8e8648463d74005ac3111235b6bdea9c79d7a34a |
|
05-Feb-2018 |
Mark Salyzyn <salyzyn@google.com> |
libcutils: Add "daemon" and "bin" users for testing only Multiple LTP tests require a "daemon" or "bin" user. These user ids have been defined since UNIX incept, and even up to the '80s remained in many of the tools as hard coded values. Add these two ids with a cautionary note. Test: compile Bug: 31152327 Bug: 31226046 Bug: 32385889 Change-Id: Ida2fb6d817b8ada0624870439fcf848667b31fb3
/system/core/libcutils/include/private/android_filesystem_config.h
|
d506c068d428587503b75dde76f7e938b272c477 |
|
05-Jan-2018 |
Ruchi Kandoi <kandoiruchi@google.com> |
Add AID for Secure Element Application Test: Test if the correct uid is assigned to the application Change-Id: Ib0302a2e90ae89499ecbcebffa393bdd037adfbe
/system/core/libcutils/include/private/android_filesystem_config.h
|
31b506679ba51bdf625aa1df40d0fe24534ed541 |
|
09-Jan-2018 |
Yi Jin <jinyithu@google.com> |
Add AID_STATSD and AID_INCIDENTD for statsd/incidentd daemons. Test: manual Change-Id: Id798519c3b0116529fc698e6b316a1c6b1c293ca
/system/core/libcutils/include/private/android_filesystem_config.h
|
354417a7fb856f08a1305b9dc0b3e580d76f833a |
|
05-Jan-2018 |
Jeff Sharkey <jsharkey@android.com> |
Allocate GID to use reserved disk space. Filesystems allow the setting of the "resgid" parameter to designate a GID that is allowed to use the "reserved" disk space (in addition to UID 0). We'll be granting this GID to critical system processes, so that the system is usable enough for the user to free up disk space used by abusive apps. Test: builds, boots Bug: 62024591 Change-Id: I2d166f3b730f0a3e7279fb40f12db7413c1dadad
/system/core/libcutils/include/private/android_filesystem_config.h
|
e97a4b9799f25b10c50fccb20eb0af69f14fe8dc |
|
02-Nov-2017 |
Luis Hector Chavez <lhchavez@google.com> |
libcutils: Make uevent_kernel_* namespace-aware This change adds user namespace-awareness to uevent_kernel_* in libcutils. Instead of assuming that root is always uid 0, it detects whether the uid 0 is mapped in the current user namespace and returns the appropriately mapped uid (or the kernel's "overflowuid" in case it is not mapped). In older kernels, or those where user namespaces are not enabled, this still uses uid 0 for root. Bug: 62378620 Test: bullhead networking still works Test: Android in Chrome OS can now receive netlink-related messages Change-Id: I7ea3454e8f38b9c70c65294d6b2a99e5a88f9d70
/system/core/libcutils/include/private/android_filesystem_config.h
|
f73c5e1f8417b4332535553db78fba8937286501 |
|
10-Aug-2017 |
Andrew Scull <ascull@google.com> |
Add HSM AID. This is used by resources related to a hardware security module (HSM). Bug: 64569509 Change-Id: I30d47e1b275e3c4ae0a00f7ceb286a1096d84273
/system/core/libcutils/include/private/android_filesystem_config.h
|
01f7576a3e30c68a7073300d8dac036a0ad98b75 |
|
05-Aug-2017 |
Robert Quattlebaum <rquattle@google.com> |
Add AID for LoWPAN subsystem Bug: b/64399805 Change-Id: Ida6aa60d8beee9151a723826d99c1e9044dc05be
/system/core/libcutils/include/private/android_filesystem_config.h
|
09c89672b6a5ed6e6b6fc3ad28ac309c7ff69170 |
|
02-Aug-2017 |
Yifan Hong <elsk@google.com> |
Move android_filesystem_config.h => fs_config.h The non AID_ things in android_filesystem_config.h are moved to fs_config.h. For libcutils.vendor and libcutils_headers.vendor, fs_config.h is not exported. An empty system/core/include/private/fs_config.h is placed to appease the dependency from certain modules (logd, etc.) that includes system/core/include/private/android_filesystem_config.h directly. Test: m -j Test: BOARD_VNDK_VERSION=current m -j Bug: 63135587 Change-Id: I95dfb874a426941022b100c0ca26a0576b0f4aa3 Merged-In: I95dfb874a426941022b100c0ca26a0576b0f4aa3
/system/core/libcutils/include/private/android_filesystem_config.h
|
d5d327648207d67da85a9a9edbcc36a8f286e345 |
|
23-May-2017 |
Scott Randolph <randolphs@google.com> |
Add AID_EVS for use by the Automotive EVS system The EVS HAL and related software stack will use this id when running daemons that monitor car state, capture and display video, and interact with users. Test: visual inspection Change-Id: I53404c624933b7f55f1292c041c6c712522ab13b
/system/core/libcutils/include/private/android_filesystem_config.h
|
cecbc9993d5f5951e0287922aebbb3fd606166a5 |
|
11-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Merge "Adding 'uhid' permission for access to /dev/uhid."
|
0729dd1edb1e392f60f9a2ad5cc06a84df2ab1f6 |
|
09-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Adding 'uhid' permission for access to /dev/uhid. This CL is in support of another CL c/2048848, topic 'Refactor hid command in /frameworks/base/cmds' in internal master. Adding the permissions for shell here to access uhid_node as part of the new 'uhid' group. Bug: 34052337 Test: Tested on angler, bluetooth mouse works OK. Change-Id: If9e100aa1262d689fb8adc5c0ce93f157c96399e
/system/core/libcutils/include/private/android_filesystem_config.h
|
0de03b53fcf8c5807abbfc71d082f3b9cad031fa |
|
07-May-2017 |
Dan Willemsen <dwillemsen@google.com> |
Assume bionic has up-to-date linux/capability.h The fallback android_filesystem_capability.h doesn't play nicely with other kernel headers, since it #undef's __user. If we're building with bionic (either for device or host), we use the same kernel headers, so just use those. Bug: 38056396 Test: build with Host_bionic:true Change-Id: Idc61b6d96d86891164abe71604924638d67aefe2
/system/core/libcutils/include/private/android_filesystem_config.h
|
fa164739210c1b8188051612b28204373db963fa |
|
17-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Allocate a GID range for external cache files. We can't reuse the GID range for internal cache files, otherwise we don't have a way to tease apart the difference when deciding if it's safe to move apps. Test: builds, boots Bug: 37193650 Change-Id: I22c4e575cd557636e74c5c73035adb1d4dcbb7f7
/system/core/libcutils/include/private/android_filesystem_config.h
|
d185445eee69f0c1f7c4d0da5ebd350c10f07bcf |
|
03-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Revert "Allocate GID to use reserved disk space." This reverts commit 82f8bb785e2beae58a9ea6984a7067530200c236. Sadly, we'd have to extend CAP_SYS_RESOURCE to a bunch of execution domains to make this work, which isn't feasible. Bug: 36450358 Change-Id: Iffe88e45d538c044382eb0d0ac24ff11a10d73c3
/system/core/libcutils/include/private/android_filesystem_config.h
|
82f8bb785e2beae58a9ea6984a7067530200c236 |
|
01-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Allocate GID to use reserved disk space. Filesystems like ext4 allow the setting of the "resgid" parameter to designate a GID that is allowed to use the "reserved" disk space (in addition to UID 0). We'll be granting this GID to critical system processes, so that the system is usable enough for the user to free up disk space used by apps. Test: builds Bug: 36450358 Change-Id: I224bd1e597130edb411a1528872faff1ada02a89
/system/core/libcutils/include/private/android_filesystem_config.h
|
d4e238605733074b7d45c38b960bcada7a25dbd5 |
|
21-Mar-2017 |
Vijay Venkatraman <vijaykv@google.com> |
Moved include/android_filesystem_*.h and canned_fs_config.h to libcutils Bug: 33241851 Test: No changes needed for modules not using VNDK. For VNDK, enable BOARD_VNDK_VERSION in BoardConfig.mk and add libcutils to modules that need these headers. Change-Id: I6102778aab35ed26a5ddde11230502dcd4edc852
/system/core/libcutils/include/private/android_filesystem_config.h
|