History log of /system/core/include/cutils/android_filesystem_config.h
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
8e8648463d74005ac3111235b6bdea9c79d7a34a 05-Feb-2018 Mark Salyzyn <salyzyn@google.com> libcutils: Add "daemon" and "bin" users for testing only

Multiple LTP tests require a "daemon" or "bin" user. These user ids
have been defined since UNIX incept, and even up to the '80s remained
in many of the tools as hard coded values. Add these two ids with
a cautionary note.

Test: compile
Bug: 31152327
Bug: 31226046
Bug: 32385889
Change-Id: Ida2fb6d817b8ada0624870439fcf848667b31fb3
/system/core/libcutils/include/private/android_filesystem_config.h
d506c068d428587503b75dde76f7e938b272c477 05-Jan-2018 Ruchi Kandoi <kandoiruchi@google.com> Add AID for Secure Element Application

Test: Test if the correct uid is assigned to the application
Change-Id: Ib0302a2e90ae89499ecbcebffa393bdd037adfbe
/system/core/libcutils/include/private/android_filesystem_config.h
31b506679ba51bdf625aa1df40d0fe24534ed541 09-Jan-2018 Yi Jin <jinyithu@google.com> Add AID_STATSD and AID_INCIDENTD for statsd/incidentd daemons.

Test: manual
Change-Id: Id798519c3b0116529fc698e6b316a1c6b1c293ca
/system/core/libcutils/include/private/android_filesystem_config.h
354417a7fb856f08a1305b9dc0b3e580d76f833a 05-Jan-2018 Jeff Sharkey <jsharkey@android.com> Allocate GID to use reserved disk space.

Filesystems allow the setting of the "resgid" parameter to designate
a GID that is allowed to use the "reserved" disk space (in addition
to UID 0). We'll be granting this GID to critical system processes,
so that the system is usable enough for the user to free up disk
space used by abusive apps.

Test: builds, boots
Bug: 62024591
Change-Id: I2d166f3b730f0a3e7279fb40f12db7413c1dadad
/system/core/libcutils/include/private/android_filesystem_config.h
e97a4b9799f25b10c50fccb20eb0af69f14fe8dc 02-Nov-2017 Luis Hector Chavez <lhchavez@google.com> libcutils: Make uevent_kernel_* namespace-aware

This change adds user namespace-awareness to uevent_kernel_* in
libcutils. Instead of assuming that root is always uid 0, it detects
whether the uid 0 is mapped in the current user namespace and returns
the appropriately mapped uid (or the kernel's "overflowuid" in case it
is not mapped).

In older kernels, or those where user namespaces are not enabled, this
still uses uid 0 for root.

Bug: 62378620
Test: bullhead networking still works
Test: Android in Chrome OS can now receive netlink-related messages

Change-Id: I7ea3454e8f38b9c70c65294d6b2a99e5a88f9d70
/system/core/libcutils/include/private/android_filesystem_config.h
f73c5e1f8417b4332535553db78fba8937286501 10-Aug-2017 Andrew Scull <ascull@google.com> Add HSM AID.

This is used by resources related to a hardware security module (HSM).

Bug: 64569509
Change-Id: I30d47e1b275e3c4ae0a00f7ceb286a1096d84273
/system/core/libcutils/include/private/android_filesystem_config.h
01f7576a3e30c68a7073300d8dac036a0ad98b75 05-Aug-2017 Robert Quattlebaum <rquattle@google.com> Add AID for LoWPAN subsystem

Bug: b/64399805
Change-Id: Ida6aa60d8beee9151a723826d99c1e9044dc05be
/system/core/libcutils/include/private/android_filesystem_config.h
09c89672b6a5ed6e6b6fc3ad28ac309c7ff69170 02-Aug-2017 Yifan Hong <elsk@google.com> Move android_filesystem_config.h => fs_config.h

The non AID_ things in android_filesystem_config.h are moved
to fs_config.h. For libcutils.vendor and libcutils_headers.vendor,
fs_config.h is not exported.

An empty system/core/include/private/fs_config.h is placed to
appease the dependency from certain modules (logd, etc.)
that includes system/core/include/private/android_filesystem_config.h
directly.

Test: m -j
Test: BOARD_VNDK_VERSION=current m -j
Bug: 63135587
Change-Id: I95dfb874a426941022b100c0ca26a0576b0f4aa3
Merged-In: I95dfb874a426941022b100c0ca26a0576b0f4aa3
/system/core/libcutils/include/private/android_filesystem_config.h
d5d327648207d67da85a9a9edbcc36a8f286e345 23-May-2017 Scott Randolph <randolphs@google.com> Add AID_EVS for use by the Automotive EVS system

The EVS HAL and related software stack will use this id when running
daemons that monitor car state, capture and display video, and interact
with users.
Test: visual inspection

Change-Id: I53404c624933b7f55f1292c041c6c712522ab13b
/system/core/libcutils/include/private/android_filesystem_config.h
cecbc9993d5f5951e0287922aebbb3fd606166a5 11-May-2017 Siarhei Vishniakou <svv@google.com> Merge "Adding 'uhid' permission for access to /dev/uhid."
0729dd1edb1e392f60f9a2ad5cc06a84df2ab1f6 09-May-2017 Siarhei Vishniakou <svv@google.com> Adding 'uhid' permission for access to /dev/uhid.

This CL is in support of another CL c/2048848, topic
'Refactor hid command in /frameworks/base/cmds' in
internal master. Adding the permissions for
shell here to access uhid_node as part of the
new 'uhid' group.

Bug: 34052337
Test: Tested on angler, bluetooth mouse works OK.

Change-Id: If9e100aa1262d689fb8adc5c0ce93f157c96399e
/system/core/libcutils/include/private/android_filesystem_config.h
0de03b53fcf8c5807abbfc71d082f3b9cad031fa 07-May-2017 Dan Willemsen <dwillemsen@google.com> Assume bionic has up-to-date linux/capability.h

The fallback android_filesystem_capability.h doesn't play nicely with
other kernel headers, since it #undef's __user. If we're building with
bionic (either for device or host), we use the same kernel headers, so
just use those.

Bug: 38056396
Test: build with Host_bionic:true
Change-Id: Idc61b6d96d86891164abe71604924638d67aefe2
/system/core/libcutils/include/private/android_filesystem_config.h
fa164739210c1b8188051612b28204373db963fa 17-Apr-2017 Jeff Sharkey <jsharkey@android.com> Allocate a GID range for external cache files.

We can't reuse the GID range for internal cache files, otherwise
we don't have a way to tease apart the difference when deciding if
it's safe to move apps.

Test: builds, boots
Bug: 37193650
Change-Id: I22c4e575cd557636e74c5c73035adb1d4dcbb7f7
/system/core/libcutils/include/private/android_filesystem_config.h
d185445eee69f0c1f7c4d0da5ebd350c10f07bcf 03-Apr-2017 Jeff Sharkey <jsharkey@android.com> Revert "Allocate GID to use reserved disk space."

This reverts commit 82f8bb785e2beae58a9ea6984a7067530200c236.

Sadly, we'd have to extend CAP_SYS_RESOURCE to a bunch of execution
domains to make this work, which isn't feasible.

Bug: 36450358
Change-Id: Iffe88e45d538c044382eb0d0ac24ff11a10d73c3
/system/core/libcutils/include/private/android_filesystem_config.h
82f8bb785e2beae58a9ea6984a7067530200c236 01-Apr-2017 Jeff Sharkey <jsharkey@android.com> Allocate GID to use reserved disk space.

Filesystems like ext4 allow the setting of the "resgid" parameter
to designate a GID that is allowed to use the "reserved" disk space
(in addition to UID 0). We'll be granting this GID to critical
system processes, so that the system is usable enough for the user
to free up disk space used by apps.

Test: builds
Bug: 36450358
Change-Id: I224bd1e597130edb411a1528872faff1ada02a89
/system/core/libcutils/include/private/android_filesystem_config.h
d4e238605733074b7d45c38b960bcada7a25dbd5 21-Mar-2017 Vijay Venkatraman <vijaykv@google.com> Moved include/android_filesystem_*.h and canned_fs_config.h to libcutils

Bug: 33241851
Test: No changes needed for modules not using VNDK.
For VNDK, enable BOARD_VNDK_VERSION in BoardConfig.mk
and add libcutils to modules that need these headers.

Change-Id: I6102778aab35ed26a5ddde11230502dcd4edc852
/system/core/libcutils/include/private/android_filesystem_config.h