELinux policy on device.

This helps to ensure that when a new system image is installed,
old userdata policy isn't applied over the top of it.

Bug: 8841348
Change-Id: I135af32250aa62979763e775842ce0af3c8b6f9f
/system/core/rootdir/init.rc
8577e8649062953a59e0ac652b5ac16c96c1c1f4 09-May-2013 Mathias Agopian <mathias@google.com> surfaceflinger is now always running in its own process

Change-Id: I1ae63347a8b6d406306ed894665674dd726b7d51
/system/core/rootdir/init.rc
69e9b17fa1a7ac4dea56963008096a4961245277 01-May-2013 Colin Cross <ccross@android.com> am cb4b9605: am 8794b2ee: Merge "Fix perms on /data/security"

* commit 'cb4b9605cb923d071a546b444d10cbe21367d878':
Fix perms on /data/security
cb4b9605cb923d071a546b444d10cbe21367d878 01-May-2013 Colin Cross <ccross@android.com> am 8794b2ee: Merge "Fix perms on /data/security"

* commit '8794b2eeb2bbd717ca18b8bef5d853f99334aabc':
Fix perms on /data/security
8794b2eeb2bbd717ca18b8bef5d853f99334aabc 01-May-2013 Colin Cross <ccross@android.com> Merge "Fix perms on /data/security"
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a 01-May-2013 gcondra@google.com <gcondra@google.com> am 63577d92: am fee250d2: Reload policy after setting up the data partition.

* commit '63577d9280e7919bfb7221030d211b833e66bb1e':
Reload policy after setting up the data partition.
63577d9280e7919bfb7221030d211b833e66bb1e 01-May-2013 gcondra@google.com <gcondra@google.com> am fee250d2: Reload policy after setting up the data partition.

* commit 'fee250d27a9c03af1ba439047b976d89563b1887':
Reload policy after setting up the data partition.
fee250d27a9c03af1ba439047b976d89563b1887 30-Apr-2013 repo sync <gcondra@google.com> Reload policy after setting up the data partition.

This forces a policy reload + fixcon to deal with dynamically
delivered policy changing labels on device nodes.

It's implemented as a new keyword in init.

Bug: 8702843
Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
/system/core/rootdir/init.rc
152a43215143f62ee4bedda96ce73604530a6f1d 30-Apr-2013 Kenny Root <kroot@google.com> am d14586e3: resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp

* commit 'd14586e35a3df39cc3aa6aff6a54463270a5e1a7':
Track change to JSSE provider
d14586e35a3df39cc3aa6aff6a54463270a5e1a7 30-Apr-2013 Kenny Root <kroot@google.com> resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp

Change-Id: If41560f0fef3103cad2172061a7988ceb5556377
ca0404b83e9e5712531e040675212a4bd0d7f6a8 24-Apr-2013 Kenny Root <kroot@google.com> Track change to JSSE provider

Change-Id: Iff9103fff3591983f2b172f83fd2a6e924986aa7
/system/core/rootdir/init.rc
ada3291c8d13a9c3896102932abefed155a5b3fe 26-Apr-2013 gcondra@google.com <gcondra@google.com> am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev

* commit '14ad786183455ad9c8298e24946d4da0f24458d7':
Add persistent property for SELinux enforcment status.
14ad786183455ad9c8298e24946d4da0f24458d7 26-Apr-2013 gcondra@google.com <gcondra@google.com> am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev

* commit '538b5d4e8e4c480b2120aa957fe3e11a2836a1b3':
Add persistent property for SELinux enforcment status.
538b5d4e8e4c480b2120aa957fe3e11a2836a1b3 26-Apr-2013 repo sync <gcondra@google.com> Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev
b89bdfde422eff751b3f939f10ab57e22af83eaa 24-Apr-2013 repo sync <gcondra@google.com> Add persistent property for SELinux enforcment status.

Also adds triggers for going between enforcing and
permissive status.

Bug: 8702843
Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
/system/core/rootdir/init.rc
7629bf19a139cbc204e8ae78cb82c2faeba6d2f0 25-Apr-2013 Jeff Tinker <jtinker@google.com> am 9e9ed1b4: am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev

* commit '9e9ed1b40010745e709157a6977ba6d053d46c49':
Add a new group for MediaDrm engine plugins
9e9ed1b40010745e709157a6977ba6d053d46c49 25-Apr-2013 Jeff Tinker <jtinker@google.com> am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev

* commit '131ee07b77e0250c16cebe2b0e226c5bff8e9587':
Add a new group for MediaDrm engine plugins
08d64308b93594c587036cffcd8f6780eaf2c417 24-Apr-2013 Jeff Tinker <jtinker@google.com> Add a new group for MediaDrm engine plugins

bug: 8702754
Change-Id: I3b7988b64b1dcf4685624e4c1af938e132b82696
/system/core/rootdir/init.rc
ca8e66a8b0f843812014a28d49208f9f6f64ecbc 18-Apr-2013 Nick Kralevich <nnk@google.com> Make init handle reboots

Move the responsibility for rebooting the system from the
reboot command to init. Init is in a better position to take
actions to bring the system down cleanly, including making sure
filesystems are mounted read-only.

The only UIDs which can perform an init triggered reboot are
root, system, and shell.

Modify the reboot command so that it calls into init to perform
the reboot. The reboot command no longer requires CAP_SYS_BOOT.

Remove the -n reboot option and code which supports it. Anyone needing
to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'.

Modify adb so that it calls into init to perform a shutdown.

Bug: 8646621
Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
/system/core/rootdir/init.rc
d43bab7b98d329ead0b5304be79d430b5a92ad10 15-Apr-2013 William Roberts <w.roberts@sta.samsung.com> Fix perms on /data/security

installd and zygote need to be able
to search the directory to access
the policy files.

Change-Id: I0679fd2084d2664dfb5a594f493317eff058415d
/system/core/rootdir/init.rc
76c674451c831c1e9c3e3ee134ea8af26ae19ac1 03-Apr-2013 Brian Carlstrom <bdc@google.com> Merge "resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp" into jb-mr2-dev-plus-aosp
d3f0e0ae379f4420b01bb9de932a764c035ff2a6 03-Apr-2013 Brian Carlstrom <bdc@google.com> resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp

Change-Id: I63d6a2f975a6c0df5c238a2f7592f357441eb767
c2594f36e789bbd49cbeeb9421a7b6a16cd30ba4 31-Mar-2013 Geremy Condra <gcondra@google.com> Give system ownership of selinux load and enforce files.

This is necessary to enable remote updates.

Change-Id: I05fb979c0360eca4cc6e4add48bb42f712a1ba17
/system/core/rootdir/init.rc
8637e8186ac572df92a34253f93bf405bf634b03 30-Mar-2013 jwilson <jwilson@squareup.com> Add OkHttp to the boot classpath.

Change-Id: I185b803b5b804ff8680ef928ce5163727adbf0bd
/system/core/rootdir/init.rc
6b5de1cda2e5c4946aa08a11a38ad0a7eee115ce 25-Mar-2013 Todd Poynor <toddpoynor@google.com> init.rc: Set owner/perm for interactive governor io_is_busy

Change-Id: I7537d56a23ca787daf92a9d91778056f987097bd
/system/core/rootdir/init.rc
fb39c0d19860fe48bc598d5d180a8cce9f59e33b 23-Mar-2013 Geremy Condra <gcondra@google.com> am 4d71493e: am e849970c: Merge "Fix mode on /data/security."

* commit '4d71493e74ed1ea39e554146351cc39e47cb5d02':
Fix mode on /data/security.
bfd71b489b283fe54669dc5d1ccdc97b453d2fb4 23-Jan-2013 William Roberts <w.roberts@sta.samsung.com> Create a new location for /data policy files

Adding a new location for policy files under
/data, the new location is /data/security. The
new location is used before attempting to use
any other location.
This requires a new directory to be created by
the init script and an update to the location of
the property_contexts file for property service.

Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
/system/core/rootdir/init.rc
c0317a75793ecbcd4a8e19f477458eb677024869 28-Jan-2013 Stephen Smalley <sds@tycho.nsa.gov> Fix mode on /data/security.

Change-Id: Id97d06a1c360c7871361db147f76b8a2eaceca42
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
46e1bd89b457713bf91d2dc751795822cc202658 23-Jan-2013 William Roberts <w.roberts@sta.samsung.com> Create a new location for /data policy files

Adding a new location for policy files under
/data, the new location is /data/security. The
new location is used before attempting to use
any other location.
This requires a new directory to be created by
the init script and an update to the location of
the property_contexts file for property service.

Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
/system/core/rootdir/init.rc
fb4f7acefb31a51679cec194562c7aeb3922f728 14-Mar-2013 Jeff Sharkey <jsharkey@android.com> Add symlink to bugreport storage location.

Change-Id: I16f024c24767cfa1f5800d568d39fb098a408127
/system/core/rootdir/init.rc
65e203070c0cb25f5401502d60e924ff2b5bdae5 23-Feb-2013 Glenn Kasten <gkasten@google.com> Merge "Add directory for mediaserver"
b0f908a95714fbbfd63ee498e5773c44712b30e2 22-Feb-2013 Glenn Kasten <gkasten@google.com> Add directory for mediaserver

Bug: 8223560
Change-Id: Iccc6d439a848445cac0f5b30d1d663aed3f5344e
/system/core/rootdir/init.rc
fe8425b5c5156c60691927a982672abd7927b777 22-Feb-2013 Nick Kralevich <nnk@google.com> am c5ce4108: am 1b64957a: Merge "init.rc: allow IPPROTO_ICMP support"

* commit 'c5ce4108facc5a1b94fcf9469a189b2cbdfd5e76':
init.rc: allow IPPROTO_ICMP support
be341cc348257a07c68bcbfdc526835d49283329 22-Feb-2013 Nick Kralevich <nnk@google.com> init.rc: allow IPPROTO_ICMP support

Allow userspace programs to create IPPROTO_ICMP sockets.

This socket type allows an unprivileged program to safely
send ICMP_ECHO messages and receive the corresponding
ICMP_ECHOREPLY messages, without relying on raw sockets or
setuid programs.

Please see http://lwn.net/Articles/443051/ for details.

In particular, this allows us to use a version of ping
which doesn't have any capabilities
(https://android-review.googlesource.com/52072).
In addition, this allows us to safely implement an IPv4 ICMP
based version of InetAddress.isReachable()
(https://code.google.com/p/android/issues/detail?id=20106)

Change-Id: I876718151efa8219c4f34f573e35e21256fe2316
/system/core/rootdir/init.rc
c0d399df697850712432cb6092d63669ffa0fc23 29-Jan-2013 Wink Saville <wink@google.com> Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip

Add voip-common to BOOTCLASSPATH

Change-Id: Ieaba759a0f69b45c4b8839cbed1fe757cdf190c5
/system/core/rootdir/init.rc
a44404154730e54615d44c389b11cec9dd86c001 05-Jan-2013 JP Abgrall <jpa@google.com> am ba900f2e: am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files"

* commit 'ba900f2e708f0b654cdaa827804cbb21af4e4fb4':
init.rc: setup qtaguid group ownership of ctrl and stat files
ba900f2e708f0b654cdaa827804cbb21af4e4fb4 05-Jan-2013 JP Abgrall <jpa@google.com> am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files"

* commit 'fb69c2e2577e056bb7a054343a9f6d781cedbf3d':
init.rc: setup qtaguid group ownership of ctrl and stat files
3e54aabc63535572242477fadbf13ec42b06649e 04-Jan-2013 JP Abgrall <jpa@google.com> init.rc: setup qtaguid group ownership of ctrl and stat files

This will help get rid of android_aid.h in the kernel.
The group of the proc entries will be used in place of the default
values picked up by the xt_qtaguid netfilter module
(AID_NET_BW_STATS, AID_NET_BW_ACCT).
This change has no effect until the matching kernel changes are submitted.

Change-Id: I3c177e7b5caf9c59300eba6bd4a976634b333674
/system/core/rootdir/init.rc
2b5b3bb103f59d9d3bf25c0c1f8035db036917da 21-Dec-2012 Todd Poynor <toddpoynor@google.com> rootdir: init.rc: set perms for new interactive governor attrs

/sys/devices/system/cpu/cpufreq/interactive/timer_slack
/sys/devices/system/cpu/cpufreq/interactive/target_loads

Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
/system/core/rootdir/init.rc
191af2f2c3effc5a60f1643dd6283ecc5a521603 21-Dec-2012 Todd Poynor <toddpoynor@google.com> am 367f1e4b: am 4f247d75: rootdir: init.rc: set perms for cpufreq governor boostpulse_duration

* commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42':
rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
4f247d753a8865cd16292ff0b720b72c28049786 20-Dec-2012 Todd Poynor <toddpoynor@google.com> rootdir: init.rc: set perms for cpufreq governor boostpulse_duration

Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
/system/core/rootdir/init.rc
92781808bab8f045752aa1824a57956ddd52fcbd 13-Nov-2012 Kenny Root <kroot@google.com> Switch keystore to binder

Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
/system/core/rootdir/init.rc
066d3f9b3bd77df71542b132adda8eb25bc013c0 22-Oct-2012 Elliott Hughes <enh@google.com> resolved conflicts for merge of 3e5e9e9e to jb-mr1-dev-plus-aosp

Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
f820e85164a1863e4384f5e1ca8b6f46902bd74e 20-Oct-2012 Elliott Hughes <enh@google.com> Add a directory for tzdata updates.

Bug: 7012465
Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
/system/core/rootdir/init.rc
c6f8bd396614d422d80ac9f24c91fa44a713894a 08-Oct-2012 Dima Zavin <dima@android.com> Merge "rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups" into jb-mr1-dev
ece565cca2a4babe897f5fd68ab14a7af5071b30 05-Oct-2012 Dima Zavin <dima@android.com> rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups

This is necessary for some HWC hals to be able to communicate with
secure side to grant protected access to hardware owned by the
hwc. This is necessary on some architectures to grant access to
secure buffers to overlay/csc hardware

Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
971153aa4a65c4fbc8d916c619a17d3912b2cb02 04-Oct-2012 Matthew Xie <mattx@google.com> Create bluetooth stack aid for sharing gid between all bluetooth processes

bug 6925422

Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
/system/core/rootdir/init.rc
d6d478058fc201bfc70f353019477e17c71a29d4 27-Sep-2012 Robert Greenwalt <rgreenwalt@google.com> Add writable data space for radio.

Storing Premium SMS regex's in /data/misc/sms.
bug:7221402

Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
/system/core/rootdir/init.rc
9481266ea360e0a8f326fec1106ea445f2ef883c 25-Sep-2012 Dima Zavin <dima@android.com> init.rc: chmod slabinfo to 440 to capture slabinfo in BRs

Bug: 7232205
Change-Id: I0d785302818a37b722e79bf740644ede52c60148
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
f1c50bf63857b9cdabcf930363c372defc6383a8 21-Sep-2012 Todd Poynor <toddpoynor@google.com> init: import init.trace.rc after h/w-specific rc

Board-specific .rc file mounts debugfs, then fixup perms on tracing
sysfs files for systrace.

Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
/system/core/rootdir/init.rc
5054417c1025b0f3f36f4b537e51ddd3eea981c8 09-Sep-2012 Kenny Root <kroot@google.com> Add /data/app-lib for native library sharing

Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
/system/core/rootdir/init.rc
58d3980f314d08f86347ba83db85c2d4c6066599 06-Sep-2012 Jeff Sharkey <jsharkey@android.com> Keep /mnt/secure private to default namespace.

When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE
those mountpoints when vetting is finished. However, the kernel
doesn't allow MS_MOVE when the source is shared to child namespaces.

To work around this, create a tmpfs at /mnt/secure and mark it as
private (not shared). Verified that vold can now successfully move
from the staging area.

Bug: 7094858
Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
/system/core/rootdir/init.rc
35ea5e4f2365ad791824ee49d1c999be81b705c5 28-Aug-2012 Mike Lockwood <lockwood@google.com> import init.${ro.hardware}.rc last to allow overriding default USB configuration

Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
/system/core/rootdir/init.rc
f824ad7b35c3bf866d60662404be0d55fe753e3d 23-Aug-2012 Wink Saville <wink@google.com> am 582b1152: am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"

* commit '582b11527cd6d968f163fbee73f92d82b679e330':
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
42a1e6c9d827fc3d64ad3b0750b87de1f4c436e7 23-Aug-2012 Jeff Sharkey <jsharkey@android.com> Merge "Iteration on multi-user external storage." into jb-mr1-dev
582b11527cd6d968f163fbee73f92d82b679e330 23-Aug-2012 Wink Saville <wink@google.com> am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"

* commit 'baba99840400f5b835d44b6d91e2190136277988':
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
baba99840400f5b835d44b6d91e2190136277988 23-Aug-2012 Wink Saville <wink@google.com> Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
bfcd810b792f7ffbb2ec1360c0c2662725fd0362 22-Aug-2012 Jeff Sharkey <jsharkey@android.com> Iteration on multi-user external storage.

Define /storage as top-level concept, so that we enforce permissions
uniformly. Moves external storage paths from headers to per-device
environment variables. Added missing mount flags, and we no longer
have adb-specific external storage.

Bug: 6925012
Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
/system/core/rootdir/init.rc
61f1359486e578bc0fc12bc4f42c7cd65991fc5c 20-Aug-2012 Jeff Sharkey <jsharkey@android.com> Remove sdcard groups from services.

Even with the groups, services no longer have access.

Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
/system/core/rootdir/init.rc
5dd0f86fbfed631b31c9055109889f1d9559a3ea 18-Aug-2012 Jeff Sharkey <jsharkey@android.com> Migrate sdcard0 to shell-accessible location.

Also remove mount() from adb, since it can come online long before
data partition is ready. Set EXTERNAL_STORAGE environment variable
to point to owner for backwards compatibility.

Bug: 7005701
Change-Id: I63444f6636624eb7ad89f053daa289663424639e
/system/core/rootdir/init.rc
885342a0f2c834a6b680284047c47c9d04b32565 15-Aug-2012 Jeff Sharkey <jsharkey@android.com> Multi-user external storage support.

Remount rootfs as recursively shared, so that mount changes are
propagated into child namespaces. Mount external storage for access
from adb.

Clean multi-user dependencies for use in Dalvik. Also define
external storage paths.

Bug: 6925012
Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
/system/core/rootdir/init.rc
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa 13-Aug-2012 Kenny Root <kroot@google.com> resolved conflicts for merge of 4dcd52ab to jb-mr1-dev

Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
4dcd52ab11d25fe3d53aab52b6c233e692da4eae 13-Aug-2012 Kenny Root <kroot@android.com> am 297f802f: Merge "Add support for reloading policy from /data/system."

* commit '297f802f25d093274c1f5fb890ee8dfacfbf159e':
Add support for reloading policy from /data/system.
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 01-May-2012 Stephen Smalley <sds@tycho.nsa.gov> Add support for reloading policy from /data/system.

To support runtime policy management, add support for reloading
policy from /data/system. This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.

Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
b35e36e5a92ac984a57ec15b14dc6ad3b0ecf1c5 03-Aug-2012 Colin Cross <ccross@android.com> init.rc: make last_kmsg readable only by user system and group log

chown /proc/last_kmsg to user system group log during init, and
chmod it to readable only by user and group.

Bug: 6925227
Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
/system/core/rootdir/init.rc
35fc46d8e338181ee3caedc30f3627bad2ffe35e 01-Aug-2012 Dima Zavin <dima@android.com> am 018227f5: am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android."

* commit '018227f5394c3126f4a858596cb85dee1893b895':
Modify init.rc and init.goldfish.rc for SE Android.
018227f5394c3126f4a858596cb85dee1893b895 01-Aug-2012 Dima Zavin <dima@android.com> am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android."

* commit 'ce76e2d00e63339083ea693db33de05cbba5600e':
Modify init.rc and init.goldfish.rc for SE Android.
ce76e2d00e63339083ea693db33de05cbba5600e 01-Aug-2012 Dima Zavin <dima@android.com> Merge "Modify init.rc and init.goldfish.rc for SE Android."
0245e15bb78cf08b3225b31c77bda77d43995bd4 10-May-2012 Benoit Goby <benoit@android.com> rootdir: Create /data/misc/adb on boot

Change-Id: I0f8d11391cdcfbaa50f87f637a2962c6663b2767
/system/core/rootdir/init.rc
0574d6b07711e90547d8166c222e09d80f702620 25-Apr-2012 Benoit Goby <benoit@android.com> init.rc: Add socket for adbd

Change-Id: Ic97fd464440ff4a29fc9da7ad15949ac5215ade3
/system/core/rootdir/init.rc
1eee419e7a1c5789f81e1e3a19693403495e70f1 13-Jan-2012 Stephen Smalley <sds@tycho.nsa.gov> Modify init.rc and init.goldfish.rc for SE Android.

Set the security context for the init process.
Restore the security contexts of /cache and /data in case they were reset.
Specify the security context for services launched from the rootfs since
we cannot label their executables.
If on the emulator, set a policy boolean and restore the context of
/sys/qemu_trace to allow accesses not normally permitted on a device.

Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/rootdir/init.rc
e8b76a36bacd11ab54332ba5a25d8593d9c3f57f 26-Jul-2012 Naveen Kalla <nkalla@codeaurora.org> Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO

Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
/system/core/rootdir/init.rc
b3a679386d26677290a09fdf4e3406c57e835fd0 13-Jun-2012 Wink Saville <wink@google.com> Add telephony-common and mms-common to BOOTCLASSPATH - DO NOT MERGE

Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
/system/core/rootdir/init.rc
4c3ac516ff391d9fc93ec997ce254f83af722a1a 08-Apr-2012 Matthew Xie <mattx@google.com> remove dbus and bluetoothd, create bluedroid data dirs

Change-Id: Ifacd570dbadc075e498a626935e035c76a0d83c4
/system/core/rootdir/init.rc
5acf1d6625e3e45ccdc29fd49222defc2788ada0 13-Jul-2012 Jeff Sharkey <jsharkey@android.com> am 87314036: am 55b763ff: Grant sdcard_r to ril-daemon.

* commit '873140368613af2d1c06e18ac2fd6fe24623b9bb':
Grant sdcard_r to ril-daemon.
873140368613af2d1c06e18ac2fd6fe24623b9bb 13-Jul-2012 Jeff Sharkey <jsharkey@android.com> am 55b763ff: Grant sdcard_r to ril-daemon.

* commit '55b763ff7b779d7ee91f245e0887332db8782afe':
Grant sdcard_r to ril-daemon.
55b763ff7b779d7ee91f245e0887332db8782afe 13-Jul-2012 Jeff Sharkey <jsharkey@android.com> Grant sdcard_r to ril-daemon.

Bug: 6793799
Change-Id: Ife23c98c30d7b08479d75798c7075005bf281119
/system/core/rootdir/init.rc
557ed7a487795b2b3ac441bbbbe619788c93b78f 12-Jul-2012 Wink Saville <wink@google.com> Merge commit 'de016eef' into mit

* commit 'de016eef':
Add telephony-common and mms-common to BOOTCLASSPATH
de016eef3366739d69d7908e4e6dbd54785632ab 13-Jun-2012 Wink Saville <wink@google.com> Add telephony-common and mms-common to BOOTCLASSPATH

Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
/system/core/rootdir/init.rc
c06be8a15d8d89bcc8ac505b25b5e828e90a5be6 12-Jun-2012 Jamie Gennis <jgennis@google.com> am 1e96e16f: am 0f3974c3: Merge "Enable tracing on user builds" into jb-dev

* commit '1e96e16f81ce46adf5329b1db4662b53b927d4e2':
Enable tracing on user builds
0f3974c3d0ee2ffe5e0cb9a56658ba18d511f6ea 11-Jun-2012 Jamie Gennis <jgennis@google.com> Merge "Enable tracing on user builds" into jb-dev
1279013dee790c84758e5fc5bed33b5c9df2af9b 07-Jun-2012 Jamie Gennis <jgennis@google.com> Enable tracing on user builds

This change adds init.rc steps to:
* allow kernel tracing to be enabled via adb
* allow a limited set of kernel trace events to be enabled via adb
* allow the kernel trace to be read via adb
* allow all users to write to the kernel trace from userland

Bug: 6513400
Change-Id: Ic3c189b5697aa5edf88d2f507c932971bed6caff
/system/core/rootdir/init.rc
6ba76f019040a0445575deb6995cd32ea72903dd 07-Jun-2012 Arve Hjønnevåg <arve@android.com> Merge "init.rc: Set owner for /sys/power/autosleep"
5f2d00b0677cbe9ad42ea0394def0a51aef7bdda 04-Jun-2012 Dima Zavin <dima@android.com> rootdir: init.rc: remove audio app/sys groups, merge to fg

With this change, the audio rr/fifo threads will just run in
the fg cgroup.

Also, the RR budget for the apps fg/bg threads has been bumped
to 80%. Ideally, the bg budget would be much smaller but there
are legacy libraries that seem to be very sensitive to this so
for now keep it at this value.

Bug: 6528015
Change-Id: I08f295e7ba195a449b96cd79d954b0529cee8636
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
df44b88621f60e933d7d31090bf0bb892e88142c 04-Jun-2012 Dima Zavin <dima@android.com> core: init.rc: create apps cgroup for fg tasks, move bg under it

Bug: 6538553
Change-Id: I7c29975aa376bcdda9d6bbd1fd3e04fdb1c1b1fe
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
4c48025c484e9fb0e10bb9c6a1b9bbd5a2def555 16-May-2012 Colin Cross <ccross@android.com> Increase cpu.rt_runtime_us to 10% for fg and bg groups

GPS on yakju puts SCHED_RR threads in the fg and bg groups, and
is unhappy with 0.1% limits. Increase the limits to 10%.

Change-Id: I971c9b0a815890d41694b965fdd2b023937a4411
/system/core/rootdir/init.rc
50efaf2f7fc87692649497dba5615e54efd9c637 12-May-2012 Todd Poynor <toddpoynor@google.com> Merge "init: Set perms for interactive cpufreq governor boostpulse" into jb-dev
367e7b195b144772464e560352caa2017a53058c 10-May-2012 Colin Cross <ccross@android.com> Increase rt_runtime_us to 1000 for foreground and bg_non_interactive

rt_runtime_us=0 can cause deadlocks if a SCHED_FIFO/SCHED_RR thread
is moved into the wrong cgroup.

Change-Id: I4633392fb529039dff6ba5d3a6b672e0de9fc2d9
/system/core/rootdir/init.rc
4ff10e63c3814f7b40c6e4e672c895135a1b1a3d 04-May-2012 Todd Poynor <toddpoynor@google.com> init: Set perms for interactive cpufreq governor boostpulse

Change-Id: Ia4b028f58f9d48bad2525744497f10884d11c5d6
/system/core/rootdir/init.rc
70a163f519db14532b7dcde4bc65d1d658a760e4 03-May-2012 Arve Hjønnevåg <arve@android.com> init.rc: Set owner for /sys/power/autosleep

Change-Id: Ia18cce973c71e7561ca84b23e37b0b8e056a7143
/system/core/rootdir/init.rc
7e057eb0047819ee4d8af52d2747a7bf29b0cc56 02-May-2012 Glenn Kasten <gkasten@google.com> Merge "Increase budget" into jb-dev
94a55df34d917492cb3613b9445ffb1659459186 02-May-2012 Jeff Tinker <jtinker@google.com> Merge "Fix failure to play pinned movies" into jb-dev
59e6eb09997125aecc122c7d7d9a6e3ec00be4c4 01-May-2012 Glenn Kasten <gkasten@google.com> Increase budget

Change-Id: I6706a408990abf8d420db73280df2818b8827140
/system/core/rootdir/init.rc
65f1fbcad3247997cf0f0eca54b88f0692781109 01-May-2012 Jeff Tinker <jtinker@google.com> Fix failure to play pinned movies

DRM server process needs to be able to access movies on sdcard
to acquire rights.

related-to-bug: 6414503

Change-Id: If90404e32fd437b8fb7d5a6ec8dfb30a499ef733
/system/core/rootdir/init.rc
33045a627d4dac8c4c8a910241298ca5da02f87b 28-Apr-2012 Todd Poynor <toddpoynor@google.com> init: Set perms for cpufreq interactive governor input boost sysfs

Change-Id: Ie475c95d81635a068db11e7018895024247878b4
/system/core/rootdir/init.rc
25dd43a9a5073f0e59102750cb0410b8e9bc9847 27-Jan-2012 Nick Kralevich <nnk@google.com> Restrict zygote to system user.

CVE-2011-3918: Address denial of service attack against Android's
zygote process. This change enforces that only UID=system can
directly connect to zygote to spawn processes.

Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
/system/core/rootdir/init.rc
8d3ea1d1e198e71ca3f856c6f397faf40922f562 25-Apr-2012 Todd Poynor <toddpoynor@google.com> init: set perms for cpufreq interactive governor boost -- DO NOT MERGE

Change-Id: I6509cda358b4a75706afd01a5b5a36eabe492554
Signed-off-by: Todd Poynor <toddpoynor@google.com>
/system/core/rootdir/init.rc
f8bbaba57bf309fec83dc9842176d996831e6db1 13-Apr-2012 Kenny Root <kroot@google.com> Add directory for forward locked apps in ASECs

Forward locked apps on internal storage will be stored in ASEC
containers using ext4. This way permissions can be preserved whether on
internal or external storage.

Change-Id: I942f8f0743c210330a11e2b1d0204df7a5ddb2ae
/system/core/rootdir/init.rc
b91bd9f599c43b602eac334244173000a6ce011a 20-Apr-2012 Glenn Kasten <gkasten@google.com> Update cgroups

Change-Id: If4488944e8a1c8af7b13847069d03b7ea4a30785
/system/core/rootdir/init.rc
f35c203558b0648c351a5262568b383d41639a8b 19-Apr-2012 Todd Poynor <toddpoynor@google.com> init.rc: Set perms for cpufreq interactive governor above_hispeed_delay

Change-Id: Ib9c3fb4e43759af590a6e033b8ba04c0023d5f07
/system/core/rootdir/init.rc
b47cd10acf6eb9449fc12a93f17f720b21e998c8 17-Apr-2012 Mike Lockwood <lockwood@google.com> Merge "init.rc: Add support for new USB accessory configurations"
5fa860dea3618d5397bb580645f057a6e975786e 13-Apr-2012 Robert Greenwalt <rgreenwalt@google.com> Merge "Add MDNS service"
6a35bb3529520dd1a47a5d0f58abf91d38eb0222 12-Apr-2012 Todd Poynor <toddpoynor@google.com> Merge "init.rc: Set owner and permissions for cpufreq files"
0653b97b2594d5e3f21c6326fb121741bfbf65f7 11-Apr-2012 Todd Poynor <toddpoynor@google.com> init.rc: Set owner and permissions for cpufreq files

Change-Id: Iaaf8491915567dbe22cab1798081a00fed4fb2e2
/system/core/rootdir/init.rc
4f5d5176a3d732baebe92ab3748a12166406a198 04-Apr-2012 Mike Lockwood <lockwood@google.com> init.rc: Add support for new USB accessory configurations

Also moved USB scripts to new file init.usb.rc

Change-Id: I98e099fbd8de3eb3e1e18c9ef69312608033a50c
Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
db49739f390992a3d68303765ac36f14ed09b68a 10-Apr-2012 Jamie Gennis <jgennis@google.com> Add tracing initialization to init.rc.

This change adds init.rc steps to allow kernel tracing to support inserting
messages from any userland process.

Change-Id: I01970728d7132a25408fed09a213a015ac05ccaf
/system/core/rootdir/init.rc
1d91fcf7c0a31d27097b196579a37873ba1c0934 28-Mar-2012 Robert Greenwalt <rgreenwalt@google.com> Add MDNS service

Adds both the new service and another socket for netd.

Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
/system/core/rootdir/init.rc
71513567dc0249af1b304e458ceac391ffcbeff5 27-Mar-2012 Marius Renn <renn@google.com> Multi-Project Commit: Move of filterfw out of system/media (6 of 7)

This is part of the multi-project commit to move the filter-framework
from system/media/mca to frameworks/base/media/mca.

Note that the filter-framework will soon be replaced with a refactored
version currently under API review (also to go under frameworks/base).
This move is done now to unblock the PDK efforts.

Change-Id: I87d034a30bb4b98a85a028cb728e37fb97256039
/system/core/rootdir/init.rc
31fb85865431f98008608b62964cb1c975ca4b71 26-Mar-2012 Nick Kralevich <nnk@google.com> Merge "drmserver: add group drm"
62e5cbaebc29d83148dd1ce30a620a37dcdbe7ed 26-Mar-2012 Benoit Goby <benoit@android.com> Merge "Revert "Reimplement the "adb root" command to more closely match its previous behavior""
3c9eed88c529374c8d80e1daa62ad9bf25c9670e 26-Mar-2012 Nick Kralevich <nnk@google.com> drmserver: add group drm

Make the drm server run as UID=drm, GID=drm. This ensures that
any files created by the drmserver app do not have GID=system.

Bug: 5834297
Change-Id: I3409ad350e9cc82bb0982cdbe470ec1f10b1ca67
/system/core/rootdir/init.rc
2affe824ba249b532c5b39941bcdc15800900f6c 22-Mar-2012 Kenny Root <kroot@google.com> Merge "Put keystore into the drmrpc group"
9865be95cf60848d91364b42c2cadd90e63fec66 22-Mar-2012 Mike Lockwood <lockwood@google.com> Merge commit '19155b5'

Do not start sshd by default

Change-Id: I22e6dbb6834321709e9b7c5ae49846d7f9f7c67a
a9bb7261b4db2372ee0f339d250079c967262758 22-Mar-2012 Mike Lockwood <lockwood@google.com> Merge commit '9dd2eef'

sshd to init.rc

Change-Id: I8eedc3b47f1260502034067d9006cac827cb1089
19155b5cd3ee8674a13f7bf111e06b05f0114433 21-Mar-2012 Mike Lockwood <lockwood@google.com> init.rc: Do not start sshd by default

Change-Id: Ieacd4e8fbfcd91ed2342b7a104a9b1f4114fc6d5
Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
1670f831a56f7232f337407c746e97c5929ee417 21-Mar-2012 Arve Hjønnevåg <arve@android.com> init.rc: Fix permissions on /sys/power/state and /sys/power/wakeup_count

Change-Id: I06a1a2affebdf64f008eaa61a0851f1e832059c5
/system/core/rootdir/init.rc
7941cf87f624e7747b5bb868a27904c7a3be0ca4 16-Mar-2012 Benoit Goby <benoit@android.com> Revert "Reimplement the "adb root" command to more closely match its previous behavior"

This reverts commit 535164e9d9649a83d4d63829f3389f2bea339fe1.
/system/core/rootdir/init.rc
f3ef1271f225d9f00bb4ebb0573eb3e03829f9a8 14-Mar-2012 Nick Kralevich <nnk@google.com> init.rc: Add documentation

Android developers should never place files in /data/local/tmp.
Files or directories in /data/local/tmp can be minipulated by the
shell user.

Android developers should never create world-writable files
or directories. This is a common source of security vulnerabilities.

Change-Id: I6d2cd620ab49d8ca3f39282f7d2ed682a9ba91c3
/system/core/rootdir/init.rc
ad5b9c7205ac2a9ac500c6d455bf46f8ab3aafe0 24-Feb-2012 Kenny Root <kroot@google.com> Put keystore into the drmrpc group

The keystore service needs to access hardware crypto devices to
fulfill its function on devices with hardware crypto. This role
was assigned to the (now misnamed) drmrpc group.

Change-Id: Ia32f9e96b4372f0974984451680f9a0f6157aa01
/system/core/rootdir/init.rc
89c5926f08fdf551c33ccbfbec5d6bb7d911f067 08-Mar-2012 Chia-chi Yeh <chiachi@android.com> am 0b32a75b: am c8d1a0e1: am 5ebced39: init.rc: update the permission of /data/local.

* commit '0b32a75b7c7f25bd9ab325f44626c402fd9b9b23':
init.rc: update the permission of /data/local.
c8d1a0e18e008009fe75aa2cc7d3deace0479fce 08-Mar-2012 Chia-chi Yeh <chiachi@android.com> am 5ebced39: init.rc: update the permission of /data/local.

* commit '5ebced39093d1223566166b8cc6abfe6729c487d':
init.rc: update the permission of /data/local.
5383476727659544875b90d49a5371886a31c1fe 08-Mar-2012 Chia-chi Yeh <chiachi@android.com> am 5ebced39: init.rc: update the permission of /data/local.

* commit '5ebced39093d1223566166b8cc6abfe6729c487d':
init.rc: update the permission of /data/local.
5ebced39093d1223566166b8cc6abfe6729c487d 07-Mar-2012 Chia-chi Yeh <chiachi@android.com> init.rc: update the permission of /data/local.

Bug: 6131945
Change-Id: I3094a471dcfb02b786f47b6778c8fed3726325ec
/system/core/rootdir/init.rc
e7fd911fd42b1f8bea6a004e2bcc1d2dda4ec718 27-Jan-2012 Nick Kralevich <nnk@google.com> Restrict zygote to system user.

CVE-2011-3918: Address denial of service attack against Android's
zygote process. This change enforces that only UID=system can
directly connect to zygote to spawn processes.

Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
/system/core/rootdir/init.rc
dae26c6ac44e9c47cc60fcaa3d04c54d68d66760 12-Jan-2012 James Dong <jdong@google.com> am 3e9c9ac5: am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1

* commit '3e9c9ac5ee7a36653b90cb86eb6445496b536c16':
Close a security hole - do not give world readable/writable access to /data/drm
d95c6152197cf3976797267ad40e61b7344933de 12-Jan-2012 James Dong <jdong@google.com> am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1

* commit '032afc1d52289f486538c9ed53f17b9889ea94df':
Close a security hole - do not give world readable/writable access to /data/drm
3e9c9ac5ee7a36653b90cb86eb6445496b536c16 12-Jan-2012 James Dong <jdong@google.com> am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1

* commit '032afc1d52289f486538c9ed53f17b9889ea94df':
Close a security hole - do not give world readable/writable access to /data/drm
f90b0e04a61ab3bf5239afb2f7157aabe5fbca8f 10-Jan-2012 Dima Zavin <dima@android.com> rootdir: convert all usages of $prop to ${prop}

Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
3e7b7739e3d4d7aaaa363645501036dafcc30ed3 16-Dec-2011 Dima Zavin <dima@android.com> init: import the hardware specific init file in init.rc

This removes the hardcoding of the file import in init and instead
allows the init.rc file to fully control what is loaded.

Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
683a09352a0adf8924d67c9aa80bce244592aa25 10-Jan-2012 Dima Zavin <dima@android.com> rootdir: convert all usages of $prop to ${prop}

Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
09cdc0ea12598651d1c074974c9b593fd1c0e4ba 07-Jan-2012 James Dong <jdong@google.com> Close a security hole - do not give world readable/writable access to /data/drm

o related-to-bug: 5834297

Change-Id: I8e459610b4f69999be37364c2359b2bac82d4a2a
/system/core/rootdir/init.rc
7634bf87cf6490e5544f040fb403eb164cf0ee5f 16-Dec-2011 Dima Zavin <dima@android.com> init: import the hardware specific init file in init.rc

This removes the hardcoding of the file import in init and instead
allows the init.rc file to fully control what is loaded.

Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
9dd2eef07bbee6ff5b1d1a9ccda6e3499391ecb6 12-Dec-2011 Mike Lockwood <lockwood@google.com> add sshd to init.rc

Change-Id: Ide6e8cca58f090e84d85d0298058c523863d1c43
Signed-off-by: Mike Lockwood <lockwood@google.com>
/system/core/rootdir/init.rc
27cca21a5d0a6beff31d2f9ff1441afc1271a346 05-Dec-2011 Nick Kralevich <nnk@google.com> set mmap_min_addr to 32768

Bug: 5712789
Change-Id: I586a99cd63d8fba06bc2562b1cfce531ee4f554c
/system/core/rootdir/init.rc
f9557fba347bcb837892458fabd7454e1a1a4d6a 08-Nov-2011 Nick Kralevich <nnk@google.com> Set /proc/sys/kernel/dmesg_restrict to 1

Set dmesg_restrict to 1 to help limit inadvertent information leaks
from the kernel to non-privileged programs. Root and programs with
CAP_SYSLOG will continue to have access to dmesg output.

See "dmesg_restrict" in Documentation/sysctl/kernel.txt from the
Linux kernel source code.

Bug: 5585365
Change-Id: Iffcf060ea4bd446ab9acf62b8b61d315d4ec4633
/system/core/rootdir/init.rc
1e339a710e0993c18c8b96f9224ebd3aa29cf8cd 08-Nov-2011 Nick Kralevich <nnk@google.com> Merge "Set kptr_restrict to 2."
3c58933aa785ab26f77284f6a1a4e93d2ebfcf04 07-Nov-2011 Dima Zavin <dima@android.com> am 4a253908: rootdir: init.rc: write default oom_adj before starting ueventd

* commit '4a2539085062a715b0d345eb50ea48738423c909':
rootdir: init.rc: write default oom_adj before starting ueventd
4a2539085062a715b0d345eb50ea48738423c909 04-Nov-2011 Dima Zavin <dima@android.com> rootdir: init.rc: write default oom_adj before starting ueventd

Otherwise, ueventd's oom_adj value would have been 0 and it could
easily get killed early during low memory events

Change-Id: I1adbd18c37215b26ae77e70f7b8dbd1e143fc2d4
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
2e7c833279349a694af15f2447cc214dc30bcc01 02-Nov-2011 Nick Kralevich <nnk@google.com> Set kptr_restrict to 2.

To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict
to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms

Bug: 5555668
Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b
/system/core/rootdir/init.rc
04a875902ece07769101a5202e3af554af31a911 31-Oct-2011 Mathias Agopian <mathias@google.com> restart surfaceflinger and drmserver when servicemanager dies

Bug: 5450389

Change-Id: Ib4e73836721e25e2a88185167b030ea75e0d74e3
/system/core/rootdir/init.rc
8cdd4c335f0d6e35e6def5ea73dcefb9687071b0 18-Oct-2011 sinikang <sinikang@samsung.com> am aa75df74: [maguro] : add setprop net.tcp.buffersize.hspa

* commit 'aa75df74db5beffd25821ed6c360c36197d7bac1':
[maguro] : add setprop net.tcp.buffersize.hspa
aa75df74db5beffd25821ed6c360c36197d7bac1 16-Oct-2011 sinikang <sinikang@samsung.com> [maguro] : add setprop net.tcp.buffersize.hspa

-window size optimized for hspa
-Patchset2 : space removed

Change-Id: Ia4d1043d1a93c929721a4d7cca60ce9ff8bbf67a
Signed-off-by: sinikang <sinikang@samsung.com>
/system/core/rootdir/init.rc
d707fb3fb6448be04d6e14f7e478df7e298ebf35 06-Oct-2011 Nick Kralevich <nnk@google.com> enable heap randomization.

Bug: 5250555

Change-Id: I7acb0645402611875c481aec33ece85fced7a336
/system/core/rootdir/init.rc
4e803c3c18ad6a0cebbb16e2cf623a174f5201e1 10-Oct-2011 Wink Saville <wink@google.com> Merge "Add log group to rild to improve log collection on modem issue"
65c4df51f895b79fc599d3bfa796ddfc660d47e4 07-Oct-2011 Jeffrey Tinker <jtinker@google.com> Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls

Bug 4598045 Implementing secure video path on TI OMAP4 chip for ICS

Change-Id: Iacfe3e79f067172085b96bb4cd4484101aa5be1e
/system/core/rootdir/init.rc
e65e946382033a94f99f0f05678bb1e6329e3182 29-Sep-2011 Kazuhiro Ondo <kazuhiro.ondo@motorola.com> Add log group to rild to improve log collection on modem issue

Add log group to ril-daemon service. rild is the best place to
know the issue on the modem in many time. It would be helpful
if rild alone can capture the snapshot of logcat buffers at
the moment of problem.

Change-Id: Ie0dcda126fb748a00e650427de35541672359287
/system/core/rootdir/init.rc
8e3ff70444ac919d0b70eaa1fbe97a3ef5bdb9ef 12-Sep-2011 JP Abgrall <jpa@google.com> init.rc: allow all users to open the qtaguid misc dev

The netfilter xt_qtaguid module uses a misc dev so that processes
that use the module can be tracked.
Every process that does socket tagging must open that dev.

Change-Id: I6af3e0f0180637b14455dd9607724523f142c402
/system/core/rootdir/init.rc
1ac40f4ef18799e252115d9c9ad17396ffb68f3d 08-Sep-2011 Robert Greenwalt <rgreenwalt@google.com> Increase the window sizes on wifi and lte.

Set to 524288,1048576,2097152, 262144,524288,1048576.

bug:5226360
Change-Id: Id9d4257c51a355d78246b4ca59ab462fbe5b72be
/system/core/rootdir/init.rc
ca47cef7491caf6072984d9d64c768717baad09a 25-Aug-2011 Dima Zavin <dima@android.com> init: add charge mode handling

Introduces a 'charger' section that is processed when androidboot.mode
supplied on the kernel commandline is "charger".

In this mode, sections such as fs, post-fs, etc are skipped. Only the
'early-init' and 'init' sections of the init rc files are processed before
processing the 'charger' section.

Change-Id: If9eb6334de18f04cbcf2aab784578e2993615242
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/rootdir/init.rc
85e37b0a81f2f24f223c8917db69221779f0d2b0 18-Aug-2011 JP Abgrall <jpa@google.com> init: allow mediaserver to tag socket (group net_bw_acct)

The mediaserver needs to do communication on behalf of other apps
(browser, ...).
It needs to be able to tag sockets. The kernel will check for net_bw_acct
group membership.

Change-Id: I7fb063fdb7d9435d7f979df6622ff17f34049cbc
/system/core/rootdir/init.rc
d09196d00cb5bf3bffb22d3aae45c8797f1ddf4c 08-Aug-2011 Dianne Hackborn <hackbod@google.com> Merge "Activity Manager now takes care of setting OOM values."
a24687197d69ac677d176dbc41d5cfd65d1afc44 08-Aug-2011 Chia-chi Yeh <chiachi@android.com> init.rc: add inet permission to VPN daemons explicitly.

Racoon still needs it after dropping root privilege, or pure IPSec VPN
will fail. Mtpd works without it because net_raw implies inet. However
it would be better to set all of them clearly without the assumption.

Change-Id: I50762af2c25ec9cc559e528c7b14f469494fd553
/system/core/rootdir/init.rc
06787f4089093fed8a01ec3a3d2092e10919b77e 08-Aug-2011 Dianne Hackborn <hackbod@google.com> Activity Manager now takes care of setting OOM values.

All init needs to do is make these files writeable so that the
activity manager can set them.

Change-Id: Ieea43208fadc01504d813be379aecbafcadf0d34
/system/core/rootdir/init.rc
7804cbf4833cba82bd38f6adaf567bcb8262c3ad 29-Jul-2011 Mike Lockwood <lockwood@android.com> Move some common USB configuration logic to init.rc

Change-Id: Ib75ccfd9c4aa8aace936370c33f33a922ca3c51f
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
3507616870acd71bbd26e045528b0cfe716d37cd 24-Jul-2011 Eric Laurent <elaurent@google.com> Fix issue 4604090: notification sound interrupted.

Removed system from mediaserver groups. Not needed anymore
now that AudioFlinger acquires wake locks via PowerManagerService.

Change-Id: I177b968a0a30557d871188bf3991b96d9b391d3c
/system/core/rootdir/init.rc
4a2b0fcd6e166499fe51e920aca5f9640dd05939 15-Jul-2011 Conley Owens <cco3@android.com> am aa4a66a1: am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache."

* commit 'aa4a66a16dd9b97fb876bb296366442b8745a10b':
Create world readable, system writeable /data/resource-cache.
aa4a66a16dd9b97fb876bb296366442b8745a10b 15-Jul-2011 Conley Owens <cco3@android.com> am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache."

* commit '1e5e2d7673a9ea915283f6626fa692cc169b0e67':
Create world readable, system writeable /data/resource-cache.
56286d6fdb07d8b1310c27eeb59bdf05500f166e 11-Jul-2011 Chia-chi Yeh <chiachi@android.com> Merge "init: update permissions for VPN."
9bb4d411e01c8e6330b5c27c489485592360576b 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: update permissions for VPN.

VPN no longer uses system properties to keep network parameters.
Besides, profiles are now stored and encrypted by keystore.

Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/rootdir/init.rc
50d9819ef49c2d557ad0b33a7880a7a3b72e3fb8 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> Merge "init: clean up init.rc as now mkdir handles EEXIST."
ea7441415997faf34f7ae44f462f916f5f7ea0df 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: clean up init.rc as now mkdir handles EEXIST.

Change-Id: I3fa2a618ef27197315fc128738a284ac644e86c0
/system/core/rootdir/init.rc
f48fd5d403d77c4586ad0e715affd601a0934334 07-Jul-2011 Eric Laurent <elaurent@google.com> Temporary workaround for issue 4604090

There was a regression caused by a change in Honeycomb that removed
mediaserver process from system group to improve security: This prevents
the audio HAL (which runs in mediaserver process) from taking wake locks
while audio is playing thus causing the pcm stream to get unexpectedly
suspended.

This temporary workaround is just to allow ICS dogfood in better conditions until
a real fix taking into account the security issue is implemented.

Change-Id: Ic19a23da4b4383559188b6f5c3a82604c3d95d74
/system/core/rootdir/init.rc
e89675584df1f02dd4642585493a19ac3e691bc5 07-Jul-2011 Mike Lockwood <lockwood@android.com> Merge "init.rc: Allow system process to configure RNDIS USB ethernet address"
64416c816cbe1161a09d6e6a65732399fac4e3ca 06-Jul-2011 Mathias Agopian <mathias@google.com> Merge "don't restart surfaceflinger when the window manager dies"
9350a00ce65a6425ba4566fe943c954373240f6c 06-Jul-2011 Mike Lockwood <lockwood@android.com> init.rc: Allow system process to configure RNDIS USB ethernet address

Change-Id: Id339d8359e592dbc1279e423d9a5adc3a775949d
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
b4daef45310891d550ea9cfb89ab4bf5b3e15ef5 02-Jul-2011 Mathias Agopian <mathias@google.com> don't restart surfaceflinger when the window manager dies

Change-Id: Ia3c60e6c5471e2b72d53c936de44b730c68095e0
/system/core/rootdir/init.rc
856f63c0df9cd4e8783ca65140fe386e3a98a274 01-Jul-2011 Brian Carlstrom <bdc@google.com> Merge "Revert "Add keychain user""
1c9a996c50e096eb9f54dc806aae6d82fa3cc2e8 20-Jun-2011 Eino-Ville Talvala <etalvala@google.com> Add mobile filter framework library into the bootclasspath.

Change-Id: Ia9ae45de5d58ba5e98821fd04add96c6062c1a18
/system/core/rootdir/init.rc
04918930236981a6d2a096a73854caa96cb94bda 01-Jul-2011 Brian Carlstrom <bdc@google.com> Revert "Add keychain user"

This reverts commit 6541ef1562ccf93e498d653598330a7fc80ad2b2.

Bug:4970237
Change-Id: I23a90eb89c1d19893d2ba7065fc624c0521cb06e
/system/core/rootdir/init.rc
9d94942bcd6347d6ee8524b23bc94b95ba32d8e0 27-Jun-2011 vidya rao <vidya.rao@motorola.com> am 6a18a077: am 04cf629b: Move RILD to class main

* commit '6a18a07774123c409cefd9a92f1c4c6504f4edfd':
Move RILD to class main
04cf629be5e99a3a920aecc0b059444bd07e9d84 24-Jun-2011 vidya rao <vidya.rao@motorola.com> Move RILD to class main

-- This is needed so the modems (LTE & CDMA) are powered on and running
before unlocking encrypted devices

Change-Id: I842f5286499fd76abc554ded550fb837d12b324e
/system/core/rootdir/init.rc
535164e9d9649a83d4d63829f3389f2bea339fe1 22-Jun-2011 Mike Lockwood <lockwood@android.com> Reimplement the "adb root" command to more closely match its previous behavior

The adb gadget driver used to reset the USB bus when the adbd daemon exited,
and the host side adb relied on this behavior to force it to reconnect
with the new adbd instance after init relaunches it. The new gadget
drivers no longer automatically reset the USB bus when adbd is restarted
which caused adb to hang since it was no longer forced to reconnect with the
device. We attempted to work around this on the host side adb, but that
work around has not been reliable.

This change adds a property trigger on the service.adb.root system property
which will reset the USB bus and restart the adbd daemon when adbd sets
the property to 1. This should be much closer to the previous behavior
and will hopefully fix some problems with automated testing.

Change-Id: I177c37400009a3d83f21a5f9431f94fd1cc19b9b
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
352dfdfaea55601f2c36fe7286a158e84028bcf3 09-Jun-2011 Mike Lockwood <lockwood@android.com> init.rc: Changes for new USB gadget drivers

Change-Id: I68fcf167c9fc71bb5f44793648a35d3181fd36d7
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
b45280d259c5036dd066782d725c55284c7dae90 30-May-2011 MÃ¥rten Kongstad <marten.kongstad@sonyericsson.com> Create world readable, system writeable /data/resource-cache.

/data/resource-cache is used to store idmap files.

Change-Id: I9b1dbc8d607333b71c05f55a4a402ae92193c36c
/system/core/rootdir/init.rc
2b8f76cdbb254ac1170087a40dbf30b7627f3516 05-May-2011 jeffhao <jeffhao@google.com> Tracking merge of dalvik-dev to master

Reordered bootclasspath to allow verification of all framework methods.
git cherry-pick --no-commit ec164a0170955fe63106c2576a65bc4ffb1df425

Address CVE-2011-1090.
git cherry-pick --no-commit 3365288d3c00072689cd9d733e055561cadc87b5

Change-Id: I6a89bc600ced06a0cb84ae1670cb7a6ea39de9c8
/system/core/rootdir/init.rc
a31a3511825375177d26ab27067352c2c8f42038 05-May-2011 Brian Carlstrom <bdc@google.com> Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6)

frameworks/base

Adding IKeyChainService APIs for CertInstaller and Settings use
keystore/java/android/security/IKeyChainService.aidl

libcore

Improve exceptions to include more information
luni/src/main/java/javax/security/auth/x500/X500Principal.java

Move guts of RootKeyStoreSpi to TrustedCertificateStore, leaving only KeyStoreSpi methods.
Added support for adding user CAs in a separate directory for system.
Added support for removing system CAs by placing a copy in a sytem directory
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/RootKeyStoreSpi.java
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStore.java

Formerly static methods on RootKeyStoreSpi are now instance methods on TrustedCertificateStore
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java

Added test for NativeCrypto.X509_NAME_hash_old and X509_NAME_hash
to make sure the implementing algorithms doe not change since
TrustedCertificateStore depend on X509_NAME_hash_old (OpenSSL
changed the algorithm from MD5 to SHA1 when moving from 0.9.8 to
1.0.0)

luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java

Extensive test of new TrustedCertificateStore behavior
luni/src/test/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStoreTest.java

TestKeyStore improvements
- Refactored TestKeyStore to provide simpler createCA method (and
internal createCertificate)
- Cleaned up to remove use of BouncyCastle specific X509Principal
in the TestKeyStore API when the public X500Principal would do.
- Cleaned up TestKeyStore support methods to not throw Exception
to remove need for static blocks for catch clauses in tests.

support/src/test/java/libcore/java/security/TestKeyStore.java
luni/src/test/java/libcore/java/security/KeyStoreTest.java
luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java

Added private PKIXParameters contructor for use by
IndexedPKIXParameters to avoid wart of having to lookup and pass
a TrustAnchor to satisfy the super-class sanity check.

luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/IndexedPKIXParameters.java
luni/src/main/java/java/security/cert/PKIXParameters.java

packages/apps/CertInstaller

Change CertInstaller to call IKeyChainService.installCertificate
for CA certs to pass them to the KeyChainServiceTest which will
make them available to all apps through the
TrustedCertificateStore. Change PKCS12 extraction to use AsyncTask.

src/com/android/certinstaller/CertInstaller.java

Added installCaCertsToKeyChain and hasCaCerts accessor for use by
CertInstaller. Use hasUserCertificate() internally. Cleanup coding
style.

src/com/android/certinstaller/CredentialHelper.java

packages/apps/KeyChain

Added MANAGE_ACCOUNTS so that IKeyChainService.reset
implementation can remove KeyChain accounts.

AndroidManifest.xml

Implement new IKeyChainService methods:
- Added IKeyChainService.installCaCertificate to install certs
provided by CertInstaller using the TrustedCertificateStore.
- Added IKeyChainService.reset to allow Settings to remove the
KeyChain accounts so that any app granted access to keystore
credentials are revoked when the keystore is reset.

src/com/android/keychain/KeyChainService.java

packages/apps/Settings

Changed com.android.credentials.RESET credential reset action to
also call IKeyChainService.reset to remove any installed user CAs
and remove KeyChain accounts to have AccountManager revoke
credential granted to private keys removed during the RESET.

src/com/android/settings/CredentialStorage.java

Added toast text value for failure case

res/values/strings.xml

system/core

Have init create world readable /data/misc/keychain to allow apps
to access user added CA certificates installed by the CertInstaller.

rootdir/init.rc

Change-Id: I768ca8e8e990ff333ce0f7069a0935173498c5ed
/system/core/rootdir/init.rc
f642c3d12f4cffdc349b9ebfc4107de254ad8db9 17-Mar-2011 Jeffrey Tinker <jtinker@google.com> Make drmserver's primary group be system, so setgid is not required in ueventd.stingray.rc

Change-Id: Ie8a287620d22b5c1bdc459fb288b7403589ab474
/system/core/rootdir/init.rc
cfce2826780dc1c4811619b89ba8d358e3f30f11 14-Mar-2011 Glenn Kasten <gkasten@google.com> Bug 4089635 mediaserver fewer supplementary groups

Change-Id: I90111567564397ca08e87dcfcbdf23337bf79ae6
/system/core/rootdir/init.rc
b7b770dd76d664b1e44adb2f98b8caf594f6d3c8 11-Mar-2011 Glenn Kasten <gkasten@google.com> Bug 4086255 drmserver process needs system group

Change-Id: If9a325b9e716abe00f3ad6f20b012861308abd2d
/system/core/rootdir/init.rc
5db0897c6530502e1343a75b258868122030e4a5 11-Mar-2011 Ken Sumrall <ksumrall@android.com> Merge "Load the persistent properties after decrypting the /data partition" into honeycomb-mr1
c5c51033c86353d1a448c72e0e9388906eed7114 09-Mar-2011 Ken Sumrall <ksumrall@android.com> Load the persistent properties after decrypting the /data partition

Fix for bug 3415286. The persistent properties are normally read early
in the boot process after /data is mounted. However, for an encrypted
system, at that point /data is a tmpfs ramdisk. This change adds a new
command to init (load_persist_props) to read the persistent properties,
and adds an action to init.rc to load the persistent properties. This
action is triggered by setting a property in vold, but that's in a
different CL.

Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/rootdir/init.rc
a40481b2cc604b8b278d509f120cf496c4c318f2 04-Mar-2011 Mathias Agopian <mathias@google.com> Run surfaceflinger in its own process. [DO NOT MERGE]

This is to allow OpenGL ES rendering from the system process,
and help with debugging.

Bug: 4086003
Change-Id: I732e95f4fcaa358f430cc195d8e63a69263bffdc
/system/core/rootdir/init.rc
9ac8484e0b677802474e2fd73edb9cbac02d98a6 08-Feb-2011 Ying Wang <wangying@google.com> Merge "Reorder BOOTCLASSPATH to match change 7eff81df2a"
04e5232ac2b3fc87596c6d82c07c667e52e2d7c2 08-Feb-2011 Ying Wang <wangying@google.com> Reorder BOOTCLASSPATH to match change 7eff81df2a

Bug: 3385161
Change-Id: I8bb91753c02c031c32ab0070dd424a6ac859311a
/system/core/rootdir/init.rc
b03afaafb542e84a6ae9b09d89f7eb3a9d1ccf7a 03-Feb-2011 Glenn Kasten <gkasten@google.com> Merge "Bug 3381298 Remove old /data/drm/plugins/native"
63e99f447fed821b57f3f13e33abd740b3b04c03 30-Jan-2011 Rebecca Schultz Zavin <rebecca@android.com> am e442cff0: am 58fb8220: Raise the viking killer min free values to match the system properties

* commit 'e442cff05ff9f083c91caa3bed74e37318a69fda':
Raise the viking killer min free values to match the system properties
58fb822024a04641d5ca1d0341456a2706aee853 29-Jan-2011 Rebecca Schultz Zavin <rebecca@android.com> Raise the viking killer min free values to match the system properties

Change-Id: Idcbdb106d704ef63c9a44e635b6e995e0e5f6479
Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
/system/core/rootdir/init.rc
24823cfa84d1a4dcb719c1949092facf8c92804a 29-Jan-2011 Dianne Hackborn <hackbod@google.com> am fee2cfb0: am 9efdcd96: Fix issue #3401380: Raise OOM killer limits

* commit 'fee2cfb01165f6797d783c6a8c0b1fba4f591355':
Fix issue #3401380: Raise OOM killer limits
9efdcd969ed03cfbe8cfa692b8adcc46d954914a 29-Jan-2011 Dianne Hackborn <hackbod@google.com> Fix issue #3401380: Raise OOM killer limits

Change-Id: Ia9c82e7d31b7f1b89bf9650ebea697d9b3a64506
/system/core/rootdir/init.rc
b81dfcb4f6275bf675e7afe64ccecc29c1b8c3ae 23-Jan-2011 Glenn Kasten <gkasten@google.com> Bug 3381298 Remove old /data/drm/plugins/native

Change-Id: Ic299d328f2e04a65a9dce68909c7b83f3ac03b20
/system/core/rootdir/init.rc
328c0d4a89d7c04c829c587657b95b3241f64f60 23-Jan-2011 Glenn Kasten <gkasten@google.com> Merge "Bug 3361124 Remove drmioserver"
b29b33841bd2f5143e2705525bfc4f8a2d2b6316 20-Jan-2011 Glenn Kasten <gkasten@google.com> Bug 3361124 Remove drmioserver

Change-Id: Ie3b20b487c1466737921567ab2d043e230356bf4
Note: safe to re-use the drmio uid/gid as no files were ever created.
/system/core/rootdir/init.rc
852c13d1b2404e5a360375ae75291ac1a9dae026 20-Jan-2011 Ken Sumrall <ksumrall@android.com> am afa099a1: am 3a159d62: Move rild to the late_start class

* commit 'afa099a1909c02196574d125d735adb0c8918392':
Move rild to the late_start class
3a159d62a9d771f2a2d38129f1db56d873598696 20-Jan-2011 Ken Sumrall <ksumrall@android.com> Move rild to the late_start class

Now that rild can be killed in a reasonable amount of time, move it
from the core class to late_start. I was going to move it to main,
but it would get killed and restarted right after the disk crypto
password was entered, which is when the late_start class is started,
and I was seeing issues with rild not re-connecting to the network
when it was killed and restarted.

Change-Id: I60479ddb853953029890fc816538d615ef5a96ab
/system/core/rootdir/init.rc
701d40f721573c5c9e0b45b59a383e04c582f6d0 18-Jan-2011 Ken Sumrall <ksumrall@android.com> am 383b76f8: am e4349157: Add a new trigger to support a progress bar UI for encrypt in place.

* commit '383b76f86af48d4a1a502d7767ab79f024483864':
Add a new trigger to support a progress bar UI for encrypt in place.
e434915787c38a6d84e1058044fed3be2ed02235 17-Jan-2011 Ken Sumrall <ksumrall@android.com> Add a new trigger to support a progress bar UI for encrypt in place.

Change-Id: I6a14eb43462505cb7fecfee9fd1ecdea50065963
/system/core/rootdir/init.rc
30d5d038a94b09bd906d8a07a9c4b79640d36c2e 14-Jan-2011 Jesse Wilson <jessewilson@google.com> Move apache-xml to external. (project 4 of 4)

Change-Id: I8e1ea723481ae6d8e609563331c187576f306bce
http://b/3351604
/system/core/rootdir/init.rc
63990cf56fc64033c0382ac19a3ffba7f525fb30 13-Jan-2011 Ken Sumrall <ksumrall@android.com> Merge "Move rild to the core class." into honeycomb
a02714bd3e8e75298c6e684ef375407fe02dd9b0 11-Jan-2011 Ken Sumrall <ksumrall@android.com> Move rild to the core class.

Changes in init.stingray.rc now prevent rild from making sockets
or named pipes on /data. Now that rild no longer prevents /data
from being unmounted, we can put it in the core class, which doesn't
restart when we enable encryption. This speeds up the boot by 20+
seconds.

Change-Id: I737baf804e089f4ddbd664eaa1e675a7bd62e699
/system/core/rootdir/init.rc
f3c42b6ee4f0bb042cf93e1ac6c9c4d72e1558fa 11-Jan-2011 Ken Sumrall <ksumrall@android.com> Move rild to the core class.

Changes in init.stingray.rc now prevent rild from making sockets
or named pipes on /data. Now that rild no longer prevents /data
from being unmounted, we can put it in the core class, which doesn't
restart when we enable encryption. This speeds up the boot by 20+
seconds.

Change-Id: I71c426dab1b725e401116234167d41c7ccd958c1
/system/core/rootdir/init.rc
a44aca6580b6f39459195275f4631682410aae4b 11-Jan-2011 Gloria Wang <gwang@google.com> Temporarily disable the drm service. do not merge

Change-Id: I5cb04a9c2cc5b95443c6c0ea77132a4102ca47fc
/system/core/rootdir/init.rc
60b5b408cfcac450ce0cc56952d3b1c087b25428 07-Jan-2011 Gloria Wang <gwang@google.com> To remove drm service from groups of "system" and "root".

Change-Id: Ieac11c667c72465f7082baab0787dc740797049f
/system/core/rootdir/init.rc
a2a1f3149fb32d95bc81ddfd713d5bba9d6cbc61 27-Oct-2010 Brad Fitzpatrick <bradfitz@android.com> Let SocketClient users write binary data to clients.

This is a dependency for the DNS proxy CLs.

This CL also adds a new socket for the netd process to inherit which
is owned by the inet group. (so only apps with the INTERNET
permission can use the DNS proxy...)

Change-Id: I8a51924e0ed56c6066f77e6f1b02d39bdadac51e
/system/core/rootdir/init.rc
752923c168009d03e9e00e590155fbd0a2880ccb 04-Dec-2010 Ken Sumrall <ksumrall@android.com> Changes to init to support encrypted filesystems.

These are the changes to init and init.rc necessary to
support booting with and encrypted /data filesystem.
A corresponding change to init.<device>.rc goes along
with this change.

Change-Id: I0c7e2cc39568358014a82e317735c0eae14dd683
/system/core/rootdir/init.rc
333f24bfbd9eea1347f20c2e88c5c1565b84aafe 10-Dec-2010 Nick Kralevich <nnk@google.com> don't run services with gid=0

Ensure that we drop privileges for servicemanager
and drmioserver. These should not be running with
gid=0.

Bug: 3275526
Testing: Applied change and successfully rebooted
the device. No obvious bugs.

Change-Id: I782fbda812cb88e0a365788b45b3b32894623177
/system/core/rootdir/init.rc
1612425c50d2728542cac607fc71a4c8781bf1df 13-Dec-2010 Jaikumar Ganesh <jaikumar@google.com> Remove services for adding SDP records.

This was an inefficient way of doing things and was
temporary. There are now direct calls to Bluez to add reserved
SDP records.

This improves connection time after turning on BT by 6-8 secs.

Change-Id: I8750f44e1de73c9cc935d68710b8964e3f50c3a6
/system/core/rootdir/init.rc
6388cfe03c1d5695d7cabe244b031af02ef686a8 08-Dec-2010 Iliyan Malchev <malchev@google.com> Revert "HACK: slow_start for mediaserver to prevent restart race condition"

This reverts commit 9db7945ed2f9eb5756aa0c1e5e72fa6240f74847.
/system/core/rootdir/init.rc
9db7945ed2f9eb5756aa0c1e5e72fa6240f74847 05-Dec-2010 Paul Eastham <eastham@google.com> HACK: slow_start for mediaserver to prevent restart race condition

Change-Id: Ia76385612fd127c5f11b3d64205e350f27acfd82
/system/core/rootdir/init.rc
d49b4ef51eeba026e77f51e9c454464d0c5b9cd9 19-Nov-2010 Mike Lockwood <lockwood@android.com> init.rc: Allow console in userdebug builds

Change-Id: Ib5734c6d3e2bf5a9da3d44721c529971f2345120
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
4640fc0504ec69446b00dfb7ffcca48b085bf916 26-Oct-2010 Gloria Wang <gwang@google.com> Create directory for DRM plug-ins.

Change-Id: I1bfef96b1949f288852cd88222e0ce2bbb186f40
/system/core/rootdir/init.rc
a215823fc92d6c0f8623fe18a407d9853aef87cf 28-Oct-2010 Brian Swetland <swetland@google.com> am b7171987: am b4d65399: disable console in user builds
b7171987382b768466a472c4c5f84cc496c95aea 28-Oct-2010 Brian Swetland <swetland@google.com> am b4d65399: disable console in user builds
b4d65399fde02280b718e3b5b5cb1464a885c4b0 28-Oct-2010 Brian Swetland <swetland@google.com> disable console in user builds

Also, run console as shell/log instead of root/root.

Change-Id: I6104f1edddfd5e11843ff41d7839d0c296e6a6f9
/system/core/rootdir/init.rc
8c5669f9f9a228efebf4059fd4ceace5cece578b 27-Oct-2010 Brad Fitzpatrick <bradfitz@android.com> Let SocketClient users write binary data to clients.

This is a dependency for the DNS proxy CLs.

This CL also adds a new socket for the netd process to inherit which
is owned by the inet group. (so only apps with the INTERNET
permission can use the DNS proxy...)

Change-Id: Ic3475c697913ba85805b4e49801b65e7a1d59289
/system/core/rootdir/init.rc
98b1378606780c28501708ca02560c82bb1fda53 23-Oct-2010 Brian Swetland <swetland@google.com> am f3c29f0c: am 5988ea72: add sdcard access permission to ril daemon

Merge commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6'

* commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6':
add sdcard access permission to ril daemon
f3c29f0cf287ec3d329b012a2d48808b064632f6 23-Oct-2010 Brian Swetland <swetland@google.com> am 5988ea72: add sdcard access permission to ril daemon

Merge commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6' into gingerbread-plus-aosp

* commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6':
add sdcard access permission to ril daemon
5988ea726e91fbdc69485b729ea2f532fedfa1d6 23-Oct-2010 Brian Swetland <swetland@google.com> add sdcard access permission to ril daemon

Some RIL daemons write crashdumps to sdcard.

Change-Id: I49a8d2cb342fd7f8bd23dbb1bcc378726e10a579
/system/core/rootdir/init.rc
d7482b2f4cdd6a35f8707d94536801a958120b6b 22-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> am 33357f54: am 6490257d: Make netd restart when system server hangs on it.

Merge commit '33357f5477a24cb16bd3dd692fe5ca14755ab033'

* commit '33357f5477a24cb16bd3dd692fe5ca14755ab033':
Make netd restart when system server hangs on it.
33357f5477a24cb16bd3dd692fe5ca14755ab033 22-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> am 6490257d: Make netd restart when system server hangs on it.

Merge commit '6490257d116c35d3da927ee7b91179dde64ef713' into gingerbread-plus-aosp

* commit '6490257d116c35d3da927ee7b91179dde64ef713':
Make netd restart when system server hangs on it.
6490257d116c35d3da927ee7b91179dde64ef713 22-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> Make netd restart when system server hangs on it.

netd has been seen hanging (cause suspected but unconfirmed)
which then brings down the system server which blocks forever
on its main thread trying to connect to netd with its hung
event loop.

This then results in an infinite watchdog runtime restart loop
because the situation never improves: netd is still borked.

Instead, we should kill netd and give it another chance when
the system server dies.

Bug: 3018996
Bug: 3017876
Change-Id: Ibf9ecf0ffcb78e48c38e5167f21cbeefe0e2a47f
/system/core/rootdir/init.rc
d06df51bcd7bcc2656089a529fa6a455bad00d37 19-Sep-2010 Brian Swetland <swetland@google.com> resolved conflicts for merge of 3b5214a6 to master

Change-Id: Id73c53c6c2e9c21eb9b1d1e624aaeb25097ea7a4
3b5214a67f43e2e4f69428e98d3a2c130c7c87d8 19-Sep-2010 Brian Swetland <swetland@google.com> am 02863b95: add /vendor support

Merge commit '02863b957cfbfc302d3136ed78c0cba86accacd8' into gingerbread-plus-aosp

* commit '02863b957cfbfc302d3136ed78c0cba86accacd8':
add /vendor support
02863b957cfbfc302d3136ed78c0cba86accacd8 19-Sep-2010 Brian Swetland <swetland@google.com> add /vendor support

- look in /vendor/firmware/... in addition to /system/etc/firmware/... for firmware loading
- add /vendor/bin to path before /system/bin
- add /vendor/lib to ldpath before /system/lib
- configure appropriate permissions for /system/vendor/bin
- symlink /vendor -> /system/vendor

Change-Id: I0c06ca1e38a44f0c7024cee6cea8907aa93a4532
/system/core/rootdir/init.rc
a5220b24d1b17b142e373aacbadf79a00effbbf0 10-Sep-2010 Jean-Baptiste Queru <jbq@google.com> am 26ce6e0e: manual merge from readonly-korg-master

Merge commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1'

* commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1':
- Add drm and drmio service
26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1 10-Sep-2010 Jean-Baptiste Queru <jbq@google.com> manual merge from readonly-korg-master

Change-Id: Id17f69d22fbbc84578be5aadd5e8e906ff0eb548
e6d8a5f1dfb81113b9421ea353915cde426023ed 09-Sep-2010 Brian Swetland <swetland@google.com> am 8df3a4a5: am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread

Merge commit '8df3a4a554184afba71887995c5f0983ce81196f'

* commit '8df3a4a554184afba71887995c5f0983ce81196f':
remount / as read-only only on post-fs to allow per-target config of /
56de7a1263431819ff9a53dcd9e8e3306149ed99 09-Sep-2010 Brian Swetland <swetland@google.com> remount / as read-only only on post-fs to allow per-target config of /

Change-Id: Ia89dd2021e0f960201b4cee573227f0addd48431
/system/core/rootdir/init.rc
f2af88e81af5efb2d585963507f798d5a8b93d67 05-Aug-2010 Brian Carlstrom <bdc@google.com> Tracking merge of dalvik-dev to gingerbread

git cherry-pick --no-commit b99a099c
git cherry-pick --no-commit 9811671e023ceb82029040f7acf599013c773e6b
git cherry-pick --no-commit d0645bf0cc76ef7be11cf77a8e1995233a1972e4

Change-Id: Ie70fecaeaba97a25f114cd2717e381b5107533b1
/system/core/rootdir/init.rc
e572d596b3715198fb48b3d8cef4939a71d58db2 27-Jul-2010 aimitakeshi <aimitakeshi@gmail.com> - Add drm and drmio service
- Add /data/drm directory for storing DRM related data

Change-Id: Ifd8922a3de109dbf5cd3f9cabbf4e5689b16c1d7
/system/core/rootdir/init.rc
f848a429dde741742988e2365d257058d57acbf8 15-Jul-2010 Kenny Root <kroot@google.com> resolved conflicts for merge of 3cac9cb3 to master

Change-Id: I86b5173ad49522eae082bf2a3d096dbfb5240129
c7858a3dde9db1c4cf2563a4388f422ff1bcb334 15-Jul-2010 Kenny Root <kroot@google.com> Add directories for OBB mounting

Change-Id: Ib73e9bca50fb168ab5d147cc260666a770092961
/system/core/rootdir/init.rc
d0645bf0cc76ef7be11cf77a8e1995233a1972e4 30-Jun-2010 Brian Carlstrom <bdc@google.com> updated BOOTCLASSPATH to track merge from dalvik-dev

Change-Id: I10e6895ad3647dd789fe5fc7a7d37c4b71c61717
/system/core/rootdir/init.rc
a2dffa9db6c08c240e9511faee1c16fea535ef3e 16-Jun-2010 Mike Lockwood <lockwood@android.com> init.rc: Move SD card support to device specific init.rc files

Change-Id: I5745e91df2b7c5722bd6e650931d3d2d7d0eadcb
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
c5947806740172e66c1fd5259e86bc5543d873ac 11-Jun-2010 Dianne Hackborn <hackbod@google.com> am 0c6672c6: am 8b0ec20d: Update OOM adj levels.

Merge commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c'

* commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c':
Update OOM adj levels.
8b0ec20d6f9636def6740085b203302c1680fa81 11-Jun-2010 Dianne Hackborn <hackbod@google.com> Update OOM adj levels.

This introduces some new buckets that will be used by the activity
manager, and adjusts the default levels to match what we had been
setting for Droid.

It turns out Passion has been using the old levels, which makes no
sense for how much memory it has. Also it is a problem with these
definitions spreading to other projects for different devices, so
I am going to update the defaults to be appropriate for our newer
devices, and put here a file to tune them down for something like
the sapphire.

Change-Id: Ia4f33c4c3b94aeb3656f60b9222072a1d11e9e68
/system/core/rootdir/init.rc
f96e700b338e9a0edee6c2114cc7310f7be48bc4 03-Jun-2010 Christopher Tate <ctate@google.com> am 25e7b8fc: am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
25e7b8fcc3708b58736c7825ecf612d04020716e 02-Jun-2010 Christopher Tate <ctate@google.com> am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable

Merge commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163' into kraken

* commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163':
Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
230cb33fd1ab335c6f808c72db891993b00110a0 02-Jun-2010 Christopher Tate <ctate@google.com> Make /proc/kmsg and /proc/sysrq-trigger system-process-readable

This is so that the system process can capture kernel thread stacks when the
watchdog detects a deadlock. Previously, /proc/kmsg was root/root and mode
0400, and /proc/sysrq-trigger was root/root and mode 0200. With this
change, /proc/kmsg becomes root/system and 0440, and /proc/sysrq-trigger
becomes root/system and 0220.

Change-Id: Iac46bd10bd11d495024afeb5d693107ce5074791
/system/core/rootdir/init.rc
9811671e023ceb82029040f7acf599013c773e6b 05-May-2010 Jesse Wilson <jessewilson@google.com> Moving junit out of core.jar and into core-junit.jar.

Change-Id: I603cba084c06ddbec21fc88bbaab7cde96952cb1
/system/core/rootdir/init.rc
f83d0b9af5cbe4440cc41ceaa8a7806a13c86282 21-Apr-2010 Colin Cross <ccross@android.com> init: Move uevent handling to an external ueventd process

Change-Id: Iea6c56013062ade633a1754f7bcf8cf09b3dedc1
/system/core/rootdir/init.rc
31712beaf7de127a1249b909cdefffbc25fff076 09-Apr-2010 Colin Cross <ccross@android.com> Move filesystem mounting into a new "fs" init level

Devices with non-MTD storage need to override the filesystem mounting
commands in init.rc. Moving them to a new "fs" init level allows a
custom init.<device>.rc to handle the mounting.

Change-Id: If0e655139b9734650fb798b6eb0a90e2241fc29b
/system/core/rootdir/init.rc
c741f22d8533226ce60903649a7a57b3f05a65af 24-Mar-2010 Nick Pelly <npelly@google.com> Add NET_RAW to mediaserver so that it can open a raw HCI socket to configure
BT chip.

Change-Id: I22065b313c7af28b4791c74ea3d403a628738102
/system/core/rootdir/init.rc
bbf3ea46fb6df3b666cb66a09104d3a7694926dc 13-Mar-2010 Jean-Baptiste Queru <jbq@google.com> cleanup init.rc

Change-Id: I7f7fefd61c6032c84fa63e597ea0e6bbe66d2e79
/system/core/rootdir/init.rc
89f235c5e028466bb273dbaacb3346f1f0ba9f1e 01-Mar-2010 Mike Chan <mike@android.com> init.rc: Add cpuacct to cgroup mount for cpu statistic

Cpu accounting statistics expored in /acct

Change-Id: I8a35816e94b69d9e67a3dd65aae16520864777d7
Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
b91bf4ba864a392412397913ee09a8c1f2e7cc87 27-Feb-2010 San Mehat <san@google.com> Revert "init.rc: Add cpuacct to cgroup mount for cpu statistics"

This reverts commit a7d88224ff7283c210c25ce6d57239b4053b5f14.

This cgroup subsys should be mounted on it's own mount-point, since it's
addition to /dev/cpuctl causes the cpu subsys to EPERM
/system/core/rootdir/init.rc
a7d88224ff7283c210c25ce6d57239b4053b5f14 26-Feb-2010 Mike Chan <mike@android.com> init.rc: Add cpuacct to cgroup mount for cpu statistics

Change-Id: Ic1893e1bf7b2c45659419b0bc55d42f50d030c9f
Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
f0cb74e3b07d5de49dc875f8405e21d2a102e749 26-Feb-2010 San Mehat <san@google.com> rootdir: init.rc: Enable I/O priorities for media server and vold

Sets the media-server to class 'real-time' pri 4, and vold to class 'best effort'
pri 2

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
eafdd86f4d8f4ccc69f0c16550c65aa392f678d6 08-Jan-2010 Jaikumar Ganesh <jaikumar@google.com> Update bluetooth data files path.
/system/core/rootdir/init.rc
a9db22f1228996d8f81e4f4903fa5c598a606fbd 24-Feb-2010 San Mehat <san@google.com> rootdir: init.rc: Add 'ASEC_MOUNTPOINT' environment variable.

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
bbfe1368d909be470f919b2349a974bee8dd0a9c 17-Feb-2010 Chia-chi Yeh <chiachi@android.com> Remove dead services from init.rc.
/system/core/rootdir/init.rc
6ea3cc6089393286ab8b6cc459cfa9d7e58fc203 20-Feb-2010 San Mehat <san@google.com> rootdir: init.rc: Create secure staging directories, and a compat symlink

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
55a1f0827be9920b093152cffb6eddd613d04bc9 27-Jan-2010 Vasu Nori <vnori@google.com> dont create sqlite_stmt_journals dir.

this shoudl not be required any longer. in fact, some test-writers are
abusing this dir.
/system/core/rootdir/init.rc
92175e04a56db804d4dae75fc49fdd5edc6a2968 17-Jan-2010 San Mehat <san@google.com> rootdir: init.rc: Fix typo in chown of /dev/cpuctl

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
192277c0154eff542ddbce27d7c35995c0671748 15-Jan-2010 San Mehat <san@google.com> rootdir: init.rc: Add netd to startup services list

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
1851d80959bd314af730451ebfb2a5e00bb0a83a 07-Jan-2010 San Mehat <san@google.com> init.rc: Adjust perms on /asec

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
d0aa32c3d99aeb0e6949ab1c4fae83283a946567 06-Jan-2010 Oscar Montemayor <oam@google.com> Apps on SD project. Small change to support apps on SD file system key storage.
/system/core/rootdir/init.rc
900570e2a833bde0683cce5254d9dc102509cabc 06-Jan-2010 San Mehat <san@google.com> init.rc: Create a small tmpfs on /asec so we can create mountpoints

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
37c71dd9a7f488563c97fdca88cca701e2962e45 04-Jan-2010 San Mehat <san@google.com> init.rc: Add new /asec mount point

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
37c586e6b11138beab400d1208183d49c12a9ef2 03-Dec-2009 Oscar Montemayor <oam@google.com> Encrypted File Systems Project.

Temporarily creating emulated encrypted directories manually.
Will remove those lines once a true encrypted FS is mounted, and proper
framework chanfes have been made. This is required for the feature to
work with the other changes.
/system/core/rootdir/init.rc
7359c16a852c23740ef2874aa6b66f629d1473b7 24-Nov-2009 Dan Egnor <egnor@google.com> Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg --
it gets generated on every boot, so this is a bunch of writing
for no particularly good reason.
/system/core/rootdir/init.rc
eb67fac4723892ac8ae3fae87c05e776c49029c5 20-Nov-2009 Doug Zongker <dougz@android.com> change /cache/recovery group to cache

To unbundle system update, we need users other than system to be able
to write the /cache/recovery directory.
/system/core/rootdir/init.rc
5e7db233004a0869125d0f2d64a9e747faf252da 03-Nov-2009 Jean-Michel Trivi <jmtrivi@google.com> Make the RIL daemon part of the audio group so it can load region-specific
acoustic parameters.
/system/core/rootdir/init.rc
831d8e1e3a08520369561087112ebf898e31704c 13-Oct-2009 San Mehat <san@google.com> rootdir: init.rc: Adjust background dirty writeout policy

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d 09-Oct-2009 Dan Bornstein <danfuzz@android.com> Force the mediaserver process to restart whenever the zygote or system
server do.

Change-Id: I16ce4ae656473055e7e244ccd4af7055959e3c1c
/system/core/rootdir/init.rc
14d898e0141287cd9d8991bea5b63650bb8f5145 09-Oct-2009 Rebecca Schultz Zavin <rebecca@android.com> Make vmallocinfo readable by group log so we can put it in bugreports

Change-Id: I7b04795c029c51108132e7a9eaf46b97de06de6f
Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
/system/core/rootdir/init.rc
aa7d97106abf8c390e1aed71f7c175fb77fead38 07-Oct-2009 Brian Swetland <swetland@google.com> init.rc: don't mount debugfs

We'll do this in the product-specific init files.
/system/core/rootdir/init.rc
529520e8240e6865aca77ae9abf78dacbaa72e2c 06-Oct-2009 San Mehat <san@google.com> Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support"

This reverts commit 35ad5f41c39c5f3af7a8f00185a13366f4901e69.
/system/core/rootdir/init.rc
9b4f1ff210c449920890581b191da3568c10fbd1 18-Sep-2009 Chia-chi Yeh <chiachi@android.com> init.rc: specify keystore directory and fix permissions.
/system/core/rootdir/init.rc
1320687bdb6df2de1c27fb03c827b69384d26f87 19-Sep-2009 Jaikumar Ganesh <jaikumar@google.com> Remove logwrapper for Bluetoothd.

Change-Id: I6d16bc0dbdf9f3aff2080f8c7968ff3cb592811e
/system/core/rootdir/init.rc
bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4 19-Sep-2009 Brian Swetland <swetland@google.com> init.rc: mount debugfs for debugging

- put it at /sys/kernel/debug so Arve will be happy
- symlink /d to /sys/kernel/debug so Brian will be happy.
/system/core/rootdir/init.rc
35ad5f41c39c5f3af7a8f00185a13366f4901e69 16-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
7baff71b0d8fe320df9143b2fa59db0af1b7aa96 16-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: tweak cfs scheduler - disable child_runs_first

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940 11-Sep-2009 Mike Lockwood <lockwood@android.com> init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root

Change-Id: Iff83310f9411c39e1833b3d710b029b12f702993
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
9332482ed2945174d94615f0720f88702cb92667 09-Sep-2009 Mike Lockwood <lockwood@android.com> init.rc: Make /data/dontpanic files readable only by the system process.

Change-Id: If87470b7bcbb1c0774d10296ac82605db3dd9bf0
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
82a6014d90c94a2032e014901917e1d503475d5e 06-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: Allow all processes access to /data/dontpanic

***STOPSHIP***

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
abe3a9c30595846b7e3d705dd4b0aca37fb2f748 03-Sep-2009 Mike Lockwood <lockwood@android.com> init.rc: Add dumpstate service

Change-Id: Iaf7094dd4693c47566c1acf860b750b762af840c
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
020f35f274594f55eec956fdcfec90ad3d7a5c65 02-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data.

This is a temporary measure until bugreports are taken as root.

*****STOPSHIP*****
Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa 01-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: Clean up dump collection

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
21541872c3cdc93e60e18ba496715f8307f990b2 27-Aug-2009 San Mehat <san@google.com> rootdir: init.rc: Copy kernel crash dumps to /data and free kernel resources

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
6bc6794f97aa4368237f23c3d3f7cafd6a796bf3 07-Aug-2009 San Mehat <san@google.com> am ee40fc4e: rootdir: init.rc: Bump up background cpu shares to 5.0%

Merge commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5'

* commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5':
rootdir: init.rc: Bump up background cpu shares to 5.0%
ee40fc4e64e1656a16603778bee895ea389ec7d5 06-Aug-2009 San Mehat <san@google.com> rootdir: init.rc: Bump up background cpu shares to 5.0%

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
630f5f049b53c8586cca5a1acb928f83332baef5 24-Jul-2009 Jaikumar Ganesh <jaikumar@google.com> Add Bluetooth PBAP service.
/system/core/rootdir/init.rc
d39e972831d45d4f8f8effd11691fd2c52d235c6 24-Jul-2009 Doug Zongker <dougz@android.com> am d52f54c4: install recovery image using patch mechanism

Merge commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f'

* commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f':
install recovery image using patch mechanism
d52f54c4552d2f35b3c2c2ac60350ac83760222f 24-Jul-2009 Doug Zongker <dougz@android.com> install recovery image using patch mechanism

With the corresponding change in build/tools, the recovery image is
installed via a shell script that is emitted by the OTA builder.
/system/core/rootdir/init.rc
b44aeb7b6ad8799c31d87a6304d20f41387081a7 15-Jul-2009 Nick Pelly <npelly@google.com> Add OPUSH to register obex server.
/system/core/rootdir/init.rc
3338e5511402c395d0f771e16f92a7a95c0cab82 09-Jul-2009 Mike Lockwood <lockwood@android.com> am 48d116ed: init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf

Merge commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67'

* commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67':
init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf
48d116edf9c785ed284626cbe0bbf5c958cf5e67 09-Jul-2009 Mike Lockwood <lockwood@android.com> init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf

The touch command does not exist, and the chown commands are unnecessary because
the system_server is in the WIFI group.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/init.rc
3bbaec5a7b7aea8a4e1bb5bde3e0b1d2bbc461c1 06-Jul-2009 Amith Yamasani <yamasani@google.com> am eefef323: Set the permissions of wifi supplicant file so that system can access it.

Merge commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa'

* commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa':
Set the permissions of wifi supplicant file so that system can access it.
91217ca5cbbf3ca2a96d596713e79f072da2c491 02-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> am 5c49135b: Merge change 5852 into donut

Merge commit '5c49135b032235f82560d5e55b0e4c547506516b'

* commit '5c49135b032235f82560d5e55b0e4c547506516b':
rootdir: Modify init.rc to run mtpd/racoon as a non-root user.
eefef3234ae1e3b0f2db71415f134c7ec49899fa 02-Jul-2009 Amith Yamasani <yamasani@google.com> Set the permissions of wifi supplicant file so that system can access it.

Create the required directories and set the correct owner and permissions.
/system/core/rootdir/init.rc
51afbf583819f3bdfc96f3c66c9c3444803e792a 01-Jul-2009 Chia-chi Yeh <chiachi@android.com> rootdir: Modify init.rc to run mtpd/racoon as a non-root user.

Note that this change requires a new prebuilt kernel for AID_NET_ADMIN.
/system/core/rootdir/init.rc
acc9a25ef745fce040e2e4e7adfa3d9e200aee99 30-Jun-2009 San Mehat <san@google.com> am 4322f2d7: init: Enable sched_yield() compatability mode on boot.

Merge commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029'

* commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029':
init: Enable sched_yield() compatability mode on boot.
4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029 29-Jun-2009 San Mehat <san@google.com> init: Enable sched_yield() compatability mode on boot.

In CFS, the (somewhat undefined) behavior of sched_yield() changed.

See: http://kerneltrap.org/Linux/CFS_and_sched_yield

This change enables 'compat' mode for sched_yield()

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
f1d63f3751ca787b2ebe76b6680342aa1ff3ca49 18-Jun-2009 San Mehat <san@google.com> am bfa2f8e9: init: Bump up the max cpu bandwidth shares ratio for background.

Merge commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34'

* commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34':
init: Bump up the max cpu bandwidth shares ratio for background.
bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34 17-Jun-2009 San Mehat <san@google.com> init: Bump up the max cpu bandwidth shares ratio for background.

New ratio is 1024/16 (1.5625% for background when cpu is under load)

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
6df2e9fc2e04fc1e908935190837675d6f7599a6 15-Jun-2009 Mike Chan <mike@android.com> am d709b582: remove 3G timeout values from init.rc, this should be device specific

Merge commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56'

* commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56':
remove 3G timeout values from init.rc, this should be device specific
d709b582604e7f9d53b97f9ae13c5e12b2466c56 12-Jun-2009 Mike Chan <mike@android.com> remove 3G timeout values from init.rc, this should be device specific

Signed-off-by: Mike Chan <mike@android.com>
/system/core/rootdir/init.rc
6f5fb6fda101cac4208e4caecee0f70680e2d996 10-Jun-2009 San Mehat <san@google.com> am 3d6f16e5: init.rc: Set default cpu shares for background scheduler group to < 1%

Merge commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919'

* commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919':
init.rc: Set default cpu shares for background scheduler group to < 1%
3d6f16e5edc9834b13a0bcc8a33c98e25518d919 10-Jun-2009 San Mehat <san@google.com> init.rc: Set default cpu shares for background scheduler group to < 1%

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
1d36696821cd81ed7b668bb9d2b0b8a43540ccd2 06-May-2009 Jaikumar Ganesh <jaikumar@google.com> Bluez4 changes

Rename hcid to bluetoothd and change permissions.
/system/core/rootdir/init.rc
720f08f3ffb27084f2a9c98d661dae53d7191ebf 09-Jun-2009 Dmitry Shmidt <dimitrysh@google.com> Add /config mounting point

Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/system/core/rootdir/init.rc
1f75d709c10f49d2e2390b888e766bcfd17da860 01-Jun-2009 Chung-yih Wang <cywang@google.com> Add VPN and Keystore services and data directories.

-- changed the default mode to 0770 for keystore with the new user 'keystore'.
-- add the keystore service providing the basic key lookup/install/remove, but
only keystore user can access the key content.
/system/core/rootdir/init.rc
17df71e0b277372de1d915c168c07c8877e82395 06-Jun-2009 Christopher Tate <ctate@google.com> Add an OOM adjustment category for apps undergoing backup

In this initial commit, apps undergoing backup are treated equivalently
to apps hosting services: more important than anything other than the
foreground app.
/system/core/rootdir/init.rc
8b2cf9f04b924f299d2d250ae4d6826627847842 21-May-2009 Mathias Agopian <mathias@google.com> add bootanimation service to init.rc
/system/core/rootdir/init.rc
269946c09faaff88403289bcfa2519e994f75c21 06-May-2009 San Mehat <san@google.com> init.rc: Add Nexus to services (disabled for now)

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
4933098e22747a9066b5352273c38856b0203931 21-Apr-2009 San Mehat <san@google.com> cgroups: Initialize cgroups at startup.

Signed-off-by: San Mehat <san@google.com>
/system/core/rootdir/init.rc
01161168aa87ea9f1513d2b7b1232521c84e1ea4 26-Mar-2009 Nick Pelly <> Automated import from //branches/donutburger/...@142809,142809
/system/core/rootdir/init.rc
f614d64d4b4dfcd20c77ac3ccf2d9c9090a49303 19-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@140373
/system/core/rootdir/init.rc
e037fd7e193ecccbb5c0888e49f6d58c224bc11d 13-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@138607
/system/core/rootdir/init.rc
2015549667fb77706a9879e974a3875ebccd8198 11-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@137873
/system/core/rootdir/init.rc
e4749f30e5bd8cec727a6d7504b10fc80426316a 09-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@137197
/system/core/rootdir/init.rc
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/rootdir/init.rc
e54eebbf1a908d65ee8cf80bab62821c05666d70 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/rootdir/init.rc
35237d135807af84bf9b0e5b8d7f8633e58db6f5 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
/system/core/rootdir/init.rc
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
/system/core/rootdir/init.rc