fa432b0e2f87e9a029ac0094e5bceaaff258368a |
|
27-Jan-2016 |
Kevin Cernekee <cernekee@google.com> |
Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes"
|
1f0dd2210b4a09fd6272289058a1a306da8ed34d |
|
12-May-2015 |
Kevin Cernekee <cernekee@google.com> |
ueventd.rc: Document the different rule formats for /dev and /sys nodes This was causing some confusion during shark bringup and we weren't able to find docs online, so let's add some hints at the top of the file in case it comes up again. Change-Id: Ica2cd8a0fb28efb99077fdc98673dbbdd6f58ff6 Signed-off-by: Kevin Cernekee <cernekee@google.com>
/system/core/rootdir/ueventd.rc
|
bf81356e22d2fc087ffb3b0f1c9fb816d3256896 |
|
08-Apr-2015 |
Terry Heo <terryheo@google.com> |
rootdir: add permission for /dev/dvb* Bug: 20112245 Change-Id: I513c6ed5b65d5bd4edef6cb12d7fc20eb9cad4f1
/system/core/rootdir/ueventd.rc
|
8c7380b4761d5ca02d839ccd337014116134a5b8 |
|
14-Jan-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 3802b5d4: Merge "rootdir: add pstore" * commit '3802b5d4c5cb14864dcdd8820e9140b81a2d7d78': rootdir: add pstore
|
4b0313e4d39d4ce9c911907e0f1b34ab3b32dd58 |
|
15-Dec-2014 |
Mark Salyzyn <salyzyn@google.com> |
rootdir: add pstore /dev/pmsg0 used to record the Android log messages, then on reboot /sys/fs/pstore/pmsg-ramoops-0 provides a means to pull and triage user-space activities leading up to a panic. A companion to the pstore console logs. Change-Id: Id92cacb8a30339ae10b8bf9e5d46bb0bd4a284c4
/system/core/rootdir/ueventd.rc
|
7770252a84a0981d0e6b3d1b03376ddbecff9654 |
|
16-Oct-2014 |
Arve Hjønnevåg <arve@android.com> |
rootdir: Make trusty version readable by dumpstate Change-Id: I761650d286b454f1fe01a585e7cd6ec769bfc527
/system/core/rootdir/ueventd.rc
|
75b287b771b302c99797d812122b72f83d2f56f9 |
|
30-Apr-2014 |
Ruchi Kandoi <kandoiruchi@google.com> |
ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq The owner and permissions for the sysfs file /sys/devices/system/cpu*/cpufreq/scaling_max/min_freq is changed. This would allow the PowerHAL to change the max/min cpufreq even after the associated CPU's are hotplugged out and back in. Change-Id: Ibe0b4aaf3db555ed48e89a7fcd0c5fd3a18cf233 Signed-off-by: Ruchi Kandoi <kandoiruchi@google.com>
/system/core/rootdir/ueventd.rc
|
b34fed34afbc3288d22dad92226650f600d15f71 |
|
27-Mar-2014 |
Greg Hackmann <ghackmann@google.com> |
rootdir: reduce permissions on /dev/rtc0 Remove world-readable, reduce group permissions to readable by system daemons Change-Id: I6c7d7d78b8d8281960659bb8490a01cf7fde28b4 Signed-off-by: Greg Hackmann <ghackmann@google.com>
/system/core/rootdir/ueventd.rc
|
a585e662e0141d8b3445749ef83b8d9b138d7905 |
|
13-Dec-2013 |
Greg Hackmann <ghackmann@google.com> |
rootdir: add permissions for /dev/rtc0 Change-Id: If9d853bdae2399b1e7434f45df375ba1fd6dbe9c Signed-off-by: Greg Hackmann <ghackmann@google.com>
/system/core/rootdir/ueventd.rc
|
95b348c5d7d1dbccee2c39f48010fd19e8396e44 |
|
19-Nov-2013 |
Greg Hackmann <ghackmann@google.com> |
rootdir: add ueventd.rc rule for adf subsystem Change-Id: I727d91355229692c11e0e309c0fcac051269eba3 Signed-off-by: Greg Hackmann <ghackmann@google.com>
/system/core/rootdir/ueventd.rc
|
b2478a713a39ab745017308e8859467017fb6fa5 |
|
03-Oct-2013 |
Alex Klyubin <klyubin@google.com> |
Expose /dev/hw_random to group "system". This is needed to let EntropyMixer (runs inside system_server) read from /dev/hw_random. Change-Id: Ifde851004301ffd41b2189151a64a0c5989c630f
/system/core/rootdir/ueventd.rc
|
9f239afc3565770f39ae94c2969addb520af3a40 |
|
17-Oct-2012 |
Zhihai Xu <zhihaixu@google.com> |
second user doesnot pickup input operations from A2DP bug 7335014 Change-Id: I39e450d254647f0b84a07f38f2f2571711fca075
/system/core/rootdir/ueventd.rc
|
bdec5ead7417769ba9fc75b6ca86d191b49f2be8 |
|
11-Oct-2012 |
Matthew Xie <mattx@google.com> |
Change dev/uhid group id from bluetooth to net_bt_stack Secondary user need that group id to access the file to support hid bug 7315419 Change-Id: I9d2d3d5a5114d289dc4d83c697421622db4beae6
/system/core/rootdir/ueventd.rc
|
edb2d634b35ec1b0268ac7d9ddab8c8fc082a14e |
|
16-Aug-2012 |
Scott Anderson <saa@android.com> |
Merge "ueventd.rc: Add /dev/uhid for bluedroid" into jb-mr1-dev
|
3ad289dca66ce950f417280b2c071a8dd1975598 |
|
16-Aug-2012 |
Scott Anderson <saa@android.com> |
ueventd.rc: Add /dev/uhid for bluedroid Change-Id: Ica71265856fce1abc0a0ba9c0b1ca016510c61b7 Signed-off-by: Scott Anderson <saa@android.com>
/system/core/rootdir/ueventd.rc
|
e6f8d45da8c61d67dc9fdc1cec53f40594043817 |
|
28-Sep-2011 |
Lukasz Anaczkowski <lukasz.anaczkowski@intel.com> |
Char device /dev/dri/card0 was not created during startup. This device is required by libdrm for GPUs like IvyBridge. Change-Id: I0ac47056a9cec2100f3e6eaa5591571fe6bbc145 Signed-off-by: Lukasz Anaczkowski <lukasz.anaczkowski@intel.com> Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
/system/core/rootdir/ueventd.rc
|
3439cc6145d24d2495490dab3e48d91cf36bccc3 |
|
29-Mar-2012 |
Nick Kralevich <nnk@google.com> |
change files in /dev/log/ to 666 With newer Android kernels, anyone can read from the files in /dev/log. If you're in the logs group (have the READ_LOGS) permission, you'll see all entries. If you're not in that group, you'll see log messages associated with your UID. Relax the permissions on the files in /dev/log/ to allow an application to read it's own log messages. Bug: 5748848 Change-Id: Ie740284e96a69567dc73d738117316f938491777
/system/core/rootdir/ueventd.rc
|
69f43c90cbf7e1a0952f7001796b45f22d48c3dc |
|
12-May-2011 |
Chia-chi Yeh <chiachi@android.com> |
Update the device permission of /dev/tun. Change-Id: Ie8ad60047fc7160997100bd28a0abb439406806a
/system/core/rootdir/ueventd.rc
|
ddc4cfd8b2dd556b30898c6d7b02883b57ce96b0 |
|
02-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
ueventd.rc: Give system process permission to enable and disable USB functions Change-Id: I4af1f3fed857df2be96a640f65cd612577c957c7 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/ueventd.rc
|
45e96d0e49a02c710520d9a023b699a578352c5b |
|
30-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Set USB group for /dev/usb_accessory Change-Id: I17db8d9bb1bf6336979e9b7bce62306d0d7a79d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/ueventd.rc
|
48b911c573c92742aa80270b734811f722c67c37 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
am af7bdc64: Add separate permission and group for access to MTP USB driver * commit 'af7bdc646088e3112052f4fd35061bb720393287': Add separate permission and group for access to MTP USB driver
|
af7bdc646088e3112052f4fd35061bb720393287 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Add separate permission and group for access to MTP USB driver Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Ibb546b8726d61e041fc7c273f71929624ad1575b Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/ueventd.rc
|
1f2565ca08ecd92181eb662899f68f306695d74a |
|
06-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
rootdir: Fix system emulation startup. This fixes the goldfish-specific config scripts used by init and ueventd to properly setup the system under emulation. This fixes a lot of broken-ess introduced by recent permission changes in the system. Note that there are still several problems after this patch is applied, but at least it becomes possible to get an adb connection to the emulated system, Change-Id: I1e8f5828b4d5cbb3a4338878df875dc718276b38
/system/core/rootdir/ueventd.rc
|
7ffa661595df7bc71f1ae2e8cefcd658b0f9bdf5 |
|
27-Oct-2010 |
Brian Swetland <swetland@google.com> |
am 60afdedc: am 146481b9: add rules to set perms for input device sysfs attributes
|
146481b9468ff60214e41c93896259a7201df7cb |
|
27-Oct-2010 |
Brian Swetland <swetland@google.com> |
add rules to set perms for input device sysfs attributes Change-Id: I28ab7f1ac5cc07ade7830e87f5e70c96464bb686
/system/core/rootdir/ueventd.rc
|
e306a9044a1ef97019871eb8cdd102223307f1c9 |
|
31-Jul-2010 |
Iliyan Malchev <malchev@google.com> |
Revert "system/core: add system/audio persmissions for /dev/audio*" This reverts commit 7e8b01229dde701bee555ea1cf10986b773d5de0.
/system/core/rootdir/ueventd.rc
|
7e8b01229dde701bee555ea1cf10986b773d5de0 |
|
30-Jul-2010 |
Iliyan Malchev <malchev@google.com> |
system/core: add system/audio persmissions for /dev/audio* Change-Id: If214241f8150f5ff6cce8b9a76c6c8e5bad9c35a Signed-off-by: Iliyan Malchev <malchev@google.com>
/system/core/rootdir/ueventd.rc
|
69286093d00186ecf2354d8f19934630500b21c4 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
ueventd.rc: Give the USB group read/write access to the MTP USB driver. Change-Id: I305671848dbdf427333dc088f83f88cea1b33945 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/ueventd.rc
|
5f81c272c18a0ef8b5e6e56f1528dd46db310d0d |
|
17-Jun-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Move UART device permissions to device specific init files. Change-Id: I548386601d7546831bfeb044d15b1c9bf71f3e96
/system/core/rootdir/ueventd.rc
|
c0d8fb5842f57bbc244e9c9596707787caabf44e |
|
17-May-2010 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE resolved conflicts for merge of e95aad61 to kraken this change is already in master Change-Id: Ica43eae28b50d89d50217851aff7e62978abfa27 Signed-off-by: Mike Lockwood <lockwood@android.com>
|
b717dc85d8aca2431a553ca0e1b3438d1d8e2072 |
|
06-May-2010 |
Mike Lockwood <lockwood@android.com> |
init: Add support for /dev/bus/usb/ file system and add new unix group AID_USB. init now creates files in /dev/bus/usb/ for user access to USB devices. Files are chmod 660 with group AID_USB. Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/rootdir/ueventd.rc
|
44b65d047cc39baf30e21bfd8dd438f6bc1f77f5 |
|
20-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Add ueventd.rc parsing to ueventd Change-Id: Iea53050d6c10e8cabf563e5d80e84eaf78873695
/system/core/rootdir/ueventd.rc
|