9e9970d7ce2ed45d34b8585273b60c6b38783041 |
19-Jun-2018 |
Doheon Lee <doheon1.lee@lge.com> |
Determine product partition path on build time Path of product partitoin can be set as /product or /system/product whether generate extra product partition or not. Substitute %PRODUCT% to relevant path to know linker which path should search and permit. Bug: 110286945 Test: m -j # Check /system/etc/ld.config.$(PLATFORM_VNDK_VERSION).txt Change-Id: I6ca177d0c9c5af00ad821879fece40848331fc8d Merged-In: I6ca177d0c9c5af00ad821879fece40848331fc8d (cherry picked from commit cccad0bf8461ab575a5861f9bc68c9f8f69db582) (cherry picked from commit 93d837f3a90acec007647f21ed4573f044fa6f1e)
ndroid.mk
tc/ld.config.txt
|
987e94eb8f614de55d5ce91276024b7cb0aad78c |
18-Jun-2018 |
Inseob Kim <inseob@google.com> |
Add /system/product/* paths to permitted paths As linker doesn't resolve paths in permitted paths, /system/product variants should be added to support devices having product partition under /system. Bug: 110286945 Test: m -j succeeds on taimen and libraries under /system can dlopen libraries under /system/product/apps Change-Id: Icd102d44511702e4ec66c07a367b59c3d9700a44 Merged-In: Icd102d44511702e4ec66c07a367b59c3d9700a44 (cherry picked from commit 3918936b9e7fee51828d285a1217c7202d5cb2d1) (cherry picked from commit c4cf62f4b4e9186a897e943b2419fb9a13739c1b)
tc/ld.config.txt
|
9bd3ee1c4f14f268b0959edd891ef852b95370b8 |
31-May-2018 |
Inseob Kim <inseob@google.com> |
Support /product/bin Bug: 80422611 Test: m -j succeeded and permissions of files under /product/bin are set correctly Change-Id: I83377d809c47c92da6b226d2853ea6a7462fb127 Merged-In: I83377d809c47c92da6b226d2853ea6a7462fb127 (cherry picked from commit 25195daaca079e048e47b38b83fc41527a89ccb0)
tc/ld.config.txt
tc/ld.config.vndk_lite.txt
|
e5c2de355b3d37015f332af5fc97d535d97f9693 |
04-May-2018 |
Inseob Kim <inseob@google.com> |
Support product-specific libraries Product-specific libraries in /product/lib can be exposed to Android apps by adding the list of the libs into /product/etc/public.libraries-<companyname>.txt. The libs MUST be named as lib<name>.<companyname>.so. Bug: 73095206 Test: with taimen mma -j and runtest.sh. The libs are all loaded in system, but not in vendor. After reinstalling app using adb -r and reopening app, only libraries listed in .txt are loaded Change-Id: I7c386813c72a7b225a7f244b6c5fec4ac0660fd3 Merged-In: I7c386813c72a7b225a7f244b6c5fec4ac0660fd3 (cherry picked from commit 67cb05654cfa677fd5db33ea0629a9496a9ae907)
tc/ld.config.txt
tc/ld.config.vndk_lite.txt
|
428a6ffaf8fb3b9420180a6f54ad4e0f229c96d7 |
22-May-2018 |
Jordan Liu <jminjie@google.com> |
Merge "Add a new directory to store downloaded apns" into pi-dev
|
f0a5bbda88762e5680e1fa3921fd0831e55ca496 |
21-May-2018 |
Niklas Lindgren <niklas.lindgren@sony.com> |
Add a new directory to store downloaded apns downloaded apns-conf.xml will be stored in the folder /data/misc/apns/ to make sure TelephonyProvider gets access. Bug: 79948106 Test: Manual Change-Id: I4ba0596fa6523c0eb96328dbe46ead02587bd9b8 Merged-In: I4ba0596fa6523c0eb96328dbe46ead02587bd9b8
nit.rc
|
fe305ab286cadea129f2b8af01c0132631efc109 |
17-May-2018 |
Paul Crowley <paulcrowley@google.com> |
Add option to create metadata mount point Test: booted metadata-encrypted device Bug: 79781913 Change-Id: Ie922db20314c04409c98700bfb1aff3d111275f0
ndroid.mk
nit.rc
|
6a145749be79978c533b82352cef96f3f7c02524 |
08-May-2018 |
Logan Chien <loganchien@google.com> |
Always use versioned VNDK directory Bug: 78605339 Test: sailfish-userdebug builds and boots Test: sailfish boots with GSI Change-Id: I7da5845b5c1caed3b73d7665f1db672f2764c2a8
ndroid.mk
|
658ae90f699bd21ec8d79b18a34765ed5993c828 |
13-Apr-2018 |
Tim Murray <timmurray@google.com> |
cutils: add restricted cpuset Bug 78197570 Test: CTS Exempt-From-Owner-Approval: owner OOO, build cop says it's fine Change-Id: I6df972950b75a839caa463ae282ad000b959e8ae
nit.rc
|
b35c019d5c8a8dde9bc83f5edd8d579198263a35 |
17-Apr-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add /mnt/vendor rw mount point for vendor partitions." into pi-dev
|
b51147566461d411ad452df81d54dc800c554e06 |
11-Apr-2018 |
Tri Vo <trong@google.com> |
Add /mnt/vendor rw mount point for vendor partitions. Changes to init's behavior during early mount: 1. Mounting of tmpfs on /mnt is moved from init stage to early mount. 2. init creates /mnt/vendor used to mount vendor partitions. 3. If a device tree fstab entry for early mount specifies a mount point under /mnt/vendor e.g. /mnt/vendor/foo, init will create /mnt/vendor/foo mount point. Bug: 64905218 Test: change dt fstab entry to mount persist to /mnt/vendor/persist; mount point is created correctly, and partition is mounted in early mount. See go/pag/1069774 Test: device boots with /mnt/vendor and previous contents of /mnt present, and selinux label "mnt_vendor_file" is applied correctly. Test: cts-tradefed run commandAndExit cts --skip-all-system-status-check --primary-abi-only --skip-preconditions -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.PermissionsHostTest Change-Id: I3739130739eadf508355c7f2531366fcaed74175
nit.rc
|
7fdcbdfc7bd2fc18e64824d1164ad0fc69f4c0e8 |
13-Apr-2018 |
Paul Lawrence <paullawrence@google.com> |
Fix FDE Need a larger tmpfs to stop crashes Need to run start-zygote after mounting the real data Test: Cherry-pick ag/3898232. System boots, can set pattern, system reboots. Wifi works at all points. Bug: 76452634 Change-Id: Id24241db940d352fd3bcdef594b5358854c6f71d
nit.rc
|
fd1aa70a0f05578fb7ac1502255aa62178e7f0ce |
04-Apr-2018 |
Yifan Hong <elsk@google.com> |
healthd: add healthd.rc Split healthd section from init.rc into its own. This allows healthd.rc to be excluded from the build when healthd is excluded. Test: builds Test: exclude healthd from build, healthd.rc is not installed Bug: 77541952 Change-Id: I1c055f14c5862631f359fd0029289da8f43af063
nit.rc
|
e9aaadfb2b26df361411f973d154b3bac45572fb |
29-Mar-2018 |
Logan Chien <loganchien@google.com> |
Allow VNDK-SP extensions to use vendor lib This commit adds a wildcard linker namespace link between the "vndk" namespace and the "sphal" namespace of the system processes. This is created for VNDK-SP-Ext to load vendor libs in "sphal" namespace. Bug: 77249955 Test: lunch aosp_walleye-userdebug && make -j8 # runs unit tests Test: lunch aosp_sailfish-userdebug && make -j8 # runs unit tests Test: Create a VNDK-SP-Ext, link to vendor libs, and run it. Change-Id: I71b0fb604a84272156aa119130c272f891847008 Merged-In: I71b0fb604a84272156aa119130c272f891847008 (cherry picked from commit fbaf9767b51891491903521c24b0d4a1ec1c87e8)
tc/ld.config.txt
|
50108b3f49b22f9c45bb9a3c6730b9f5bbbfb9a3 |
02-Mar-2018 |
Jerry Zhang <zhangjerry@google.com> |
Remove sys.usb.ffs.mtp.ready property With the usb control fd changes, there is no longer a need to wait for this property to trigger before starting the connection. Bug: 72877174 Test: switch config to mtp/ptp Change-Id: Ib29419e7948025be3f3295106cad18943d314f0b
nit.usb.configfs.rc
|
1f70d1cac570550daa67796241f3885dd09f7e2e |
21-Mar-2018 |
Benedict Wong <benedictwong@google.com> |
Merge "Set SPI Allocation Timeout to One Hour" into pi-dev
|
89c9c9b18bec440f1507e686f98af61e9b611cb7 |
13-Mar-2018 |
Benedict Wong <benedictwong@google.com> |
Set SPI Allocation Timeout to One Hour This change increases the default expiration length of an SA to 1h. The IPsec API expects that SPIs are allocated indefinitely, but potential for instability requires that these get cleaned up automatically. As such, the duration was chosen as a sane, but long timeout value. Bug: 72316671 Test: Added CTS tests to enforce this behavior Merged-In: I47aef9cea4a09da253b2ec048a8797af5fa25529 Change-Id: I47aef9cea4a09da253b2ec048a8797af5fa25529 (cherry picked from commit 00308f85540ec1e3557e991811e220455290e4d3)
nit.rc
|
955029aa1baff0c72295cdbf4a4d4211c5947e45 |
19-Mar-2018 |
Jiyong Park <jiyong@google.com> |
/postinstall/* does not search for a lib in /vendor or /odm There has been no section in the linker config file for the binaries under /postinstall. As a result, the binaries were run with the legacy default config where /vendor/lib and /odm/lib are added to the search paths. This is causing selinux denials as the binaries for OTA are not allowed to access /vendor/lib or /odm/lib, but the dynamic linker calls realpath(3) on the paths to canonicalize them. Fixing the issue by letting /postinstall/* binaries to run with a dedicated linker namespace config, where /vendor/lib and /odm/lib are not added to the search paths. Not having the paths is okay because he OTA binaries should not have dependency to the libs there. Bug: 75287236 Test: do the OTA, selinux denials on postinstall_file is not shown Test: above test should pass on wahoo, marlin and pre-treble devices Merged-In: I49c11a0929002adfef667890c0a375c2b41054f4 Change-Id: I49c11a0929002adfef667890c0a375c2b41054f4 (cherry picked from commit d7e6cb27b6758fe96b200dde33b75dbe5ba5bf6b)
tc/ld.config.legacy.txt
tc/ld.config.txt
tc/ld.config.vndk_lite.txt
|
6795ef7bb2c2dde730174a3ccac15aef96818415 |
14-Mar-2018 |
Bowgo Tsai <bowgotsai@google.com> |
Support /odm partition Bug: 64195575 Test: boot a device Change-Id: I52c0da32aef80c060f6efa47ddf62577fb543ad8 Merged-In: I52c0da32aef80c060f6efa47ddf62577fb543ad8 (cherry picked from commit 39476ffd8a7c299df2f1980e16435a17a5b18256)
tc/ld.config.txt
|
ca8b2c699584cc498ff5f761fca9789c54ea1219 |
15-Nov-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Adding /odm support Treble system-as-root GSI needs to work on devices with and without /odm partition. This change creates the following symlinks for devices without /odm partition: /odm/app ->/vendor/odm/app /odm/bin ->/vendor/odm/bin /odm/etc ->/vendor/odm/etc /odm/firmware ->/vendor/odm/firmware /odm/framework ->/vendor/odm/framework /odm/lib -> /vendor/odm/lib /odm/lib64 -> /vendor/odm/lib64 /odm/overlay -> /vendor/odm/overlay /odm/priv-app -> /vendor/odm/priv-app For devices with odm partition, /odm will be used as the mount point and those symlinks will be hidden after mount. Bug: 70678783 Test: boot a A/B device without /odm partition, checks those symlinks exist Test: boot a A/B device with /odm partition, checks those symlinks don't exist Change-Id: I4d960b52e2754f461188f3ab562c751f502046ea (cherry picked from commit 00749affc4a9185953d7444c88f614c5b7694504)
ndroid.mk
|
0ee6c22f58e29c9ae4a0c07f19a6b8e81b8f46ad |
15-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
Merge "init.rc: Mount /mnt with nodev,nosuid,noexec" am: 6698482ca4 am: 0802d45683 am: cfd9a3af86 Change-Id: I9be6cffa4deb4df7c4b781e2900d7fa79fd558ca
|
b0d8b26e0fc415742bde933f61cd050284981624 |
15-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
Merge "init.rc: Remount / with MS_REMOUNT|MS_BIND" am: 008576080e am: c37d85953e am: 655d6d5451 Change-Id: Idb18188ad9b3b667411d428ae616498748b8281a
|
465c8f307f4506afca18cfb0d88cce433117e613 |
14-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
init.rc: Add nodev,noexec,nosuid to /config This change adds some additional flags to the /config mount. This is to reduce the number of mounts with unnecessary privileges. Bug: 73255020 Test: aosp_sailfish still boots Test: CtsAppSecurityHostTestCases {ExternalStorageHostTest,StorageHostTest} Change-Id: If3409d917cdf76a67ebfb7c4035a3ae8fee6189f
nit.rc
|
081aa0a303ab09f10741d2ac2b1a409710792c72 |
14-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
init.rc: Mount /mnt with nodev,nosuid,noexec This change adds some additional flags to /mnt. This is to reduce the number of mounts with unnecessary flags. Bug: 73255020 Test: aosp_sailfish still boots Test: CtsAppSecurityHostTestCases {StorageHostTest,ExternalStorageHostTest} Test: CtsOsTestCases StorageManagerTest Test: find /mnt | egrep -v '^/mnt/runtime/(default|read|write)/emulated' | \ xargs ls -lZd # Shows no character devices or executable files Change-Id: I54739133119d9626ebeb2ef9a1c127f7a90fa098
nit.rc
|
30780a73053d968460cbe9595f8024de07460c4e |
14-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
init.rc: Remount / with MS_REMOUNT|MS_BIND Since we only want to change the ro flag on / (and leave all other mount flags alone), this can also be achieved by passing MS_REMOUNT|MS_BIND, even if the mount is not a bind-mount. This aims to make running Android within a user namespace easier, since remounts without the MS_BIND flag are forbidden. Bug: 73255020 Test: aosp_sailfish still boots Test: rootfs on / type rootfs (rw,seclabel) /dev/root on / type ext4 (ro,seclabel,relatime,data=ordered) Change-Id: I2f89a8badfc467db47304c9355648e8fd8ad1272
nit.rc
|
f88ab0b4ec907a1495751de83ef8db9ca6cb0b43 |
14-Feb-2018 |
Justin Yun <justinyun@google.com> |
Merge "Move libz to llndk from vndk-sp for non-VNDK-enforced devices." am: 524254f3df am: 7987a191f6 am: e86a98bfac Change-Id: I894549e82aebc48e39133ccc9138410b7ce70c82
|
8065a608a68cfec6b843a668b255b75afdffc400 |
14-Feb-2018 |
Justin Yun <justinyun@google.com> |
Move libz to llndk from vndk-sp for non-VNDK-enforced devices. For non-VNDK-enforced devices, libz cannot be installed in vndk-sp to avoid CTS test failure. Move libz to llndk from vndk-sp for generating the namespace configuration from ld.config.vndk_lite.txt. Bug: 73296261 Test: run android.jni.cts test on marlin/sailfish Change-Id: I1b8b43cd87dc8dfdd2667001ae1e50d9eaedf93d
ndroid.mk
|
9420397267ae469e089af314b56bb3c6fc919a0e |
14-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
Merge "init.rc: Perform some mounts with nodev,nosuid,noexec" am: cd66e4c6ea am: 8cb681fa1f am: c876c660e0 Change-Id: I588550f4cad7e18067d916a6e1b4eed3b1fb2265
|
f8a7e37b2de50eb7a2bcd59b305adb8f68f204c1 |
12-Feb-2018 |
Luis Hector Chavez <lhchavez@google.com> |
init.rc: Perform some mounts with nodev,nosuid,noexec This change adds some additional flags to some mounts. This is to reduce the number of mounts with these flags. Bug: 73255020 Test: aosp_sailfish still boots Change-Id: I285e6d7b3dcc19f691a3d6780e7d3a3a5d7cb3de
nit.rc
|
eab887b60ecb11ba2e3c71fd087878e3a3d3858c |
08-Feb-2018 |
Justin Yun <justinyun@google.com> |
Merge changes from topic "vndk-sp-list-update" am: 4c0ee1e8a0 am: 6edfca6e3b am: 0d77d80aad Change-Id: I366d50eee8edb40f243c551a2051d5efebdb3e72
|
27bdc37facad2e88d631c3b5f3bb42bd2b784c78 |
08-Feb-2018 |
Justin Yun <justinyun@google.com> |
Rename namespace configuration source files. For strict VNDK runtime restriction, use ld.config.txt as a source file. For treblized devices without BOARD_VNDK_VERSION, use ld.config.vndk_lite.txt file. Test: Build and boot on Pixel 2017 and 2018 devices. Change-Id: Ie5b77facd4c11bc73219ecf13ad1298ac5d60d8e
ndroid.mk
tc/ld.config.txt
tc/ld.config.vndk.txt
tc/ld.config.vndk_light.txt
tc/ld.config.vndk_lite.txt
|
8a9a8eeb853ab6ebb5ec26bf50d731f08c32ad5d |
02-Feb-2018 |
Justin Yun <justinyun@google.com> |
Use actual VNDK list for non-VNDK-enforcing devices Rename ld.config.txt.in to ld.config.vndk.txt and ld.config.txt to ld.config.vndk_light.txt. For FULL_TREBLE devices without BOARD_VNDK_VERSION, update the VNDK library list in ld.config.vndk_light.txt with the actual VNDK list. Bug: 69526027 Test: Build marlin/sailfish and check boot Change-Id: Idbb0cc97d11037c1493d4739e84961297ce51dbd Merged-In: Idbb0cc97d11037c1493d4739e84961297ce51dbd
ndroid.mk
tc/ld.config.txt
tc/ld.config.txt.in
tc/ld.config.vndk.txt
tc/ld.config.vndk_light.txt
|
181056b424a9439017e4221553e94b81cac3420c |
02-Feb-2018 |
Justin Yun <justinyun@google.com> |
Use actual VNDK list for non-VNDK-enforcing devices Rename ld.config.txt.in to ld.config.vndk.txt and ld.config.txt to ld.config.vndk_light.txt. For FULL_TREBLE devices without BOARD_VNDK_VERSION, update the VNDK library list in ld.config.vndk_light.txt with the actual VNDK list. Bug: 69526027 Test: Build marlin/sailfish and check boot Change-Id: Idbb0cc97d11037c1493d4739e84961297ce51dbd
ndroid.mk
tc/ld.config.txt
tc/ld.config.txt.in
tc/ld.config.vndk.txt
tc/ld.config.vndk_light.txt
|
5b3196430b0c734826a8a6581b78af49a6cd9575 |
05-Feb-2018 |
bohu <bohu@google.com> |
Merge "emulator: not start adbd upon ro.kernel.qemu=1" am: 7c271bdc3b am: 466b098b87 am: 83255e337a Change-Id: I26732caa7cc8346e27ec4c8e4816b5cace2577cd
|
b40193e50a0b6128cb33436807413aae8f2e3354 |
04-Feb-2018 |
bohu <bohu@google.com> |
emulator: not start adbd upon ro.kernel.qemu=1 clean up emulator specific rules. BUG: 72900827 Change-Id: Ica60838562fd773bcde5752c11586183ce55b71a
nit.usb.rc
|
1519e3c9b394ce430dde93e15aa7dad5d8233c41 |
26-Jan-2018 |
Logan Chien <loganchien@google.com> |
Merge "ld.config.txt: Link vendor vndk ns to default ns" am: 1e11f5f709 am: 161efac4f0 am: f20d8a1f1e Change-Id: I915c4409df864bbb69ccb9b8f684c98ce3a3892d
|
1e11f5f709e1e2ce43de276052500d2a713d0687 |
26-Jan-2018 |
Logan Chien <loganchien@google.com> |
Merge "ld.config.txt: Link vendor vndk ns to default ns"
|
207a211804a60cb46d7ee9785c5055968e609188 |
25-Jan-2018 |
Jaekyun Seok <jaekyun@google.com> |
Merge "Support /product partition" am: 8f324542a2 am: 10e1ec7de3 am: 83ffef2cb1 Change-Id: Ia1933bbede3db2489151e5ab8ead574582b87f7a
|
dff165d3a2db868689bae12db1ed8b3c74fa7d60 |
27-Nov-2017 |
Jaekyun Seok <jaekyun@google.com> |
Support /product partition This CL will enable reading /product/build.prop and add product paths into ld.config.txt.in. Bug: 64195575 Test: tested with 'PRODUCT_PRODUCT_PROPERTIES := ro.product.abc=abc' on sailfish Change-Id: Ie996def20e25dc1afe0c74af2096af844934b2dc
ndroid.mk
tc/ld.config.txt.in
|
a03134ea22e13092d9a0979ceff79bfe0ce6485e |
22-Jan-2018 |
Andreas Huber <andih@google.com> |
Fingerprint data is now stored in one of two ways depending on the shipping API version: For devices shipped before Android P nothing changes, data is stored under /data/system/users/<user-id>/fpdata/... Devices shipped from now on will instead store fingerprint data under /data/vendor_de/<user-id>/fpdata. Support for /data/vendor_de and /data/vendor_ce has been added to vold. Bug: 36997597 Change-Id: I83f87e88d1731e515b459a3d6d5bf3104afe6cfe Test: manually
nit.rc
|
ea4a2bdd448ae6811d3073b2ee3f04632739c9cf |
17-Jan-2018 |
Logan Chien <loganchien@google.com> |
ld.config.txt: Link vendor vndk ns to default ns This commit links the vndk namespace of vendor processes to the default namespace of vendor processes. allow_all_shared_libs is specified so that VNDK extensions can link with other vendor libraries in /vendor/lib[64]. Bug: 69824336 Test: Create a vndk-ext lib that links to vendor lib and use that vndk-ext lib in a vendor executable. Change-Id: Ibd3dc2e5f0f2e6ff9fc9677c6bcfcf87a1a70e50
tc/ld.config.txt.in
|
736e4f10799716fb89d3022fc6a1225825d392ef |
23-Jan-2018 |
Logan Chien <loganchien@google.com> |
Merge "ld.config.txt: Move vendor vndk to vndk namespace" am: c6805c3e9c am: 0779a259b7 am: 5aa3d78ea7 Change-Id: I68cbb5429e57f6f2a72775c5fc50b4b5e20b8cd4
|
91b3fb4f3f172d1c314415d7b05873872951e08c |
11-Jan-2018 |
Logan Chien <loganchien@google.com> |
ld.config.txt: Move vendor vndk to vndk namespace This commit moves /{odm,vendor}/lib[64]/vndk[-sp] to vndk namespace so that vndk extension can override vndk libs from /system/lib[64]/vndk[-sp]. Bug: 69824336 Test: Create libutils_ext locally and it can be called from android.hardware.nfc@1.0-service. Change-Id: Id63e58d665fa41eda85950ee1d16fe06c35cd7d3
tc/ld.config.txt.in
|
905c99b80e94b5a25f71543a4fdc51351801e0f9 |
20-Jan-2018 |
Max Bires <jbires@google.com> |
Merge "Adding /data/local/traces for traceur app" am: 658e4ddd03 am: 69c428e5a6 am: cd4fa12263 Change-Id: I0ba68a132cc840b0d5b63a9d22b54276b8c168de
|
658e4ddd0398ca65936359b26390cb293d202899 |
20-Jan-2018 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Adding /data/local/traces for traceur app"
|
82b85d0b7c0dc843104f97d7d5c80b4de43df457 |
19-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Change /configfs/sdcardfs to 0770"
|
181d11c5cb4d0dc10216e1aa89b8e2510f87b85c |
18-Jan-2018 |
Max Bires <jbires@google.com> |
Adding /data/local/traces for traceur app Traceur app is being split out of shell user. Previously it logged to shell's bugreports directory. It no longer has access, so it needs a new, user-friendly file location to store trace data. Bug:68126425 Test: Traceur can write and shell can read from this directory Change-Id: I9e344973fd43eb5699f7a848524e20b06458fb77
nit.rc
|
93b1df1cd114e951ad21003a858aa14873c42557 |
17-Jan-2018 |
Justin Yun <justinyun@google.com> |
Merge "Add VNDK version suffix in ld.config.txt on build time." am: 447280cea0 am: 3060be356f am: 5a31c03fa6 Change-Id: Ie58dca02b6f267b882b8f1f59cda57c141c8892c
|
cbbf195e46fcd1ea0ec6449739608b41c9a242be |
16-Jan-2018 |
Justin Yun <justinyun@google.com> |
Add VNDK version suffix in ld.config.txt on build time. As we use different ld.config.txt per version, we don't need to substitute the VNDK_VER on run time. Remove all ${VNDK_VER} from the linker namespace configuration files. Bug: 70603313 Test: build and boot GSI for walleye and sailfish Change-Id: Ief8aee5c3308b2462cafaffc2423deda4e51a7bb
ndroid.mk
tc/ld.config.txt
tc/ld.config.txt.in
|
128274a3f2dd7f09d23098f6fcc501596620e9e2 |
17-Jan-2018 |
Oscar Shu <xshu@google.com> |
Merge "Firmware dump create directory" am: da007e0deb am: b4d9751eab am: b8deb4de2f Change-Id: I3eba1b745d75d8cc0a3eba7cf0fea7ad54b992c2
|
da007e0deb1f7149565766ae72499e48fb821bf0 |
17-Jan-2018 |
Oscar Shu <xshu@google.com> |
Merge "Firmware dump create directory"
|
dc95eeadf41ce40650d9f12f53ffa47e43ba81b4 |
16-Jan-2018 |
Chenbo Feng <fengc@google.com> |
Merge "Mount eBPF file system and cgroupv2 root directory" am: 4719ecd28c am: 7a65861d7c am: 94cff89571 Change-Id: Id2a58f55f16994dba0b6dbf86d4724943dbc8141
|
2cba6f2e0e9b6a53fc90cddd30f668c1d5131923 |
23-Oct-2017 |
Chenbo Feng <fengc@google.com> |
Mount eBPF file system and cgroupv2 root directory Mount the eBPF file system under /sys/fs/bpf to allow netd to pin and retrieve persistent eBPF map object from the file system. It helps the system to maintain a consistent eBPF data store when netd crashed and restart. Mount the cgroupv2 module and use the root folder of it to monitor network statistics through eBPF program attached. Test: eBPF map object show up under /sys/fs/bpf after netd start. Bug: 30950746 Change-Id: Ie475112116603798fe75a75c5a84f4bbe5b942ec
nit.rc
|
538caefba9681b9f58e105dd3fc25585d4bdbeca |
16-Jan-2018 |
Jeff Vander Stoep <jeffv@google.com> |
Merge "OWNERS: add myself" am: 4ba3ebbc2f am: d64b97e0fd am: 14bf561f03 Change-Id: Idf3ff9fe3089b8a9788cbe260e94456b680d1dc6
|
9a7a5b61c4db8c0c8f04526767d36c6ab62144b4 |
18-Dec-2017 |
xshu <xshu@google.com> |
Firmware dump create directory Setting up infanstructure for vendor tombstone in dir: /data/vendor/tombstones Wifi specific dumps will go into: /data/vendor/tombstones/wifi Bug: 70170285 Test: compile, run on device. Change-Id: Ie16dd8236d9b5df19adb9818b4c62ce01e0d0b10
nit.rc
|
e2f77d8ef1fb417da407443facb9289b1107067d |
12-Jan-2018 |
Jeff Vander Stoep <jeffv@google.com> |
OWNERS: add myself Test: none Change-Id: I150226c19370a2c5f06781003ec88befa0e91da7
WNERS
|
79035230155859111b8a8c922d7b123e359f6039 |
29-Nov-2017 |
Daniel Rosenberg <drosen@google.com> |
Change /configfs/sdcardfs to 0770 Change-Id: I0a66f6b3ebc3dee398e4f23f5a58ebf7d62cc4c3 Bug: 69929297 Test: setenforce 0 su mkdir /config/sdcardfs/test su u0_a0,u0_a0,u0_a0 echo 10000 > /config/sdcardfs/test/appid Write should fail Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
|
d7bfaea62b07d1f6104d2ccad445e2b084b6e946 |
11-Jan-2018 |
Justin Yun <justinyun@google.com> |
Merge "Do not append VNDK version if VNDK is not used" am: 4d281880e0 am: 9c378b0e37 am: 30ac0d7a27 Change-Id: I4493f92bf877d9a792837df5c062570f972a6901
|
dd16301babc01b0d3f49d297097c8a61d8b45863 |
10-Jan-2018 |
Justin Yun <justinyun@google.com> |
Do not append VNDK version if VNDK is not used If BOARD_VNDK_VERSION is not defined, ro.vndk.version will not be set. In this case, the device, is not able to use versioned configuration files. Check BOARD_VNDK_VERSION to append the VNDK version to the namespace configuration files. Bug: 71730104 Test: Check boot on both 2016 and 2017 Pixel devices. Change-Id: I1df27c75de42a526768a156387f22a934cda6d72
ndroid.mk
|
439efda1e7b3bdff31fc9690f24236a0106d32a2 |
09-Jan-2018 |
Siarhei Vishniakou <svv@google.com> |
Merge "Allow input system access to /dev/v4l-touch" am: f6363989f4 am: 31209d7ada am: f82541140b Change-Id: I7ea315e14fc97ade4f49293b13fc8438b4e19024
|
f6363989f42f6b9b13ff4ce86618192616a1665c |
09-Jan-2018 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Allow input system access to /dev/v4l-touch"
|
fc86b1fee0d4681f20888c55aa64b1508d76915b |
09-Jan-2018 |
Justin Yun <justinyun@google.com> |
Merge "Removed unused part in ld.config.txt.in" am: 8fa3e72846 am: 7b7339d339 am: ebf514bab3 Change-Id: Ib94c656453658409081f6820a5901ab75de8fa60
|
939f06b4291060855275dc79a69d55de68a9cb89 |
08-Jan-2018 |
Justin Yun <justinyun@google.com> |
Removed unused part in ld.config.txt.in In the namespace with "isolated = false", "permitted.paths" is not used. Bug: 71727966 Test: walleye device boot Change-Id: I6f624be3c4e2c4070bb784632d0757408ec12db0
tc/ld.config.txt.in
|
f431cd84e4dd33adb70baa1e6d7266d1a4ed9452 |
09-Jan-2018 |
Jeff Sharkey <jsharkey@android.com> |
Merge changes from topic "resgidz" am: a7004e5fed am: b162da3a47 am: c16340c646 Change-Id: Iaf01b79c1e51f4cba06ee9ea6227c00a3cec4d4d
|
a1c597896740706bf601ac557001d67ec2f53ccc |
09-Jan-2018 |
Steve Muckle <smuckle@google.com> |
Merge "rootdir: make sure the /odm mountpoint is always available" am: fcec40de0b am: ada4b7782d am: 34f29a86fd Change-Id: Icbc30f9ed92163119307d7c5f25e06d9cd93e9a4
|
a7004e5fedff5d7cdeaae120f561ac2e8bfb16e7 |
08-Jan-2018 |
Jeff Sharkey <jsharkey@android.com> |
Merge changes from topic "resgidz" * changes: Add reserved disk GID to critical component. Set reserved GID when setting reserved blocks. Allocate GID to use reserved disk space.
|
9410d572fb6202727580fa62815b694998b6421f |
06-Jan-2018 |
Jeff Sharkey <jsharkey@android.com> |
Add reserved disk GID to critical component. We recently created a new GID that can be granted to critical system processes, so that the system is usable enough for the user to free up disk space used by abusive apps. Test: builds, boots Bug: 62024591 Change-Id: Ia5af7535cc05a214f8720ac08c594c6db888597a
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
1a3e3065fb07e72a8e0a0790a728b598bfc23b67 |
04-Jan-2018 |
Steve Muckle <smuckle@google.com> |
rootdir: make sure the /odm mountpoint is always available The odm partition will eventually be required. Prepare for this by creating its mount point. Bug: 37322799 Test: run cts-dev -m CtsPermissionTestCases Change-Id: Ibd031b68dd7328c853ded401bb2690dbd6675141
ndroid.mk
|
02fbb27e73c8e2583ffdadb5d2a7dede11f04ddf |
03-Jan-2018 |
Ricky Wai <rickywai@google.com> |
Merge "Create Network Watchlist data folder for ConfigUpdater"
|
38d4352fce8ee48dcdc5cff721191802fb32ea1d |
23-Dec-2017 |
Siarhei Vishniakou <svv@google.com> |
Allow input system access to /dev/v4l-touch Bug: 62940136 Test: read /dev/v4l-touchX from inputflinger Change-Id: I394686e4167855f50ddd6ff9aebcf3c94f6550b0
eventd.rc
|
2fd29edc710004211a7ceb669705fee304aba32b |
21-Dec-2017 |
Logan Chien <loganchien@google.com> |
Merge "Separate VNDK libs into another linker namespace" am: b00ed37a66 am: 3d5afa7b34 am: 2a736774dc Change-Id: I11667b8f5e5bb450fb355fcfc6d1e533be78958c
|
b00ed37a66d42357f542f4bd74fef0af02342667 |
21-Dec-2017 |
Logan Chien <loganchien@google.com> |
Merge "Separate VNDK libs into another linker namespace"
|
3688e713e78d069fc352c53ab7beaec5b4a84444 |
20-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Merge "/vendor/lib/hw is removed from search paths for vendor default ns" am: 3388af49e6 am: 17f0ae765e am: b7d35b7d09 Change-Id: Ib638acc46f3c96ca459755a06df977799dd90822
|
3388af49e6953c9d01a6b522dd741f4d073d2de6 |
20-Dec-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "/vendor/lib/hw is removed from search paths for vendor default ns"
|
483cd2e2fe99a70a33679f1cce1fca3cb8399c49 |
19-Dec-2017 |
Jiyong Park <jiyong@google.com> |
/vendor/lib/hw is removed from search paths for vendor default ns Shared libraries in the directory should be dlopened with full file paths. That was a workaround for some legacy prebuilt binaries and they are all now fixed. Thus removing. Bug: 70551668 Test: walleye, aosp_walleye, taimen, aosp_taimen boot to the UI Change-Id: Ifb123b09c13f873cbefa7784e76dfe5f35575a8d
tc/ld.config.txt
tc/ld.config.txt.in
|
225b71d8c58a85994d074f077493b1b32d07d3b5 |
15-Dec-2017 |
Logan Chien <loganchien@google.com> |
Separate VNDK libs into another linker namespace This commit extracts /system/lib[64]/vndk and /system/lib[64]/vndk-sp into another namespace in the vendor section. This commit is necessary because LLNDK libraries (e.g. libc or libnativewindow) may otherwise link to the shared libraries in /system/lib[64]/vndk-sp, which may be older than the one LLNDK libraries built with. Test: aosp_walleye boots Bug: 70816018 Change-Id: I6fceb0da92c978ad940af91f5efe84e673c9247e
tc/ld.config.txt.in
|
0327278abfb066b37fa7bc898e85f7bd435ad9dd |
18-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Do not use versioned VNDK directory in vendor partition" am: 3459e5823e am: c56fafa4fc am: 963685ed53 Change-Id: Ib19db37bdb6d030806f42ac9ecbeb88f71007456
|
88d5dcbd81d22462c54bdff301cb8580852b4795 |
27-Oct-2017 |
Ricky Wai <rickywai@google.com> |
Create Network Watchlist data folder for ConfigUpdater Bug: 63908748 Test: Able to boot Change-Id: I8db6b5706cce17a60e2a7db9be80020f8681531d
nit.rc
|
baca81639c65abac99191cd547ec7fec14137b54 |
15-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Re-format ld.config.*.txt files" am: eef035f641 am: ca33a874fe am: 6546c650fa Change-Id: If26449caae94fb2e372c382d25033930f3c6d5b5
|
60a2966fc91b776fdbc3d3f21d7d3820625480cd |
13-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Do not use versioned VNDK directory in vendor partition Paths for extended VNDK libs don't need version suffix, because there always is the single version that the vendor(odm) modules are built against. Bug: 70601582 Test: walleye boots to the UI. Test: No further test is possible since we don't have extended VNDK yet in our source tree. Change-Id: Idbf4bb820ddb136d00744f64ddf6ebe6442ad16e
tc/ld.config.txt
tc/ld.config.txt.in
|
2498e1b1d3b060775a11990bea1212baa042b93c |
12-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Re-format ld.config.*.txt files Re-format the files by splitting lines using +=. Also add /odm/${LIB} where needed. A few directories that are no longer required are removed from the search paths and permitted paths. Test: walleye and sailfish boots to the UI, renderscript, camera, camcodder, sound, etc. are working. Change-Id: I3150f0c3d35130d6b1a665e3f0813d33b1b7f546
tc/ld.config.legacy.txt
tc/ld.config.txt
tc/ld.config.txt.in
|
97772e425b44d5967a6e2716b1e9215fcc157f88 |
12-Dec-2017 |
Logan Chien <loganchien@google.com> |
android.hardware.graphics.allocator@2.0 is no longer VNDK-SP The interface lib has been in VNDK-SP because android.hardware.graphics.mapper@1.0 was using it. However, since the dependency has gone [1], there is no need keep it in VNDK-SP. The VNDK-SP set should be kept as small as possible because libs in VNDK-SP are subject to double-loading. [1] https://android.googlesource.com/platform/hardware/interfaces/+/79d13ff0f5cd3c4242445baf5b2f01a52f0ed06f Bug: 69480083 Test: /system/lib64/vndk-sp/android.hardware.graphics.allocator@2.0.so disappears. Test: sailfish boots Change-Id: I0e6518f169dd620d6b1a9ada47754e371ef4a739 Merged-In: I0e6518f169dd620d6b1a9ada47754e371ef4a739 (cherry picked from commit 9d898f3678f8ecc7fb35107c36f73c1fc9235848)
tc/ld.config.txt
|
52a2137d05e889dcee0d5d7f68811c1437189e3d |
13-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Merge "/vendor/priv-app is added to the permitted paths for the default ns" am: 5dde5e38d2 am: 3c28804815 am: d1a4cbd742 Change-Id: I0ca43f5107d451ecbdb1674fd1436292b9aa3506
|
3f663e0b29ea34466abc2e1c6b33d957b1f38df5 |
13-Dec-2017 |
Vishwath Mohan <vishwath@google.com> |
Merge "Fix asan permitted paths in the default namespace." am: 32c03800c0 am: 22e81897b2 am: c75631bc5e Change-Id: Ibf5767decc7e5b3b26b389e37caeab33f7986da3
|
5029612451970bb1d4065704a15dfd52ae685385 |
13-Dec-2017 |
Justin Yun <justinyun@google.com> |
Merge "Add VNDK version for namespace configuration files" am: a6e6780418 am: a159b310d6 am: 635ddcb894 Change-Id: I791663afc81779ce2306b909db46eb82e895a32c
|
5dde5e38d28ed083b2ea226ddad39bae17cba434 |
13-Dec-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "/vendor/priv-app is added to the permitted paths for the default ns"
|
32c03800c02b34cbf877708836741b80cc50cb23 |
13-Dec-2017 |
Vishwath Mohan <vishwath@google.com> |
Merge "Fix asan permitted paths in the default namespace."
|
bf24c70ad48ba9c38714d6ed4f57e27f28e9478c |
13-Dec-2017 |
Logan Chien <loganchien@google.com> |
Merge "android.hardware.graphics.allocator@2.0 is no longer VNDK-SP"
|
210ff9485dd1401962d2dffc8c6a20bf28550bb7 |
07-Dec-2017 |
Justin Yun <justinyun@google.com> |
Add VNDK version for namespace configuration files If PLATFORM_VNDK_VERSION is set to a version other than "current", add the version to the file names of the namespace configuration files. Bug: 69883025 Test: device boot Change-Id: I27377549581125b6c750c1422d0ee4a607dda5e8
ndroid.mk
|
cede134907f2703e564a9db489ec3c660132edbe |
13-Dec-2017 |
Vishwath Mohan <vishwath@google.com> |
Fix asan permitted paths in the default namespace. This CL fixes an error with the asan permitted paths in ld.config.txt.in. Bug: 63927538 Test: lunch walleye_asan-userdebug && m -j40 Change-Id: Ica0504cb52ef6e6b3e4ce2deae3ce5984e38cc93
tc/ld.config.txt.in
|
9c6587ad1fde2f0b820634b5af5007897ef328c0 |
12-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Use normalize-path-list" am: c034cd5d04 am: f01f51c41f am: 4c550887a6 Change-Id: I8d6ef704857de733cdfd380fd28271329e206d3b
|
9d898f3678f8ecc7fb35107c36f73c1fc9235848 |
12-Dec-2017 |
Logan Chien <loganchien@google.com> |
android.hardware.graphics.allocator@2.0 is no longer VNDK-SP The interface lib has been in VNDK-SP because android.hardware.graphics.mapper@1.0 was using it. However, since the dependency has gone [1], there is no need keep it in VNDK-SP. The VNDK-SP set should be kept as small as possible because libs in VNDK-SP are subject to double-loading. [1] https://android.googlesource.com/platform/hardware/interfaces/+/79d13ff0f5cd3c4242445baf5b2f01a52f0ed06f Bug: 69480083 Test: /system/lib64/vndk-sp/android.hardware.graphics.allocator@2.0.so disappears. Test: sailfish boots Change-Id: I0e6518f169dd620d6b1a9ada47754e371ef4a739
tc/ld.config.txt
|
b52ff3e247da5de1820404ed2efbd97e569f24e1 |
11-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Use normalize-path-list Let's use the existing macro. Test: build walleye, boots to the UI. Change-Id: Ic23d3454c629a02bfd96d0ca19c0c5c068ae7a03
ndroid.mk
|
9797e0f35e99aa748479e6cb2e60d77fe6989052 |
12-Dec-2017 |
Andreas Gampe <agampe@google.com> |
Merge "ASAN: Remove old list of services" am: e78accb103 am: fc7a327a4a am: 428fb9525e Change-Id: I044b3ec691e5f711de62590847f672161a0ce3c7
|
e78accb103bf29209a5f2c241e711628f639fe6c |
12-Dec-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "ASAN: Remove old list of services"
|
27b8fcdfcfeb4552daac3441a667fbbb09a8b119 |
11-Dec-2017 |
Andreas Gampe <agampe@google.com> |
ASAN: Remove old list of services Remove list of services and support for asan.options. This has not been used in a while, and there is contention about listing names of device-specific services. Bug: 70387666 Test: m Change-Id: I766c6b3a0c44b6b992a3259a3c4215a688452907
ndroid.mk
san.options.off.template
|
588f5ba383147c742f7ae001f5861a343798727c |
11-Dec-2017 |
Justin Yun <justinyun@google.com> |
Merge "Use versioned VNDK directories in ld.config.txt" am: 84de4c0a89 am: 27e44ad179 am: c82c963e28 Change-Id: I4ac01e17f3930635b900128220d923312b2fbb6d
|
44bb46f60446c00a2869fac212530a2238dbf2a0 |
07-Dec-2017 |
Justin Yun <justinyun@google.com> |
Use versioned VNDK directories in ld.config.txt All vndk/vndk-sp directories will have version suffix if "ro.vndk.version" is set. Bug: 69984421 Bug: 66074376 Test: Build with BOARD_VNDK_VERSION=current and BOARD_VNDK_RUNTIME_DISABLE=true. Check boot. Change-Id: I03849f9f96bc6c7880aa70c517e963aab4e033b8
tc/ld.config.txt
|
fd3225492b4b8f683b3028e9f17dda269a240a2a |
09-Dec-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Fix media on W/T"
|
3e2b34136a19aed6fb9fb6a63637bc808fd5dd35 |
08-Dec-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add OWNERS." am: 3289b9c928 am: 515c8fe572 am: aede8375fe Change-Id: I28f7a8f3fa9c9837f4043768e70c0d985ed95abd
|
3d0fc2a60b39fd51e2726f9315d25b409a8f4cd6 |
08-Dec-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add a /bin symlink for convenience." am: dcc0f8f76b am: 7a54ed9e28 am: 17197ac3e0 Change-Id: I1371ba22037f4466ec2799bb5a8b5056d57a2de2
|
b07cc5e0c0c3743e014b940b0585bdbeb392d733 |
08-Dec-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge changes I3978cbe2,I7b8e1232 * changes: Reland "Prevent vendors from accessing private VNDK libs" Permitted and search path change
|
3289b9c9282dec777363256e27fcc23cd97001c1 |
08-Dec-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add OWNERS."
|
693d63f9cfc21e3334c6f8f228d73c4fb60ced8b |
07-Dec-2017 |
Elliott Hughes <enh@google.com> |
Add OWNERS. Bug: N/A Test: N/A Change-Id: Ie785058c0f5eb9b4086c98ccba6e63e3ed411b65
WNERS
|
dcc0f8f76b6f8bc4ce9e747e0798b6791c4ebed4 |
07-Dec-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add a /bin symlink for convenience."
|
d083db9bc9592f9054ae3124b2a53656bf04e4bd |
29-Nov-2017 |
Jiyong Park <jiyong@google.com> |
/vendor/priv-app is added to the permitted paths for the default ns We will have apps under /vendor/priv-app. Add the path to the permitted paths so that the apks and so libs under the directory can be loaded. Bug: 35301609 Test: None since we don't have priv vendor app yet. Change-Id: Ida998adb2e180852b1922e9933f25b988517399e
tc/ld.config.txt.in
|
4ad1a34289d83556b705d14c13c8f4eac1306a65 |
04-Oct-2017 |
Marco Nelissen <marcone@google.com> |
Fix media on W/T W/T enforce restrictions on linker paths, which M/S do not. Because of this, media.extractor was unable to load its extractors on W/T. Bug: 67405932 Test: play sounds successfully Merged-In: I8914da74780c909da815beaffcd4d76fbe2cc6b5 Change-Id: I8914da74780c909da815beaffcd4d76fbe2cc6b5 (cherry picked from commit 593b43910b418eff7a2e63b631ee8d7fdebf2985)
tc/ld.config.txt.in
|
ad7ddd5a02e3ae0bd6e57d2c9df7715425fe2fc0 |
07-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Reland "Prevent vendors from accessing private VNDK libs" This reverts commit 875fe42a81696f44cc03eeaa538f370b44639bb7. ... and fixes a bug that private VNDK libs are not accessible even to RenderScript framework libraries (such as libRS_internal.so). This is fixed by exceptionally allowing the private libs only to 'rs' namespace. Bug: 70260989 Bug: 70279973 Bug: 63878960 Test: Build for walleye and tested Photos edit. Test: other renderscript app (camerascript) works as well Merged-In: I3978cbe2e869f6a1c214c755ded038349bde7b6b Change-Id: I3978cbe2e869f6a1c214c755ded038349bde7b6b (cherry picked from commit 781c47f4da82062c5445d53064566673c70119ee)
ndroid.mk
tc/ld.config.txt.in
|
e93d7f994182ece10259b95f660a53af8d6ad37a |
10-Oct-2017 |
Sundong Ahn <sundongahn@google.com> |
Permitted and search path change The permitted and search paths should be changed according to VNDK version. However these paths are fixed with vndk and vndk-sp. So I define the directory name as below - /system/${LIB}/vndk${VNDK_VERSION} - /system/${LIB}/vndk-sp${VNDK_VERSION} ${VNDK_VERSION} will be set by the property "ro.vndk.version". Bug: 66074376 Test: build & run Merged-In: I7b8e12327af89d131c4c49cb9b459a393c7dacb8 Change-Id: I7b8e12327af89d131c4c49cb9b459a393c7dacb8 (cherry picked from commit 85c773f0a28d034646ae526ba79d769cdba8d591)
tc/ld.config.txt.in
|
74857cccd2d7de08c74ec8a5b882cc00fefbf9f8 |
13-Oct-2017 |
Jiyong Park <jiyong@google.com> |
Remove *.dep files for ld.config.txt, [llndk|vndksp].libraries.txt The dep files are not required because change in the command line triggers the rule. Test: m -j ld.config.txt llndk.libraries.txt vndksp.libraries.txt Re-run the build after adding or removing libs to/from the vndk set. The txt files are updated accordingly. Merged-In: I9c9e22088cc2afeb66e8b159f611b25d698cf800 Change-Id: I9c9e22088cc2afeb66e8b159f611b25d698cf800 (cherry picked from commit 81088bf131bee8d7b10ac9a3d028b46b60953c08)
ndroid.mk
|
781c47f4da82062c5445d53064566673c70119ee |
07-Dec-2017 |
Jiyong Park <jiyong@google.com> |
Reland "Prevent vendors from accessing private VNDK libs" This reverts commit 875fe42a81696f44cc03eeaa538f370b44639bb7. ... and fixes a bug that private VNDK libs are not accessible even to RenderScript framework libraries (such as libRS_internal.so). This is fixed by exceptionally allowing the private libs only to 'rs' namespace. Bug: 70260989 Bug: 70279973 Bug: 63878960 Test: Build for walleye and tested Photos edit. Test: other renderscript app (camerascript) works as well Change-Id: I3978cbe2e869f6a1c214c755ded038349bde7b6b
ndroid.mk
tc/ld.config.txt.in
|
875fe42a81696f44cc03eeaa538f370b44639bb7 |
06-Dec-2017 |
Yang Ni <yangni@google.com> |
Revert "Prevent vendors from accessing private VNDK libs" Bug: 70260989 Bug: 70279973 This reverts commit 6b369bee69fda98e52c580d95e94fe820a44189c. Test: Build for Walley and tested Photos edit.
ndroid.mk
tc/ld.config.txt.in
|
ff1ef9f2b10d98131ea8945c642dd8388d9b0250 |
06-Dec-2017 |
Elliott Hughes <enh@google.com> |
Add a /bin symlink for convenience. We already have /etc and /sbin. As the Android world moves towards / being on the system partition, the circumstances under which a /bin symlink won't work are reduced. This should already be usable most of the time. Bug: http://b/63142920 Test: `adb shell /bin/date` Change-Id: I81c2209ae808ced186d05fbe1d5417ce8dd93ea7
ndroid.mk
nit.rc
|
778447ad7d1f72eb3351a94c76abc6a141dd9579 |
06-Dec-2017 |
Alin Jerpelea <alin.jerpelea@sonymobile.com> |
Merge "add odm partition to ld.config.legacy" am: cc06663c04 am: 6ba4207461 am: 61860a37aa Change-Id: I06c52549ab1b316f6bb1854d9b2a71fbdbbabe36
|
6ba4207461b6a5d6570438c8448ad009e4185143 |
06-Dec-2017 |
Alin Jerpelea <alin.jerpelea@sonymobile.com> |
Merge "add odm partition to ld.config.legacy" am: cc06663c04 Change-Id: I4251acfd4d37b09041aedfdbf926da0d2e64ff67
|
0f288d8630493a6efbfd05b460a876ba6f0b6462 |
05-Dec-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Prevent vendors from accessing private VNDK libs"
|
fa7958e1fb389383e62bfffbcc403da5c5a2550e |
27-Sep-2017 |
Alin Jerpelea <alin.jerpelea@sonymobile.com> |
add odm partition to ld.config.legacy change is needed to be able to load libraries from /odm partition /odm partition should have the lowest priority so that it can not override the libraries from /vendor or /system partitions Test: libraries are loaded ok. Change-Id: Ifdfc22a3406ae3ad1fde53618d4120fd0498f615 Signed-off-by: Alin Jerpelea <alin.jerpelea@sony.com>
tc/ld.config.legacy.txt
tc/ld.config.txt
|
8890f7431e83a7dd4458debb83f98cb79148c1da |
29-Nov-2017 |
Steven Moreland <smoreland@google.com> |
Merge "ld.config.txt.in typo: absolution -> absolute" am: 34778d24ae am: 6cf3cd2288 am: be997bf245 Change-Id: If1e3b4f780fcf7a2a35626129b2e7e4841947201
|
6cf3cd2288b76f3f3a84052fb8bc03be0822c641 |
29-Nov-2017 |
Steven Moreland <smoreland@google.com> |
Merge "ld.config.txt.in typo: absolution -> absolute" am: 34778d24ae Change-Id: Ib541b7b0f3e5162845f49673e65cac5ab1fc909d
|
ab338c10e664d3ac9d762796a3131e941a41b46d |
28-Nov-2017 |
Steven Moreland <smoreland@google.com> |
ld.config.txt.in typo: absolution -> absolute Test: none Change-Id: I247722c0881fa733226eec6578f17b1a481d1e91
tc/ld.config.txt.in
|
6b369bee69fda98e52c580d95e94fe820a44189c |
17-Nov-2017 |
Jiyong Park <jiyong@google.com> |
Prevent vendors from accessing private VNDK libs Private VNDK libs are VNDK libs that are only accessible from other VNDK libs but are inaccessible from vendor libraries. The private VNDK libs are marked as vendor_available: false. To enforce this at runtime, the private VNDK libs are excluded from the list of lib names that links the namespaces. Also, linker namespaces for vendor processes are modified so that the VNDK-core and VNDK-SP libs are now loaded in the 'system' namespace and not in the 'default' namespace. Bug: 63878960 Test: wahoo devices boot, log does not show any new dlopen error. Change-Id: Ibfc4f31a97aa6edd7f05cd6177daeb52c165bfeb
ndroid.mk
tc/ld.config.txt.in
|
e04e4e7dfe8bfb50f9320bacb43af5756c54340c |
22-Aug-2017 |
Jiyong Park <jiyong@google.com> |
add llndk|vndksp.libraries.txt to vndk_package List of llndk and vndk-sp libraries are written in the txt file so that they can be available at run-time. The information is used by libnativeloader to configure the classloader-namespace specially for vendor apks. Bug: 64882323 Test: build 2017 pixel devices. check that the two files exist on /system/etc. Merged-In: Ifbe339a5862f6ef57a8213a14a022765ccf77283 Change-Id: Ifbe339a5862f6ef57a8213a14a022765ccf77283 (cherry picked from commit 26335f89b1b25fd386adbc89edfcc600191b9e07)
ndroid.mk
|
39b9f7cc18cc895ecc5a04e783d732fcfa6833ab |
27-Nov-2017 |
Vishnu Nair <vishnun@google.com> |
Merge "Create location to store surface and window trace files on init" am: 3dfba33d67 am: 4d736b5fa5 am: e6c35c8608 Change-Id: I02663a6cb3fd019d104807ac375ed7092e3fddab
|
4d736b5fa525391b8ffa0f198b6ff62a63cc6a20 |
27-Nov-2017 |
Vishnu Nair <vishnun@google.com> |
Merge "Create location to store surface and window trace files on init" am: 3dfba33d67 Change-Id: Ibcd26a9644e954d4e9fa5be1d538e45c44fcd1b9
|
3dfba33d67a54c5a894510372d20f2a13a7e687b |
27-Nov-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Create location to store surface and window trace files on init"
|
d09ab7a217eb13d09eddd031b46c6418b881ab6c |
27-Nov-2017 |
Vishnu Nair <vishnun@google.com> |
Create location to store surface and window trace files on init Bug: 64831661 Test: adb shell su root rm /data/misc/wmtrace && adb reboot && adb shell su ls /data/misc/wmtrace Change-Id: I60979c26a9226534df534abd3d59df309f6ea6ad
nit.rc
|
f8b9d77b81dd3bdb29d1dacc36c8431b1b16a7f4 |
22-Nov-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Move mkdir /data/nfc/... to rootdir init.rc" am: fa65396ca2 am: 4b3bcf2a10 am: 77ad3f58ae Change-Id: Ic2ba51690b3dd5b64ea76ec83cb6007b7894810f
|
4b3bcf2a108de290ca68831c4640339c1fd9ca74 |
22-Nov-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Move mkdir /data/nfc/... to rootdir init.rc" am: fa65396ca2 Change-Id: I623f24df9b42500f347ae427f4ffd94395abaa56
|
fa65396ca278a0ecc21b14b9fb7603f219004ba2 |
22-Nov-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Move mkdir /data/nfc/... to rootdir init.rc"
|
df482d03add1a83a7b38823adc13500efea7ac45 |
22-Nov-2017 |
Chen Xu <fionaxu@google.com> |
Merge "a new folder to store OTA carrier id update" am: 76adcdf688 Change-Id: I052a0810830b2a81a8a992d66e8e59cda343b347
|
06b8e2e1309a921fce687437a3b130c26c729ccd |
21-Nov-2017 |
fionaxu <fionaxu@google.com> |
a new folder to store OTA carrier id update Bug:64131637 Test: Build Change-Id: I0ce4322f297bab427d70aed3c329345c899786bb (cherry picked from commit 45713ff62159c90e1627af0eb970641ad33dade2)
nit.rc
|
45713ff62159c90e1627af0eb970641ad33dade2 |
21-Nov-2017 |
fionaxu <fionaxu@google.com> |
a new folder to store OTA carrier id update Bug:64131637 Test: Build Change-Id: I0ce4322f297bab427d70aed3c329345c899786bb
nit.rc
|
c319310f9b63065ec3e1b5f54fb89ddfdc975971 |
21-Nov-2017 |
Tom Cherry <tomcherry@google.com> |
Move mkdir /data/nfc/... to rootdir init.rc These are directories used by the system so they should be created by the system. Test: treehugger Change-Id: I2a721ef7871c8842fa912497f5ec6988fcec9e58
nit.rc
|
23e27db576d06761363365494327baf062468a66 |
14-Nov-2017 |
Xin Li <delphij@google.com> |
Merge commit 'a63ccea6abc7ea02e2d98e41c80793ca97237bd3' from oc-mr1-dev-plus-aosp into stage-aosp-master Change-Id: Ia33311cd1fd26dfaea59a69317b306fb91203c40 Merged-In: I03d06b10807e8a313c9654c2e1db36bfb59e3f99
|
2eaa098bfeacd40c8ca0d211dd5ece2e4c2ae5f3 |
13-Nov-2017 |
Steven Moreland <smoreland@google.com> |
Merge "PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt" am: c437e14c17 am: 5bd7b32c15 am: 2c531b007e Change-Id: Iee1ac7081e7954099e9ee77c07480e8db30adb67
|
2c531b007edab780ac59a5bb28b5d2e9e854d7fa |
13-Nov-2017 |
Steven Moreland <smoreland@google.com> |
Merge "PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt" am: c437e14c17 am: 5bd7b32c15 Change-Id: I0958fea7b320025bb329defe2d26a922e7f236bb
|
c437e14c179c2df426fb711a704d7d39bf8f1b19 |
13-Nov-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt"
|
aae9ad533cff8f6bad110bad2a7286e1f452bbdf |
10-Nov-2017 |
Yifan Hong <elsk@google.com> |
healthd is class hal because it serves health 2.0 HAL. This forces it to restart when hwservicemanager dies. Bug: 69069765 Test: kill hwservicemanager, lshal shows backup instance Change-Id: Ib51caa0e718031a0f8797d8af4c2459b4958a62e
nit.rc
|
41dee1e2be6f177b9b7d767b7e511d1e85ece4fa |
10-Nov-2017 |
Tianjie Xu <xunchang@google.com> |
Merge "Create a new directory on boot for update_engine logs" am: 78d882bb5f am: 5d86509d19 am: 2ca0bbfae3 Change-Id: Ibfb3c4054bb0f06446e5c959335ff2abdbe17370
|
2ca0bbfae30c59b139b06f4e25564ad98c0ede05 |
10-Nov-2017 |
Tianjie Xu <xunchang@google.com> |
Merge "Create a new directory on boot for update_engine logs" am: 78d882bb5f am: 5d86509d19 Change-Id: I01611463c081fafd60fc315a4a91418a4ddef22a
|
4e641e3b6a00d62b4e2f67c6c50757389ad11c90 |
09-Nov-2017 |
Steven Moreland <smoreland@google.com> |
PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt PRODUCT_FULL_TREBLE is being deprecated in favor of smaller flags. Use the appropriate one instead. Bug: 62019611 Test: manual Change-Id: Id5d127c29f908cd3011031b3b698ddec3dcba9c1
ndroid.mk
|
74fa3cab4eb564678d3cdeefdd18da2504948b74 |
03-Nov-2017 |
Tianjie Xu <xunchang@google.com> |
Create a new directory on boot for update_engine logs Partners require to access update_engine's logs on the file system with non-root permission. Bug: 65568605 Test: directory created with the correct permission on boot Change-Id: I1c1fb4acb8b0f2e7352ffa9e7d05a864940b5986
nit.rc
|
a2935e0c8b4c3ca1244c1c92bb87200b31b013f2 |
28-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Tests are run with proper namespace configs by their locations Tests in /data/[nativetest|benchmarktest] run with namespace config for system and tests in /data/[nativetest|benchmarktest]/vendor run with namespace config for vendor. They no longer run in the 'test' namespace config which didn't impose any restriction for libraries. Bug: 67028906 Test: sailfish/marlin builds and boots Test: no VTS regression on system.img from GSI + vendor.img from marlin/sailfish Test: VtsKernelLibcutilsTest successful in above config Merged-In: I28cdef960d087565c8a22dca0e9a154fb1c3bb94 Change-Id: I28cdef960d087565c8a22dca0e9a154fb1c3bb94 (cherry picked from commit 326b783ad92048432c4a8a70a35c8342b35128b0)
tc/ld.config.txt
|
6ed1a1c339e33a5d83096262b07e909cc365b629 |
25-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Fix: make vndk namespace visible for 2016 Pixes The nativeloader tries to find the 'vndk' namespace when there is a vendor apk in the classloader paths. This can happen even for a downloaded app if the app is using a vendor apk via <uses-library> tag. In order to prevent the nativeloader from failing to find the vndk namespace, the namespace is marked as visible. Bug: 66482442 Test: download the app mentioned in the bug, it does not crash. Merged-In: I82e2394eb6eedcb8645e1a5b3735bbfe2735b312 Change-Id: I82e2394eb6eedcb8645e1a5b3735bbfe2735b312 (cherry picked from commit 1cc09e749f196774a4e6fa4afedfd4eda623ee67)
tc/ld.config.txt
|
7f654c3243ddf4859ce17e36ce7fe389a3c9a337 |
23-May-2017 |
Jiyong Park <jiyong@google.com> |
vndk: remove vendor/lib from the search path of the 'vndk' namespace 'vndk' namespace is the place for VNDK-SP libs. So /vendor/lib must be removed from its search paths. It was there just because libhardware (which is VNDK-SP) is loading HAL libs in vendor partition from there. However this problem has been solved by modifying the libhardware so that HAL libs are loaded from the 'sphal' namespace and not from the current (the 'vndk') namespace. Bug: 37731053 Test: sailfish builds and boots Merged-In: Ia88934a975aa8811e05b5ba408e42d132f20f4e9 Change-Id: Ia88934a975aa8811e05b5ba408e42d132f20f4e9 (cherry picked from commit f01b52895dfb44c3a7e98a870ab415672aee0960)
tc/ld.config.txt
|
e58fa1b0c617f53a0697a158139f57e9f2a70d8a |
31-Aug-2017 |
Jiyong Park <jiyong@google.com> |
libz is back to LLNDK For 2016 pixel devices, where VNDK is not fully enforced, move libz back to LLNDK so that we can pass the CTS without requiring the default namespace to be isolated. If we have libz in vndk-sp directory, test_linker_namespaces fails because /system/lib/vndk-sp/libz.so becomes accessible. In order to make the lib inaccessible, we have to make the default namespace isolated, but this can't be done for 2016 pixel devices where VNDK is not fully enforced. So, we choose to remove /system/lib/vndk-sp/libz.so and keep the single copy at /system/lib. Bug: 65018779 Test: android.jni.cts.JniStaticTest#test_linker_namespaces successful on 2016 pixel devices Merged-In: Ib6b6560b02be69d2015c0afb86acf07c02b30c2f Change-Id: Ib6b6560b02be69d2015c0afb86acf07c02b30c2f (cherry picked from commit 697eb2da0db5eaaa8b518e6da3b7b6377312825e)
tc/ld.config.txt
|
7075bca364718a3d060bd373c3d1b20db2e89bfc |
16-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Make the rs namespace visible This allows us to dlopen libRS_internal.so directly from the rs namespace, not from the sphal namespace. Bug: 64747884 Test: VtsHalRenderscriptV1_0TargetTest successful on the device built with BOARD_VNDK_VERSION=current and [system] namespace config is applied to /data/nativetest[64]/* processes. Merged-In: I0b441791e395798e80a84592ca01e771bb1c201a Change-Id: I0b441791e395798e80a84592ca01e771bb1c201a (cherry picked from commit 421a5e46b780cab394e4bc18745b8555ba26afa5)
tc/ld.config.txt
|
136eb058923bc5b4fc4434751797bb70783da539 |
13-Aug-2017 |
Justin Yun <justinyun@google.com> |
Add libft2.so to ll-ndk for rs namespace libft2.so is changed to ll-ndk that is available only for rs namespace. Bug: 64425518 Test: build and boot with BOARD_VNDK_VERSION=current Merged-In: I991dc774ca9b92fb6e95a7656243a6a4ecdc0ab9 Change-Id: I991dc774ca9b92fb6e95a7656243a6a4ecdc0ab9 (cherry picked from commit 513f76394a767192965888ed495305102b318dab)
tc/ld.config.txt
|
8ebf6ee6f6c18aca03f4ac4b33a65194562dc0d4 |
10-Aug-2017 |
Justin Yun <justinyun@google.com> |
Move libz vndk-sp from ll-ndk The ABI of libz is not as stable as it is for ll-ndk. Bug: 37617391 Test: build and boot Merged-In: I883bc6fda268e98cc7cdd5888264170c58688794 Change-Id: I883bc6fda268e98cc7cdd5888264170c58688794 (cherry picked from commit dadd3a846fae03b1d4416fcb8f2499b8296d9e83)
tc/ld.config.txt
|
e7be481a7b459f7b14832bb852284ea73d566268 |
28-Oct-2017 |
Josh Gao <jmgao@google.com> |
Merge "Delete obsolete debuggerd references." am: 1193f3bff6 am: 2bf84f9cdd am: bfdff800a5 Change-Id: I8f98856436285659ba41276242c799453255eed8
|
bfdff800a56521ba3444402ccfaa411c666ddc9d |
28-Oct-2017 |
Josh Gao <jmgao@google.com> |
Merge "Delete obsolete debuggerd references." am: 1193f3bff6 am: 2bf84f9cdd Change-Id: I08060b18ac0c767bf07ad16a04f9e7ec24993113
|
18ea0978cf6be4cfcec473789d19cb70ded10b6a |
28-Oct-2017 |
Josh Gao <jmgao@google.com> |
Delete obsolete debuggerd references. Test: treehugger Change-Id: Ic1a8cfb867decd76443fdc26333f2bcaa98b61bb
ndroid.mk
|
49bb5794c815ff58ab013dceb8222d7b8805108b |
26-Oct-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Permitted and search path change"
|
446ab4a3781e3f003c9ef758886de965a9b0ee9b |
25-Oct-2017 |
Elliott Hughes <enh@google.com> |
Merge "Remove Foreground Boost CPUSet" am: 77451492bc am: 17c8a89a08 am: 4921f97fe3 Change-Id: I8f5d7f438c41969a623d0468bb96150824feded7
|
4921f97fe323d665d50197f651dceeb61ab41b14 |
25-Oct-2017 |
Elliott Hughes <enh@google.com> |
Merge "Remove Foreground Boost CPUSet" am: 77451492bc am: 17c8a89a08 Change-Id: I08f25d4a799fdb7f3c5b415675dd3c50fa65fe93
|
77451492bc3667e6b201f222adffffdc553ebe76 |
25-Oct-2017 |
Elliott Hughes <enh@google.com> |
Merge "Remove Foreground Boost CPUSet"
|
60bc597183e75446f2719dc86a50be31fdee47bc |
24-Oct-2017 |
Jake Weinstein <jake@aospa.co> |
Remove Foreground Boost CPUSet This functionality was removed at https://android.googlesource.com/platform/frameworks/base/+/a712d4058f6f85268838
nit.rc
|
a909e5e2a1e5342a45d73588544fe78656e22a68 |
23-Oct-2017 |
Jae Shin <jaeshin@google.com> |
Merge changes from topic "rs_vndk_step2" am: 678efa25a6 Change-Id: Idcab36c112406e3dc1fe4eb9cfd5c345cafc0290
|
324f3ed393ad0cf0f121c4be90fccdbbb3d023fd |
23-Oct-2017 |
Jiyong Park <jiyong@google.com> |
templatize ld.config.txt am: ecc703c792 Change-Id: Ic9dc2f35a4a9a2c2a56cb24a9ac02e9373ed78df
|
6683a8735bf7acf6cf8d66fb0aa4657c2d2fb79a |
23-Oct-2017 |
Jiyong Park <jiyong@google.com> |
Make default namespace for system processes isolated am: 246338f90e Change-Id: I2f2d2799ab57031a3c3b24830c0e10376e035acd
|
e96c957e571be949bd6eeac1e1fc5265feb05e8c |
23-Oct-2017 |
Justin Yun <justinyun@google.com> |
vndk: add vendor/lib(64)/vndk for vendor namespace am: b5ddc5ae6b Change-Id: I1e22e9a994932e3e93cbbafb8d5defd5efd69b7c
|
c82e43034be74c295b0439b6aa2b0df9eee529ce |
23-Oct-2017 |
Justin Yun <justinyun@google.com> |
Implement system namespace for vendor process am: 333845c710 Change-Id: I0fda3fe689832b0b5cc13a381dacdd633886e27a
|
6d9f5e401244591f8c0fe9eadda160e02c9d9630 |
23-Oct-2017 |
Jiyong Park <jiyong@google.com> |
Use the legacy linker namespace configs when target is sanitized am: 614c5521a3 Change-Id: I80ff3cb047a9ad351590524a5602cdc0f9df3e61
|
b9d74495b1a8dc00127b7a89dbaa821a05dbe86a |
23-Oct-2017 |
Jiyong Park <jiyong@google.com> |
Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace am: b5c0fc3ceb Change-Id: Ic74e02582c7c2f5b7e9900bf77026168a2947fd2
|
1cd1a2b81257a1afac6c0dfbdef8446ac418ca1f |
23-Oct-2017 |
Justin Yun <justinyun@google.com> |
Add system/${LIB}/vndk to default namespace for vendor. am: e373672afd Change-Id: I4f4e47bb297ec604f79007260883112da5de67e1
|
257de3def5092797a9ab29551c94bcc57e07eaa0 |
31-Aug-2017 |
Jiyong Park <jiyong@google.com> |
fix: boot fails on ASAN builds with VNDK restriction Fix the bug that caused boot failure on ASAN builds with VNDK restriciton. The major cause is because incorrect (old) ld.config.txt was used when the build is sanitized, which prevented the dynamic linker to find some VNDK libs that only exist in /system/lib/vndk; the old ld.config.txt does not have the directory in its search paths. So, this CL fixes the problem by having the same ld.config.txt for both sanitized and non-sanitizied builds. Furthermore, ld.config.txt is modified so that dependency to libclang_rt* libs are redirected to those in /system/lib directory. This ensures that the sanitizer runtime libs are not dual loaded but are provided for both platform and vendors. Bug: 65217017 Test: SANITIZE_TARGET=integer_overflow SANITIZE_TARGET_DIAG=integer_overflow m on 2017 pixel devices. The build is successful and the device boots to the UI. Merged-In: I0e21e20d9aca340b984968e07d4ce542ae10fd31 Change-Id: I0e21e20d9aca340b984968e07d4ce542ae10fd31 (cherry picked from commit faefa6bd3682a0e8f5de2184cca5960a82a00020)
ndroid.mk
tc/ld.config.txt.in
|
ecc703c792651c1406592eed9f730c8e97ebc3cf |
04-Aug-2017 |
Jiyong Park <jiyong@google.com> |
templatize ld.config.txt Lists of libraries in between the linker namespaces are no longer hard-coded in ld.config.txt, but instead come from Soong. Bug: 37139976 Test: build 2017 pixel device with BOARD_VNDK_VERSION=current m -j Test: the device is bootable, basic functionalities (camera, camcorder, wifi, bt, gps, etc.) work. Merged-In: I8170e6c3f6ee04b16359791d64cc46bd2714a073 Change-Id: I8170e6c3f6ee04b16359791d64cc46bd2714a073 (cherry picked from commit 367984602abab743630d1fba8e4940f0a69e678b)
ndroid.mk
tc/ld.config.txt.in
tc/ld.config.vndk.txt
|
246338f90ef660e3078f4643f35df92f7c31bece |
28-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Make default namespace for system processes isolated The default namespace for system process now becomes isolated, which means it can load only the libs that are in search.paths and under permitted.paths. /system/framework, /system/app, /system/priv-app, /vendor/app, /data, etc are added to the permitted paths since libart should be able to dlopen odex files under the locations. Following directories become unavailable: /system/lib/vndk /system/lib/vndk-sp Bug: 37013858 Bug: 64888291 Bug: 64950640 Test: 2017 pixel devices builds and boots Test: android.jni.cts.JniStaticTest#test_linker_namespaces passes Merged-In: I2bbe9cc19940c3633c2fb901f9bf8ab813e38c13 Change-Id: I2bbe9cc19940c3633c2fb901f9bf8ab813e38c13 (cherry picked from commit 55f05d79f9e83757acb72d3d300262f5954a00af)
tc/ld.config.vndk.txt
|
b5ddc5ae6b16cb58e4cb49c923ae7cdcec4f9ab6 |
24-Aug-2017 |
Justin Yun <justinyun@google.com> |
vndk: add vendor/lib(64)/vndk for vendor namespace When the vndk is extended by vendor, the libs in vendor/lib(64)/vndk will override system/lib(64)/vndk libs. Vendor binaries will search vndk libs in vendor/lib(64)/vndk prior to system/lib(64)/vndk. Also, remove a workaround for libsdm-color.so Bug: 65032513 Test: build and boot check for libsdm-color.so will be loaded on boot Test: currently no libs exist on vendor/lib(64)/vndk. No test for it Merged-In: I99ed37eb1a9e92c83533e2d92c9c06db11f01e97 Change-Id: I99ed37eb1a9e92c83533e2d92c9c06db11f01e97 (cherry picked from commit 3094de968443c60345f63318f14a5d919df762d5)
tc/ld.config.vndk.txt
|
333845c710822e16fc8a6d7d32f931416beb8dbb |
16-Jun-2017 |
Justin Yun <justinyun@google.com> |
Implement system namespace for vendor process For vendor process default namespace searches as following order: 1. /vendor/lib/(hw|egl), /vendor/lib: Vendor libs + VNDK-vnd-ext 2. /system/lib/vndk-$(ver): VNDK libs 3. /vendor/lib/vndk-sp-$(ver): VNDK-SP-vnd-ext 4. /system/lib/vndk-sp-$(ver): VNDK-SP and searches system namespace (/system/lib) only for LL-NDK libs. This configuarion is used only with BOARD_VNDK_VERSION is defined. Bug: 37192038 Test: build with 'BOARD_VNDK_VERSION=current' and boot Merged-In: If9778b9266a084846ba8fe73e6bff25828359d33 Change-Id: If9778b9266a084846ba8fe73e6bff25828359d33 (cherry picked from commit 24c29f1be49f47a6d8a098a10591d9c3f0d4e8ee)
ndroid.mk
tc/ld.config.vndk.txt
|
614c5521a370978f4431abcc13f666c3f46992b2 |
11-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Use the legacy linker namespace configs when target is sanitized The new linker namespace config causes problem when the target is sanitized: vendor libs which are loaded in the sphal namespace can't link against to libclang_rt* libs which are in /system/lib directory because the directory is not allowed for sphal namsapce. Long-term solution would be installing libclang_rt* to both /system/lib and /vendor/lib so that vendor libs can link against to the one in /vendor/lib. Until the work is done, let's just disable the new linker namespace config when the target is to be sanitized. Bug: 63535130 Test: make SANITIZE_TARGET=integer_overflow SANITIZE_TARGET_DIAG=integer_overflow builds and boots to the UI Merged-In: I6afb69885aaa3d25e554b9ca699a572248bfc50a Change-Id: I6afb69885aaa3d25e554b9ca699a572248bfc50a (cherry picked from commit fff6f75fc1de2963254271d7d254e53ae187cada)
ndroid.mk
|
b5c0fc3ceb027247c4e488e695d6eaac196355c8 |
04-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace android.hidl.memory@1.0-impl.so is a SP-HAL located in /system/lib/vndk-sp/hw. This can't be moved to /vendor/lib since it is a framework HAL. Bug: 62930720 Test: 2017 pixel builds and boots with BOARD_VNDK_VERSION on Merged-In: I9c456983ef68120c5e8c629efc6dd66a26220ecb Change-Id: I9c456983ef68120c5e8c629efc6dd66a26220ecb (cherry picked from commit 7d4cf3fd3364a86c895371337a849ab40c99b232)
tc/ld.config.txt
|
e373672afd23f9cdbed9481816a9f95dc4ff0491 |
25-Jul-2017 |
Justin Yun <justinyun@google.com> |
Add system/${LIB}/vndk to default namespace for vendor. With BOARD_VNDK_VERSION=current, vndk libs will be installed in system/${LIB}/vndk. To make them available for vendor, it must be added to default namespace. Bug: 63866913 Test: build and boot with BOARD_VNDK_VERSION=current Merged-In: I9e467a6125fc89513754b56a2420975559144f98 Change-Id: I9e467a6125fc89513754b56a2420975559144f98 (cherry picked from commit 90a2487776d464e867c7bad1dc8d993ed50df09e)
tc/ld.config.txt
|
c8ae86afdd150059e1ec0650886da60b19f79f8b |
20-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Add [test] section for /data/[nativetest|benchmarktest] We have both system and vendor tests in the same directory /data/nativetest. Since we can't distinguish system and vendor tests at runtime, we choose to run all of them with the legacy namespace configuration where /system/lib and /vendor/lib are both accessible without any restriction. Furthermore, /system/lib/vndk-sp is added to the list of accessible directories for tests since some libs (such as libion.so) exist only in the directory but not in /system/lib. This will change in the future when we install system and vendor tests into different directories (vendor tests goes into ./vendor subdir). Then, we will run the tests with [system] or [vendor] configurations depending on their paths. Bug: 63597267 Test: run bionic-unit-tests Test: run linker-unit-tests Merged-In: I810003b2da0b30335200c130f484ea7b041f9f80 Change-Id: I810003b2da0b30335200c130f484ea7b041f9f80 (cherry picked from commit c034a43d44d87a6bb85bbdec9876b41b46ab5625)
tc/ld.config.txt
|
433fe3a8a2acc9cb76cec84d114dd6fbc0693791 |
14-Jul-2017 |
Jiyong Park <jiyong@google.com> |
/data/nativetest[64] processes are running with the new ns config Native tests under /data/nativetest[64] directory is now running with the same linker namespace configuration as /system/bin/* processes. This allows us to stop mimicing the linker namespace configuration of the /system/bin/* processes using LD_LIBRARY_PATH. Bug: 63597267 Test: run bionic-unit-tests Test: run linker-unit-tests Merged-In: If8e2ed0b8016e4e07bf6829735b8e02f952042d0 Change-Id: If8e2ed0b8016e4e07bf6829735b8e02f952042d0 (cherry picked from commit 9d1e50b809c091c01d92b9f7039ec83d94f3f05a)
tc/ld.config.txt
|
81088bf131bee8d7b10ac9a3d028b46b60953c08 |
13-Oct-2017 |
Jiyong Park <jiyong@google.com> |
Remove *.dep files for ld.config.txt, [llndk|vndksp].libraries.txt The dep files are not required because change in the command line triggers the rule. Test: m -j ld.config.txt llndk.libraries.txt vndksp.libraries.txt Re-run the build after adding or removing libs to/from the vndk set. The txt files are updated accordingly. Change-Id: I9c9e22088cc2afeb66e8b159f611b25d698cf800
ndroid.mk
|
31da436566a2d28ce1b598fbc39cf13467a232a5 |
11-Oct-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Merge "console: Add setenv HOSTNAME console" am: d2c66b31a0 am: 5884f608d9 am: 825915bfde am: 455faa53ed Change-Id: I4454a732810ef6f6d70b1f7d91455c8fb45b145f
|
455faa53ed578234672d9e705ec32d86d23f2af6 |
11-Oct-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Merge "console: Add setenv HOSTNAME console" am: d2c66b31a0 am: 5884f608d9 am: 825915bfde Change-Id: Ia845dfb8cba654766dfff15f2eab7dbee621a45d
|
5884f608d96cc760d7ea749672bbe682bf0ebc50 |
11-Oct-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Merge "console: Add setenv HOSTNAME console" am: d2c66b31a0 Change-Id: I85addec989872b9e66f0e68c4fea20b969a1eb25
|
d0fb2510e2d4d6f57afb4e1222378c099674852a |
11-Oct-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
console: Add setenv HOSTNAME console Bug: 67678999 Test: Run serial console on Hikey Change-Id: Ia5fa9c2af4771508d96545f6a8814a81d5ccee3c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
nit.rc
|
85c773f0a28d034646ae526ba79d769cdba8d591 |
10-Oct-2017 |
Sundong Ahn <sundongahn@google.com> |
Permitted and search path change The permitted and search paths should be changed according to VNDK version. However these paths are fixed with vndk and vndk-sp. So I define the directory name as below - /system/${LIB}/vndk${VNDK_VERSION} - /system/${LIB}/vndk-sp${VNDK_VERSION} ${VNDK_VERSION} will be set by the property "ro.vndk.version". Bug: 66074376 Test: build & run Change-Id: I7b8e12327af89d131c4c49cb9b459a393c7dacb8
tc/ld.config.txt.in
|
593b43910b418eff7a2e63b631ee8d7fdebf2985 |
04-Oct-2017 |
Marco Nelissen <marcone@google.com> |
Fix media on W/T W/T enforce restrictions on linker paths, which M/S do not. Because of this, media.extractor was unable to load its extractors on W/T. Bug: 67405932 Test: play sounds successfully Change-Id: I8914da74780c909da815beaffcd4d76fbe2cc6b5
tc/ld.config.txt.in
|
773ebbdfe37a822e044401b1c5d32812187b3db0 |
30-Sep-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "resolve merge conflicts of 73d9596bc to oc-mr1-dev-plus-aosp" into oc-mr1-dev-plus-aosp
|
dfe8bb87dfe70bbb2699e3e683e2193d21fd3135 |
30-Sep-2017 |
Keun Soo Yim <yim@google.com> |
Merge "Tests are run with proper namespace configs by their locations" into oc-mr1-dev am: aedc1c9ab0 am: 202c5af4be Change-Id: I5e794726de781c2faf72c89c442c115862009417
|
202c5af4be8f804ee68bdca82e760473b211b25c |
30-Sep-2017 |
Keun Soo Yim <yim@google.com> |
Merge "Tests are run with proper namespace configs by their locations" into oc-mr1-dev am: aedc1c9ab0 Change-Id: I121703da98b8c66f24bbf0efced1c592c2fc113e
|
aedc1c9ab06de16eae2e96941193086f2cebac25 |
30-Sep-2017 |
Keun Soo Yim <yim@google.com> |
Merge "Tests are run with proper namespace configs by their locations" into oc-mr1-dev
|
62398781f5a4ce32906cdbfc1ad8c34357e19eac |
30-Sep-2017 |
Bowgo Tsai <bowgotsai@google.com> |
resolve merge conflicts of 73d9596bc to oc-mr1-dev-plus-aosp Change-Id: I8272038fe905a88273ce9aa690af0ee0005a6b67
|
cf3c29837607bba0c332064170700c46897c643e |
29-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Fix: make vndk namespace visible for 2016 Pixes" into oc-mr1-dev am: 2f00c80c2b am: f196067a8f Change-Id: Ic9c2a52d2c07174716e2e33b2e52f8169809e94b
|
f196067a8f2eb6d6efb02d1c05d698d7065e3b9e |
29-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Fix: make vndk namespace visible for 2016 Pixes" into oc-mr1-dev am: 2f00c80c2b Change-Id: I7659a648f88559ddf65c879e695c1766b3854686
|
2f00c80c2b5fcd5ea5cdb752269ae107ab1d424c |
29-Sep-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Fix: make vndk namespace visible for 2016 Pixes" into oc-mr1-dev
|
afc8dda11187599584c6d97de13dc17f796a7935 |
29-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Remove workaround for VNDK violations" into oc-mr1-dev am: 152687b26e am: f631a98a31 Change-Id: Ic9c4597df4d26675524ce6ebb626d60e1eb9a014
|
f631a98a31da2bba0af62b7d997a1e510e27f031 |
29-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Remove workaround for VNDK violations" into oc-mr1-dev am: 152687b26e Change-Id: I40798ad3c2a394d3210a3c218fd52ea38fc8cbff
|
d29ac08509092f3ef98ffe7455d16a50a9f1b858 |
29-Sep-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Merge "Removing $(PRODUCT_OUT)/root/root" am: 8cbbacdc15 Change-Id: Ia671976f8d7d4b83478c58d566e309f36af125ab
|
326b783ad92048432c4a8a70a35c8342b35128b0 |
28-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Tests are run with proper namespace configs by their locations Tests in /data/[nativetest|benchmarktest] run with namespace config for system and tests in /data/[nativetest|benchmarktest]/vendor run with namespace config for vendor. They no longer run in the 'test' namespace config which didn't impose any restriction for libraries. Bug: 67028906 Test: sailfish/marlin builds and boots Test: no VTS regression on system.img from GSI + vendor.img from marlin/sailfish Test: VtsKernelLibcutilsTest successful in above config Change-Id: I28cdef960d087565c8a22dca0e9a154fb1c3bb94
tc/ld.config.txt
|
144893e5ec6cd8d6a0ff11d8adc5440e6f86635a |
12-Sep-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Removing $(PRODUCT_OUT)/root/root Bug: 65570851 Test: boot sailfish Change-Id: I80c3c3de23c57343187fde207980731b5341bc1f Merged-In: I80c3c3de23c57343187fde207980731b5341bc1f (cherry picked from commit ededee3e400d4caa50c04c2e0ec5d92a56e39425)
ndroid.mk
|
f8025aae822fa45091807611a70bdfc2157f0d47 |
25-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Remove workaround for VNDK violations lib-dplmedia.so and qseeproxydaemon no longer depend on non-VNDK libraries. Remove the workaround. Bug: 64427765 Bug: 64820887 Test: 2017 pixel devices boots Change-Id: Ib8bcbbb16169dc5c997d6c0dad061c66dcd0ccfe
tc/ld.config.txt.in
|
1cc09e749f196774a4e6fa4afedfd4eda623ee67 |
25-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Fix: make vndk namespace visible for 2016 Pixes The nativeloader tries to find the 'vndk' namespace when there is a vendor apk in the classloader paths. This can happen even for a downloaded app if the app is using a vendor apk via <uses-library> tag. In order to prevent the nativeloader from failing to find the vndk namespace, the namespace is marked as visible. Bug: 66482442 Test: download the app mentioned in the bug, it does not crash. Change-Id: I82e2394eb6eedcb8645e1a5b3735bbfe2735b312
tc/ld.config.txt
|
ededee3e400d4caa50c04c2e0ec5d92a56e39425 |
12-Sep-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Removing $(PRODUCT_OUT)/root/root Bug: 65570851 Test: boot sailfish Change-Id: I80c3c3de23c57343187fde207980731b5341bc1f
ndroid.mk
|
25a03a23a82ba11ecb30daa4ab8e9277473cc1db |
14-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge changes from topic "vndk_jni" into oc-mr1-dev am: 6f7d928940 Change-Id: I69af1cdf06bf71f1125644c7064b40444613eaa7
|
6eaa30765e0256e88839f73acec1114e530213c7 |
14-Sep-2017 |
Jiyong Park <jiyong@google.com> |
add llndk|vndksp.libraries.txt to vndk_package am: 26335f89b1 Change-Id: Idc8d3ff696c782963337fa21ead8a7665c0a1e98
|
6f7d928940381d1d7489762411cf7dec489642c5 |
14-Sep-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes from topic "vndk_jni" into oc-mr1-dev * changes: vendor apk is unbundled add llndk|vndksp.libraries.txt to vndk_package
|
299591e4640285d3edf2a878b506825ed7cede4d |
08-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "fix: boot fails on ASAN builds with VNDK restriction" into oc-mr1-dev am: 80206d8f03 Change-Id: I051d1683e95171bc1e3e3d16007c5d25ea923bc2
|
80206d8f0354ad1f4f76be01650ac209f6405175 |
08-Sep-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "fix: boot fails on ASAN builds with VNDK restriction" into oc-mr1-dev
|
a07f3057d00a1da240099aa77d55aaf83362c489 |
22-Aug-2017 |
Jiyong Park <jiyong@google.com> |
vendor apk is unbundled For devices where VNDK restrictions are all enforced, vendor apks are recognized as unbundled; since system partition and vendor partition can be updated independently from each other. However, since vendor apks are still bundled in the vendor partition, they are allowed to do more than ordinaly unbundled apks that are downloaded and installed to the data partition. 1) /vendor/lib is allowed. So the path is added to the search_paths and permitted paths of the classloader namespace. 2) LLNDK libs are allowed in addition to the NDK libs. So, LLNDK lib list from llndk.libraries.txt is added to the list from public.libraries.txt. 3) VNDK-SP libs are allowed. To do so, the classloader namespace is linked to the 'vndk' namespace where VNDK-SP libs are searched and loaded from. The list of available VNDK-SP libs is read from vndksp.libraries.txt file. 4) Name of the namespace is changed to 'vendor-classloader-namespace' since the namespace is configured differently from the ordinary 'classloader-namespace'. Bug: 63553457 Test: 2017 pixel devices build and boots to the UI Test: a vendor apk (e.g. TimeService.apk) works. Turn the airplain mode on. Set time. Reboot the device. The time is not reset. Test: 1) set target as 2017 pixel 2) m -j CtsVendorJniTestCases 3) copy the built apk into /vendor/app/CtsVendorJniTestCases 4) reboot / factory reset 5) adb shell am instrument -w android.jni.vendor.cts Change-Id: I447452eb025c0a0fd076b5c9ac081d453dc6074e
tc/ld.config.txt.in
|
26335f89b1b25fd386adbc89edfcc600191b9e07 |
22-Aug-2017 |
Jiyong Park <jiyong@google.com> |
add llndk|vndksp.libraries.txt to vndk_package List of llndk and vndk-sp libraries are written in the txt file so that they can be available at run-time. The information is used by libnativeloader to configure the classloader-namespace specially for vendor apks. Bug: 64882323 Test: build 2017 pixel devices. check that the two files exist on /system/etc. Change-Id: Ifbe339a5862f6ef57a8213a14a022765ccf77283
ndroid.mk
|
533062b8d66ec9e7ad501fa3328fa8ddb267597a |
01-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "templatize ld.config.txt" into oc-mr1-dev am: 2d3cf6799e Change-Id: I570d4d52b630c3de0e82ec67638c6c37c48d1074
|
2d3cf6799e3402e401d7f36075bbc2cbe67cb0cb |
01-Sep-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "templatize ld.config.txt" into oc-mr1-dev
|
8e14484166aef8e3640107ac1e13c53673ee3a93 |
01-Sep-2017 |
Jiyong Park <jiyong@google.com> |
Merge "libz is back to LLNDK" into oc-mr1-dev am: d9d20baf6f Change-Id: Id2649fcd9c66003a5e84d75d91a34604b5f5d7e0
|
d9d20baf6f188d47f509e3ad3850fe526d750aec |
01-Sep-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "libz is back to LLNDK" into oc-mr1-dev
|
faefa6bd3682a0e8f5de2184cca5960a82a00020 |
31-Aug-2017 |
Jiyong Park <jiyong@google.com> |
fix: boot fails on ASAN builds with VNDK restriction Fix the bug that caused boot failure on ASAN builds with VNDK restriciton. The major cause is because incorrect (old) ld.config.txt was used when the build is sanitized, which prevented the dynamic linker to find some VNDK libs that only exist in /system/lib/vndk; the old ld.config.txt does not have the directory in its search paths. So, this CL fixes the problem by having the same ld.config.txt for both sanitized and non-sanitizied builds. Furthermore, ld.config.txt is modified so that dependency to libclang_rt* libs are redirected to those in /system/lib directory. This ensures that the sanitizer runtime libs are not dual loaded but are provided for both platform and vendors. Bug: 65217017 Test: SANITIZE_TARGET=integer_overflow SANITIZE_TARGET_DIAG=integer_overflow m on 2017 pixel devices. The build is successful and the device boots to the UI. Change-Id: I0e21e20d9aca340b984968e07d4ce542ae10fd31
ndroid.mk
tc/ld.config.txt.in
|
367984602abab743630d1fba8e4940f0a69e678b |
04-Aug-2017 |
Jiyong Park <jiyong@google.com> |
templatize ld.config.txt Lists of libraries in between the linker namespaces are no longer hard-coded in ld.config.txt, but instead come from Soong. Bug: 37139976 Test: build 2017 pixel device with BOARD_VNDK_VERSION=current m -j Test: the device is bootable, basic functionalities (camera, camcorder, wifi, bt, gps, etc.) work. Change-Id: I8170e6c3f6ee04b16359791d64cc46bd2714a073
ndroid.mk
tc/ld.config.txt.in
tc/ld.config.vndk.txt
|
ab8de9ebc351b18f498db24ac5ae215ca68cf614 |
31-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Make default namespace for system processes isolated am: 55f05d79f9 Change-Id: Idd31e85fbe01a506f11c88fd4dcecb23db936d0e
|
697eb2da0db5eaaa8b518e6da3b7b6377312825e |
31-Aug-2017 |
Jiyong Park <jiyong@google.com> |
libz is back to LLNDK For 2016 pixel devices, where VNDK is not fully enforced, move libz back to LLNDK so that we can pass the CTS without requiring the default namespace to be isolated. If we have libz in vndk-sp directory, test_linker_namespaces fails because /system/lib/vndk-sp/libz.so becomes accessible. In order to make the lib inaccessible, we have to make the default namespace isolated, but this can't be done for 2016 pixel devices where VNDK is not fully enforced. So, we choose to remove /system/lib/vndk-sp/libz.so and keep the single copy at /system/lib. Bug: 65018779 Test: android.jni.cts.JniStaticTest#test_linker_namespaces successful on 2016 pixel devices Change-Id: Ib6b6560b02be69d2015c0afb86acf07c02b30c2f
tc/ld.config.txt
|
f390f043815b02ee41ffa9e201c9fa40f4f863cd |
31-Aug-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Merge "Move adbd from root to system" am: 3d6f85167e Change-Id: I3b89a7a8e98252319f850a225ef7ba2080e54879
|
3d6f85167eb885452d049d7b7b7cd88503793a6e |
31-Aug-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Move adbd from root to system"
|
55f05d79f9e83757acb72d3d300262f5954a00af |
28-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Make default namespace for system processes isolated The default namespace for system process now becomes isolated, which means it can load only the libs that are in search.paths and under permitted.paths. /system/framework, /system/app, /system/priv-app, /vendor/app, /data, etc are added to the permitted paths since libart should be able to dlopen odex files under the locations. Following directories become unavailable: /system/lib/vndk /system/lib/vndk-sp Bug: 37013858 Bug: 64888291 Bug: 64950640 Test: 2017 pixel devices builds and boots Test: android.jni.cts.JniStaticTest#test_linker_namespaces passes Change-Id: I2bbe9cc19940c3633c2fb901f9bf8ab813e38c13
tc/ld.config.vndk.txt
|
698da688009d16c98772cd7818ccc3d7facb094d |
29-Aug-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Globally allow up to 32K FDs open per process" am: 451ff37052 am: 42fb030221 am: 32e268561a Change-Id: I07f13cb0ccfa5e5b1bbf9ef3c4dfb27d2e711a02
|
42fb030221d54676c1e10370473d3d369b00a558 |
29-Aug-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Globally allow up to 32K FDs open per process" am: 451ff37052 Change-Id: Icb14faacb7d10fd99dd66e2172e04c0e73a8b170
|
cb5fccc83c6c757f25436884e96c318f72743ffd |
28-Aug-2017 |
Tom Cherry <tomcherry@google.com> |
Globally allow up to 32K FDs open per process We've seen crashes due to processes exceeding the current soft limit for open FDs of 1024, mainly due to increases in using FDs for shared memory and gralloc memory objects. There is not a compelling reason to keep this limit artificially low, so we raise it to 32K. This matches my desktop linux limit, so it is with precedent. Bug: 64894637 Test: open 32K FDs in a process without failure then fail after 32K Change-Id: Ibecfc486e9c61f273a432a108893137d2d13a530
nit.rc
|
566ae3ebf61d63a45100de3245849ba17dc41ced |
28-Aug-2017 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: Lock down access to /proc/net/fib_trie" into oc-mr1-dev am: c3090ba2f4 Change-Id: I9ffa9c76b807c8439f05388f4b8aae3d131bac5a
|
15ffc53f6d57a46e3041453865311035a18e047a |
25-Aug-2017 |
Nick Kralevich <nnk@google.com> |
init.rc: Lock down access to /proc/net/fib_trie Make /proc/net/fib_trie only readable to root. Bug: 31269937 Test: Device boots, file has appropriate permissions. Change-Id: I0d01ce5c043d576344a6732b0b9ff93d62fcaa34
nit.rc
|
8b2136afe0a211c4c923f73150e23212840dc366 |
25-Aug-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "Switch /data/misc/reboot/last_reboot_reason to persistent property" am: 13cb599536 am: 37c6015d9d am: a0641b5c13 Change-Id: Ia78340ffa961a3375dfa5f6b012f4f98bd7b01e3
|
37c6015d9d9130ab5cb3a82d161f93da27036195 |
25-Aug-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "Switch /data/misc/reboot/last_reboot_reason to persistent property" am: 13cb599536 Change-Id: Ib6c1b51668b892288db931b09b099bf5ed28fbae
|
e2c3cb16342c3ad26ac4054f3597ff53038a9e71 |
25-Aug-2017 |
Justin Yun <justinyun@google.com> |
vndk: add vendor/lib(64)/vndk for vendor namespace am: 3094de9684 Change-Id: I389ceda99569f3aaebac1a8b5f04e02e146fa8f0
|
3094de968443c60345f63318f14a5d919df762d5 |
24-Aug-2017 |
Justin Yun <justinyun@google.com> |
vndk: add vendor/lib(64)/vndk for vendor namespace When the vndk is extended by vendor, the libs in vendor/lib(64)/vndk will override system/lib(64)/vndk libs. Vendor binaries will search vndk libs in vendor/lib(64)/vndk prior to system/lib(64)/vndk. Also, remove a workaround for libsdm-color.so Bug: 65032513 Test: build and boot check for libsdm-color.so will be loaded on boot Test: currently no libs exist on vendor/lib(64)/vndk. No test for it Change-Id: I99ed37eb1a9e92c83533e2d92c9c06db11f01e97
tc/ld.config.vndk.txt
|
73e6b49c0c24d22b345498ed60300a51750825fa |
15-Aug-2017 |
Mark Salyzyn <salyzyn@google.com> |
Switch /data/misc/reboot/last_reboot_reason to persistent property Switch from /data/misc/reboot/last_reboot_reason to persistent Android property persist.sys.boot.reason for indicating why the device is rebooted or shutdown. persist.sys.boot.reason has a standard as outlined in b/63736262 and the associated investigation. Made adjustments to the values so that we did not create a problem even before we started. Compliance is part of the tests in boot_reason_test.sh. Test: system/core/bootstat/boot_reason_test.sh Bug: 64687998 Change-Id: I812c55a12faf7cb7ff92101009be058ad9958d07
nit.rc
|
7b9a4d5bcd2cf49d464b82f0c7780fe3bcfd651f |
28-Jul-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Move adbd from root to system Bug: 63910933 Test: normal boot sailfish, checks adb works Test: recovery boot sailfish, checks adb works Test: normal boot bullhead, checks adb works Test: recovery boot bullhead, checks adb works Change-Id: I1b27910c06a4172ca718b3344736ec8e3429f477 Merged-In: I1b27910c06a4172ca718b3344736ec8e3429f477 (cherry picked from commit 93defc17f376041437e5157a7c4d9e0344441811)
nit.usb.rc
|
2e887ef819f6482b9f040eefa6c961b6f3880079 |
22-Aug-2017 |
Justin Yun <justinyun@google.com> |
Implement system namespace for vendor process am: 24c29f1be4 Change-Id: Ie5358aea408aaf817a1f0a76bf6907051cb207e4
|
24c29f1be49f47a6d8a098a10591d9c3f0d4e8ee |
16-Jun-2017 |
Justin Yun <justinyun@google.com> |
Implement system namespace for vendor process For vendor process default namespace searches as following order: 1. /vendor/lib/(hw|egl), /vendor/lib: Vendor libs + VNDK-vnd-ext 2. /system/lib/vndk-$(ver): VNDK libs 3. /vendor/lib/vndk-sp-$(ver): VNDK-SP-vnd-ext 4. /system/lib/vndk-sp-$(ver): VNDK-SP and searches system namespace (/system/lib) only for LL-NDK libs. This configuarion is used only with BOARD_VNDK_VERSION is defined. Bug: 37192038 Test: build with 'BOARD_VNDK_VERSION=current' and boot Change-Id: If9778b9266a084846ba8fe73e6bff25828359d33
ndroid.mk
tc/ld.config.vndk.txt
|
2a64967b7a7afd8deb2b5395ff59285df280ccff |
18-Aug-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Merge "Move adbd from root to system" into oc-mr1-dev am: 0bb4cb6fa2 Change-Id: I0be7a2d6f0d58add826f61df14a5c6503e77413d
|
0bb4cb6fa211f063890d0d27db82853ebf19b878 |
18-Aug-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Move adbd from root to system" into oc-mr1-dev
|
b62e979d72abca2f2f5d88122e98ebe1b2dfeaf1 |
18-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Make the rs namespace visible" into oc-mr1-dev am: f34814e06c Change-Id: I194fb3044998a8f02ff80caefae283a765594417
|
421a5e46b780cab394e4bc18745b8555ba26afa5 |
16-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Make the rs namespace visible This allows us to dlopen libRS_internal.so directly from the rs namespace, not from the sphal namespace. Bug: 64747884 Test: VtsHalRenderscriptV1_0TargetTest successful on the device built with BOARD_VNDK_VERSION=current and [system] namespace config is applied to /data/nativetest[64]/* processes. Change-Id: I0b441791e395798e80a84592ca01e771bb1c201a
tc/ld.config.txt
|
27e501f100120af572b9d4747e7015d1f48cec8e |
15-Aug-2017 |
Justin Yun <justinyun@google.com> |
Merge "Add libft2.so to ll-ndk for rs namespace" into oc-mr1-dev am: acda9cba2e Change-Id: I6835036af67f2328c8ad807b68de2970f2a99fb3
|
93defc17f376041437e5157a7c4d9e0344441811 |
28-Jul-2017 |
Bowgo Tsai <bowgotsai@google.com> |
Move adbd from root to system Bug: 63910933 Test: normal boot sailfish, checks adb works Test: recovery boot sailfish, checks adb works Test: normal boot bullhead, checks adb works Test: recovery boot bullhead, checks adb works Change-Id: I1b27910c06a4172ca718b3344736ec8e3429f477
nit.usb.rc
|
513f76394a767192965888ed495305102b318dab |
13-Aug-2017 |
Justin Yun <justinyun@google.com> |
Add libft2.so to ll-ndk for rs namespace libft2.so is changed to ll-ndk that is available only for rs namespace. Bug: 64425518 Test: build and boot with BOARD_VNDK_VERSION=current Change-Id: I991dc774ca9b92fb6e95a7656243a6a4ecdc0ab9
tc/ld.config.txt
|
53ed5e47291f190d51e874722283c0e14dac4750 |
11-Aug-2017 |
Justin Yun <justinyun@google.com> |
Merge "Move libz vndk-sp from ll-ndk" into oc-mr1-dev am: 28d4818037 Change-Id: Ic058ced0f22045c7141c312537c1c37816868b68
|
dadd3a846fae03b1d4416fcb8f2499b8296d9e83 |
10-Aug-2017 |
Justin Yun <justinyun@google.com> |
Move libz vndk-sp from ll-ndk The ABI of libz is not as stable as it is for ll-ndk. Bug: 37617391 Test: build and boot Change-Id: I883bc6fda268e98cc7cdd5888264170c58688794
tc/ld.config.txt
|
ce88f9878fc4409c48a4afb7181abe9807b65108 |
10-Aug-2017 |
Ryan Campbell <ryanjcampbell@google.com> |
Merge "Include asan options from data partition." am: 5d89e6c7fe am: 725fa57109 am: e817549d2a am: 2c2595bfef Change-Id: I240527da233e95c1eb79d71562e40c3cd5c288a6
|
2c2595bfeff2049cea198ce4185341eca1f0d33e |
10-Aug-2017 |
Ryan Campbell <ryanjcampbell@google.com> |
Merge "Include asan options from data partition." am: 5d89e6c7fe am: 725fa57109 am: e817549d2a Change-Id: Id77b2dd5847e391ef9db0a092ee9d4c4ecd09a2f
|
725fa57109a696b9241b3d577dda1ee037cd7a32 |
10-Aug-2017 |
Ryan Campbell <ryanjcampbell@google.com> |
Merge "Include asan options from data partition." am: 5d89e6c7fe Change-Id: I22bfd9e46cd377b4532e1726522b8c9fdcdfeb04
|
ce30d07b117fedcc78b6cbf549677237a2a042d0 |
09-Aug-2017 |
Ryan Campbell <ryanjcampbell@google.com> |
Include asan options from data partition. Look for asan options under /data/asan so that multi-process coverage can be enabled on a newly-started remote process without disabling verity and without forcing it to be always-on. Test: adb shell echo "include_if_exists=/data/asan/asan.options.%b" >> /system/asan.options && adb shell echo "coverage=1\ncoverage_dir=/data/misc/trace" > /data/asan/asan.options.android.hardware.light@2.0-service && adb shell killall android.hardware.light@2.0-service Bug: 64019182 Change-Id: I241ad8478439323681dc1cfde2fa0770f030ae75
san.options
|
4220c1ab53e13647e26bd9d0b920a57a947809e7 |
09-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace" into oc-mr1-dev am: 42a2f5c992 Change-Id: Ifad4a6062b24db1a56994eae4776096f94cf3d07
|
7d4cf3fd3364a86c895371337a849ab40c99b232 |
04-Aug-2017 |
Jiyong Park <jiyong@google.com> |
Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace android.hidl.memory@1.0-impl.so is a SP-HAL located in /system/lib/vndk-sp/hw. This can't be moved to /vendor/lib since it is a framework HAL. Bug: 62930720 Test: 2017 pixel builds and boots with BOARD_VNDK_VERSION on Change-Id: I9c456983ef68120c5e8c629efc6dd66a26220ecb
tc/ld.config.txt
|
6a8cb78acb31b63f6cdc57e019c940260e1a7ae1 |
02-Aug-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add comments to "public.libraries.*.txt"." am: e7b8fc22af am: 601e5ac55b am: 3cdb21a8c7 am: 54f2e52ab5 Change-Id: Id4b155e157da0c18f2cddebf4085366ae2d0afe0
|
54f2e52ab57b2934d3df04e6e1a4925b3587cf40 |
02-Aug-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add comments to "public.libraries.*.txt"." am: e7b8fc22af am: 601e5ac55b am: 3cdb21a8c7 Change-Id: I049c98243b522b8c3fcb64d917ff64a1e6d576c0
|
601e5ac55b4b3e82157d2e46ab2cfed1a29ce214 |
02-Aug-2017 |
Elliott Hughes <enh@google.com> |
Merge "Add comments to "public.libraries.*.txt"." am: e7b8fc22af Change-Id: I8519a128238758433d194f35f6090633aeb85f0a
|
e7b8fc22af00bc7606289cbd10393e961855b2d1 |
02-Aug-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Add comments to "public.libraries.*.txt"."
|
24d43899cd5f835132e08f6455d940b652f73c98 |
01-Aug-2017 |
Jean-Luc Brouillet <jeanluc@google.com> |
Merge "Make the Neural Networks library loadable by apps." into oc-mr1-dev
|
bd0ad88202ce728096519964994482525cdde25b |
29-Jul-2017 |
Elliott Hughes <enh@google.com> |
Add comments to "public.libraries.*.txt". Folks don't know how to add public native API. Point them in the right direction. Bug: 63905942 Test: boots Change-Id: I5e1f04fb852348255a2f7f87aa961948c41c47fd
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
4de04ccb6b8ed41abf879164e15310b5a699047e |
28-Jul-2017 |
Joel Galenson <jgalenson@google.com> |
Merge "Move chmod of /sys/kernel/debug/tracing to fix tracing." am: 13c3a582de am: c4f2163954 am: 68e79940ea Change-Id: Ie2ca46038cef82d7a63bed3473656c17e94bb503
|
c4f21639543fc6ccd0c18bfcdc12d34d5d7d4339 |
28-Jul-2017 |
Joel Galenson <jgalenson@google.com> |
Merge "Move chmod of /sys/kernel/debug/tracing to fix tracing." am: 13c3a582de Change-Id: I63ca85ffce7aead567c34069135fb066c5a026de
|
d48c4cf23469281eb159b635dd5a5b761ec490b3 |
13-Jun-2017 |
Joel Galenson <jgalenson@google.com> |
Move chmod of /sys/kernel/debug/tracing to fix tracing. This is a temporary fix, since we're still not sure exactly what the bug is. Bug: 62547086 Test: Built, flashed, and booted Sailfish. Verified that the file has the correct permission and that wifi and atrace work. Change-Id: I43275e974a11754eca274f1b77d15cdd03a3b365 (cherry picked from commit 62962dd5b7a37478da2bad786e084345d366f984)
nit.rc
|
97d2b6d785cf7e796d2eaba2056ff4511cbf4119 |
27-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add system/${LIB}/vndk to default namespace for vendor." into oc-mr1-dev
|
e5fa38c73187e23ac3c4d10e808a601abb4cc220 |
27-Jul-2017 |
Siqi Lin <siqilin@google.com> |
Merge "rootdir: record last build fingerprint" am: 4e8227420e Change-Id: I59664c816a8fbf4d7776270b28f4673418d30bcb
|
94aeecea3ba683e2aa54a668ca08dba4abdc73c8 |
27-Jul-2017 |
Siqi Lin <siqilin@google.com> |
rootdir: record last build fingerprint am: b9b76de6ff Change-Id: Ie1c4444c147969dd74a51ca5acd9fe86825f8e3a
|
870353633256641aa646c7a206d1fb809c987fa0 |
27-Jul-2017 |
Siqi Lin <siqilin@google.com> |
rootdir: record last build fingerprint am: b9b76de6ff Change-Id: I2d781eb8684a860dbb4cb9590ba43bf9d2f3b4c6
|
16bb36197b4d5acc4d6c3b27b9117d01ad08280f |
26-Jul-2017 |
Siqi Lin <siqilin@google.com> |
rootdir: record last build fingerprint We can't copy /default.prop so just write the value of $(ro.build.fingerprint) to /data/misc/recovery/ro.build.fingerprint and rotate it after reboot instead. Bug: 62793047 Test: manual - reboot phone and check /data/misc/recovery Change-Id: I130a4b7a01d9e1bfe9baecde2781626eb72e768b (cherry picked from commit b9b76de6ff0600dba846c2af5cccd082494f7243)
nit.rc
|
b9b76de6ff0600dba846c2af5cccd082494f7243 |
26-Jul-2017 |
Siqi Lin <siqilin@google.com> |
rootdir: record last build fingerprint We can't copy /default.prop so just write the value of $(ro.build.fingerprint) to /data/misc/recovery/ro.build.fingerprint and rotate it after reboot instead. Bug: 62793047 Test: manual - reboot phone and check /data/misc/recovery Change-Id: I130a4b7a01d9e1bfe9baecde2781626eb72e768b
nit.rc
|
90a2487776d464e867c7bad1dc8d993ed50df09e |
25-Jul-2017 |
Justin Yun <justinyun@google.com> |
Add system/${LIB}/vndk to default namespace for vendor. With BOARD_VNDK_VERSION=current, vndk libs will be installed in system/${LIB}/vndk. To make them available for vendor, it must be added to default namespace. Bug: 63866913 Test: build and boot with BOARD_VNDK_VERSION=current Change-Id: I9e467a6125fc89513754b56a2420975559144f98
tc/ld.config.txt
|
12f81dfdffb63d71c138d44c245c8a649264b308 |
22-Jul-2017 |
Jean-Luc Brouillet <jeanluc@google.com> |
Make the Neural Networks library loadable by apps. Add to the whitelist the NN API lib. Bug: 63905942 Test: Ran an app that uses the NN API. Change-Id: I83c1acdff58b8fe99fbd7a8fbfb5444fe77b7902
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
342e022547338ae88629e8a5d236d0e79309f88d |
20-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Add [test] section for /data/[nativetest|benchmarktest] am: c034a43d44 Change-Id: I11b98ea29bbba4c3bc29f28fe7ba9864306245dd
|
7847934b8a757f9c4b8dc782298df6c31c90c889 |
20-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Add [test] section for /data/[nativetest|benchmarktest] am: c034a43d44 Change-Id: Ib068a73923a167f46368ea2adda9ff6625c7fcee
|
c034a43d44d87a6bb85bbdec9876b41b46ab5625 |
20-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Add [test] section for /data/[nativetest|benchmarktest] We have both system and vendor tests in the same directory /data/nativetest. Since we can't distinguish system and vendor tests at runtime, we choose to run all of them with the legacy namespace configuration where /system/lib and /vendor/lib are both accessible without any restriction. Furthermore, /system/lib/vndk-sp is added to the list of accessible directories for tests since some libs (such as libion.so) exist only in the directory but not in /system/lib. This will change in the future when we install system and vendor tests into different directories (vendor tests goes into ./vendor subdir). Then, we will run the tests with [system] or [vendor] configurations depending on their paths. Bug: 63597267 Test: run bionic-unit-tests Test: run linker-unit-tests Change-Id: I810003b2da0b30335200c130f484ea7b041f9f80
tc/ld.config.txt
|
5dcd83c6a04eb86a4b94bb624839ee9f7f7bc464 |
19-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Merge "/data/nativetest[64] processes are running with the new ns config" into oc-dr1-dev am: c5aba9702e am: df13c1473d Change-Id: I42d01009bef11774a3a1c7e22771d9ef72f8f39d
|
df13c1473dc741d68a0084eb50f07b5150b12f0d |
19-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Merge "/data/nativetest[64] processes are running with the new ns config" into oc-dr1-dev am: c5aba9702e Change-Id: Icf29b590738b6e3287b3635d352fe2c01d185fd8
|
9d1e50b809c091c01d92b9f7039ec83d94f3f05a |
14-Jul-2017 |
Jiyong Park <jiyong@google.com> |
/data/nativetest[64] processes are running with the new ns config Native tests under /data/nativetest[64] directory is now running with the same linker namespace configuration as /system/bin/* processes. This allows us to stop mimicing the linker namespace configuration of the /system/bin/* processes using LD_LIBRARY_PATH. Bug: 63597267 Test: run bionic-unit-tests Test: run linker-unit-tests Change-Id: If8e2ed0b8016e4e07bf6829735b8e02f952042d0
tc/ld.config.txt
|
3ec9aa4a91e4d04c324f89e8327d0a4b2bf1482c |
14-Jul-2017 |
Mark Salyzyn <salyzyn@google.com> |
rootdir: record last build signature and kernel version (cherry pick from commit 93394034a24534a6807da25b4dabeda36867cd8f) Rotate /default.prop and /proc/version into /data/misc/recovery/ as an aid in determining the vintage of the LAST_LOGCAT and LAST_DMESG in the bugreport collection. Signed-off-by: Mark Salyzyn <salyzyn@google.com> Test: manually confirm content rotation through reboots Bug: 62793047 Change-Id: Ibbe546c76041f20e308e58e5548939afac75db97
nit.rc
|
d16eebd96dda483dd772859e5bc49409c4637486 |
14-Jul-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "rootdir: record last build signature and kernel version" am: 91a17a41f6 am: 97e90c6bb8 am: a62497c189 am: 77bf7449b2 Change-Id: Ic2d43115a4423e3870870406fdf992f7449565bd
|
77bf7449b20a765a36795da37eb4bfe7e61b6ebd |
14-Jul-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "rootdir: record last build signature and kernel version" am: 91a17a41f6 am: 97e90c6bb8 am: a62497c189 Change-Id: Ieaddd4f3b02c7b67fd2b98e9874b037af77a0702
|
97e90c6bb8342f15704c10182d97ff054583b27d |
14-Jul-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "rootdir: record last build signature and kernel version" am: 91a17a41f6 Change-Id: I86afacf1540ad02f5e70c08f39a5c76f98d47c4e
|
93394034a24534a6807da25b4dabeda36867cd8f |
14-Jul-2017 |
Mark Salyzyn <salyzyn@google.com> |
rootdir: record last build signature and kernel version Rotate /default.prop and /proc/version into /data/misc/recovery/ as an aid in determining the vintage of the LAST_LOGCAT and LAST_DMESG in the bugreport collection. Signed-off-by: Mark Salyzyn <salyzyn@google.com> Test: manually confirm content rotation through reboots Bug: 62793047 Change-Id: Ibbe546c76041f20e308e58e5548939afac75db97
nit.rc
|
01af80094e9472215e9a5672ffcf1dda9cc43df9 |
12-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Use the legacy linker namespace configs when target is sanitized"
|
ed73c5c71ada6ebade1e47fe3c5897fac461ebee |
12-Jul-2017 |
Robert Benea <robenea@google.com> |
Merge "Use mem cgroups in libprocessgroup if they're available" am: 3c7f566495 am: 92ad7c02d4 am: 43c6c844de am: 6a4482a438 Change-Id: I307fb64713d44d2447f835f4a74b7c40ccd61b4f
|
6a4482a4382dea661e026828f0c761d202702c07 |
12-Jul-2017 |
Robert Benea <robenea@google.com> |
Merge "Use mem cgroups in libprocessgroup if they're available" am: 3c7f566495 am: 92ad7c02d4 am: 43c6c844de Change-Id: I9c2976886372f5c6e1ae008872cacc0f01fc282f
|
92ad7c02d4335e6c6f2a634a98af97bad6a65611 |
12-Jul-2017 |
Robert Benea <robenea@google.com> |
Merge "Use mem cgroups in libprocessgroup if they're available" am: 3c7f566495 Change-Id: I7b50c83c5ba053faf6be62200570738744dd1e7b
|
3280e48847e5dd16521ad7040d53eb30b66bf740 |
28-Jun-2017 |
Robert Benea <robenea@google.com> |
Use mem cgroups in libprocessgroup if they're available Use mem cgroups if the kernel is built with CONFIG_MEMCG=y, additionally add system group. test: verified on both kernel with/without memcg enabled Change-Id: Ia2ae89efa3905e9da68fa77adac1225c667864d1
nit.rc
|
fff6f75fc1de2963254271d7d254e53ae187cada |
11-Jul-2017 |
Jiyong Park <jiyong@google.com> |
Use the legacy linker namespace configs when target is sanitized The new linker namespace config causes problem when the target is sanitized: vendor libs which are loaded in the sphal namespace can't link against to libclang_rt* libs which are in /system/lib directory because the directory is not allowed for sphal namsapce. Long-term solution would be installing libclang_rt* to both /system/lib and /vendor/lib so that vendor libs can link against to the one in /vendor/lib. Until the work is done, let's just disable the new linker namespace config when the target is to be sanitized. Bug: 63535130 Test: make SANITIZE_TARGET=integer_overflow SANITIZE_TARGET_DIAG=integer_overflow builds and boots to the UI Change-Id: I6afb69885aaa3d25e554b9ca699a572248bfc50a
ndroid.mk
|
7af0deb144292d4a226c607b68827ae5606094b7 |
08-Jul-2017 |
Tim Murray <timmurray@google.com> |
Merge "Revert "Use mem cgroups in libprocessgroup if they're available"" am: e8a75e8f76 am: 7f857bb9ff am: ac68c7fc8c am: 2c0f9c3a72 Change-Id: I36ef31b921d56222902c4bba8f891d6d21dad947
|
2c0f9c3a72e5170630513d85b1d88ee08e518ca0 |
08-Jul-2017 |
Tim Murray <timmurray@google.com> |
Merge "Revert "Use mem cgroups in libprocessgroup if they're available"" am: e8a75e8f76 am: 7f857bb9ff am: ac68c7fc8c Change-Id: I19e5d24a936e992bb634fd589ce04416dbf07c21
|
7f857bb9ffb1fb97968998ebc4eda9ef92f590bb |
08-Jul-2017 |
Tim Murray <timmurray@google.com> |
Merge "Revert "Use mem cgroups in libprocessgroup if they're available"" am: e8a75e8f76 Change-Id: Iec01b90ae7d49d1eaf4a6e0c5324749a358db5d6
|
e8a75e8f76d0c0fb97aed77758a9fbea65992134 |
08-Jul-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Revert "Use mem cgroups in libprocessgroup if they're available""
|
fc10e3d5e5385081853b7d1b3cc41f882ac6325d |
08-Jul-2017 |
Tim Murray <timmurray@google.com> |
Revert "Use mem cgroups in libprocessgroup if they're available" This reverts commit 32375c23284704a7d044ed79060c4431468b4b4e. bug 63164307 Change-Id: I3336bbf7c2f3297b231c5b0a1ef538faff9513fd
nit.rc
|
cea7028cf44970c11a65c7b9a0f106dce82c651b |
07-Jul-2017 |
Wei Wang <wvw@google.com> |
Merge "init: Support custom shutdown actions" into oc-dr1-dev
|
5d4d6f72695d532ee138d8a412dd13a7ea9a0025 |
28-Jun-2017 |
Wei Wang <wvw@google.com> |
init: Support custom shutdown actions We have been seeing panics and errors during shutdown sequence in some vendor's platform, and it is required to disable error handling during shutdown. This CL separates the shutdown request to execute another "shutdown" trigger at the beginning of shutdown stage. And vendor can use this trigger to add custom commands needed for shutting down gracefully. Bug: 38203024 Bug: 62084631 Test: device reboot/shutdown Change-Id: I3fac4ed59f06667d86e477ee55ed391cf113717f (cherry picked from commit eeab491efd8f456324f88e444f228b1016712e45)
nit.rc
|
f5b616dabf0a82c5d3f11f7763a77f94ae5d8603 |
06-Jul-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "add "shutdown critical" to service" am: b3915d113d am: a4ad5d0328 am: 19ec8e7bcf am: bedc5faea7 Change-Id: I62cd1bc82531b88f5d8c8ac2dd637d5ec9d52572
|
bedc5faea7d38f67b6874af0e91bdfa3cbdfcb77 |
06-Jul-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "add "shutdown critical" to service" am: b3915d113d am: a4ad5d0328 am: 19ec8e7bcf Change-Id: Ide84d7f87a9884068ebc1cc9680c997507727af3
|
d266d37e4cb6d0b31eb9422b73f051632ea7365f |
05-Jul-2017 |
Keun-young Park <keunyoung@google.com> |
add "shutdown critical" to service - "shutdown critical" prevents killing the service during shutdown. And the service will be started if not running. - Without it, services will be killed by SIGTERM / SIGKILL during shutdown. - Even services with "shutdown critical" will be killed if shutdown times out. - Removes ueventd and vold from hard coded list. Each service's rc will be updated to add "shutdown critical". watchdogd is still kept in the list. bug: 37626581 Test: reboot and check last kmsg (cherry picked from commit cccb34fce8798f2a359c6eb0e394ef9460673629) Change-Id: I3c6aeb7151e64beca4b435f843ae64455217262d
nit.rc
|
a4ad5d0328334eb390368ef57d87ddd92fd51b5d |
06-Jul-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "add "shutdown critical" to service" am: b3915d113d Change-Id: I25b6f42478efda7077e00141042a427245393d28
|
b3915d113df4d24dfc4a72092f9b414422eaa9fc |
06-Jul-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "add "shutdown critical" to service"
|
a89b61ad99ea6aa731fbac6d5e3095a831a938d6 |
06-Jul-2017 |
Wei Wang <wvw@google.com> |
Merge "init: Support custom shutdown actions" am: c1bc4241f8 am: 5b89535442 am: b39890048c am: 2a38e6d119 Change-Id: I6776039ebf9f87b41193cc24a9786dc80db99e43
|
2a38e6d11990caa40fba9572bbf65b7d0382be1d |
06-Jul-2017 |
Wei Wang <wvw@google.com> |
Merge "init: Support custom shutdown actions" am: c1bc4241f8 am: 5b89535442 am: b39890048c Change-Id: I57a0422f47094cc061163510138e9562648fdd98
|
5b895354427ac2d0861beeeaf0cd71454df4bf88 |
06-Jul-2017 |
Wei Wang <wvw@google.com> |
Merge "init: Support custom shutdown actions" am: c1bc4241f8 Change-Id: I6bb1789dbc5edbb10f2f4d712e9ca83e6302fdf4
|
cccb34fce8798f2a359c6eb0e394ef9460673629 |
05-Jul-2017 |
Keun-young Park <keunyoung@google.com> |
add "shutdown critical" to service - "shutdown critical" prevents killing the service during shutdown. And the service will be started if not running. - Without it, services will be killed by SIGTERM / SIGKILL during shutdown. - Even services with "shutdown critical" will be killed if shutdown times out. - Removes ueventd and vold from hard coded list. Each service's rc will be updated to add "shutdown critical". watchdogd is still kept in the list. bug: 37626581 Test: reboot and check last kmsg Change-Id: Ie8cc699d1efbc59b9a2561bdd40fec64aed5a4bb
nit.rc
|
eeab491efd8f456324f88e444f228b1016712e45 |
28-Jun-2017 |
Wei Wang <wvw@google.com> |
init: Support custom shutdown actions We have been seeing panics and errors during shutdown sequence in some vendor's platform, and it is required to disable error handling during shutdown. This CL separates the shutdown request to execute another "shutdown" trigger at the beginning of shutdown stage. And vendor can use this trigger to add custom commands needed for shutting down gracefully. Bug: 38203024 Bug: 62084631 Test: device reboot/shutdown Change-Id: I3fac4ed59f06667d86e477ee55ed391cf113717f
nit.rc
|
bee0ff25249d11c2c35168fce7d37c114c3f429f |
05-Jul-2017 |
Logan Chien <loganchien@google.com> |
Revert "Move libz to vndk-sp" am: f499bcdde7 am: b0bff4a55c Change-Id: I30ff5acb75c0e6f8c4285703f9a8b4f5ce44bf70
|
b0bff4a55ccf611fe1597416cd3fe4f256f09c3c |
05-Jul-2017 |
Logan Chien <loganchien@google.com> |
Revert "Move libz to vndk-sp" am: f499bcdde7 Change-Id: I7f641efd4c8e88289496507c7f940db9ea60f745
|
f499bcdde70772368d5817d342242cf8bd8743ca |
29-Jun-2017 |
Logan Chien <loganchien@google.com> |
Revert "Move libz to vndk-sp" This commit removes libz.so from the exported libs of "vndk" linker namespace and export libz.so from "default" linker namespace instead. We have to remove libz.so from vndk-sp because we don't have a good mechanism to stop "classloader" linker namespace from loading /system/lib[64]/vndk-sp/libz.so. Other alternatives require significant changes to dynamic linker or CTS test cases. Let's temporarily revert the commit to fix b/62195853 for oc-dr1-dev. The long-term solution will be discussed in b/37617391. This reverts commit 63226400f34f9ec1f07990d5b5e36b3443188463. Bug: 62195853 Bug: 37617391 Test: Boot sailfish to home screen. Change-Id: I4a97819b080f7091b633152d4a11353b24c463ee
tc/ld.config.txt
|
ea5fd4d828398a14d9e8b231ee1f845160081c64 |
30-Jun-2017 |
Robert Benea <robenea@google.com> |
Merge "Use mem cgroups in libprocessgroup if they're available" am: d3afc124b6 am: 46706e6824 am: 74c02e7b58 am: 888d9e198b Change-Id: I6f3a475bfff19801792ff7017150be6955cdd631
|
888d9e198b824d16c395a618e2b0f7c33d3544ba |
30-Jun-2017 |
Robert Benea <robenea@google.com> |
Merge "Use mem cgroups in libprocessgroup if they're available" am: d3afc124b6 am: 46706e6824 am: 74c02e7b58 Change-Id: Iba2c643286063a9ffa22f3917f8acbcca1d77ef3
|
46706e6824acf9fd6da30c44b7e0432fea438f93 |
30-Jun-2017 |
Robert Benea <robenea@google.com> |
Merge "Use mem cgroups in libprocessgroup if they're available" am: d3afc124b6 Change-Id: Idd72671eb144343a73a02bfbde8603265ca78650
|
32375c23284704a7d044ed79060c4431468b4b4e |
28-Jun-2017 |
Robert Benea <robenea@google.com> |
Use mem cgroups in libprocessgroup if they're available Use mem cgroups if the kernel is built with CONFIG_MEMCG=y, additionally add system group. test: verified on both kernel with/without memcg enabled Change-Id: Ib9d1c8e3c797e75f160e0e92edf3f11c9d8e9f17
nit.rc
|
4a4259b51bb74229f67f4123e0050a6e2f1fc324 |
28-Jun-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge changes Ibe1feb39,I05be83e4,If1422e4d am: a4f086ab20 am: 3a156e6c2b am: ca0c0bb96e am: 872206fd80 Change-Id: I9c08baaf94f2eaaf2ad9633e70b9cd0c1dd484ed
|
872206fd807719102080a263946e87db64e5bdf3 |
27-Jun-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge changes Ibe1feb39,I05be83e4,If1422e4d am: a4f086ab20 am: 3a156e6c2b am: ca0c0bb96e Change-Id: I21636d01cf0cb0bd581104d2bfb5624877bfaf6a
|
3a156e6c2b75ae8fad999dc25196470bc40cc9c3 |
27-Jun-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge changes Ibe1feb39,I05be83e4,If1422e4d am: a4f086ab20 Change-Id: I7e5d431c992f9860ca7b42ca81edfbfd1d8e0a1c
|
4eb0ba058c6fca6a5f8a81308f006b52567fc3c5 |
27-Jun-2017 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: setup console-ramoops-0 On later kernels /sys/fs/pstore/console-ramoops becomes /sys/fs/pstore/console-ramoops-0 Test: none Bug: 63058217 Change-Id: Ibe1feb39ef9081b1ab2316510674bf181bdc7b0c
nit.rc
|
0821c9c4e039b764a98a87e04f2d1eb20eb33ccd |
23-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Export android.hidl.memory@1.0-impl am: bd7503dae7 am: 6db67ddca3 Change-Id: Ifeda019991f85a45e4d938d80a82f2940c0a0952
|
735a32e30e6cd77844249df5e12606428b072df7 |
23-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Export android.hidl.memory@1.0-impl am: fb2a4f0874 Change-Id: Ib23a91581514f275642cb05afddbfc5324bca3bb
|
fb2a4f08745d1673133ad524237c71878165f2c2 |
22-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Export android.hidl.memory@1.0-impl This commit exports android.hidl.memory@1.0-impl.so from default linker namespace to vndk (VNDK-SP) linker namespace. This fixes libhidlmemory.so failure. Note: Exposing android.hidl.memory@1.0-impl.so from default linker namespace to vndk (VNDK-SP) linker namespace shall be fine because its APIs are frozen and won't be changed in the future. Note: android.hidl.memory@1.0-impl.so is NOT exported to sphal linker namespace. Bug: 35107583 Bug: 62778280 Test: Write a test SP-HAL lib which links libhidlmemory.so, load that SP-HAL lib into system executable, and make sure mapMemory() works. Test: sailfish boots w/o problems. Merged-In: Ia36350dcf1f8c8dc6d7bf2c7a6ae65e0ebaef578 Merged-In: Iddb723558c3a814a905cd42797594a707bc651da Change-Id: I69034595b2cd355e786ce7943fed7dddf1b12525 (cherry picked from commit bd7503dae7008bfecbd729ba9e473c73ada17141) (cherry picked from commit 3251e582f268b2b30a35e482e026fc9026b3956c)
tc/ld.config.txt
|
bd7503dae7008bfecbd729ba9e473c73ada17141 |
22-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Export android.hidl.memory@1.0-impl This commit exports android.hidl.memory@1.0-impl.so from default linker namespace to vndk (VNDK-SP) linker namespace. This fixes libhidlmemory.so failure. Note: Exposing android.hidl.memory@1.0-impl.so from default linker namespace to vndk (VNDK-SP) linker namespace shall be fine because its APIs are frozen and won't be changed in the future. Note: android.hidl.memory@1.0-impl.so is NOT exported to sphal linker namespace. Bug: 35107583 Bug: 62778280 Test: Write a test SP-HAL lib which links libhidlmemory.so, load that SP-HAL lib into system executable, and make sure mapMemory() works. Test: sailfish boots w/o problems. Change-Id: Ia36350dcf1f8c8dc6d7bf2c7a6ae65e0ebaef578
tc/ld.config.txt
|
34d0b91b156904fb7172cc1d1bfaacf23ccce7e3 |
21-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Add HIDL memory libs to VNDK-SP am: d7a6fb9383 am: 78daf5696d Change-Id: I2f0d1f2d74acb74a9defb6ef0f7bec9c955152a4
|
7b66b21773281d16b7cd7cc74da62230465cb626 |
19-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Add HIDL memory libs to VNDK-SP This commit adds libhidlmemory.so and android.hidl.memory@1.0.so to the exported libs of the `vndk` linker namespace (aka. VNDK-SP). This is necessary because some vendors' GLES implementation uses libhidlmemory.so. Check http://b/35107583#comment15 for the context. Bug: 35107583 Test: sailfish boots Merged-In: Idb5ba4ed4a89795e0e6105d55a84e7f6bbffff51 Change-Id: I1556b7499bd981af995f000519b7a314c70567d1
tc/ld.config.txt
|
d7a6fb93833102b3fd6a024b7cb330344b871ca3 |
19-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Add HIDL memory libs to VNDK-SP This commit adds libhidlmemory.so and android.hidl.memory@1.0.so to the exported libs of the `vndk` linker namespace (aka. VNDK-SP). This is necessary because some vendors' GLES implementation uses libhidlmemory.so. Check http://b/35107583#comment15 for the context. Bug: 35107583 Test: sailfish boots Change-Id: Idb5ba4ed4a89795e0e6105d55a84e7f6bbffff51
tc/ld.config.txt
|
ea2719f9f1ef8047b28927ef67136291235b36bb |
19-Jun-2017 |
Logan Chien <loganchien@google.com> |
ld-config: Add HIDL memory libs to VNDK-SP This commit adds libhidlmemory.so and android.hidl.memory@1.0.so to the exported libs of the `vndk` linker namespace (aka. VNDK-SP). This is necessary because some vendors' GLES implementation uses libhidlmemory.so. Check http://b/35107583#comment15 for the context. Bug: 35107583 Test: sailfish boots Merged-In: Idb5ba4ed4a89795e0e6105d55a84e7f6bbffff51 Merged-In: I1556b7499bd981af995f000519b7a314c70567d1 Change-Id: I5af7c954d432a2e8de6c6b744cedbada836bbd98
tc/ld.config.txt
|
62962dd5b7a37478da2bad786e084345d366f984 |
13-Jun-2017 |
Joel Galenson <jgalenson@google.com> |
Move chmod of /sys/kernel/debug/tracing to fix traceur. This is a temporary fix, since we're still not sure exactly what the bug is. Bug: 62547086 Test: Built, flashed, and booted Marlin. Verified that the file has the correct permission and that traceur does not popup an error. Change-Id: I43275e974a11754eca274f1b77d15cdd03a3b365
nit.rc
|
b4929b219477ca18025571a5e9e0026485b0ae19 |
12-Jun-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Don't allow libui.so to RS drivers." into oc-dr1-dev am: 1a7a5419d0 am: 5e4da5195f Change-Id: I4c495f24ed4bab5fbca4f0d6432f8612ba2c6132
|
9242f68c0dc27fc3eff58f4216b3368926b90c34 |
09-Jun-2017 |
Jiyong Park <jiyong@google.com> |
Don't allow libui.so to RS drivers. libui.so is not VNDK-SP, so it must not be allowed to RS drivers. Bug: 37550338 Test: camerascript app works well in 2017 pixel devices Change-Id: I34971baebdc91f11935d1eb4ddd07d89d4c38958
tc/ld.config.txt
|
ef9a611bb7360ba7a1ac4e39a158a90f8a0461e3 |
07-Jun-2017 |
Logan Chien <loganchien@google.com> |
Add libion.so to vndk-sp am: 5c880b948e am: 60c9e4486b Change-Id: If9947f17c2af1253bef9b2d8664deaba6a222e11
|
184505597f6182577eab627118be5341c3ca1b2b |
07-Jun-2017 |
Logan Chien <loganchien@google.com> |
Add libion.so to vndk-sp This commit adds libion.so to VNDK-SP so that some vendor's gralloc.${chipset}.so can run without problems. Bug: 62280700 Test: Boots a device from our partners Merged-In: I2bcfe40ed9342de6d81dd310313e984a2c64964b Change-Id: Ib745dfe52107d792296426b097e13b7c7755d88c
tc/ld.config.txt
|
40624c5d1dcb08313361367e0a11feab380d5a21 |
06-Jun-2017 |
Logan Chien <loganchien@google.com> |
Add libion.so to vndk-sp This commit adds libion.so to VNDK-SP so that some vendor's gralloc.${chipset}.so can run without problems. Bug: 62280700 Test: Boots a device from our partners Merged-In: Ib745dfe52107d792296426b097e13b7c7755d88c Merged-In: I2bcfe40ed9342de6d81dd310313e984a2c64964b Change-Id: If30657b93157a2abea29fadcdb0004b37ad9eaf2
tc/ld.config.txt
|
5c880b948eabcad8d6126e024167734a45c47d90 |
07-Jun-2017 |
Logan Chien <loganchien@google.com> |
Add libion.so to vndk-sp This commit adds libion.so to VNDK-SP so that some vendor's gralloc.${chipset}.so can run without problems. Bug: 62280700 Test: Boots a device from our partners Change-Id: I2bcfe40ed9342de6d81dd310313e984a2c64964b
tc/ld.config.txt
|
f01b52895dfb44c3a7e98a870ab415672aee0960 |
23-May-2017 |
Jiyong Park <jiyong@google.com> |
vndk: remove vendor/lib from the search path of the 'vndk' namespace 'vndk' namespace is the place for VNDK-SP libs. So /vendor/lib must be removed from its search paths. It was there just because libhardware (which is VNDK-SP) is loading HAL libs in vendor partition from there. However this problem has been solved by modifying the libhardware so that HAL libs are loaded from the 'sphal' namespace and not from the current (the 'vndk') namespace. Bug: 37731053 Test: sailfish builds and boots Change-Id: Ia88934a975aa8811e05b5ba408e42d132f20f4e9
tc/ld.config.txt
|
ec39a758a15bd43e1f9617674ff4e322bb571289 |
01-Jun-2017 |
Robert Benea <robenea@google.com> |
Merge "cgroups used by init must be mounted before any services start" am: 63c15c1b11 am: cc6da8ec5b am: b30ad069ec am: 9c18097147 Change-Id: I49aee8cae9374ba40312f6a929909a77f2df6492
|
9c180971470b01d9fcbf7051ac1e5db2427700c4 |
01-Jun-2017 |
Robert Benea <robenea@google.com> |
Merge "cgroups used by init must be mounted before any services start" am: 63c15c1b11 am: cc6da8ec5b am: b30ad069ec Change-Id: I5627d6720aa0c237aca0cdd1cb75b654cb183158
|
c638569c2ebdc36f93a05190cd52dc08f4321d1b |
01-Jun-2017 |
Robert Benea <robenea@google.com> |
cgroups used by init must be mounted before any services start init uses /acct and optionally /dev/memcg for tracking services and therefore these must be started before any services start. Test: check that cgroups are mounted appropriately. Change-Id: Ice095287963181fe687dbe6b7d291076e674d1cc
nit.rc
|
f97d96b8f4c3291f139a035ea05197eccc0c56f1 |
18-May-2017 |
Yueyao Zhu <yueyao@google.com> |
init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc /init.${ro.hardware}.rc would sometime rely on being parsed before other .rc files. In this case all vendors are still able to have a .rc file included before all the ones in /vendor/etc/init. Merged-In: I3fb6df13a39204a516874ea94f5e5ad84bca42c6 Bug: 38301110 Change-Id: I3fb6df13a39204a516874ea94f5e5ad84bca42c6 (cherry picked from commit f7c34ad4bf1f4afdb7f901bcf908128ad7c2ca3a)
nit.rc
|
948624faca49c7dad43169fa0fc16711e7655ed2 |
24-May-2017 |
Logan Chien <loganchien@google.com> |
Merge "Move libz to vndk-sp"
|
2a20488a77ee833abe4ea8078ed873d42631b61d |
19-May-2017 |
Thierry Strudel <tstrudel@google.com> |
Merge "init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc" into oc-dev am: 64bea883cb am: b1fad8a5b0 Change-Id: I0f1f47059715fc55bf9ebe4b9a61e3f6d2d50726
|
b1fad8a5b0dedead07451d3d29599663f2c49dff |
19-May-2017 |
Thierry Strudel <tstrudel@google.com> |
Merge "init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc" into oc-dev am: 64bea883cb Change-Id: I785aac40d7ee2617213f949fd9074bf6f394c952
|
f7c34ad4bf1f4afdb7f901bcf908128ad7c2ca3a |
18-May-2017 |
Yueyao Zhu <yueyao@google.com> |
init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc /init.${ro.hardware}.rc would sometime rely on being parsed before other .rc files. In this case all vendors are still able to have a .rc file included before all the ones in /vendor/etc/init. Bug: 38301110 Change-Id: I3fb6df13a39204a516874ea94f5e5ad84bca42c6
nit.rc
|
a214d3123e702baf36e35c8a9ee659a688bd2881 |
17-May-2017 |
Jiyong Park <jiyong@google.com> |
Allow vndk-sp to be extended by vendors am: eb9694a2d1 am: ee7da4f37d Change-Id: I7cb5b7c225774d14bc72219143ce22e1246b2ad7
|
ee7da4f37d38e95e26f06fc15db9e24be69a92bc |
17-May-2017 |
Jiyong Park <jiyong@google.com> |
Allow vndk-sp to be extended by vendors am: eb9694a2d1 Change-Id: I35e4a6f0f7a712e01923a9e1d3456c81d5c0367a
|
eb9694a2d195fad283485c5c54aaf622fa59ad84 |
09-May-2017 |
Jiyong Park <jiyong@google.com> |
Allow vndk-sp to be extended by vendors Exteded vndk-sp should go to /vendor/lib/vndk-sp. Bug: 37940694 Test: sailfish builds and boots Test: manually copying a lib from /system/lib/vndk-sp to /vendor/lib/vndk-sp. Check that the copied one in /vendor partition is loaded instead of the original one. Change-Id: Ia5dd6f35bd31d4a20a794bec148e1fc3c6d7b72b
tc/ld.config.txt
|
c9c527f81f9e5cad429bdc74103c918aaf9c2a1b |
16-May-2017 |
Jiyong Park <jiyong@google.com> |
resolve merge conflicts of fbe942724 to oc-dev-plus-aosp Test: I solemnly swear I tested this conflict resolution. Merged-In: I137c17d55940b783eab6d0125bc4d26b96bcc2f2 Change-Id: I90c3ff7c82a9b53ce00057fd87cf227d5faf0975
|
63226400f34f9ec1f07990d5b5e36b3443188463 |
08-May-2017 |
Logan Chien <loganchien@google.com> |
Move libz to vndk-sp This commit moves libz.so from default namespace to vndk namespace. Accodring to b/37617391, libz.so is not as stable as we thought, thus it should be vndk-sp instead of ll-ndk. Bug: 37617391 Test: sailfish builds, boots, no new dynamic linker errors in log Change-Id: I3922895a169303c33914a8a0f4b50cb993a724c9
tc/ld.config.txt
|
15d7483bb77158b5fe631454208cfb2e130572f7 |
10-May-2017 |
Jiyong Park <jiyong@google.com> |
add libvndksupport.so to ll-ndk libvndksupport.so is a new member of ll-ndk. Bug: 37323945 Test: sailfish builds and boots Merged-In: Ic5db48292a30a6face7f263d939f27a0760240b1 Change-Id: Ic5db48292a30a6face7f263d939f27a0760240b1 (cherry picked from commit 7000859b7cb0b0947d11f9fbe4ffddb6f66cabc4)
tc/ld.config.txt
|
abaab6ff03c61e73e52fac515a76f1afe13e97ac |
25-Apr-2017 |
Jiyong Park <jiyong@google.com> |
libbacktrace is VNDK-SP libbacktrace and its dependents are now VNDK-SP. Since they are in /vendor/lib/vndk-sp directory, they are accessible directly from the vndk namespace. Therefore, libbacktrace is removed from the exported shared libs list of the default namespace. Bug: 37413104 Test: sailfish builds and boots Merged-In: I137c17d55940b783eab6d0125bc4d26b96bcc2f2 Change-Id: I137c17d55940b783eab6d0125bc4d26b96bcc2f2 (cherry picked from commit b2a4b8cd18e5f45571b8e929088047b445b6f63b)
tc/ld.config.txt
|
f50d1091e9e92c4b72cb3122305cbc96cb07238c |
19-Dec-2016 |
Joel Fernandes <joelaf@google.com> |
init.rc: Add a new schedtune group 'rt' for rt tasks Add a new boost group for rt tasks. Device specific changes will be in the device init rc. Bug: 33085313 Change-Id: I99ca085d0933d878795bb0eda639bb2075419415 Signed-off-by: Joel Fernandes <joelaf@google.com>
nit.rc
|
583c5c1b2d0d3d41d8249144062b3e2f98023cf3 |
12-May-2017 |
Steve Muckle <smuckle@google.com> |
Revert "disable module loading after BOOT_COMPLETED broadcast" am: f59c55aa7a am: e8240c4551 Change-Id: I5d78cb0eded0f11bf7009ed792484b414f2aa704
|
e8240c4551fdcd1b222fa72622b57d40e825cdce |
12-May-2017 |
Steve Muckle <smuckle@google.com> |
Revert "disable module loading after BOOT_COMPLETED broadcast" am: f59c55aa7a Change-Id: Ib871ab1f2005c074dad0dd207e4dc41bd35568d6
|
f608eb283a13fad440f75bdf2d43eda13456956d |
12-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Merge "Adding 'uhid' permission for access to /dev/uhid." am: cecbc9993d am: 04daed4793 am: d819380f50 am: b995b58631 Change-Id: I0c4f2e22d6195f219a2e1b0ef346ce89b642dc6c
|
b995b58631daf00c4cbe2dc48224a363c20d58be |
12-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Merge "Adding 'uhid' permission for access to /dev/uhid." am: cecbc9993d am: 04daed4793 am: d819380f50 Change-Id: If06b07c88276c32cdf5b53e6afcf0563e6538544
|
cecbc9993d5f5951e0287922aebbb3fd606166a5 |
11-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Merge "Adding 'uhid' permission for access to /dev/uhid."
|
7000859b7cb0b0947d11f9fbe4ffddb6f66cabc4 |
10-May-2017 |
Jiyong Park <jiyong@google.com> |
add libvndksupport.so to ll-ndk libvndksupport.so is a new member of ll-ndk. Bug: 37323945 Test: sailfish builds and boots Change-Id: Ic5db48292a30a6face7f263d939f27a0760240b1
tc/ld.config.txt
|
0729dd1edb1e392f60f9a2ad5cc06a84df2ab1f6 |
09-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Adding 'uhid' permission for access to /dev/uhid. This CL is in support of another CL c/2048848, topic 'Refactor hid command in /frameworks/base/cmds' in internal master. Adding the permissions for shell here to access uhid_node as part of the new 'uhid' group. Bug: 34052337 Test: Tested on angler, bluetooth mouse works OK. Change-Id: If9e100aa1262d689fb8adc5c0ce93f157c96399e
eventd.rc
|
f59c55aa7a40085d5df1e2b17719f8e23a433316 |
10-May-2017 |
Steve Muckle <smuckle@google.com> |
Revert "disable module loading after BOOT_COMPLETED broadcast" This reverts commit 6ed19d1675ab7a9b45d1b82c90aac2be8f408a2e. Allow devices to decide for themselves whether to allow module loading after boot. Bug: 38204366 Test: boot sailfish, load a kernel module Change-Id: Ib9e77381de9003fb5160463664015a95316ddfc5
nit.rc
|
657b967d48fb0a915e7ebf411b30654ca05b97be |
09-May-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Revert "Make /data/data a symlink to /data/user/0"" am: 823816ee9f am: 20a74298a5 am: e4f35b111e am: 2920471ffa Change-Id: I9057d2ee58e3f99e422ac1a203bd219e7f552ba0
|
2920471ffa77dda3d655452f6f81d9f48f9b1146 |
08-May-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Revert "Make /data/data a symlink to /data/user/0"" am: 823816ee9f am: 20a74298a5 am: e4f35b111e Change-Id: I9fdb4b5d8e6b1dcf89b853a737f389553cc1a1df
|
982e0693ce69021636e779c759ff6c596038dd1f |
05-May-2017 |
Tom Cherry <tomcherry@google.com> |
Revert "Make /data/data a symlink to /data/user/0" This reverts commit d147cb5887f1ee9c978f58cdf59e9ddb99209ac6. Original change breaks AVD Original changes breaks SF/AF Bug: 38026755 Bug: 38030346 Bug: 38114264 Change-Id: Iab56244f0dc0f6b0df2916c691277a882fc7d184
nit.rc
|
b2a4b8cd18e5f45571b8e929088047b445b6f63b |
25-Apr-2017 |
Jiyong Park <jiyong@google.com> |
libbacktrace is VNDK-SP libbacktrace and its dependents are now VNDK-SP. Since they are in /vendor/lib/vndk-sp directory, they are accessible directly from the vndk namespace. Therefore, libbacktrace is removed from the exported shared libs list of the default namespace. Bug: 37413104 Test: sailfish builds and boots Change-Id: I137c17d55940b783eab6d0125bc4d26b96bcc2f2
tc/ld.config.txt
|
55337fd5ccef969bd03ca6689d99bf35eded3b27 |
03-May-2017 |
Steven Moreland <smoreland@google.com> |
Remove redundant dependencies android.hidl.base@1.0 and android.hidl.manager@1.0 are built into libhidltransport. Test: boot internal marlin Bug: 33276472 Change-Id: I32dc22607f2df5c71555161178865900b35fc75b (cherry picked from commit fa5ea6a81a9f85b4f24beb20e2b9cca411eb58b4)
tc/ld.config.txt
|
04df8f456c13bdd857957e0310491c2c9ae28c8b |
04-May-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Remove redundant dependencies"
|
c1c4dada312bffa9a8a876e81be4dedb4fc8f4f6 |
04-May-2017 |
Jiyong Park <jiyong@google.com> |
Merge "update /vendor/*/vndk-sp to /system/*/vndk-sp" into oc-dev am: d5398bf97d am: 874ed5ec96 Change-Id: I965e8ccb742a0133ba75fd913ffd2edb9559359a
|
874ed5ec965706f185e646c7264246b4b5364586 |
04-May-2017 |
Jiyong Park <jiyong@google.com> |
Merge "update /vendor/*/vndk-sp to /system/*/vndk-sp" into oc-dev am: d5398bf97d Change-Id: I77ff71643767c0c0933d80d835b648673d68a343
|
4ffa5c5de91825bad66ec3214ad23b1a895e091b |
04-May-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Make /data/data a symlink to /data/user/0" am: 49bbe16447 am: c43da33005 am: f95686e0cf am: b4f7e5b0c4 Change-Id: I225a92299452373b3e428b3b303dfb823acd3c6c
|
b4f7e5b0c4bb7f8ae6fbe67793de2378503447d9 |
04-May-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "Make /data/data a symlink to /data/user/0" am: 49bbe16447 am: c43da33005 am: f95686e0cf Change-Id: I081704dc6d7d60edaca979f6af2b1c4418ebc844
|
d147cb5887f1ee9c978f58cdf59e9ddb99209ac6 |
11-Apr-2017 |
cjbao <cathy.bao@intel.com> |
Make /data/data a symlink to /data/user/0 For legacy reason, /data/data is a real dir and /data/user/0 is a symbolic link to it. Overhead for linux kernel to walk through symbolic link is not negligible. This is unnessary overhead to carry over. This patch is to make /data/user/0 a a real dir and make legacy folder /data/data a symbolic link. OTAed system does not get impacted. Test: Manual test Change-Id: I419564a75f6ebf3154badb8725ba9831164592b6 Signed-off-by: cjbao <cathy.bao@intel.com>
nit.rc
|
fa5ea6a81a9f85b4f24beb20e2b9cca411eb58b4 |
03-May-2017 |
Steven Moreland <smoreland@google.com> |
Remove redundant dependencies android.hidl.base@1.0 and android.hidl.manager@1.0 are built into libhidltransport. Test: boot internal marlin Bug: 33276472 Change-Id: I32dc22607f2df5c71555161178865900b35fc75b
tc/ld.config.txt
|
c641e19c7ee83b7418ec5aba2394706e95137d9b |
03-May-2017 |
Jiyong Park <jiyong@google.com> |
update /vendor/*/vndk-sp to /system/*/vndk-sp Some paths weren't updated. Bug: 37522144 Test: sailfish builds and boots Change-Id: I7aeb5d6e0d61bbc6bde4e6f221e90b21ca422622
tc/ld.config.txt
|
82ab44ce0948cdc880edc151262e46ff9d3057d9 |
29-Apr-2017 |
Guang Zhu <guangzhu@google.com> |
Merge "Revert "Enable metadata encryption""
|
9709c5a7ff7446f2faac53df5ab45b9bc002b9fa |
29-Apr-2017 |
Guang Zhu <guangzhu@google.com> |
Revert "Enable metadata encryption" Bug: 37792477 This reverts commit 2bf87eebe4dd4de23f3dac5d33f8fea4218bd035. Change-Id: I1a43793beda24c01f0fe9e25a7c183af1200fa76
nit.rc
|
4f4a2baa213b612e7ad41edbd0c0a2633b738dcd |
28-Apr-2017 |
Nick Desaulniers <ndesaulniers@google.com> |
Merge "Enable metadata encryption"
|
2bf87eebe4dd4de23f3dac5d33f8fea4218bd035 |
25-Apr-2017 |
Paul Lawrence <paullawrence@google.com> |
Enable metadata encryption Bug: 26778031 Test: Boots, reboots, sector 0 of userdata encrypted Make sure an FDE device, both default and password protected, boots. Make sure an FBE device without metadata encryption boots. Change-Id: I55135f2d81002f4010a857c021ee840f792f7917
nit.rc
|
d6ab6456c56d63ec069fe637cd5b9aad87ef5133 |
27-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Initialize textclassifier model update directory Test: Builds successfully. Directory is initialized on install. Tests pass. bit FrameworksCoreTests:android.view.textclassifier.TextClassificationManagerTest Bug: 34780396 Merged-In: Icbf7962f11b66579931f48053132da6e03e62c61 Change-Id: Icbf7962f11b66579931f48053132da6e03e62c61
nit.rc
|
3e6e90644868a0c7d3de17812151a731db3eee65 |
28-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Merge "Initialize textclassifier model update directory" am: a079e453a3 am: f566376046 am: d13dca13e8 am: 552a4c10b3 Change-Id: I3067795ddd40e8ff1a8eca10fa2188f36c0769ba
|
af96b5e80b9530df94b0af08a07c5bf8cb1227ef |
28-Apr-2017 |
Jerry Zhang <zhangjerry@google.com> |
Merge "Move adbd stopped trigger for configfs into core." am: e21b2fb6b4 am: fa14b1de73 am: b3988e670d am: ee82936ecd Change-Id: Ib276a0384eafe25d81a684c76f8d5d58a5596414
|
552a4c10b33dcd1e6c24ab11fd6c4d46b6cf4d26 |
28-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Merge "Initialize textclassifier model update directory" am: a079e453a3 am: f566376046 am: d13dca13e8 Change-Id: Icb4af42818bd715709858abfb75e610c52ce48db
|
a079e453a3c8839369ffdfc8c2123feb99ec9bfe |
28-Apr-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Initialize textclassifier model update directory"
|
ee82936ecd9a608ce047308790f22c8678f5fb05 |
28-Apr-2017 |
Jerry Zhang <zhangjerry@google.com> |
Merge "Move adbd stopped trigger for configfs into core." am: e21b2fb6b4 am: fa14b1de73 am: b3988e670d Change-Id: I303a29c590df9e018d00e18c1818f8ca0f1dd3ce
|
423af1a86a01b365e17ac6b160f4df25e0050f88 |
28-Apr-2017 |
Jerry Zhang <zhangjerry@google.com> |
Merge "Add ffs.mtp.ready triggers to mtp configs." am: a06ac26dd1 am: c6faf65758 am: 78a4f0f567 am: c9fd178fb0 Change-Id: I09be5a5f34f81b8594184cf64d6897349aa9c82f
|
c9fd178fb0d1d36374cced14f13544b869922444 |
28-Apr-2017 |
Jerry Zhang <zhangjerry@google.com> |
Merge "Add ffs.mtp.ready triggers to mtp configs." am: a06ac26dd1 am: c6faf65758 am: 78a4f0f567 Change-Id: Ibb785165c83341c098edc254520b0cfeda9c8a79
|
75f8d89a8a3e5950dc80cc421998e6322d8392ac |
27-Apr-2017 |
Jerry Zhang <zhangjerry@google.com> |
Move adbd stopped trigger for configfs into core. This trigger resets ffs.ready in situations where adbd is stopped via commandline. Test: stop adbd Change-Id: Ib5028d55c4883a8291d6de2dbcb0641ff8eb7a48
nit.usb.configfs.rc
|
40673e3381cbb661212f965432d190f0458644bd |
27-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Initialize textclassifier model update directory Test: Builds successfully. Directory is initialized on install. Tests pass. bit FrameworksCoreTests:android.view.textclassifier.TextClassificationManagerTest Bug: 34780396 Change-Id: Icbf7962f11b66579931f48053132da6e03e62c61
nit.rc
|
b185e01a884fe587bf395fc1a9d2ecc121f51489 |
27-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Relocate VNDK-SP to /system/lib/vndk-sp and add RS libs to VNDK-SP" into oc-dev am: c43a4ad4bc am: 7eccd838c0 Change-Id: I6a5ec9f6a65ddd39736691c1c208d9ca33ed340c
|
7eccd838c06d505d46ad71e374c99ce913d21d67 |
27-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Relocate VNDK-SP to /system/lib/vndk-sp and add RS libs to VNDK-SP" into oc-dev am: c43a4ad4bc Change-Id: Ib2c7ba873d7e71aa23bcf28702c2e188f6918c15
|
fb256b696b0e05f3e8043b818e3a5edf2fd59d80 |
15-Apr-2017 |
Jerry Zhang <zhangjerry@google.com> |
Add ffs.mtp.ready triggers to mtp configs. This allows devices to use functionfs for mtp and ptp instead of the ordinary functions. The property is set regardless of which function is enabled so mtp and ptp functions will continue to work. Bug: 33220530 Test: use mtp with ffs and non ffs devices Change-Id: I4527e153bd10ef1e262e487482ae455835d1c698
nit.usb.configfs.rc
|
8252e664f3a9e9aa35fddb44a71ec5958dbc0b2a |
26-Apr-2017 |
Andreas Gampe <agampe@google.com> |
Merge "Linker: Add ASAN support to treble ld.config" into oc-dev am: 57e3528d2e Change-Id: I694aaf1f3307270f973845644dedf51786dcc6cd
|
bfa03ee9dc53b3cd78ee3a31a8819fbb71965be2 |
21-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Relocate VNDK-SP to /system/lib/vndk-sp and add RS libs to VNDK-SP VNDK-SP is relocated back to /system partition from /vendor partition, following the original design. In addition, the namespace for RenderScript is added. The namespace is dedicated for loading VNDK-SP libs for RenderScript such as libRS_internal.so. The reason for having a separate namespace is that RenderScript requires more permitted paths (/data/*) which should not be allowed for normal SP-HALs. Bug: 37522144 Bug: 37550338 Test: sailfish builds and boots well Test: lsof shows VNDK-SP libs are loaded from /system/lib/vndk-sp Test: RenderScript app (CameraScript) runs well Change-Id: Id139f626cafae2e43ee4eefc5a57a204e31bbbc9
tc/ld.config.txt
|
57e3528d2e85572f2e31cf223d0464c5b38ab6c7 |
26-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Linker: Add ASAN support to treble ld.config" into oc-dev
|
07fc6421cf1082fe9273c4c14d70e6eb0ee241cd |
25-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "Revert "Revert "Ensure update_verifier run before zygote""" am: 5fe07acd07 am: 0380041304 am: b8fdeb4c5a am: b0d85903cd Change-Id: I77a093146a7db8651e6a6bd204ccd97ca2e37412
|
53842e7dc6c9c08a73b87775e2daccb35d400902 |
20-Apr-2017 |
Wei Wang <wvw@google.com> |
Ensure update_verifier run before zygote Currently zygote is started early for FBE device but update_verifier is run later which creates a potential risk. This CL ensures update_verifier run before zygote touches anything within data/ partition. With this change, we also start zygote early for unencrypted/unsupported encryption state device. Bug: 37543411 Test: marlin boots (cherry picked from commit 5dc05effecca88f06da090dbcdd257666e69c2c7) Change-Id: I97cde0c20f74b1b17c995d84c2e31c86fe006395
nit.rc
|
b0d85903cdade840af2d6e029de47d0aa338d020 |
25-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "Revert "Revert "Ensure update_verifier run before zygote""" am: 5fe07acd07 am: 0380041304 am: b8fdeb4c5a Change-Id: Ief5492dd4b08de351c5ef8c72aeb3ffb09f6feff
|
c7c2d7bcd471c44ff18d19201eacaa17475584d5 |
22-Apr-2017 |
Andreas Gampe <agampe@google.com> |
Linker: Add ASAN support to treble ld.config Add asan counterparts. Bug: 37579959 Test: m && m SANITIZE_TARGET=address Merged-in: I23f05436b79fbcb3f6fa11d84c95fcd180fad3b3 Change-Id: I23f05436b79fbcb3f6fa11d84c95fcd180fad3b3
tc/ld.config.txt
|
35a2ee84d5f58c592da16c8377f4edead8a39f10 |
24-Apr-2017 |
Wei Wang <wvw@google.com> |
Revert "Revert "Ensure update_verifier run before zygote"" This reverts commit 2de3344180f0308a8e8c9ffa533bbd572e6fd89d. Change-Id: Ifc49bf389ed43a56baf5bb55d5f2028b8725083d
nit.rc
|
146b9a72545af9181ecf4fc456bf96933e869b30 |
22-Apr-2017 |
Andreas Gampe <agampe@google.com> |
Linker: Add ASAN support to treble ld.config Add asan counterparts. Bug: 37579959 Test: m && m SANITIZE_TARGET=address Change-Id: I23f05436b79fbcb3f6fa11d84c95fcd180fad3b3
tc/ld.config.txt
|
4971972b544237f2ddf3228672a584a81b141bf7 |
22-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "Revert "Ensure update_verifier run before zygote"" am: a037bddd8a am: 615211301e am: 2e211888c0 am: 1a6eb1628c Change-Id: Ia7afc768cc1f140787f99c021859a99e59fa0762
|
1a6eb1628c67846c0b522276cb8a11a986178947 |
22-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "Revert "Ensure update_verifier run before zygote"" am: a037bddd8a am: 615211301e am: 2e211888c0 Change-Id: Ie9eb8fc13d35a615ff14d120816e675d8ea20f2b
|
2de3344180f0308a8e8c9ffa533bbd572e6fd89d |
22-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
Revert "Ensure update_verifier run before zygote" This reverts commit 5dc05effecca88f06da090dbcdd257666e69c2c7. Change-Id: Ic041860dee8a2993c6b4890beca4da745cfbfb60
nit.rc
|
34f0c315d06f2dc2becd55a0ed087df188ea0a3d |
22-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "Ensure update_verifier run before zygote" am: a42ec8a9e3 am: 29a0f68c11 am: 73fc12cbda am: 1214e236eb Change-Id: I13cb7894245cd242890574473a60a636dc598854
|
1214e236eba66baddba07befbe791c53627faf0d |
22-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "Ensure update_verifier run before zygote" am: a42ec8a9e3 am: 29a0f68c11 am: 73fc12cbda Change-Id: Ife005b30f6115747309f0b3f096f5380e17f192a
|
5dc05effecca88f06da090dbcdd257666e69c2c7 |
20-Apr-2017 |
Wei Wang <wvw@google.com> |
Ensure update_verifier run before zygote Currently zygote is started early for FBE device but update_verifier is run later which creates a potential risk. This CL ensures update_verifier run before zygote touches anything within data/ partition. With this change, we also start zygote early for unencrypted/unsupported encryption state device. Bug: 37543411 Test: marlin boots Change-Id: I95daa73bc1a503eecb70d7be78251b74b773abf8
nit.rc
|
d1cb50c66ac5b9ddf0f1786327c8b84a975feef0 |
21-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "early start zygote_secondary as well" am: a0bf415cad am: b7896f0a0d am: 1abccccb71 am: 93ee9b3cb3 Change-Id: I8080e62c965fce0db456e3f61a2098794d5e448e
|
93ee9b3cb3ccccf7a2e25617a51b50e91218a763 |
21-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
Merge "early start zygote_secondary as well" am: a0bf415cad am: b7896f0a0d am: 1abccccb71 Change-Id: I0bf50e54aacc5cd2f967c44dd5176800ee69a695
|
5fb5b81fc78cf73000c92942fb6cbbe44dae8062 |
20-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
early start zygote_secondary as well - late start of zygote_secondary leads into occasional 1 second wait for starting system service. - Early start secondary zygote so that there is no additional wait. bug: 37508384 Test: python packages/services/Car/tools/bootanalyze/bootanalyze.py -r -c packages/services/Car/tools/bootanalyze/config.yaml -n 100 -f -e 16 -w 30 (cherry picked from commit f8532445b4c2c693d6c4e8794a7d9a69da1e0a5f) Change-Id: Ia46b07f3d6abb090cc169ebd807e21b16694d172
nit.rc
|
f8532445b4c2c693d6c4e8794a7d9a69da1e0a5f |
20-Apr-2017 |
Keun-young Park <keunyoung@google.com> |
early start zygote_secondary as well - late start of zygote_secondary leads into occasional 1 second wait for starting system service. - Early start secondary zygote so that there is no additional wait. bug: 37508384 Test: python packages/services/Car/tools/bootanalyze/bootanalyze.py -r -c packages/services/Car/tools/bootanalyze/config.yaml -n 100 -f -e 16 -w 30 Change-Id: I2e4eb0b59a9a8417b56a72fe2de6fa2a6e1ab0a2
nit.rc
|
a2b67d6063e5c46f5dbd446deed553278a6cf0b3 |
20-Apr-2017 |
Andreas Gampe <agampe@google.com> |
Asan_extract: Use sys.powerctl rc-style powerctl has beem removed. Accordingly, asan_extract now needs to access sys.powerctl directly. Bug: 36458146 Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true Change-Id: Ic65a858962b4b3dd613fdbfa09f93d21425bf892
san_extract.rc
san_extract.sh
|
46487922288663385b095916b6b33773701a8ed0 |
05-Apr-2017 |
Andreas Gampe <agampe@google.com> |
Asan_extract: Set access flags. After untar-ing, set correct access flags. Bug: 36458146 Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true Change-Id: Ibd98dfaeb58a0040ff2a9fee0bb880a281a673e8
san_extract.sh
|
cb46b011675a7edb9d7604e537fdcbc8f744c5a3 |
19-Apr-2017 |
Andreas Gampe <agampe@google.com> |
Asan_extract: Add FDE check Under full-disk encryption, we must skip extracting libraries into the temporary /data directory. It is too small, and the framework will not be able to come up. Add a check for the vold.decrypt system property. As it turns out that we can't reliably use this, also add a size check (and use 512M = 131072 4K blocks as the limit). Bug: 36458146 Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true Change-Id: Ib350094b049b6e75832d393527b8b62a58a7fece
san_extract.sh
|
1b0895300f1458aa523ae6c0d00154a40d16484c |
19-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes I33ad185f,I5fc2d727 into oc-dev * changes: init.rc: move load_system_props to beginning of 'on fs' liblog: __android_logger_property_bool svelte+eng default
|
82a395de27cd7d54cd0d6b32e757607194d7a949 |
18-Apr-2017 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: move load_system_props to beginning of 'on fs' (cherry pick from commit 3510359a3c382269e1b58bd5ce8d147e5f1c06e7) ro.logd.kernel, ro.config.low_ram, ro.logd.timestamp and ro.debuggable need to be retrieved prior to logd start in order for the service to behave in a configured manner. Other essential services are also dependent on these system properties as well, so it just makes sense to pick them all up first in 'on fs'. Test: smoke test Bug: 37425809 Change-Id: I33ad185f397ee527ed3c84cc2bcb40ff8ca785b5
nit.rc
|
ac0aa5f30c2b191a7a432f050fb928cbadf6d4b3 |
19-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: set initial cpuset to all cores" into oc-dev
|
2563a726fb69cf1a60472bd37ffbb692eb0d46ae |
19-Apr-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "init.rc: move load_system_props to beginning of 'on fs'" am: 798ac73dcf am: 03393e6f63 am: 925a895266 am: e4f22b16a5 Change-Id: Ib999ec2f8c052a80cd4db64939a77031cd8f2cd5
|
e4f22b16a5efddefd6e711c22b3019f6f5ab0826 |
19-Apr-2017 |
Mark Salyzyn <salyzyn@google.com> |
Merge "init.rc: move load_system_props to beginning of 'on fs'" am: 798ac73dcf am: 03393e6f63 am: 925a895266 Change-Id: I4ea086b0fcf12a0d5df279712807e4e44e82f955
|
3510359a3c382269e1b58bd5ce8d147e5f1c06e7 |
18-Apr-2017 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: move load_system_props to beginning of 'on fs' ro.logd.kernel, ro.config.low_ram, ro.logd.timestamp and ro.debuggable need to be retrieved prior to logd start in order for the service to behave in a configured manner. Other essential services are also dependent on these system properties as well, so it just makes sense to pick them all up first in 'on fs'. Test: smoke test Bug: 37425809 Change-Id: I33ad185f397ee527ed3c84cc2bcb40ff8ca785b5
nit.rc
|
5ceb7b3ebde818eaa3efe21b40d3481a4b653751 |
18-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
init: handle sys.powerctl immediately Currently if a process sets the sys.powerctl property, init adds this property change into the event queue, just like any other property. The actual logic to shutdown the device is not executed until init gets to the action associated with the property change. This is bad for multiple reasons, but explicitly causes deadlock in the follow scenario: A service is started with `exec` or `exec_start` The same service sets sys.powerctl indicating to the system to shutdown The same service then waits infinitely In this case, init doesn't process any further commands until the exec service completes, including the command to reboot the device. This change causes init to immediately handle sys.powerctl and reboot the device regardless of the state of the event queue, wait for exec, or wait for property conditions. Bug: 37209359 Bug: 37415192 Test: Init reboots normally Test: Update verifier can reboot the system Change-Id: Iff2295aed970840f47e56c4bacc93001b791fa35 (cherry picked from commit 98ad32a967079be80a101458d8a29d7ecefbb547)
nit.rc
|
3b6367af468e3b9c9dc8dc232996c932eb7ed8f6 |
18-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "init: handle sys.powerctl immediately" am: 14ed55bae8 am: e6bfb53196 am: 8972f887d2 am: 1f49801ab1 Change-Id: I6af3f4e1850593f13f27a3fd48f1310e0c3e369c
|
1f49801ab184c97f3fdb2897d44d550671ff49a2 |
18-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "init: handle sys.powerctl immediately" am: 14ed55bae8 am: e6bfb53196 am: 8972f887d2 Change-Id: I3af0841fc3c23e2758ec5f330e9ba03f7695d50f
|
14ed55bae8f2f64005cdde61cb407ed34d0effef |
18-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "init: handle sys.powerctl immediately"
|
dd39cf5e051d393bdd1c0f5202ba45b454b10b4a |
18-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Merge "linker: don't allow libui to SP-HALs and fix warning" into oc-dev am: 02012596c1 am: 9cd5ed710b Change-Id: I730e0cec8bdd2f8dfb6158f50a66a08519b6f562
|
9cd5ed710b8c8ded4974a4ec0cbc8a8a424b5768 |
18-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Merge "linker: don't allow libui to SP-HALs and fix warning" into oc-dev am: 02012596c1 Change-Id: Ia82a1515e8e47e5a8a39d5fb214ca8a5690efe5e
|
98ad32a967079be80a101458d8a29d7ecefbb547 |
18-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
init: handle sys.powerctl immediately Currently if a process sets the sys.powerctl property, init adds this property change into the event queue, just like any other property. The actual logic to shutdown the device is not executed until init gets to the action associated with the property change. This is bad for multiple reasons, but explicitly causes deadlock in the follow scenario: A service is started with `exec` or `exec_start` The same service sets sys.powerctl indicating to the system to shutdown The same service then waits infinitely In this case, init doesn't process any further commands until the exec service completes, including the command to reboot the device. This change causes init to immediately handle sys.powerctl and reboot the device regardless of the state of the event queue, wait for exec, or wait for property conditions. Bug: 37209359 Bug: 37415192 Test: Init reboots normally Test: Update verifier can reboot the system Change-Id: Iff2295aed970840f47e56c4bacc93001b791fa35
nit.rc
|
7b701de5e035a1b382423316938e88e382e5e7ec |
18-Apr-2017 |
Jiyong Park <jiyong@google.com> |
linker: don't allow libui to SP-HALs and fix warning libui.so is not used by SP-HALs, so it is removed from the list of libs exposed from the default namespace. Also, this fixes a warning message "property value is empty" caused by the automatically removed trailing '/' for the section 'legacy'. Since the legacy behavior is already implemented by the linker itself, the behavior doesn't need to specified in ld.config.txt. Test: marlin/sailfish boots Test: no warning message is shown Change-Id: Ib679794d63b01c6794663dc88f1ab7e72cfb11d3
tc/ld.config.txt
|
81794deecf2881c36af05b30726665ec4f1ef135 |
17-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: set initial cpuset to all cores" am: 66f44d823f am: eb9ddd14f1 am: d7652f553c am: c9c66cd486 Change-Id: Ibb9248214e48f937c80bf6af88124d602e32d502
|
c9c66cd4864e6447d174ed9204f5fd20c103d4b6 |
17-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: set initial cpuset to all cores" am: 66f44d823f am: eb9ddd14f1 am: d7652f553c Change-Id: I1e1fee25ddd8f990dac12712dc1ae1955736f2d8
|
66f44d823f51c2283ec6ec59675953949a4a63fb |
17-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: set initial cpuset to all cores"
|
2e24e8e2f0d92a5578f4eb489ab9742d189209e4 |
15-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Configure ld.config.txt for SP-HALs" into oc-dev am: 43b72b58f2 am: 7610066315 Change-Id: I59ede8903c6890b976ef3ca42c7ad1d220470a42
|
76100663152f7176bfe36af82fdecf1e749cef4a |
15-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Merge "Configure ld.config.txt for SP-HALs" into oc-dev am: 43b72b58f2 Change-Id: I3e7e5f142f6c8e76da26e25362eccd35f10b81f1
|
43b72b58f2f1ef1aa2aee00f4112c5544a66cd4c |
15-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Configure ld.config.txt for SP-HALs" into oc-dev
|
8dbd12b948e732105ff6bf698972e34e7731d14d |
14-Apr-2017 |
Wei Wang <wvw@google.com> |
init.rc: set initial cpuset to all cores Starting zygote early requires cpuset to be initialized to all cores for foreground cpuset. Change to expolit all cores by default at boot and let device manufacturers override to proper values in device specific init script. Bug: 36576280 Test: marlin boot fast and checked cpuset during early boot Change-Id: I2c1ce0630e58a7b04d1a453c6740d3f0bce9de9f (cherry picked from commit 2e83b86a8a10c825799062770ed8c85878e5b4e1)
nit.rc
|
2e83b86a8a10c825799062770ed8c85878e5b4e1 |
14-Apr-2017 |
Wei Wang <wvw@google.com> |
init.rc: set initial cpuset to all cores Starting zygote early requires cpuset to be initialized to all cores for foreground cpuset. Change to expolit all cores by default at boot and let device manufacturers override to proper values in device specific init script. Bug: 36576280 Test: marlin boot fast and checked cpuset during early boot Change-Id: I2c1ce0630e58a7b04d1a453c6740d3f0bce9de9f
nit.rc
|
450cff4b68ce09a65a82284ec64fae83b2ef3313 |
05-Apr-2017 |
Jiyong Park <jiyong@google.com> |
Configure ld.config.txt for SP-HALs Now, framework process (any process that is executing /system/bin/* or /system/xbin/*) are started with three namespaces; default, sphal and vndk. default namespace is the namespace that is responsible for loading libs from /system/lib. It can't load libs from other places such as /vendor/lib. (However, we temporarily open the path since we haven't finished the system partition cleanup, but will do eventually). sphal namespace is the namespace where SP-HAL (Same-process HAL) is loaded. SP-HAL are the only vendor libraries that are allowed to be loaded inside framework processes. libEGL_<chipset>.so and android.hardware.graphics.mapper@2.0-impl.so, etc are SP-HALs. When framework needs to load those SP-HALs, it explicitly loads it from this namespace using android_get_exported_namespace() and android_dlopen_ext(). vndk namespace is the namespace for loading vndk-sp (Vendor-NDK for Same-Process) libs, which is a small set of framework libraries that SP-HALs can link against. These libraries are compiled for the same version of Android that the vendor partition is compiled against. SP-HALs can not use libraries other than vndk-sp and ndk libs. Membership to vndk-sp and ndk are strictly closed. Note that in a system, there are two copies of vndk-sp libs. One at /system/lib and the other at /vendor/lib/vndk-sp. As a result, there can be two instances of a same library in a process. Also adds ld.config.legacy.txt which is used on non-Treble devices where PRODUCT_FULL_TREBLE is not set to true. Note, this split can be cleaned up further after b/37139976 is solved. Bug: 34407260 Test: git diff HEAD:rootdir/etc/ld.config.legacy.txt HEAD^:rootdir/etc/ld.config.txt => 0 Test: sailfish boots (because BOARD_VNDK_VERSION is not set to 'current') Change-Id: I8331d94edc38f22c4f8abc66cdf2050af9d0605b
ndroid.mk
tc/ld.config.legacy.txt
tc/ld.config.txt
|
4224f030c4a5668320c49a298f5c97476204624d |
14-Apr-2017 |
Todd Poynor <toddpoynor@google.com> |
Merge changes I76212f65,I6a29c678 into oc-dev am: 5975d4e337 am: a03b4dc574 Change-Id: Ib202914daeb62057d4575e4815329f5a7bee80f0
|
e61f5c42faa837bfc99206a492aac86980a20769 |
14-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: start all 3 servicemanagers early" into oc-dev am: d12835d19f am: c74c092929 Change-Id: Ib436e16a88570a6b896ec917b40be87cf9a66fe0
|
a03b4dc574e0113fdbebdb3d23a78380aaab93f4 |
14-Apr-2017 |
Todd Poynor <toddpoynor@google.com> |
Merge changes I76212f65,I6a29c678 into oc-dev am: 5975d4e337 Change-Id: I0441dc1f8a9ff11429a253d0510790b20b42e3b4
|
5975d4e33724047d73883ca84fda8b360f2fe000 |
14-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes I76212f65,I6a29c678 into oc-dev * changes: init.rc: create /data/misc/reboot owned by system reboot: fix owner and permissions of last_reboot_reason file
|
c74c0929296884741e6707d49a58043a719a3887 |
14-Apr-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: start all 3 servicemanagers early" into oc-dev am: d12835d19f Change-Id: I935cc9f8b353a6b513fb825e989156684f27a9dd
|
e092b72bf493ffb45013acb4b0ed567339446b18 |
14-Apr-2017 |
Todd Poynor <toddpoynor@google.com> |
init.rc: create /data/misc/reboot owned by system Directory will be read and modified by system uid. Bug: 37251463 Test: Manual: reboot and inspect Change-Id: I76212f65af991ff9ad0969b9c0b8460b80fb9cd2
nit.rc
|
e1e6edcf336f88c643a7a3d703bd53eed9233b72 |
14-Apr-2017 |
Todd Poynor <toddpoynor@google.com> |
init.rc: create /data/misc/reboot owned by system Directory will be read and modified by system uid. Bug: 37251463 Test: Manual: reboot and inspect Change-Id: I76212f65af991ff9ad0969b9c0b8460b80fb9cd2
nit.rc
|
ec1d24f522a3881558b7ec3ff50f5e63d08aa5df |
14-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge changes Ie5ec609a,I5a2ac369,I690137b5 am: 659b78ed10 am: 01b87aac9c am: 8d9eee4f2b am: aa85663027 Change-Id: I69be112c0020f7b4ce1a9a92c1e60e8f2941c5a9
|
aa85663027e8b33058842c10dc8eeac8e7ac1aaa |
13-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge changes Ie5ec609a,I5a2ac369,I690137b5 am: 659b78ed10 am: 01b87aac9c am: 8d9eee4f2b Change-Id: I5cd7d00f71bfd3970189481f381629cedc358c9b
|
659b78ed10fb9116e5dbbf6971fc2e36ca88a465 |
13-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge changes Ie5ec609a,I5a2ac369,I690137b5 * changes: ueventd: Fix up string handling in handle_*_device_event() ueventd: convert mkdir_recursive() to std::string ueventd: move subsystem logic from code to ueventd.rc
|
00cdc106623dc252fa3d76de6b86eed1ab3b8114 |
13-Apr-2017 |
Wei Wang <wvw@google.com> |
init.rc: start all 3 servicemanagers early With the binder traffic of composer moved to vndbinder, vndservicemanager is needed to be started early to get bootanim displayed quickly. Also servicemanager is required to be start early to support early bootanim and sufaceflinger. Bug: 37306311 Test: bootanim regression fixed Change-Id: Ice1e05bdb3fe4e67a63a49f1db8afdb018c7b61b
nit.rc
|
498e500e8fc925add59c78522a3c729a54b1503d |
13-Apr-2017 |
Jaesoo Lee <jaesoo@google.com> |
Merge "disable module loading after BOOT_COMPLETED broadcast" into oc-dev am: a02b1f5bed am: 00b0b347a0 Change-Id: I62f0b7d807a96276d08d13adcd758d126a509c39
|
780a71e779e8e41681c3f0ee12d7f559dc52b7a7 |
05-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
ueventd: move subsystem logic from code to ueventd.rc Test: Boot bullhead Test: Boot sailfish, observe no boot time regression Test: init unit tests Change-Id: I690137b584fcc2b9cd2dd932a2678f75a56d6737
eventd.rc
|
00b0b347a004a085b2552a6952c5d52cf70d8a41 |
13-Apr-2017 |
Jaesoo Lee <jaesoo@google.com> |
Merge "disable module loading after BOOT_COMPLETED broadcast" into oc-dev am: a02b1f5bed Change-Id: I7c750c9838b22cbcd9acb849c10be47ba7a50feb
|
20b7f78204b0c0e7991471207bac396a37515a9d |
13-Apr-2017 |
Jaesoo Lee <jaesoo@google.com> |
Merge "disable module loading after BOOT_COMPLETED broadcast"
|
a72518f5880fdcbc45b7c3529268fa6e7d0c3202 |
12-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "ueventd: remove /dev/log" am: 120add07ab am: 9ae606d659 am: 6c2e8b10fe am: 6289bb1341 Change-Id: I688c8cca7ebca7f4cd86ac8d3595b6ba01be9221
|
6289bb1341cd1f1370dfe6da1f5b376ea5721cfe |
12-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
Merge "ueventd: remove /dev/log" am: 120add07ab am: 9ae606d659 am: 6c2e8b10fe Change-Id: Ic257774710a74e72a97f4187e48587150ee3d613
|
dcf4d19dd9ace8b04b8659bd3e3c4803d315b3a5 |
10-Apr-2017 |
Jaesoo Lee <jaesoo@google.com> |
disable module loading after BOOT_COMPLETED broadcast This CL disables module loading by writing 1 to /proc/sys/kernel/modules_disabled when the property sys.boot_completed is set to 1 by ActivityManagerService (at the broadcast of PHASE_BOOT_COMPLETED). Bug: 36515654 Test: tested on sailfish and verified that module loading is disabled in userdebug and enabled in eng mode Merged-In: Id38d34a6395966ab21e440614337c0cfca791ad0 (cherry picked from commit 6ed19d1675ab7a9b45d1b82c90aac2be8f408a2e) Change-Id: I2faa459b450b3a64f854c832c6b91cbf682bbffa
nit.rc
|
d4ff8d83d3fcc23c07d928f8d463a54aa584e739 |
11-Apr-2017 |
Tom Cherry <tomcherry@google.com> |
ueventd: remove /dev/log This was marked deprecated in 2014 and removed in 2015, let's remove the uevent rule now too. Test: see that logging still works on bullhead Change-Id: Idaf3f49a1afe7046eba6c976628b9f1c8b3ec094
eventd.rc
|
6ed19d1675ab7a9b45d1b82c90aac2be8f408a2e |
10-Apr-2017 |
Jaesoo Lee <jaesoo@google.com> |
disable module loading after BOOT_COMPLETED broadcast This CL disables module loading by writing 1 to /proc/sys/kernel/modules_disabled when the property sys.boot_completed is set to 1 by ActivityManagerService (at the broadcast of PHASE_BOOT_COMPLETED). Bug: 36515654 Test: tested on sailfish and verified that module loading is disabled in userdebug and enabled in eng mode Change-Id: Id38d34a6395966ab21e440614337c0cfca791ad0
nit.rc
|
ec0ab6524e78d79fe6a50aebcc5154ffa8d87072 |
06-Apr-2017 |
Janis Danisevskis <jdanis@google.com> |
Move early_hal start to late-fs trigger action The class early_hal is essentially for the keymaster hal which needs to be up before vold tries to unlock a storage encryption key (FDE or FBE). The current position is too early in the boot process, because on devices with legacy HAL the wrapper service uses system properties to find the legacy HAL. This patch moves the start of the early_hal class to the late-fs trigger action which runs right after the system property action. Test: Manually tested and update tested on bullhead, sailfish, and another device. Bug: 35764921 Change-Id: I34b45b85f8450e9ef18861535fdb2ee963df8c9b (cherry picked from commit 1ad8d21947ae41bfb912f959fa8b93e7c86052fb)
nit.rc
|
71132a8608b51ea83af9a8a763ca36d2fc43cdf6 |
07-Apr-2017 |
Janis Danisevskis <jdanis@google.com> |
Merge "Move early_hal start to late-fs trigger action" into oc-dev am: 9cadfde2d6 am: a074e16357 Change-Id: I4dc06d4929a68a5ad1d8dc1386876e8d772802e5
|
1ad8d21947ae41bfb912f959fa8b93e7c86052fb |
06-Apr-2017 |
Janis Danisevskis <jdanis@google.com> |
Move early_hal start to late-fs trigger action The class early_hal is essentially for the keymaster hal which needs to be up before vold tries to unlock a storage encryption key (FDE or FBE). The current position is too early in the boot process, because on devices with legacy HAL the wrapper service uses system properties to find the legacy HAL. This patch moves the start of the early_hal class to the late-fs trigger action which runs right after the system property action. Test: Manually tested and update tested on bullhead, sailfish, and another device. Bug: 35764921 Change-Id: I34b45b85f8450e9ef18861535fdb2ee963df8c9b
nit.rc
|
2ad7aafa235ddd00c971f256f592baf852ba2bc2 |
05-Apr-2017 |
Steven Moreland <smoreland@google.com> |
Merge "init.rc: add class_start early_hal" am: 7bbd2a5290 am: 795eb840a7 am: 4bf15ab6b5 am: 53ae57e0bf Change-Id: I10c10cfde7c6f4ffeabcad04eb738b62dfcbb831
|
53ae57e0bf17fa992db6be0f7da84814b6cfcd73 |
05-Apr-2017 |
Steven Moreland <smoreland@google.com> |
Merge "init.rc: add class_start early_hal" am: 7bbd2a5290 am: 795eb840a7 am: 4bf15ab6b5 Change-Id: Ieae51492b03168b13224c252d075c03c8f80942d
|
38b573598743e93de663722a2abf60fbf49d2f91 |
29-Mar-2017 |
Steven Moreland <smoreland@google.com> |
init.rc: add class_start early_hal This class is used to start hals which are required in order to mount data (for instance keymaster). Test: works to start early_hal in internal Bug: 36278706 Change-Id: If06908135e59b187683d8cf4cc4a00b490559081 (cherry picked from commit 5d56bad4bde0168fb00da666cb136ff8f6d51b0f)
nit.rc
|
5d56bad4bde0168fb00da666cb136ff8f6d51b0f |
29-Mar-2017 |
Steven Moreland <smoreland@google.com> |
init.rc: add class_start early_hal This class is used to start hals which are required in order to mount data (for instance keymaster). Test: works to start early_hal in internal Bug: 36278706 Change-Id: If06908135e59b187683d8cf4cc4a00b490559081
nit.rc
|
1e667f1e1947914f4e776506c67e6ca4d0cc4b88 |
04-Apr-2017 |
Martijn Coenen <maco@google.com> |
Merge "Add /dev/vndbinder to ueventd.rc" into oc-dev am: 026d17dab3 am: 92b49c03b5 Change-Id: I5d6d3f65a3f6cd66f503c6e915bb9e5404ed8bac
|
62c5b47b9f0ceb4216ff740c90f17536c7764b9a |
04-Apr-2017 |
Martijn Coenen <maco@google.com> |
Add /dev/vndbinder to ueventd.rc Bug: 36052864 Test: vndservicemanager can access /dev/vndbinder Change-Id: I208ae91e722185f015fe8f0047c54087be6d21a2
eventd.rc
|
4542eda998e475d6b820d23fbbbd588b6da2388e |
03-Apr-2017 |
Andreas Gampe <agampe@google.com> |
ASAN: Fix ASAN directory in asan_extract.sh Move things over to the new layout. Bug: 36458146 Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true Change-Id: I4dba269f82e4f88e39f926c6c2dd3c5efa07b2a1
san_extract.sh
|
df5496aa65c3a890c6bb584f052c97324330b9ca |
22-Mar-2017 |
Andreas Gampe <agampe@google.com> |
ASAN-Extract Add init script and shell script to unzip a tar containing ASAN libraries on boot. Bug: 36458146 Test: m && m SANITIZE_TARGET=address Test: manual (build steps for tar missing) Change-Id: I1bcf332f86c5bf2e0333cbe3def684999c1002f8
ndroid.mk
san_extract.rc
san_extract.sh
|
aaeb7923124790fd1971dc59f69bef0d0b113031 |
28-Mar-2017 |
Tom Cherry <tomcherry@google.com> |
init.rc: launch update_verifier with exec_start This allows update_verifier to raise it's priority and ioprio. Bug: 36511808 Bug: 36102163 Test: Boot bullhead Test: Verify boottime decrease on sailfish Change-Id: I5710c6a98dc7acee9063d1fa1d1c80668f0f1528 (cherry picked from commit 1e2d8c7fce132773da8058f7210c0d990c4cb1a9)
nit.rc
|
61c5bdf6de706f211a5bb06fa5c3e277f55f9912 |
29-Mar-2017 |
Tom Cherry <tomcherry@google.com> |
Merge changes from topic 'exec-start-update-verifier' am: 8772b3686e am: 571cb53797 am: 5b591daf83 Change-Id: I9b6a559f4295dd25e84d17e89d93ee0cb3c3a7f2
|
1e2d8c7fce132773da8058f7210c0d990c4cb1a9 |
28-Mar-2017 |
Tom Cherry <tomcherry@google.com> |
init.rc: launch update_verifier with exec_start This allows update_verifier to raise it's priority and ioprio. Bug: 36511808 Bug: 36102163 Test: Boot bullhead Test: Verify boottime decrease on sailfish Change-Id: I5710c6a98dc7acee9063d1fa1d1c80668f0f1528
nit.rc
|
da48f4938a75abc9672b9b70ad867618fbdd11f3 |
27-Mar-2017 |
Steven Moreland <smoreland@google.com> |
Merge "Revert "Revert "Start hwservicemanager earlier.""" am: ca622b4e78 am: e326cb121e am: 352b3d737c Change-Id: I7cb77ed1a7e4d7d8cee945a1ddee0c448f350452
|
ca622b4e78cd6ddc8b7d10a5acc9f685b3f11c04 |
27-Mar-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Revert "Revert "Start hwservicemanager earlier."""
|
0bc3add41b366819149405e571c3a718a340f1cb |
25-Mar-2017 |
Dimitry Ivanov <dimitry@google.com> |
Merge "Add ld.config.txt to /system/etc" am: d444f8663d am: e6f9497cca am: 7bbe56c46b Change-Id: I17bd0af0e7acdb8f4cea33c29812825ec78d5f3f
|
d444f8663daf935c2bc34bd42f329bace2edb05c |
25-Mar-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Add ld.config.txt to /system/etc"
|
d627502bb074e8982cb86ce86de5fb3e35b310d1 |
24-Mar-2017 |
Steven Moreland <smoreland@google.com> |
Revert "Revert "Start hwservicemanager earlier."" This reverts commit 5011270225b7b61cd485cb67f694d15d8570a0e1. Now starting even earlier. Reason for revert: Needed change, reverted b/c broken device. Bug: 36278706 Test: original DOA device boots Test: angler, bullhead, fugu, marlin, ryu Test: all these devices boot with wipe Test: all these devices boot with w/o wipe Test: lshal shows all included services Change-Id: Ic639aedf7834b1bd3a26d23d109727f5559317e9
nit.rc
|
7d8408663933c517ce7500e33f299c45096cbfc0 |
24-Mar-2017 |
Thierry Strudel <tstrudel@google.com> |
Merge "Revert "Start hwservicemanager earlier."" am: 3ba313597d am: 263cf5c8d9 am: ea6de14c5e Change-Id: Ia0b57d328df2fc47e7f5dee35930e43bb514c4f5
|
3ba313597d82f9b69142c8526440727477904d2e |
24-Mar-2017 |
Thierry Strudel <tstrudel@google.com> |
Merge "Revert "Start hwservicemanager earlier.""
|
5011270225b7b61cd485cb67f694d15d8570a0e1 |
24-Mar-2017 |
Steven Moreland <smoreland@google.com> |
Revert "Start hwservicemanager earlier." This reverts commit 9e363311743f6a33d642f715d8a16b53b4ee9304. Reason for revert: a DOA device Bug: 36546734 Change-Id: I0456247d362fe43b8c37623d04432eb494f68f68
nit.rc
|
5659c9cf1d882476a56100020fafde3a7d02d4ab |
23-Mar-2017 |
Jeff Vander Stoep <jeffv@google.com> |
Merge "Create dir in /data for vendor customization" am: c39a31f002 am: bfc4da8369 am: bc4d384d49 Change-Id: Ic14d961fb28c1cbad6a2082a321a679580a69d2c
|
c39a31f002d291607126bd27b846408ee7030c04 |
23-Mar-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Create dir in /data for vendor customization"
|
61efb0dab850a2ac76216e28cc05392a1398276d |
23-Mar-2017 |
Jeff Vander Stoep <jeffv@google.com> |
Create dir in /data for vendor customization Vendor owns /data/vendor. HAL data must go in /data/vendor/hardware/. Bug: 34980020 Test: build and boot AOSP Marlin. Observe /data/vendor and /data/vendor/hardware exist and are empty. Change-Id: I6fe96e3c76a10a5eb480ba10e10d4d006de56c12
nit.rc
|
2b9a3391d0928f49d264d920e6ba0288e2e83e44 |
23-Mar-2017 |
Steven Moreland <smoreland@google.com> |
Merge "Start hwservicemanager earlier." am: fcd509298d am: 0a85db775e am: 6c546660d9 Change-Id: Ifd4e04fef289f8ece3884434efa1a3c6d47890fa
|
fcd509298db10df8badbd15a1b9d44a8be946a2c |
23-Mar-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Start hwservicemanager earlier."
|
9e363311743f6a33d642f715d8a16b53b4ee9304 |
22-Mar-2017 |
Steven Moreland <smoreland@google.com> |
Start hwservicemanager earlier. Also start hals where hwservicemanager was started before. Bug: 36278706 Test: internal marlin+angler boots Change-Id: Ia55d2ef747fcbd086a09e1bb856824b14343118b
nit.rc
|
33a55b3d52836dd84333e665685206b21fbf0734 |
22-Mar-2017 |
Wei Wang <wvw@google.com> |
init.rc: remove bg_non_interactive cgroup am: a27a91a5fd am: 20943abad0 am: 7d4d63ca18 Change-Id: I5c1d3a860c64dae63be5edcc91734805863d6f85
|
a27a91a5fd23730c9ef0af751cddf119d869e029 |
20-Mar-2017 |
Wei Wang <wvw@google.com> |
init.rc: remove bg_non_interactive cgroup We have seen cases when threads in this cgroup not scheduled for more than a few seconds in heavy workload situation and causing device freeze. In Linux, multiple threads placed in ROOT cgroup cause the CPU resource to be split per thread, rather than per group. Currently we have many threads in ROOT cgroup, which makes threads in bg_non_interactive cgroup to have "tiny" CPU resource other than 5% quota defined. Bug: 34193533 Test: on marlin Change-Id: I7721f6196560fbedf6265e8b6db130cec9edefd7
nit.rc
|
ee34aecafef5f0d0c3dc6574f8cf99b3171d5bab |
15-Feb-2017 |
Dimitry Ivanov <dimitry@google.com> |
Add ld.config.txt to /system/etc This file describes how loader should set up default namespace for different kind of binaries. Note that vendor and some of system binaries are not yet ready for this config to be enabled - they rely on libraries they shouldn't be relying upon. Bug: http://b/30435785 Test: m Change-Id: I7d5853a6b55db169be1dc2c38cc682711bf7f7f5
tc/ld.config.txt
|
13b8bd01756e3f61bd04735751eb2088744a91f1 |
16-Mar-2017 |
Jeff Vander Stoep <jeffv@google.com> |
Merge "init-debug.rc: don't mount debugfs" am: 54e7365fee am: 9a1ed6106d am: 038a906997 Change-Id: Ie32933ee52b6b81c3b51adfbe93cf176b3805198
|
082807f3b4b55c83afe48219e8745945279c96a8 |
15-Mar-2017 |
Jeff Vander Stoep <jeffv@google.com> |
init-debug.rc: don't mount debugfs Motivation: 1. Reduce skew between userdebug and user builds. 2. Make the decision to mount debugfs on debug builds on a per-device basis. 3. Prepare to not mount it at all to reduce the attack surface of the kernel, reduce boot time, and free up memory. 4. Remove the selinux denial on devices that mount twice, i.e. unconditionally in the device specific .rc file and in the init-debug.rc file. avc: denied { mounton } for path="/sys/kernel/debug" dev="debugfs" ino=1 scontext=u:r:init:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0 If desired, debugfs may be mounted in device specific rc files instead. Bug: 31856701 Bug: 35197529 Test: Build and boot Marlin. Selinux denial no longer observed. Change-Id: Ie0d954f77f7cf70ed2b94f67a57a6c9eba45ba8e
nit-debug.rc
|
a44f638a018d93a80334c13a1397c8ff810e3354 |
11-Mar-2017 |
David Lin <dtwlin@google.com> |
Merge "init.rc: enable ledtrig-transient support for vibrator" am: 75b66a6f2a am: 64af4183a1 am: f357e1989a Change-Id: I98daea756aceeaeaca099bfb6dd668c68c58a8dd
|
75b66a6f2a8df72c98e6290435438c67f6c23081 |
11-Mar-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "init.rc: enable ledtrig-transient support for vibrator"
|
19c4f38402020e520c41302868cf99cae52e68a3 |
10-Mar-2017 |
Andreas Gampe <agampe@google.com> |
Merge "ASAN: Separate SANITIZE_LITE from asan.options" am: e7195be772 am: ee7be79816 am: df13a9e51e Change-Id: Ia3f1b5b5a7ecac19658da9b1700d9f860f3005ae
|
21bb2e0388059dce89e9767de0d52f580081497d |
10-Mar-2017 |
Andreas Gampe <agampe@google.com> |
ASAN: Separate SANITIZE_LITE from asan.options Add SANITIZE_LITE_SERVICES to drive usage of asan.options for a large set of native services. Test: m SANITIZE_TARGET=address SANITIZE_LITE=true Test: m SANITIZE_TARGET=address SANITIZE_LITE=true SANITIZE_LITE_SERVICES=true Change-Id: I84458dcc1b193b762daeb3004cf6c49e2fd8fae2
ndroid.mk
|
8c1e3292a83d01dc86bc919514e31c5ee2d13e89 |
10-Mar-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: make sure netd start after post-fs-data" am: f58280e7dc am: 449b59873f am: 07ace62093 Change-Id: I68103aafa9a23e0bf177d91544e4fbd743d222e4
|
bae9ba340267225438900654a05bd1113998ecfb |
09-Mar-2017 |
Wei Wang <wvw@google.com> |
init.rc: make sure netd start after post-fs-data Current init doesn't order the triggeres it scaned, and there is no guarantee that general event trigger exec first and then event+property triggers. This CL will make sure netd started after post-fs-data trigger is done. Bug: 35110957 Test: marlin boots Change-Id: I7bb55af4e00f336682388abfa8a06eac2136b7d4
nit.rc
|
27b2c1e678468d5001f1540c78ada9ba2d1e236e |
09-Mar-2017 |
David Lin <dtwlin@google.com> |
init.rc: enable ledtrig-transient support for vibrator This change makes the init process to always attempts to enable transient trigger for vibrator. This allows the exported properties to change the ownership later at the on boot stage. Test: device vibrates with the driver supports ledtrig-transient Change-Id: If5eb7b7feaefe803f2ead634fbe4fc7b48da84ea Signed-off-by: David Lin <dtwlin@google.com>
nit.rc
|
36baabf07bc83f6ba2c855d53f6b3157bd04cc8b |
09-Mar-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: start netd and zygote early for file based encryption devices" am: 4bf2bc078f am: 1a65e43878 am: 3b272c7bf8 Change-Id: Ie44f4fd8a04b1fa1d0a5c6f7e01410246589c9d9
|
d08467f341254f2c2f3a93319c6e6f6efc23594f |
05-Mar-2017 |
Jesse Hall <jessehall@google.com> |
Add NDK libsync to linker whitelists Test: make Change-Id: Idb9ddfce7032a3faef7213327d3160968d4a80ba
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
7f32aa4d046ad8573d6b636b0dfb010a2ea2d28f |
08-Mar-2017 |
Wei Wang <wvw@google.com> |
init.rc: start netd and zygote early for file based encryption devices Bug: 35110957 Test: marlin boots Change-Id: Ibe4c413e41fcf25a68b50d99ee66d9b70706a6a1
nit.rc
|
43a356d2137fdac0b0077df0dc1f62c98e7de2aa |
08-Mar-2017 |
Wei Wang <wvw@google.com> |
Merge "init.rc: add a new zygote-start trigger" am: 4e5e797d26 am: 0d9416ba2e am: 2980bc1139 Change-Id: I56e6907db4063f6b527be710b00de9200aa8914a
|
4e5e797d26272dc08b6336def8d7878443881f0e |
08-Mar-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "init.rc: add a new zygote-start trigger"
|
a2058036ed70cac9943885cef0581cab6d14c058 |
08-Mar-2017 |
Wei Wang <wvw@google.com> |
init.rc: add a new zygote-start trigger Bug: 35110957 Test: marlin boots Change-Id: I12b41588371486e79938df2f7a2152cda18530d1
nit.rc
|
ae31fd48b073549cbd040f1cf243cd55997b724a |
08-Mar-2017 |
David Lin <dtwlin@google.com> |
Merge "init.rc: remove duplicated chown entry for timed_output" am: e88882e16e am: 9c23fcbcd9 am: 197b3f736c Change-Id: I4a87933290c31305b03fbcaa5c719503d8928b32
|
489450abe38a225db60b90a0f30f644c95a730ba |
08-Mar-2017 |
David Lin <dtwlin@google.com> |
init.rc: remove duplicated chown entry for timed_output Test: build Change-Id: Ib15be4188cdce270a15bd90304be0704d9e54cbf Signed-off-by: David Lin <dtwlin@google.com>
nit.rc
|
f77e32cb6f3cc8048784c48d7677e5507dbb0eb9 |
03-Mar-2017 |
Mathias Agopian <mathias@google.com> |
add libnativewindow to the linker whitelist Test: compile Bug: treble Change-Id: I59c614ef045dad79e68bbf6fe86f786ecd14ce78
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
a4f5d12b7155ec815fe6e1edbdb2f0fd79469c2e |
01-Mar-2017 |
Ryan Campbell <ryanjcampbell@google.com> |
Merge "Add global GCOV_PREFIX option." am: df0f792a9e am: 2d3378350a am: 11339c7e34 Change-Id: I10d53220ea5e433ae0f027bf21750a239a588e9c
|
0b364732723e5dcecc1a74a4f592e8afcbadd2ba |
22-Feb-2017 |
Ryan Campbell <ryanjcampbell@google.com> |
Add global GCOV_PREFIX option. When native coverage is enabled, add a global GCOV_PREFIX environment variable specifying that gcda files be output with path prefix /data/local/tmp. Bug: 35635587 Test: make NATIVE_COVERAGE=true; check init.environ.rc Change-Id: I40972aea3ca3168d0687bdc93e9d4b7b3a1071b9
ndroid.mk
nit.environ.rc.in
nit.rc
|
330eb9e33aeb9f88300c4eec334c995006579b25 |
21-Feb-2017 |
Michael Wright <michaelwr@google.com> |
Merge "Revert "Only allow system to write to existing input nodes."" am: 05009d9336 am: 8eef0a5dfb am: ba1f83d70c Change-Id: Iac642c0e1e78f09302f3954b0d779e15c73fae4c
|
14667c19cdf8fa4b9fb6661cdd610f60556a4f5d |
21-Feb-2017 |
Michael Wright <michaelwr@google.com> |
Revert "Only allow system to write to existing input nodes." This reverts commit 344e929e6d8cc2925e55d7f72262002fcc181f52. Bug: 35301292 Change-Id: Ib6805c986c0aa88d14652de59ad4602b1cce8b56
eventd.rc
|
59e8e07c89682dc730558c58130717a298227e15 |
16-Feb-2017 |
Narayan Kamath <narayan@google.com> |
Merge "Revert "Revert "Lazily preload secondary zygote resources."""
|
f403e64bd055a538ab93e27a2b503168da0d25c6 |
07-Feb-2017 |
Narayan Kamath <narayan@google.com> |
Revert "Revert "Lazily preload secondary zygote resources."" This reverts commit b248cb469a18e00131338b300f8b344aac52fcb5. Test: manual Bug: 34810190 Change-Id: I999e759a5681a58962aa5a0783946c15237bf45c
nit.zygote64_32.rc
|
47876633227b178df843e1a470ac66c7c6d06fc3 |
14-Feb-2017 |
Narayan Kamath <narayan@google.com> |
Merge "Reapply 13398711387e9ce1: Only apply schedTune boost to top-app tasks" am: dce4b65fe0 am: 9babb434ed am: 321a861b79 am: dd950ba9d4 Change-Id: I5b247c8fcbc76f9c36a203011fb693bafab7eb6c
|
eeabbeba161a83fb9b664fc8136c5ed625ec7b9d |
13-Feb-2017 |
Narayan Kamath <narayan@google.com> |
Reapply 13398711387e9ce1: Only apply schedTune boost to top-app tasks Parts of this change were accidentally reverted by an incorrect manual merge conflict resolution. Bug: 35306127 Test: manual Change-Id: I8e6d6b07dcaa548775213dd42ba9def7431c62d3
nit.zygote32_64.rc
nit.zygote64_32.rc
|
1cf50050e636f43e8c57cce38d76ccf8efd40120 |
10-Feb-2017 |
Todd Poynor <toddpoynor@google.com> |
Merge "init.rc: create /data/misc/reboot for storing reboot reason" am: e499403bf4 am: 4dbefe4d4c am: 23b31ba7e3 am: 0561551951 Change-Id: I5ea693f7f34903305e34391fcd7d7a7174c2ffd8
|
44ee2b0ef84b10f19f77e21a16141a2e7c931d9c |
08-Feb-2017 |
Todd Poynor <toddpoynor@google.com> |
init.rc: create /data/misc/reboot for storing reboot reason Create /data/misc/reboot if not already. Bug: 30994946 Test: manual: reboot command; modified thermal-engine.conf Change-Id: I66418beba539f76759b44742af7700f26a2c1f87
nit.rc
|
73b4f8aeed2094e9ec14c616b750b95fa3ddccac |
10-Feb-2017 |
Phil Burk <philburk@google.com> |
libaaudio: changed name from liboboe Bug: 34749573 Test: CTS test_aaudio.cpp Change-Id: Ic95f21fcaf0f13e09f57dfb612d5bcc4755f447b Signed-off-by: Phil Burk <philburk@google.com>
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
344e929e6d8cc2925e55d7f72262002fcc181f52 |
19-Jan-2017 |
Michael Wright <michaelwr@google.com> |
Only allow system to write to existing input nodes. This prevents the shell user from injecting input as if it were coming from an existing input device, which in turn makes it easier for malware / abuse analysis to detect when someone is injecting input via the command line vs a real user using a device. (cherrypick of 95637eb2a332b9a09914b1bf32c10fccfba4a175.) Bug: 30861057 Test: ran getevent, saw correct output, played with device Change-Id: Ib53eea1b7767f25510b5d36fe6109101a9fad8e0
eventd.rc
|
f437ace00dac4cff0d65c0adf6ca334f37f6144f |
09-Feb-2017 |
Michael Wright <michaelwr@google.com> |
Merge "Only allow system to write to existing input nodes."
|
f3d891031ef0c0687224c98aa0e6ca9d55758858 |
10-Nov-2016 |
Narayan Kamath <narayan@google.com> |
Revert "Lazily preload secondary zygote resources." This reverts commit e5aee79e9cd54703d8da9b1466d3e3c25ba0a44a. Given recent improvements to boot timing, and higher paralellization, the lazy preloading of zygote resources makes boot time slightly slower by ~100-250ms. Therefore, the change is being reverted until we can do it properly and defer it to a later point in the boot process. This work is being tracked by b/34810190 BEFORE ------ successive-online : 17290.0,17633.0,17329.0,17655.0,16802.0,16888.0,17645.0,17369.0,17572.0,16932.0, successive-online_avg : 17311.5 successive-boot : 24834.0,25119.0,25122.0,25091.0,25617.0,25535.0,25047.0,27462.0,25088.0,25648.0, successive-boot_avg : 25456.3 AFTER ----- successive-online : 16973.0,16530.0,17015.0,17953.0,17367.0,17098.0,16887.0,17377.0,18039.0,16742.0, successive-online_avg : 17198.1 successive-boot : 24921.0,25622.0,25781.0,25449.0,25128.0,24774.0,24554.0,25029.0,24544.0,25809.0, successive-boot_avg : 25161.1 Test: Boot timings collected with tradefed harness. Bug: 34810190 Change-Id: I9a6dd5ce31bda067e74fc088b057711fa4a7a0fb
nit.zygote64_32.rc
|
314bb2faf2afb763b68b3c74577a40c2c70f8276 |
26-Jan-2017 |
Steven Moreland <smoreland@google.com> |
Merge "init.rc, typo: fs-post-data -> post-fs-data" am: 5b202c4376 am: e0ac5d8304 am: 311e4295dc am: 06e9f5de8c Change-Id: I1525db8d43c3c27fe7ae1b17dd97a99f28321c13
|
f38aab462179dea763207c5e7abc975a8302f82e |
25-Jan-2017 |
Steven Moreland <smoreland@google.com> |
init.rc, typo: fs-post-data -> post-fs-data Test: pass Change-Id: Icafdb7ec61935b35db85096b49e7f232a456f620
nit.rc
|
5150a8fb85d4cc63f8d0bf786d0702b23efdb5a5 |
24-Jan-2017 |
Josh Gao <jmgao@google.com> |
Actually don't start tombstoned until /data is mounted. am: 0ad5107e51 am: 1170d8201d am: bf8bd27bb3 am: 32d18e2204 Change-Id: I45fe22d5b83e6399aadc374976986e7f660d9eba
|
0ad5107e51cb71c78a6de02cab2835ba9c1ae61d |
24-Jan-2017 |
Josh Gao <jmgao@google.com> |
Actually don't start tombstoned until /data is mounted. Bug: http://b/34461270 Test: boot is actually faster Test: tombstoned still started by init Change-Id: I4976abef108bbb6fad264f9b68cbc1fba711085b
nit.rc
|
95637eb2a332b9a09914b1bf32c10fccfba4a175 |
19-Jan-2017 |
Michael Wright <michaelwr@google.com> |
Only allow system to write to existing input nodes. This prevents the shell user from injecting input as if it were coming from an existing input device, which in turn makes it easier for malware / abuse analysis to detect when someone is injecting input via the command line vs a real user using a device. Bug: 30861057 Test: ran getevent, saw correct output, played with device Change-Id: Ib53eea1b7767f25510b5d36fe6109101a9fad8e0
eventd.rc
|
8c98938853678e7847a9ed0561d7223e6e764f5c |
20-Jan-2017 |
Josh Gao <jmgao@google.com> |
Merge "init: don't start tombstoned until /data is mounted." am: b479a5002e am: f83489c02c am: d7db8378d0 am: 5d6ea5a9bd Change-Id: I5ad79b54f9f42e6b04d81ca8123e5b41b03e92fb
|
b479a5002e99e7454ed07d7b4631704d4c611193 |
20-Jan-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "init: don't start tombstoned until /data is mounted."
|
42a0fed78b761ab06f220786c29f51459265bdec |
20-Jan-2017 |
Josh Gao <jmgao@google.com> |
init: don't start tombstoned until /data is mounted. When vold mounts the encrypted /data partition, it first checks for and kills processes that have open fds to the tmpfs placeholder at /data. This resulted in a 20 second boot-time regression (vold's timeout period) when tombstoned was started before vold. Bug: http://b/34461270 Test: boot is faster, no messages from vold in console spew Test: tombstoned still started by init Change-Id: Ib5e9ddb05f40c9da852f00e103861c6ff2d94888
nit.rc
|
4b499a1b137a7aa1aeb0d92e5402e1e91fd68baa |
20-Jan-2017 |
Dave Weinstein <olorin@google.com> |
Merge "Move the kptr_restrict setting from init.rc to init.cpp." am: c734a0a9ee am: 776978788b am: 7e79a571fd am: a69b7ea3a4 Change-Id: Iabde07f1c50e62b5394386f5718ae5a3d40e7c3b
|
44f7e4f42190fdb5309b818d5acc0ff6b0f87249 |
20-Jan-2017 |
Dave Weinstein <olorin@google.com> |
Move the kptr_restrict setting from init.rc to init.cpp. Also ensure that it uses the highest supported value, and abort if the value is not above a minimum threshold. Test: Tested against the curent kernel (maximum value of 2, set to 0 by the kernel initially) and against a modified kernel (maximum value of 4, set to 4 by the kernel initially) Bug: 30368199 Change-Id: I608db577258b68b390ffe96f452e1f7c0bc9ad8a
nit.rc
|
9450e741d373239c27b46cc990ad151978080de1 |
18-Jan-2017 |
Winter Wang <wente.wang@nxp.com> |
Merge "init: usb: fix audio_source function typo" am: 56098eed3b am: 6a5f085288 am: 8aefa0a8f3 am: 912ea6bb10 Change-Id: I48933d7b08d2bb2f2a108ddb20f25d85e5fb5c88
|
60c763ed52004a3c2330fd8ab7c5b2b6968e7822 |
06-Jun-2016 |
Winter Wang <wente.wang@nxp.com> |
init: usb: fix audio_source function typo for audio_source function instance, there exist 2 function name here: "audio_source.gs2" and "audio_source.gs3" I believe this usb accessory audio name "audio_source.gs2" is a typo, as there is no need to create another audio_source instance. Test: Manual Change-Id: I70b513db474632eb990131c285c8d5105c17970f Signed-off-by: Winter Wang <wente.wang@nxp.com>
nit.usb.configfs.rc
|
2af02ff24fc803df70eb82d709c0b7f6afdc3333 |
12-Jan-2017 |
Josh Gao <jmgao@google.com> |
Merge "adb: remove support for legacy f_adb interface." am: 72d4c42cd5 am: 6865111e9c am: 5e0caf8d1b am: bb7261421d Change-Id: I7ef24f4fd1d4d951d293ff19eeeb8f16bd4188d0
|
72d4c42cd548b1e852fa6bda9abad3f9705aaf6c |
12-Jan-2017 |
Josh Gao <jmgao@google.com> |
Merge "adb: remove support for legacy f_adb interface."
|
8cf0eba307d1d715d0eff6e00eb0973db550af87 |
12-Jan-2017 |
Paul Lawrence <paullawrence@google.com> |
Merge "Set right attributes on tracing folder" am: 5d8bf9e6e2 am: f014e41731 am: 36eeceec84 am: 87b62dc44c Change-Id: Ie1eeaf4d1e0dc63c80262376720abe96684a2590
|
3d8ade3f247f34a6b47fef75dfacdad015b6ecc7 |
12-Jan-2017 |
Paul Lawrence <paullawrence@google.com> |
Set right attributes on tracing folder Since splitting tracefs out from debugfs, we now need to set the attributes explicitly on tracing folder. Test: Run adb shell atrace -c -b 16000 -t 5 gfx Bug: 34197733 Change-Id: If2a962332b6d1ec227e289bdf952213756e26186
nit.rc
|
183b73e665a4cd369ef88c657019cd29f009672b |
11-Jan-2017 |
Josh Gao <jmgao@google.com> |
adb: remove support for legacy f_adb interface. Everything should be using the functionfs interface instead by now. Bug: http://b/34228376 Test: grepping for f_adb, android_adb in source tree Test: m Change-Id: I6bc41049c49a867499832588dac8ed108c636c11
eventd.rc
|
67bfc5dd2c8f77ff66f9caa392e61c3b4100a489 |
09-Jan-2017 |
Wei Wang <wvw@google.com> |
Merge "Restart wificond when zygote died"
|
38fcd33e46ba2718b75b4e456700b7fca4401732 |
20-Dec-2016 |
Wei Wang <wvw@google.com> |
Restart wificond when zygote died This helps to avoid tearDownInterfaces call from WiFiStateMachine's constructor. Bug: 33752168 Test: on device (cherry picked from commit 0db195d0757e36c73b9da5a95d9b9986386f0f2e) Change-Id: I55f56dd8daa5089073ff8dd424e92d09326c7d00
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
54ad10455391a40dbaa9185cb9518418eefb2410 |
20-Dec-2016 |
Wei Wang <wvw@google.com> |
Restart wificond when zygote died This helps to avoid tearDownInterfaces call from WiFiStateMachine's constructor. Bug: 33752168 Test: on device Change-Id: I44527ee39700c5ac3259bba3a007dde6979170ff
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
e5aee79e9cd54703d8da9b1466d3e3c25ba0a44a |
10-Nov-2016 |
Narayan Kamath <narayan@google.com> |
Lazily preload secondary zygote resources. Companion to change Id387b7132d0 in frameworks/base. Test: manual Change-Id: I3f50327aafddce8530a990505cd436225c5fe7a7
nit.zygote64_32.rc
|
815024d24e05568993985dbc4935c0f3c48da8b1 |
22-Dec-2016 |
Phil Burk <philburk@google.com> |
Oboe: make liboboe.so public Bug: 30210002 Test: in frameworks/av/media/liboboe/tests Change-Id: Id7d0b0eebf68bc5e93fc257c2f924205db57312c Signed-off-by: Phil Burk <philburk@google.com>
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
b0aea04065409e45d788a77add95e40cbdac2295 |
16-Dec-2016 |
Elliott Hughes <enh@google.com> |
Merge "Improve init bootcharting." am: 4ee7861ee1 am: a6532b4717 am: 1a947725b8 am: 352b9c6282 Change-Id: I58b258cbf13bdcc874bcce35d4bb07378a8a1864
|
4ee7861ee1665b74b491f267636d367bbfe11dd3 |
16-Dec-2016 |
Elliott Hughes <enh@google.com> |
Merge "Improve init bootcharting."
|
9b2e2070993ab4886c7322723581272b1197db70 |
14-Dec-2016 |
Sandeep Patil <sspatil@google.com> |
Merge "socket: uevent: use SO_RCVBUF instead of SO_RCVBUFFORCE" am: 0a2080bced am: 571e246983 am: c345388bea am: e432dc58c1 Change-Id: Iab5bafe3e156dfb2fc75634c8d25b5f67991915e
|
5fee496e6220228b4a9059e06e430178ee1ba1ec |
07-Dec-2016 |
Sandeep Patil <sspatil@google.com> |
socket: uevent: use SO_RCVBUF instead of SO_RCVBUFFORCE The SO_RCVBUFFORCE option requires the caller of uevent_create_socket() to have net_admin capabilities. Set platform default rcv/snd buffer sizes to 256kb that will always be overridden by the device/target. However, it will allow ueventd / healthd to use the uevent_create_socket() API w/o requiring the net_admin capability. Note: All devices override the buffer sizes according to the technology maximum to at least ~8MB. So, the init.rc change here is to make sure platform code can work w/o any overrides. Test: no SELinux failures for healthd with 'net_admin' removed. Bug: https://b/32733887 Change-Id: Ida346468cd550ad07901bf3a78ad508939849906 Signed-off-by: Sandeep Patil <sspatil@google.com>
nit.rc
|
a3641af22fdb0f1b3127e4d56e65c13ad108d74a |
11-Nov-2016 |
Elliott Hughes <enh@google.com> |
Improve init bootcharting. Most notably, there's no longer any need to guess an end time. Bug: http://b/23478578 Bug: http://b/33450491 Test: rebooted with bootcharting on/off Change-Id: Icb7d6859581da5526d77dfc5aa4d57c9bfbfd7e2
nit.rc
|
107b8ec454d8ef3a8096a23b6fbafe8ed5442ce3 |
23-Nov-2016 |
Nick Kralevich <nnk@google.com> |
Merge "change /data/bugreports to /bugreports" am: 1b2e6abf3b am: 5fae86b5fa am: cb9fbb4cf6 am: c3f9d38a4c Change-Id: Ie10d1db864543ad6cc8695267344453599408c52
|
5fae86b5fa60a9af4e48745989554bf504bedc60 |
23-Nov-2016 |
Nick Kralevich <nnk@google.com> |
Merge "change /data/bugreports to /bugreports" am: 1b2e6abf3b Change-Id: I7de15de91a688f8fe4a203a84b54e7dcfa106782
|
c4084c669495fd1b41ce8b6568c71b1f46d26969 |
19-Nov-2016 |
Nick Kralevich <nnk@google.com> |
change /data/bugreports to /bugreports It's 5 characters shorter, has no runtime costs, can be stored on a read-only partition, and avoids problems like b/27262109 and b/27204904. It allows makes some security hardening easier. Bug: 27262109 Bug: 27204904 Bug: 32799236 Test: verified new symlink created and old one not present Change-Id: Ief362e13569ad9c868a7f0f9c4dbd6a328c96c6b
ndroid.mk
nit.rc
|
8e22b4b9ecc3a6bdbd4bdaf1d02cb99f3485252c |
20-Nov-2016 |
Nick Kralevich <nnk@google.com> |
init.rc: delete extra whitespace am: 715e33452e am: 70056e91fe am: 6bef57560f Change-Id: I8379eecc012dafb16e037e7fae8386df6b677303
|
715e33452e728855251578d918467d94666fe10a |
20-Nov-2016 |
Nick Kralevich <nnk@google.com> |
init.rc: delete extra whitespace causes merge conflicts. Test: none Change-Id: Ic83db2b3e2f972955efadfc8df8fe8ec918a7609
nit.rc
|
0705fcb2f4ecf0cf3b9799dc1741b9b6c0f8ab3a |
17-Nov-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Add flags to restorecon_recursive to traverse filesystems" am: 5fbd1cfd34 am: ffa3689107 am: a99490c813 am: e799e3317a Change-Id: Icd4b867d450c7b84f86f9d91b39faf6792544cb1
|
ffa3689107d0e9c944e5d877dd8e857e1d22cb65 |
17-Nov-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Add flags to restorecon_recursive to traverse filesystems" am: 5fbd1cfd34 Change-Id: I539d7e9d441c7bb3f5602b892408a85436b857e8
|
a8d8434c42b27f0186be7ecd78c2acc9d459b068 |
15-Nov-2016 |
Paul Lawrence <paullawrence@google.com> |
Add flags to restorecon_recursive to traverse filesystems Use to solve the problem of tracefs conditionally being mounted under debugfs and needing restorecon'd without boot performance penalty. Also move skip-ce to a flag for consistency. Test: Check that trace_mount has correct attributes after boot Bug: 32849675 Change-Id: Ib6731f502b6afc393ea5ada96fa95b339f14da49
nit.rc
|
c488087aa0d13ed0b73b7fabbd65c4cd57905192 |
13-Jul-2016 |
Tianjie Xu <xunchang@google.com> |
Start update_verifier in cache group Start update_verifier in cache group to avoid dac_override Bug: 30020920 Change-Id: I227b4a0e1c07e7b9bf209b432e9db02275ffe660 Test: mma (cherry picked from commit 1e4635f0a8c307592b015476bc69ee2da28c41af)
nit.rc
|
cb221cee180d9b30f5278fc24160c5deede9d739 |
09-Nov-2016 |
Sandeep Patil <sspatil@google.com> |
Merge changes from topic 'healthd-charger-split' * changes: healthd: refactor healthd code to split into 'charger' and 'healthd' healthd: build 'charger' and 'healthd' binaries healthd: refactor to split charger and framework facing code
|
6012db553c87f4f4b039a7d42e3b80ce9480f20f |
01-Nov-2016 |
Sandeep Patil <sspatil@google.com> |
healthd: build 'charger' and 'healthd' binaries This renames the old '/sbin/healthd' to '/sbin/charger' which is to be only used in recovery and charger-only mode. .. and adds a new dynamically linked executable in /system/bin/healthd to be used as 'healthd' in Android. text data bss dec hex filename 817404 36704 37960 892068 d9ca4 root/sbin/charger {was healthd} 72717 11064 12984 96765 179fd system/bin/healthd {*new*} 890121 47768 50944 988833 f16a1 (TOTALS) Corresponding changes in recovery and charger-only .rc files are required change how 'charger' is launched in each mode. Update the seclable for healthd with the launch path in init.rc Test: Boot tested and verified all 3 modes (recovery, charge-only, android) Change-Id: I4ada27a4c113258c5be1fd10adb0f58232b10024 Signed-off-by: Sandeep Patil <sspatil@google.com>
nit.rc
|
ef2479247dc9cace694854a8ba4e526cd0f1d171 |
07-Nov-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Fix selinux warning on tracefs systems" am: 0ad600bdc6 am: 3915012a46 am: 67387a3510 am: a0d26e7cdd Change-Id: I004165050ab96c3a9a7f1fbcdadf84c22b8256d9
|
3915012a461c2e9d77e5547c9b056e43d95bf07c |
07-Nov-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Fix selinux warning on tracefs systems" am: 0ad600bdc6 Change-Id: Ibaab6580caf0fe216cfae72bf5d2560fec02afdf
|
d2abcbd0aba8197040e940d898eb8e28b9fc675d |
02-Nov-2016 |
Paul Lawrence <paullawrence@google.com> |
Fix selinux warning on tracefs systems restorecon_recursive doesn't traverse filesystem boundaries. On tracefs systems, tracing is a separate filesystem, so restorecon this as well Bug: 30963384 Test: Boot hikey, and check that there are no debugfs_tracing denials in dmesg Change-Id: I24abd3ad80d2cfdab4f64fecee799fc0c24ed238
nit.rc
|
9ec05b1381341e7532ff9f7f23e928f10b9a5b36 |
03-Nov-2016 |
Nick Kralevich <nnk@google.com> |
Merge "give zygote AID_READPROC" am: 3a724a8f5d am: d3a2573eea am: 1af7e94c93 am: ab1413013f Change-Id: Ice5e5aaa8ef0699ecfad9840b36cb6c3ec5e0541
|
d3a2573eea19e0019c0a7e7c31e8625b101091d4 |
03-Nov-2016 |
Nick Kralevich <nnk@google.com> |
Merge "give zygote AID_READPROC" am: 3a724a8f5d Change-Id: Ie877330cba17a429ec3cd26eafaaeca3df66cc59
|
3a724a8f5d7876b97e4e7f39a0cfc2f0fdc87fd3 |
03-Nov-2016 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "give zygote AID_READPROC"
|
f8f334966da0158eea5ba8d6e6f1aa8b462c35a6 |
02-Nov-2016 |
Steven Moreland <smoreland@google.com> |
Merge "Update for hidlized hwservicemanager." am: 480af3f633 am: 82c67f5662 am: b394786624 am: 0c54c1e8d6 Change-Id: I8a186016e14aa4137233fc97f949b14bac7f19cd
|
82c67f566203bf4812774e3154a40518a2197d62 |
02-Nov-2016 |
Steven Moreland <smoreland@google.com> |
Merge "Update for hidlized hwservicemanager." am: 480af3f633 Change-Id: I2c11b0249ab77e9dc22a76f6aa66026ebf3ed00d
|
c21169c59f5f7571ab38cc5a2c29ff3e69bee54d |
02-Nov-2016 |
Nick Kralevich <nnk@google.com> |
give zygote AID_READPROC In zygote wrapping mode, ZygoteConnection does a check to see if the pid reported by the wrapped process is either child process that was forked, or a decendent of it. This requires read access to other processes /proc files. Grant zygote AID_READPROC to allow this access. Bug: 32610632 Test: manual inspection of /proc files to verify group. Test: manual inspection of zygote's children to make sure they do not inherit AID_READPROC Change-Id: I3619a9ae33c8077e068e8024f7c7d44cfca6fb76
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
ba825ac33f280e41bf6226370029551d89b39b28 |
24-Oct-2016 |
Steven Moreland <smoreland@google.com> |
Update for hidlized hwservicemanager. Bug: 32313592 Test: end to end Change-Id: I76a7ee01413b28e95e9f19fcde90f6372502ec67
nit.rc
|
1797eb1f09958b4a464262b476d674c2f2559a0c |
27-Sep-2016 |
Iliyan Malchev <malchev@google.com> |
init.rc: have hwservicemanager start the HAL class am: 57d66b8447 am: ad0cbcf21c am: f0099ccb23 am: 121fe849e8 Change-Id: I6cba53d417d505b56e8294afaad473399f692beb
|
121fe849e866b34426d5d3a60c24c0b776283d8b |
27-Sep-2016 |
Iliyan Malchev <malchev@google.com> |
init.rc: have hwservicemanager start the HAL class am: 57d66b8447 am: ad0cbcf21c am: f0099ccb23 Change-Id: I5c24ecbf89d723c478a02bcab8cffc4e9e4385e9
|
ac129cbaa2e36c19d85d780a089ace800b60c742 |
27-Sep-2016 |
Martijn Coenen <maco@google.com> |
Add hwbinder dev node permissions. am: f5110ea029 am: a2249bc1bd am: 2008af6af5 Change-Id: I18c7c1b8b372f59f609e12a2532bd9e435e1ba81
|
57d66b84478ef39aa5d39c4c58f1b6b04be10993 |
20-Sep-2016 |
Iliyan Malchev <malchev@google.com> |
init.rc: have hwservicemanager start the HAL class b/31458381 Test: passing build and runtime tests Change-Id: I1d26af5ca1d0e9c7bbd97cfd88d0b432b50b7216 Signed-off-by: Iliyan Malchev <malchev@google.com>
nit.rc
|
f5110ea02975e9f0e0ec95332162841f99af89a4 |
25-May-2016 |
Martijn Coenen <maco@google.com> |
Add hwbinder dev node permissions. b/31458381 Test: pass Change-Id: I8ec92a29287b17636c363c55a8565dacab19043d Signed-off-by: Iliyan Malchev <malchev@google.com>
eventd.rc
|
ac657cd0d2118ab19bf14bc984f81cd1624f9a81 |
23-Sep-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Remove net_bt_stack group and replace it with bluetooth" am: 7875407bb7 am: f924c252bd am: b0db9714bb am: 531b201eb6 Change-Id: Ie822dd8f259f240eb457f5d67948c417f84817c6
|
531b201eb684512fe5f10a2e6387369cd800d66f |
22-Sep-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Remove net_bt_stack group and replace it with bluetooth" am: 7875407bb7 am: f924c252bd am: b0db9714bb Change-Id: I025c5301fecf0566d8184efce099a195fdbfc460
|
604208e957ad6fb692c445b0f598579051d2071a |
20-Sep-2016 |
Ajay Panicker <apanicke@google.com> |
Remove net_bt_stack group and replace it with bluetooth Bug: 31549206 Change-Id: I667963e5f9fd1a5dc9ad74378b318e3b782e6883
nit.rc
eventd.rc
|
35a0ef524bc610512603c85d3337874b487d7634 |
20-Sep-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Allow bluetooth service to access bluetooth directory and add /logs (1/6)" am: 2c2a3f7a95 am: 3a9a16ee79 am: f5ffb20e6f am: bf2b7a93b2 Change-Id: Iac994fa66eeb7b4e84cd72891ff7449bb51f9da3
|
bf2b7a93b2c1f7cc2059f590658da6af6304c0b1 |
19-Sep-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Allow bluetooth service to access bluetooth directory and add /logs (1/6)" am: 2c2a3f7a95 am: 3a9a16ee79 am: f5ffb20e6f Change-Id: Ied3f4a26681d0c1e3bd72d4f1d0de77fa9e7803a
|
59d6a8cf8a4867a10f56b36057bffcc344715d3f |
16-Sep-2016 |
Ajay Panicker <apanicke@google.com> |
Allow bluetooth service to access bluetooth directory and add /logs (1/6) Bug: 31466840 Change-Id: I2c2766a2366600def81708d97cf3f3f13e0eb655
nit.rc
|
9453ea8ba9f46ebd7bb3ffb7d1feaa20908e8cc7 |
13-Sep-2016 |
Todd Kjos <tkjos@google.com> |
resolve merge conflicts of c6937f2 to nyc-mr1-dev-plus-aosp Change-Id: I82638b0dab5e1b5117f4ed4752fd2cbdaf8c47b1
|
049f38ed6e9ffb0e2bae724bef981f5d172b81a5 |
08-Sep-2016 |
TuHailong <tuhailong@gmail.com> |
Fix zygote energy-aware scheduler tuning bug Change-Id: Ib612e99f7b115c2fbd1503e0994948fd0b0a2dec
nit.zygote32_64.rc
nit.zygote64_32.rc
|
d90a55c4bfe56b8b40fc4876899ad2b5176a14dc |
08-Sep-2016 |
TuHailong <tuhailong@gmail.com> |
Fix zygote energy-aware scheduler tuning bug Change-Id: Ib612e99f7b115c2fbd1503e0994948fd0b0a2dec
nit.zygote32_64.rc
nit.zygote64_32.rc
|
d61a7e2da4e6184797f866abf8020bfe3b928ab0 |
23-Aug-2016 |
Wei Wang <wvw@google.com> |
Split fstab mount into 2 phases This will make it possible to start some key services before mounting data partition Bug: 30118894 Change-Id: Ia9f8cc035de6cc0df9a61605864915efa0266d7f (cherry picked from commit abfbec342fdd2fc9d139a88a2d950953918e1b4e)
nit.rc
|
254f44363b85f4665b1942762a708bf87301a462 |
23-Aug-2016 |
Wei Wang <wvw@google.com> |
Split fstab mount into 2 phases This will make it possible to start some key services before mounting data partition (cherry picked from commit abfbec342fdd2fc9d139a88a2d950953918e1b4e) Bug: 30118894 Change-Id: Ia9f8cc035de6cc0df9a61605864915efa0266d7f
nit.rc
|
abfbec342fdd2fc9d139a88a2d950953918e1b4e |
23-Aug-2016 |
Wei Wang <wvw@google.com> |
Split fstab mount into 2 phases This will make it possible to start some key services before mounting data partition Bug: 30118894 Change-Id: Ia9f8cc035de6cc0df9a61605864915efa0266d7f
nit.rc
|
9acbbbddc91c9b5709e1a9c3d682deae64d0bd80 |
17-Aug-2016 |
Andreas Gampe <agampe@google.com> |
Asan.options: Use abort_on_error am: 67b7e85b18 am: 4f31cff93b am: bdbe675fa1 Change-Id: I4f9c8b507e9f5fc84790eac8c2cc6d65aed8d5f8
|
bdbe675fa1652eaeb92ab2cc44e676356f5215a8 |
17-Aug-2016 |
Andreas Gampe <agampe@google.com> |
Asan.options: Use abort_on_error am: 67b7e85b18 am: 4f31cff93b Change-Id: I8c06aea3ede9f93493aa905ceb0c363e8abc3c1f
|
67b7e85b1868392526def50c1ec20e53af348aa0 |
17-Aug-2016 |
Andreas Gampe <agampe@google.com> |
Asan.options: Use abort_on_error Use abort to have debuggerd act and create a tombstone. Bug: 30775464 Change-Id: I359c7c7c094880b7b55304cd2aa3f4b360b729d8
san.options
|
d80cd744264e81040d3d7a94b8fbb7c2ab31000a |
11-Aug-2016 |
Badhri Jagan Sridharan <Badhri@google.com> |
Remove redundant action triggers on persist.sys.usb.config am: 05e04a134e am: ab5c247b0d am: 9306e7c17a Change-Id: Ifc8ae396e1401cafc37709f88b34601d1ed37953
|
9306e7c17ac71c3ce3f9a984714ab92bd9c470d5 |
11-Aug-2016 |
Badhri Jagan Sridharan <Badhri@google.com> |
Remove redundant action triggers on persist.sys.usb.config am: 05e04a134e am: ab5c247b0d Change-Id: I470da113930539b5ae0ad4a706c8dfe080a52ee2
|
05e04a134e2a7f854f99186306c8033e02328fc0 |
01-Aug-2016 |
Badhri Jagan Sridharan <Badhri@google.com> |
Remove redundant action triggers on persist.sys.usb.config persist.sys.usb.config stores the usb functions which need to be enabled when the phone boots up. When the phone is actually booted, setting this would also activate the following action trigger on sys.usb.config From init.usb.rc: Used to set USB configuration at boot and to switch the configuration when changing the default configuration on property:persist.sys.usb.config=* setprop sys.usb.config ${persist.sys.usb.config} sys.usb.config is anyways set to the actual functions by UsbDeviceManager once it is set to none. Therefore add "on boot" condition to the above action trigger so that persist.sys.usb.config does not race with sys.usb.config. BUG: 30440213 Change-Id: I3333d0b8334fb627469c7faad250bf3151bb1ebf
nit.usb.rc
|
451dc52cb9261fd5c4dfd393314f816be84302cb |
29-Jul-2016 |
Amit Pundir <amit.pundir@linaro.org> |
Merge \\\\"init: usb: delete rndis func to unregister n/w interface\\\\" am: 060b15e20a am: 6d287b3de7 am: e2f4d9e770 am: 9c23e55189 Change-Id: I7541b31811680cfdf85432a11880623fcc6142a8
|
9c23e551893fc6b944680d6dc002144bdc321607 |
29-Jul-2016 |
Amit Pundir <amit.pundir@linaro.org> |
Merge \\\"init: usb: delete rndis func to unregister n/w interface\\\" am: 060b15e20a am: 6d287b3de7 am: e2f4d9e770 Change-Id: I10e03cad4cb026c86ce5882f6c25829830bf8d9f
|
6d287b3de7245061d7917852063064bbf281ed57 |
29-Jul-2016 |
Amit Pundir <amit.pundir@linaro.org> |
Merge \"init: usb: delete rndis func to unregister n/w interface\" am: 060b15e20a Change-Id: I26e6e414f81fdee55fdfeb017ac0c4f5b0941eea
|
e90c3da3abeaf5870d7282b82a69299f4350ccda |
25-May-2016 |
Martijn Coenen <maco@google.com> |
Add hwbinder dev node permissions. Change-Id: I8ec92a29287b17636c363c55a8565dacab19043d (cherry picked from commit e029e7c03dd798e70b5c3e5efdffb84c7f64a417)
eventd.rc
|
aae7b4984c6a136bc6eb3716673dcbd0a5101f51 |
07-Jun-2016 |
Amit Pundir <amit.pundir@linaro.org> |
init: usb: delete rndis func to unregister n/w interface Rndis n/w interface "usb0" registration/deregistration is broken. If a user try to switch to other functions or disable usb tethering or unplug the usb cable then it doesn't kill "usb0" interface. Fix is to delete Rndis function to unregister tethering interface when switching from tethering to other functions or disable/unplug the tethering cable. If we don't do that then the rndis netdev interface will never be freed or unregistered. This also means the rndis function has to be created everytime user enable tethering function from Settings instead of creating it at "on boot" in init.$hardware.usb.rc like we do currently. A relevant fix, Change-Id: Icb49020d624fb21ef2607d473948cbbf3b9cc469, for reference has already been submitted for device/linaro/hikey Change-Id: If1f922e02277cccdc8c0b263be63989ee102cc80 Reported-by: Winter Wang <wente.wang@nxp.com> Signed-off-by: Amit Pundir <amit.pundir@linaro.org>
nit.usb.configfs.rc
|
7edd3146c7ee2e8794dba1300cdc9430c81c823d |
15-Jul-2016 |
Tianjie Xu <xunchang@google.com> |
Merge \\"Start update_verifier in cache group\\" into nyc-mr1-dev am: eddde7a130 am: 872b6e8790 Change-Id: Iac20bb4571292da8b783de8185dff93dc04850b9
|
872b6e879001952d61437272fd78076a3b385d18 |
15-Jul-2016 |
Tianjie Xu <xunchang@google.com> |
Merge \"Start update_verifier in cache group\" into nyc-mr1-dev am: eddde7a130 Change-Id: Ia17697a852687f319050a8cf260316f522564085
|
eddde7a130e8ee732ead4ba5453c6d6d3078d091 |
15-Jul-2016 |
Tianjie Xu <xunchang@google.com> |
Merge "Start update_verifier in cache group" into nyc-mr1-dev
|
5408a76637eb8370eff5fafc50cf0bfe6ee9d2b7 |
14-Jul-2016 |
Pat Tjin <pattjin@google.com> |
Merge \\"core/init.rc: Add /data/cache/* directory creation\\" into nyc-mr1-dev am: 46066ef405 am: b05988b33a Change-Id: Iae9bc319eaad99364b59772260867fb90b08eeae
|
b05988b33a3a2a97a9c5d6f1062aa25a8accdb44 |
14-Jul-2016 |
Yueyao (Nathan) Zhu <yueyao@google.com> |
Merge \"core/init.rc: Add /data/cache/* directory creation\" into nyc-mr1-dev am: 46066ef405 Change-Id: Id67c7a2177520da1f3848642a68442c55b4f863d
|
46066ef405fc0679d73d0f6c0b14f2f50f4f2ed6 |
14-Jul-2016 |
Pat Tjin <pattjin@google.com> |
Merge "core/init.rc: Add /data/cache/* directory creation" into nyc-mr1-dev
|
1e4635f0a8c307592b015476bc69ee2da28c41af |
13-Jul-2016 |
Tianjie Xu <xunchang@google.com> |
Start update_verifier in cache group Start update_verifier in cache group to avoid dac_override Bug: 30020920 Change-Id: I227b4a0e1c07e7b9bf209b432e9db02275ffe660
nit.rc
|
e43d1d523e550284fa85d44c7139ff0c662b3ada |
12-Jul-2016 |
Tim Murray <timmurray@google.com> |
Merge \\"Add support for background stune group.\\" into nyc-mr1-dev am: 531bdd5a2c am: b386d72266 Change-Id: Ib0e2efeef7e015e0e8244e29a825bf3da50297a8
|
51dcc811dc564990761c12133b7326314e4faaf9 |
12-Jul-2016 |
Irina Patru <irina.patru@intel.com> |
Merge \\"init.rc: Remove cpu weight set on the root cgroup\\" into nyc-mr1-dev am: ac957cbd72 am: ddb0f3c612 Change-Id: Ia872bcedde94c70dadc2c3a4e69e2d5cd375c28f
|
1af798ddc5435683a398273fc68c716f03dfd772 |
12-Jul-2016 |
Tim Kryger <tkryger@google.com> |
Merge \\\\"Remove attempt to write sched_compat_yield\\\\" am: 3f2db32b8c am: 49a986bf73 am: f789bd0133 am: 3886aaeae4 Change-Id: I6da3999160ca054e0d8e819e4b35420ae19507c7
|
17b1c0c0611d1acd97b4416f738e825592d540c7 |
12-Jul-2016 |
Tim Murray <timmurray@google.com> |
Merge changes from topic \\'stune\\' into nyc-mr1-dev am: 4b75a86858 am: b8a19f4499 Change-Id: Iecdd4d4693534640aef408f40aa3fd1e1fa9b93e
|
3f947d1c58774487579ab5cc784ae781fe7c44c8 |
12-Jul-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Remove attempt to write sched_compat_yield" into nyc-mr1-dev
|
b386d72266fd8eb933fed0037e4f6e1bbcdce126 |
12-Jul-2016 |
Tim Murray <timmurray@google.com> |
Merge \"Add support for background stune group.\" into nyc-mr1-dev am: 531bdd5a2c Change-Id: Ia3be10db68dffc44e2d70535544c7c59d0933f7d
|
531bdd5a2cde3a8152ae6c10336525518430ae25 |
12-Jul-2016 |
Tim Murray <timmurray@google.com> |
Merge "Add support for background stune group." into nyc-mr1-dev
|
ddb0f3c6129939b2b1f8a43e4eee6c703646a09e |
12-Jul-2016 |
Irina Patru <irina.patru@intel.com> |
Merge \"init.rc: Remove cpu weight set on the root cgroup\" into nyc-mr1-dev am: ac957cbd72 Change-Id: I00c942a5d3e283efe40541c12f7daac2d2c77770
|
f3e1f13d81138f9afb573dbcbd5cb321d48e676c |
11-Jul-2016 |
Tim Kryger <tkryger@google.com> |
Remove attempt to write sched_compat_yield The sched_compat_yield option was eliminated in Linux 2.6.38 by commit ac53db596cc0 ("sched: Use a buddy to implement yield_task_fair()") and as a result, the following error is printed to the log during boot up. init: write_file: Unable to open '/proc/sys/kernel/sched_compat_yield': No such file or directory" Bug: 30034121 Change-Id: Idbdb68de0cb3ab1f67d82a4d66af880bcfdfe261 (cherry picked from commit 724dfbac70ce69c48d3457229411c1c84e9f1c3d)
nit.rc
|
ac957cbd72ceb7a916e2e500242189c86d82e20a |
12-Jul-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "init.rc: Remove cpu weight set on the root cgroup" into nyc-mr1-dev
|
3886aaeae4dff26219c5785a37ca7637b2c73d8d |
11-Jul-2016 |
Tim Kryger <tkryger@google.com> |
Merge \\\"Remove attempt to write sched_compat_yield\\\" am: 3f2db32b8c am: 49a986bf73 am: f789bd0133 Change-Id: I7434b27cf1662543efbe7b5d9fee6bac16cc9f26
|
49a986bf735d707ab45f6c375c0585fd65f9525a |
11-Jul-2016 |
Tim Kryger <tkryger@google.com> |
Merge \"Remove attempt to write sched_compat_yield\" am: 3f2db32b8c Change-Id: I13c56436dd00cf2d5336ba757ae2c32d2e2504b5
|
5dcff8f2b19a53abe7c632a22f455df396554afe |
11-Jul-2016 |
Tim Murray <timmurray@google.com> |
Add support for background stune group. bug 29512132 Change-Id: If8144bfee0fb30cf11f2bb26494ca5e83c11d4d7
nit.rc
|
b8a19f4499240fbc8bc88a7e4fd0365deaeca737 |
11-Jul-2016 |
Tim Murray <timmurray@google.com> |
Merge changes from topic \'stune\' into nyc-mr1-dev am: 4b75a86858 Change-Id: Ib11061d5d539f2e82ad16f122ea7d7b621bd988d
|
23ad7517d21c9751f571232c91f9e74822a5f60e |
12-May-2016 |
Irina Patru <irina.patru@intel.com> |
init.rc: Remove cpu weight set on the root cgroup It isn't allowed to change the cpu.share value for the root cgroup. See kernel commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec7dc8ac73e4a56ed03b673f026f08c0d547f597 This fixes the following error seen in dmesg: init: write_file: Unable to write to '/dev/cpuctl/cpu.shares': Invalid argument BUG: 28735908 Change-Id: I5ef359fb275792f99d13d35c62499026d354f6af Signed-off-by: Irina Patru <irina.patru@intel.com> (cherry picked from commit c560c6310fdb6f8d4a44b05c0d15cad7ac6f4bb1)
nit.rc
|
724dfbac70ce69c48d3457229411c1c84e9f1c3d |
11-Jul-2016 |
Tim Kryger <tkryger@google.com> |
Remove attempt to write sched_compat_yield The sched_compat_yield option was eliminated in Linux 2.6.38 by commit ac53db596cc0 ("sched: Use a buddy to implement yield_task_fair()") and as a result, the following error is printed to the log during boot up. init: write_file: Unable to open '/proc/sys/kernel/sched_compat_yield': No such file or directory" Bug: 30034121 Change-Id: Idbdb68de0cb3ab1f67d82a4d66af880bcfdfe261
nit.rc
|
955694b657012c50312de99e6f78084beae52d60 |
11-Jul-2016 |
Tim Murray <timmurray@google.com> |
Add support for top-app stune group. bug 29512132 Change-Id: I41ec2dd80a469309f48dbb59fc27fbe43fcd67b3
nit.rc
|
0a5bbe421f042487bfcff2f5e44485ebbab3cb15 |
09-Jul-2016 |
Dan Willemsen <dwillemsen@google.com> |
Merge \\\\"Use BOARD_USES_VENDORIMAGE to detect vendor image presence\\\\" am: 5d420e791b am: bdd01e86a5 am: a5b9b8f452 am: d377004c98 Change-Id: I9b56d6e84a121120f1c7df054a0bfdc96076aecb
|
d377004c987e0509ba4cb706aa5dc0dfd3379219 |
09-Jul-2016 |
Dan Willemsen <dwillemsen@google.com> |
Merge \\\"Use BOARD_USES_VENDORIMAGE to detect vendor image presence\\\" am: 5d420e791b am: bdd01e86a5 am: a5b9b8f452 Change-Id: Iceb0c03fa05a7f6126428128c8e5dced5e7e6cef
|
bdd01e86a5c37a40f71f327db5835524b9d7f0a8 |
09-Jul-2016 |
Dan Willemsen <dwillemsen@google.com> |
Merge \"Use BOARD_USES_VENDORIMAGE to detect vendor image presence\" am: 5d420e791b Change-Id: I3a65ccc6bc5d6b3c63484baaa6d816939bd48073
|
0790431f754aed8f00fb1af9827e21aa1a506af9 |
09-Jul-2016 |
Dan Willemsen <dwillemsen@google.com> |
Use BOARD_USES_VENDORIMAGE to detect vendor image presence When building without vendor/... in the tree, we won't be creating a vendorimage, so BOARD_VENDORIMAGE_FILE_SYSTEM_TYPE won't be defined. But we still need to use the vendor image that will be present. Bug: 30040825 Change-Id: I756adc615aea11da60da4d3a4568caca9fed93ab
ndroid.mk
|
10b2ad167a11e78857fb7a964ebc9225f00a1f6e |
07-Jul-2016 |
Tim Murray <timmurray@google.com> |
resolve merge conflicts of 3a29e34 to nyc-mr1-dev-plus-aosp am: 6469fa2a7e Change-Id: I36b1580a9ce0548b27059699998289aa34fade7d
|
6469fa2a7e1ef0b8ac977df321a0360f22556cba |
07-Jul-2016 |
Tim Murray <timmurray@google.com> |
resolve merge conflicts of 3a29e34 to nyc-mr1-dev-plus-aosp Change-Id: I4edd53094a98fcb3cd3e1b063122d13f80d36d3c
|
3a29e344b0d0b184954d505a58e61141300e0dd2 |
17-Jun-2016 |
Tim Murray <timmurray@google.com> |
Update FIFO settings for new uses of FIFO. Adjust FIFO timings as well as allow SurfaceFlinger to use FIFO. bug 24503801 Change-Id: I2c21d4c1788777c2d0d77227bb872701b35c4ff6
nit.rc
|
62657800943b455e1c406bd50cda72ffd5805a52 |
24-Jun-2016 |
Andreas Gampe <agampe@google.com> |
Rootdir: Add more asan.options support am: 8ccc1ad0f7 am: e33c9e426b Change-Id: Ia6a03d301832ec649976bc9889694a0b4203696f
|
e33c9e426be8add027be66b5c2d3bb7a283297fc |
24-Jun-2016 |
Andreas Gampe <agampe@google.com> |
Rootdir: Add more asan.options support am: 8ccc1ad0f7 Change-Id: Ia72be83e461a3f09d6cd86fca99a89d9b6a71bb2
|
8ccc1ad0f71d0587edfbc4c637d6d8de196fe7df |
23-Jun-2016 |
Andreas Gampe <agampe@google.com> |
Rootdir: Add more asan.options support Extend the asan.options file to read binary-specific configuration from files out of /system. For early services, the system image location is important as /data may not be available when they are started. Add a template that turns most sanitization off. At this point in time, it is, however, impossible to get to a zero overhead state after the fact. The template is meant to adapt a build after the fact, and work around issues with LOCAL_SANITIZE := never. Add a Make variable and rule copying the template to the path and name expected by ASAN. Add SANITIZE_LITE to automatically add a large set of options files. Bug: 29498013 Change-Id: I8e9e6929a55cee3f3fa0acb377a886bfa7006c91
ndroid.mk
san.options
san.options.off.template
|
60c6dacd62cf671cd6038285f3754d33631f643c |
21-Jun-2016 |
Yueyao (Nathan) Zhu <yueyao@google.com> |
core/init.rc: Add /data/cache/* directory creation Bug: 28845422 Change-Id: I2abcc67176cf94f34706f8f005a24ef5f70e0494
nit.rc
|
c9a21ef605a541579f53f8e37df81f85ba3cf6a1 |
16-Jun-2016 |
Vitalii Tomkiv <vitalit@google.com> |
Merge \\\\"Set zygote process priority to -20 to speed up VM startup time.\\\\" am: 92774329dd am: bf5f0fae07 am: b20a94398b am: 7a1a6b91a7 Change-Id: I59cd191b21693481ab004a8d1abc092620b178ed
|
7a1a6b91a7f2cdb4a8bab8b94ed81ead3cf5b13e |
16-Jun-2016 |
Vitalii Tomkiv <vitalit@google.com> |
Merge \\\"Set zygote process priority to -20 to speed up VM startup time.\\\" am: 92774329dd am: bf5f0fae07 am: b20a94398b Change-Id: I65c0b4e96718c89ff3706516727cd6e6fed3d66b
|
bf5f0fae076be99357ec002eb45a2175c61b8d37 |
16-Jun-2016 |
Vitalii Tomkiv <vitalit@google.com> |
Merge \"Set zygote process priority to -20 to speed up VM startup time.\" am: 92774329dd Change-Id: I3c70a90e4d4e07f7c733a3a2738b0067ac09b6dd
|
372e5474d4b7832901d52c274e9ce26e7da66922 |
19-May-2016 |
Vitalii Tomkiv <vitalit@google.com> |
Set zygote process priority to -20 to speed up VM startup time. Tests for Nexus9 device shows 450ms boot time speedup, 180ms for Nexus 5X. Bug: 28866384 Change-Id: Icefd130d4bfe5538dae5b9518250807351b0789e
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
abb116523661acce48fa8fc11f4056b9ca24f240 |
07-Jun-2016 |
Tao Bao <tbao@google.com> |
Merge "Create /data/ota_package for OTA packages." into nyc-mr1-dev am: f9b7f7fdba am: 27bbf8953d * commit '27bbf8953d5a141912fe9325a4995da18ca86a6d': Create /data/ota_package for OTA packages. Change-Id: I243ec91e45bf202a6867645504eb963b64262556
|
27bbf8953d5a141912fe9325a4995da18ca86a6d |
07-Jun-2016 |
Tao Bao <tbao@google.com> |
Merge "Create /data/ota_package for OTA packages." into nyc-mr1-dev am: f9b7f7fdba * commit 'f9b7f7fdba6f62309372fee7c619de1edd8aa389': Create /data/ota_package for OTA packages. Change-Id: I8d0cb3b8687d376efbfbbf186f858bef1c7ccf8e
|
380d6b1b4dae020e2319add3abb6b0e6fa0c79d3 |
26-May-2016 |
Tao Bao <tbao@google.com> |
Create /data/ota_package for OTA packages. We will store OTA packages there for both A/B and non-A/B OTAs. The directory will be accessed by GMSCore (for both), uncrypt (non-A/B), update_engine (A/B), update_verifier (A/B) and possibly system server (for non-A/B OTAs to clean up half-way uncrypt'd packages). Bug: 28944800 Change-Id: I5aa8156ec5052bd15dfadd4d8c28925d464e4401
nit.rc
|
52ebee98657082155ad4108bb0f75ba37f7ea394 |
02-Jun-2016 |
Daniel Micay <danielmicay@gmail.com> |
add a property for controlling perf_event_paranoid am: fe01f56c0d * commit 'fe01f56c0d5c42508e1e82f5976e4c10bb00f632': add a property for controlling perf_event_paranoid Change-Id: I1059ecb2c1d1aba95cd3c93f208ae7ca904cf95e
|
f97ae58686c556d0fb463f393785b697d8323999 |
02-Jun-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "add a property for controlling perf_event_paranoid" am: 9292d7dae3 am: a6d6f45037 am: 680b2f3cb6 am: 0e7344f1ca * commit '0e7344f1cad902133480d5137af2bdae1bf255e4': add a property for controlling perf_event_paranoid Change-Id: Ib4536fb05b7a3842f208e29bb6ace43ec87f1a39
|
fe01f56c0d5c42508e1e82f5976e4c10bb00f632 |
04-Sep-2015 |
Daniel Micay <danielmicay@gmail.com> |
add a property for controlling perf_event_paranoid (Cherry picked from commit 2b22a66382db8a2fdf5ed7a685085a6d7d67cf12) This adds a system property for controlling unprivileged access to perf_event_paranoid. It depends on adding kernel support for perf_event_paranoid=3 based on grsecurity's PERF_HARDEN feature to completely disable unprivileged access to perf. A minimal port of this feature is used in the vanilla Debian kernel by default. It hides the non-hardened value as an implementation detail, since while it is currently 1, it will probably become 2 in the future. Bug: 29054680 Change-Id: I6e3ae3cf18d8c76df94f879c34fb6fde519b89a9
nit.rc
|
0e7344f1cad902133480d5137af2bdae1bf255e4 |
02-Jun-2016 |
Daniel Micay <danielmicay@gmail.com> |
Merge "add a property for controlling perf_event_paranoid" am: 9292d7dae3 am: a6d6f45037 am: 680b2f3cb6 * commit '680b2f3cb61e29a46d0d6bdf89394dd96e82f201': add a property for controlling perf_event_paranoid Change-Id: I23b928d61d2fa81637aefa09c34bf0e20777ad55
|
680b2f3cb61e29a46d0d6bdf89394dd96e82f201 |
02-Jun-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "add a property for controlling perf_event_paranoid" am: 9292d7dae3 am: a6d6f45037 * commit 'a6d6f45037025175b3074661c9d2d80931d71817': add a property for controlling perf_event_paranoid Change-Id: Ic1e1a1365735f73edde6767bf71da8c6e59b46a4
|
bc3ff3a7a2dd7658f24d210eaf2fe532cb878eaa |
01-Jun-2016 |
David Sehr <sehr@google.com> |
add /data/misc/profman for output am: 0eb24e1bc7 am: cdc503c13b am: 0be76bb96f * commit '0be76bb96f718d802cfed09b41202fb07ba867af': add /data/misc/profman for output Change-Id: Ic2c4c42e2cb59cfb609963a36b29325f7044041d
|
0be76bb96f718d802cfed09b41202fb07ba867af |
01-Jun-2016 |
David Sehr <sehr@google.com> |
add /data/misc/profman for output am: 0eb24e1bc7 am: cdc503c13b * commit 'cdc503c13b153c8a9216725dcd0f03ee6414161e': add /data/misc/profman for output Change-Id: I60764f97eacd6853f17baed62bb6beee67fbc6fa
|
cdc503c13b153c8a9216725dcd0f03ee6414161e |
01-Jun-2016 |
David Sehr <sehr@google.com> |
add /data/misc/profman for output am: 0eb24e1bc7 * commit '0eb24e1bc7317eb5764567223cdd9405d16aefa7': add /data/misc/profman for output Change-Id: I8d8ebc0dc37aee1ac54f8e50e374cad77a6fe77a
|
b829f909f7ea2e7c14f0121390f83130b4b9b4a5 |
01-Jun-2016 |
David Sehr <sehr@google.com> |
add /data/misc/profman for output am: 0eb24e1bc7 * commit '0eb24e1bc7317eb5764567223cdd9405d16aefa7': add /data/misc/profman for output Change-Id: Id672a7e5f4b64c9b3d707b4f45f1e7f8ce40ca34
|
0eb24e1bc7317eb5764567223cdd9405d16aefa7 |
28-May-2016 |
David Sehr <sehr@google.com> |
add /data/misc/profman for output Bug: 28748264 Change-Id: Ib57ccc570de446e03ea8c27ce8e404929138b213
nit.rc
|
2b22a66382db8a2fdf5ed7a685085a6d7d67cf12 |
04-Sep-2015 |
Daniel Micay <danielmicay@gmail.com> |
add a property for controlling perf_event_paranoid This adds a system property for controlling unprivileged access to perf_event_paranoid. It depends on adding kernel support for perf_event_paranoid=3 based on grsecurity's PERF_HARDEN feature to completely disable unprivileged access to perf. A minimal port of this feature is used in the vanilla Debian kernel by default. It hides the non-hardened value as an implementation detail, since while it is currently 1, it will probably become 2 in the future. Bug: 29054680 Change-Id: I6e3ae3cf18d8c76df94f879c34fb6fde519b89a9
nit.rc
|
492883c839f2a3fb17d68093ca736e0f10d2b90e |
24-May-2016 |
Srinath Sridharan <srinathsr@google.com> |
Merge "Only apply schedTune boost to top-app tasks" into nyc-mr1-dev am: 87a4f046f0 am: e7b8d06f18 * commit 'e7b8d06f186450977426cb07b5ee212cdc93246d': Only apply schedTune boost to top-app tasks Change-Id: I25d51e00c5dfc1e3bca359c6332bd388a37c513c
|
e7b8d06f186450977426cb07b5ee212cdc93246d |
24-May-2016 |
Srinath Sridharan <srinathsr@google.com> |
Merge "Only apply schedTune boost to top-app tasks" into nyc-mr1-dev am: 87a4f046f0 * commit '87a4f046f01ff49d69e4ff2446266c29557fb5e1': Only apply schedTune boost to top-app tasks Change-Id: I32ec1f0811971a527234672cadeeddcb50fd1369
|
87a4f046f01ff49d69e4ff2446266c29557fb5e1 |
24-May-2016 |
Srinath Sridharan <srinathsr@google.com> |
Merge "Only apply schedTune boost to top-app tasks" into nyc-mr1-dev
|
13398711387e9ce193c907c11191ce0998dda5af |
06-May-2016 |
Srinath Sridharan <srinathsr@google.com> |
Only apply schedTune boost to top-app tasks When using EAS, the foreground tasks were all getting boosted during touchboosts. Limit it to top-app tasks. BUG: 28378389 Change-Id: I72b7158a614bfd9b6c61024774e408ceba61fc9c
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
032a45f435edaf7964b068e2dcade5492854b0d4 |
16-May-2016 |
Badhri Jagan Sridharan <badhri@google.com> |
Merge "init: usb: disable usb function switch until adbd is ready" am: 2a26c2a836 am: b61ecb5213 am: 7e11db1b32 am: 66d69b902f * commit '66d69b902f4ba15f2d2ad6b3d8214ae3355076cd': init: usb: disable usb function switch until adbd is ready Change-Id: Ib9022f062bece4a7fee2772df1d8f917c04f8e55
|
66d69b902f4ba15f2d2ad6b3d8214ae3355076cd |
16-May-2016 |
Winter Wang <wente.wang@nxp.com> |
Merge "init: usb: disable usb function switch until adbd is ready" am: 2a26c2a836 am: b61ecb5213 am: 7e11db1b32 * commit '7e11db1b3206cd92d52fca0b324f6a5260a68aec': init: usb: disable usb function switch until adbd is ready Change-Id: I12e8fab36f39a9b97e52ace30ab54b3a9fd7bf0f
|
7e11db1b3206cd92d52fca0b324f6a5260a68aec |
16-May-2016 |
Badhri Jagan Sridharan <badhri@google.com> |
Merge "init: usb: disable usb function switch until adbd is ready" am: 2a26c2a836 am: b61ecb5213 * commit 'b61ecb5213e1c94e823f23d7f5a8a0a93db617d6': init: usb: disable usb function switch until adbd is ready Change-Id: I5fc733ee946b4d0accf58f56c80270f9e13d9f63
|
2a26c2a836af9109ce4aa6cf8128a385d14878d3 |
16-May-2016 |
Badhri Jagan Sridharan <badhri@google.com> |
Merge "init: usb: disable usb function switch until adbd is ready"
|
f44442215d3268bef1de5d74f7b68a1c66727973 |
14-May-2016 |
Patrick Tjin <pattjin@google.com> |
Create symlink in the case where device has no cache partition am: c6535a343f am: 31788415ed * commit '31788415ed6d89eba11ee757f04ff32ee260a7c1': Create symlink in the case where device has no cache partition Change-Id: Ic5813d8f9fab4a02d6e0fab4add2fa0a8a72c008
|
31788415ed6d89eba11ee757f04ff32ee260a7c1 |
14-May-2016 |
Patrick Tjin <pattjin@google.com> |
Create symlink in the case where device has no cache partition am: c6535a343f * commit 'c6535a343f0b0bdd0f4171f0b4c9be401beebf77': Create symlink in the case where device has no cache partition Change-Id: Ibcec898104e6509e70647576611ecc7d887f163d
|
c6535a343f0b0bdd0f4171f0b4c9be401beebf77 |
13-May-2016 |
Patrick Tjin <pattjin@google.com> |
Create symlink in the case where device has no cache partition Create symlink from /cache to /data/cache for devices which have no cache partition. Bug: 28747374 Change-Id: Ifb0c3250f1be345ce46fcdb78533e36c2250bb85
ndroid.mk
|
0ba7983b9f00a4ca1398cab665a4f242ae749086 |
12-May-2016 |
Irina Patru <irina.patru@intel.com> |
Merge "init.rc: Remove cpu weight set on the root cgroup" am: 422492c506 am: 2618d90c2f am: 12397f202f am: 403461f67d * commit '403461f67d47e1156115d6e1be3925e48cb182f7': init.rc: Remove cpu weight set on the root cgroup Change-Id: Iabaf0f78e60a5e3ac28f88d6951d49cde8717940
|
403461f67d47e1156115d6e1be3925e48cb182f7 |
12-May-2016 |
Irina Patru <irina.patru@intel.com> |
Merge "init.rc: Remove cpu weight set on the root cgroup" am: 422492c506 am: 2618d90c2f am: 12397f202f * commit '12397f202f97da7dcd40d45159696bc6be50aaf6': init.rc: Remove cpu weight set on the root cgroup Change-Id: I256d702368c1b4ed8688006abb5202dcc0d11f83
|
12397f202f97da7dcd40d45159696bc6be50aaf6 |
12-May-2016 |
Irina Patru <irina.patru@intel.com> |
Merge "init.rc: Remove cpu weight set on the root cgroup" am: 422492c506 am: 2618d90c2f * commit '2618d90c2fa3f952a195dfd4ecd9f92ec462bccb': init.rc: Remove cpu weight set on the root cgroup Change-Id: I2663c368032a3c9f851de7d1e47f68c3a25b0d52
|
c560c6310fdb6f8d4a44b05c0d15cad7ac6f4bb1 |
12-May-2016 |
Irina Patru <irina.patru@intel.com> |
init.rc: Remove cpu weight set on the root cgroup It isn't allowed to change the cpu.share value for the root cgroup. See kernel commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec7dc8ac73e4a56ed03b673f026f08c0d547f597 This fixes the following error seen in dmesg: init: write_file: Unable to write to '/dev/cpuctl/cpu.shares': Invalid argument BUG: 28735908 Change-Id: I5ef359fb275792f99d13d35c62499026d354f6af Signed-off-by: Irina Patru <irina.patru@intel.com>
nit.rc
|
54c2ab9732f7cf458a4179008341aa152fbc95f9 |
26-Apr-2016 |
Srinath Sridharan <srinathsr@google.com> |
marlin/eas: Fixing foreground/schedtune.boost path. am: 7ac34d0 am: f746166 * commit 'f746166fdc627d48a3e8b3a6baf0a86cd93b7271': marlin/eas: Fixing foreground/schedtune.boost path. Change-Id: I8e5a7a6742bbec4a5d00e852780e827bb7833f52
|
f746166fdc627d48a3e8b3a6baf0a86cd93b7271 |
26-Apr-2016 |
Srinath Sridharan <srinathsr@google.com> |
marlin/eas: Fixing foreground/schedtune.boost path. am: 7ac34d0 * commit '7ac34d08efb3290bab77c6ed3bbbec067aeddf09': marlin/eas: Fixing foreground/schedtune.boost path. Change-Id: I0a549cb1fe0e5bd5ce89a7178d1468f808f175f7
|
7ac34d08efb3290bab77c6ed3bbbec067aeddf09 |
25-Apr-2016 |
Srinath Sridharan <srinathsr@google.com> |
marlin/eas: Fixing foreground/schedtune.boost path. BUG: 28378389 Change-Id: I613fd5622d3d27deafe6054bbf2a4799d97f9170
nit.zygote32_64.rc
nit.zygote64_32.rc
|
77e05cd29a5ac223db51ce5adf045cf23f703169 |
19-Apr-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Don\'t start defaultcrypto twice" into nyc-dev am: fe5d55a am: 1a920d7 am: fa3e4ea * commit 'fa3e4ea7c3dec9e7715ac46553714b8493005bb1': Don't start defaultcrypto twice Change-Id: I7d225afe784949d96e5a628d97c18f90c1038721
|
1a920d72dcc6f8c91fd6ec04954facd4d351fb9d |
19-Apr-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Don\'t start defaultcrypto twice" into nyc-dev am: fe5d55a * commit 'fe5d55a68b9dc3a593d3f6ee5be919b8a9de710c': Don't start defaultcrypto twice Change-Id: I0e9a27208ea046a2cf738992ba97141da9026c08
|
fe5d55a68b9dc3a593d3f6ee5be919b8a9de710c |
19-Apr-2016 |
Paul Lawrence <paullawrence@google.com> |
Merge "Don't start defaultcrypto twice" into nyc-dev
|
1f99218612fa12f2c3354c29bf8d761a27e50148 |
19-Apr-2016 |
Paul Lawrence <paullawrence@google.com> |
Don't start defaultcrypto twice The old way (using triggers) starts defaultcrypto twice because queue_property_triggers_action retriggers the action. Bug: 27452459 Change-Id: I48c844836f551673d0dbfed6c33bd8ee1e035f40
nit.rc
|
2deb078895ab2422c1e0846833a6fb88534dda3d |
18-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Create legacy /data/system/user directory." into nyc-dev am: e4f870a am: 2a9974a am: 1b59b81 * commit '1b59b815bab116d11347011791c020981432a99d': Create legacy /data/system/user directory. Change-Id: Ib1983ee798a81b316d055cf2f8c9a239bdfd1253
|
1b59b815bab116d11347011791c020981432a99d |
18-Apr-2016 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Create legacy /data/system/user directory." into nyc-dev am: e4f870a am: 2a9974a * commit '2a9974a9682291f4e7dcbb2e940ac2e42a0d6c2c': Create legacy /data/system/user directory. Change-Id: I20b29a6fb802966be184cb78534b4dd7d36eee66
|
0ef5c5cb203eae0656f86e500274eb5bd856b88c |
18-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Create legacy /data/system/user directory." into nyc-dev am: e4f870a * commit 'e4f870a0bb260f351208b9fe3cf7334e58c16a14': Create legacy /data/system/user directory. Change-Id: I9b18134310c101974eb353d635c9cc8f8488877f
|
c9b84a362a92b7ce709095c1986be871eacbb010 |
15-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Create legacy /data/system/user directory. We create per-user directories under this location, so it should only be created once by init, similar to all the other user-specific directories. Bug: 27896918 Change-Id: I9ec55e4fd763c0eda6c6e50483694a6377344586
nit.rc
|
bc725db93a30428c93de74f08f977ad8bdc7ee53 |
13-Apr-2016 |
Nick Kralevich <nnk@google.com> |
init.rc: Restore the /mnt/sdcard symlink am: d2f0a2c am: bcf98cf * commit 'bcf98cfcd40f2d408f601061ba1071b52d92ffbc': init.rc: Restore the /mnt/sdcard symlink Change-Id: I50ec25bcc48f4cc312b8559b5985a8371feef5ae
|
bcf98cfcd40f2d408f601061ba1071b52d92ffbc |
13-Apr-2016 |
Nick Kralevich <nnk@google.com> |
init.rc: Restore the /mnt/sdcard symlink am: d2f0a2c * commit 'd2f0a2c0653e332b906875077b9048e64b929d94': init.rc: Restore the /mnt/sdcard symlink Change-Id: Icd4eea67bdf9ea416f1e15ec9f1666e74e85b3eb
|
d2f0a2c0653e332b906875077b9048e64b929d94 |
13-Apr-2016 |
Nick Kralevich <nnk@google.com> |
init.rc: Restore the /mnt/sdcard symlink "You are in a maze of twisty little symlinks, all alike." Restore the /mnt/sdcard symlink, for compatibility with older Android apps. This symlink was suppose to have been removed in the Gingerbread time frame, but lives on. Note: The /mnt/sdcard symlink was originally created in device specific *.rc files in the device/vendor/hardware/* directory. This change moves the creation of the symlink into the common init.rc file. Bug: 25801877 Bug: 28108983 Change-Id: I2f9bf71bddffadb587d7376dfdfc8a546c84ec28
nit.rc
|
46c313b694fbeead5a7ac652d5f0fc6ff1313784 |
24-Mar-2016 |
Winter Wang <wente.wang@nxp.com> |
init: usb: disable usb function switch until adbd is ready In the case of adb enabled, When a usb function switch happens e.g mtp,adb -> ptp,adb, framework will set sys.usb.config from "mtp,adb" to "none" and stop adbd first. At this time, the property "sys.usb.ffs.ready", which is set after the ready of the perious start adbd, is still "1". So , when framework goes on setting the sys.usb.config to "ptp,adb", init.usb.configfs.rc will trigger actions to bind() f_fs without waiting for adbd is actually ready. This will produce some error messages: ------------ configfs-gadget ci_hdrc.0: failed to start g1: -19 init: write_file: Unable to write to '/config/usb_gadget/g1/UDC': No such device ------------ this error msg is caused by configFS start binding f_fs before adbd is ready. Add setting the "sys.usb.ffs.ready" to "0" will help clear this error msg, as the bind process in kernel gadget driver will wait for the set of this property, which is the sign of adbd is ready. Signed-off-by: Winter Wang <wente.wang@nxp.com>
nit.usb.configfs.rc
|
7c17b0c87d619c333ea897056c8ca8a71a8f53ff |
18-Mar-2016 |
Eino-Ville Talvala <etalvala@google.com> |
Add camera2 NDK library to public library lists am: 5f31ca2 am: 3c30fe1 * commit '3c30fe1106c5a0b52d387231e3dd87c192edebf1': Add camera2 NDK library to public library lists
|
3c30fe1106c5a0b52d387231e3dd87c192edebf1 |
18-Mar-2016 |
Eino-Ville Talvala <etalvala@google.com> |
Add camera2 NDK library to public library lists am: 5f31ca2 * commit '5f31ca2231a2d743b09d0f9f902d20b30a4baca7': Add camera2 NDK library to public library lists
|
5f31ca2231a2d743b09d0f9f902d20b30a4baca7 |
18-Mar-2016 |
Eino-Ville Talvala <etalvala@google.com> |
Add camera2 NDK library to public library lists It was dropped in the migration to the public.libraries format NDK is the same on standard Android and Wear. Bug: 27742249 Change-Id: I1eafbb649c0ccc5b9a93471fa387624d838bd3d0
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
afef45141f82577d2466b9d5b76371393931dc54 |
17-Mar-2016 |
Daniel Rosenberg <drosen@google.com> |
Merge "Set up configfs" into nyc-dev am: 290127b am: 7972040 * commit '7972040588b1921c743d93a68435e095cb352858': Set up configfs
|
7972040588b1921c743d93a68435e095cb352858 |
17-Mar-2016 |
Daniel Rosenberg <drosen@google.com> |
Merge "Set up configfs" into nyc-dev am: 290127b * commit '290127b29290c133f759eda3fc992e3dcbfb7cb1': Set up configfs
|
290127b29290c133f759eda3fc992e3dcbfb7cb1 |
17-Mar-2016 |
Daniel Rosenberg <drosen@google.com> |
Merge "Set up configfs" into nyc-dev
|
5e11727101c784e5c0f6bdfb2b132e53c2ec1643 |
17-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Merge "Add libvulkan.so to the list of public libraries" into nyc-dev am: eb43104 am: 44837bd * commit '44837bd892abababf0884ad3a882268f2808b196': Add libvulkan.so to the list of public libraries
|
8239061a22d5e90c038509772f1845f51dadfa5a |
17-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Merge changes from topic \'fix-nativeloader-todo\' into nyc-dev am: c8bc211 am: 0583bc6 * commit '0583bc610b56dfba646d16e5ee88131b6b918cdd': Move list of public libraries to a config file Revert "libnativeloader: Make webviewchromium so file optional"
|
44837bd892abababf0884ad3a882268f2808b196 |
17-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Merge "Add libvulkan.so to the list of public libraries" into nyc-dev am: eb43104 * commit 'eb43104db148976581c6525b12b1abf25f65987b': Add libvulkan.so to the list of public libraries
|
0583bc610b56dfba646d16e5ee88131b6b918cdd |
17-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Merge changes from topic \'fix-nativeloader-todo\' into nyc-dev am: c8bc211 * commit 'c8bc211e6658cf56c5ac8ff5217a1d9a3a64143b': Move list of public libraries to a config file Revert "libnativeloader: Make webviewchromium so file optional"
|
dbae9a9b775acde6549fcdfb8d5a2195062e5cc1 |
17-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Add libvulkan.so to the list of public libraries Accidentally dropped it in 4b0e963872715775a63f36b385150cba4801b1d0 Bug: http://b/27546414 Change-Id: I28835ce3229f778387efedf269d7f32572e09184
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
d1fdb9883011f57ab7a3fdcde4d835ef6918b14c |
15-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Move list of public libraries to a config file This list contains libraries that should directly or indirectly be accessible to apps for the platform. Note that this list is not device specific but rather device class specific. For now we have 2 separate lists; one for Android Phones and Tablets, and another one for Android Wear devices. Bug: http://b/27546414 Bug: http://b/22548808 Change-Id: I83de5e3cf67392d0e9af66f70123898bd5997146 (cherry picked from commit 4b0e963872715775a63f36b385150cba4801b1d0)
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
4b0e963872715775a63f36b385150cba4801b1d0 |
15-Mar-2016 |
Dimitry Ivanov <dimitry@google.com> |
Move list of public libraries to a config file This list contains libraries that should directly or indirectly be accessible to apps for the platform. Note that this list is not device specific but rather device class specific. For now we have 2 separate lists; one for Android Phones and Tablets, and another one for Android Wear devices. Bug: http://b/27546414 Bug: http://b/22548808 Change-Id: I83de5e3cf67392d0e9af66f70123898bd5997146
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
|
4edec2539693690e116799cbbcf468147e02cb4b |
19-Feb-2016 |
Daniel Rosenberg <drosen@google.com> |
Set up configfs Bug: 19160983 Change-Id: I8fddf11fb6124950dfa2528a4f420abd9d461df6 Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
|
e45d59b05be81863bfceac78d885d259dc892b44 |
14-Mar-2016 |
Mihai Serban <mihai.serban@intel.com> |
Merge "init-debug.rc: mount debugfs" am: bf6c67f234 am: 8bf6e6908b * commit '8bf6e6908b97f785b5d7036e616438f839e9da1d': init-debug.rc: mount debugfs
|
8bf6e6908b97f785b5d7036e616438f839e9da1d |
14-Mar-2016 |
Mihai Serban <mihai.serban@intel.com> |
Merge "init-debug.rc: mount debugfs" am: bf6c67f234 * commit 'bf6c67f234b591afd3cf936632ca00730b89eb73': init-debug.rc: mount debugfs
|
bf6c67f234b591afd3cf936632ca00730b89eb73 |
14-Mar-2016 |
Elliott Hughes <enh@google.com> |
Merge "init-debug.rc: mount debugfs"
|
bae1efe5001093d1654b5fd00a2c9f039fbab8ae |
13-Mar-2016 |
Janis Danisevskis <jdanis@google.com> |
Merge "Leftovers of the SELinux policy update mechanism" am: b9c0788806 am: 0af61f0024 * commit '0af61f0024d137e7a2f1ac0d9e002711cd01092c': Leftovers of the SELinux policy update mechanism
|
0af61f0024d137e7a2f1ac0d9e002711cd01092c |
13-Mar-2016 |
Janis Danisevskis <jdanis@google.com> |
Merge "Leftovers of the SELinux policy update mechanism" am: b9c0788806 * commit 'b9c078880644b51bc9e6c314eed157f230fce43c': Leftovers of the SELinux policy update mechanism
|
3d1dff22311bb6b3c01115f0c4400dcdc37c35c3 |
08-Mar-2016 |
Janis Danisevskis <jdanis@google.com> |
Leftovers of the SELinux policy update mechanism Remove references to SELinux policy files in /data/security from libselinux/android.c. In the process all code that is apparently related to handling an alternate policy and/or reloading the policy has been removed. Bug: 26544104 Change-Id: I47bf76ac3c26c5d71f92a21ffac2b17ba14262ea
nit.rc
|
ec8637ef6d0bc5bf69eb03aa1461b549e02a136f |
09-Mar-2016 |
Hidehiko Abe <hidehiko@google.com> |
Split slave-bind mount into two. mount(2) does not work with MS_BIND | MS_SLAVE at a time. Instead, this CL calls mount twice. Change-Id: I36b2eb2853f19efc2b0677fb07b6822392aac37c
nit.rc
|
afebc25bdd923b46c2e315c30ffbfb70558d1acf |
07-Mar-2016 |
Mihai Serban <mihai.serban@intel.com> |
init-debug.rc: mount debugfs Enable debugfs on non "user" builds. BUG=27520850 Change-Id: I2bcc72b686d0477b553c0605adfd4c023e72cbfb Signed-off-by: Mihai Serban <mihai.serban@intel.com>
nit-debug.rc
|
e120b471acbe136e27e257fdf493590e1cc4ba73 |
01-Mar-2016 |
Alex Deymo <deymo@google.com> |
Add /postinstall partition when using the A/B updater. The new top level directory /postinstall is used by the A/B updater to mount the new partition and run a post-install program before rebooting into that new system. init.rc was extended to label this new directory since the initrd has no extended attributes. Bug: 27177071 TEST=`ls -laZ /` shows the /postinstall directory on edison-eng (cherry picked from commit bb968fb04db3ec5227e84571e1c6bfd265836085) Change-Id: Iff993135c7ce3a1a0f6450892ef7382da408fd5e
ndroid.mk
nit.rc
|
40345ef6b89b589f88c49bfa6a861ade88154782 |
04-Mar-2016 |
Alex Deymo <deymo@google.com> |
Merge "Add /postinstall partition when using the A/B updater." am: 700b15dacf am: e2ad3cfae4 * commit 'e2ad3cfae4f9f9ddec2746c0c57cdb3dc1991a43': Add /postinstall partition when using the A/B updater.
|
e2ad3cfae4f9f9ddec2746c0c57cdb3dc1991a43 |
04-Mar-2016 |
Alex Deymo <deymo@google.com> |
Merge "Add /postinstall partition when using the A/B updater." am: 700b15dacf * commit '700b15dacfa42bcc5c4d768b92530e9f20f0211b': Add /postinstall partition when using the A/B updater.
|
bb968fb04db3ec5227e84571e1c6bfd265836085 |
01-Mar-2016 |
Alex Deymo <deymo@google.com> |
Add /postinstall partition when using the A/B updater. The new top level directory /postinstall is used by the A/B updater to mount the new partition and run a post-install program before rebooting into that new system. init.rc was extended to label this new directory since the initrd has no extended attributes. Bug: 27177071 TEST=`ls -laZ /` shows the /postinstall directory on edison-eng Change-Id: I6cdee7eb1d61ac7d447528962a4fad1a7bbf138d
ndroid.mk
nit.rc
|
be54c543bd6e76d8b505028cf64233e1a9213776 |
01-Mar-2016 |
Keun Soo Yim <yim@google.com> |
mkdir /data/misc/cameraserver for AVD's camera HALs cameraserver from nyc uses cameraserver as its username. thus this change is needed for AVD (android virtual device)'s camera HAL which is attached to cameraserver to work as that HAL writes some files to /data/misc/media. the backward compatibility issue should be handled as separate changes. this approach is preferred for finer-grained security isolation. Change-Id: If028667d62df8fcac634ff1001759c39703b00dd
nit.rc
|
d125f6e8a95a998d74175df49d54251489723933 |
26-Feb-2016 |
Todd Kjos <tkjos@google.com> |
Merge "Mount schedTune cgroup as /dev/stune" into nyc-dev
|
0836c9e38624da1f109f6438f24fada3621e6d7a |
04-Dec-2015 |
Chien-Yu Chen <cychen@google.com> |
Sync internal<->AOSP user list. Bug: 27299198 Cherry-picked from: Restart cameraserver Bug: 24511454 Change-Id: Ia27f4ef0eb71f891c789f637a21b04afe0b1c4e9
nit.zygote32_64.rc
nit.zygote64_32.rc
|
845a4ffef800949c45dc722deec5523d239ed41e |
24-Feb-2016 |
Glenn Kasten <gkasten@google.com> |
Restore audio tee sink Bug: 27323882 Change-Id: I1131c0537942c8f7cbf9ff6cc6847ab7e93e6187
nit.rc
|
11cde567a8fd6fd37cd462e24dd97d0f57bb12a4 |
23-Feb-2016 |
Todd Kjos <tkjos@google.com> |
Mount schedTune cgroup as /dev/stune Make stune consistent with the other cgroups mounted under /dev Change-Id: I0fe7120ad2afbe8e6a3c9f72cc3f465de618d344
nit.rc
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
aed972dead82d2a74c3a9be296ba3390477d30cf |
22-Feb-2016 |
Calin Juravle <calin@google.com> |
Merge "Create profiles folders" into nyc-dev
|
002aecf6e8eda5d5affe412e20a22458c371a355 |
19-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
Temporary fix for bugreport symlink. Bug: 27262109 Change-Id: I011da38f8ad1eeaf717dc03a0fb6f9fdc5654c4c
nit.rc
|
807f23aff210064274d332866b3d5f59d0fb743c |
01-Feb-2016 |
Calin Juravle <calin@google.com> |
Create profiles folders Current profiles (the ones which have not been used for compilation) are stored in /data/misc/profiles/cur/0/pkgname/. Reference profiles (the merged of all user profiles, used for compilation) are stored in /data/misc/profiles/ref/pkgname/. Add a method to get the shared app gid from an uid or appid. Bug: 26719109 Bug: 26563023 Change-Id: I89601d7dbeb3041df882c141a9127dac200a645e
nit.rc
|
4409f1446caa4eb06122d60c96573503b73ea84b |
17-Feb-2016 |
Bill Yi <byi@google.com> |
Merge commit '4352ee87fd74b931d4b58192fb8974e91aa899d0' into HEAD
|
623b56af5da59fb57abcb2d984762669c82f57e9 |
08-Feb-2016 |
Martijn Coenen <maco@google.com> |
Fix libprocessgroup SELinux denials. libprocessgroup checks whether it can use memory cgroups for keeping track of forked processes by seeing whether /dev/memcg/apps is writable. However, on systems with memory cgroups disabled, SELinux (correctly) no longer classifies this directory as a cgroup, and starts denying zygote access. To fix this, first check whether /dev/memcg/apps/tasks exists to see if the cgroup is mounted; only then check whether we can write to the directory. Bug: 27046965 Change-Id: I6e44cd62d8c396e20ceb162c50606b3e86f2cb3e
nit.rc
|
c457610e786f20b673796e2e875eb86df454c4f3 |
07-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
Follow migration of Shell app to DE storage. The Shell app that stores bugreports now lives under DE storage for all devices, both FBE and non-FBE. Bug: 26668510 Change-Id: Iead1dcb98181a5caccf4d0c1e86de62abc6dc990
nit.rc
|
c895f11cf1c08ffc03234bc0a5c6b2cebda15ae3 |
05-Feb-2016 |
Jeff Sharkey <jsharkey@google.com> |
Merge "User 0 directories are created by vold now."
|
a2eba56f983a1dcc8d2a55bb8fd635045a0adcc5 |
05-Feb-2016 |
Mark Salyzyn <salyzyn@google.com> |
Merge "init-debug.rc: add runtime mmc max speed property actors" am: 20a6f0ff3b am: c883cdec82 * commit 'c883cdec825e021007672d3ce9b199589ed2cba6': init-debug.rc: add runtime mmc max speed property actors
|
c883cdec825e021007672d3ce9b199589ed2cba6 |
05-Feb-2016 |
Mark Salyzyn <salyzyn@google.com> |
Merge "init-debug.rc: add runtime mmc max speed property actors" am: 20a6f0ff3b * commit '20a6f0ff3bf21e2bc82ebfe06357f6225c991ee9': init-debug.rc: add runtime mmc max speed property actors
|
3b9c83a0f69778253f82730404363b5f5f795eb2 |
03-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
User 0 directories are created by vold now. This ensures that all users on device follow a consistent path for setup and validation of encryption policy. Also add remaining user-specific directories and fix linking order. Bug: 25796509 Change-Id: I8c2e42a78569817f7f5ea03f54b743a6661fdb9c
nit.rc
|
7864e3675161ace4d6e54f32a822a90d2e1960f0 |
28-Jan-2016 |
Mark Salyzyn <salyzyn@google.com> |
init-debug.rc: add runtime mmc max speed property actors persist.mmc.max_read_speed - KB/s speed cap persist.mmc.max_write_speed - KB/s speed cap persist.mmc.cache_size - MB of high-speed on-device write cache device default directly to associated /sys/block/mmcblk0/ attributes, not delivered on "user" builds. Bug: 26976972 Change-Id: Ic82b9614489b6406ce830d127c85affc9095e256
ndroid.mk
nit-debug.rc
|
95c220e6b7aad1f589be3b65c6232560b18f1dca |
03-Feb-2016 |
Mark Salyzyn <salyzyn@google.com> |
Merge "init.rc: too many start logd" am: 989daeaf5b am: d8e0e52099 * commit 'd8e0e520998e83ae16fcff317704bb6c00b7fb31': init.rc: too many start logd
|
d8e0e520998e83ae16fcff317704bb6c00b7fb31 |
03-Feb-2016 |
Mark Salyzyn <salyzyn@google.com> |
Merge "init.rc: too many start logd" am: 989daeaf5b * commit '989daeaf5b2f50d96da69ad476adf434522e35e7': init.rc: too many start logd
|
fcad79fe10ab73b8a0bdedc4f5d30838c52cb44b |
03-Feb-2016 |
Andreas Gampe <agampe@google.com> |
Merge "Init: add OTA directory"
|
0604f6fbae9bf963b55c5d8f5b5730e9583f05e3 |
03-Feb-2016 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: too many start logd Bug: 26934873 Change-Id: Ia00da6253a50bedc8ba825df1cf641b86cdebeed
nit.rc
|
1ee7abd066e3e5161f3ec53ab9c0c9d7b1389ede |
02-Feb-2016 |
Elliott Hughes <enh@google.com> |
Merge "Start debuggerd as soon as logd is up." am: 1b729b3e04 am: 1ef5b78a2f * commit '1ef5b78a2ffc471e5ac2e30b424f00d15d581a8c': Start debuggerd as soon as logd is up.
|
1ef5b78a2ffc471e5ac2e30b424f00d15d581a8c |
02-Feb-2016 |
Elliott Hughes <enh@google.com> |
Merge "Start debuggerd as soon as logd is up." am: 1b729b3e04 * commit '1b729b3e04b210d096ee2d447945f6b2c53b6029': Start debuggerd as soon as logd is up.
|
2f74a5dae5ec456844bcc95dee1cf264bba4e084 |
02-Feb-2016 |
Elliott Hughes <enh@google.com> |
Start debuggerd as soon as logd is up. Makes debugging early boot crashes easier. Bug: http://b/26918597 Change-Id: I5bb883f1350ea5f7a545cb0e9f1034ecfcf47cdb
nit.rc
|
2f076739576ca7ca2d13fac77bf80af3add584e6 |
02-Feb-2016 |
Martijn Coenen <maco@google.com> |
Merge "Reuse mem cgroups for tracking forked PIDs."
|
88185f9ee8e15afdf69ca9374ff2608ab81a59ba |
02-Feb-2016 |
Tim Murray <timmurray@google.com> |
Merge "Enable top-app cpuset support."
|
6647bb51301ea101b73e7431888f70bb35a4fabb |
12-Jan-2016 |
Tim Murray <timmurray@google.com> |
Enable top-app cpuset support. Allows ActivityManager to use the top-app cpuset to grant the currently focused app exclusive access to a CPU core. Change-Id: I45bca5170477e413dec6e5889338399d0859706c
nit.rc
|
7026d48d84b4bf536e52853a3438b0a1dce490a7 |
01-Feb-2016 |
Greg Hackmann <ghackmann@google.com> |
Merge "init.rc: add missing /dev/fd symlink" am: 54bf0718f4 am: ef605cb749 * commit 'ef605cb7495cec368f7be015f924479969dd8fc2': init.rc: add missing /dev/fd symlink
|
ef605cb7495cec368f7be015f924479969dd8fc2 |
01-Feb-2016 |
Greg Hackmann <ghackmann@google.com> |
Merge "init.rc: add missing /dev/fd symlink" am: 54bf0718f4 * commit '54bf0718f4eb1b170f55bbd07207cd6ad2e7e0f5': init.rc: add missing /dev/fd symlink
|
b82bab66f318896ebad80c1feee2347c58e3ce37 |
21-Jan-2016 |
Martijn Coenen <maco@google.com> |
Reuse mem cgroups for tracking forked PIDs. It turns out we were using the CPU accounting cgroups for keeping track of processes that were forked by an app without the framework's knowledge, so we could kill all of them reliably (see b/15313911 for context). Since we want to use memory cgroups for other purposes, we might as well use memory cgroups for tracking forked PIDs if they're enabled. This also gets us automatic cleanup of empty mem cgroups. Also, removed old mem cgroup mount point that is no longer used, as well as cgroup release agent code that we're not using. Change-Id: I69d5cc31c162ffa49ef6945755f41381e306cc8b
nit.rc
|
40a96e4ba07d1b1b79115eaa2727000f72707381 |
01-Feb-2016 |
Greg Hackmann <ghackmann@google.com> |
init.rc: add missing /dev/fd symlink The Linux kernel implicitly expects /dev/fd to symlink to /proc/self/fd. This change fixes the exec/execveat.c kernel selftest. Change-Id: Ia08d50023336fdbfc098527299c326d9d59039a9 Signed-off-by: Greg Hackmann <ghackmann@google.com>
nit.rc
|
5949745534e11a877ec839931af76c569f78e058 |
01-Feb-2016 |
Paul Crowley <paulcrowley@google.com> |
On FDE devices, initialize user 0 Fix ugly special cases for user 0: initialize them explicitly. Bug: 26704408 Change-Id: I1b8536b9e5e87ea98b4009a309f2e22c56006651
nit.rc
|
63c463fe2873b1f68c73b427a396eae463bba648 |
29-Jan-2016 |
Christopher Tate <ctate@google.com> |
Have init set up the backup stage dir on /cache Bug 26834865 Change-Id: Idc63c1706f68d42b2a9cee05997c63a9bbcb0fb9
nit.rc
|
7dfcc92beeda542b0148c71490cac29007cce38f |
08-Dec-2015 |
Andreas Gampe <agampe@google.com> |
Init: add OTA directory Add /data/ota in init so that the right selinux labels are applied. Bug: 25612095 Change-Id: I8fd093147f8e0a5c3bd1a4007a61b0b759911cf2
nit.rc
|
113f88e36546ced277205e08283dc9010b051d1f |
28-Jan-2016 |
Chien-Yu Chen <cychen@google.com> |
Merge "Restart cameraserver"
|
89a31c4499013119807d13242d87333ee108d7a0 |
27-Jan-2016 |
Kevin Cernekee <cernekee@google.com> |
Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes" am: fa432b0e2f am: 54b47105ae * commit '54b47105aea0e93ee287f76d4a4dc6bfe6ddf698': ueventd.rc: Document the different rule formats for /dev and /sys nodes
|
54b47105aea0e93ee287f76d4a4dc6bfe6ddf698 |
27-Jan-2016 |
Kevin Cernekee <cernekee@google.com> |
Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes" am: fa432b0e2f * commit 'fa432b0e2f87e9a029ac0094e5bceaaff258368a': ueventd.rc: Document the different rule formats for /dev and /sys nodes
|
fa432b0e2f87e9a029ac0094e5bceaaff258368a |
27-Jan-2016 |
Kevin Cernekee <cernekee@google.com> |
Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes"
|
cd2ef4ef1cc91997c305925af7e24318cc00913a |
04-Dec-2015 |
Chien-Yu Chen <cychen@google.com> |
Restart cameraserver Bug: 24511454 Change-Id: Ia27f4ef0eb71f891c789f637a21b04afe0b1c4e9
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
1293fed9a3371ad2096785e1af99ddd66c7a8344 |
25-Jan-2016 |
Tim Murray <timmurray@google.com> |
Merge "Improve cpuset support for surfaceflinger."
|
b797e78f8bfa5d8b5ea36f4dbe102ce30dff16a4 |
23-Jan-2016 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: mix device-specific data into the Linux RNG" am: e04b60d2b9 am: 9deaf7c8a6 * commit '9deaf7c8a6eca900e1e50cccc1aeef17d04d70e2': init.rc: mix device-specific data into the Linux RNG
|
9deaf7c8a6eca900e1e50cccc1aeef17d04d70e2 |
23-Jan-2016 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: mix device-specific data into the Linux RNG" am: e04b60d2b9 * commit 'e04b60d2b9bf0e6560e3cde6f671f294b796fcdb': init.rc: mix device-specific data into the Linux RNG
|
27cb41035264e5ff299a5784dc6ca60e791347d2 |
23-Jan-2016 |
Nick Kralevich <nnk@google.com> |
init.rc: mix device-specific data into the Linux RNG Mix the contents of /proc/cmdline and /default.prop into /dev/urandom. /proc/cmdline often contains androidboot.serialno, a device-specific unique identifier. Similarly, /default.prop contains the build fingerprint and timestamp, which vary between device families. Change-Id: I8803b38c7089b2a1217b99a7c1808b29a3b138cf
nit.rc
|
4284f9f3a3d471208d7a9341056e4d7af886dab3 |
10-Nov-2015 |
Tim Murray <timmurray@google.com> |
Improve cpuset support for surfaceflinger. SurfaceFlinger needs some of its threads in the system-background cpuset and some of its threads (the binder pool) outside of the system-background cpuset in order to improve UI perf/power consumption. Remove surfaceflinger from the system-background cpuset in init.rc and allow a thread to place itself in the system-background cpuset given enough permissions. bug 25745866 Change-Id: I85f7e41c5439e6ad7cc2d355e51f5dfb3a0c7088
nit.rc
|
558d8f4364c87e7ba34ef4c127654cdd9e049072 |
20-Jan-2016 |
Paul Crowley <paulcrowley@google.com> |
Remove no-longer-needed crypto init builtins Changes to the way FBE works to support lifecycles mean that these commands aren't needed any more. Bug: 22358539 Change-Id: Id73339e0aa8070dd688f35b5d59de75236961395
nit.rc
|
d78b55fba2c2deeb145354fc6c6ae89e51967f44 |
13-Jan-2016 |
Jeff Sharkey <jsharkey@android.com> |
Move some directory creation out of installd. Core system directories should be created here in init.rc instead of making installd do the creation. Bug: 26466827 Change-Id: I313a332e74699641872c41fce5a7ca35bfce8f82
nit.rc
|
e8b97fc0b0eec1c98053cfa51db6b450657ef876 |
08-Jan-2016 |
Elliott Hughes <enh@google.com> |
Merge "init.rc: Reland "mkdir /data/misc/vold"" am: 19616ce100 * commit '19616ce100771d0f570bc9cf19d08fbbe8feec0f': init.rc: Reland "mkdir /data/misc/vold"
|
c1149ff0c33f0a7100428402cc934296d7170e42 |
08-Jan-2016 |
Yu Ning <yu.ning@intel.com> |
init.rc: Reland "mkdir /data/misc/vold" Creation of /data/misc/vold was first introduced by commit 25775e8. It then got reverted, probably inadvertently, by: commit 2e24bcfdce030d410cbc8e8c8fa3e8c1260ba65d Author: Paul Lawrence <paullawrence@google.com> Date: Fri May 22 18:31:55 2015 +0000 Revert "Set up crypto for user directories in init." This folder is required by vold. In its absence, if one tries to format an SD card as internal storage, an error will occur, with the following message printed to logcat: 01-08 06:31:48.389 1002 1069 E vold : Failed to persist key Restoring /data/misc/vold fixes this bug. This fix has been verified on the emulator, which currently does not allow its virtual SD card to be adopted, but another CL will be uploaded to enable that. Change-Id: Ibb87ee821630a038a6f9b7b6a9da50fe03ca690d Signed-off-by: Yu Ning <yu.ning@intel.com>
nit.rc
|
7705e0384eb38b5a15168136cbeb5e9c3672011e |
29-Dec-2015 |
Pavlin Radoslavov <pavlin@google.com> |
Merge "Use GID "wakelock" to control access to kernel wakelock" am: 0f0498ad50 * commit '0f0498ad508e6747dc7b72a6e63de2f2befa2e1c': Use GID "wakelock" to control access to kernel wakelock
|
17d80c84e1ec6fc803f7b30df4e7f436a72e79d4 |
24-Nov-2015 |
Pavlin Radoslavov <pavlin@google.com> |
Use GID "wakelock" to control access to kernel wakelock * Added new kernel GID named "wakelock" (AID_WAKELOCK = 3010) * Changed the group access for /sys/power/wake_lock and /sys/power/wake_unlock from "system" to "wakelock" * Added "wakelock" to the list of groups for the healthd process/service Bug: 25864142 Change-Id: Ieabee9964cccec3107971a361a43aa9805164aa9
nit.rc
|
0eca10751270462c865de16e5aa2443cee92b9b9 |
24-Nov-2015 |
Pavlin Radoslavov <pavlin@google.com> |
Use GID "wakelock" to control access to kernel wakelock * Added new kernel GID named "wakelock" (AID_WAKELOCK = 3010) * Changed the group access for /sys/power/wake_lock and /sys/power/wake_unlock from "system" to "wakelock" * Added "wakelock" to the list of groups for the healthd process/service Bug: 25864142 Change-Id: Ieabee9964cccec3107971a361a43aa9805164aa9
nit.rc
|
1a9c4531c7ae4a6538443a5f7b7f272b42bce1ee |
14-Dec-2015 |
Felipe Leme <felipeal@google.com> |
Moved 'bugreportplus' from init.rc to dumpstate.rc BUG: 26034608 Change-Id: Id6923cff0b2b3bd9d2ec9320ebcdb3fbead8df83
nit.rc
|
c7ae5210a7f558835f167d9788f8ecf60a5d25f5 |
11-Dec-2015 |
Andy Hung <hunga@google.com> |
Merge "Add audioserver uid and restart service when needed"
|
db8548442304f103e3bc70d34e86e99c2acde15c |
11-Dec-2015 |
Daichi Hirono <hirono@google.com> |
Merge "Add /mnt/appfuse mount point to init.rc."
|
7abc71ecd3d9f0ac4a88dedaaf6be952a7b7c909 |
11-Dec-2015 |
Daichi Hirono <hirono@google.com> |
Add /mnt/appfuse mount point to init.rc. BUG=25755834 Change-Id: I00b1185aec7a95baa6ef2f345a49761f3d006c4d
nit.rc
|
c5733cfadbf98c8b6a1b280306cb9abac162f26c |
09-Dec-2015 |
Paul Lawrence <paullawrence@google.com> |
Add createuserkey Needed so we can make the user0 key on first boot Change-Id: I4699dbf2efdec44bb09bc4cfa7eeb59e56cb93ab
nit.rc
|
27ca1eb2940f3be640afe4ffd89a5d8cf852b578 |
09-Dec-2015 |
Tao Bao <tbao@google.com> |
Merge "rootdir: Execute update_verifier for A/B update." am: df13f60ce0 am: 8ca8664956 * commit '8ca8664956bf4bce783d9b84a9f0fd0ff8a9c11f': rootdir: Execute update_verifier for A/B update.
|
8ca8664956bf4bce783d9b84a9f0fd0ff8a9c11f |
09-Dec-2015 |
Tao Bao <tbao@google.com> |
Merge "rootdir: Execute update_verifier for A/B update." am: df13f60ce0 * commit 'df13f60ce0152bc9a38e18fcb9c7c839d8eba5e3': rootdir: Execute update_verifier for A/B update.
|
df13f60ce0152bc9a38e18fcb9c7c839d8eba5e3 |
09-Dec-2015 |
Tao Bao <tbao@google.com> |
Merge "rootdir: Execute update_verifier for A/B update."
|
c94d92f5ad92444ada64b519cd8e6e64ff9f2be6 |
08-Dec-2015 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: restorecon_recursive /sys/kernel/debug" am: 6d85c06aa1 am: 070288241d am: baaeddfa23 * commit 'baaeddfa239625a9d54091c628242d84a9191514': init.rc: restorecon_recursive /sys/kernel/debug
|
baaeddfa239625a9d54091c628242d84a9191514 |
08-Dec-2015 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: restorecon_recursive /sys/kernel/debug" am: 6d85c06aa1 am: 070288241d * commit '070288241d5c3d1a169e21ba4439a5943ce476d8': init.rc: restorecon_recursive /sys/kernel/debug
|
070288241d5c3d1a169e21ba4439a5943ce476d8 |
08-Dec-2015 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: restorecon_recursive /sys/kernel/debug" am: 6d85c06aa1 * commit '6d85c06aa1600e905cf3e0b093e939fa3866ee59': init.rc: restorecon_recursive /sys/kernel/debug
|
715c4dc3f9972f312d2c072dd9e47d1408ee6f55 |
08-Dec-2015 |
Nick Kralevich <nnk@google.com> |
init.rc: restorecon_recursive /sys/kernel/debug If /sys/kernel/debug is present, make sure it has all the appropriate SELinux labels. Labeling of /sys/kernel/debug depends on kernel support added in commit https://android-review.googlesource.com/122130 This patch depends on an external/sepolicy change with the same Change-Id as this patch. Change-Id: Id1d6a9ad6d0759d6de839458890e8cb24685db6d
nit.rc
|
97df3956834f00dd084773f1b544f8541584ff32 |
05-Dec-2015 |
Tao Bao <tbao@google.com> |
rootdir: Execute update_verifier for A/B update. update_verifier verifies the updated partitions and marks the current slot as having booted successfully. It needs to be triggered prior to the start of the framework, otherwise it won't be able to fall back to the old system without a data wipe. Bug: 26039641 Change-Id: I6fd183cdd3dfcc72feff2a896368158875b28591
nit.rc
|
088113f419a50f360efa66efd9d88df849576e45 |
07-Dec-2015 |
Todd Kennedy <toddke@google.com> |
Merge "Create new ephemeral app directory"
|
171b5d8be3f940793f910e1002aa944760fe187f |
04-Dec-2015 |
Felipe Leme <felipeal@google.com> |
Created service 'bugreportplus' This service is an enhanced version of bugreport that provides a better user interface (like displaying progress and allowing user to enter details). It will be typically triggered by the 'Take Bug Report' UI, which will now offer the option for the traditional or enhanced options (services 'bugreport' and 'bugreportplus' respectively). BUG: 26034608 Change-Id: I39ea92c3e329a801b51f60a558c73faaf890c068
nit.rc
|
a5954de3bb61bee797024bbef1a795cd071c90e3 |
30-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
Create credential-encrypted system dir for owner. Other user directories are created correctly, but owner is still special cased. Bug: 22358539 Change-Id: I2bbd3023cdbcbb5315ebc32ba54dc3ddb9a280d6
nit.rc
|
0a2733582d85f52b4901e3e7cc5fefea56ec93fc |
24-Nov-2015 |
Todd Kennedy <toddke@google.com> |
Create new ephemeral app directory Bug: 25119046 Change-Id: Ie005430700a73ef1ba492dae4101419a41da4071
nit.rc
|
af1e35e07b986fb8f0f8c5324e10fa06eb0c8a06 |
18-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
Create user_de directory for user 0. This mirrors what we do for "/data/data" for user 0. Eventually we should move to vold/installd doing the user 0 initialization. Bug: 22358539 Change-Id: I48cd27b990e6bd6e37870c41aef0e7dc3106caa4
nit.rc
|
5c331c5be821fe5c900cee56a842a3a8b4a12315 |
18-Nov-2015 |
Daniel Rosenberg <drosen@google.com> |
Remove creation of root directory folders am: c97e1cb39d * commit 'c97e1cb39d9ba129d8326605d121a10c9ae491e7': Remove creation of root directory folders
|
13c8e8d8ace6b3e697bade2850608b4d75600b76 |
18-Nov-2015 |
Junichi Uekawa <uekawa@google.com> |
Merge "Fix non-vendor.img configuration." am: 1337349ea1 am: ef7197eefa am: 1aa74e687e * commit '1aa74e687ecdd2bef8fb786d8027512b6953b6ad': Fix non-vendor.img configuration.
|
88b5892d74978df60585ce59dd283d188fecdafa |
18-Nov-2015 |
Todd Kjos <tkjos@google.com> |
resolve merge conflicts of ed60788968 to mnc-dr2-dev-plus-aosp. Change-Id: I9b07dd8dcb8fc74b658466b8dd47546cefffab1d
|
6426874cdda284d46d9d6785627018b66b5e8407 |
18-Nov-2015 |
Calin Juravle <calin@google.com> |
Merge "Don\'t create profiles directory under dalvik-cache." am: 942f8ea84f am: 2a095e186b am: cdef6fb917 * commit 'cdef6fb91725f771ab23d0eea03a97aa3c161d75': Don't create profiles directory under dalvik-cache.
|
ef7197eefa2d000b0e446cf1fb223a55746ae2c3 |
17-Nov-2015 |
Junichi Uekawa <uekawa@google.com> |
Merge "Fix non-vendor.img configuration." am: 1337349ea1 * commit '1337349ea11a6bb5c44ba5c5bb064c750bd626c5': Fix non-vendor.img configuration.
|
07b69961f2291f002f15cc4168726ba1e306914c |
11-Nov-2015 |
Junichi Uekawa <uekawa@google.com> |
Fix non-vendor.img configuration. If / is not write-able and system.img contains system/vendor, symlink for `/vendor/ -> /system/vendor/` that is otherwise done in init.rc should be done at build time. BUG=b:25512724 Change-Id: Iaa63d6440373a4fd754a933c9f1960b3787a6d98
ndroid.mk
|
d792c986063ca0f6207cfb20da18157e657b8270 |
17-Nov-2015 |
Daniel Rosenberg <drosen@google.com> |
Remove creation of root directory folders am: c97e1cb39d * commit 'c97e1cb39d9ba129d8326605d121a10c9ae491e7': Remove creation of root directory folders
|
ba8a47531c5ebc5e1322088354d2114f6892f3fd |
27-Oct-2015 |
Todd Kjos <tkjos@google.com> |
Actively mangage EAS schedtune nodes Move foreground tasks to /sys/fs/cgroup/stune/boost/tasks (boosted weight in EAS scheduler). Move background tasks to /sys/fs/cgroup/stune/tasks (default weight). For services started with init, set "foreground" services to boosted. Change-Id: I0e489fad9510727c13e6754dabaf311c2391f395
nit.rc
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
c97e1cb39d9ba129d8326605d121a10c9ae491e7 |
09-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
Remove creation of root directory folders Folders in the root directory are now created during the build, as we may be building without a ramdisk, and when we do that, the root directory will be read-only. With those changes, these mkdirs will never need to run. Change-Id: I49c63e8bfc71d28e3f938ed41f81d108359fa57a
nit.rc
|
ed60788968be61f4f6f47890e5f3cb182a6a2b6e |
27-Oct-2015 |
Todd Kjos <tkjos@google.com> |
Actively mangage EAS schedtune nodes Move foreground tasks to /sys/fs/cgroup/stune/boost/tasks (boosted weight in EAS scheduler). Move background tasks to /sys/fs/cgroup/stune/tasks (default weight). For services started with init, set "foreground" services to boosted. Change-Id: I0e489fad9510727c13e6754dabaf311c2391f395
nit.rc
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
4c9c516d2088fe1ef9a35f704dff7e16f84d3d23 |
15-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
rootdir: Create cache folder in Android.mk system.img may contain the root directory as well. In that case, we need to create some folders init.rc would during the build. Change-Id: I312104ff926fb08d98ac8256b76d01b0a90ea5e5
ndroid.mk
|
9262546184e97249cdbea5239d83ce2a60965e74 |
06-Jun-2015 |
Daniel Rosenberg <drosen@google.com> |
rootdir: Create folders in Android.mk system.img may contain the root directory as well. In that case, we need to create some folders init.rc would during the build. Change-Id: I157ccbebf36bee9916f3f584551704ec481ae1d1
ndroid.mk
|
2a095e186b2ff28d3c5a2e5f20f3cf61cc1942f0 |
16-Nov-2015 |
Calin Juravle <calin@google.com> |
Merge "Don\'t create profiles directory under dalvik-cache." am: 942f8ea84f * commit '942f8ea84f3f96c2e2556fe90ebba0ec76730553': Don't create profiles directory under dalvik-cache.
|
942f8ea84f3f96c2e2556fe90ebba0ec76730553 |
16-Nov-2015 |
Calin Juravle <calin@google.com> |
Merge "Don't create profiles directory under dalvik-cache."
|
439419b713736c1280386253945a599bd6d6bac4 |
12-Nov-2015 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Create some new encryption paths."
|
8e9791357e8c59c35ffc12742e816e9b98cc875d |
11-Nov-2015 |
Calin Juravle <calin@google.com> |
Merge "Create a folder to store method traces activated with -Xmethod-trace" am: 7605a56fbc am: 5d1a9688b8 am: a8dcfc0622 * commit 'a8dcfc062260bdce7ca471baa5f081e512d5da7f': Create a folder to store method traces activated with -Xmethod-trace
|
5d1a9688b8623c12a00b76e2256f5b418aa1dace |
11-Nov-2015 |
Calin Juravle <calin@google.com> |
Merge "Create a folder to store method traces activated with -Xmethod-trace" am: 7605a56fbc * commit '7605a56fbcf5706b6e2892da9d9dc0fd20efb395': Create a folder to store method traces activated with -Xmethod-trace
|
11705863ffe2fe6b2bee0720aa37e4b014035eb9 |
10-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
Create some new encryption paths. Bug: 22358539 Change-Id: I2e7533cd3dbd18e9ae115f611c5714b0c7ba4917
nit.rc
|
9b3e5d59feaa1c6863ba74a764293295e52c9e34 |
10-Nov-2015 |
Calin Juravle <calin@google.com> |
Create a folder to store method traces activated with -Xmethod-trace Bug: 25612377 Change-Id: I370b858594ccc88c12099b23a0d1aac22acd4969
nit.rc
|
bdf20142b93999acf59c8e488972ede62ce3a39b |
09-Nov-2015 |
Nick Kralevich <nnk@google.com> |
Merge "Enable hidepid=2 on /proc" am: 2d8f1d4c47 am: ea8452cc72 am: 7dafe5b818 * commit '7dafe5b818f7771cb00c4a0ea3ab1dbf74593185': Enable hidepid=2 on /proc
|
ea8452cc720cfcf2d8d1f469bbaafec968202e99 |
09-Nov-2015 |
Nick Kralevich <nnk@google.com> |
Merge "Enable hidepid=2 on /proc" am: 2d8f1d4c47 * commit '2d8f1d4c478b9d921730d3fc9b290315e2ff9f04': Enable hidepid=2 on /proc
|
c39ba5ae32afb6329d42e61d2941d87ff66d92e3 |
08-Nov-2015 |
Nick Kralevich <nnk@google.com> |
Enable hidepid=2 on /proc Add the following mount options to the /proc filesystem: hidepid=2,gid=3009 This change blocks /proc access unless you're in group 3009 (aka AID_READPROC). Please see https://github.com/torvalds/linux/blob/master/Documentation/filesystems/proc.txt for documentation on the hidepid option. hidepid=2 is preferred over hidepid=1 since it leaks less information and doesn't generate SELinux ptrace denials when trying to access /proc without being in the proper group. Add AID_READPROC to processes which need to access /proc entries for other UIDs. Bug: 23310674 Change-Id: I22bb55ff7b80ff722945e224845215196f09dafa
nit.rc
|
933bc0a3d12e24cc2845507dd70d7c5d1cbe28c5 |
04-Nov-2015 |
Calin Juravle <calin@google.com> |
Don't create profiles directory under dalvik-cache. Bug: 24698874 Bug: 17173268 Change-Id: Ic81258a8df90818fa6b4ee64fd1507ac18fe3f04
nit.rc
|
1ec36aaeb02a97a287eb0467b9b2fc9eea38a15c |
03-Nov-2015 |
Bill Yi <byi@google.com> |
Merge commit 'f85d6cd8045ce933dfdc19bc888228cd9382e48c' into HEAD
|
eba626f56d129075138d72c1846fa930908980cb |
03-Nov-2015 |
Daniel Rosenberg <drosen@google.com> |
Merge "rootdir: Allow board specific folders and symlinks in root directory" am: 6e699df21e am: 64ea814c31 am: 1c1a7906c5 * commit '1c1a7906c5f1131fb1295c54e0669ea76111ff90': rootdir: Allow board specific folders and symlinks in root directory
|
1c1a7906c5f1131fb1295c54e0669ea76111ff90 |
02-Nov-2015 |
Daniel Rosenberg <drosen@google.com> |
Merge "rootdir: Allow board specific folders and symlinks in root directory" am: 6e699df21e am: 64ea814c31 * commit '64ea814c312ec43c59e9f132909be121cdf02ab3': rootdir: Allow board specific folders and symlinks in root directory
|
64ea814c312ec43c59e9f132909be121cdf02ab3 |
02-Nov-2015 |
Daniel Rosenberg <drosen@google.com> |
Merge "rootdir: Allow board specific folders and symlinks in root directory" am: 6e699df21e * commit '6e699df21e1b08aa2e9eb18ef1c44788549ae8ed': rootdir: Allow board specific folders and symlinks in root directory
|
52b59159458a574e11f03940840d63feeb648883 |
28-Oct-2015 |
Daniel Rosenberg <drosen@google.com> |
rootdir: Allow board specific folders and symlinks in root directory Building without ramdisk requires a way to specify board specific directoryies and symlinks in the root directory at build time. Change-Id: I11301e98228bc4761f3aee177a546146651b9f25 (cherry picked from commit d7549c9a65cad886f672af41f5fca6f0bd0c12fa)
ndroid.mk
|
fec47527b4e8499bcdf9d0501980d929cd414745 |
30-Oct-2015 |
Andy Hung <hunga@google.com> |
Add audioserver uid and restart service when needed Bug: 24511453 Change-Id: I6987a82149d23ad671478cf21488c62cb1ecfc93
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
f2630adeef9b690e1ec2fad99f76c5856c406b36 |
24-Oct-2015 |
Evgenii Stepanov <eugenis@google.com> |
Merge "Disable container overflow detect on target." am: 151e49726b am: 5562351b50 am: ec6ff936b0 * commit 'ec6ff936b0e994b3f6d2b812e4b67aa950fe35f2': Disable container overflow detect on target.
|
ec6ff936b0e994b3f6d2b812e4b67aa950fe35f2 |
24-Oct-2015 |
Evgenii Stepanov <eugenis@google.com> |
Merge "Disable container overflow detect on target." am: 151e49726b am: 5562351b50 * commit '5562351b50fbbcda030ddfffcb3b2dbef82bcdc9': Disable container overflow detect on target.
|
5562351b50fbbcda030ddfffcb3b2dbef82bcdc9 |
24-Oct-2015 |
Evgenii Stepanov <eugenis@google.com> |
Merge "Disable container overflow detect on target." am: 151e49726b * commit '151e49726bf743bfbd7e44695f9d673735e62119': Disable container overflow detect on target.
|
151e49726bf743bfbd7e44695f9d673735e62119 |
24-Oct-2015 |
Evgenii Stepanov <eugenis@google.com> |
Merge "Disable container overflow detect on target."
|
f3009f21d5e7600d6e7ecede7e27cbd9b446d5d5 |
23-Oct-2015 |
Evgenii Stepanov <eugenis@google.com> |
Disable container overflow detect on target. Container overflow annotations may cause false positives in partially instrumented binaries. Bug: 25228125, 25212198 Change-Id: Ic587d41698c02e306dece4ad7c6a2a8810c52dbd
san.options
|
e41937d9b31fa1c7c627428d131361ae077bce6c |
21-Oct-2015 |
Tim Murray <timmurray@google.com> |
Reorder init.rc to avoid a kernel warning. am: f429d37807 am: e56b566401 am: 538697b315 * commit '538697b3153a9a71bdfd197d0461a74d29fd2fae': Reorder init.rc to avoid a kernel warning.
|
2b216aa89b76dbadb315322e4fd31aa37059b262 |
21-Oct-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge "Don't show UI on default encryption" into mnc-dr-dev
|
538697b3153a9a71bdfd197d0461a74d29fd2fae |
21-Oct-2015 |
Tim Murray <timmurray@google.com> |
Reorder init.rc to avoid a kernel warning. am: f429d37807 am: e56b566401 * commit 'e56b566401aad8e7175306b2969f78baa0b8f9c6': Reorder init.rc to avoid a kernel warning.
|
f429d37807a005c1de38a7616669bf1834d45432 |
15-Oct-2015 |
Tim Murray <timmurray@google.com> |
Reorder init.rc to avoid a kernel warning. 3.18 has a warning in dmesg that appears when the parent cpuset's cpus and mems are changed to something other than what the child has. Reorder init.rc to prevent this warning from appearing. bug 24941443 Change-Id: I49d8394063b23dce03222dcc9ddccdc32bb97ea2
nit.rc
|
09cf06fc74a814176852abb587f1a6aa6b152fc8 |
10-Oct-2015 |
Nick Kralevich <nnk@google.com> |
am 2f63adce: am 28107143: am 9e27cab6: Merge "init.rc: Disable sysrq from the keyboard" * commit '2f63adcea8e4e4a64d85b59044224f198016e093': init.rc: Disable sysrq from the keyboard
|
281071435a00e8f8d9cd91f3a12f31e7c64ac878 |
10-Oct-2015 |
Nick Kralevich <nnk@google.com> |
am 9e27cab6: Merge "init.rc: Disable sysrq from the keyboard" * commit '9e27cab695b0e2a4910cf576d306a3379991f1f7': init.rc: Disable sysrq from the keyboard
|
d28a535d9aa5a30deb682cd02b18c9bbd772c44f |
10-Oct-2015 |
Nick Kralevich <nnk@google.com> |
init.rc: Disable sysrq from the keyboard Don't allow the accidental triggering of sysrq functionality from the keyboard. The only expected use of sysrq functionality is via /proc/sysrq-trigger Please see https://www.kernel.org/doc/Documentation/sysrq.txt for additional information on /proc/sys/kernel/sysrq Bug: 13435961 Change-Id: I60dc92a4b2b4706e8fa34a6cead9abd449f7375f
nit.rc
|
8e15f8d0964551e48235572d99cf7356a6bf3c1d |
07-Oct-2015 |
David Zeuthen <zeuthen@google.com> |
am 8c06f8cc: am 10bb4e51: Merge "init.rc: mkdir /data/misc/update_engine 0700 root root" * commit '8c06f8ccd41c5d1206d721b4f19dd6b5ede9ad9e': init.rc: mkdir /data/misc/update_engine 0700 root root
|
8c06f8ccd41c5d1206d721b4f19dd6b5ede9ad9e |
07-Oct-2015 |
David Zeuthen <zeuthen@google.com> |
am 10bb4e51: Merge "init.rc: mkdir /data/misc/update_engine 0700 root root" * commit '10bb4e5161ecca1a9660d1e5967b3fb5e7662839': init.rc: mkdir /data/misc/update_engine 0700 root root
|
10bb4e5161ecca1a9660d1e5967b3fb5e7662839 |
07-Oct-2015 |
David Zeuthen <zeuthen@google.com> |
Merge "init.rc: mkdir /data/misc/update_engine 0700 root root"
|
159147853efb9b2ea81824e4940b815821f76656 |
07-Oct-2015 |
David Zeuthen <zeuthen@google.com> |
init.rc: mkdir /data/misc/update_engine 0700 root root Ensure that /data/misc/update_engine exists since it will be referenced by selinux policy. Bug: 23186405 Change-Id: I96e4ff341086da6474ef7f7c934f1f35bffc1439
nit.rc
|
d80ddaabe12a22451f17730b584520ecd08f6de2 |
28-Sep-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 936d65f5: am cb2ab20d: am 87122ce1: Merge "logd: increase dgram_max_qlen to 600" * commit '936d65f59bbab071898390c8bd6982055be5ab4b': logd: increase dgram_max_qlen to 600
|
936d65f59bbab071898390c8bd6982055be5ab4b |
28-Sep-2015 |
Mark Salyzyn <salyzyn@google.com> |
am cb2ab20d: am 87122ce1: Merge "logd: increase dgram_max_qlen to 600" * commit 'cb2ab20d480cdf488e5b5bf37dc55ca7f0ddee67': logd: increase dgram_max_qlen to 600
|
cb2ab20d480cdf488e5b5bf37dc55ca7f0ddee67 |
28-Sep-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 87122ce1: Merge "logd: increase dgram_max_qlen to 600" * commit '87122ce1d60dd6fbc18e747d976db734d502f2bf': logd: increase dgram_max_qlen to 600
|
39944c89a9223ee646cd9263317b284149baa4f1 |
08-Sep-2015 |
Mark Salyzyn <salyzyn@google.com> |
logd: increase dgram_max_qlen to 600 Seeing liblog messages on system_server runtime restart (too much system_server spam, 566 messages in 72ms) Bug: 23788621 Change-Id: I5171f2c19a3538da190fc6c2b40e978d89bf0e20
nit.rc
|
3c6ffbc6fec456bd25a3dad85d45a444b807d020 |
21-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am 984bd832: resolved conflicts for 5caca3dd to mnc-dr-dev-plus-aosp * commit '984bd8323dcb5e494a04b2058ab7de40bf347ee5': add system-background cpuset
|
984bd8323dcb5e494a04b2058ab7de40bf347ee5 |
21-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
resolved conflicts for 5caca3dd to mnc-dr-dev-plus-aosp Change-Id: I773e514a8232b77cdd566dc36c9efc4e15f206f0
|
f09111a9dd118b9aac7ac09059fddf653f6b14dc |
20-Sep-2015 |
Evgenii Stepanov <eugenis@google.com> |
am fbaaddc5: am 19584247: am ee08fb53: Merge "asan: update condition to work with multiple SANITIZE_TARGET values." * commit 'fbaaddc588f9d716cff71225a5c510f3b33b90cf': asan: update condition to work with multiple SANITIZE_TARGET values.
|
fbaaddc588f9d716cff71225a5c510f3b33b90cf |
18-Sep-2015 |
Evgenii Stepanov <eugenis@google.com> |
am 19584247: am ee08fb53: Merge "asan: update condition to work with multiple SANITIZE_TARGET values." * commit '195842474a6722fdf2d967446b81d8accbd4648c': asan: update condition to work with multiple SANITIZE_TARGET values.
|
195842474a6722fdf2d967446b81d8accbd4648c |
18-Sep-2015 |
Evgenii Stepanov <eugenis@google.com> |
am ee08fb53: Merge "asan: update condition to work with multiple SANITIZE_TARGET values." * commit 'ee08fb53bb59cb5037755d68de09e6e5bc3f8bc6': asan: update condition to work with multiple SANITIZE_TARGET values.
|
cba6ad7449bf8027bf045c9a60ff0821e84f3726 |
18-Sep-2015 |
Tim Murray <timmurray@google.com> |
add system-background cpuset add a new cpuset for system services that should not run on larger cores bug 24144797 Change-Id: I21a54f0d6b46b3b8bd8c4564b8685c88cfc4a57d
nit.rc
|
5039d8cd2180e3ba3c8f320a616a1b84f499e0cf |
18-Sep-2015 |
Ivan Krasin <krasin@google.com> |
asan: update condition to work with multiple SANITIZE_TARGET values. The goal is to enable SANITIZE_TARGET='address coverage', which will be used by LLVMFuzzer. Bug: 22850550 Change-Id: Iea756eaaedaa56aee4daf714510269efe3aaa553
ndroid.mk
|
1450d6a37ae21674004134b70481075e09c84b8b |
10-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
am 4c96af5e: am c939c61c: am a6c377b2: init: usb: Add configfs commands for USB gadget * commit '4c96af5e5a67c123fb5d8b40fda87cc2398aec00': init: usb: Add configfs commands for USB gadget
|
4c96af5e5a67c123fb5d8b40fda87cc2398aec00 |
10-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
am c939c61c: am a6c377b2: init: usb: Add configfs commands for USB gadget * commit 'c939c61c71559271cbbd2c046e35e8a97b501b07': init: usb: Add configfs commands for USB gadget
|
751dfddc198b64409d035b8a80b526c0815432fb |
09-Sep-2015 |
Paul Lawrence <paullawrence@google.com> |
Don't show UI on default encryption Bug: 22989588 Change-Id: I8e7023767f1da80c872adc45871be1f8851926ad
nit.rc
|
a6c377b2f62175d6d5268c63885de3d882edbe2b |
03-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
init: usb: Add configfs commands for USB gadget Adds init support for: accessory audio_source midi adb rndis Bug=23633457 Change-Id: I12e68e25969adafcf3170769f91ae939d08b7dbc
nit.usb.configfs.rc
|
d22aaaac097b1e24bbdc21f9858b3a56b67f479d |
07-Sep-2015 |
Vincent Palatin <vpalatin@chromium.org> |
am 2a048110: am 100de590: am 5e294902: Merge "init.usb.rc: fix USB typec property names" into mnc-dr-dev * commit '2a0481109baaa8385bd9e43a95eac24cd6f89e43': init.usb.rc: fix USB typec property names
|
2a0481109baaa8385bd9e43a95eac24cd6f89e43 |
04-Sep-2015 |
Vincent Palatin <vpalatin@chromium.org> |
am 100de590: am 5e294902: Merge "init.usb.rc: fix USB typec property names" into mnc-dr-dev * commit '100de590e7f82e1039eebc10e60ea554deeb1c3f': init.usb.rc: fix USB typec property names
|
4c5d655e3d425ea0bb17d6e6675661e57e231be3 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am 4bc10de9: am cd1a65b6: am 30c13c49: Merge "move uncrypt from init.rc to uncrypt.rc" * commit '4bc10de99f3f84b89b40c46203cbc051224f931d': move uncrypt from init.rc to uncrypt.rc
|
fd53a3bf82fe0b4d0d2b53e5d8bdf020e5fb3c9c |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am c74403b4: am b00a8a06: am e8b0fcec: Merge "combine adbd.rc with init.usb.rc" * commit 'c74403b4c9c8acae326b39f06905a3a291a5471f': combine adbd.rc with init.usb.rc
|
4bc10de99f3f84b89b40c46203cbc051224f931d |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am cd1a65b6: am 30c13c49: Merge "move uncrypt from init.rc to uncrypt.rc" * commit 'cd1a65b69ad2da81e654adab8edeead457a1b1f5': move uncrypt from init.rc to uncrypt.rc
|
c74403b4c9c8acae326b39f06905a3a291a5471f |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am b00a8a06: am e8b0fcec: Merge "combine adbd.rc with init.usb.rc" * commit 'b00a8a066f5b6ae5b8d0c03ee7f680389b38a260': combine adbd.rc with init.usb.rc
|
cd1a65b69ad2da81e654adab8edeead457a1b1f5 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am 30c13c49: Merge "move uncrypt from init.rc to uncrypt.rc" * commit '30c13c4954a959c2e6c5ba126f26d88b2e56be61': move uncrypt from init.rc to uncrypt.rc
|
b00a8a066f5b6ae5b8d0c03ee7f680389b38a260 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am e8b0fcec: Merge "combine adbd.rc with init.usb.rc" * commit 'e8b0fcecf4a17cf37b5fefbcceef0920788f776e': combine adbd.rc with init.usb.rc
|
30c13c4954a959c2e6c5ba126f26d88b2e56be61 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
Merge "move uncrypt from init.rc to uncrypt.rc"
|
008eb9b80a4094d0f1b4fe29ebfbc3e40cde9575 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
move uncrypt from init.rc to uncrypt.rc Move uncrypt from /init.rc to /system/etc/init/uncrypt.rc using the LOCAL_INIT_RC mechanism Bug 23186545 Change-Id: Ibd838dd1d250c0e6536e44b69f11fb5ed42ba10b
nit.rc
|
2270dbbc841f0c98d2c7a6fafea128350aa3abf4 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
combine adbd.rc with init.usb.rc init.usb.rc and adbd.rc contain similar contents and belong in the same file. This file also belongs on the ramdisk as adbd is on the ramdisk, not the system partition, therefore resolving to keep init.usb.rc in its current location and combining the contents of adbd.rc is the best approach Change-Id: I430f8fea58694679e7b8b7be69ce87daadd616f4
nit.usb.rc
|
b111a0796226bf88ef080a9826b208e624f16eb5 |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am fdc6fbd0: am b2acb6b2: am b4998341: Merge "move init.trace.rc to frameworks/native" * commit 'fdc6fbd0c7f98fa44b86e834a88441cce3bdedaa': move init.trace.rc to frameworks/native
|
fdc6fbd0c7f98fa44b86e834a88441cce3bdedaa |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am b2acb6b2: am b4998341: Merge "move init.trace.rc to frameworks/native" * commit 'b2acb6b2ce07bf9e1c944eadcdc2dafe3e41efaf': move init.trace.rc to frameworks/native
|
b2acb6b2ce07bf9e1c944eadcdc2dafe3e41efaf |
04-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
am b4998341: Merge "move init.trace.rc to frameworks/native" * commit 'b499834121854fd98664d8d96734c733f96dbc1f': move init.trace.rc to frameworks/native
|
b0d5184774ae46726113ac3ac59dc89507b7ff02 |
03-Sep-2015 |
Tom Cherry <tomcherry@google.com> |
move init.trace.rc to frameworks/native init.trace.rc will be renamed to atrace.rc and use the LOCAL_INIT_RC mechanism to be included on /system appropriately. Bug 23186545 Change-Id: I55c37d3ff98c9ac10e6c1a713fadc7eb37346195
nit.rc
nit.trace.rc
|
3b7995b72e53e229b04604e92d9ad67fa69a6402 |
03-Sep-2015 |
Vincent Palatin <vpalatin@chromium.org> |
init.usb.rc: fix USB typec property names Fix typos in the usb typec properties (sys.usb.typec.*), so the data_role and the power_role can be written properly in the sysfs. Bug: 23790832 Change-Id: I90f591ab37825a07e0610ef1fec0e831eb19515d
nit.usb.rc
|
6d6acf4afede7177f223389a3911cd80590f3356 |
03-Sep-2015 |
Tim Murray <timmurray@google.com> |
am c9b308d1: am bb641d5f: am bc8c731a: Add zygote to the foreground cpuset. * commit 'c9b308d155c181ae78489454f64877759de98170': Add zygote to the foreground cpuset.
|
c9b308d155c181ae78489454f64877759de98170 |
03-Sep-2015 |
Tim Murray <timmurray@google.com> |
am bb641d5f: am bc8c731a: Add zygote to the foreground cpuset. * commit 'bb641d5f7714bdb8cd3ecc4f47cdd7c68e75d17a': Add zygote to the foreground cpuset.
|
d8cf000d6cba28f57daf50d080fdb68688d4f09d |
03-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
am b081b8cd: am ddc296e8: am e1801863: init: usb: Add init scripts for configfs commands * commit 'b081b8cdd17ef678fd84dccb9b5645bd72f26c5b': init: usb: Add init scripts for configfs commands
|
5917b8a3bcc54ec82efa2b3c4f14b4aa29ba4fbe |
03-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
am 1c791dfd: am 723b410f: am 48d59acc: init.usb.rc: Add new system property for configfs * commit '1c791dfd3d8e5df380068dda0982ddb9149dcbd9': init.usb.rc: Add new system property for configfs
|
a89568c29ed11a32bbc17dfc32da72b3638de070 |
03-Sep-2015 |
Tim Murray <timmurray@google.com> |
am adef754b: am 25a1b489: am 4a1f02ea: Merge "Add foreground/boost cpuset." into mnc-dr-dev * commit 'adef754b4548b391c6c2cac3065c91ccaa783a1b': Add foreground/boost cpuset.
|
b081b8cdd17ef678fd84dccb9b5645bd72f26c5b |
03-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
am ddc296e8: am e1801863: init: usb: Add init scripts for configfs commands * commit 'ddc296e841fa98bc89c0459d1dd3e438c790f15d': init: usb: Add init scripts for configfs commands
|
1c791dfd3d8e5df380068dda0982ddb9149dcbd9 |
03-Sep-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
am 723b410f: am 48d59acc: init.usb.rc: Add new system property for configfs * commit '723b410ff50920cea270b282c19edcfaf6f444e2': init.usb.rc: Add new system property for configfs
|
adef754b4548b391c6c2cac3065c91ccaa783a1b |
03-Sep-2015 |
Tim Murray <timmurray@google.com> |
am 25a1b489: am 4a1f02ea: Merge "Add foreground/boost cpuset." into mnc-dr-dev * commit '25a1b4894d9fc249535f0e0b3851643eb172202f': Add foreground/boost cpuset.
|
bc8c731aab0fce447e2b792f443aa5b6d72f55f2 |
02-Sep-2015 |
Tim Murray <timmurray@google.com> |
Add zygote to the foreground cpuset. This ensures that newly forked zygote processes will end up in the corret cpuset. bug 23751126 Change-Id: I987a2828cf2504963f1317d17f0b51d26cf22a70
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
|
e18018639bd38e959118d16d567c7567bb88d80b |
29-Aug-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
init: usb: Add init scripts for configfs commands This CL adds a new init script init.usb.configfs.rc to add generic configfs commands. Setting sys.usb.configfs in init.usb.{hardware}.rc enables executing commands in this script Bug=23633457 Change-Id: Iaae844a7957d6c9bf510648aaff86d56aa0c6243
nit.rc
nit.usb.configfs.rc
|
48d59acc57701dce66113544ccf2a711e21fb1f4 |
29-Aug-2015 |
Badhri Jagan Sridharan <Badhri@google.com> |
init.usb.rc: Add new system property for configfs This CL helps to execute a different set of commands for the usb configs specified in init.usb.rc. Aimed at using configfs based commands over android composition driver. Bug=23633457 Change-Id: Ifa5f804e1cff93d15ad57d0ed553300bc5868936
nit.usb.rc
|
3985dda1c3e668d76ecb689cb89ca8ff6614c7e9 |
25-Aug-2015 |
Tim Murray <timmurray@google.com> |
Add foreground/boost cpuset. This is used for app launches (and maybe other high priority tasks in the future). It's to be set to whatever cores should be used for short term high-priority tasks. bug 21915482 Change-Id: Id0ab0499146c09e860b97f4cb8095834cb12dd50
nit.rc
|
9f727002892ef5e49945536e6344d8a886035568 |
25-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
am 5ff07b26: am 9b2bc347: am 77d634f7: Merge "remove TARGET_PROVIDES_INIT_RC" * commit '5ff07b26851f5f416844e767645876f9f6e11e23': remove TARGET_PROVIDES_INIT_RC
|
5ff07b26851f5f416844e767645876f9f6e11e23 |
25-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
am 9b2bc347: am 77d634f7: Merge "remove TARGET_PROVIDES_INIT_RC" * commit '9b2bc347659de454796acfc9402cbbc170efd133': remove TARGET_PROVIDES_INIT_RC
|
fbe3fa84ff2564b909eaad4f427d4501bf5eb285 |
25-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
am 9b2bc347: am 77d634f7: Merge "remove TARGET_PROVIDES_INIT_RC" * commit '9b2bc347659de454796acfc9402cbbc170efd133': remove TARGET_PROVIDES_INIT_RC
|
0ea4ffdc0658982a0744de1da24c781035015830 |
24-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
remove TARGET_PROVIDES_INIT_RC Change-Id: I15105a8dc11e218d95d4f5a4cee5b2a166d3d639
ndroid.mk
|
ef6556b8f9a89708b6c96106a2b79c97dc9b2fc5 |
22-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
resolved conflicts for merge of 22bc242a to master Change-Id: I80546955611db9d003466c78588e8a7316ca9a6d
|
57a082f4de1864daf545e9f11f7373a409614326 |
22-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
resolved conflicts for merge of b21de5f6 to mnc-dev-plus-aosp Change-Id: Ia0c7f2e33e22b2419811f7e68da276e02e156d08
|
22bc242a5b3ecc3efc88d82f99d96a7eb05996fa |
22-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
resolved conflicts for merge of b21de5f6 to mnc-dr-dev-plus-aosp Change-Id: I13fd71d5af0b0a66d0c3e2f026581c60e9b95e8b
|
837135a64fff9f9d5ae630642cfba41cc95d07f8 |
14-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
remove bundled services from rootdir/init.rc Services definitions for core services are now bundled with the source for the service itself in the form of <service name>.rc. These individual .rc files are now located in /system/init/... and are parsed when the system partition is mounted. Bug: 23186545 Change-Id: Ia1b73af8d005633aa4252d603892064d7804163d
nit.rc
|
f1ed73fdf789c0fb2973dd269d049cd43c6162da |
19-Aug-2015 |
Tim Kilbourn <tkilbourn@google.com> |
am bb41f7d6: am 94653364: Merge "Use init to write usb typec props" into mnc-dr-dev * commit 'bb41f7d6ed03073ae9df41e3cc0edb80d89574b9': Use init to write usb typec props
|
bb41f7d6ed03073ae9df41e3cc0edb80d89574b9 |
19-Aug-2015 |
Tim Kilbourn <tkilbourn@google.com> |
am 94653364: Merge "Use init to write usb typec props" into mnc-dr-dev * commit '946533648c49f2700b6e0f73383699597649ee60': Use init to write usb typec props
|
8c12fdf4abee092df34e449fa91a66f999e34682 |
12-Aug-2015 |
Tim Kilbourn <tkilbourn@google.com> |
Use init to write usb typec props The sysfs nodes are owned by root, so use init to write role changes. Bug: 21615151 Change-Id: I39ad03a23af0be9ac859d4fb79a46edc27e30f4e
nit.usb.rc
|
3aa4f5314ecc9105c8c2b5c642767f90fff96457 |
17-Aug-2015 |
Evgenii Stepanov <eugenis@google.com> |
am 548f53d0: am 1ec3ba44: am 428f626d: Merge "Read global ASAN_OPTIONS from a file." * commit '548f53d0666dc4fc850989c8af260888584e40d9': Read global ASAN_OPTIONS from a file.
|
6c74e5454456e7652b80fb6d19292a7a8948123c |
17-Aug-2015 |
Evgenii Stepanov <eugenis@google.com> |
am 1ec3ba44: am 428f626d: Merge "Read global ASAN_OPTIONS from a file." * commit '1ec3ba4471d5883742b2500ba53ed2272539e756': Read global ASAN_OPTIONS from a file.
|
548f53d0666dc4fc850989c8af260888584e40d9 |
17-Aug-2015 |
Evgenii Stepanov <eugenis@google.com> |
am 1ec3ba44: am 428f626d: Merge "Read global ASAN_OPTIONS from a file." * commit '1ec3ba4471d5883742b2500ba53ed2272539e756': Read global ASAN_OPTIONS from a file.
|
428f626d1ba9819156549c4ce5b044aadbda014b |
16-Aug-2015 |
Evgenii Stepanov <eugenis@google.com> |
Merge "Read global ASAN_OPTIONS from a file."
|
2decff086cea9148939bc4d9fd87550e472dbcbf |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
am 94ee212a: am bc2cdfa8: am b81c410a: Merge "Added file permissions for binder tracing" * commit '94ee212af135a1e602c9dac73f22dc6807409370': Added file permissions for binder tracing
|
19fe5c944252c327f6ae6a0d6529cb65f1c66f50 |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
am f63f3685: am 4a4dc5f3: am a3a193ff: Merge "Added shell permisisons for memreclaim tracing" * commit 'f63f36859eecb3b5a2a43b6ae75fdbbb0f2bc039': Added shell permisisons for memreclaim tracing
|
94ee212af135a1e602c9dac73f22dc6807409370 |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
am bc2cdfa8: am b81c410a: Merge "Added file permissions for binder tracing" * commit 'bc2cdfa8a00980f4c38ebcd67bac888b355e3787': Added file permissions for binder tracing
|
87ea6cfb6219222fef991713aba21a739bf4f121 |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
am bc2cdfa8: am b81c410a: Merge "Added file permissions for binder tracing" * commit 'bc2cdfa8a00980f4c38ebcd67bac888b355e3787': Added file permissions for binder tracing
|
f63f36859eecb3b5a2a43b6ae75fdbbb0f2bc039 |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
am 4a4dc5f3: am a3a193ff: Merge "Added shell permisisons for memreclaim tracing" * commit '4a4dc5f313953764079a4020a3791e36ec43ba0c': Added shell permisisons for memreclaim tracing
|
c1490ad9a00b34e13e60a3da056b441242449680 |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
am 4a4dc5f3: am a3a193ff: Merge "Added shell permisisons for memreclaim tracing" * commit '4a4dc5f313953764079a4020a3791e36ec43ba0c': Added shell permisisons for memreclaim tracing
|
cd1d99e26840d4fb23498d3fb0be527a9202bd0b |
10-Jul-2015 |
Scott Bauer <bauers@google.com> |
Added file permissions for binder tracing
nit.trace.rc
|
a3a193ffd9ee69a8b4dc41a592257bc134bc40da |
13-Aug-2015 |
Riley Andrews <riandrews@google.com> |
Merge "Added shell permisisons for memreclaim tracing"
|
0d2dde57fef4db0d0e51369a1d9d9cfa5deb7235 |
08-Aug-2015 |
Evgenii Stepanov <eugenis@google.com> |
Read global ASAN_OPTIONS from a file. Instead of setting global ASAN_OPTIONS in immutable init.environ.rc, load them from a file that can be changed later. The file has to be on the /system partition to both be editable and available at the early stages of boot. Also add allocator_may_return_null=1 as that is closer to the non-ASan allocator behavior. Bug: 22846541 Change-Id: Ib0f41393c528f2e7cb398470e41f50abf5f4f455
ndroid.mk
san.options
|
063d4b07abf39ec44e4184cb5410eb9d4ac84940 |
06-Aug-2015 |
Jeff Sharkey <jsharkey@android.com> |
am 94629bde: resolved conflicts for merge of 779a38a5 to mnc-dr-dev-plus-aosp * commit '94629bdec34b253fa2e9cd9ec800715b3c3a4f7f': Protect runtime storage mount points.
|
94629bdec34b253fa2e9cd9ec800715b3c3a4f7f |
06-Aug-2015 |
Jeff Sharkey <jsharkey@android.com> |
resolved conflicts for merge of 779a38a5 to mnc-dr-dev-plus-aosp Change-Id: Ieaa0dcd8e93fba3060e9a85f17b1f5eabc6b8c9e
|
fdf14874930e92933eda7c756fd3bfe1f5e6c09a |
06-Aug-2015 |
Jeff Sharkey <jsharkey@android.com> |
resolved conflicts for merge of b9f438ff to mnc-dev-plus-aosp Change-Id: I7103bacb1b2d7dc29b4f8d9dddb2fec1feb869d3
|
779a38a5cd8dab1741ae4a45907bfdf0449bd546 |
06-Aug-2015 |
Jeff Sharkey <jsharkey@android.com> |
am b9f438ff: Protect runtime storage mount points. * commit 'b9f438ff841f87c8ffbca85b13a533718a18e15f': Protect runtime storage mount points.
|
b9f438ff841f87c8ffbca85b13a533718a18e15f |
06-Aug-2015 |
Jeff Sharkey <jsharkey@android.com> |
Protect runtime storage mount points. We have a bunch of magic that mounts the correct view of storage access based on the runtime permissions of an app, but we forgot to protect the real underlying data sources; oops. This series of changes just bumps the directory heirarchy one level to give us /mnt/runtime which we can mask off as 0700 to prevent people from jumping to the exposed internals. Also add CTS tests to verify that we're protecting access to internal mount points like this. Bug: 22964288 Change-Id: I32068e63a3362b37e8ebca1418f900bb8537b498
nit.rc
|
5fa4fbc53ecf503867b658b1b744c60fdedc0efd |
04-Aug-2015 |
Daniel Rosenberg <drosen@google.com> |
am 0dbbb935: am e20a4194: am 516d30d5: Merge "rootdir: Create symlinks in Android.mk" * commit '0dbbb935f9e358d31e8f37b9928520ee926886b4': rootdir: Create symlinks in Android.mk
|
764b7f561ba5bcecd94b7dd342bab2bf8cc287b7 |
04-Aug-2015 |
Daniel Rosenberg <drosen@google.com> |
am e20a4194: am 516d30d5: Merge "rootdir: Create symlinks in Android.mk" * commit 'e20a4194b8faacc542aee519a62a01954376be60': rootdir: Create symlinks in Android.mk
|
0dbbb935f9e358d31e8f37b9928520ee926886b4 |
04-Aug-2015 |
Daniel Rosenberg <drosen@google.com> |
am e20a4194: am 516d30d5: Merge "rootdir: Create symlinks in Android.mk" * commit 'e20a4194b8faacc542aee519a62a01954376be60': rootdir: Create symlinks in Android.mk
|
595003a3d06a13862052ef2f4f578371dae5ad65 |
29-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
rootdir: Create symlinks in Android.mk system.img may contain the root directory as well. In that case, we need to create some symlinks init.rc would during the build. Change-Id: I4e7726f38c0f9cd9846c761fad1446738edb52c0
ndroid.mk
|
91e1b0135d322a1f604fbdc8ec26fad1d2a8bdd9 |
30-Jul-2015 |
Yasuhiro Matsuda <mazda@google.com> |
resolved conflicts for merge of 70ab38a5 to master Change-Id: I7092ecb87f4020add5fe8843f188955a5579c284
|
70ab38a5702129ae1cc064345c76f66b4bfa57c2 |
30-Jul-2015 |
Yasuhiro Matsuda <mazda@google.com> |
am 102ead3a: am b10e562b: Merge "Introduce a mechanism to trace boot sequence." * commit '102ead3ae187a007b8a90b61ea243197927b6ae2': Introduce a mechanism to trace boot sequence.
|
6b802c4b9565c83a863c88416e6b7e5c3d418aeb |
30-Jul-2015 |
Yasuhiro Matsuda <mazda@google.com> |
am 102ead3a: am b10e562b: Merge "Introduce a mechanism to trace boot sequence." * commit '102ead3ae187a007b8a90b61ea243197927b6ae2': Introduce a mechanism to trace boot sequence.
|
f93db4b827818806ca4cee80e6ec954d7aa40632 |
15-Jun-2015 |
Yasuhiro Matsuda <mazda@google.com> |
Introduce a mechanism to trace boot sequence. This CL adds a trigger and a service so that Systrace can be used for tracing events during boot. persist.debug.atrace.boottrace property is used for switching on and off tracing during boot. /data/misc/boottrace/categories file is used for specifying the categories to be traced. These property and file are rewritten by Systrace when the newly added option --boot is specified. Here is an example of tracing events of am and wm catetories during boot. $ external/chromium-trace/systrace am wm --boot This command will cause the device to reboot. Once the device has booted up, the trace report is created by hitting Ctrl+C. As written in readme.txt, this mechanism relies on persistent property, so tracing events that are emitted before that are not recorded. This is enough for tracing events after zygote is launched though. This only works on userdebug or eng build for security reason. BUG: 21739901 Change-Id: I03f2963d77a678f47eab5e3e29fc7e91bc9ca3a4
nit.rc
nit.trace.rc
|
3fe84e009e20e2104d6a0a6322f18c856b460477 |
28-Jul-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
am f05256b3: am 4b70dd4c: am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev * commit 'f05256b32b815fc5d8be65e2fbc2e4a9f4da5ccd': init.rc: add healthd to system group to allow write to /dev/cpuset
|
f05256b32b815fc5d8be65e2fbc2e4a9f4da5ccd |
28-Jul-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
am 4b70dd4c: am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev * commit '4b70dd4c8f5c5c2baed8cb1f8436bf74971e20c6': init.rc: add healthd to system group to allow write to /dev/cpuset
|
6beb774d5e1606a2a1791c3d165cdecb4fb62b36 |
28-Jul-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev * commit '26f0f657ec027430bde7d2237890ba59b3fd174a': init.rc: add healthd to system group to allow write to /dev/cpuset
|
4b70dd4c8f5c5c2baed8cb1f8436bf74971e20c6 |
28-Jul-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev * commit '26f0f657ec027430bde7d2237890ba59b3fd174a': init.rc: add healthd to system group to allow write to /dev/cpuset
|
26f0f657ec027430bde7d2237890ba59b3fd174a |
28-Jul-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev
|
a30a8e02dd41505f46e692f29943011a032a5210 |
28-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
init.rc: add healthd to system group to allow write to /dev/cpuset Also add to root group to avoid introducting new bugs. Bug: 22699101 Change-Id: I9da31e0cc955efd711df3f4c6b17e39d74c01549
nit.rc
|
b4a5b3bac591268337ea17efde88b3749d8c2e24 |
27-Jul-2015 |
Nick Kralevich <nnk@google.com> |
am b57ba047: am ba03cc95: am 5f3b05ad: Merge "init.rc: mkdir /data/anr 0775 system system" * commit 'b57ba047805fd7a779927075be4581f03f3ad938': init.rc: mkdir /data/anr 0775 system system
|
b57ba047805fd7a779927075be4581f03f3ad938 |
27-Jul-2015 |
Nick Kralevich <nnk@google.com> |
am ba03cc95: am 5f3b05ad: Merge "init.rc: mkdir /data/anr 0775 system system" * commit 'ba03cc953ff9076d5b01748912b102db43911f7f': init.rc: mkdir /data/anr 0775 system system
|
0f42f3937126a6de329406216b1bac73da79ef35 |
26-Jul-2015 |
Nick Kralevich <nnk@google.com> |
am ba03cc95: am 5f3b05ad: Merge "init.rc: mkdir /data/anr 0775 system system" * commit 'ba03cc953ff9076d5b01748912b102db43911f7f': init.rc: mkdir /data/anr 0775 system system
|
c2ea70ae6ebcf98bd067e06b3e33894ef5c260c8 |
26-Jul-2015 |
Nick Kralevich <nnk@google.com> |
init.rc: mkdir /data/anr 0775 system system Ensure that /data/anr always exists. This allows us to eliminate some code in system_server and dumpstate. In addition, this change solves a common problem where people would create the directory manually but fail to set the SELinux label, which would cause subsequent failures when they used the directory for ANRs. Bug: 22385254 Change-Id: I29eb3deb21a0504aed07570fee3c2f87e41f53a0
nit.rc
|
9752a4696eefe82e6dfe37879bb8ee19c291ead7 |
25-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
am 552f23de: am 1d0fe13a: am 3f62a020: logd: allow logd to write to /dev/cpuset files * commit '552f23deef9491f4e60b78f1ca6f89b7b60c5de2': logd: allow logd to write to /dev/cpuset files
|
552f23deef9491f4e60b78f1ca6f89b7b60c5de2 |
25-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
am 1d0fe13a: am 3f62a020: logd: allow logd to write to /dev/cpuset files * commit '1d0fe13a9e720a88766b38070195670183274e30': logd: allow logd to write to /dev/cpuset files
|
1d0fe13a9e720a88766b38070195670183274e30 |
25-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
am 3f62a020: logd: allow logd to write to /dev/cpuset files * commit '3f62a020c48d5d812fb2898759b93a59dc24d310': logd: allow logd to write to /dev/cpuset files
|
c200e9564b3ec7eea4b55badbeb0882c9674513d |
25-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
am 3f62a020: logd: allow logd to write to /dev/cpuset files * commit '3f62a020c48d5d812fb2898759b93a59dc24d310': logd: allow logd to write to /dev/cpuset files
|
3f62a020c48d5d812fb2898759b93a59dc24d310 |
24-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
logd: allow logd to write to /dev/cpuset files Required by logd on devices with USE_CPUSETS defined. Make /dev/cpuset/background, /dev/cpuset/foreground and /dev/cpuset/task writeable by system gid. Add logd to system group for writing to cpuset files and to root group to avoid regressions. When dropping privs, also drop supplementary groups. Bug: 22699101 Change-Id: Icc01769b18b5e1f1649623da8325a8bfabc3a3f0
nit.rc
|
42525a1b24af0e90a8c7b45c4a38278c9d84953f |
21-Jul-2015 |
Riley Andrews <riandrews@google.com> |
am 7c1ae005: am e850f578: Disable scaling of the cfs tunables. * commit '7c1ae0051d8492b12862f0983521883a1325bdd3': Disable scaling of the cfs tunables.
|
7c1ae0051d8492b12862f0983521883a1325bdd3 |
21-Jul-2015 |
Riley Andrews <riandrews@google.com> |
am e850f578: Disable scaling of the cfs tunables. * commit 'e850f5786cdd4d3e4f1157db8785de3e6ff77eab': Disable scaling of the cfs tunables.
|
e850f5786cdd4d3e4f1157db8785de3e6ff77eab |
21-Jul-2015 |
Riley Andrews <riandrews@google.com> |
Disable scaling of the cfs tunables. The cfs tunables auto-scale with the number of active cpus by default. Given that the tunable settings are in device-independent code and it's not known how many cores are currently active when the init.rc file runs, the cfs tunables can vary pretty significantly across devices depending on the state at boot. Disable scaling of the the tunables so that we can get more consistent behavior of cfs across devices. If we want to do per-device tuning of these values, we can override what's written here in device specific files. Bug: 22634118 Change-Id: Id19b24ef819fef762521e75af55e6d4378cfc949
nit.rc
|
2a9e682c11b28a3ca29b1686ad287e5806912d30 |
20-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am b381f0a5: am 71ca82bf: am 8da23664: Merge "rootdir: Create cache folder in Android.mk" * commit 'b381f0a5e11bf7a75ee0c06ddb4771a1312a1bea': rootdir: Create cache folder in Android.mk
|
b381f0a5e11bf7a75ee0c06ddb4771a1312a1bea |
20-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am 71ca82bf: am 8da23664: Merge "rootdir: Create cache folder in Android.mk" * commit '71ca82bf954c4bd5b8817eeabb78418fafde90ce': rootdir: Create cache folder in Android.mk
|
d2bb8134d337d35c6abfcf57a8a6c754fdba9d45 |
20-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am 71ca82bf: am 8da23664: Merge "rootdir: Create cache folder in Android.mk" * commit '71ca82bf954c4bd5b8817eeabb78418fafde90ce': rootdir: Create cache folder in Android.mk
|
8da23664e78dc5b5a483385fb55328d0d7639867 |
20-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
Merge "rootdir: Create cache folder in Android.mk"
|
fc1a8c1d353403a07ca035203d6823c4a5031bcb |
18-Jul-2015 |
Elliott Hughes <enh@google.com> |
am 69b2c2a1: am 6657d224: am 069f62de: Merge "Fix N9 boot." * commit '69b2c2a125f655a43f54a181d5ddbe714f4848ca': Fix N9 boot.
|
69b2c2a125f655a43f54a181d5ddbe714f4848ca |
18-Jul-2015 |
Elliott Hughes <enh@google.com> |
am 6657d224: am 069f62de: Merge "Fix N9 boot." * commit '6657d2248e902289476c4b937f5d6a1585c95ec2': Fix N9 boot.
|
546738a4e7afbb216876cf65791c87adb0541e7d |
18-Jul-2015 |
Elliott Hughes <enh@google.com> |
am 6657d224: am 069f62de: Merge "Fix N9 boot." * commit '6657d2248e902289476c4b937f5d6a1585c95ec2': Fix N9 boot.
|
04b2022f7eebffda31f1f86e4f9ee06c45fd0578 |
18-Jul-2015 |
Elliott Hughes <enh@google.com> |
Fix N9 boot. Without this, sdcard fails to start because its mount point doesn't exist. Bug: http://b/22568628 Change-Id: Ic6a2f51fc74c5bd1f23d97592049495ac3822bb3
nit.rc
|
cf0ca5047991a275379694b46e12eb6fbcfe436a |
16-Jul-2015 |
Scott Bauer <bauers@google.com> |
Added shell permisisons for memreclaim tracing
nit.trace.rc
|
86b151cbe892b2481aeedbf6fd3c9f893bd56135 |
15-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
rootdir: Create cache folder in Android.mk system.img may contain the root directory as well. In that case, we need to create some folders init.rc would during the build. Change-Id: I312104ff926fb08d98ac8256b76d01b0a90ea5e5
ndroid.mk
|
15db3551d005a58407a8ac97b73a879530dd3e74 |
15-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
resolved conflicts for merge of 074ee014 to mnc-dev-plus-aosp Change-Id: Iead524946a84503a6e89c17861d3f54e4cf276a0
nit.rc
|
cdf768fe7c13f1dfae2bde6fb6d32b8400d56393 |
15-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am f3cd170c: am 3470855e: Merge "rootdir: Create folders in Android.mk" * commit 'f3cd170cdbc1950a9c5efffb5c41c346c4cba298': rootdir: Create folders in Android.mk
|
6e1fd8dde739a205e58ebc64347ebc63ddd02a39 |
14-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am 1c45c0ff: Merge "resolved conflicts for merge of 074ee014 to mnc-dr-dev-plus-aosp" into mnc-dr-dev-plus-aosp * commit '1c45c0ff5d1cbd49d2d77fa837e1be0724fa77b3': Remove creation of root directory folders
|
cfda5bb47ac558d3628074904e386178c3fc58e1 |
14-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
resolved conflicts for merge of 074ee014 to mnc-dr-dev-plus-aosp Change-Id: I346583851035950350433136599f73ab2bedba4b
|
6158942f27c4007eb32f96d0a80b7cacdfe24d44 |
14-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am 26a81c1d: am f3cd170c: am 3470855e: Merge "rootdir: Create folders in Android.mk" * commit '26a81c1d1a8f7c40cd79648edff0585bfc94e281': rootdir: Create folders in Android.mk
|
26a81c1d1a8f7c40cd79648edff0585bfc94e281 |
14-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
am f3cd170c: am 3470855e: Merge "rootdir: Create folders in Android.mk" * commit 'f3cd170cdbc1950a9c5efffb5c41c346c4cba298': rootdir: Create folders in Android.mk
|
b7f1f61fbc1c2eae7a689df476da401847a936d9 |
14-Jul-2015 |
Paul Crowley <paulcrowley@google.com> |
am ee923139: Merge "Set up user directory crypto in init." into mnc-dr-dev * commit 'ee923139c346e6751203fc7d2a341388e01c7b19': Set up user directory crypto in init. logd: switch to unordered_map from BasicHashtable rootdir: make sure the /oem mountpoint is always available
|
f3fbfaef220ead1f68dd5f6a6b2a10ae019764c4 |
14-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am c1fa34b9: am d5ef9841: Merge "Change init sequence to support file level encryption" into mnc-dr-dev * commit 'c1fa34b9f600c827769b4401d8b12e7c587b68f4': Change init sequence to support file level encryption
|
ee923139c346e6751203fc7d2a341388e01c7b19 |
13-Jul-2015 |
Paul Crowley <paulcrowley@google.com> |
Merge "Set up user directory crypto in init." into mnc-dr-dev
|
c1fa34b9f600c827769b4401d8b12e7c587b68f4 |
13-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am d5ef9841: Merge "Change init sequence to support file level encryption" into mnc-dr-dev * commit 'd5ef984195779aa9e27d7baabdd751d641eea1a0': Change init sequence to support file level encryption
|
64dffd3975824512353244684c960845be8bdde2 |
09-Jul-2015 |
Daniel Rosenberg <drosen@google.com> |
Remove creation of root directory folders Folders in the root directory are now created during the build, as we may be building without a ramdisk, and when we do that, the root directory will be read-only. With those changes, these mkdirs will never need to run. Change-Id: I49c63e8bfc71d28e3f938ed41f81d108359fa57a
nit.rc
|
58458b66d4c6b0c7c54fc92f174c78378b81ad1d |
06-Jun-2015 |
Daniel Rosenberg <drosen@google.com> |
rootdir: Create folders in Android.mk system.img may contain the root directory as well. In that case, we need to create some folders init.rc would during the build. Change-Id: I157ccbebf36bee9916f3f584551704ec481ae1d1
ndroid.mk
|
2ed2e30120778b3b4e2fe67c7e1871465c87ad7f |
07-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am e8308f85: am 81046166: Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev * commit 'e8308f852c867bc676e71875ea57de022464ea09': Revert "Change init sequence to support file level encryption"
|
948410a4936fda5348304af9711db932926bcc1a |
01-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
Change init sequence to support file level encryption File level encryption must get the key between mounting userdata and calling post_fs_data when the directories are created. This requires access to keymaster, which in turn is found from a system property. Split property loaded into system and data, and load in right order. Bug: 22233063
nit.rc
|
e8308f852c867bc676e71875ea57de022464ea09 |
07-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am 81046166: Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev * commit '8104616696ac5e806b16a393ea02c4f5d8efc328': Revert "Change init sequence to support file level encryption"
|
c011b031c988038f81c72875fdd6ac7349774f35 |
07-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am 81046166: Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev * commit '8104616696ac5e806b16a393ea02c4f5d8efc328': Revert "Change init sequence to support file level encryption"
|
8104616696ac5e806b16a393ea02c4f5d8efc328 |
07-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev
|
437bc5dceca1608456c1c40b694645bc2d100ad4 |
07-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Change init sequence to support file level encryption" This reverts commit d815178b7512cb44d8b5f234e3f823b5a3e44dea. Change-Id: I7e3f55d3092fcd04ea9f62f1971c9d42570f096c
nit.rc
|
d80e24341176ca9d4048dfae41d99d9435285ee4 |
07-Jul-2015 |
Andres Morales <anmorales@google.com> |
am 722d4a54: am 833f142d: Merge "[init] start gatekeeperd after device decryption" into mnc-dev * commit '722d4a54d9fa49581931e7c88fee5aa0c1f3c5f8': [init] start gatekeeperd after device decryption
|
1c875cc40fa3290c79c463140cbbff98eb524941 |
07-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am 22d0ee6a: am a65e402b: Merge "Change init sequence to support file level encryption" into mnc-dev * commit '22d0ee6a25b3bedd6c3cd52473df1404fce8615f': Change init sequence to support file level encryption
|
722d4a54d9fa49581931e7c88fee5aa0c1f3c5f8 |
07-Jul-2015 |
Andres Morales <anmorales@google.com> |
am 833f142d: Merge "[init] start gatekeeperd after device decryption" into mnc-dev * commit '833f142d201a4b682885ff9d95c6b3ab32fd0618': [init] start gatekeeperd after device decryption
|
775b58d08f207cc1752deca50e4526f19ac14583 |
07-Jul-2015 |
Andres Morales <anmorales@google.com> |
am 833f142d: Merge "[init] start gatekeeperd after device decryption" into mnc-dev * commit '833f142d201a4b682885ff9d95c6b3ab32fd0618': [init] start gatekeeperd after device decryption
|
833f142d201a4b682885ff9d95c6b3ab32fd0618 |
07-Jul-2015 |
Andres Morales <anmorales@google.com> |
Merge "[init] start gatekeeperd after device decryption" into mnc-dev
|
22d0ee6a25b3bedd6c3cd52473df1404fce8615f |
06-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am a65e402b: Merge "Change init sequence to support file level encryption" into mnc-dev * commit 'a65e402b613e927697d35e7936c6d80908d77e88': Change init sequence to support file level encryption
|
d3669ff27f782ce1da324f0a6043204a3a4e9f3f |
06-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
am a65e402b: Merge "Change init sequence to support file level encryption" into mnc-dev * commit 'a65e402b613e927697d35e7936c6d80908d77e88': Change init sequence to support file level encryption
|
4dd2982dd31d43e905f6792201c404a2e549ca17 |
06-Jul-2015 |
Andres Morales <anmorales@google.com> |
[init] start gatekeeperd after device decryption gatekeeperd depends on having /data to determine whether to call setup routines for qcom HALs. Bug: 22298552 Change-Id: I6c552016dc863bbb04bd5a949a2317a720c8263f
nit.rc
|
d815178b7512cb44d8b5f234e3f823b5a3e44dea |
01-Jul-2015 |
Paul Lawrence <paullawrence@google.com> |
Change init sequence to support file level encryption File level encryption must get the key between mounting userdata and calling post_fs_data when the directories are created. This requires access to keymaster, which in turn is found from a system property. Split property loaded into system and data, and load in right order. Bug: 22233063 Change-Id: I8a6c40d44e17de386417a443c9dfc3b4e7fe59a5
nit.rc
|
35e0cc552c4466c46cf3fc4c326b708313a2e1f9 |
26-Jun-2015 |
Jeff Sharkey <jsharkey@android.com> |
am 96835733: am f38f29c8: Let\'s reinvent storage, yet again! * commit '96835733b397da908c86e2a1190b8c8baf06a441': Let's reinvent storage, yet again!
|
96835733b397da908c86e2a1190b8c8baf06a441 |
26-Jun-2015 |
Jeff Sharkey <jsharkey@android.com> |
am f38f29c8: Let\'s reinvent storage, yet again! * commit 'f38f29c87d97cea45d04b783bddbd969234b1030': Let's reinvent storage, yet again!
|
f38f29c87d97cea45d04b783bddbd969234b1030 |
23-Jun-2015 |
Jeff Sharkey <jsharkey@android.com> |
Let's reinvent storage, yet again! Now that we're treating storage as a runtime permission, we need to grant read/write access without killing the app. This is really tricky, since we had been using GIDs for access control, and they're set in stone once Zygote drops privileges. The only thing left that can change dynamically is the filesystem itself, so let's do that. This means changing the FUSE daemon to present itself as three different views: /mnt/runtime_default/foo - view for apps with no access /mnt/runtime_read/foo - view for apps with read access /mnt/runtime_write/foo - view for apps with write access There is still a single location for all the backing files, and filesystem permissions are derived the same way for each view, but the file modes are masked off differently for each mountpoint. During Zygote fork, it wires up the appropriate storage access into an isolated mount namespace based on the current app permissions. When the app is granted permissions dynamically at runtime, the system asks vold to jump into the existing mount namespace and bind mount the newly granted access model into place. Bug: 21858077 Change-Id: I5a016f0958a92fd390c02b5ae159f8008bd4f4b7
nit.rc
|
c25f0dc38bf4b7d1d91742657e50add72f41898d |
24-Jun-2015 |
Evgenii Stepanov <eugenis@google.com> |
am c7b86c16: am eaa97876: am 2e8d31f6: Merge "SANITIZE_TARGET: set global ASAN_OPTIONS" * commit 'c7b86c1661c7d178784dc2b9f09e478569a2886c': SANITIZE_TARGET: set global ASAN_OPTIONS
|
c7b86c1661c7d178784dc2b9f09e478569a2886c |
24-Jun-2015 |
Evgenii Stepanov <eugenis@google.com> |
am eaa97876: am 2e8d31f6: Merge "SANITIZE_TARGET: set global ASAN_OPTIONS" * commit 'eaa978768beef315c5dca9db964d4e80c462cf74': SANITIZE_TARGET: set global ASAN_OPTIONS
|
749af8c08f6db8da4202ad93f9a6d06884b27c0d |
28-May-2015 |
Paul Crowley <paulcrowley@google.com> |
Set up user directory crypto in init. (cherry-picked from commit b94032b79c3cded501e2d5f7c328cf8c0c3911c4) Bug: 19704432 Change-Id: Ife4928ffbee39c8ae69e6ba66d9ce5ef5a0beb76
nit.rc
|
a88a084e94e348206298b796eb1f9709e06cfc14 |
23-Jun-2015 |
Pavlin Radoslavov <pavlin@google.com> |
am 233286f4: am 4caa9f39: Merge "Fix the file permissions of /data/misc/bluedroid/bt_config.conf" into mnc-dev * commit '233286f40bdd84ad26b5ebf615d9f62fc30e19bf': Fix the file permissions of /data/misc/bluedroid/bt_config.conf
|
233286f40bdd84ad26b5ebf615d9f62fc30e19bf |
23-Jun-2015 |
Pavlin Radoslavov <pavlin@google.com> |
am 4caa9f39: Merge "Fix the file permissions of /data/misc/bluedroid/bt_config.conf" into mnc-dev * commit '4caa9f39bb3415358dcb737d0eb9058c34192806': Fix the file permissions of /data/misc/bluedroid/bt_config.conf
|
8175bb235277f637faf30138b30e97e07fb85b8e |
20-Jun-2015 |
Pavlin Radoslavov <pavlin@google.com> |
Fix the file permissions of /data/misc/bluedroid/bt_config.conf Fix the file access permissions and group ownership of "/data/misc/bluedroid/bt_config.conf" so the file can be reused when switching users on the device. For that purpose, we need to do the following: 1. Set the set-group-ID (bit 02000) flag for directory "/data/misc/bluedroid" so the files created in that directory will have group-id of "net_bt_stack" . 2. Change the file's permissions of file "/data/misc/bluedroid/bt_config.conf" to Read/Write by User and Group. Bug: 21493919 Change-Id: Ie00ab4695198ef2aa299b484ef9d4f17bd41b98a
nit.rc
|
1cbe3d944a93fa3a0f0d7a444bb69c644c83f385 |
13-Jun-2015 |
Evgenii Stepanov <eugenis@google.com> |
SANITIZE_TARGET: set global ASAN_OPTIONS allow_user_segv_handler=1 is required to run ART under ASan detect_odr_violation=0 and alloc_dealloc_mismatch=0 suppress some of the existing bug reports during boot. Bug: 21951850, 21785137 Change-Id: I4d36967c6d8d936dacbfdf1b94b87fa94766bd3e
ndroid.mk
nit.environ.rc.in
|
c15560d49637c3d57a0291eb6d17e948a30ac6e5 |
12-Jun-2015 |
Tim Kilbourn <tkilbourn@google.com> |
Merge "Don't restart zygote when inputflinger dies."
|
766ca5cd6cf841869aa1baaa4c9b40b1363a2444 |
12-Jun-2015 |
Tim Kilbourn <tkilbourn@google.com> |
Merge "Revert "Track removal of the inputflinger binary.""
|
83da7c6a54be49adf9e0fc7892c910cbe2f11fec |
12-Jun-2015 |
Tim Murray <timmurray@google.com> |
am 63e38313: am e5b0c837: Merge "add cpuset support to libcutils" into mnc-dev * commit '63e383136b8a76fdf619aa878b58b815a094e6ee': add cpuset support to libcutils
|
63e383136b8a76fdf619aa878b58b815a094e6ee |
12-Jun-2015 |
Tim Murray <timmurray@google.com> |
am e5b0c837: Merge "add cpuset support to libcutils" into mnc-dev * commit 'e5b0c837856007812ace8ec5849f6852015d5d2b': add cpuset support to libcutils
|
b769c8d24fd7be96f8968aa4c80b669525b930d3 |
08-Jun-2015 |
Tim Murray <timmurray@google.com> |
add cpuset support to libcutils bug 21782794 Change-Id: I249531754fb29442dc3c7434d77dbb103f4220a7
nit.rc
|
7c6020ba53b4b0c2560c11b2aae0e579f44aee29 |
06-May-2015 |
Tim Kilbourn <tkilbourn@google.com> |
Don't restart zygote when inputflinger dies. During development it is useful to be able to kill inputflinger and have init restart it without bringing down the entire system server. Change-Id: I8b13b94331c5045086db2f5c73a8f49efc5992cb
nit.rc
|
f8fcd6a616cad9424d98e91783d6f14c6f542a1a |
24-Feb-2015 |
Tim Kilbourn <tkilbourn@google.com> |
Revert "Track removal of the inputflinger binary." This reverts commit 2422c17c5e5dc4aaaaca6ec99953497d87091a50. Change-Id: I11d1624947dcc3cdcd0d648de6cc25901c91dac6
nit.rc
|
04b10b9aa3d4d80addbf5079e1d72b4001ce4172 |
11-May-2015 |
Tao Bao <tbao@google.com> |
Change pre-recovery into two services /system/bin/uncrypt needs to be triggered to prepare the OTA package before rebooting into the recovery. Separate pre-recovery (uncrypt) into two services: uncrypt that does the uncryption work and pre-recovery that actually reboots the device into recovery. Also create /cache/recovery on post-fs in case it doesn't exist. Bug: 20012567 Bug: 20949086 (cherry picked from commit e48aed0f0abd10cb21e14d81ae46214d08872f79) Change-Id: I9877cd6ac9412ea6a566bb1ec0807940c7a38ce5
nit.rc
|
b183361199fe206c25ed666f3ad397460939f140 |
05-Jun-2015 |
Paul Lawrence <paullawrence@google.com> |
am a7dcec1d: am 3678a5fb: Merge "Move crypt commands to a different listener in vold" into mnc-dev * commit 'a7dcec1da38c15d5e5ede7bfdec7ffd880cb6b82': Move crypt commands to a different listener in vold
|
a7dcec1da38c15d5e5ede7bfdec7ffd880cb6b82 |
05-Jun-2015 |
Paul Lawrence <paullawrence@google.com> |
am 3678a5fb: Merge "Move crypt commands to a different listener in vold" into mnc-dev * commit '3678a5fb8d1094c4796c1316f3b571cb63cf7246': Move crypt commands to a different listener in vold
|
3678a5fb8d1094c4796c1316f3b571cb63cf7246 |
04-Jun-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge "Move crypt commands to a different listener in vold" into mnc-dev
|
7dbe806939c164a7b681c57a9725ae9e501f0377 |
04-Jun-2015 |
Nick Kralevich <nnk@google.com> |
am e2722e9b: am a20d6f4e: am 2ec88501: Merge "tzdatacheck: don\'t hard code SELinux domain name" * commit 'e2722e9bfbeb2f2f349493fbe9b464c24e416ee0': tzdatacheck: don't hard code SELinux domain name
|
37fcc5d73ebf31b193cda41731a5a9dcb8206473 |
03-Jun-2015 |
Paul Lawrence <paullawrence@google.com> |
Move crypt commands to a different listener in vold In order to prevent this bug from happening, we must allow vold cryptfs commands to complete while a long running mount is underway. While waiting for vold to be changed to a binder interface, we will simply create two listeners, one for cryptfs and one for everything else. Bug: 19197175 Change-Id: Ie3d9567819ced7757b0a8f391547f27db944153c
nit.rc
|
e2722e9bfbeb2f2f349493fbe9b464c24e416ee0 |
03-Jun-2015 |
Nick Kralevich <nnk@google.com> |
am a20d6f4e: am 2ec88501: Merge "tzdatacheck: don\'t hard code SELinux domain name" * commit 'a20d6f4e154939722263207ddf5954b3f58f666d': tzdatacheck: don't hard code SELinux domain name
|
32512e716750b94c9e72c50a98a5db724857f1d5 |
03-Jun-2015 |
Nick Kralevich <nnk@google.com> |
tzdatacheck: don't hard code SELinux domain name An automatic domain transition is already defined by SELinux policy. Avoid having redundant information on the exec line. This commit depends on commit 17fff893c04971b519d25d52b07f51111353cba5 which made the SELinux process label optional. (cherrypicked from commit 221fca7ddd2ba1778ec89013c96434a9d36b529e) Change-Id: I89464f2bd218c7d6e8db08aa6bed2b62ec6dad2a
nit.rc
|
221fca7ddd2ba1778ec89013c96434a9d36b529e |
03-Jun-2015 |
Nick Kralevich <nnk@google.com> |
tzdatacheck: don't hard code SELinux domain name An automatic domain transition is already defined by SELinux policy. Avoid having redundant information on the exec line. This commit depends on commit 17fff893c04971b519d25d52b07f51111353cba5 which made the SELinux process label optional. Change-Id: I89464f2bd218c7d6e8db08aa6bed2b62ec6dad2a
nit.rc
|
b94032b79c3cded501e2d5f7c328cf8c0c3911c4 |
28-May-2015 |
Paul Crowley <paulcrowley@google.com> |
Set up user directory crypto in init. Bug: 19704432 Change-Id: Ife4928ffbee39c8ae69e6ba66d9ce5ef5a0beb76
nit.rc
|
f8a6fa503f13202dea3189eb284d8a8950f80b9e |
03-Jun-2015 |
Paul Crowley <paulcrowley@google.com> |
Restore creation of /data/misc/vold erroneously rolled back Rollback commit: 9f403450bcce9ef0ef99ff58b65eb3b1eedc6979 Bug: 19704432 Change-Id: I1a73a2e1d3f4d5441df4d686d420d3a79b3e95bc
nit.rc
|
d8a99287a411c62a536f9b2b0be35e4d0ca16c0d |
03-Jun-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 56051554: am e0e56563: am 0bda352f: Merge changes from topic \'logcatd\' * commit '560515540d3ef4da9dc58e3b7fcfeb6c067bb677': init.rc: logd: Add logpersistd (nee logcatd) init: change exec parsing to make SECLABEL optional logcat: -f run in background logcat: -f flag to continue
|
560515540d3ef4da9dc58e3b7fcfeb6c067bb677 |
03-Jun-2015 |
Mark Salyzyn <salyzyn@google.com> |
am e0e56563: am 0bda352f: Merge changes from topic \'logcatd\' * commit 'e0e565635a7c6c36a05282622c01203afbec5ca5': init.rc: logd: Add logpersistd (nee logcatd) init: change exec parsing to make SECLABEL optional logcat: -f run in background logcat: -f flag to continue
|
49ed105fd91677f7c87417890bf7441146953fff |
26-May-2015 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: logd: Add logpersistd (nee logcatd) (cherry pick from commit 100658c303919d8f69c76f6f25eac376795712f0) - logpersistd is defined as a thread or process in the context of the logd domain. Here we define logpersistd as logcat -f in logd domain and call it logcatd to represent its service mechanics. - Use logcatd to manage content in /data/misc/logd/ directory. - Only turn on for persist.logd.logpersistd = logcatd. - Add logpersist.start, logpersist.stop and logpersist.cat debug class executables, thus only in the eng and userdebug builds. ToDo: Wish to add Developer Options menu to turn this feature on or off, complicated by the fact that user builds have no tools with access rights to /data/misc/logd. Bug: 19608716 Change-Id: I57ad757f121c473d04f9fabe9d4820a0eca06f31
nit.rc
|
100658c303919d8f69c76f6f25eac376795712f0 |
26-May-2015 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: logd: Add logpersistd (nee logcatd) - logpersistd is defined as a thread or process in the context of the logd domain. Here we define logpersistd as logcat -f in logd domain and call it logcatd to represent its service mechanics. - Use logcatd to manage content in /data/misc/logd/ directory. - Only turn on for persist.logd.logpersistd = logcatd. - Add logpersist.start, logpersist.stop and logpersist.cat debug class executables, thus only in the eng and userdebug builds. ToDo: Wish to add Developer Options menu to turn this feature on or off, complicated by the fact that user builds have no tools with access rights to /data/misc/logd. Bug: 19608716 Change-Id: I57ad757f121c473d04f9fabe9d4820a0eca06f31
nit.rc
|
473a50f1687e8511ff9efcf370adfa68568669ab |
02-Jun-2015 |
Mark Salyzyn <salyzyn@google.com> |
rootdir: init.trace.rc too early (cherry pick from commit 89357d23a1d3166f0402734086da77805ca13617) debugfs is mounted on boot Bug: 21566233 Change-Id: I2ba106fbb1e8164ff3d8b2d5b16a16d7926c2732
nit.trace.rc
|
e8f74ae70686d3e7ab9448e2fd28892ab3add7ac |
02-Jun-2015 |
Mark Salyzyn <salyzyn@google.com> |
am c79daf52: am 1300b16e: am 66e39275: Merge "rootdir: init.trace.rc too early" * commit 'c79daf522566655c5e18a62c54ae484d14de5373': rootdir: init.trace.rc too early
|
c79daf522566655c5e18a62c54ae484d14de5373 |
02-Jun-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 1300b16e: am 66e39275: Merge "rootdir: init.trace.rc too early" * commit '1300b16e51045b0d1235cfaaa031228ded60924b': rootdir: init.trace.rc too early
|
89357d23a1d3166f0402734086da77805ca13617 |
02-Jun-2015 |
Mark Salyzyn <salyzyn@google.com> |
rootdir: init.trace.rc too early debugfs is mounted on boot Bug: 21566233 Change-Id: I2ba106fbb1e8164ff3d8b2d5b16a16d7926c2732
nit.trace.rc
|
0a423d994a0dbd05924ae6cff702b5d4d7dd43f0 |
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
DO NOT MERGE Securely encrypt the master key (chery-picked from commit 806d10be2336f32cdca16c2540cbf3d548f2fec7) Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I6a8a18f43ae837e330e2785bd26c2c306ae1816b
nit.rc
|
7cc023a7d59bef9e39ca374d5ba8c80e6f75cd7d |
29-May-2015 |
Tao Bao <tbao@google.com> |
am 6b0938f7: am 6484f3d1: Merge "Change pre-recovery into two services" into mnc-dev * commit '6b0938f7fb39ad4ad071c2b493545409a3d69f41': Change pre-recovery into two services
|
6b0938f7fb39ad4ad071c2b493545409a3d69f41 |
29-May-2015 |
Tao Bao <tbao@google.com> |
am 6484f3d1: Merge "Change pre-recovery into two services" into mnc-dev * commit '6484f3d1cb4078c7525e23d16c7e7bcd90afa653': Change pre-recovery into two services
|
6484f3d1cb4078c7525e23d16c7e7bcd90afa653 |
28-May-2015 |
Tao Bao <tbao@google.com> |
Merge "Change pre-recovery into two services" into mnc-dev
|
7c3f575c8a3e65340dc5d07701c7908ddb9b0907 |
28-May-2015 |
Than McIntosh <thanm@google.com> |
am a4fd555f: am 51f8aa27: am f166e38b: Merge "Move perfprofd to late_start class." * commit 'a4fd555fc9654ba18d947deb13edae303172d575': Move perfprofd to late_start class.
|
a4fd555fc9654ba18d947deb13edae303172d575 |
28-May-2015 |
Than McIntosh <thanm@google.com> |
am 51f8aa27: am f166e38b: Merge "Move perfprofd to late_start class." * commit '51f8aa27fdc5675cf0e621af6e14625a24720ff0': Move perfprofd to late_start class.
|
b37c45e90aa311b4d32a5b21dad5fce93c9761a7 |
27-May-2015 |
Than McIntosh <thanm@google.com> |
Move perfprofd to late_start class. Bug: http://b/19483574 Change-Id: I88649b50b95cbddb7d0671a5499232cbef156c48 (cherry picked from commit e8efd0d6bf41527d67a402ed3a945a8c5f75f10d)
nit.rc
|
e8efd0d6bf41527d67a402ed3a945a8c5f75f10d |
27-May-2015 |
Than McIntosh <thanm@google.com> |
Move perfprofd to late_start class. Bug: http://b/19483574 Change-Id: I88649b50b95cbddb7d0671a5499232cbef156c48
nit.rc
|
9f403450bcce9ef0ef99ff58b65eb3b1eedc6979 |
22-May-2015 |
Paul Lawrence <paullawrence@google.com> |
am ffdac6dd: am f0b318d6: am 7c789575: Merge "Revert "Set up crypto for user directories in init."" * commit 'ffdac6ddf2e13370674821159edd9663b5302707': Revert "Set up crypto for user directories in init."
|
ffdac6ddf2e13370674821159edd9663b5302707 |
22-May-2015 |
Paul Lawrence <paullawrence@google.com> |
am f0b318d6: am 7c789575: Merge "Revert "Set up crypto for user directories in init."" * commit 'f0b318d61cc129f4ddd25859500857b9f8e34e69': Revert "Set up crypto for user directories in init."
|
2e24bcfdce030d410cbc8e8c8fa3e8c1260ba65d |
22-May-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Set up crypto for user directories in init." Causes a boot loop in Shamu This reverts commit ce6f7160969e67c9caa486a6f249ab3e997c5f4c. Bug: 21396871 Change-Id: I9709053c589807d4530a3a99bd84e5b3177316cd
nit.rc
|
83e670e6871046f4c0bb19a28d82f811a163938f |
22-May-2015 |
Paul Crowley <paulcrowley@google.com> |
am e8cbb421: am 5f3c715e: am 7f623dec: Merge "Set up crypto for user directories in init." * commit 'e8cbb421cd28ec754923a88a919557ee5b174411': Set up crypto for user directories in init.
|
e8cbb421cd28ec754923a88a919557ee5b174411 |
21-May-2015 |
Paul Crowley <paulcrowley@google.com> |
am 5f3c715e: am 7f623dec: Merge "Set up crypto for user directories in init." * commit '5f3c715e1a8331f13ea39264b24dfc03ac8db060': Set up crypto for user directories in init.
|
ce6f7160969e67c9caa486a6f249ab3e997c5f4c |
06-May-2015 |
Paul Crowley <paulcrowley@google.com> |
Set up crypto for user directories in init. Depends on https://android-review.googlesource.com/#/c/147911/ Bug: 19704432 Change-Id: Ie59c6b67f73c1cadd86e69d3c9673ddaddb49a7e
nit.rc
|
e48aed0f0abd10cb21e14d81ae46214d08872f79 |
11-May-2015 |
Tao Bao <tbao@google.com> |
Change pre-recovery into two services /system/bin/uncrypt needs to be triggered to prepare the OTA package before rebooting into the recovery. Separate pre-recovery (uncrypt) into two services: uncrypt that does the uncryption work and pre-recovery that actually reboots the device into recovery. Also create /cache/recovery on post-fs in case it doesn't exist. Bug: 20012567 Bug: 20949086 Change-Id: If67fe1e9ee6279593d2788452febcd3f0fe714c2
nit.rc
|
7ae36219a311f4146d9f33f90dff7c0491e6467a |
13-May-2015 |
Terry Heo <terryheo@google.com> |
am e4c6666e: am 55431d97: Merge "rootdir: add permission for /dev/dvb*" into mnc-dev * commit 'e4c6666ea9477b34a535cf9208907277cefa1827': rootdir: add permission for /dev/dvb*
|
e4c6666ea9477b34a535cf9208907277cefa1827 |
13-May-2015 |
Terry Heo <terryheo@google.com> |
am 55431d97: Merge "rootdir: add permission for /dev/dvb*" into mnc-dev * commit '55431d97459210f0f4ac66538ca6cbf8cf3511e9': rootdir: add permission for /dev/dvb*
|
1f0dd2210b4a09fd6272289058a1a306da8ed34d |
12-May-2015 |
Kevin Cernekee <cernekee@google.com> |
ueventd.rc: Document the different rule formats for /dev and /sys nodes This was causing some confusion during shark bringup and we weren't able to find docs online, so let's add some hints at the top of the file in case it comes up again. Change-Id: Ica2cd8a0fb28efb99077fdc98673dbbdd6f58ff6 Signed-off-by: Kevin Cernekee <cernekee@google.com>
eventd.rc
|
0853afe8aaf46fcad2fda8fd99809a9bb0663ec2 |
07-May-2015 |
Dehao Chen <dehao@google.com> |
am 3ce52a57: am ac725c12: Add /data/misc/perfprofd to store perf profile. * commit '3ce52a57c5db5de2eff7cb14497279c7a6e157e8': Add /data/misc/perfprofd to store perf profile.
|
ed8ad5978939b5d41d9dd533c19a15dd3a805ccd |
07-May-2015 |
Nick Kralevich <nnk@google.com> |
am 0847d1bf: am 6ee69177: rootdir: make sure the /oem mountpoint is always available * commit '0847d1bf2f16aa7161c5b4a01272991500d8609e': rootdir: make sure the /oem mountpoint is always available
|
bf81356e22d2fc087ffb3b0f1c9fb816d3256896 |
08-Apr-2015 |
Terry Heo <terryheo@google.com> |
rootdir: add permission for /dev/dvb* Bug: 20112245 Change-Id: I513c6ed5b65d5bd4edef6cb12d7fc20eb9cad4f1
eventd.rc
|
3ce52a57c5db5de2eff7cb14497279c7a6e157e8 |
07-May-2015 |
Dehao Chen <dehao@google.com> |
am ac725c12: Add /data/misc/perfprofd to store perf profile. * commit 'ac725c12da8a67ca33d10c7b6131f8f543ed4449': Add /data/misc/perfprofd to store perf profile.
|
0847d1bf2f16aa7161c5b4a01272991500d8609e |
07-May-2015 |
Nick Kralevich <nnk@google.com> |
am 6ee69177: rootdir: make sure the /oem mountpoint is always available * commit '6ee6917757bd4b00437cabe07fbaa48ce2621b38': rootdir: make sure the /oem mountpoint is always available
|
ac725c12da8a67ca33d10c7b6131f8f543ed4449 |
06-May-2015 |
Dehao Chen <dehao@google.com> |
Add /data/misc/perfprofd to store perf profile. BUG: 19483574 (cherry picked from commit 30c401fa92f5a32a9a41024d9d1daddd1bc37ea5) Change-Id: Ibf96db9f7e5db625b395db20b73572acc240b1f9
nit.rc
|
577c1245aab095e390d35d02567804546bb030f9 |
06-May-2015 |
Nick Kralevich <nnk@google.com> |
Merge "Add /data/misc/perfprofd to store perf profile."
|
6ee6917757bd4b00437cabe07fbaa48ce2621b38 |
06-May-2015 |
Nick Kralevich <nnk@google.com> |
rootdir: make sure the /oem mountpoint is always available The /oem mount point is used to mount semi-trusted data, and many Android One devices depend on it. Make sure it's guaranteed to always be available. (cherrypicked from commit f3b554fc614fffaa5fc62ef1b4147131a8fa373c) Bug: 20816563 Change-Id: Ib5272f025d14d4da6125d753879054b3faeae696
ndroid.mk
|
f3b554fc614fffaa5fc62ef1b4147131a8fa373c |
06-May-2015 |
Nick Kralevich <nnk@google.com> |
rootdir: make sure the /oem mountpoint is always available The /oem mount point is used to mount semi-trusted data, and many Android One devices depend on it. Make sure it's guaranteed to always be available. Bug: 20816563 Change-Id: Ib5272f025d14d4da6125d753879054b3faeae696
ndroid.mk
|
30c401fa92f5a32a9a41024d9d1daddd1bc37ea5 |
06-May-2015 |
Dehao Chen <dehao@google.com> |
Add /data/misc/perfprofd to store perf profile. BUG: 19483574 Change-Id: Ib5eb9e789c063bd76d24181c4c03652f9ef12cb7
nit.rc
|
7d678d8d78b40c9c7697565637ba5e4dc81ec02f |
28-Apr-2015 |
Than McIntosh <thanm@google.com> |
Invoke perfprofd daemon (only for userdebug/eng builds). Change-Id: Ifaabe32dda6db249efc62c5db3760e32295eb1a9 (cherry picked from commit d6544d2a405df4c6e1fb517b1038a3640ae5f095)
nit.rc
|
b12facc2e295ebfcba34af61ca81d36523af26a2 |
02-May-2015 |
Elliott Hughes <enh@google.com> |
am d5fb597c: am 5ea5aaa5: am a668478e: Merge "Invoke perfprofd daemon (only for userdebug/eng builds)." * commit 'd5fb597c8d21215273e0c48b494a13f989c212dd': Invoke perfprofd daemon (only for userdebug/eng builds).
|
d5fb597c8d21215273e0c48b494a13f989c212dd |
02-May-2015 |
Elliott Hughes <enh@google.com> |
am 5ea5aaa5: am a668478e: Merge "Invoke perfprofd daemon (only for userdebug/eng builds)." * commit '5ea5aaa561fc011bf58332d48fb6bbf102cc40a4': Invoke perfprofd daemon (only for userdebug/eng builds).
|
dd764f5192d67ee6bd7ee79c4b0b4af5aa00ae9a |
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Fix whitespace Change-Id: If13df64f6ba61e0f8742e85a332dea7c5e7640af
nit.rc
|
b8fca94e81698229970124d7feba4242b4b504f3 |
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge commit '2fe6a631' into manualmerge Change-Id: Ib8d61ee25711e86a2df3705e87904a50c0ef5187
|
806d10be2336f32cdca16c2540cbf3d548f2fec7 |
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Securely encrypt the master key Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I6a8a18f43ae837e330e2785bd26c2c306ae1816b
nit.rc
|
658801ff9ff59ae0f6102a4e15bb3a07742d3d71 |
28-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
resolved conflicts for merge of 6a5244bc to mnc-dev-plus-aosp Change-Id: Ied1bbf09aeeed53daefb53c559498066abd9b767
|
2b3a4939463cb2eb6b65e416f6544a2e2d3bc29b |
28-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge "Revert "Securely encrypt the master key""
|
7ac2807546487de0cd74a8bbd976753c8f5862f3 |
28-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Securely encrypt the master key" This reverts commit 4bf1887c787a025aad2fbafe382e556e85ac73b0. Change-Id: Ie6d1f39de530b99b50a27ddc45bcc900a24e04b5
nit.rc
|
d6544d2a405df4c6e1fb517b1038a3640ae5f095 |
28-Apr-2015 |
Than McIntosh <thanm@google.com> |
Invoke perfprofd daemon (only for userdebug/eng builds). Change-Id: Ifaabe32dda6db249efc62c5db3760e32295eb1a9
nit.rc
|
7880f812f7f7f92db694963027b86716bcd5d777 |
27-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
resolved conflicts for merge of 72fad66f to mnc-dev-plus-aosp Change-Id: Ib6659a50ee3f1f1ac3719e5d3397c21f786b9afc
|
9234b169e62b10e38ecd3dc636ccccb425ea4eed |
27-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge "Securely encrypt the master key"
|
5cb4c8796cf43ddcb11ac5af8cc4bfe6be730154 |
24-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
Revert "STOPSHIP: WifiStateMachine logging temporarily disabled" This reverts commit 15ae6c2e7ce02db583ca5a6be5ca30499d56de87. Change-Id: I281a65209a5118a6c73ddec65ed40d149c23bf0b
nit.rc
|
b2beaf7b204952dc5f6447f75e9d247a895e8ed4 |
24-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
Merge "Revert "STOPSHIP: Additional Wifi logging temporarily disabled""
|
03c9267865d34cc4a233776dea03b967ac0b54da |
24-Apr-2015 |
Elliott Hughes <enh@google.com> |
am a8088f38: am ec389902: am 132440b0: Merge "Revert "Revert "Make init re-exec itself for its SELinux domain transition.""" * commit 'a8088f380932d873a39fafdd816f96328f7caa9c': Revert "Revert "Make init re-exec itself for its SELinux domain transition.""
|
ea782d327a3d959d93f2b23b85894aa392e64a2f |
24-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
Revert "STOPSHIP: Additional Wifi logging temporarily disabled" This reverts commit 18b1da2033440cf362ea5c71ca687d359671096f. Change-Id: I86cde061a36a9a9e43c8a5df2df1e853ed32b7a0
nit.rc
|
f65730e620dde083133b8c1ab61c0d07b4dd8c2f |
24-Apr-2015 |
Elliott Hughes <enh@google.com> |
Revert "Revert "Make init re-exec itself for its SELinux domain transition."" This reverts commit 4217374611ada50f33aee544f015f6f9dfbf7ced. It turns out that the kernel passes any unrecognized arguments on to init, and (at least) N6 and N9 have such arguments. My lazy check of argc was thus insufficient to recognize what stage of init we were in, so we'd skip to stage 2 and not set up SELinux. And apparently you can get a very long way with SELinux off... We'll fix that in a later change. Bug: 19702273 Change-Id: I43b3fb722fed35dd217cb529cbcac9a29aff4e4b
nit.rc
|
d6069e21ee5c6941844b31b29732f9ccb84304b5 |
24-Apr-2015 |
Nick Kralevich <nnk@google.com> |
am b706a8ac: am 2db3cd3e: am 46fee19c: Merge "Revert "Make init re-exec itself for its SELinux domain transition."" * commit 'b706a8acff9c62da7b4045374b93a8739671a8a0': Revert "Make init re-exec itself for its SELinux domain transition."
|
46fee19cb27dd24a58bbcad608058f25ca7b3e52 |
24-Apr-2015 |
Nick Kralevich <nnk@google.com> |
Merge "Revert "Make init re-exec itself for its SELinux domain transition.""
|
4217374611ada50f33aee544f015f6f9dfbf7ced |
24-Apr-2015 |
Nick Kralevich <nnk@google.com> |
Revert "Make init re-exec itself for its SELinux domain transition." shamu isn't booting. This reverts commit adf0d1bbfa4bc560c2106f14afa8258a11c48bf6. Change-Id: I89d568838cebbe14cc4a8ae3843f0f1ac54987af
nit.rc
|
8e9b756eab8ec3f91a4349e959e830535c6d6966 |
24-Apr-2015 |
Elliott Hughes <enh@google.com> |
am 77260323: am 20dfbb0f: am fa66b4e1: Merge "Remove long-obsolete file." * commit '77260323e2e99a996351a98a44ef56db5f1e2767': Remove long-obsolete file.
|
2a87d2b155e84424ec8b29ffbc8a409ee932f640 |
24-Apr-2015 |
Elliott Hughes <enh@google.com> |
Remove long-obsolete file. Change-Id: I728cc13b4a7ac93f9c923d2fc9bda2bb65ffe99d
tc/mountd.conf
|
45a2329b2d3e928d48f546d6d6822620e0dac057 |
24-Apr-2015 |
Elliott Hughes <enh@google.com> |
am 77434ab3: am ef68fd3f: am d4656784: Merge "Make init re-exec itself for its SELinux domain transition." * commit '77434ab362b3234accf16499aaf2a5340d568553': Make init re-exec itself for its SELinux domain transition.
|
d46567848bfcdc8f2cbc3faeef487cf5c770b43a |
24-Apr-2015 |
Elliott Hughes <enh@google.com> |
Merge "Make init re-exec itself for its SELinux domain transition."
|
7076796cab1ae275d9e9336f19e068abf28f946b |
24-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 44f1356e: am 85a9566f: am 76520752: Merge "rootfs: init.rc start logd parse error" * commit '44f1356e42a64fefb194b5c74b62402f4ec2881e': rootfs: init.rc start logd parse error
|
765207524fcbe261686c5d96bc42ea3dcc124f0a |
24-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
Merge "rootfs: init.rc start logd parse error"
|
adf0d1bbfa4bc560c2106f14afa8258a11c48bf6 |
23-Apr-2015 |
Elliott Hughes <enh@google.com> |
Make init re-exec itself for its SELinux domain transition. Change-Id: I38adabe5789d671e3f7d21936071a758ec8cea8a
nit.rc
|
4bf1887c787a025aad2fbafe382e556e85ac73b0 |
30-Mar-2015 |
Paul Lawrence <paullawrence@google.com> |
Securely encrypt the master key Remove unencrypted link since it is easier to manage directly Move creation of key to vold Start vold early so this is possible in a timely fashion This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/144586/ https://android-review.googlesource.com/#/c/144663/ https://android-review.googlesource.com/#/c/144672/ https://android-review.googlesource.com/#/c/144673/ Bug: 18151196 Change-Id: Idb17d1f1a724c6ec509d181ae4427113e9d3b5e6
nit.rc
|
18b1da2033440cf362ea5c71ca687d359671096f |
22-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
STOPSHIP: Additional Wifi logging temporarily disabled Bug: 20416721 Change-Id: I1be1c742f47f0e673eef6a8d391246f47c35c336
nit.rc
|
15ae6c2e7ce02db583ca5a6be5ca30499d56de87 |
22-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
STOPSHIP: WifiStateMachine logging temporarily disabled Bug: 20416721 Change-Id: Id60eb6ab77589ab50800532de0d2877adef1d5b7
nit.rc
|
5c39e0ada89de6a945ad3df0a0e6181fc3325cca |
20-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
rootfs: init.rc start logd parse error init: /init.rc: 490: invalid option 'start' Change-Id: Ica985e45d4652dab0ebd434803344f14cc73d834
nit.rc
|
1450586ffd1113baa80f415531fb1de378fc8037 |
20-Apr-2015 |
Nick Kralevich <nnk@google.com> |
create /data/misc/gatekeeper Change-Id: I7631401ac21b60a22f6fd4052814186bf3bc2b05
nit.rc
|
4e9da84be188d3ad49bc9306723448eccc061ad0 |
17-Apr-2015 |
Andres Morales <anmorales@google.com> |
Merge "Implement SID API"
|
6a49c2fa4371cad600f4a96da3d1644df862d2a5 |
16-Apr-2015 |
Andres Morales <anmorales@google.com> |
Implement SID API Change-Id: Id11632a6b4b9cab6f08f97026dd65fdf49a46491
nit.rc
|
b63190fda8ab7d4271380c6a8512411ec2910c7d |
15-Apr-2015 |
Vinit Deshpande <vinitd@google.com> |
am b4ef85c..b4ef85c from mirror-m-wireless-internal-release b4ef85c Add Bluetooth SAP UIM socket
|
13859d12309c86ca4423484cd07ca56a029064db |
13-Apr-2015 |
Neil Fuller <nfuller@google.com> |
am 90014d61: am 532d0a11: am 9b83b623: Merge "Executable to run on boot that removes old tzdata if needed" * commit '90014d61c83ef5105881c171481a50f21fd4dd57': Executable to run on boot that removes old tzdata if needed
|
08913228e17f4a16b6fbe77f9f08ca2a13323f5e |
31-Mar-2015 |
Neil Fuller <nfuller@google.com> |
Executable to run on boot that removes old tzdata if needed tzdatacheck is exec'd from init.rc early in boot just after /data is mounted. It checks to make sure that the tz rule data in /data is newer than the version in /system. If the data is older it is deleted. This is to address problems with earlier tz rule updates that occurred: after an OTA upgrade previous updates in /data would override newer versions in the system partition. Includes change to init.rc neccessary to run it at boot time. Other changes are in external/selinux. Bug: 19941636 Bug: https://code.google.com/p/android/issues/detail?id=35730 Change-Id: I7cc61e058424c856da88f11ff9b259f34cb39dc7
nit.rc
|
b4ef85c636390d54afcb0e3fbcafe687f050b2b5 |
10-Apr-2015 |
Dheeraj Shetty <dshetty@codeaurora.org> |
Add Bluetooth SAP UIM socket Change-Id: I1445e51f613ac3e21cf818c0b1364c334579593e
nit.rc
|
2d08dce0beedcfc63b2a837045d1be7d49157555 |
04-Apr-2015 |
Andres Morales <anmorales@google.com> |
GateKeeper proxy service Until we have SELinux support for gating access to individual TEE services, we will proxy TEE requests to GateKeeper via this daemon. Change-Id: Ifa316b75f75bff79bdae613a112c8c3c2e7189a8
nit.rc
|
6abe4295881c9ebd2baf12ea7443a15c9d59da29 |
08-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 4122304d: am 07e3ed46: am c19572fa: Merge "rootfs: init start logd in post-fs" * commit '4122304de3990ca1fca2790468fb8e9ddcca11f2': rootfs: init start logd in post-fs
|
124ff15bcaeded8b794e18bd1523e3affa97c386 |
08-Apr-2015 |
Mark Salyzyn <salyzyn@google.com> |
rootfs: init start logd in post-fs The earliest point we can start logd is after /system is mounted. Ideally on post-fs-system (does not exist), post-fs will do. As insurance, we will also make sure logd is started if a logd-reinit is requested. This results in logd starting at least 4 processes earlier than it does currently, with a tighter grouping of threads which means we are taking advantage of a lighter CPU load at the time, rather than taking cycles during heavy activity during core startup. Change-Id: If4f0bd3a53bb4c47500a54d741ca635d87c0c330
nit.rc
|
bd3212fd92470fa76577530fbc515c866755e722 |
08-Apr-2015 |
Nick Kralevich <nnk@google.com> |
am 5056cdcd: am 01190672: am de957955: Merge "Create /data/system/heapdump for system_server" * commit '5056cdcdde4901fe667522cfebf3e1f9e1af3b3b': Create /data/system/heapdump for system_server
|
9c0437fba7357ae4abe70b540468799df3bfdbd3 |
08-Apr-2015 |
Nick Kralevich <nnk@google.com> |
Create /data/system/heapdump for system_server Bug: 20073185 Change-Id: I6fd83d33da33d048fdd6b07fa1f675ecb4f4eb2c
nit.rc
|
ae0a5acc0e46df569b97a605246e59c6ea4821f8 |
06-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Mount point for expanded storage. Managed by vold. Bug: 19993667 Change-Id: I7957b44d37d6a1f572cbec515d03856a8ed54391
nit.rc
|
b8bd76b7cbfbc4b0d3b7d76070c9b53eec87c83a |
02-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge "Revert "Revert "Adding e4crypt support"""
|
c410b3bd63828730623b9c5ccf15242175ac3c10 |
26-Mar-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Revert "Adding e4crypt support"" Fix build break caused by original change This reverts commit 84b0bab58fcc7f225e9a17a15c531b0c2fc509c5. (cherry picked from commit bbb4c85bdcc9a1bce315ed9d61a228bb1b992a1c) Change-Id: If0ead0f2656b69f33f72c64b03a05784455a4143
nit.rc
|
25775e8e638d9d323c2dbac6d770092b920a5360 |
01-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Different blkid and fsck execution domains. Tell vold about which SELinux domains to use for different classes of devices. Also create a directory for vold to store private files. Bug: 19993667 Change-Id: Ib7bc80234f2b13a89b143bf90f147140109570cd
nit.rc
|
b8c9d273a07f3fc45780e763bb3f7f6266b8cab7 |
26-Mar-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Revert "Adding e4crypt support"" Fix build break caused by original change This reverts commit 84b0bab58fcc7f225e9a17a15c531b0c2fc509c5. Change-Id: I99fbd7c3d1ed92db1f546033c8493bb71a327924
nit.rc
|
fc0004894a3ff93382493688bb9ab9af83b74ea4 |
16-Mar-2015 |
Jeff Sharkey <jsharkey@android.com> |
Progress towards dynamic storage support. To support external storage devices that are dynamically added and removed at runtime, we're changing /mnt and /storage to be tmpfs that are managed by vold. To support primary storage being inserted/ejected at runtime in a multi-user environment, we can no longer bind-mount each user into place. Instead, we have a new /storage/self/primary symlink which is resolved through /mnt/user/n/primary, and which vold updates at runtime. Fix small mode bugs in FUSE daemon so it can be safely mounted visible to all users on device. Bug: 19993667 Change-Id: I0ebf4d10aba03d73d9a6fa37d4d43766be8a173b
nit.environ.rc.in
nit.rc
|
1ef8498d02a4fa762d24195deefe293556bc807b |
28-Mar-2015 |
Elliott Hughes <enh@google.com> |
am 4ce3c828: am 0cd316a4: am 5db3936d: Merge "Log more timing information from init." * commit '4ce3c8288ba030c2d2a80cf94ceb5d2f84a66d26': Log more timing information from init.
|
da40c00137f75543a69972f1be506e2d14a41845 |
28-Mar-2015 |
Elliott Hughes <enh@google.com> |
Log more timing information from init. Also make important events in init's life NOTICE rather than INFO, and ensure that NOTICE events actually make it to the kernel log. Also fix the logging so that if you have a printf format string error, the compiler now catches it. Also give messages from init, ueventd, and watchdogd distinct tags. (Previously they'd all call themselves "init", and dmesg doesn't include pids, so you couldn't untangle them.) Also include the tag in SELinux messages. Bug: 19544788 Change-Id: Ica6daea065bfdb80155c52c0b06f346a7df208fe
nit.rc
|
84b0bab58fcc7f225e9a17a15c531b0c2fc509c5 |
26-Mar-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Adding e4crypt support" This reverts commit 6095afc115fe3a4b7d151b4fcc164e00f9df9659. Change-Id: Icedfe0036223d7f42eaaefc4a35ad0f2efb14e4e
nit.rc
|
6095afc115fe3a4b7d151b4fcc164e00f9df9659 |
26-Feb-2015 |
Paul Lawrence <paullawrence@google.com> |
Adding e4crypt support Add file encryption flag to fstab. If file encryption flag set in fstab, handle identically to block encrypted volumes. Requires matching change: https://googleplex-android-review.git.corp.google.com/#/c/642778/ Change-Id: I28c236959f2d7d5f0dccc8ea45c325ea0cf871fc
nit.rc
|
e3b164d024a1f9a21731a42aff442bc575dc03a7 |
20-Mar-2015 |
Daniel Cardenas <danielcar@google.com> |
Merge "Revert "lowmemorykiller: make perms 0220""
|
429e7424f29ab42e10559340f31a64c25035ce4f |
20-Mar-2015 |
Daniel Cardenas <danielcar@google.com> |
Revert "lowmemorykiller: make perms 0220" This reverts commit b3739735b84a88cccfe08c0d69b1017a07004470. Values are helpful to inspect during memory performance tuning. b/19847626 Change-Id: I004ed37d5cc67e466c1fd1a84e47348524056e87
nit.rc
|
07d457c06c146cd1a6750412ab40b555e820e110 |
18-Mar-2015 |
Elliott Hughes <enh@google.com> |
am 169d029c: am 789c99a4: Merge "Switch init over to _PATH_DEFPATH." * commit '169d029c763a7e652e6d22ae42bb23707675541b': Switch init over to _PATH_DEFPATH.
|
cc86fb2b29b13570ff416d4590a8cab705b19ec3 |
18-Mar-2015 |
Elliott Hughes <enh@google.com> |
Switch init over to _PATH_DEFPATH. Bug: 19564110 Change-Id: I343b4a360b10319dca13ab01f2d411ff940e9052
nit.environ.rc.in
|
7ad506839a4ea39bb47f203cd1dcd21b9260b3a6 |
13-Mar-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 6025a2bc: am bd518bce: Merge changes I3187aa34,Iadac58e6 * commit '6025a2bc493534b3003ebd2ad7130366cf4f6723': init.rc: logd --reinit on changes to persistent properties logd: add reinit command
|
48d06069a8a6be3a968694dad65ce4c11b7bef22 |
11-Mar-2015 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: logd --reinit on changes to persistent properties Bug: 19681572 Change-Id: I3187aa348dae79fa5822ffb7ee9566919a7a04e6
nit.rc
|
87946e714b8efd4448efc90812306afbce62a8c7 |
27-Feb-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 20dc9c01: am 1dd71ae1: am f33c3bc9: Merge "init: drop dontpanic & apanic initialization" * commit '20dc9c01fabb33ed5a0e17b8efbdcdbe576c0941': init: drop dontpanic & apanic initialization
|
1dd71ae12e2e47c9ca63eb04878ee9632cc4417c |
27-Feb-2015 |
Mark Salyzyn <salyzyn@google.com> |
am f33c3bc9: Merge "init: drop dontpanic & apanic initialization" * commit 'f33c3bc9602e4a369c4cc5d28357b8f73a3eed6c': init: drop dontpanic & apanic initialization
|
1eaba37aae04ba3db65e4c3564192d53b2137bac |
27-Feb-2015 |
Mark Salyzyn <salyzyn@google.com> |
init: drop dontpanic & apanic initialization Bug: 19050686 Bug: 19525200 Change-Id: Id81abe3b44283b439390b42db7a9da23748dee0a
nit.rc
|
be95a75e6f9532bf78a4a8a408a7bf2f337a32d3 |
26-Feb-2015 |
Nick Kralevich <nnk@google.com> |
am 0a316829: am 398ade81: am 7bb72b73: Merge "seclabel use on services out of system partition" * commit '0a316829fb856f98d8db3ba78667feb19fb12e22': seclabel use on services out of system partition
|
398ade817b64308cabbf10883ab5a74e4850e43d |
26-Feb-2015 |
Nick Kralevich <nnk@google.com> |
am 7bb72b73: Merge "seclabel use on services out of system partition" * commit '7bb72b73b0291636721d83a45adad175163361ec': seclabel use on services out of system partition
|
2422c17c5e5dc4aaaaca6ec99953497d87091a50 |
24-Feb-2015 |
Narayan Kamath <narayan@google.com> |
Track removal of the inputflinger binary. Change-Id: Ie3c3e5a67e7dfac5bd1672da6979fb053e8483b9
nit.rc
|
6889007627fa0b50cb393c822e59f4f76d3883aa |
23-Feb-2015 |
William Roberts <w2.roberts@samsung.com> |
seclabel use on services out of system partition These services can make use of type transitions already present in the base policy. Change-Id: Id785c39c4ea44598c64dc499bd943c73bc55ca85
nit.rc
|
7630916fb86d87efc94df574c9a644903591e180 |
14-Feb-2015 |
Elliott Hughes <enh@google.com> |
am 9c1bc6bb: am 29576ae8: Merge "/vendor is sometimes on a separate partition now." * commit '9c1bc6bbc82e3e4f005e9fcacfca94b2dd82ca31': /vendor is sometimes on a separate partition now.
|
9c1bc6bbc82e3e4f005e9fcacfca94b2dd82ca31 |
14-Feb-2015 |
Elliott Hughes <enh@google.com> |
am 29576ae8: Merge "/vendor is sometimes on a separate partition now." * commit '29576ae8901eb95d4c8a34f242a282b2fb73d35f': /vendor is sometimes on a separate partition now.
|
3a5d71ac60ea1769aa5a0c4d0d76b08238392247 |
14-Feb-2015 |
Elliott Hughes <enh@google.com> |
/vendor is sometimes on a separate partition now. Change-Id: I3217c272ea38ab8212056e0432d0ededacd362f6
nit.rc
|
e6cc8012f5adadca867f5370d235525dff529091 |
12-Feb-2015 |
Elliott Hughes <enh@google.com> |
am 0903c13a: am 265df6f5: Merge "bootchart: fix bootchart can not be triggered problem" * commit '0903c13ade29e6eedecd198ac54131248a1818f3': bootchart: fix bootchart can not be triggered problem
|
0903c13ade29e6eedecd198ac54131248a1818f3 |
12-Feb-2015 |
Elliott Hughes <enh@google.com> |
am 265df6f5: Merge "bootchart: fix bootchart can not be triggered problem" * commit '265df6f50c508710f0b717d67650732baa906976': bootchart: fix bootchart can not be triggered problem
|
a197ff12dd336a9945ad1164402980296f9c235c |
05-Dec-2014 |
Yongqin Liu <yongqin.liu@linaro.org> |
bootchart: fix bootchart can not be triggered problem bootchart uses a file on the data partition to decide if it should collect data for bootchart, but the data partition will be mounted by the mount_all command in the "on fs" section, and it will be only added into the action queue when command "trigger fs" is executed, but that's after the bootchart_init action (late_init). This change makes bootchart_init a builtin command of init, and make it executed as the first command of "on post-fs" section which will be triggered after the "on fs" section. This change also refactors the bootchart code to all be in bootchart.cpp. Change-Id: Ia74aa34ca5b785f51fcffdd383075a549b2a99d9 Signed-off-by: Yongqin Liu <yongqin.liu@linaro.org>
nit.rc
|
d933fc0c05c9dff977ec6824cecb37e49a5b28ff |
09-Feb-2015 |
Paul Lawrence <paullawrence@google.com> |
am a1738915: am 317b4024: Revert "Make encryption configurable" * commit 'a1738915329e704ea52fc09c222bb4893e6e51df': Revert "Make encryption configurable"
|
a1738915329e704ea52fc09c222bb4893e6e51df |
07-Feb-2015 |
Paul Lawrence <paullawrence@google.com> |
am 317b4024: Revert "Make encryption configurable" * commit '317b4024a2a46b8c57abfa08f2a649df13572bd3': Revert "Make encryption configurable"
|
317b4024a2a46b8c57abfa08f2a649df13572bd3 |
06-Feb-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Make encryption configurable" This reverts commit bda6272446454886339841a62daaa1b66c07ad60. The original fix seems to have led to boot failures in QA. Rather than risk shipping, revert the change. Bug 18764230 reopened. Requires change https://googleplex-android-review.git.corp.google.com/#/c/629764/ Bug: 19278390 Bug: 19199624 Change-Id: I8b6ab585666f2b0f585ffb2a5f61ac2e3462e06e
nit.rc
|
0c713b52436674cac2cb4dc2bac50dfad31042a1 |
06-Feb-2015 |
Greg Hackmann <ghackmann@google.com> |
am 86cdce1a: am f52338fe: Merge "rootdir: enable armv8_deprecated swp hook" * commit '86cdce1aab39ddbb346e6f7be1ca86531970419f': rootdir: enable armv8_deprecated swp hook
|
86cdce1aab39ddbb346e6f7be1ca86531970419f |
06-Feb-2015 |
Greg Hackmann <ghackmann@google.com> |
am f52338fe: Merge "rootdir: enable armv8_deprecated swp hook" * commit 'f52338fe1e8f74123a895db591d6a2a53061a2b1': rootdir: enable armv8_deprecated swp hook
|
cee8757f921d5b74acbc29b37a1842041b27fb00 |
26-Jan-2015 |
Greg Hackmann <ghackmann@google.com> |
rootdir: enable armv8_deprecated swp hook The upstream kernel now includes support for emulating legacy AArch32 instructions on ARMv8 devices. By default this framework emulates deprecated instructions but not obsolete instructions. Android requires support for the obsolete SWP and SWPB instructions on all ARM devices, so override this default for the swp emulation hook. Change-Id: I82b9bdb564413ec7c1a101da75a9928aebe1606b Signed-off-by: Greg Hackmann <ghackmann@google.com>
nit.rc
|
07932da9118893563624116dad926d7c49c06424 |
31-Jan-2015 |
Nick Kralevich <nnk@google.com> |
am e1f62802: am d07555db: Merge "ensure /data/tombstones exists on all Android devices" * commit 'e1f62802f6bec8ecc89100a1bbbdc36b7d18985b': ensure /data/tombstones exists on all Android devices
|
e1f62802f6bec8ecc89100a1bbbdc36b7d18985b |
31-Jan-2015 |
Nick Kralevich <nnk@google.com> |
am d07555db: Merge "ensure /data/tombstones exists on all Android devices" * commit 'd07555dba01d64011b0d611dd6d3b197b216c163': ensure /data/tombstones exists on all Android devices
|
0359d778a564a5c63baba08a33484fb69eda4d1e |
31-Jan-2015 |
Nick Kralevich <nnk@google.com> |
ensure /data/tombstones exists on all Android devices /data/tombstones is referenced by core platform code, but is not guaranteed to exist on all Android devices. Move the directory creation out of device specific files and into the core init.rc file. Bug: https://code.google.com/p/android/issues/detail?id=93207 Change-Id: I94ae5199a6a32c4fe555ca994fc4a8345e0c9690
nit.rc
|
36d0eaecd7bd7970b91ac35d6753bf715097e3b9 |
21-Jan-2015 |
Paul Lawrence <paullawrence@google.com> |
Make encryption configurable Delay mounting encryptable but unencrypted volumes until we can check the ro.vold.forceencrypt flag, then optionally encrypt. Requires matching vold change from https://googleplex-android-review.git.corp.google.com/#/c/615309/ Bug: 18764230 Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
nit.rc
|
e5a84ce55e1a0b5d8a4eed2fd8c96d6579829b85 |
26-Jan-2015 |
Paul Lawrence <paullawrence@google.com> |
am 7e890a4d: am bda62724: Make encryption configurable * commit '7e890a4d32816d34b30fb5d1f651d966d64bbf36': Make encryption configurable
|
7e890a4d32816d34b30fb5d1f651d966d64bbf36 |
26-Jan-2015 |
Paul Lawrence <paullawrence@google.com> |
am bda62724: Make encryption configurable * commit 'bda6272446454886339841a62daaa1b66c07ad60': Make encryption configurable
|
bda6272446454886339841a62daaa1b66c07ad60 |
21-Jan-2015 |
Paul Lawrence <paullawrence@google.com> |
Make encryption configurable Delay mounting encryptable but unencrypted volumes until we can check the ro.vold.forceencrypt flag, then optionally encrypt. Requires matching vold change from https://googleplex-android-review.git.corp.google.com/#/c/615309/ Bug: 18764230 Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
nit.rc
|
f756cf143968e0c17b7992b9d850490e8c314bd6 |
15-Jan-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 8c7380b4: am 3802b5d4: Merge "rootdir: add pstore" * commit '8c7380b4761d5ca02d839ccd337014116134a5b8': rootdir: add pstore
|
01a805d2c2ae13279852fab6e21f6456f712b925 |
14-Jan-2015 |
Yabin Cui <yabinc@google.com> |
am 2cd0563c: am d3119b19: Merge "Add ip6-localhost to /system/etc/hosts." * commit '2cd0563c53c8aa566c924d389ff34d7c46ea43b7': Add ip6-localhost to /system/etc/hosts.
|
8c7380b4761d5ca02d839ccd337014116134a5b8 |
14-Jan-2015 |
Mark Salyzyn <salyzyn@google.com> |
am 3802b5d4: Merge "rootdir: add pstore" * commit '3802b5d4c5cb14864dcdd8820e9140b81a2d7d78': rootdir: add pstore
|
4b0313e4d39d4ce9c911907e0f1b34ab3b32dd58 |
15-Dec-2014 |
Mark Salyzyn <salyzyn@google.com> |
rootdir: add pstore /dev/pmsg0 used to record the Android log messages, then on reboot /sys/fs/pstore/pmsg-ramoops-0 provides a means to pull and triage user-space activities leading up to a panic. A companion to the pstore console logs. Change-Id: Id92cacb8a30339ae10b8bf9e5d46bb0bd4a284c4
nit.rc
eventd.rc
|
2cd0563c53c8aa566c924d389ff34d7c46ea43b7 |
14-Jan-2015 |
Yabin Cui <yabinc@google.com> |
am d3119b19: Merge "Add ip6-localhost to /system/etc/hosts." * commit 'd3119b1962ef5c0d15b9cc22beb9ded040b44dcb': Add ip6-localhost to /system/etc/hosts.
|
25147416bb105914c3cdf8fd65ca7cc20dae0f3e |
13-Jan-2015 |
Yabin Cui <yabinc@google.com> |
Add ip6-localhost to /system/etc/hosts. Bug: 18791191 Change-Id: Id7cad8cfccadeb319f0dc7dcba8148a457f9f87d
tc/hosts
|
f3fd1226e05c806dd4ad4552abf56bcac12efe5e |
03-Dec-2014 |
Greg Hackmann <ghackmann@google.com> |
init.rc: disable ICMP redirects Bug: 18604139 Change-Id: I4bf22d0029f8b03b0ef4329b7b8632d8e116c8e1 Signed-off-by: Greg Hackmann <ghackmann@google.com>
nit.rc
|
053ae648202121c38205671bdff642e7582c5e5a |
25-Nov-2014 |
Elliott Hughes <enh@google.com> |
am a0959e90: am 8eb770d3: Merge "Remove long-dead readtty." * commit 'a0959e90f550f06969c2e21a0858b8d4cb8d4228': Remove long-dead readtty.
|
a0959e90f550f06969c2e21a0858b8d4cb8d4228 |
25-Nov-2014 |
Elliott Hughes <enh@google.com> |
am 8eb770d3: Merge "Remove long-dead readtty." * commit '8eb770d37cd9470630fdbe496f22b7a04549fef7': Remove long-dead readtty.
|
b120134bd1db128d38eb9520a1db53ea5161b00a |
24-Nov-2014 |
Elliott Hughes <enh@google.com> |
Remove long-dead readtty. Change-Id: I15ae14542214a3802d43892da0d03cfb33e63c96
tc/init.testmenu
|
ac12f25004d728fe117c058446fccb0ca0a397c9 |
05-Nov-2014 |
Nick Kralevich <nnk@google.com> |
Ensure /data/adb exists automerge: 6672300 * commit '667230074b6e4e306a50d84a88a57bf4f1ec0291': Ensure /data/adb exists
|
667230074b6e4e306a50d84a88a57bf4f1ec0291 |
21-Oct-2014 |
Nick Kralevich <nnk@google.com> |
Ensure /data/adb exists Ensure that /data/adb always exists. This directory is used for writing adb debugging information when persist.adb.trace_mask is set. Bug: https://code.google.com/p/android/issues/detail?id=72895 (cherry picked from commit 89252ce31aacb27248e708b6487f730d3a024943) Change-Id: I44e01bee50125f4e6e5fff6e74c53bb2022ce355
nit.rc
|
aad358fbc19592cefc37160fb7e3901f732dc033 |
22-Oct-2014 |
Bill Yi <byi@google.com> |
Merge commit 'b2042f7263c7bbacc5115de4a42c5a96b64a06f2' into HEAD
|
268c887f0c689625701f1218d649217ebc887e15 |
21-Oct-2014 |
Nick Kralevich <nnk@google.com> |
am 147de7e1: am 37d70f53: am c0b4b8b0: Merge "Ensure /data/adb exists" * commit '147de7e147c9a85158f79b6aeffd87af6b921690': Ensure /data/adb exists
|
147de7e147c9a85158f79b6aeffd87af6b921690 |
21-Oct-2014 |
Nick Kralevich <nnk@google.com> |
am 37d70f53: am c0b4b8b0: Merge "Ensure /data/adb exists" * commit '37d70f53672c8878a5ce5506d6d89b851400f8e6': Ensure /data/adb exists
|
89252ce31aacb27248e708b6487f730d3a024943 |
21-Oct-2014 |
Nick Kralevich <nnk@google.com> |
Ensure /data/adb exists Ensure that /data/adb always exists. This directory is used for writing adb debugging information when persist.adb.trace_mask is set. Bug: https://code.google.com/p/android/issues/detail?id=72895 Change-Id: I9cee2a0202417ff72a5ede7742e25877f51732dd
nit.rc
|
e272a538dca3e02f452fd80d2bc0a793315fbd39 |
21-Oct-2014 |
Arve Hjønnevåg <arve@android.com> |
am 06850f9c: am b50d0cd5: Merge "rootdir: Make trusty version readable by dumpstate" into lmp-mr1-dev * commit '06850f9ccd9c7668a8ab80bdfea00c1b275b5af9': rootdir: Make trusty version readable by dumpstate
|
b50d0cd53f94b0c654e007464ec32396b0cb1aef |
20-Oct-2014 |
Arve Hjønnevåg <arve@android.com> |
Merge "rootdir: Make trusty version readable by dumpstate" into lmp-mr1-dev
|
7770252a84a0981d0e6b3d1b03376ddbecff9654 |
16-Oct-2014 |
Arve Hjønnevåg <arve@android.com> |
rootdir: Make trusty version readable by dumpstate Change-Id: I761650d286b454f1fe01a585e7cd6ec769bfc527
eventd.rc
|
976e1b64314d5e0f86221fdc2fb62605a9447ca7 |
07-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
Remove libsigchain from LD_PRELOADs Bug: 15345057 Bug: 15426766 (cherry picked from commit c9f9f35efa43b3ac75b1a7e76fe1071a2e9d52ea) Change-Id: If54e1aeaa1e2abe061ac19666af4f4e058b81df2
nit.environ.rc.in
|
484c55a5343828e3b22bf24414e0d3caf3b68f7c |
14-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
am b307dcd8: resolved conflicts for merge of 3f95c89d to lmp-mr1-dev-plus-aosp * commit 'b307dcd8715ea4ffa456d819e8e8812719d5e760': Remove libsigchain from LD_PRELOADs
|
b307dcd8715ea4ffa456d819e8e8812719d5e760 |
14-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
resolved conflicts for merge of 3f95c89d to lmp-mr1-dev-plus-aosp Change-Id: Iac27dc93675c3111129fc594eaaff7f1d6f5c26f
|
1e2bec489ca1e27bb4765aca947cd46f288eb9d9 |
14-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
resolved conflicts for merge of 3f95c89d to lmp-dev-plus-aosp Change-Id: I5184dcfa91a11a210c60e60a4fffc26d2c9f116f
|
49d1ba1743528ae492a24851e4632b0af5917ef5 |
08-Oct-2014 |
Riley Andrews <riandrews@google.com> |
am d1380d64: am 33b33549: Merge "Make the default cgroup, the foreground cgroup." into lmp-mr1-dev * commit 'd1380d645de163d34a6e590f82eb0ee40d51f408': Make the default cgroup, the foreground cgroup.
|
c9f9f35efa43b3ac75b1a7e76fe1071a2e9d52ea |
07-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
Remove libsigchain from LD_PRELOADs Bug: 15345057 Bug: 15426766 Change-Id: If0b7f59a59824e30aa0c33dad76c7a44932180de
nit.environ.rc.in
|
522d72b7020a7d2f975531c7214ff34225391aba |
04-Oct-2014 |
Riley Andrews <riandrews@google.com> |
Make the default cgroup, the foreground cgroup. All kernel services will now be in the same cgroup as foreground applications. This will now make kernel threads not implicitly higher priority than android foreground services. Bug 17681097 Change-Id: I28e81c7aade50428d5395df86f00ce01c1e7af02
nit.rc
|
157e3a4b22db530daea1c5fc1bfc5ae10484ca66 |
06-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
am 6ee5d62a: am 67479c97: am 24e3e831: am 7569b7b3: Merge "Add bootanimation to audio group so it can play boot sound" into lmp-dev * commit '6ee5d62ac00fa00d7b86072a7f19d58582a05d18': Add bootanimation to audio group so it can play boot sound
|
7569b7b39f4f12cc4e87525113c82dae65c0b250 |
06-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
Merge "Add bootanimation to audio group so it can play boot sound" into lmp-dev
|
7e58899bcfd83152581867b05bb012c5c4ec4b46 |
29-Sep-2014 |
Mike Lockwood <lockwood@google.com> |
Add bootanimation to audio group so it can play boot sound Bug: 17674304 Change-Id: I5d31bc024fa36fedac2c0ba5c4a8b100937183ad
nit.rc
|
ca8079fd05aa5a4c3cd87202ae0ca33832d3ed28 |
02-Oct-2014 |
Jesse Hall <jessehall@google.com> |
am 9ef98912: am 5a9d721b: am 10b13131: am c263e671: Merge "init.trace.rc: fix race condition with class_start core" into lmp-dev * commit '9ef989128059ce840178b8f19cde1183d32d9cee': init.trace.rc: fix race condition with class_start core
|
331a939bf8f966d80a2dbf5caf5741b2446bae1a |
30-Sep-2014 |
Fred Fettinger <fettinge@motorola.com> |
init.trace.rc: fix race condition with class_start core The systrace permissions from init.trace.rc and the "class_start core" which launches surfaceflinger are both in an "on boot" section. However, the init.trace.rc commands are parsed after all commands in init.rc. This means that "class_start core" is executed before the chmod command which allows processes to write to trace_marker. If any services execute their first trace command before the chmod occurs, then that service won't be able to write traces until the service is restarted. To fix this, run all of the init.trace.rc commands in the "early-boot" section to ensure they are completed first. Bug: 17612265 Change-Id: Ibf544762173d5ba98272c66ef485d8eab7d70bf3
nit.trace.rc
|
da0500426fbf60b13d26285b6d33178fc202d149 |
06-Sep-2014 |
Badhri Jagan Sridharan <badhri@google.com> |
am 37441496: am 97b536f1: init.usb.rc: Change product id to for add only config * commit '374414967a294db75c2706e691ba8b9af9aa1acb': init.usb.rc: Change product id to for add only config
|
97b536f1fbfd1fa711833b7dc92aed902dea4bdf |
05-Sep-2014 |
Badhri Jagan Sridharan <badhri@google.com> |
init.usb.rc: Change product id to for add only config Change product id from D002 to 4EE7 when adb is the only supported function Change-Id: I8f6bcb9a1dc5ea6da0493a2dd730f9ac1f0bed24
nit.usb.rc
|
074fc3ddfb8fc5676af24d366e071b6bca5614bf |
29-Aug-2014 |
Brian Carlstrom <bdc@google.com> |
am 68e0d185: am 24d2adba: am 188d4396: Merge "Change /dalvik-cache to be owned by root." * commit '68e0d185f4640a8e1dc7b6d1aad17b51a802de37': Change /dalvik-cache to be owned by root.
|
68e0d185f4640a8e1dc7b6d1aad17b51a802de37 |
29-Aug-2014 |
Brian Carlstrom <bdc@google.com> |
am 24d2adba: am 188d4396: Merge "Change /dalvik-cache to be owned by root." * commit '24d2adba7a2f9caa82a88be70ad2fe7397ab310a': Change /dalvik-cache to be owned by root.
|
c692410e1607a39cd6d55f4be8164fc630d9772c |
28-Aug-2014 |
Alex Light <allight@google.com> |
Change /dalvik-cache to be owned by root. Bug: 16875245 (cherry picked from commit 3878ebd72493427ea5537b36dfb9cd7cb38677bb) Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
nit.rc
|
3878ebd72493427ea5537b36dfb9cd7cb38677bb |
28-Aug-2014 |
Alex Light <allight@google.com> |
Change /dalvik-cache to be owned by root. Bug: 16875245 Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
nit.rc
|
22b27ad718418bc86a4d5232ea7b6d5866fc2c93 |
27-Aug-2014 |
Andres Morales <anmorales@google.com> |
am c28be8be: am 314313a9: Move bootanim and surfaceflinger to class core * commit 'c28be8be68a55a50f20b42101f0f33d558f8a548': Move bootanim and surfaceflinger to class core
|
314313a9915c9a274f580c0fcf535a4db2ba0a9a |
26-Aug-2014 |
Andres Morales <anmorales@google.com> |
Move bootanim and surfaceflinger to class core They have no dependencies on /data so can be started early. This permits us to unmount /data while bootanimation is running, allowing an uninterrupted first boot encryption sequence. Bug: 17260550 Change-Id: I323fe23e8cf488d8bc136387efdd9fcea96625eb
nit.rc
|
ad5b54aa6480b384f90ecb0acd9e2c6f30fd45c1 |
26-Aug-2014 |
Paul Lawrence <paullawrence@google.com> |
am a95e10fe: am a005e779: Merge "Enable not rebooting during default encryption" into lmp-dev * commit 'a95e10fe3187d1dd3fbbd01d6653d7d9c2f9fc4d': Enable not rebooting during default encryption
|
a005e7795e3dfb7cc0bd2bc65208d2490bfc89d8 |
25-Aug-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Enable not rebooting during default encryption" into lmp-dev
|
c23074f386ded6cd28b2f8ba2331814b7491c802 |
18-Aug-2014 |
Paul Lawrence <paullawrence@google.com> |
Enable not rebooting during default encryption Need to not set this property) during mount, since it can't be changed later (ro property) Also no reason to start class main on encryption cycle - we'll show surfaceflinger, which is enough UI for this short cycle. Bug: 17041092 Change-Id: Ica5339c54e45716d0fe20e23c0ab857f388d23ed
nit.rc
|
82b76249fbc339e82ab47a956f7e17160247e4c4 |
04-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove obsolete tcp buffer size system properties. Change-Id: If6fb6fdcf8975e6102e84594ee3f64a5be6166f6
nit.rc
|
4fe327b902a1d5ff48878c1801cce8cdbe718d31 |
19-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Merge "Remove inputflinger from init. DO NOT MERGE" into lmp-dev
|
1de92cffc7ac1e1654bdef5e3849fe542b1fd9fc |
19-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Remove inputflinger from init. DO NOT MERGE Change-Id: I6ae2815a0c3f6b9c69e712af3ed6ce9d455ef3d3
nit.rc
|
1fabc35cb51e6f019141c25430e4e285741625fd |
05-Aug-2014 |
Narayan Kamath <narayan@google.com> |
Export the new system_server classpath. bug: 16555230 Change-Id: I99d2d219b5bd6dc4807cb53e44dc5715cc0815b3
ndroid.mk
nit.environ.rc.in
|
67cb1aeaa5bb8dbd43d5a1bfb21d1a8c39822fb6 |
16-Jul-2014 |
Riley Andrews <riandrews@google.com> |
Remove the /dev/.booting file before triggering boot. On mako only, there is a race condition such that core + main services must be started after releasing ueventd (by removing /dev/.booting). bug 16304711 bug 16333352
nit.rc
|
d721f5fc21855fdf7dd36ff1ec8f9b46f6cc33d6 |
16-Jul-2014 |
Riley Andrews <riandrews@google.com> |
Remove the /dev/.booting file before triggering boot. On mako only, there is a race condition such that core + main services must be started after releasing ueventd (by removing /dev/.booting). bug 16304711 bug 16333352
nit.rc
|
80c7a5e8a861de42ddade15704f1785953cee345 |
12-Jul-2014 |
Riley Andrews <riandrews@google.com> |
Move unlink("/dev/.booting") until after filesystems are mounted. Move the unlink out of init.c and into init.rc, so that the file will be removed after all the filesystems with firmware are up. Change-Id: Ifdd5dd1e95d7e064dde5c80b70198882d949a710
nit.rc
|
9464e5a58da50f6cc3503020b38181150cfd01c4 |
12-Jul-2014 |
Riley Andrews <riandrews@google.com> |
Move unlink("/dev/.booting") until after filesystems are mounted. Move the unlink out of init.c and into init.rc, so that the file will be removed after all the filesystems with firmware are up. Change-Id: I7442df2042cc2788d0301f00e3c2fba7d6e0e1c7
nit.rc
|
ee0388e768bb27eb845809a0b3ba85f4f7f21885 |
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
am f89ddf76: am d05245a4: am c87237f5: Merge "restorecon_recursive /cache" * commit 'f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15': restorecon_recursive /cache
|
f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15 |
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
am d05245a4: am c87237f5: Merge "restorecon_recursive /cache" * commit 'd05245a4b10044670ed8456c5c869490fd90583f': restorecon_recursive /cache
|
b12e40da2526881c1730a3d3387556e4600c7040 |
08-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files." * commit '0a7b44d55b9e9d038de390457246ec7fd0999cad': Create a data directory for netd and other network-related files.
|
e1695914d55d9ced3645fc532191970c9450e9e9 |
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
restorecon_recursive /cache Make sure all files / directories within /cache are properly labeled, not just the directory itself. Addresses the following denial: type=1400 audit(0.0:26): avc: denied { getattr } for comm="Thread-85" path="/cache/lost+found" dev="mmcblk0p27" ino=11 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir Change-Id: I5937b30043efeb696ffaa77258b7294d20d1494e
nit.rc
|
cddb15b8a9057e7efacf2de9c9a6a887fd666663 |
08-Jul-2014 |
dcashman <dcashman@google.com> |
am b4e74db7: am 3fa71b8e: Merge "Remove sshd." * commit 'b4e74db79c9fda5e63ae49f299df3c0dd80a87f9': Remove sshd.
|
b4cbff47ad4c8f15213189959c2ea33cb0ee529f |
08-Jul-2014 |
dcashman <dcashman@google.com> |
Remove sshd. This may require changes to other code, such as fastbootd, which relies on this service. sshd is not currently, used, however, so this change will force any such code to be changed. Bug: 11594902 Change-Id: I07e52008290dab5825be2ad062cbe730fa7dff71
nit.rc
|
b46efdb08ef8a700654d28be94b90550b8d90822 |
08-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Create a data directory for netd and other network-related files. Allows the 'shell' group (which is what dumpstate uses) to read the files in this directory. Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
nit.rc
|
14253c1aab42e4e4ec4e68798c068436b4260288 |
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
Merge "init.rc: add seclabel to flash_recovery"
|
a1d97e5d1c15e0adf40b5853f2f85db7008baa77 |
08-Jul-2014 |
Nick Kralevich <nnk@google.com> |
init.rc: add seclabel to flash_recovery Make sure flash_recovery is always running in the install_recovery SELinux domain. Change-Id: I9495eedd03f6b5dfcf2e78c03d1102f6032b327a
nit.rc
|
85449d360f86ed9faaf1403f972f9657698a8289 |
08-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am b12e40da: am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files." * commit 'b12e40da2526881c1730a3d3387556e4600c7040': Create a data directory for netd and other network-related files.
|
9f3a11edde07af068217581cf11c004f1cdca3f0 |
08-Jul-2014 |
dcashman <dcashman@google.com> |
am cddb15b8: am b4e74db7: am 3fa71b8e: Merge "Remove sshd." * commit 'cddb15b8a9057e7efacf2de9c9a6a887fd666663': Remove sshd.
|
24912dc446439b0aaa1c3417a8159af758f76ff6 |
27-Jun-2014 |
Riley Andrews <riandrews@google.com> |
resolved conflicts for merge of fa6f2543 to master Change-Id: I04ce82e5d245e90e2cc62b76d688ec902c1a471d
|
fa6f25432b45958af870674529ce79e84986e0fa |
27-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am 23340d8a: am 10f8cd1d: Merge changes Ia15b2110,I5498c725 * commit '23340d8adac7bf68a6e47064ab7b48c1e227a077': Add ability to adjust init log level at runtime. Improve init's debug printing.
|
f67d6bd3c0fb41d167c675b9d2b5d377b6f38a74 |
26-Jun-2014 |
Daniel Rosenberg <drosen@google.com> |
Moved symlink back up. Moving the vendor symlink down was causing issues with some devices. Moved it back up, and adjusted mount to remove symlinks if necessary. Change-Id: I77126d77cfbef32250012bea3960c99b55db4cbb Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
|
1bbef88e8011805f7a3995a4d81928a853cb5cff |
26-Jun-2014 |
Riley Andrews <riandrews@google.com> |
Add ability to adjust init log level at runtime. + Add a new property, sys.init_log_level, which can be set after init bootstrap. This will control the level at which init does prints to klog. Change-Id: Ia15b2110157b5e6b713785ece9b0fb94889be6c8
nit.rc
|
f530c93c4aab818de51fd7123199bef6621047f8 |
28-May-2014 |
Daniel Rosenberg <drosen@google.com> |
Added support for vendor partition and image Modified fastboot to flash vendor.img as well. Moved symlink for /vendor to occur after mounting partitions. Changed mount to also create the mount point. Change-Id: I78e1ba24e6bb8b4af96a67ee0569af579439e682 Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
|
6bd4588d65977956cadf2e5d384673c64329c8e8 |
24-Jun-2014 |
Riley Andrews <riandrews@google.com> |
resolved conflicts for merge of 079c637f to master Change-Id: Iab9a857026de954d7497d6b0eaf3751d2d3904c7
|
079c637f3d269242bbc772b9207179b8cf56738a |
23-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am 5b45e08a: am 7950fc47: Merge "Add ability to boot from charger mode." * commit '5b45e08aabd6dcbab527d221584fe348c73c70d4': Add ability to boot from charger mode.
|
e4b7b294f37d9b64d6b7c1931e2c9bfb1a500d68 |
17-Jun-2014 |
Riley Andrews <riandrews@google.com> |
Add ability to boot from charger mode. Add the ability to boot up directly from charger mode, instead of forcing charger mode to initiate a full restart to launch 'full' android. This should shave a few seconds off of boot time on supported devices (just manta for now). Change-Id: Ieec4494d929e92806e039f834d78b9002afd15c4
nit.rc
|
aab0d57d18b202d059fec57c832d6443faff6ee3 |
20-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc" * commit '94fa20058fbd0e4f7e3c6d1381cdb9718dd90cde': Make indentation sane in init.rc
|
6dfdc7cd0c9d1b266b599b3ee7f5dd3a60e45c39 |
19-Jun-2014 |
Riley Andrews <riandrews@google.com> |
Make indentation sane in init.rc Change-Id: Ic632fbe1423eeef7ec958877d74db7b87fc385c6
nit.rc
|
53f24c2f940b946805821db1036466d95061b1e1 |
20-Jun-2014 |
Riley Andrews <riandrews@google.com> |
am aab0d57d: am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc" * commit 'aab0d57d18b202d059fec57c832d6443faff6ee3': Make indentation sane in init.rc
|
fd9cfb4c226fe76b50d828c737e7664d8b04a59b |
19-Jun-2014 |
Ying Wang <wangying@google.com> |
am 68d97430: am 4924d10a: Merge "Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed." * commit '68d97430dd2cc25bb753df748d859415520a7dcb': Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed.
|
2359b3c1621ff9af7fe2fb3d7f0707ef2efe2440 |
14-Jun-2014 |
Ying Wang <wangying@google.com> |
Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed. (cherry picked from commit 7011a85606bfdeefbd5f8db668c69b61e8d612a5) Change-Id: I025fe1f64c87fd406b3a3bf3d20fd3b78be8a940
ndroid.mk
|
7011a85606bfdeefbd5f8db668c69b61e8d612a5 |
14-Jun-2014 |
Ying Wang <wangying@google.com> |
Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed. Change-Id: I4686c1239aa5ed361c918ce4e7a5abf9a1552ab4
ndroid.mk
|
8ffe8eac5b4f04ce82ae553f2155959a8b165a61 |
13-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am f8cb68e1: am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles" * commit 'f8cb68e15ba242200e3525fffa2f969960e18a50': Create /data/dalvik-cache/profiles
|
f8cb68e15ba242200e3525fffa2f969960e18a50 |
13-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles" * commit '3bff77a8f90e673dbf41d97b7b842a3e4a6986bf': Create /data/dalvik-cache/profiles
|
511998fcdb3d35847f1222aec956e6ac6f5a17ba |
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 44aadc4d: am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell" * commit '44aadc4daf926155bf06bcf9d8f2daa96f861cdf': make console shell run as GID=shell
|
44aadc4daf926155bf06bcf9d8f2daa96f861cdf |
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell" * commit '1eebf538d3e5465bbec84d86017bb9ca250a052b': make console shell run as GID=shell
|
f2cb352412252f8e609986520cff830096248b9f |
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
make console shell run as GID=shell Change-Id: I240bec07b04de1b26eef14e4f590af56c1aaa276
nit.rc
|
875dc8f3f31fe9f5ee42d900737149bdeb95f1c7 |
13-Jun-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Create /data/dalvik-cache/profiles"
|
347ee511e44a4b6419c144917e079c78fde46f32 |
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
Create /data/dalvik-cache/profiles Make sure /data/dalvik-cache/profiles gets the correct permissions and SELinux context, and ownership is properly assigned to the system UID. Change-Id: Ic1b44009faa30d704855e97631006c4b990a4ad3
nit.rc
|
a54b7ca1565d314c88eb31e1f2375948b3c5616a |
05-Jun-2014 |
Robin Lee <rgl@google.com> |
am b7c07da2: am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory" * commit 'b7c07da2f4606ca36b93c2b9221e43e6ebe68831': Create world-searchable /data/misc/user directory
|
b7c07da2f4606ca36b93c2b9221e43e6ebe68831 |
05-Jun-2014 |
Robin Lee <rgl@google.com> |
am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory" * commit '33154817e274a4c7c381e2f5ef73ead7093e3985': Create world-searchable /data/misc/user directory
|
46fbaf062fd94e3fecc7165f4b42d42145e0603d |
05-Jun-2014 |
Robin Lee <rgl@google.com> |
Merge "Create world-searchable /data/misc/user directory"
|
664bdde0f1dd43c838dc65f30d3caa9fc85a754b |
29-May-2014 |
Dave Allison <dallison@google.com> |
am 01546ff2: am dec41a38: am 967729b7: Merge "Add LD_PRELOAD for libsigchain.so to the environment" * commit '01546ff208cec5ac15f81cc84f507fb8c9a51d98': Add LD_PRELOAD for libsigchain.so to the environment
|
01546ff208cec5ac15f81cc84f507fb8c9a51d98 |
29-May-2014 |
Dave Allison <dallison@google.com> |
am dec41a38: am 967729b7: Merge "Add LD_PRELOAD for libsigchain.so to the environment" * commit 'dec41a388d58ae515c83df4ec084c1e38edb427a': Add LD_PRELOAD for libsigchain.so to the environment
|
dec41a388d58ae515c83df4ec084c1e38edb427a |
29-May-2014 |
Dave Allison <dallison@google.com> |
am 967729b7: Merge "Add LD_PRELOAD for libsigchain.so to the environment" * commit '967729b7ca675d6f2c895a1bd56216a62b217e50': Add LD_PRELOAD for libsigchain.so to the environment
|
967729b7ca675d6f2c895a1bd56216a62b217e50 |
29-May-2014 |
Dave Allison <dallison@google.com> |
Merge "Add LD_PRELOAD for libsigchain.so to the environment"
|
e7fd4078a225fdfa92edcb6be6d79ba2fd6e8eb9 |
28-May-2014 |
Nick Kralevich <nnk@google.com> |
am 7206eccb: am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict" * commit '7206eccbd904508a199c7ec302d7395b3b674968': Remove dmesg_restrict
|
f9ff246dd7d4d44ad65d7f9690780eddaf74bde0 |
28-May-2014 |
Torne (Richard Coles) <torne@google.com> |
am 4f3ad823: am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support." * commit '4f3ad823eaf97fcbcbb1afac67371aff76677b1d': Add UID and directory for RELRO sharing support.
|
7206eccbd904508a199c7ec302d7395b3b674968 |
28-May-2014 |
Nick Kralevich <nnk@google.com> |
am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict" * commit 'c4ffa5f62ef256ff286122d0ceea61364aa67e13': Remove dmesg_restrict
|
c4ffa5f62ef256ff286122d0ceea61364aa67e13 |
28-May-2014 |
Nick Kralevich <nnk@google.com> |
am c290bed0: Merge "Remove dmesg_restrict" * commit 'c290bed0350cded5620ed8dbb68b1cfb07d9828c': Remove dmesg_restrict
|
c290bed0350cded5620ed8dbb68b1cfb07d9828c |
28-May-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Remove dmesg_restrict"
|
4f3ad823eaf97fcbcbb1afac67371aff76677b1d |
28-May-2014 |
Torne (Richard Coles) <torne@google.com> |
am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support." * commit 'a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9': Add UID and directory for RELRO sharing support.
|
a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9 |
28-May-2014 |
Torne (Richard Coles) <torne@google.com> |
am 96109cf3: Merge "Add UID and directory for RELRO sharing support." * commit '96109cf36c3dd44e9ecfe4b810e21e77eaf834dc': Add UID and directory for RELRO sharing support.
|
1a6184baf3e01bf7786fb14de4216bcb4e3b2f70 |
28-May-2014 |
Nick Kralevich <nnk@google.com> |
Remove dmesg_restrict dmesg_restrict is too coarse of a control. In Android's case, we want to allow the shell user to see dmesg output, but disallow others from seeing it. Rather than rely on dmesg_restrict, use SELinux to control access to dmesg instead. See corresponding change in external/sepolicy . Bug: 10020939 Change-Id: I9d4bbbd41cb02b707cdfee79f826a39c1ec2f177
nit.rc
|
234f696ea7f97dc489290827c1c68f26279de294 |
22-May-2014 |
Torne (Richard Coles) <torne@google.com> |
Add UID and directory for RELRO sharing support. Define a UID to be used by the process responsible for creating shared RELRO files for the WebView native library, and create a directory owned by that UID to use to store the files. Bug: 13005501 Change-Id: I5bbb1e1035405e5534b2681f554fe16f74e3da1a
nit.rc
|
ef386b3fb01b7458f2dcf11c9be7bd099f0ea2ed |
27-May-2014 |
Narayan Kamath <narayan@google.com> |
am b5d6c188: am 9196f5f2: am 5fe6fcc3: Merge "Add a zygote 64/32 bit config." * commit 'b5d6c18859424d86339ce895a42084a9c08552fd': Add a zygote 64/32 bit config.
|
b5d6c18859424d86339ce895a42084a9c08552fd |
27-May-2014 |
Narayan Kamath <narayan@google.com> |
am 9196f5f2: am 5fe6fcc3: Merge "Add a zygote 64/32 bit config." * commit '9196f5f2df7890100e8968983680e196e944bd05': Add a zygote 64/32 bit config.
|
9196f5f2df7890100e8968983680e196e944bd05 |
27-May-2014 |
Narayan Kamath <narayan@google.com> |
am 5fe6fcc3: Merge "Add a zygote 64/32 bit config." * commit '5fe6fcc35d10c88dd55213dc5b2303ea73c1883b': Add a zygote 64/32 bit config.
|
373d9fa0824226c721c7b0c07952ebe3e3af770e |
10-Mar-2014 |
Jaewan Kim <jaewan@google.com> |
Support static IP config on Ethernet Bug: 7606609 Bug: 8687763 Change-Id: I1d76b5783e8511a8e3f5d981e6b4b9fb4fbecdf4
nit.rc
|
7cdbbcabda9906910548954f0a35cdea366ef467 |
21-May-2014 |
Narayan Kamath <narayan@google.com> |
Add a zygote 64/32 bit config. 64 bit zygote is the "primary" and the system server is run as a 64 bit process. Change-Id: Ie1c2b0809faa92937bc407dd66e7a606ebb4f8f3
nit.zygote64_32.rc
|
50b6a4b1b7f5b4484bccbabf2a8057bf860f8c59 |
16-May-2014 |
Dave Allison <dallison@google.com> |
Add LD_PRELOAD for libsigchain.so to the environment To remove the need to modify the bionic dynamic linker, add the signal chaining library as a preload in the environment. This will be picked up by the dynamic linker and will override sigaction and sigprocmask to allow for signal chaining. Change-Id: I6e2d0628b009bd01e0ed9aed0b311871b9c8363a
nit.environ.rc.in
|
8c56cebd4450d5149828216291eb70d4d53aeb2b |
15-May-2014 |
Narayan Kamath <narayan@google.com> |
am 08a15076: am a5f7aca8: am 75a8eeb1: Merge "Change app_process reference to app_process32." * commit '08a1507603d63f07cfce65ead701330e1fe89894': Change app_process reference to app_process32.
|
08a1507603d63f07cfce65ead701330e1fe89894 |
15-May-2014 |
Narayan Kamath <narayan@google.com> |
am a5f7aca8: am 75a8eeb1: Merge "Change app_process reference to app_process32." * commit 'a5f7aca82e63942e9449804fd11eb11aec710419': Change app_process reference to app_process32.
|
a5f7aca82e63942e9449804fd11eb11aec710419 |
15-May-2014 |
Narayan Kamath <narayan@google.com> |
am 75a8eeb1: Merge "Change app_process reference to app_process32." * commit '75a8eeb1ecf9f748b1d53e5ff3a5e138a0cdbebd': Change app_process reference to app_process32.
|
75a8eeb1ecf9f748b1d53e5ff3a5e138a0cdbebd |
15-May-2014 |
Narayan Kamath <narayan@google.com> |
Merge "Change app_process reference to app_process32."
|
066c9b5a005fdb84ea72a6d27a40ab5bf5e6f0e2 |
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 9743f097: am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets." * commit '9743f09724162186fb280627c3c125a55534a219': Introduce fwmarkd: a service to set the fwmark of sockets.
|
9743f09724162186fb280627c3c125a55534a219 |
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets." * commit '09eaad793a8cec9196255d740ecb89a1426c0bf7': Introduce fwmarkd: a service to set the fwmark of sockets.
|
e38d4707141174a8c211d5cb01ff78da8ef1baff |
11-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Introduce fwmarkd: a service to set the fwmark of sockets. (cherry picked from commit d5121e212c1f53b1cb6458ee83be892d94fdfef3) Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
nit.rc
|
b4932d592f1b6a7d44804a7aed04f1d21286ae8a |
14-May-2014 |
Narayan Kamath <narayan@google.com> |
Change app_process reference to app_process32. Required due to change 5a7ee9ad63 which makes app_process a symlink to the primary zygote. Change-Id: I940f6302db97f74dd57112e310014e989dc586e5
nit.zygote32_64.rc
|
76202a2dfaeb9ec6a23dfbc4a382b65820a52132 |
11-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Introduce fwmarkd: a service to set the fwmark of sockets. Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
nit.rc
|
3c1c730f206d1d2dc25ac555d48513d6a3e5fb7f |
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am ca61b484: am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs." * commit 'ca61b484b6eb1bf92b05bc5386668ec51999e55a': Set kernel proc files for fwmark reflection and table numbers for RAs.
|
ca61b484b6eb1bf92b05bc5386668ec51999e55a |
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs." * commit 'b8cfcf3d9beb6ae09512941a182c326723b3ef41': Set kernel proc files for fwmark reflection and table numbers for RAs.
|
b8cfcf3d9beb6ae09512941a182c326723b3ef41 |
14-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs." * commit '32e4479d5535887d03625b43b7e3574b458dfc8d': Set kernel proc files for fwmark reflection and table numbers for RAs.
|
fd94922329a83c257dd8c65a4b1417a24d67db88 |
10-Apr-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Set kernel proc files for fwmark reflection and table numbers for RAs. (cherry picked from commit 2c2807ac1041751583e0c3b6892ca56eae423fa2) Change-Id: I5f0d759cb9b8590555af7f5503f00d3e455ece54
nit.rc
|
f74cb9534914bd0cb99573b976bead9e3689216c |
01-May-2014 |
Ruchi Kandoi <kandoiruchi@google.com> |
am 57569b3d: am 1abf4918: am c7580819: Merge "ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq" * commit '57569b3d3cea0b2096a15e8d25b41df9f836fd08': ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq
|
57569b3d3cea0b2096a15e8d25b41df9f836fd08 |
01-May-2014 |
Ruchi Kandoi <kandoiruchi@google.com> |
am 1abf4918: am c7580819: Merge "ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq" * commit '1abf49180acece56ff7573d53b65c6a28d2a4cb2': ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq
|
1abf49180acece56ff7573d53b65c6a28d2a4cb2 |
01-May-2014 |
Ruchi Kandoi <kandoiruchi@google.com> |
am c7580819: Merge "ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq" * commit 'c7580819934b85e93f58001f9b59b12712bb61b8': ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq
|
75b287b771b302c99797d812122b72f83d2f56f9 |
30-Apr-2014 |
Ruchi Kandoi <kandoiruchi@google.com> |
ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq The owner and permissions for the sysfs file /sys/devices/system/cpu*/cpufreq/scaling_max/min_freq is changed. This would allow the PowerHAL to change the max/min cpufreq even after the associated CPU's are hotplugged out and back in. Change-Id: Ibe0b4aaf3db555ed48e89a7fcd0c5fd3a18cf233 Signed-off-by: Ruchi Kandoi <kandoiruchi@google.com>
eventd.rc
|
1333e012ee65fef59f5f43f33744230574dfc2a2 |
30-Apr-2014 |
Bill Yi <byi@google.com> |
Merge commit '4102af05a86aae36d2560fd8b3f740a52399342c' into HEAD
|
3094f82a8a4d4b8d2725df85a6af9d306b9f8800 |
25-Apr-2014 |
Robin Lee <rgl@google.com> |
Create world-searchable /data/misc/user directory installd will create a separate subdirectory for each user. Change-Id: I95ec09169ea70f35443bbb3209237611e174ca29
nit.rc
|
0aee64f614d5eae0e50f5e24a1c790dd172b663f |
17-Apr-2014 |
Paul Lawrence <paullawrence@google.com> |
Make Volantis devices encryptable Volantis SurfaceFlinger holds open a file on data partition. SurfaceFlinger is not running when we trigger_default_encryption but if we start it before starting defaultcrypto it locks open data, so we can't unmount it. It will start anyway when main starts, so not starting it here is safe - it will just cause a 1-2 second delay in the graphics appearing. Change-Id: Idd546a578e62a24f999367b1407b37ad0f00f3a2
nit.rc
|
e29590b08bce1667c6bddebeb80991b7d16344c4 |
18-Apr-2014 |
JP Abgrall <jpa@google.com> |
am 46e6b4f7: am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks" * commit '46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e': rootdir: init.rc: update max TCP window sizes for mobile networks
|
46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e |
18-Apr-2014 |
JP Abgrall <jpa@google.com> |
am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks" * commit 'b0397d55a2ff4b3c6664c9545be18ba88c07dea4': rootdir: init.rc: update max TCP window sizes for mobile networks
|
ce898489e4ff2567b297c8f8776504b9924f432a |
24-Mar-2014 |
Narayan Reddy <narayanr@nvidia.com> |
rootdir: init.rc: update max TCP window sizes for mobile networks GRPS: RTT=600ms, max tput=80kbps (class 12 GMSK 4+1) EDGE: RTT=300ms, max tput=236kbps (class 12 8PSK) UMTS: RTT=200ms, max tput=384kbps (R99) HSDPA: RTT=75ms, max tput=14Mbps (cat 10) HSUPA: RTT=50ms, max tput=14Mbps HSPA: RTT=50ms, max tput=14Mbps HSPA+: RTT=50ms, max tput=42Mbps (cat 20) LTE: RTT=20ms, max tput=100Mbps (class 3) bug 67569 Change-Id: I9d62359bbd11dc68e3649a7ea2295d0d4e25e3f2 Signed-off-by: Narayan Reddy <narayanr@nvidia.com> Signed-off-by: Steve Lin <stlin@nvidia.com>
nit.rc
|
391224c807d2e28e55817b53ff3a30e57d08e996 |
11-Apr-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Fix forceencrypt"
|
7bd273e04e77a60598d26a358861568fe11f8efc |
11-Apr-2014 |
Narayan Kamath <narayan@google.com> |
am d85efaa0: am a73f7e92: am 822b1a02: Merge "Add a config for dual mode zygote." * commit 'd85efaa068708b19db3cc647ba62c0a2feb7da23': Add a config for dual mode zygote.
|
d85efaa068708b19db3cc647ba62c0a2feb7da23 |
11-Apr-2014 |
Narayan Kamath <narayan@google.com> |
am a73f7e92: am 822b1a02: Merge "Add a config for dual mode zygote." * commit 'a73f7e924abb8e7b1aa3f0d64d0177ce7d1c58e6': Add a config for dual mode zygote.
|
822b1a024d058641be9aefa14da794f09755ce35 |
11-Apr-2014 |
Narayan Kamath <narayan@google.com> |
Merge "Add a config for dual mode zygote."
|
f24aab7d744b708a897e70e2cbdb76a81bc069b7 |
10-Apr-2014 |
Paul Lawrence <paullawrence@google.com> |
Fix forceencrypt When changing vdc cryptfs enablecrypto inplace default in https://googleplex-android-review.git.corp.google.com/#/c/445001/ forgot to change init.rc Change-Id: I2a937d3c302ab8eab4829a36101145d6fe726ab1
nit.rc
|
468b37c106e3a0efa926de24c2690d6db2819bc0 |
02-Apr-2014 |
Narayan Kamath <narayan@google.com> |
Add a config for dual mode zygote. Note that init.zygote64.rc, which supports a "pure" 64 bit zygote is around only for testing. The life cycles of both zygotes are controlled by init, and the assumption here is that they will be available always. We start the system_server in 32 bit mode. Note that the distinction between "primary" and "secondary" simply defines the order in which ABI support is queried, there's no real requirement that the primary zygote supports the primary ABI of the device. bug: 13647418 Change-Id: Id0be001ea6f934c3c2022d89a63aae9fae66cc38
nit.zygote32_64.rc
|
11673a03e05c21bd254868466e6736b02ef1097e |
09-Apr-2014 |
dcashman <dcashman@google.com> |
am 8b4ea5a4: am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary." * commit '8b4ea5a49dda2767af87604713053e1bc418e96f': Enable world-readable selinuxfs policy binary.
|
8b4ea5a49dda2767af87604713053e1bc418e96f |
09-Apr-2014 |
dcashman <dcashman@google.com> |
am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary." * commit '39a5b812904ec13390d6261bafccf823729ae21d': Enable world-readable selinuxfs policy binary.
|
5822a4af8406fb6e9ecc675297af19852b378ca0 |
26-Mar-2014 |
dcashman <dcashman@google.com> |
Enable world-readable selinuxfs policy binary. Change-Id: I1eefb457cea1164a8aa9eeb7683b3d99ee56ca99
nit.rc
|
dc9af896f011698949cf9237094e52eaec9d4e8e |
01-Apr-2014 |
Narayan Kamath <narayan@google.com> |
resolved conflicts for merge of 6a949b45 to master Change-Id: Ie123b4fff76ef43e2b1c0583731e88997504320e
|
6a949b45e9166bcd4fc4b18e795085126a937c7b |
01-Apr-2014 |
Narayan Kamath <narayan@google.com> |
am ffca173c: am 5da2dbbc: Merge "Move zygote init config to its own file." * commit 'ffca173c853a2e312610d87f40957f696ac8364a': Move zygote init config to its own file.
|
5da2dbbc935356f526cdfb0b522b332fc8b95fc7 |
01-Apr-2014 |
Narayan Kamath <narayan@google.com> |
Merge "Move zygote init config to its own file."
|
788b27226851160170ee28f7f833dd21b10222e4 |
31-Mar-2014 |
Greg Hackmann <ghackmann@google.com> |
am ae66fbbe: am 697bdc60: am a740b3bb: Merge "rootdir: reduce permissions on /dev/rtc0" * commit 'ae66fbbe0e747cb2485bac0fa47c9223268a2fc9': rootdir: reduce permissions on /dev/rtc0
|
ae66fbbe0e747cb2485bac0fa47c9223268a2fc9 |
31-Mar-2014 |
Greg Hackmann <ghackmann@google.com> |
am 697bdc60: am a740b3bb: Merge "rootdir: reduce permissions on /dev/rtc0" * commit '697bdc604e8f266ebd6c94fc84eb5057b1a700e3': rootdir: reduce permissions on /dev/rtc0
|
a740b3bb409c9acdf4cf6a829b982e57a89d08de |
31-Mar-2014 |
Greg Hackmann <ghackmann@google.com> |
Merge "rootdir: reduce permissions on /dev/rtc0"
|
4456a55ce69cd5b8ad39349ed55d3efc3512bffa |
31-Mar-2014 |
Narayan Kamath <narayan@google.com> |
Move zygote init config to its own file. This allows us to choose different configs depending on whether or not the target is 64 capable, and what its preferred default is. bug: 13647418 Change-Id: Ie1ce4245a3add7544c87d27c635ee390f4062523
nit.rc
nit.zygote32.rc
nit.zygote64.rc
|
b34fed34afbc3288d22dad92226650f600d15f71 |
27-Mar-2014 |
Greg Hackmann <ghackmann@google.com> |
rootdir: reduce permissions on /dev/rtc0 Remove world-readable, reduce group permissions to readable by system daemons Change-Id: I6c7d7d78b8d8281960659bb8490a01cf7fde28b4 Signed-off-by: Greg Hackmann <ghackmann@google.com>
eventd.rc
|
5c789b8a31a1924a346b1485410b692b82781406 |
24-Mar-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Auto-encrypt drive at startup"
|
166fa3de7060198252b43a4a9ddd841fb6d65cf7 |
03-Feb-2014 |
Paul Lawrence <paullawrence@google.com> |
Auto-encrypt drive at startup Modify fs_mgr to unmount encryptable drives after test mounting them and then trigger an auto-encrypt via the init script Needs matching vold changes from https://googleplex-android-review.googlesource.com/#/c/414200/ Feature is limited to list of serial numbers with this change Bug: 11985952 Change-Id: I84f85a258b6a7e9809467c9149249302e203c41b
nit.rc
|
bd28bb69c7e52f44743745562f10573c1814ff3c |
24-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am b5f9e65a: am 0a0cc719: init.rc: Add lmkd service back * commit 'b5f9e65ad127261df2f7c9ed40d73b9024f492f6': init.rc: Add lmkd service back
|
44983ace850dd47384fa7698c362b4cfc9ca7f4c |
24-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 68b9d5f0: am bdef5499: resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp * commit '68b9d5f07a443b44d81e09f65a45fea8c8f4984b': logd: core requirement
|
0a0cc7192e1081acff483ae4f455c3aad6370546 |
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
init.rc: Add lmkd service back - not impressed with conflict for merge f8f0531b Change-Id: I5b9a1a93ea0cf7eda4ced8dcfc9d0ad70f7aa6c8
nit.rc
|
bdef5499d4eb0c4f5e6853471373acd610798c7c |
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp Change-Id: I87228aa0dbd0b909437c85812f2404ca8be39f38
|
9a305cd168abea5d0eaad0f1b1e65466b9a823c9 |
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am f8f0531b: Merge "logd: core requirement" * commit 'f8f0531bb69a90e87f1bafa875e665e3935610b1': logd: core requirement
|
3c253dc88f3e1decb055340c84fd6234b422c409 |
22-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
logd: core requirement - has no dependency on /data, switch from main to core Change-Id: I4bfe3e67d4cbd31e943c609f5626e533857a27a9
nit.rc
|
d94ed2c8fea4733684e4ebbf55c112828562b7a7 |
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am 7283db6d: am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60 * commit '7283db6d2694c8deae644a0d815cf292309a6176': init.rc: prep tcp_default_init_rwnd, set the default to 60
|
7283db6d2694c8deae644a0d815cf292309a6176 |
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60 * commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781': init.rc: prep tcp_default_init_rwnd, set the default to 60
|
10f229d4291da55c379ce7ae0e87b1a1878199e8 |
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60 * commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781': init.rc: prep tcp_default_init_rwnd, set the default to 60
|
efbf36f2dad8f083de6f48dbb682461d7cfa9781 |
21-Feb-2014 |
JP Abgrall <jpa@google.com> |
init.rc: prep tcp_default_init_rwnd, set the default to 60 The kernel's default is between 4~20. Prepare for javaland to modify the value at runtime. It can be done via setprop sys.sysctl.tcp_def_init_rwnd <value> Bug: 12020135 Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2 (cherry picked from commit 7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4)
nit.rc
|
f447c1b3ae6d467392500a985e3974facb1b095f |
11-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value" * commit '858d0dd1e529575181abd8de607e46f7b273cc9d': set /proc/sys/net/unix/max_dgram_qlen to large value
|
9509103cd4f28cf05a9fc6c5b6fd97504875097c |
11-Mar-2014 |
Nick Kralevich <nnk@google.com> |
am 9453bce4: Merge "Apply restorecon_recursive to all of /data." * commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5': Apply restorecon_recursive to all of /data.
|
01c5199665cfa5c6631696d410c077c3dceb871e |
11-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am e9c8fb90: Merge "logd: initial checkin." * commit 'e9c8fb900a460699201208870ce9997a734261cc': logd: initial checkin.
|
dfda9b0b4703329745fc873a78034868937921ea |
07-Mar-2014 |
Colin Cross <ccross@android.com> |
am 27fd413d: Merge "Start debuggerd64 for 64-bit processes" * commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32': Start debuggerd64 for 64-bit processes
|
c1f1eb374e3153e71419b50e8e9642a0ffaaea1e |
07-Mar-2014 |
Nick Kralevich <nnk@google.com> |
am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file." * commit 'ba023b063d25b73923f2df536b6258967f756ff6': Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
|
1d39c53e29a9c56893d170f1eac3d720076e0e55 |
04-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 00eaae3a: am 556c9c24: am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value" * commit '00eaae3aaa6ea3ca2c9c00e0559fa6937ce33e37': set /proc/sys/net/unix/max_dgram_qlen to large value
|
556c9c245de257efe8bda09ff23d2c4f7add5e49 |
04-Mar-2014 |
Mark Salyzyn <salyzyn@google.com> |
am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value" * commit '858d0dd1e529575181abd8de607e46f7b273cc9d': set /proc/sys/net/unix/max_dgram_qlen to large value
|
581edc1b6c3799238cfb674dfddb97db44f2818e |
20-Nov-2013 |
Mark Salyzyn <salyzyn@google.com> |
set /proc/sys/net/unix/max_dgram_qlen to large value - init: set /proc/sys/net/unix/max_dgram_qlen to 300 - libsysutils: Add listen backlog argument to startListener - logd: set listen backlog to 300 Change-Id: Id6d37d6c937ba2d221e76258d89c9516619caeec
nit.rc
|
5c3c77ed7855d262645c44b7e239476d9b66393d |
29-Jan-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file. mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed in the various device-specific init*.rc files but seems generic. Move it to the main init.rc file. Drop the separate chown for /data/misc/dhcp as this is handled by mkdir built-in if the directory already exists. Add a restorecon_recursive /data/misc/wifi/sockets. Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
d7ce27e8ae637b9bbaf0a31cd469a461b6651ab0 |
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am e6fb169f: am e570fd3a: am 9453bce4: Merge "Apply restorecon_recursive to all of /data." * commit 'e6fb169fd69bfa6775737f37d45041c5b229321c': Apply restorecon_recursive to all of /data.
|
e570fd3a32a3a3525a2e6a069d2b69c6184db56e |
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am 9453bce4: Merge "Apply restorecon_recursive to all of /data." * commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5': Apply restorecon_recursive to all of /data.
|
1bb3489e600876979146a6222ac5bb2a684702bf |
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
resolved conflicts for merge of e9c8fb90 to klp-modular-dev-plus-aosp Change-Id: I9ee9908a915258937b343de90dce5774d914f03a
|
9453bce4cff952aab5c90f5b30c6c12d3e1521e5 |
26-Feb-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Apply restorecon_recursive to all of /data."
|
0175b0747a1f55329109e84c9a1322dcb95e2848 |
26-Feb-2014 |
Mark Salyzyn <salyzyn@google.com> |
logd: initial checkin. * Create a new userspace log daemon for handling logging messages. Original-Change-Id: I75267df16359684490121e6c31cca48614d79856 Signed-off-by: Nick Kralevich <nnk@google.com> * Merge conflicts * rename new syslog daemon to logd to prevent confusion with bionic syslog * replace racy getGroups call with KISS call to client->getGid() * Timestamps are filed at logging source * insert entries into list in timestamp order * Added LogTimeEntry tail filtration handling * Added region locking around LogWriter list * separate threads for each writer * /dev/socket/logd* permissions Signed-off-by: Mark Salyzyn <salyzyn@google.com> (cherry picked from commit 3e76e0a49760c4970b7cda6153e51026af98e4f3) Author: Nick Kralevich <nnk@google.com> Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
nit.rc
|
7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4 |
21-Feb-2014 |
JP Abgrall <jpa@google.com> |
init.rc: prep tcp_default_init_rwnd, set the default to 60 The kernel's default is between 4~20. Prepare for javaland to modify the value at runtime. It can be done via setprop sys.sysctl.tcp_def_init_rwnd <value> Bug: 12020135 Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2
nit.rc
|
4046c132dc385fb9f2ae2e2198fd32269dd14a20 |
20-Feb-2014 |
Mark Salyzyn <salyzyn@google.com> |
Merge changes I929dddc7,Ice88b141,I243b1338 * changes: logd: prune more aggressively when over the top logd: initial checkin. logcat: test: add clear and blocking check
|
b6391ce26b6e5f7360efc7aba0fac8455cba53b4 |
16-Feb-2014 |
Colin Cross <ccross@android.com> |
am ee9de136: am bb2da79f: am 27fd413d: Merge "Start debuggerd64 for 64-bit processes" * commit 'ee9de136c52555e8775611ad32fc8ee47c75e3d1': Start debuggerd64 for 64-bit processes
|
bb2da79fdab68c9643a30f5156e7dcabb379b139 |
16-Feb-2014 |
Colin Cross <ccross@android.com> |
am 27fd413d: Merge "Start debuggerd64 for 64-bit processes" * commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32': Start debuggerd64 for 64-bit processes
|
78ef91aa5ec29cc45bf3f0d4b32cd92db000a95a |
16-Feb-2014 |
Dan Willemsen <dwillemsen@nvidia.com> |
Start debuggerd64 for 64-bit processes Change-Id: I2fc33d9eb2726b043d2f13bfab0c605dbb6083c7
nit.rc
|
3e76e0a49760c4970b7cda6153e51026af98e4f3 |
15-Dec-2011 |
Nick Kralevich <nnk@google.com> |
logd: initial checkin. * Create a new userspace log daemon for handling logging messages. Original-Change-Id: I75267df16359684490121e6c31cca48614d79856 Signed-off-by: Nick Kralevich <nnk@google.com> * Merge conflicts * rename new syslog daemon to logd to prevent confusion with bionic syslog * replace racy getGroups call with KISS call to client->getGid() * Timestamps are filed at logging source * insert entries into list in timestamp order * Added LogTimeEntry tail filtration handling * Added region locking around LogWriter list * separate threads for each writer * /dev/socket/logd* permissions Signed-off-by: Mark Salyzyn <salyzyn@google.com> Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
nit.rc
|
b6e3b3cea2c2606fcff0364d680335fc3433247b |
14-Feb-2014 |
Paul Lawrence <paullawrence@google.com> |
Merge "Mount default encrypted devices at boot"
|
b3739735b84a88cccfe08c0d69b1017a07004470 |
13-Feb-2014 |
Nick Kralevich <nnk@google.com> |
lowmemorykiller: make perms 0220 Set * /sys/module/lowmemorykiller/parameters/adj * /sys/module/lowmemorykiller/parameters/minfree to 0220. This better indicates that these files are only intended to be written to, never read. Change-Id: I9ef054f032b3955e04128fc1a472a17c7b1fa792
nit.rc
|
13d5bb4badf59e22d9d983d104596da3ec4f2753 |
30-Jan-2014 |
Paul Lawrence <paullawrence@google.com> |
Mount default encrypted devices at boot If userdata is default encrypted, we should mount it at boot to avoid bringing the framework up and then down unnecessarily. Needs matching vold changes from https://googleplex-android-review.googlesource.com/#/c/412649/ Bug: 8769627 Change-Id: I4b8276befd832cd788e15c36edfbf8f0e18d7e6b
nit.rc
|
f2b7ee765516c84a9995e3acdc8fbcd7dc1b33cc |
06-Feb-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Apply restorecon_recursive to all of /data. With the following prior changes: I77bf2a0c4c34b1feef6fdf4d6c3bd92dbf32f4a1 I698b1b2c3f00f31fbb2015edf23d33b51aa5bba1 I8dd915d9bb80067339621b905ea2b4ea0fa8d71e it should now be safe (will correctly label all files) and reasonably performant (will skip processing unless file_contexts has changed since the last call) to call restorecon_recursive /data from init.rc. The call is placed after the setprop selinux.policy_reload 1 so that we use any policy update under /data/security if present. Change-Id: Ib8d9751a47c8e0238cf499fcec61898937945d9d Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
6edd1bdf53fe6fdeeca3b4031896df4f8007de3e |
04-Feb-2014 |
Doug Zongker <dougz@android.com> |
Merge "set permissions of recovery install script"
|
9526202d84387df3950bf526bbbaeac1ede129d2 |
04-Feb-2014 |
Doug Zongker <dougz@android.com> |
set permissions of recovery install script The script that writes the recovery partition after a successful update of system needs to be made executable. This change also moves it from /system/etc to /system/bin. Bug: 12893978 Change-Id: I686e2392a2392515a6859a7381b735de1007b7ea
nit.rc
|
d9d8a60e42b0acc8ad6285fb8d6244d508ad0250 |
04-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am fbca9d94: am 7e3d72d9: am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file." * commit 'fbca9d9449231839b805ef4b11e4b2d968e601e3': Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
|
7e3d72d974d21932c2a6a0323c59fed2f689d323 |
04-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file." * commit 'ba023b063d25b73923f2df536b6258967f756ff6': Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
|
82e87ed4799b12b7bd2e20a6fe5fdc19e0350fc3 |
29-Jan-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file. mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed in the various device-specific init*.rc files but seems generic. Move it to the main init.rc file. Drop the separate chown for /data/misc/dhcp as this is handled by mkdir built-in if the directory already exists. Add a restorecon_recursive /data/misc/wifi/sockets. Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
35ef36456d89b4e823f32c328c4d0e6d15ae41e2 |
24-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am c3af60af: am c7e28899: am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root" * commit 'c3af60aff5d097c717b19721f143499891d5ca3d': adbd: switch to su domain when running as root
|
c7e28899c3917ad6e72d5dc99401bcd133cbd475 |
24-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root" * commit '16384312244b8dccd53478a7bdeeb9a492821807': adbd: switch to su domain when running as root
|
16384312244b8dccd53478a7bdeeb9a492821807 |
24-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 0620e3dd: Merge "adbd: switch to su domain when running as root" * commit '0620e3ddb85582f66612d046d1295dc20bf1a4f5': adbd: switch to su domain when running as root
|
d49aa2537cf0b454dfaa4b0312a403ebff202d70 |
18-Jan-2014 |
Nick Kralevich <nnk@google.com> |
adbd: switch to su domain when running as root When adbd runs as root, it should transition into the su domain. This is needed to run the adbd and shell domains in enforcing on userdebug / eng devices without breaking developer workflows. Introduce a new device_banner command line option. Change-Id: Ib33c0dd2dd6172035230514ac84fcaed2ecf44d6
nit.rc
|
d0f2c265d8b7457bbb9b809e00b6e8b18bbef7c9 |
16-Jan-2014 |
Doug Zongker <dougz@android.com> |
Merge "add the pre-recovery service"
|
7baebf1345ff9e861ea8ccf9712128a3b7cd9fcc |
14-Jan-2014 |
Doug Zongker <dougz@android.com> |
add the pre-recovery service Add a service called "pre-recovery" which is normally stopped but can be started by the system server when we want to go into recovery. It will do any preparation needed (currently needed to handle update packages that reside on an encrypted /data partition) and then set sys.powerctl when it's ready to actually reboot. Bug: 12188746 Change-Id: I894a4cb200395a0f6d7fe643ed4c2ac0a45d2052
nit.rc
|
32a32c9eb2b6975d76dae1dc5a2dbc73bb05f757 |
15-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 11190d0c: am 4552987e: am c93904b4: am e847f429: Merge "restorecon /data/misc/media." * commit '11190d0ccb1216307043ceecf5360f1a1a946cd1': restorecon /data/misc/media.
|
4552987e6a1338dac26f13f0851657335d998ffb |
15-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am c93904b4: am e847f429: Merge "restorecon /data/misc/media." * commit 'c93904b445830cd17fd9dd6d4fe236987577a478': restorecon /data/misc/media.
|
c93904b445830cd17fd9dd6d4fe236987577a478 |
15-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am e847f429: Merge "restorecon /data/misc/media." * commit 'e847f429f43ae56aaa406697ca603c8469e2100b': restorecon /data/misc/media.
|
9e9f05e5ebf72a60930a53e5cf45f575534fc29d |
15-Jan-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
restorecon /data/misc/media. Otherwise it will be mislabeled on upgrades with existing userdata. Change-Id: Ibde88d5d692ead45b480bb34cfe0831baeffbf94 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
c3149359a0d0f5dd9773a9a0340efc4bc0e88be7 |
15-Jan-2014 |
Elliott Hughes <enh@google.com> |
am af16bf4f: am 9c1cbe83: am 53cd1484: am aead003c: Merge "Don\'t set LD_LIBRARY_PATH globally." * commit 'af16bf4f5160c03c858b32c40900f07f1e9c0366': Don't set LD_LIBRARY_PATH globally.
|
9c1cbe8373f28c9a6d6ba489af3e9247647dc469 |
15-Jan-2014 |
Elliott Hughes <enh@google.com> |
am 53cd1484: am aead003c: Merge "Don\'t set LD_LIBRARY_PATH globally." * commit '53cd1484aa13c43b4d6973c1c203dbff9c996d14': Don't set LD_LIBRARY_PATH globally.
|
53cd1484aa13c43b4d6973c1c203dbff9c996d14 |
15-Jan-2014 |
Elliott Hughes <enh@google.com> |
am aead003c: Merge "Don\'t set LD_LIBRARY_PATH globally." * commit 'aead003c8bc677218329c535b063a5bb66695414': Don't set LD_LIBRARY_PATH globally.
|
bb07b536f528d5a55bde2571babe5d0f7878a86e |
14-Jan-2014 |
Elliott Hughes <enh@google.com> |
Don't set LD_LIBRARY_PATH globally. On a 64-bit system, 64-bit processes will want one path, 32-bit processes another. The dynamic linker already provides the correct defaults for native code, and we've coupled the VM and dynamic linker so that LD_LIBRARY_PATH will be set correctly in any VM during startup if it's not being manually overridden. Change-Id: Icbffc0d451dbc242cdfb9267413d8bcac434e108
nit.environ.rc.in
|
0a05f002fbc86e4fe410c4efbaf9d720739a21c3 |
09-Jan-2014 |
Colin Cross <ccross@android.com> |
am 4082bf8c: am ce1340c6: am 5a369629: am cd0f824a: Merge "Fix tracing on user builds" * commit '4082bf8c963dbd44fe2f6367fa687217cbac58d3': Fix tracing on user builds
|
ce1340c665e8840c8856898bbfb7ee3b33765359 |
09-Jan-2014 |
Colin Cross <ccross@android.com> |
am 5a369629: am cd0f824a: Merge "Fix tracing on user builds" * commit '5a3696297b2f8d463ba601772df7af5966321d2e': Fix tracing on user builds
|
5a3696297b2f8d463ba601772df7af5966321d2e |
09-Jan-2014 |
Colin Cross <ccross@android.com> |
am cd0f824a: Merge "Fix tracing on user builds" * commit 'cd0f824a7cfe91f4db24511830658228487ae919': Fix tracing on user builds
|
cd0f824a7cfe91f4db24511830658228487ae919 |
09-Jan-2014 |
Colin Cross <ccross@android.com> |
Merge "Fix tracing on user builds"
|
0969ec3a558723ae55f033c163b052e1dbf97669 |
09-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 218878d4: am df8d0ffd: am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files." * commit '218878d447b58b357f0dc97bfe6b77196d35a729': Label existing /data/mediadrm files.
|
df8d0ffd73f8359def90d2f79d25059023018213 |
08-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files." * commit '72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7': Label existing /data/mediadrm files.
|
72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7 |
08-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 8830b53b: Merge "Label existing /data/mediadrm files." * commit '8830b53b76c05416c021df3eb0cea1dd541bc3ac': Label existing /data/mediadrm files.
|
2dcbb81d89c86144b38c0f0b56ea7420c74a7f5a |
08-Jan-2014 |
rpcraig <rpcraig rpcraig@tycho.ncsc.mil> |
Label existing /data/mediadrm files. Use restorecon_recursive to label devices where the directory and subfiles have already been built and labeled. Change-Id: I0dfe1e542fb153ad20adf7b2b1f1c087b4956a12 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
nit.rc
|
950909c301e316783e5b4687dbc422ed845cb69a |
11-Jul-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: start lmkd Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
nit.rc
|
cb1f0147d729d1a3e9b4898ea98de3e6761233e4 |
02-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 88d040a3: am 3df76c0c: am 6bec36ec: am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls." * commit '88d040a32feac727a7e11658198c32d9cc563d8e': Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
|
6bec36ecc92af488f0193e03c386eaab409ca17c |
02-Jan-2014 |
Nick Kralevich <nnk@google.com> |
am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls." * commit '5b8abdf6278a4142736d918d1371d10c54c91db3': Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
|
5b8abdf6278a4142736d918d1371d10c54c91db3 |
02-Jan-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."
|
3dd470552c6b1c88cd344c3a366666ba464bd994 |
27-Dec-2013 |
Colin Cross <ccross@android.com> |
am 469035b8: am fed48bb6: am 6604f2d1: am 2dcc2759: Merge "Run the console service shell in the shell domain." * commit '469035b83546a847a1f12c1feca50a1c7e5e1062': Run the console service shell in the shell domain.
|
6604f2d1ef5e78e7f129f94abe7a763dd0e0dd1d |
27-Dec-2013 |
Colin Cross <ccross@android.com> |
am 2dcc2759: Merge "Run the console service shell in the shell domain." * commit '2dcc275936aefbb5badf3b4822d492260077144d': Run the console service shell in the shell domain.
|
5e1461dc906f68f6590df1c79f2f4d69e0af18c5 |
23-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls. If checkreqprot == 1, SELinux only checks the protection flags passed by the application, even if the kernel internally adds PROT_EXEC for READ_IMPLIES_EXEC personality flags. Switch to checkreqprot == 0 to check the final protection flags applied by the kernel. Change-Id: Ic39242bbbd104fc9a1bcf2cd2ded7ce1aeadfac4 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
610653fe930d016e1d962661c4fcbe2a8747e5ac |
23-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Run the console service shell in the shell domain. This allows it to be permissive in userdebug/eng builds but confined/enforcing in user builds. Change-Id: Ie322eaa0acdbefea2de4e71ae386778c929d042b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
d9a5df44c5866a8cdd63d5ba39d70a0287a6df71 |
18-Dec-2013 |
Greg Hackmann <ghackmann@google.com> |
am 5ae67beb: am c042bb01: am e25864b7: am 537f53b6: Merge "rootdir: add permissions for /dev/rtc0" * commit '5ae67bebc46a4974869458eb35270b23633aba0c': rootdir: add permissions for /dev/rtc0
|
e25864b752db0bc8ddc55f2c22cf1b8bcb2602bf |
18-Dec-2013 |
Greg Hackmann <ghackmann@google.com> |
am 537f53b6: Merge "rootdir: add permissions for /dev/rtc0" * commit '537f53b682eb0d99e90da2a3e7389ea474bc583d': rootdir: add permissions for /dev/rtc0
|
a585e662e0141d8b3445749ef83b8d9b138d7905 |
13-Dec-2013 |
Greg Hackmann <ghackmann@google.com> |
rootdir: add permissions for /dev/rtc0 Change-Id: If9d853bdae2399b1e7434f45df375ba1fd6dbe9c Signed-off-by: Greg Hackmann <ghackmann@google.com>
eventd.rc
|
f7f823e46b285169637c1f1a9c17e16ae1566b92 |
16-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am 8b0d10c8: am a24e9a86: am 02ad8700: am e4335483: Merge "Relabel /data/misc/zoneinfo" * commit '8b0d10c870efbe8254f407e02c406c05bedfa0b5': Relabel /data/misc/zoneinfo
|
02ad8700dd22d5bf5d73c638e3a45c35d5ef3d1d |
16-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am e4335483: Merge "Relabel /data/misc/zoneinfo" * commit 'e4335483e78292800e27c7bf0a67d23bee47dc84': Relabel /data/misc/zoneinfo
|
354e9edbd73ad9453e6c284c0551105ccf6aac14 |
14-Dec-2013 |
Nick Kralevich <nnk@google.com> |
Relabel /data/misc/zoneinfo The files in zoneinfo changed from system_data_file to zoneinfo_data_file. Fixup pre-existing files. Change-Id: Idddbd6c2ecf66cd16b057a9ff288cd586a109949
nit.rc
|
6b3867fc6b3cb45e6163c15cc831fd150a8b104c |
09-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am 7d1f3a3d: am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce." * commit '7d1f3a3daa721892b3247e847f72f1e948a0a68f': Do not change ownership on /sys/fs/selinux/enforce.
|
7d1f3a3daa721892b3247e847f72f1e948a0a68f |
09-Dec-2013 |
Nick Kralevich <nnk@google.com> |
am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce." * commit 'bdf53e2a59654d2b1e8469616f1b0175b275219d': Do not change ownership on /sys/fs/selinux/enforce.
|
17bec835d5cf1dfd3fa94df3b0da84a1e731e447 |
09-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Do not change ownership on /sys/fs/selinux/enforce. There is no longer any reason to permit system UID to set enforcing mode. Change-Id: Ie28beed1ca2b215c71f2847e2390cee1af1713c3 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
7fc7a07b237e0887f3815822c4551b9968267b37 |
05-Dec-2013 |
The Android Open Source Project <initial-contribution@android.com> |
Merge commit '252d9030cd4b2e3e6cf13fa33f328eccedb5e26c' into HEAD
|
dd8fddd503ecffb607013109a42ee9614bd9c47c |
05-Dec-2013 |
Carton He <carton.he@marvell.com> |
Fix tracing on user builds Need the set correct permission for print-tgid option or tracing of sched can't work on user build. Change-Id: Ia88aabe58128b911afd78f01c27f7da884ed03f0 Signed-off-by: Carton He <carton.he@marvell.com>
nit.trace.rc
|
bf5e7ed84e51f40da30a1350cdc3124c19a3484c |
27-Nov-2013 |
Greg Hackmann <ghackmann@google.com> |
am 5ebd8e43: am b2406973: Merge changes I727d9135,I3bd1b59d,I0d05aa28 * commit '5ebd8e43ba992d12fcdac4aedf7da51b50d6b949': rootdir: add ueventd.rc rule for adf subsystem init: add subsystem rules to ueventd.rc init: handle ueventd path truncation better
|
5ebd8e43ba992d12fcdac4aedf7da51b50d6b949 |
26-Nov-2013 |
Greg Hackmann <ghackmann@google.com> |
am b2406973: Merge changes I727d9135,I3bd1b59d,I0d05aa28 * commit 'b240697339b1ff1f45217a48dc9d3fa8a2f21a2b': rootdir: add ueventd.rc rule for adf subsystem init: add subsystem rules to ueventd.rc init: handle ueventd path truncation better
|
95b348c5d7d1dbccee2c39f48010fd19e8396e44 |
19-Nov-2013 |
Greg Hackmann <ghackmann@google.com> |
rootdir: add ueventd.rc rule for adf subsystem Change-Id: I727d91355229692c11e0e309c0fcac051269eba3 Signed-off-by: Greg Hackmann <ghackmann@google.com>
eventd.rc
|
66ed50af6870210ce013a5588a688434a5d48ee9 |
22-Nov-2013 |
The Android Open Source Project <initial-contribution@android.com> |
Merge commit '536dea9d61a032e64bbe584a97463c6638ead009' into HEAD Change-Id: I5c469a4b738629d99d721cad7ded02d6c35f56d5
|
fabe8716f81ec419ec854799d0a63c444e91edd3 |
22-Nov-2013 |
Todd Poynor <toddpoynor@google.com> |
am fd1dd864: am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions * commit 'fd1dd864a896bd6233ee8c75b84d9771148dd9b3': init.rc: mount pstore fs, set console-ramoops permissions
|
fd1dd864a896bd6233ee8c75b84d9771148dd9b3 |
22-Nov-2013 |
Todd Poynor <toddpoynor@google.com> |
am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions * commit '479efb540a198a9b7cd278387b0d45009a05bb2b': init.rc: mount pstore fs, set console-ramoops permissions
|
9350d80e706f385c8a4dc6bc4fd9be15e6e0a850 |
22-Nov-2013 |
Elliott Hughes <enh@google.com> |
am b6ee39bc: am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi" * commit 'b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9': split setptop ethernet tcp buffer from wifi
|
479efb540a198a9b7cd278387b0d45009a05bb2b |
22-Nov-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: mount pstore fs, set console-ramoops permissions Change-Id: I44cb00f9123c6044a03de926b6a616da753bb549
nit.rc
|
b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9 |
22-Nov-2013 |
Elliott Hughes <enh@google.com> |
am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi" * commit '4a4616f6450f191faf168a10b6e2ffaba14803bd': split setptop ethernet tcp buffer from wifi
|
4a4616f6450f191faf168a10b6e2ffaba14803bd |
21-Nov-2013 |
Elliott Hughes <enh@google.com> |
am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi" * commit '048bb92f3f33196d96a51b446c73805e208a5333': split setptop ethernet tcp buffer from wifi
|
52ea510f8fa84b634ffff18b75b5a3f95e302ba6 |
15-Nov-2013 |
Jianzheng Zhou <jianzheng.zhou@freescale.com> |
split setptop ethernet tcp buffer from wifi Change-Id: I0582ec75fddb904ca14b9cbddf593ddbd4195c41 Signed-off-by: Jianzheng Zhou <jianzheng.zhou@freescale.com>
nit.rc
|
fb7e395455c9a2acee13aaa527768558d0a58b7c |
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 9b41f452: am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev * commit '9b41f452013123d0a394e696f597467da73108ed': vold no longer does MS_MOVE; remove tmpfs.
|
9b41f452013123d0a394e696f597467da73108ed |
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev * commit 'a9e453f1b552699f69dca19599c7624a581089bd': vold no longer does MS_MOVE; remove tmpfs.
|
00c8e1a2199b2f9c50935bb4ea8bb3b86ba1bbef |
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
vold no longer does MS_MOVE; remove tmpfs. MS_MOVE was used when staging external storage devices, which no longer occurs. In fact, having a writable tmpfs was masking a vold bug around moving apps to SD cards. Bug: 11175082 Change-Id: Ib2d7561c3a0b6fde94f651a496cb0c1f12f88d96
nit.rc
|
eef6fca832c7270dfe48a9bb2aad632bba3d0ea8 |
09-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am a5fdea71: am e93a0517: Set GID required to write, media_rw mount point. * commit 'a5fdea7189239d7edeafa528c299306cba55e6c6': Set GID required to write, media_rw mount point.
|
a5fdea7189239d7edeafa528c299306cba55e6c6 |
08-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am e93a0517: Set GID required to write, media_rw mount point. * commit 'e93a0517f4c88310066ac39c6b268ebfcceef44e': Set GID required to write, media_rw mount point.
|
e93a0517f4c88310066ac39c6b268ebfcceef44e |
08-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Set GID required to write, media_rw mount point. Add sdcard FUSE daemon flag to specify the GID required for a package to have write access. Normally sdcard_rw, but it will be media_rw for secondary external storage devices, so DefaultContainerService can still clean up package directories after uninstall. Create /mnt/media_rw which is where vold will mount raw secondary external storage devices before wrapping them in a FUSE instance. Bug: 10330128, 10330229 Change-Id: I4385c36fd9035cdf56892aaf7b36ef4b81f4418a
nit.rc
|
ecb2e3903bf24a511032654532f44486362de765 |
04-Oct-2013 |
Colin Cross <ccross@android.com> |
am ad296139: am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys." * commit 'ad2961397f1c7b79b114672108a3bc9b87dc8174': Set security context of /adb_keys and /data/misc/adb/adb_keys.
|
dcf2771bb77e0c3c4047893272a6488ad137be74 |
04-Oct-2013 |
Alex Klyubin <klyubin@google.com> |
am ea1f56e7: am b1dd1765: am b42fc74f: Merge "Expose /dev/hw_random to group "system"." * commit 'ea1f56e7ffec235cc5d48e7cd9cb7d39f4ba1598': Expose /dev/hw_random to group "system".
|
ad2961397f1c7b79b114672108a3bc9b87dc8174 |
04-Oct-2013 |
Colin Cross <ccross@android.com> |
am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys." * commit '410f8c305b416484f17f068c37b785605a2f69eb': Set security context of /adb_keys and /data/misc/adb/adb_keys.
|
ea1f56e7ffec235cc5d48e7cd9cb7d39f4ba1598 |
04-Oct-2013 |
Alex Klyubin <klyubin@google.com> |
am b1dd1765: am b42fc74f: Merge "Expose /dev/hw_random to group "system"." * commit 'b1dd176520896efacbabd1df65d8bb56e1bfeb71': Expose /dev/hw_random to group "system".
|
410f8c305b416484f17f068c37b785605a2f69eb |
04-Oct-2013 |
Colin Cross <ccross@android.com> |
am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys." * commit '79b277ab73711313690d03a9fb2e9cb3f9242b39': Set security context of /adb_keys and /data/misc/adb/adb_keys.
|
b1dd176520896efacbabd1df65d8bb56e1bfeb71 |
04-Oct-2013 |
Alex Klyubin <klyubin@google.com> |
am b42fc74f: Merge "Expose /dev/hw_random to group "system"." * commit 'b42fc74f0db60e1e86deaf527b3b7e7ec53dcc54': Expose /dev/hw_random to group "system".
|
79b277ab73711313690d03a9fb2e9cb3f9242b39 |
04-Oct-2013 |
Colin Cross <ccross@android.com> |
Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."
|
b2478a713a39ab745017308e8859467017fb6fa5 |
03-Oct-2013 |
Alex Klyubin <klyubin@google.com> |
Expose /dev/hw_random to group "system". This is needed to let EntropyMixer (runs inside system_server) read from /dev/hw_random. Change-Id: Ifde851004301ffd41b2189151a64a0c5989c630f
eventd.rc
|
41c9fd6480771ec7ab4c160aef046e0d27a085a0 |
02-Oct-2013 |
Colin Cross <ccross@android.com> |
am 0d3ac55d: am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data." * commit '0d3ac55d0654fe4f6d37923782dcd41f0590c741': Trigger a policy reload from post-fs-data.
|
0d3ac55d0654fe4f6d37923782dcd41f0590c741 |
02-Oct-2013 |
Colin Cross <ccross@android.com> |
am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data." * commit '230252d5cd70f5be4c24046c7a409e9498ac97f5': Trigger a policy reload from post-fs-data.
|
230252d5cd70f5be4c24046c7a409e9498ac97f5 |
02-Oct-2013 |
Colin Cross <ccross@android.com> |
am 61afb07b: Merge "Trigger a policy reload from post-fs-data." * commit '61afb07b9b14233f76a969840f74ce1ced22bf58': Trigger a policy reload from post-fs-data.
|
deb41e512760f9d18cb718b007ced367018b3667 |
01-Oct-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Set security context of /adb_keys and /data/misc/adb/adb_keys. I97b3d86a69681330bba549491a2fb39df6cf20ef introduced a separate type for the adb_keys file. Set the security context of the adb_keys file accordingly by adding restorecon commands to init.rc. Change-Id: I30e4d2a1ae223a03eadee58a883c79932fff59fe Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
61afb07b9b14233f76a969840f74ce1ced22bf58 |
30-Sep-2013 |
Colin Cross <ccross@android.com> |
Merge "Trigger a policy reload from post-fs-data."
|
63144019468b2043393aabd7cba6f03b2e9a4234 |
24-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
am dfcbf02b: am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev * commit 'dfcbf02bb0a6705e3714a59e42e052fbb0ce8799': Create a separate copy of the fsck logs
|
dfcbf02bb0a6705e3714a59e42e052fbb0ce8799 |
24-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev * commit '6b1a027239689a817aa5ca44a2bcbfe48ed21408': Create a separate copy of the fsck logs
|
6b1a027239689a817aa5ca44a2bcbfe48ed21408 |
23-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
Merge "Create a separate copy of the fsck logs" into klp-dev
|
4676550b5684da8355f9ee0b2db964005ce9ea4f |
17-Sep-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: use oom_score_adj instead of oom_adj Use kernel oom_score_adj interface to make init and children unkillable. Stop using older, deprecated oom_adj interface. Use OOM_SCORE_ADJ_MIN to make the processes unkillable (previously the processes were set to a very low score, but not unkillable). Change-Id: I680965009585c2a5a580859fb946f2d0caa95d9c
nit.rc
|
4eaf905858c6a1d7cf0639bed3e8de3bd7987646 |
19-Sep-2013 |
Ken Sumrall <ksumrall@android.com> |
Create a separate copy of the fsck logs The log_target parameter of android_fork_execvp_ext() is now a bit field, and multiple targets can be set to log to multiple places at the same time. The new target LOG_FILE will log to a file specified by the new parameter file_path. Set LOG_FILE and log to a file in /dev (the only writable filesystem avilable when e2fsck runs) when invoking e2fsck in fs_mgr. Bug: 10021342 Change-Id: I63baf644cc8c3afccc8345df27a74203b44d0400
nit.rc
|
aa4a3228f00fedd870c25dc37a112e439682dbde |
21-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 9729b415: am 44d6342c: Remove mkdir() side effect, add .nomedia, utils. * commit '9729b41574ca5e5e87c86b203a2096cbdc72cfea': Remove mkdir() side effect, add .nomedia, utils.
|
9729b41574ca5e5e87c86b203a2096cbdc72cfea |
21-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 44d6342c: Remove mkdir() side effect, add .nomedia, utils. * commit '44d6342caa0db1f613809e9ba1ea8d9af0183b74': Remove mkdir() side effect, add .nomedia, utils.
|
44d6342caa0db1f613809e9ba1ea8d9af0183b74 |
12-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
Remove mkdir() side effect, add .nomedia, utils. Before this change, FUSE lookup() would have the side effect of creating the directory on behalf of apps. This resulted in most directories being created just by Settings trying to measure disk space. Instead, we're switching to have vold do directory creation when an app doesn't have enough permissions. Create fs_mkdirs() utility to create all parent directories in a path as needed. Allow traversal (+x) into /storage directories. Fix FUSE derived permissions to be case insensitive. Mark well-known directories as .nomedia when created. Bug: 10577808, 10330221 Change-Id: I53114f2e63ffbe6de4ba6a72d94a232523231cad
nit.rc
|
5660da25b9cd0b2e8d4e5d89de5b1cc281bce9bd |
19-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 1998e505: am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID." * commit '1998e505a98ad445bead87c2bb047053f1aea648': Do not change ownership of /sys/fs/selinux/load to system UID.
|
1998e505a98ad445bead87c2bb047053f1aea648 |
19-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID." * commit '2e9402863b40fe8bf2ddd8169c62f2419d968ff9': Do not change ownership of /sys/fs/selinux/load to system UID.
|
2e9402863b40fe8bf2ddd8169c62f2419d968ff9 |
19-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID." * commit '0f507339ec474a2f67227466efc9045630f1f1a4': Do not change ownership of /sys/fs/selinux/load to system UID.
|
cc13e8ab87f74143293722e5301480fbe31b788d |
26-Aug-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Do not change ownership of /sys/fs/selinux/load to system UID. Policy reload is handled by setting the selinux.reload_policy property and letting the init process perform the actual loading of policy into the kernel. Thus, there should be no need for the system UID to directly write to /sys/fs/selinux/load. Change-Id: I240c5bb2deaee757a2e1e396e14dea9e5d9286f5 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
5d4be690935ea7970a53837914f31de0a4f0690d |
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 0e7bd81c: am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev * commit '0e7bd81c938611cfa4ebf44870668300a5bba875': Initialize /dev/urandom earlier in boot.
|
0e7bd81c938611cfa4ebf44870668300a5bba875 |
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev * commit '4f18183bd6d3d2ed5d698c176ecc239211bdb82e': Initialize /dev/urandom earlier in boot.
|
b410eb19130cf1eca158a672bba8f515e7627f11 |
18-Sep-2013 |
Nick Kralevich <nnk@google.com> |
Initialize /dev/urandom earlier in boot. It's a security best practice to carry entropy across reboots. (see "man 4 random"). Currently, entropy saving and mixing occur in the system_server, via the EntropyMixer code. Unfortunately, the EntropyMixer code runs fairly late in the boot process, which means early boot doesn't have high quality entropy. This has caused security problems in the past. Load entropy data as soon as we can in the early boot process, so that we can get /dev/random / /dev/urandom into a "random" state earlier. Bug: 9983133 Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
nit.rc
|
59e51e792a13e017d0f1b85a02fcc56815ea83d6 |
11-Sep-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: no longer start healthd in charger mode Being moved to healthd/charger mode in board-specific init.rc. Change-Id: Ie9fc2e5abc1737fbffec8fb071c73f5fd96e4d17
nit.rc
|
8d0a92ddc568c4fb065d8e9ec098f1ef4ff9e6ac |
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
am 342077e7: am 67b00d8b: init.rc: change mem cgroups permissions * commit '342077e78da9411c252232313bc40fb4ce5f6137': init.rc: change mem cgroups permissions
|
342077e78da9411c252232313bc40fb4ce5f6137 |
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
am 67b00d8b: init.rc: change mem cgroups permissions * commit '67b00d8b2d96e8133c249bcbc0fb63c49e10e022': init.rc: change mem cgroups permissions
|
67b00d8b2d96e8133c249bcbc0fb63c49e10e022 |
11-Sep-2013 |
Rom Lemarchand <romlem@google.com> |
init.rc: change mem cgroups permissions Changing mem cgroups permissions to only be accessible by root and system. Bug: 10210529 Bug: 10210900 Change-Id: Ib4fff6f49b33013b3629d40ae98a5e2464571b2d
nit.rc
|
aacded70196acf958ddd26149dec9709571f1f56 |
11-Jul-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: start lmkd Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
nit.rc
|
6552f6885fc2a94501ca064bffc4c18ad40caad8 |
26-Aug-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Trigger a policy reload from post-fs-data. Once userdata is available and decrypted, trigger a policy reload to pick up any policy update files stored under /data/security. Change-Id: Ic2b3121c3395429b108c40d1d7f5a3124a5896c5 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
a34f1391bd9c368aceecb3f8dec158b2cb8b2dd4 |
23-Aug-2013 |
Colin Cross <ccross@android.com> |
am 30caffc0: resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp * commit '30caffc025aff450ebb354ee693174cc1732732b': Handle policy reloads within ueventd rather than restarting it.
|
30caffc025aff450ebb354ee693174cc1732732b |
23-Aug-2013 |
Colin Cross <ccross@android.com> |
resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp Change-Id: I08e9898940f7cdd466469b76760807cc5d5c67e4
|
a1af5cf6d1c008dbde2e40121940d65faa0816bf |
23-Aug-2013 |
Colin Cross <ccross@android.com> |
am d8d99c45: Merge "Handle policy reloads within ueventd rather than restarting it." * commit 'd8d99c45b704399d50ae0a5e4df938d825c70cfa': Handle policy reloads within ueventd rather than restarting it.
|
46a24db563f46736f6e02c4d80656ab51d94ff77 |
23-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Remove input flinger stubs. (DO NOT MERGE) Bug: 10446930 Change-Id: I88b926380dbe1e866c0b87ec95b3489d87c5907b
nit.rc
|
13f4c9fb279f1b34a3b47a6eac80b8a09d2d3a79 |
20-Jun-2013 |
Todd Poynor <toddpoynor@google.com> |
healthd: normal and charger mode startup Command line flag -n tells healthd not to use (or wait for) servicemanager in charger mode. Change-Id: I255f9597dff6fc904f5ed20fd02f52c0531d14f8
nit.rc
|
5ba57f9a951728593aed559ece93ba821c33e45c |
27-Jul-2013 |
Colin Cross <ccross@android.com> |
Merge "add property to adjust extra_free_kbytes kernel vm tunable"
|
e2eb69db6d818b41f5c0f2090cc643f7cff31734 |
16-Apr-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Handle policy reloads within ueventd rather than restarting it. Restarting ueventd upon policy reloads has reportedly created stability problems for some users and could cause events to be lost. Stop restarting ueventd and instead handle policy reloads within ueventd. Also stops restarting installd upon policy reloads. Change-Id: Ic7f310d69a7c420e48fbc974000cf4a5b9ab4a3b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
57fdb5cfd2b20f47299a12c2050ff8bb2707c788 |
25-Jul-2013 |
Colin Cross <ccross@android.com> |
add property to adjust extra_free_kbytes kernel vm tunable ActivityManager can't directly write to extra_free_kbytes because /proc/sys rejects all chown and chmod syscalls. Proxy the writes through init by using the sys.sysctl.extra_free_kbytes property. Bug: 10024467 Change-Id: I441e00478421254355fcafb252bc878166483d4c
nit.rc
|
5748ee972de22e3a53bd3ef7d998ed15ea726a69 |
24-Jul-2013 |
Ying Wang <wangying@google.com> |
Generate init.environ.rc by populating BOOTCLASSPATH - BOOTCLASSPATH now is derived from PRODUCT_BOOT_JARS, which is a product configuration variable set up by the core build system. - Moved files from the legacy ALL_PREBUILT to PRODUCT_COPY_FILES in build/target/product/embedded.mk. Bug: 9990214 Change-Id: I98bac36c1ca8c779dda572a0a5e0a22b7e4c4a7a
ndroid.mk
nit.environ.rc.in
nit.rc
|
f498ec8fafcce6fe30ba3a80bbdbce6577b6b921 |
20-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am dafa66af: am 2aa33a3d: Add writable data space for radio. * commit 'dafa66afdd3729e2c65ccb8dced8ca3e137db437': Add writable data space for radio.
|
dafa66afdd3729e2c65ccb8dced8ca3e137db437 |
19-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am 2aa33a3d: Add writable data space for radio. * commit '2aa33a3dbd1147558098d9a2948450d363ffe468': Add writable data space for radio.
|
57fc1ceebc6a8c84fa6e9cbf268b5ffca3052c2d |
18-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
Split framework jar. Change-Id: I590de05f23669cf625030b479c786423f21c6159
nit.rc
|
2aa33a3dbd1147558098d9a2948450d363ffe468 |
16-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Add writable data space for radio. Storing carrier provisioning urls updates in /data/misc/radio. bug:9623159 Change-Id: I8d62d4638229733dea0f11f1729c4d22ae2295d1 I36697ed341353b7a3dbec5afe20241102e76f6f1
nit.rc
|
3884a9b252c1852e88a2ad75c22b042d25a633f4 |
13-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
init.rc: Add input flinger. Change-Id: Ibcb1116bdcd9189272db620910b9958c8ffb4552
nit.rc
|
4a291b339e1ab682609485aef6fbb46b66b0de90 |
15-Jul-2013 |
Rom Lemarchand <romlem@google.com> |
Merge "init.rc: configure memory cgroups"
|
56adf992676e39175f227ac1a542d841bb6c0c24 |
15-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am 9a4913d4: init.rc: remove "on fs" section * commit '9a4913d422f4c18033333afe8e2e1d699b112d44': init.rc: remove "on fs" section
|
435a52ef07a5c97bdd717f20cb3115a585eb6d3c |
10-Jul-2013 |
Rom Lemarchand <romlem@google.com> |
init.rc: configure memory cgroups Create the memory cgroups folders and configure them Change-Id: I06c4bb486b204f7e98b0bc6757deec8bd7f6349e
nit.rc
|
9a4913d422f4c18033333afe8e2e1d699b112d44 |
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
init.rc: remove "on fs" section This was only ever used by the emulator. Now the emulator uses an fstab file. Change-Id: I1a071e567e1f1a379f9c8079cc2dc17660d8455f
nit.rc
|
e1dbdd697894f84e2cb8882160f0e4104f739064 |
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am 7d6ddc7d: am 2713be91: am fb1c9cf6: Merge "use ext4 instead of yaffs" * commit '7d6ddc7d395e909d841bb7eadfc12a167076aecf': use ext4 instead of yaffs
|
2713be91a84078e8b0b9b755ce17881b750e85a7 |
12-Jul-2013 |
Nick Kralevich <nnk@google.com> |
am fb1c9cf6: Merge "use ext4 instead of yaffs" * commit 'fb1c9cf6fa4efafb3e0c6b0bc93c7f087d926a48': use ext4 instead of yaffs
|
f4c1512db8f0d2fd19d80487d96db3af7ceaacb5 |
10-Jul-2013 |
Nick Kralevich <nnk@google.com> |
use ext4 instead of yaffs This is needed to allow the emulator to use ext4 images. Bug: https://code.google.com/p/android/issues/detail?id=38561 Change-Id: I02fde6382ad67cf7f4f3b695396841f70bb9301d
nit.rc
|
fafcabd0dd4432de3c7f5956edec23f6ed241b56 |
04-Jul-2013 |
Colin Cross <ccross@android.com> |
Merge "Added net.dns1 prop for emulator, as Android emulator ignores it by default."
|
317ec9246b28c8be373d2915be5fbfd85b2854e2 |
04-Jun-2013 |
Torne (Richard Coles) <torne@google.com> |
Add webviewchromium to BOOTCLASSPATH. Add /system/framework/webviewchromium.jar to BOOTCLASSPATH. This jar contains the implementation classes for the new WebView. It has been processed with jarjar to ensure that it doesn't define any classes outside of com.android. Change-Id: If65913638df0088f4dd7d62a087750b90038a7fb
nit.rc
|
71952461310cff9f35a4852415c608d14c92236a |
21-May-2013 |
Colin Cross <ccross@android.com> |
am 5f1a938e: am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '5f1a938e9c65829c3afebb4d92c8e93caecc3e11': init.rc: remove duplicated led-related nodes
|
5f1a938e9c65829c3afebb4d92c8e93caecc3e11 |
21-May-2013 |
Colin Cross <ccross@android.com> |
am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2': init.rc: remove duplicated led-related nodes
|
3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2 |
21-May-2013 |
Colin Cross <ccross@android.com> |
am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes" * commit '9246f8d6def40a50933a980fac773a909f2138d7': init.rc: remove duplicated led-related nodes
|
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae |
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '253e91b4ffb631b188fdac0c1624786103471f05': Revert "Add persistent property for SELinux enforcment status."
|
acef650dbc11355f9792923b69d8277a4ce89fab |
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition." * commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1': Revert "Reload policy after setting up the data partition."
|
9a8cb3abf8985586172d8f891933b04ff419f81c |
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am b9866649: am 52351300: Revert "Add a version check for SELinux policy on device." * commit 'b9866649e24d7b6eedcaf2e03ffc605a3417537d': Revert "Add a version check for SELinux policy on device."
|
253e91b4ffb631b188fdac0c1624786103471f05 |
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6': Revert "Add persistent property for SELinux enforcment status."
|
43329bc1c99c0f5f3670a8aaab39e54df34819a1 |
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 8a387870: Revert "Reload policy after setting up the data partition." * commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8': Revert "Reload policy after setting up the data partition."
|
b9866649e24d7b6eedcaf2e03ffc605a3417537d |
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 52351300: Revert "Add a version check for SELinux policy on device." * commit '52351300d156826bf22c493828571f45a1cea16a': Revert "Add a version check for SELinux policy on device."
|
a8d392da915b46a59dc5eab82a2b6cf17a9b3a86 |
20-May-2013 |
Sungmin Choi <sungmin.choi@lge.com> |
init.rc: remove duplicated led-related nodes Change-Id: Ibee7ef9137594fc4c30d3ab6ee7bdf3515836c62
nit.rc
|
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 |
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add persistent property for SELinux enforcment status." This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
nit.rc
|
8a3878700eb9cd8ecf495cd01f15face5c3879c8 |
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Reload policy after setting up the data partition." This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
nit.rc
|
52351300d156826bf22c493828571f45a1cea16a |
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add a version check for SELinux policy on device." This reverts commit 921be8b6568df0057c4eacbac2e1022b71e09620.
nit.rc
|
b1b45b9bd4f8610d7bda99849cac0b14e9ad771d |
16-May-2013 |
Ron Munitz <ron@nubosoftware.com> |
Added net.dns1 prop for emulator, as Android emulator ignores it by default. This commit sets up the system property which is actually used by the Connectivity Service (frameworks/base/services/java/com/android/server/ConnectivityService.java). It fixes an (obsolete?) convention where the dns was affected directly by the interface (i.e. "net.eth0.dns1=10.0.2.3"), which causes the Android Emulator (goldfish) to ignore this value, and effectively have no DNS resolving at all. An immediate fix can be either add reference to net.eth%s.dns%s in the ConnectivityService and possibly on the dhcp code as well which would be bloated, or just stick to the apparant new convention. I chose the latter as a one line fix which gets the job done. Change-Id: Id4364129e9a82c1f48403068a837aca54de07944
tc/init.goldfish.rc
|
e45710f19f3843dd0ec02d1a5c7f679f34a33846 |
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 5a98566d: am 921be8b6: Add a version check for SELinux policy on device. * commit '5a98566d589408c78e35f4476f478a2fa1c13e78': Add a version check for SELinux policy on device.
|
5a98566d589408c78e35f4476f478a2fa1c13e78 |
15-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 921be8b6: Add a version check for SELinux policy on device. * commit '921be8b6568df0057c4eacbac2e1022b71e09620': Add a version check for SELinux policy on device.
|
921be8b6568df0057c4eacbac2e1022b71e09620 |
10-May-2013 |
repo sync <gcondra@google.com> |
Add a version check for SELinux policy on device. This helps to ensure that when a new system image is installed, old userdata policy isn't applied over the top of it. Bug: 8841348 Change-Id: I135af32250aa62979763e775842ce0af3c8b6f9f
nit.rc
|
8577e8649062953a59e0ac652b5ac16c96c1c1f4 |
09-May-2013 |
Mathias Agopian <mathias@google.com> |
surfaceflinger is now always running in its own process Change-Id: I1ae63347a8b6d406306ed894665674dd726b7d51
nit.rc
|
69e9b17fa1a7ac4dea56963008096a4961245277 |
01-May-2013 |
Colin Cross <ccross@android.com> |
am cb4b9605: am 8794b2ee: Merge "Fix perms on /data/security" * commit 'cb4b9605cb923d071a546b444d10cbe21367d878': Fix perms on /data/security
|
cb4b9605cb923d071a546b444d10cbe21367d878 |
01-May-2013 |
Colin Cross <ccross@android.com> |
am 8794b2ee: Merge "Fix perms on /data/security" * commit '8794b2eeb2bbd717ca18b8bef5d853f99334aabc': Fix perms on /data/security
|
8794b2eeb2bbd717ca18b8bef5d853f99334aabc |
01-May-2013 |
Colin Cross <ccross@android.com> |
Merge "Fix perms on /data/security"
|
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a |
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 63577d92: am fee250d2: Reload policy after setting up the data partition. * commit '63577d9280e7919bfb7221030d211b833e66bb1e': Reload policy after setting up the data partition.
|
63577d9280e7919bfb7221030d211b833e66bb1e |
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am fee250d2: Reload policy after setting up the data partition. * commit 'fee250d27a9c03af1ba439047b976d89563b1887': Reload policy after setting up the data partition.
|
fee250d27a9c03af1ba439047b976d89563b1887 |
30-Apr-2013 |
repo sync <gcondra@google.com> |
Reload policy after setting up the data partition. This forces a policy reload + fixcon to deal with dynamically delivered policy changing labels on device nodes. It's implemented as a new keyword in init. Bug: 8702843 Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
nit.rc
|
152a43215143f62ee4bedda96ce73604530a6f1d |
30-Apr-2013 |
Kenny Root <kroot@google.com> |
am d14586e3: resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp * commit 'd14586e35a3df39cc3aa6aff6a54463270a5e1a7': Track change to JSSE provider
|
d14586e35a3df39cc3aa6aff6a54463270a5e1a7 |
30-Apr-2013 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp Change-Id: If41560f0fef3103cad2172061a7988ceb5556377
|
ca0404b83e9e5712531e040675212a4bd0d7f6a8 |
24-Apr-2013 |
Kenny Root <kroot@google.com> |
Track change to JSSE provider Change-Id: Iff9103fff3591983f2b172f83fd2a6e924986aa7
nit.rc
|
ada3291c8d13a9c3896102932abefed155a5b3fe |
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '14ad786183455ad9c8298e24946d4da0f24458d7': Add persistent property for SELinux enforcment status.
|
14ad786183455ad9c8298e24946d4da0f24458d7 |
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '538b5d4e8e4c480b2120aa957fe3e11a2836a1b3': Add persistent property for SELinux enforcment status.
|
538b5d4e8e4c480b2120aa957fe3e11a2836a1b3 |
26-Apr-2013 |
repo sync <gcondra@google.com> |
Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev
|
b89bdfde422eff751b3f939f10ab57e22af83eaa |
24-Apr-2013 |
repo sync <gcondra@google.com> |
Add persistent property for SELinux enforcment status. Also adds triggers for going between enforcing and permissive status. Bug: 8702843 Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
nit.rc
|
7629bf19a139cbc204e8ae78cb82c2faeba6d2f0 |
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
am 9e9ed1b4: am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev * commit '9e9ed1b40010745e709157a6977ba6d053d46c49': Add a new group for MediaDrm engine plugins
|
9e9ed1b40010745e709157a6977ba6d053d46c49 |
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev * commit '131ee07b77e0250c16cebe2b0e226c5bff8e9587': Add a new group for MediaDrm engine plugins
|
131ee07b77e0250c16cebe2b0e226c5bff8e9587 |
25-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev
|
af1cbd4c10cfc28235d7a60941290986a77affda |
24-Apr-2013 |
Matthew Xie <mattx@google.com> |
am 0db6600a: am 7ee2e26e: Remove DBUS from make and header files * commit '0db6600a60e8d604aaef5e43db9ae52ed7380979': Remove DBUS from make and header files
|
0db6600a60e8d604aaef5e43db9ae52ed7380979 |
24-Apr-2013 |
Matthew Xie <mattx@google.com> |
am 7ee2e26e: Remove DBUS from make and header files * commit '7ee2e26eb98da10eaddf5a8e864d508cceab946b': Remove DBUS from make and header files
|
08d64308b93594c587036cffcd8f6780eaf2c417 |
24-Apr-2013 |
Jeff Tinker <jtinker@google.com> |
Add a new group for MediaDrm engine plugins bug: 8702754 Change-Id: I3b7988b64b1dcf4685624e4c1af938e132b82696
nit.rc
|
7ee2e26eb98da10eaddf5a8e864d508cceab946b |
23-Apr-2013 |
Matthew Xie <mattx@google.com> |
Remove DBUS from make and header files DBUS had been needed by bluetooth bluz stack. It is not needed after we replaced bluez stack with bluedroid stack. bug 6872904 Change-Id: I3fa41c1dd4ac80bc679d5950b3b20c7f6d12265f
ndroid.mk
tc/dbus.conf
|
ca8e66a8b0f843812014a28d49208f9f6f64ecbc |
18-Apr-2013 |
Nick Kralevich <nnk@google.com> |
Make init handle reboots Move the responsibility for rebooting the system from the reboot command to init. Init is in a better position to take actions to bring the system down cleanly, including making sure filesystems are mounted read-only. The only UIDs which can perform an init triggered reboot are root, system, and shell. Modify the reboot command so that it calls into init to perform the reboot. The reboot command no longer requires CAP_SYS_BOOT. Remove the -n reboot option and code which supports it. Anyone needing to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'. Modify adb so that it calls into init to perform a shutdown. Bug: 8646621 Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
nit.rc
|
d43bab7b98d329ead0b5304be79d430b5a92ad10 |
15-Apr-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Fix perms on /data/security installd and zygote need to be able to search the directory to access the policy files. Change-Id: I0679fd2084d2664dfb5a594f493317eff058415d
nit.rc
|
ad999a09ab973c5ed5c54a78cdaa4dbc06eb485e |
05-Apr-2013 |
Keun-young Park <keunyoung@google.com> |
Merge "rootdir: goldfish: mount debugfs on boot time"
|
76c674451c831c1e9c3e3ee134ea8af26ae19ac1 |
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
Merge "resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp" into jb-mr2-dev-plus-aosp
|
d3f0e0ae379f4420b01bb9de932a764c035ff2a6 |
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp Change-Id: I63d6a2f975a6c0df5c238a2f7592f357441eb767
|
c2594f36e789bbd49cbeeb9421a7b6a16cd30ba4 |
31-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Give system ownership of selinux load and enforce files. This is necessary to enable remote updates. Change-Id: I05fb979c0360eca4cc6e4add48bb42f712a1ba17
nit.rc
|
8637e8186ac572df92a34253f93bf405bf634b03 |
30-Mar-2013 |
jwilson <jwilson@squareup.com> |
Add OkHttp to the boot classpath. Change-Id: I185b803b5b804ff8680ef928ce5163727adbf0bd
nit.rc
|
6b5de1cda2e5c4946aa08a11a38ad0a7eee115ce |
25-Mar-2013 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set owner/perm for interactive governor io_is_busy Change-Id: I7537d56a23ca787daf92a9d91778056f987097bd
nit.rc
|
fb39c0d19860fe48bc598d5d180a8cce9f59e33b |
23-Mar-2013 |
Geremy Condra <gcondra@google.com> |
am 4d71493e: am e849970c: Merge "Fix mode on /data/security." * commit '4d71493e74ed1ea39e554146351cc39e47cb5d02': Fix mode on /data/security.
|
bfd71b489b283fe54669dc5d1ccdc97b453d2fb4 |
23-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Create a new location for /data policy files Adding a new location for policy files under /data, the new location is /data/security. The new location is used before attempting to use any other location. This requires a new directory to be created by the init script and an update to the location of the property_contexts file for property service. Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
nit.rc
|
c0317a75793ecbcd4a8e19f477458eb677024869 |
28-Jan-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Fix mode on /data/security. Change-Id: Id97d06a1c360c7871361db147f76b8a2eaceca42 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
46e1bd89b457713bf91d2dc751795822cc202658 |
23-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Create a new location for /data policy files Adding a new location for policy files under /data, the new location is /data/security. The new location is used before attempting to use any other location. This requires a new directory to be created by the init script and an update to the location of the property_contexts file for property service. Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
nit.rc
|
fb4f7acefb31a51679cec194562c7aeb3922f728 |
14-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add symlink to bugreport storage location. Change-Id: I16f024c24767cfa1f5800d568d39fb098a408127
nit.rc
|
7d312208a16a3d9bac01467369ae9b86fd0cf29b |
10-Mar-2013 |
Young-Ho Cha <ganadist@gmail.com> |
rootdir: goldfish: mount debugfs on boot time goldfish is ported to linux-3.4 and have capability to run atrace. But can't run atrace yet because debugfs is not mounted on boot time. Change-Id: I0ce23bde3b8d1b2a88d4238272123e3ab8cb6970 Signed-off-by: Young-Ho Cha <ganadist@gmail.com>
tc/init.goldfish.rc
|
f5eb8035431a130f4666f5f067242df7392e8bc3 |
26-Feb-2013 |
Keun young Park <keunyoung@google.com> |
move goldfish stuffs to device/generic/goldfish - each files will be pulled in emulator.mk as PRODUCT_COPY_FILES Change-Id: I4772e2fd863e6d2663f477c3acd8a90cb95b498a
ndroid.mk
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/ueventd.goldfish.rc
tc/vold.fstab
|
65e203070c0cb25f5401502d60e924ff2b5bdae5 |
23-Feb-2013 |
Glenn Kasten <gkasten@google.com> |
Merge "Add directory for mediaserver"
|
b0f908a95714fbbfd63ee498e5773c44712b30e2 |
22-Feb-2013 |
Glenn Kasten <gkasten@google.com> |
Add directory for mediaserver Bug: 8223560 Change-Id: Iccc6d439a848445cac0f5b30d1d663aed3f5344e
nit.rc
|
fe8425b5c5156c60691927a982672abd7927b777 |
22-Feb-2013 |
Nick Kralevich <nnk@google.com> |
am c5ce4108: am 1b64957a: Merge "init.rc: allow IPPROTO_ICMP support" * commit 'c5ce4108facc5a1b94fcf9469a189b2cbdfd5e76': init.rc: allow IPPROTO_ICMP support
|
be341cc348257a07c68bcbfdc526835d49283329 |
22-Feb-2013 |
Nick Kralevich <nnk@google.com> |
init.rc: allow IPPROTO_ICMP support Allow userspace programs to create IPPROTO_ICMP sockets. This socket type allows an unprivileged program to safely send ICMP_ECHO messages and receive the corresponding ICMP_ECHOREPLY messages, without relying on raw sockets or setuid programs. Please see http://lwn.net/Articles/443051/ for details. In particular, this allows us to use a version of ping which doesn't have any capabilities (https://android-review.googlesource.com/52072). In addition, this allows us to safely implement an IPv4 ICMP based version of InetAddress.isReachable() (https://code.google.com/p/android/issues/detail?id=20106) Change-Id: I876718151efa8219c4f34f573e35e21256fe2316
nit.rc
|
38a260547ba65b495ddcb16ef32f219aff5e389e |
29-Jan-2013 |
Wink Saville <wink@google.com> |
Merge "Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip"
|
c0d399df697850712432cb6092d63669ffa0fc23 |
29-Jan-2013 |
Wink Saville <wink@google.com> |
Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip Add voip-common to BOOTCLASSPATH Change-Id: Ieaba759a0f69b45c4b8839cbed1fe757cdf190c5
nit.rc
|
31c8095cac4cd652c360feb85c47854363233a1c |
16-Jan-2013 |
Benoit Goby <benoit@android.com> |
Revert "init.usb.rc: set sys.usb.config to none before changing it" This can cause init to be stucked in a loop in very rare cases where persist.sys.usb.config is set to "none" (because the "setprop sys.usb.config none" action is added twice to the action list). The original issue on encrypted devices has been fixed differently by change # I350c5aab986f8ca86b95f316398d03012553e581 This reverts commit 80828af3def1f37eff1d483520df79ebe4238d55. Change-Id: Id0a7af8dd861c8d10b80a13b540c8a339b432007
nit.usb.rc
|
a44404154730e54615d44c389b11cec9dd86c001 |
05-Jan-2013 |
JP Abgrall <jpa@google.com> |
am ba900f2e: am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files" * commit 'ba900f2e708f0b654cdaa827804cbb21af4e4fb4': init.rc: setup qtaguid group ownership of ctrl and stat files
|
ba900f2e708f0b654cdaa827804cbb21af4e4fb4 |
05-Jan-2013 |
JP Abgrall <jpa@google.com> |
am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files" * commit 'fb69c2e2577e056bb7a054343a9f6d781cedbf3d': init.rc: setup qtaguid group ownership of ctrl and stat files
|
3e54aabc63535572242477fadbf13ec42b06649e |
04-Jan-2013 |
JP Abgrall <jpa@google.com> |
init.rc: setup qtaguid group ownership of ctrl and stat files This will help get rid of android_aid.h in the kernel. The group of the proc entries will be used in place of the default values picked up by the xt_qtaguid netfilter module (AID_NET_BW_STATS, AID_NET_BW_ACCT). This change has no effect until the matching kernel changes are submitted. Change-Id: I3c177e7b5caf9c59300eba6bd4a976634b333674
nit.rc
|
2b5b3bb103f59d9d3bf25c0c1f8035db036917da |
21-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
rootdir: init.rc: set perms for new interactive governor attrs /sys/devices/system/cpu/cpufreq/interactive/timer_slack /sys/devices/system/cpu/cpufreq/interactive/target_loads Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
nit.rc
|
e2aab2cce821149fcb807d4b67753c470a5f2028 |
22-Dec-2012 |
Elliott Hughes <enh@google.com> |
am 38219ee6: Merge "Track the setsebool change in the emulator init.rc." * commit '38219ee6116943269b0501a1a0210c76e2ba69c3': Track the setsebool change in the emulator init.rc.
|
334ad0ed49356db93ef17c173cad19d098923ffe |
21-Dec-2012 |
Elliott Hughes <enh@google.com> |
Track the setsebool change in the emulator init.rc. setsebool's syntax changed in November. This is the sole caller in AOSP. Change-Id: I0da608ee974bc3a9060372ef68a71c52726a44a6
tc/init.goldfish.rc
|
191af2f2c3effc5a60f1643dd6283ecc5a521603 |
21-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
am 367f1e4b: am 4f247d75: rootdir: init.rc: set perms for cpufreq governor boostpulse_duration * commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42': rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
|
4f247d753a8865cd16292ff0b720b72c28049786 |
20-Dec-2012 |
Todd Poynor <toddpoynor@google.com> |
rootdir: init.rc: set perms for cpufreq governor boostpulse_duration Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
nit.rc
|
9e2182adc2f91ed3a5e7713ce214aafb537fab43 |
07-Dec-2012 |
Benoit Goby <benoit@android.com> |
am 6d3e6099: am a2411eed: Merge "init.usb.rc: set sys.usb.config to none before changing it" into jb-mr1.1-dev * commit '6d3e6099770c9f78264f573897a8b1923edbee63': init.usb.rc: set sys.usb.config to none before changing it
|
80828af3def1f37eff1d483520df79ebe4238d55 |
06-Dec-2012 |
Benoit Goby <benoit@android.com> |
init.usb.rc: set sys.usb.config to none before changing it On encrypted devices, persistent properties are loaded after the device is decrypted. To properly change sys.usb.config to its persistent value, it must first be set to "none" and then to ${persist.sys.usb.config}. Bug: 7678835 Change-Id: I4f91245cedc04e3178ce9cee21390f5b657733c9
nit.usb.rc
|
92781808bab8f045752aa1824a57956ddd52fcbd |
13-Nov-2012 |
Kenny Root <kroot@google.com> |
Switch keystore to binder Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
nit.rc
|
066d3f9b3bd77df71542b132adda8eb25bc013c0 |
22-Oct-2012 |
Elliott Hughes <enh@google.com> |
resolved conflicts for merge of 3e5e9e9e to jb-mr1-dev-plus-aosp Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
|
f820e85164a1863e4384f5e1ca8b6f46902bd74e |
20-Oct-2012 |
Elliott Hughes <enh@google.com> |
Add a directory for tzdata updates. Bug: 7012465 Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
nit.rc
|
9f239afc3565770f39ae94c2969addb520af3a40 |
17-Oct-2012 |
Zhihai Xu <zhihaixu@google.com> |
second user doesnot pickup input operations from A2DP bug 7335014 Change-Id: I39e450d254647f0b84a07f38f2f2571711fca075
eventd.rc
|
4ef6e4baa9b0d5aadb6668734881bdfae0ac9464 |
16-Oct-2012 |
Todd Poynor <toddpoynor@google.com> |
init.trace.rc: Set perms for power/clock_set_rate events Bug: 7351763 Change-Id: I1ee3d7c9b55d1b55df6cafb1bf21f9139d964646
nit.trace.rc
|
bdec5ead7417769ba9fc75b6ca86d191b49f2be8 |
11-Oct-2012 |
Matthew Xie <mattx@google.com> |
Change dev/uhid group id from bluetooth to net_bt_stack Secondary user need that group id to access the file to support hid bug 7315419 Change-Id: I9d2d3d5a5114d289dc4d83c697421622db4beae6
eventd.rc
|
c6f8bd396614d422d80ac9f24c91fa44a713894a |
08-Oct-2012 |
Dima Zavin <dima@android.com> |
Merge "rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups" into jb-mr1-dev
|
ece565cca2a4babe897f5fd68ab14a7af5071b30 |
05-Oct-2012 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups This is necessary for some HWC hals to be able to communicate with secure side to grant protected access to hardware owned by the hwc. This is necessary on some architectures to grant access to secure buffers to overlay/csc hardware Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
971153aa4a65c4fbc8d916c619a17d3912b2cb02 |
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Create bluetooth stack aid for sharing gid between all bluetooth processes bug 6925422 Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
nit.rc
|
d6d478058fc201bfc70f353019477e17c71a29d4 |
27-Sep-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Add writable data space for radio. Storing Premium SMS regex's in /data/misc/sms. bug:7221402 Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
nit.rc
|
9481266ea360e0a8f326fec1106ea445f2ef883c |
25-Sep-2012 |
Dima Zavin <dima@android.com> |
init.rc: chmod slabinfo to 440 to capture slabinfo in BRs Bug: 7232205 Change-Id: I0d785302818a37b722e79bf740644ede52c60148 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
f1c50bf63857b9cdabcf930363c372defc6383a8 |
21-Sep-2012 |
Todd Poynor <toddpoynor@google.com> |
init: import init.trace.rc after h/w-specific rc Board-specific .rc file mounts debugfs, then fixup perms on tracing sysfs files for systrace. Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
nit.rc
|
5054417c1025b0f3f36f4b537e51ddd3eea981c8 |
09-Sep-2012 |
Kenny Root <kroot@google.com> |
Add /data/app-lib for native library sharing Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
nit.rc
|
58d3980f314d08f86347ba83db85c2d4c6066599 |
06-Sep-2012 |
Jeff Sharkey <jsharkey@android.com> |
Keep /mnt/secure private to default namespace. When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE those mountpoints when vetting is finished. However, the kernel doesn't allow MS_MOVE when the source is shared to child namespaces. To work around this, create a tmpfs at /mnt/secure and mark it as private (not shared). Verified that vold can now successfully move from the staging area. Bug: 7094858 Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
nit.rc
|
35ea5e4f2365ad791824ee49d1c999be81b705c5 |
28-Aug-2012 |
Mike Lockwood <lockwood@google.com> |
import init.${ro.hardware}.rc last to allow overriding default USB configuration Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
nit.rc
|
f824ad7b35c3bf866d60662404be0d55fe753e3d |
23-Aug-2012 |
Wink Saville <wink@google.com> |
am 582b1152: am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" * commit '582b11527cd6d968f163fbee73f92d82b679e330': Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
42a1e6c9d827fc3d64ad3b0750b87de1f4c436e7 |
23-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Iteration on multi-user external storage." into jb-mr1-dev
|
582b11527cd6d968f163fbee73f92d82b679e330 |
23-Aug-2012 |
Wink Saville <wink@google.com> |
am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" * commit 'baba99840400f5b835d44b6d91e2190136277988': Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
baba99840400f5b835d44b6d91e2190136277988 |
23-Aug-2012 |
Wink Saville <wink@google.com> |
Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
|
bfcd810b792f7ffbb2ec1360c0c2662725fd0362 |
22-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Iteration on multi-user external storage. Define /storage as top-level concept, so that we enforce permissions uniformly. Moves external storage paths from headers to per-device environment variables. Added missing mount flags, and we no longer have adb-specific external storage. Bug: 6925012 Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
nit.rc
|
61f1359486e578bc0fc12bc4f42c7cd65991fc5c |
20-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Remove sdcard groups from services. Even with the groups, services no longer have access. Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
nit.rc
|
5dd0f86fbfed631b31c9055109889f1d9559a3ea |
18-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate sdcard0 to shell-accessible location. Also remove mount() from adb, since it can come online long before data partition is ready. Set EXTERNAL_STORAGE environment variable to point to owner for backwards compatibility. Bug: 7005701 Change-Id: I63444f6636624eb7ad89f053daa289663424639e
nit.rc
|
2be5338a84f19b24b6515c0bfcf2f3f7b55262c1 |
16-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Multi-user external storage support." into jb-mr1-dev
|
edb2d634b35ec1b0268ac7d9ddab8c8fc082a14e |
16-Aug-2012 |
Scott Anderson <saa@android.com> |
Merge "ueventd.rc: Add /dev/uhid for bluedroid" into jb-mr1-dev
|
885342a0f2c834a6b680284047c47c9d04b32565 |
15-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Multi-user external storage support. Remount rootfs as recursively shared, so that mount changes are propagated into child namespaces. Mount external storage for access from adb. Clean multi-user dependencies for use in Dalvik. Also define external storage paths. Bug: 6925012 Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
nit.rc
|
3ad289dca66ce950f417280b2c071a8dd1975598 |
16-Aug-2012 |
Scott Anderson <saa@android.com> |
ueventd.rc: Add /dev/uhid for bluedroid Change-Id: Ica71265856fce1abc0a0ba9c0b1ca016510c61b7 Signed-off-by: Scott Anderson <saa@android.com>
eventd.rc
|
847cb4d125fa9eeb4272a0676e1dac847d4b8a96 |
15-Aug-2012 |
Keun-young Park <keunyoung@google.com> |
am 8f19b11a: am c4c731e7: Merge "[MIPS] Enable SD-card functionality to work" * commit '8f19b11a42423ecd4ac8373041f64cb3001caf78': [MIPS] Enable SD-card functionality to work
|
8f19b11a42423ecd4ac8373041f64cb3001caf78 |
15-Aug-2012 |
Keun-young Park <keunyoung@google.com> |
am c4c731e7: Merge "[MIPS] Enable SD-card functionality to work" * commit 'c4c731e78ca1a3527093a35280381616d1cb667d': [MIPS] Enable SD-card functionality to work
|
c4c731e78ca1a3527093a35280381616d1cb667d |
15-Aug-2012 |
Keun-young Park <keunyoung@google.com> |
Merge "[MIPS] Enable SD-card functionality to work"
|
96539e8153dadeccb8b7d334cda8b2acaaa68f06 |
14-Aug-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am ee0d281a: am c95c15b1: Merge "Char device /dev/dri/card0 was not created during startup." * commit 'ee0d281a3e5fe611bdda23db18fa0e5684ee43ed': Char device /dev/dri/card0 was not created during startup.
|
ee0d281a3e5fe611bdda23db18fa0e5684ee43ed |
14-Aug-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am c95c15b1: Merge "Char device /dev/dri/card0 was not created during startup." * commit 'c95c15b1923611f48c44c18ad158e57b9d915fdf': Char device /dev/dri/card0 was not created during startup.
|
c95c15b1923611f48c44c18ad158e57b9d915fdf |
14-Aug-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Char device /dev/dri/card0 was not created during startup."
|
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa |
13-Aug-2012 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 4dcd52ab to jb-mr1-dev Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
4dcd52ab11d25fe3d53aab52b6c233e692da4eae |
13-Aug-2012 |
Kenny Root <kroot@android.com> |
am 297f802f: Merge "Add support for reloading policy from /data/system." * commit '297f802f25d093274c1f5fb890ee8dfacfbf159e': Add support for reloading policy from /data/system.
|
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 |
01-May-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add support for reloading policy from /data/system. To support runtime policy management, add support for reloading policy from /data/system. This can be triggered by setting the selinux.loadpolicy property to 1, whether from init.rc after mounting /data or from the system_server (e.g. upon invocation of a new device admin API for provisioning policy). ueventd and installd are restarted upon policy reloads to pick up the new policy configurations relevant to their operation. Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
|
b35e36e5a92ac984a57ec15b14dc6ad3b0ecf1c5 |
03-Aug-2012 |
Colin Cross <ccross@android.com> |
init.rc: make last_kmsg readable only by user system and group log chown /proc/last_kmsg to user system group log during init, and chmod it to readable only by user and group. Bug: 6925227 Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
nit.rc
|
35fc46d8e338181ee3caedc30f3627bad2ffe35e |
01-Aug-2012 |
Dima Zavin <dima@android.com> |
am 018227f5: am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android." * commit '018227f5394c3126f4a858596cb85dee1893b895': Modify init.rc and init.goldfish.rc for SE Android.
|
018227f5394c3126f4a858596cb85dee1893b895 |
01-Aug-2012 |
Dima Zavin <dima@android.com> |
am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android." * commit 'ce76e2d00e63339083ea693db33de05cbba5600e': Modify init.rc and init.goldfish.rc for SE Android.
|
ce76e2d00e63339083ea693db33de05cbba5600e |
01-Aug-2012 |
Dima Zavin <dima@android.com> |
Merge "Modify init.rc and init.goldfish.rc for SE Android."
|
0245e15bb78cf08b3225b31c77bda77d43995bd4 |
10-May-2012 |
Benoit Goby <benoit@android.com> |
rootdir: Create /data/misc/adb on boot Change-Id: I0f8d11391cdcfbaa50f87f637a2962c6663b2767
nit.rc
|
0574d6b07711e90547d8166c222e09d80f702620 |
25-Apr-2012 |
Benoit Goby <benoit@android.com> |
init.rc: Add socket for adbd Change-Id: Ic97fd464440ff4a29fc9da7ad15949ac5215ade3
nit.rc
|
1eee419e7a1c5789f81e1e3a19693403495e70f1 |
13-Jan-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Modify init.rc and init.goldfish.rc for SE Android. Set the security context for the init process. Restore the security contexts of /cache and /data in case they were reset. Specify the security context for services launched from the rootfs since we cannot label their executables. If on the emulator, set a policy boolean and restore the context of /sys/qemu_trace to allow accesses not normally permitted on a device. Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
tc/init.goldfish.rc
nit.rc
|
e8b76a36bacd11ab54332ba5a25d8593d9c3f57f |
26-Jul-2012 |
Naveen Kalla <nkalla@codeaurora.org> |
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
nit.rc
|
e6f8d45da8c61d67dc9fdc1cec53f40594043817 |
28-Sep-2011 |
Lukasz Anaczkowski <lukasz.anaczkowski@intel.com> |
Char device /dev/dri/card0 was not created during startup. This device is required by libdrm for GPUs like IvyBridge. Change-Id: I0ac47056a9cec2100f3e6eaa5591571fe6bbc145 Signed-off-by: Lukasz Anaczkowski <lukasz.anaczkowski@intel.com> Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
eventd.rc
|
b3a679386d26677290a09fdf4e3406c57e835fd0 |
13-Jun-2012 |
Wink Saville <wink@google.com> |
Add telephony-common and mms-common to BOOTCLASSPATH - DO NOT MERGE Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
nit.rc
|
4c3ac516ff391d9fc93ec997ce254f83af722a1a |
08-Apr-2012 |
Matthew Xie <mattx@google.com> |
remove dbus and bluetoothd, create bluedroid data dirs Change-Id: Ifacd570dbadc075e498a626935e035c76a0d83c4
nit.rc
|
5acf1d6625e3e45ccdc29fd49222defc2788ada0 |
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
am 87314036: am 55b763ff: Grant sdcard_r to ril-daemon. * commit '873140368613af2d1c06e18ac2fd6fe24623b9bb': Grant sdcard_r to ril-daemon.
|
873140368613af2d1c06e18ac2fd6fe24623b9bb |
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
am 55b763ff: Grant sdcard_r to ril-daemon. * commit '55b763ff7b779d7ee91f245e0887332db8782afe': Grant sdcard_r to ril-daemon.
|
55b763ff7b779d7ee91f245e0887332db8782afe |
13-Jul-2012 |
Jeff Sharkey <jsharkey@android.com> |
Grant sdcard_r to ril-daemon. Bug: 6793799 Change-Id: Ife23c98c30d7b08479d75798c7075005bf281119
nit.rc
|
557ed7a487795b2b3ac441bbbbe619788c93b78f |
12-Jul-2012 |
Wink Saville <wink@google.com> |
Merge commit 'de016eef' into mit * commit 'de016eef': Add telephony-common and mms-common to BOOTCLASSPATH
|
de016eef3366739d69d7908e4e6dbd54785632ab |
13-Jun-2012 |
Wink Saville <wink@google.com> |
Add telephony-common and mms-common to BOOTCLASSPATH Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
nit.rc
|
c06be8a15d8d89bcc8ac505b25b5e828e90a5be6 |
12-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
am 1e96e16f: am 0f3974c3: Merge "Enable tracing on user builds" into jb-dev * commit '1e96e16f81ce46adf5329b1db4662b53b927d4e2': Enable tracing on user builds
|
0f3974c3d0ee2ffe5e0cb9a56658ba18d511f6ea |
11-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
Merge "Enable tracing on user builds" into jb-dev
|
1279013dee790c84758e5fc5bed33b5c9df2af9b |
07-Jun-2012 |
Jamie Gennis <jgennis@google.com> |
Enable tracing on user builds This change adds init.rc steps to: * allow kernel tracing to be enabled via adb * allow a limited set of kernel trace events to be enabled via adb * allow the kernel trace to be read via adb * allow all users to write to the kernel trace from userland Bug: 6513400 Change-Id: Ic3c189b5697aa5edf88d2f507c932971bed6caff
nit.rc
nit.trace.rc
|
a7fbf8a673e90918d55e441dbd5a29a87615dfa9 |
08-Jun-2012 |
Bhanu Chetlapalli <bhanu@mips.com> |
[MIPS] Enable SD-card functionality to work Change-Id: I711f533214b9b7bce2ff1000a55d6b8f310f2399 Signed-Off-By: Bhanu Chetlapalli <bhanu@mips.com>
ndroid.mk
|
6ba76f019040a0445575deb6995cd32ea72903dd |
07-Jun-2012 |
Arve Hjønnevåg <arve@android.com> |
Merge "init.rc: Set owner for /sys/power/autosleep"
|
5f2d00b0677cbe9ad42ea0394def0a51aef7bdda |
04-Jun-2012 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: remove audio app/sys groups, merge to fg With this change, the audio rr/fifo threads will just run in the fg cgroup. Also, the RR budget for the apps fg/bg threads has been bumped to 80%. Ideally, the bg budget would be much smaller but there are legacy libraries that seem to be very sensitive to this so for now keep it at this value. Bug: 6528015 Change-Id: I08f295e7ba195a449b96cd79d954b0529cee8636 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
df44b88621f60e933d7d31090bf0bb892e88142c |
04-Jun-2012 |
Dima Zavin <dima@android.com> |
core: init.rc: create apps cgroup for fg tasks, move bg under it Bug: 6538553 Change-Id: I7c29975aa376bcdda9d6bbd1fd3e04fdb1c1b1fe Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
4c48025c484e9fb0e10bb9c6a1b9bbd5a2def555 |
16-May-2012 |
Colin Cross <ccross@android.com> |
Increase cpu.rt_runtime_us to 10% for fg and bg groups GPS on yakju puts SCHED_RR threads in the fg and bg groups, and is unhappy with 0.1% limits. Increase the limits to 10%. Change-Id: I971c9b0a815890d41694b965fdd2b023937a4411
nit.rc
|
50efaf2f7fc87692649497dba5615e54efd9c637 |
12-May-2012 |
Todd Poynor <toddpoynor@google.com> |
Merge "init: Set perms for interactive cpufreq governor boostpulse" into jb-dev
|
367e7b195b144772464e560352caa2017a53058c |
10-May-2012 |
Colin Cross <ccross@android.com> |
Increase rt_runtime_us to 1000 for foreground and bg_non_interactive rt_runtime_us=0 can cause deadlocks if a SCHED_FIFO/SCHED_RR thread is moved into the wrong cgroup. Change-Id: I4633392fb529039dff6ba5d3a6b672e0de9fc2d9
nit.rc
|
4ff10e63c3814f7b40c6e4e672c895135a1b1a3d |
04-May-2012 |
Todd Poynor <toddpoynor@google.com> |
init: Set perms for interactive cpufreq governor boostpulse Change-Id: Ia4b028f58f9d48bad2525744497f10884d11c5d6
nit.rc
|
70a163f519db14532b7dcde4bc65d1d658a760e4 |
03-May-2012 |
Arve Hjønnevåg <arve@android.com> |
init.rc: Set owner for /sys/power/autosleep Change-Id: Ia18cce973c71e7561ca84b23e37b0b8e056a7143
nit.rc
|
7e057eb0047819ee4d8af52d2747a7bf29b0cc56 |
02-May-2012 |
Glenn Kasten <gkasten@google.com> |
Merge "Increase budget" into jb-dev
|
94a55df34d917492cb3613b9445ffb1659459186 |
02-May-2012 |
Jeff Tinker <jtinker@google.com> |
Merge "Fix failure to play pinned movies" into jb-dev
|
59e6eb09997125aecc122c7d7d9a6e3ec00be4c4 |
01-May-2012 |
Glenn Kasten <gkasten@google.com> |
Increase budget Change-Id: I6706a408990abf8d420db73280df2818b8827140
nit.rc
|
65f1fbcad3247997cf0f0eca54b88f0692781109 |
01-May-2012 |
Jeff Tinker <jtinker@google.com> |
Fix failure to play pinned movies DRM server process needs to be able to access movies on sdcard to acquire rights. related-to-bug: 6414503 Change-Id: If90404e32fd437b8fb7d5a6ec8dfb30a499ef733
nit.rc
|
33045a627d4dac8c4c8a910241298ca5da02f87b |
28-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init: Set perms for cpufreq interactive governor input boost sysfs Change-Id: Ie475c95d81635a068db11e7018895024247878b4
nit.rc
|
25dd43a9a5073f0e59102750cb0410b8e9bc9847 |
27-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Restrict zygote to system user. CVE-2011-3918: Address denial of service attack against Android's zygote process. This change enforces that only UID=system can directly connect to zygote to spawn processes. Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
nit.rc
|
8d3ea1d1e198e71ca3f856c6f397faf40922f562 |
25-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init: set perms for cpufreq interactive governor boost -- DO NOT MERGE Change-Id: I6509cda358b4a75706afd01a5b5a36eabe492554 Signed-off-by: Todd Poynor <toddpoynor@google.com>
nit.rc
|
f8bbaba57bf309fec83dc9842176d996831e6db1 |
13-Apr-2012 |
Kenny Root <kroot@google.com> |
Add directory for forward locked apps in ASECs Forward locked apps on internal storage will be stored in ASEC containers using ext4. This way permissions can be preserved whether on internal or external storage. Change-Id: I942f8f0743c210330a11e2b1d0204df7a5ddb2ae
nit.rc
|
b91bd9f599c43b602eac334244173000a6ce011a |
20-Apr-2012 |
Glenn Kasten <gkasten@google.com> |
Update cgroups Change-Id: If4488944e8a1c8af7b13847069d03b7ea4a30785
nit.rc
|
f35c203558b0648c351a5262568b383d41639a8b |
19-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set perms for cpufreq interactive governor above_hispeed_delay Change-Id: Ib9c3fb4e43759af590a6e033b8ba04c0023d5f07
nit.rc
|
b47cd10acf6eb9449fc12a93f17f720b21e998c8 |
17-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
Merge "init.rc: Add support for new USB accessory configurations"
|
5fa860dea3618d5397bb580645f057a6e975786e |
13-Apr-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Add MDNS service"
|
6a35bb3529520dd1a47a5d0f58abf91d38eb0222 |
12-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
Merge "init.rc: Set owner and permissions for cpufreq files"
|
0653b97b2594d5e3f21c6326fb121741bfbf65f7 |
11-Apr-2012 |
Todd Poynor <toddpoynor@google.com> |
init.rc: Set owner and permissions for cpufreq files Change-Id: Iaaf8491915567dbe22cab1798081a00fed4fb2e2
nit.rc
|
4f5d5176a3d732baebe92ab3748a12166406a198 |
04-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
init.rc: Add support for new USB accessory configurations Also moved USB scripts to new file init.usb.rc Change-Id: I98e099fbd8de3eb3e1e18c9ef69312608033a50c Signed-off-by: Mike Lockwood <lockwood@google.com>
ndroid.mk
nit.rc
nit.usb.rc
|
db49739f390992a3d68303765ac36f14ed09b68a |
10-Apr-2012 |
Jamie Gennis <jgennis@google.com> |
Add tracing initialization to init.rc. This change adds init.rc steps to allow kernel tracing to support inserting messages from any userland process. Change-Id: I01970728d7132a25408fed09a213a015ac05ccaf
nit.rc
|
1d91fcf7c0a31d27097b196579a37873ba1c0934 |
28-Mar-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Add MDNS service Adds both the new service and another socket for netd. Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
nit.rc
|
c8583c680a62dcd8f66952a71cd986f477aa1241 |
29-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "change files in /dev/log/ to 666"
|
3439cc6145d24d2495490dab3e48d91cf36bccc3 |
29-Mar-2012 |
Nick Kralevich <nnk@google.com> |
change files in /dev/log/ to 666 With newer Android kernels, anyone can read from the files in /dev/log. If you're in the logs group (have the READ_LOGS) permission, you'll see all entries. If you're not in that group, you'll see log messages associated with your UID. Relax the permissions on the files in /dev/log/ to allow an application to read it's own log messages. Bug: 5748848 Change-Id: Ie740284e96a69567dc73d738117316f938491777
eventd.rc
|
71513567dc0249af1b304e458ceac391ffcbeff5 |
27-Mar-2012 |
Marius Renn <renn@google.com> |
Multi-Project Commit: Move of filterfw out of system/media (6 of 7) This is part of the multi-project commit to move the filter-framework from system/media/mca to frameworks/base/media/mca. Note that the filter-framework will soon be replaced with a refactored version currently under API review (also to go under frameworks/base). This move is done now to unblock the PDK efforts. Change-Id: I87d034a30bb4b98a85a028cb728e37fb97256039
nit.rc
|
31fb85865431f98008608b62964cb1c975ca4b71 |
26-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "drmserver: add group drm"
|
62e5cbaebc29d83148dd1ce30a620a37dcdbe7ed |
26-Mar-2012 |
Benoit Goby <benoit@android.com> |
Merge "Revert "Reimplement the "adb root" command to more closely match its previous behavior""
|
3c9eed88c529374c8d80e1daa62ad9bf25c9670e |
26-Mar-2012 |
Nick Kralevich <nnk@google.com> |
drmserver: add group drm Make the drm server run as UID=drm, GID=drm. This ensures that any files created by the drmserver app do not have GID=system. Bug: 5834297 Change-Id: I3409ad350e9cc82bb0982cdbe470ec1f10b1ca67
nit.rc
|
2affe824ba249b532c5b39941bcdc15800900f6c |
22-Mar-2012 |
Kenny Root <kroot@google.com> |
Merge "Put keystore into the drmrpc group"
|
9865be95cf60848d91364b42c2cadd90e63fec66 |
22-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '19155b5' Do not start sshd by default Change-Id: I22e6dbb6834321709e9b7c5ae49846d7f9f7c67a
|
a9bb7261b4db2372ee0f339d250079c967262758 |
22-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '9dd2eef' sshd to init.rc Change-Id: I8eedc3b47f1260502034067d9006cac827cb1089
|
19155b5cd3ee8674a13f7bf111e06b05f0114433 |
21-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
init.rc: Do not start sshd by default Change-Id: Ieacd4e8fbfcd91ed2342b7a104a9b1f4114fc6d5 Signed-off-by: Mike Lockwood <lockwood@google.com>
nit.rc
|
1670f831a56f7232f337407c746e97c5929ee417 |
21-Mar-2012 |
Arve Hjønnevåg <arve@android.com> |
init.rc: Fix permissions on /sys/power/state and /sys/power/wakeup_count Change-Id: I06a1a2affebdf64f008eaa61a0851f1e832059c5
nit.rc
|
7941cf87f624e7747b5bb868a27904c7a3be0ca4 |
16-Mar-2012 |
Benoit Goby <benoit@android.com> |
Revert "Reimplement the "adb root" command to more closely match its previous behavior" This reverts commit 535164e9d9649a83d4d63829f3389f2bea339fe1.
nit.rc
|
f3ef1271f225d9f00bb4ebb0573eb3e03829f9a8 |
14-Mar-2012 |
Nick Kralevich <nnk@google.com> |
init.rc: Add documentation Android developers should never place files in /data/local/tmp. Files or directories in /data/local/tmp can be minipulated by the shell user. Android developers should never create world-writable files or directories. This is a common source of security vulnerabilities. Change-Id: I6d2cd620ab49d8ca3f39282f7d2ed682a9ba91c3
nit.rc
|
ad5b9c7205ac2a9ac500c6d455bf46f8ab3aafe0 |
24-Feb-2012 |
Kenny Root <kroot@google.com> |
Put keystore into the drmrpc group The keystore service needs to access hardware crypto devices to fulfill its function on devices with hardware crypto. This role was assigned to the (now misnamed) drmrpc group. Change-Id: Ia32f9e96b4372f0974984451680f9a0f6157aa01
nit.rc
|
89c5926f08fdf551c33ccbfbec5d6bb7d911f067 |
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 0b32a75b: am c8d1a0e1: am 5ebced39: init.rc: update the permission of /data/local. * commit '0b32a75b7c7f25bd9ab325f44626c402fd9b9b23': init.rc: update the permission of /data/local.
|
c8d1a0e18e008009fe75aa2cc7d3deace0479fce |
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 5ebced39: init.rc: update the permission of /data/local. * commit '5ebced39093d1223566166b8cc6abfe6729c487d': init.rc: update the permission of /data/local.
|
5383476727659544875b90d49a5371886a31c1fe |
08-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
am 5ebced39: init.rc: update the permission of /data/local. * commit '5ebced39093d1223566166b8cc6abfe6729c487d': init.rc: update the permission of /data/local.
|
5ebced39093d1223566166b8cc6abfe6729c487d |
07-Mar-2012 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: update the permission of /data/local. Bug: 6131945 Change-Id: I3094a471dcfb02b786f47b6778c8fed3726325ec
nit.rc
|
e7fd911fd42b1f8bea6a004e2bcc1d2dda4ec718 |
27-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Restrict zygote to system user. CVE-2011-3918: Address denial of service attack against Android's zygote process. This change enforces that only UID=system can directly connect to zygote to spawn processes. Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
nit.rc
|
dae26c6ac44e9c47cc60fcaa3d04c54d68d66760 |
12-Jan-2012 |
James Dong <jdong@google.com> |
am 3e9c9ac5: am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '3e9c9ac5ee7a36653b90cb86eb6445496b536c16': Close a security hole - do not give world readable/writable access to /data/drm
|
d95c6152197cf3976797267ad40e61b7344933de |
12-Jan-2012 |
James Dong <jdong@google.com> |
am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '032afc1d52289f486538c9ed53f17b9889ea94df': Close a security hole - do not give world readable/writable access to /data/drm
|
3e9c9ac5ee7a36653b90cb86eb6445496b536c16 |
12-Jan-2012 |
James Dong <jdong@google.com> |
am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1 * commit '032afc1d52289f486538c9ed53f17b9889ea94df': Close a security hole - do not give world readable/writable access to /data/drm
|
f90b0e04a61ab3bf5239afb2f7157aabe5fbca8f |
10-Jan-2012 |
Dima Zavin <dima@android.com> |
rootdir: convert all usages of $prop to ${prop} Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
3e7b7739e3d4d7aaaa363645501036dafcc30ed3 |
16-Dec-2011 |
Dima Zavin <dima@android.com> |
init: import the hardware specific init file in init.rc This removes the hardcoding of the file import in init and instead allows the init.rc file to fully control what is loaded. Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
683a09352a0adf8924d67c9aa80bce244592aa25 |
10-Jan-2012 |
Dima Zavin <dima@android.com> |
rootdir: convert all usages of $prop to ${prop} Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
09cdc0ea12598651d1c074974c9b593fd1c0e4ba |
07-Jan-2012 |
James Dong <jdong@google.com> |
Close a security hole - do not give world readable/writable access to /data/drm o related-to-bug: 5834297 Change-Id: I8e459610b4f69999be37364c2359b2bac82d4a2a
nit.rc
|
7634bf87cf6490e5544f040fb403eb164cf0ee5f |
16-Dec-2011 |
Dima Zavin <dima@android.com> |
init: import the hardware specific init file in init.rc This removes the hardcoding of the file import in init and instead allows the init.rc file to fully control what is loaded. Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
9dd2eef07bbee6ff5b1d1a9ccda6e3499391ecb6 |
12-Dec-2011 |
Mike Lockwood <lockwood@google.com> |
add sshd to init.rc Change-Id: Ide6e8cca58f090e84d85d0298058c523863d1c43 Signed-off-by: Mike Lockwood <lockwood@google.com>
nit.rc
|
27cca21a5d0a6beff31d2f9ff1441afc1271a346 |
05-Dec-2011 |
Nick Kralevich <nnk@google.com> |
set mmap_min_addr to 32768 Bug: 5712789 Change-Id: I586a99cd63d8fba06bc2562b1cfce531ee4f554c
nit.rc
|
f9557fba347bcb837892458fabd7454e1a1a4d6a |
08-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Set /proc/sys/kernel/dmesg_restrict to 1 Set dmesg_restrict to 1 to help limit inadvertent information leaks from the kernel to non-privileged programs. Root and programs with CAP_SYSLOG will continue to have access to dmesg output. See "dmesg_restrict" in Documentation/sysctl/kernel.txt from the Linux kernel source code. Bug: 5585365 Change-Id: Iffcf060ea4bd446ab9acf62b8b61d315d4ec4633
nit.rc
|
1e339a710e0993c18c8b96f9224ebd3aa29cf8cd |
08-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Merge "Set kptr_restrict to 2."
|
3c58933aa785ab26f77284f6a1a4e93d2ebfcf04 |
07-Nov-2011 |
Dima Zavin <dima@android.com> |
am 4a253908: rootdir: init.rc: write default oom_adj before starting ueventd * commit '4a2539085062a715b0d345eb50ea48738423c909': rootdir: init.rc: write default oom_adj before starting ueventd
|
4a2539085062a715b0d345eb50ea48738423c909 |
04-Nov-2011 |
Dima Zavin <dima@android.com> |
rootdir: init.rc: write default oom_adj before starting ueventd Otherwise, ueventd's oom_adj value would have been 0 and it could easily get killed early during low memory events Change-Id: I1adbd18c37215b26ae77e70f7b8dbd1e143fc2d4 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
2e7c833279349a694af15f2447cc214dc30bcc01 |
02-Nov-2011 |
Nick Kralevich <nnk@google.com> |
Set kptr_restrict to 2. To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms Bug: 5555668 Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b
nit.rc
|
04a875902ece07769101a5202e3af554af31a911 |
31-Oct-2011 |
Mathias Agopian <mathias@google.com> |
restart surfaceflinger and drmserver when servicemanager dies Bug: 5450389 Change-Id: Ib4e73836721e25e2a88185167b030ea75e0d74e3
nit.rc
|
8cdd4c335f0d6e35e6def5ea73dcefb9687071b0 |
18-Oct-2011 |
sinikang <sinikang@samsung.com> |
am aa75df74: [maguro] : add setprop net.tcp.buffersize.hspa * commit 'aa75df74db5beffd25821ed6c360c36197d7bac1': [maguro] : add setprop net.tcp.buffersize.hspa
|
aa75df74db5beffd25821ed6c360c36197d7bac1 |
16-Oct-2011 |
sinikang <sinikang@samsung.com> |
[maguro] : add setprop net.tcp.buffersize.hspa -window size optimized for hspa -Patchset2 : space removed Change-Id: Ia4d1043d1a93c929721a4d7cca60ce9ff8bbf67a Signed-off-by: sinikang <sinikang@samsung.com>
nit.rc
|
d707fb3fb6448be04d6e14f7e478df7e298ebf35 |
06-Oct-2011 |
Nick Kralevich <nnk@google.com> |
enable heap randomization. Bug: 5250555 Change-Id: I7acb0645402611875c481aec33ece85fced7a336
nit.rc
|
4e803c3c18ad6a0cebbb16e2cf623a174f5201e1 |
10-Oct-2011 |
Wink Saville <wink@google.com> |
Merge "Add log group to rild to improve log collection on modem issue"
|
f791e17bc94e1308245bf8bf16d1d98e7fd9dcda |
08-Oct-2011 |
Jeffrey Tinker <jtinker@google.com> |
Merge "Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls"
|
65c4df51f895b79fc599d3bfa796ddfc660d47e4 |
07-Oct-2011 |
Jeffrey Tinker <jtinker@google.com> |
Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls Bug 4598045 Implementing secure video path on TI OMAP4 chip for ICS Change-Id: Iacfe3e79f067172085b96bb4cd4484101aa5be1e
nit.rc
|
e65e946382033a94f99f0f05678bb1e6329e3182 |
29-Sep-2011 |
Kazuhiro Ondo <kazuhiro.ondo@motorola.com> |
Add log group to rild to improve log collection on modem issue Add log group to ril-daemon service. rild is the best place to know the issue on the modem in many time. It would be helpful if rild alone can capture the snapshot of logcat buffers at the moment of problem. Change-Id: Ie0dcda126fb748a00e650427de35541672359287
nit.rc
|
a503456526359767ffb383a06835308f62172dde |
16-Sep-2011 |
David 'Digit' Turner <digit@google.com> |
emulator: Move qemu-props to core service The qemu-props program is launched at boot to read a series of system property assignments from the emulator and apply them. This is necessary to deal with the dynamic nature of the emulated platform (e.g. the screen density which depends on the skin and cannot be hard-coded in the platform image). This patch ensures that qemu-props is started before any other service that may read one of these properties (e.g. surface flinger). This is done by encapsulating the program into a 'core' service. Core services are all stared before regular ones. Before the patch, qemu-props was started manually inside a script that is called from a late emulator-specific boot service (goldfish-setup). The problem was that sometimes qemu-props was run too late. This resulted in random flakiness, especially when running on a low-end host machine. Fix for bug 2161189 (and probably a few others) Change-Id: I2933a25dcb5fecbb1fc238f157264e621b8f295b
tc/init.goldfish.rc
tc/init.goldfish.sh
|
8e3ff70444ac919d0b70eaa1fbe97a3ef5bdb9ef |
12-Sep-2011 |
JP Abgrall <jpa@google.com> |
init.rc: allow all users to open the qtaguid misc dev The netfilter xt_qtaguid module uses a misc dev so that processes that use the module can be tracked. Every process that does socket tagging must open that dev. Change-Id: I6af3e0f0180637b14455dd9607724523f142c402
nit.rc
|
1ac40f4ef18799e252115d9c9ad17396ffb68f3d |
08-Sep-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Increase the window sizes on wifi and lte. Set to 524288,1048576,2097152, 262144,524288,1048576. bug:5226360 Change-Id: Id9d4257c51a355d78246b4ca59ab462fbe5b72be
nit.rc
|
ca47cef7491caf6072984d9d64c768717baad09a |
25-Aug-2011 |
Dima Zavin <dima@android.com> |
init: add charge mode handling Introduces a 'charger' section that is processed when androidboot.mode supplied on the kernel commandline is "charger". In this mode, sections such as fs, post-fs, etc are skipped. Only the 'early-init' and 'init' sections of the init rc files are processed before processing the 'charger' section. Change-Id: If9eb6334de18f04cbcf2aab784578e2993615242 Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
|
85e37b0a81f2f24f223c8917db69221779f0d2b0 |
18-Aug-2011 |
JP Abgrall <jpa@google.com> |
init: allow mediaserver to tag socket (group net_bw_acct) The mediaserver needs to do communication on behalf of other apps (browser, ...). It needs to be able to tag sockets. The kernel will check for net_bw_acct group membership. Change-Id: I7fb063fdb7d9435d7f979df6622ff17f34049cbc
nit.rc
|
d09196d00cb5bf3bffb22d3aae45c8797f1ddf4c |
08-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Merge "Activity Manager now takes care of setting OOM values."
|
a24687197d69ac677d176dbc41d5cfd65d1afc44 |
08-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: add inet permission to VPN daemons explicitly. Racoon still needs it after dropping root privilege, or pure IPSec VPN will fail. Mtpd works without it because net_raw implies inet. However it would be better to set all of them clearly without the assumption. Change-Id: I50762af2c25ec9cc559e528c7b14f469494fd553
nit.rc
|
06787f4089093fed8a01ec3a3d2092e10919b77e |
08-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Activity Manager now takes care of setting OOM values. All init needs to do is make these files writeable so that the activity manager can set them. Change-Id: Ieea43208fadc01504d813be379aecbafcadf0d34
nit.lowmem.rc
nit.rc
|
7804cbf4833cba82bd38f6adaf567bcb8262c3ad |
29-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
Move some common USB configuration logic to init.rc Change-Id: Ib75ccfd9c4aa8aace936370c33f33a922ca3c51f Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
3507616870acd71bbd26e045528b0cfe716d37cd |
24-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Fix issue 4604090: notification sound interrupted. Removed system from mediaserver groups. Not needed anymore now that AudioFlinger acquires wake locks via PowerManagerService. Change-Id: I177b968a0a30557d871188bf3991b96d9b391d3c
nit.rc
|
4a2b0fcd6e166499fe51e920aca5f9640dd05939 |
15-Jul-2011 |
Conley Owens <cco3@android.com> |
am aa4a66a1: am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache." * commit 'aa4a66a16dd9b97fb876bb296366442b8745a10b': Create world readable, system writeable /data/resource-cache.
|
aa4a66a16dd9b97fb876bb296366442b8745a10b |
15-Jul-2011 |
Conley Owens <cco3@android.com> |
am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache." * commit '1e5e2d7673a9ea915283f6626fa692cc169b0e67': Create world readable, system writeable /data/resource-cache.
|
56286d6fdb07d8b1310c27eeb59bdf05500f166e |
11-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "init: update permissions for VPN."
|
9bb4d411e01c8e6330b5c27c489485592360576b |
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: update permissions for VPN. VPN no longer uses system properties to keep network parameters. Besides, profiles are now stored and encrypted by keystore. Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
nit.rc
|
50d9819ef49c2d557ad0b33a7880a7a3b72e3fb8 |
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "init: clean up init.rc as now mkdir handles EEXIST."
|
ea7441415997faf34f7ae44f462f916f5f7ea0df |
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: clean up init.rc as now mkdir handles EEXIST. Change-Id: I3fa2a618ef27197315fc128738a284ac644e86c0
nit.rc
|
f48fd5d403d77c4586ad0e715affd601a0934334 |
07-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Temporary workaround for issue 4604090 There was a regression caused by a change in Honeycomb that removed mediaserver process from system group to improve security: This prevents the audio HAL (which runs in mediaserver process) from taking wake locks while audio is playing thus causing the pcm stream to get unexpectedly suspended. This temporary workaround is just to allow ICS dogfood in better conditions until a real fix taking into account the security issue is implemented. Change-Id: Ic19a23da4b4383559188b6f5c3a82604c3d95d74
nit.rc
|
e89675584df1f02dd4642585493a19ac3e691bc5 |
07-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "init.rc: Allow system process to configure RNDIS USB ethernet address"
|
64416c816cbe1161a09d6e6a65732399fac4e3ca |
06-Jul-2011 |
Mathias Agopian <mathias@google.com> |
Merge "don't restart surfaceflinger when the window manager dies"
|
9350a00ce65a6425ba4566fe943c954373240f6c |
06-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
init.rc: Allow system process to configure RNDIS USB ethernet address Change-Id: Id339d8359e592dbc1279e423d9a5adc3a775949d Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
b4daef45310891d550ea9cfb89ab4bf5b3e15ef5 |
02-Jul-2011 |
Mathias Agopian <mathias@google.com> |
don't restart surfaceflinger when the window manager dies Change-Id: Ia3c60e6c5471e2b72d53c936de44b730c68095e0
nit.rc
|
856f63c0df9cd4e8783ca65140fe386e3a98a274 |
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Merge "Revert "Add keychain user""
|
1c9a996c50e096eb9f54dc806aae6d82fa3cc2e8 |
20-Jun-2011 |
Eino-Ville Talvala <etalvala@google.com> |
Add mobile filter framework library into the bootclasspath. Change-Id: Ia9ae45de5d58ba5e98821fd04add96c6062c1a18
nit.rc
|
04918930236981a6d2a096a73854caa96cb94bda |
01-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Revert "Add keychain user" This reverts commit 6541ef1562ccf93e498d653598330a7fc80ad2b2. Bug:4970237 Change-Id: I23a90eb89c1d19893d2ba7065fc624c0521cb06e
nit.rc
|
9d94942bcd6347d6ee8524b23bc94b95ba32d8e0 |
27-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
am 6a18a077: am 04cf629b: Move RILD to class main * commit '6a18a07774123c409cefd9a92f1c4c6504f4edfd': Move RILD to class main
|
6a18a07774123c409cefd9a92f1c4c6504f4edfd |
25-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
am 04cf629b: Move RILD to class main * commit '04cf629be5e99a3a920aecc0b059444bd07e9d84': Move RILD to class main
|
04cf629be5e99a3a920aecc0b059444bd07e9d84 |
24-Jun-2011 |
vidya rao <vidya.rao@motorola.com> |
Move RILD to class main -- This is needed so the modems (LTE & CDMA) are powered on and running before unlocking encrypted devices Change-Id: I842f5286499fd76abc554ded550fb837d12b324e
nit.rc
|
535164e9d9649a83d4d63829f3389f2bea339fe1 |
22-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
Reimplement the "adb root" command to more closely match its previous behavior The adb gadget driver used to reset the USB bus when the adbd daemon exited, and the host side adb relied on this behavior to force it to reconnect with the new adbd instance after init relaunches it. The new gadget drivers no longer automatically reset the USB bus when adbd is restarted which caused adb to hang since it was no longer forced to reconnect with the device. We attempted to work around this on the host side adb, but that work around has not been reliable. This change adds a property trigger on the service.adb.root system property which will reset the USB bus and restart the adbd daemon when adbd sets the property to 1. This should be much closer to the previous behavior and will hopefully fix some problems with automated testing. Change-Id: I177c37400009a3d83f21a5f9431f94fd1cc19b9b Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
352dfdfaea55601f2c36fe7286a158e84028bcf3 |
09-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
init.rc: Changes for new USB gadget drivers Change-Id: I68fcf167c9fc71bb5f44793648a35d3181fd36d7 Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
b45280d259c5036dd066782d725c55284c7dae90 |
30-May-2011 |
MÃ¥rten Kongstad <marten.kongstad@sonyericsson.com> |
Create world readable, system writeable /data/resource-cache. /data/resource-cache is used to store idmap files. Change-Id: I9b1dbc8d607333b71c05f55a4a402ae92193c36c
nit.rc
|
2b8f76cdbb254ac1170087a40dbf30b7627f3516 |
05-May-2011 |
jeffhao <jeffhao@google.com> |
Tracking merge of dalvik-dev to master Reordered bootclasspath to allow verification of all framework methods. git cherry-pick --no-commit ec164a0170955fe63106c2576a65bc4ffb1df425 Address CVE-2011-1090. git cherry-pick --no-commit 3365288d3c00072689cd9d733e055561cadc87b5 Change-Id: I6a89bc600ced06a0cb84ae1670cb7a6ea39de9c8
nit.rc
|
70080d97cfcb3fe273207b1c739df587f5f93767 |
17-May-2011 |
Brian Carlstrom <bdc@google.com> |
Merge "Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6)"
|
a31a3511825375177d26ab27067352c2c8f42038 |
05-May-2011 |
Brian Carlstrom <bdc@google.com> |
Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6) frameworks/base Adding IKeyChainService APIs for CertInstaller and Settings use keystore/java/android/security/IKeyChainService.aidl libcore Improve exceptions to include more information luni/src/main/java/javax/security/auth/x500/X500Principal.java Move guts of RootKeyStoreSpi to TrustedCertificateStore, leaving only KeyStoreSpi methods. Added support for adding user CAs in a separate directory for system. Added support for removing system CAs by placing a copy in a sytem directory luni/src/main/java/org/apache/harmony/xnet/provider/jsse/RootKeyStoreSpi.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStore.java Formerly static methods on RootKeyStoreSpi are now instance methods on TrustedCertificateStore luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java Added test for NativeCrypto.X509_NAME_hash_old and X509_NAME_hash to make sure the implementing algorithms doe not change since TrustedCertificateStore depend on X509_NAME_hash_old (OpenSSL changed the algorithm from MD5 to SHA1 when moving from 0.9.8 to 1.0.0) luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java Extensive test of new TrustedCertificateStore behavior luni/src/test/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStoreTest.java TestKeyStore improvements - Refactored TestKeyStore to provide simpler createCA method (and internal createCertificate) - Cleaned up to remove use of BouncyCastle specific X509Principal in the TestKeyStore API when the public X500Principal would do. - Cleaned up TestKeyStore support methods to not throw Exception to remove need for static blocks for catch clauses in tests. support/src/test/java/libcore/java/security/TestKeyStore.java luni/src/test/java/libcore/java/security/KeyStoreTest.java luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java Added private PKIXParameters contructor for use by IndexedPKIXParameters to avoid wart of having to lookup and pass a TrustAnchor to satisfy the super-class sanity check. luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java luni/src/main/java/org/apache/harmony/xnet/provider/jsse/IndexedPKIXParameters.java luni/src/main/java/java/security/cert/PKIXParameters.java packages/apps/CertInstaller Change CertInstaller to call IKeyChainService.installCertificate for CA certs to pass them to the KeyChainServiceTest which will make them available to all apps through the TrustedCertificateStore. Change PKCS12 extraction to use AsyncTask. src/com/android/certinstaller/CertInstaller.java Added installCaCertsToKeyChain and hasCaCerts accessor for use by CertInstaller. Use hasUserCertificate() internally. Cleanup coding style. src/com/android/certinstaller/CredentialHelper.java packages/apps/KeyChain Added MANAGE_ACCOUNTS so that IKeyChainService.reset implementation can remove KeyChain accounts. AndroidManifest.xml Implement new IKeyChainService methods: - Added IKeyChainService.installCaCertificate to install certs provided by CertInstaller using the TrustedCertificateStore. - Added IKeyChainService.reset to allow Settings to remove the KeyChain accounts so that any app granted access to keystore credentials are revoked when the keystore is reset. src/com/android/keychain/KeyChainService.java packages/apps/Settings Changed com.android.credentials.RESET credential reset action to also call IKeyChainService.reset to remove any installed user CAs and remove KeyChain accounts to have AccountManager revoke credential granted to private keys removed during the RESET. src/com/android/settings/CredentialStorage.java Added toast text value for failure case res/values/strings.xml system/core Have init create world readable /data/misc/keychain to allow apps to access user added CA certificates installed by the CertInstaller. rootdir/init.rc Change-Id: I768ca8e8e990ff333ce0f7069a0935173498c5ed
nit.rc
|
69f43c90cbf7e1a0952f7001796b45f22d48c3dc |
12-May-2011 |
Chia-chi Yeh <chiachi@android.com> |
Update the device permission of /dev/tun. Change-Id: Ie8ad60047fc7160997100bd28a0abb439406806a
eventd.rc
|
7db617efc079ccc1f384ef7939f7e8c444dfff7a |
29-Apr-2011 |
David 'Digit' Turner <digit@google.com> |
resolved conflicts for merge of b013bfc1 to honeycomb-plus-aosp Change-Id: I159dd58c403bc38f9637163d8cd5e6270e4f201c
|
b013bfc17110787f4a735552f7e0c03261a3f2b5 |
28-Apr-2011 |
David 'Digit' Turner <digit@android.com> |
am 52a64057: Merge "ueventd.rc: Move /dev/qemu_trace to ueventd.goldfish.rc" * commit '52a64057b60b0ad242e95fdc285ec60e0191d5b5': ueventd.rc: Move /dev/qemu_trace to ueventd.goldfish.rc
|
f431d0499b3521caa38673b1fcd8c36a1072c9e6 |
26-Apr-2011 |
David 'Digit' Turner <digit@android.com> |
ueventd.rc: Move /dev/qemu_trace to ueventd.goldfish.rc + Add /dev/qemu_pipe line for QEMU pipes. Change-Id: If3c5c675bfc1585a1d6ffcd1042aaedbc2e94763
tc/ueventd.goldfish.rc
eventd.rc
|
f642c3d12f4cffdc349b9ebfc4107de254ad8db9 |
17-Mar-2011 |
Jeffrey Tinker <jtinker@google.com> |
Make drmserver's primary group be system, so setgid is not required in ueventd.stingray.rc Change-Id: Ie8a287620d22b5c1bdc459fb288b7403589ab474
nit.rc
|
cfce2826780dc1c4811619b89ba8d358e3f30f11 |
14-Mar-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 4089635 mediaserver fewer supplementary groups Change-Id: I90111567564397ca08e87dcfcbdf23337bf79ae6
nit.rc
|
b7b770dd76d664b1e44adb2f98b8caf594f6d3c8 |
11-Mar-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 4086255 drmserver process needs system group Change-Id: If9a325b9e716abe00f3ad6f20b012861308abd2d
nit.rc
|
5db0897c6530502e1343a75b258868122030e4a5 |
11-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Load the persistent properties after decrypting the /data partition" into honeycomb-mr1
|
c5c51033c86353d1a448c72e0e9388906eed7114 |
09-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Load the persistent properties after decrypting the /data partition Fix for bug 3415286. The persistent properties are normally read early in the boot process after /data is mounted. However, for an encrypted system, at that point /data is a tmpfs ramdisk. This change adds a new command to init (load_persist_props) to read the persistent properties, and adds an action to init.rc to load the persistent properties. This action is triggered by setting a property in vold, but that's in a different CL. Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
nit.rc
|
a40481b2cc604b8b278d509f120cf496c4c318f2 |
04-Mar-2011 |
Mathias Agopian <mathias@google.com> |
Run surfaceflinger in its own process. [DO NOT MERGE] This is to allow OpenGL ES rendering from the system process, and help with debugging. Bug: 4086003 Change-Id: I732e95f4fcaa358f430cc195d8e63a69263bffdc
nit.rc
|
f0900adeb2b260068e7dae5509b821c8f5aa45eb |
03-Mar-2011 |
David Turner <digit@android.com> |
am 663268ca: am fe111c83: am e6b638be: Merge "x86: Add vold.fstab to mount the SD card" * commit '663268caac636e32b19173743594899e52df0830': x86: Add vold.fstab to mount the SD card
|
663268caac636e32b19173743594899e52df0830 |
02-Mar-2011 |
David Turner <digit@android.com> |
am fe111c83: am e6b638be: Merge "x86: Add vold.fstab to mount the SD card" * commit 'fe111c83708dd3c8746b3a05d4b2f53c7a9f4477': x86: Add vold.fstab to mount the SD card
|
fe111c83708dd3c8746b3a05d4b2f53c7a9f4477 |
02-Mar-2011 |
David Turner <digit@android.com> |
am e6b638be: Merge "x86: Add vold.fstab to mount the SD card" * commit 'e6b638be199a5f16f3eaff69710d92ea248d60a3': x86: Add vold.fstab to mount the SD card
|
0c8b18b96038c1634735cdae2bd5f8cf25c7dbef |
28-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
am 126d4bc1: Give system server permission to enable and disable USB functions DO NOT MERGE * commit '126d4bc18c93f06016998cf6d014c6055c2d3a40': Give system server permission to enable and disable USB functions DO NOT MERGE
|
5ebe6fe6779fcbd4961de22301a5ec5d83f5cdea |
28-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
am 642075b6: Set USB group for /dev/usb_accessory DO NOT MERGE * commit '642075b6f74faeca53d9449ec9b74d7c66fe7cdd': Set USB group for /dev/usb_accessory DO NOT MERGE
|
126d4bc18c93f06016998cf6d014c6055c2d3a40 |
02-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
Give system server permission to enable and disable USB functions DO NOT MERGE Change-Id: Ie43b6679838436ac004d0b5fa59d3d98cb5b0c76 Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
642075b6f74faeca53d9449ec9b74d7c66fe7cdd |
30-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Set USB group for /dev/usb_accessory DO NOT MERGE Change-Id: I41264272ff6ce245cb2b8989ddee4a82059444a0 Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
012cf8f2de3cf48645e05209123d11bdb0ed8de7 |
22-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Fix for bug 3379244, non-eMMC devices don't start all services."
|
dd4d786cbf993a024fcd0f926fd40b90c8a08d51 |
18-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
Fix for bug 3379244, non-eMMC devices don't start all services. Fix for non-eMMC based devices to properly start the "on nonencrypted" action. Change-Id: I5d2966db352b02f1a1724fb105e1cefc46037e42
tc/init.goldfish.rc
|
0db0921b59cd02186b5aa588d69213cc9d5d3e1d |
14-Feb-2011 |
Jun Nakajima <jnakajim@gmail.com> |
x86: Add vold.fstab to mount the SD card Change-Id: Ie1f70a22dd4e27e8ea956d5e627877d1e2379b95 Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
ndroid.mk
|
ddc4cfd8b2dd556b30898c6d7b02883b57ce96b0 |
02-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
ueventd.rc: Give system process permission to enable and disable USB functions Change-Id: I4af1f3fed857df2be96a640f65cd612577c957c7 Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
45e96d0e49a02c710520d9a023b699a578352c5b |
30-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Set USB group for /dev/usb_accessory Change-Id: I17db8d9bb1bf6336979e9b7bce62306d0d7a79d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
9ac8484e0b677802474e2fd73edb9cbac02d98a6 |
08-Feb-2011 |
Ying Wang <wangying@google.com> |
Merge "Reorder BOOTCLASSPATH to match change 7eff81df2a"
|
04e5232ac2b3fc87596c6d82c07c667e52e2d7c2 |
08-Feb-2011 |
Ying Wang <wangying@google.com> |
Reorder BOOTCLASSPATH to match change 7eff81df2a Bug: 3385161 Change-Id: I8bb91753c02c031c32ab0070dd424a6ac859311a
nit.rc
|
b03afaafb542e84a6ae9b09d89f7eb3a9d1ccf7a |
03-Feb-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Bug 3381298 Remove old /data/drm/plugins/native"
|
63e99f447fed821b57f3f13e33abd740b3b04c03 |
30-Jan-2011 |
Rebecca Schultz Zavin <rebecca@android.com> |
am e442cff0: am 58fb8220: Raise the viking killer min free values to match the system properties * commit 'e442cff05ff9f083c91caa3bed74e37318a69fda': Raise the viking killer min free values to match the system properties
|
58fb822024a04641d5ca1d0341456a2706aee853 |
29-Jan-2011 |
Rebecca Schultz Zavin <rebecca@android.com> |
Raise the viking killer min free values to match the system properties Change-Id: Idcbdb106d704ef63c9a44e635b6e995e0e5f6479 Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
nit.rc
|
24823cfa84d1a4dcb719c1949092facf8c92804a |
29-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am fee2cfb0: am 9efdcd96: Fix issue #3401380: Raise OOM killer limits * commit 'fee2cfb01165f6797d783c6a8c0b1fba4f591355': Fix issue #3401380: Raise OOM killer limits
|
9efdcd969ed03cfbe8cfa692b8adcc46d954914a |
29-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #3401380: Raise OOM killer limits Change-Id: Ia9c82e7d31b7f1b89bf9650ebea697d9b3a64506
nit.rc
|
b81dfcb4f6275bf675e7afe64ccecc29c1b8c3ae |
23-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 3381298 Remove old /data/drm/plugins/native Change-Id: Ic299d328f2e04a65a9dce68909c7b83f3ac03b20
nit.rc
|
328c0d4a89d7c04c829c587657b95b3241f64f60 |
23-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Merge "Bug 3361124 Remove drmioserver"
|
0897a4353ec74e05d4be23eb422080d4ad9c7c30 |
22-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
am 100511ff: am 88af5ff4: Merge "goldfish: Work-around to start the RIL daemon." into honeycomb * commit '100511ffaa11b33a6856a434c62ad326a899f252': goldfish: Work-around to start the RIL daemon.
|
dc743112ca561242052d7fd5e4b11f6db38f99aa |
22-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
goldfish: Work-around to start the RIL daemon. This change forces the start of the RIL daemon used to provide 3G connectivity to the system. It should normally be started automatically by init.rc but there is a bug within system/core/init/builtins.c that prevents this to happen. Fixes the "No network connectivity" bug while the network interface and route were properly setup. Change-Id: Ieec0f513aabf92b8a59f0a86f64a16e97057c3c3
tc/init.goldfish.rc
|
b29b33841bd2f5143e2705525bfc4f8a2d2b6316 |
20-Jan-2011 |
Glenn Kasten <gkasten@google.com> |
Bug 3361124 Remove drmioserver Change-Id: Ie3b20b487c1466737921567ab2d043e230356bf4 Note: safe to re-use the drmio uid/gid as no files were ever created.
nit.rc
|
852c13d1b2404e5a360375ae75291ac1a9dae026 |
20-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am afa099a1: am 3a159d62: Move rild to the late_start class * commit 'afa099a1909c02196574d125d735adb0c8918392': Move rild to the late_start class
|
3a159d62a9d771f2a2d38129f1db56d873598696 |
20-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the late_start class Now that rild can be killed in a reasonable amount of time, move it from the core class to late_start. I was going to move it to main, but it would get killed and restarted right after the disk crypto password was entered, which is when the late_start class is started, and I was seeing issues with rild not re-connecting to the network when it was killed and restarted. Change-Id: I60479ddb853953029890fc816538d615ef5a96ab
nit.rc
|
ba3bcef0244321916799442f9c028229733a1767 |
19-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
am 794fb914: am eeeca4dd: rootdir: goldfish: Fix network route during emulation. * commit '794fb914bef34c1c5f32764947801c95575ecd41': rootdir: goldfish: Fix network route during emulation.
|
eeeca4dd45899c20d4fc187c59bda58af43352f2 |
18-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
rootdir: goldfish: Fix network route during emulation. The net.eth0.gw system property is used by the ConnectivityService to set the default route when it detects that 3G connectivity is established. Because the property was undefined, the route was unset which broke networking. + Format / document init.goldfish.sh Change-Id: I1133cf6c093609300315cd0ea363c9e139b42521
tc/init.goldfish.rc
tc/init.goldfish.sh
|
a42f152b4ae365e2f8d232237a8aa0168061feb4 |
18-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
Merge "rootdir: Fix system emulation startup." into honeycomb
|
701d40f721573c5c9e0b45b59a383e04c582f6d0 |
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 383b76f8: am e4349157: Add a new trigger to support a progress bar UI for encrypt in place. * commit '383b76f86af48d4a1a502d7767ab79f024483864': Add a new trigger to support a progress bar UI for encrypt in place.
|
e434915787c38a6d84e1058044fed3be2ed02235 |
17-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Add a new trigger to support a progress bar UI for encrypt in place. Change-Id: I6a14eb43462505cb7fecfee9fd1ecdea50065963
nit.rc
|
95df887ac0cd2fab3f5d3148feb7839b5f65223f |
06-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
rootdir: Fix system emulation startup. This fixes the goldfish-specific config scripts used by init and ueventd to properly setup the system under emulation. This fixes a lot of broken-ess introduced by recent permission changes in the system. Note that there are still several problems after this patch is applied, but at least it becomes possible to get an adb connection to the emulated system, Change-Id: Iff47bbf0fe5cb759fa93089284bb0f71e32405a2
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/ueventd.goldfish.rc
eventd.rc
|
30d5d038a94b09bd906d8a07a9c4b79640d36c2e |
14-Jan-2011 |
Jesse Wilson <jessewilson@google.com> |
Move apache-xml to external. (project 4 of 4) Change-Id: I8e1ea723481ae6d8e609563331c187576f306bce http://b/3351604
nit.rc
|
63990cf56fc64033c0382ac19a3ffba7f525fb30 |
13-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Move rild to the core class." into honeycomb
|
a02714bd3e8e75298c6e684ef375407fe02dd9b0 |
11-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the core class. Changes in init.stingray.rc now prevent rild from making sockets or named pipes on /data. Now that rild no longer prevents /data from being unmounted, we can put it in the core class, which doesn't restart when we enable encryption. This speeds up the boot by 20+ seconds. Change-Id: I737baf804e089f4ddbd664eaa1e675a7bd62e699
nit.rc
|
f3c42b6ee4f0bb042cf93e1ac6c9c4d72e1558fa |
11-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Move rild to the core class. Changes in init.stingray.rc now prevent rild from making sockets or named pipes on /data. Now that rild no longer prevents /data from being unmounted, we can put it in the core class, which doesn't restart when we enable encryption. This speeds up the boot by 20+ seconds. Change-Id: I71c426dab1b725e401116234167d41c7ccd958c1
nit.rc
|
a44aca6580b6f39459195275f4631682410aae4b |
11-Jan-2011 |
Gloria Wang <gwang@google.com> |
Temporarily disable the drm service. do not merge Change-Id: I5cb04a9c2cc5b95443c6c0ea77132a4102ca47fc
nit.rc
|
48b911c573c92742aa80270b734811f722c67c37 |
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
am af7bdc64: Add separate permission and group for access to MTP USB driver * commit 'af7bdc646088e3112052f4fd35061bb720393287': Add separate permission and group for access to MTP USB driver
|
af7bdc646088e3112052f4fd35061bb720393287 |
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Add separate permission and group for access to MTP USB driver Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Ibb546b8726d61e041fc7c273f71929624ad1575b Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
16209418de5179603ddd93da91190b4c2e42eb39 |
07-Jan-2011 |
Gloria Wang <gwang@google.com> |
Merge "To remove drm service from groups of "system" and "root"."
|
60b5b408cfcac450ce0cc56952d3b1c087b25428 |
07-Jan-2011 |
Gloria Wang <gwang@google.com> |
To remove drm service from groups of "system" and "root". Change-Id: Ieac11c667c72465f7082baab0787dc740797049f
nit.rc
|
a2a1f3149fb32d95bc81ddfd713d5bba9d6cbc61 |
27-Oct-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Let SocketClient users write binary data to clients. This is a dependency for the DNS proxy CLs. This CL also adds a new socket for the netd process to inherit which is owned by the inet group. (so only apps with the INTERNET permission can use the DNS proxy...) Change-Id: I8a51924e0ed56c6066f77e6f1b02d39bdadac51e
nit.rc
|
1f2565ca08ecd92181eb662899f68f306695d74a |
06-Jan-2011 |
David 'Digit' Turner <digit@google.com> |
rootdir: Fix system emulation startup. This fixes the goldfish-specific config scripts used by init and ueventd to properly setup the system under emulation. This fixes a lot of broken-ess introduced by recent permission changes in the system. Note that there are still several problems after this patch is applied, but at least it becomes possible to get an adb connection to the emulated system, Change-Id: I1e8f5828b4d5cbb3a4338878df875dc718276b38
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/ueventd.goldfish.rc
eventd.rc
|
752923c168009d03e9e00e590155fbd0a2880ccb |
04-Dec-2010 |
Ken Sumrall <ksumrall@android.com> |
Changes to init to support encrypted filesystems. These are the changes to init and init.rc necessary to support booting with and encrypted /data filesystem. A corresponding change to init.<device>.rc goes along with this change. Change-Id: I0c7e2cc39568358014a82e317735c0eae14dd683
nit.rc
|
333f24bfbd9eea1347f20c2e88c5c1565b84aafe |
10-Dec-2010 |
Nick Kralevich <nnk@google.com> |
don't run services with gid=0 Ensure that we drop privileges for servicemanager and drmioserver. These should not be running with gid=0. Bug: 3275526 Testing: Applied change and successfully rebooted the device. No obvious bugs. Change-Id: I782fbda812cb88e0a365788b45b3b32894623177
nit.rc
|
1612425c50d2728542cac607fc71a4c8781bf1df |
13-Dec-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove services for adding SDP records. This was an inefficient way of doing things and was temporary. There are now direct calls to Bluez to add reserved SDP records. This improves connection time after turning on BT by 6-8 secs. Change-Id: I8750f44e1de73c9cc935d68710b8964e3f50c3a6
nit.rc
|
6388cfe03c1d5695d7cabe244b031af02ef686a8 |
08-Dec-2010 |
Iliyan Malchev <malchev@google.com> |
Revert "HACK: slow_start for mediaserver to prevent restart race condition" This reverts commit 9db7945ed2f9eb5756aa0c1e5e72fa6240f74847.
nit.rc
|
9db7945ed2f9eb5756aa0c1e5e72fa6240f74847 |
05-Dec-2010 |
Paul Eastham <eastham@google.com> |
HACK: slow_start for mediaserver to prevent restart race condition Change-Id: Ia76385612fd127c5f11b3d64205e350f27acfd82
nit.rc
|
d49b4ef51eeba026e77f51e9c454464d0c5b9cd9 |
19-Nov-2010 |
Mike Lockwood <lockwood@android.com> |
init.rc: Allow console in userdebug builds Change-Id: Ib5734c6d3e2bf5a9da3d44721c529971f2345120 Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
4640fc0504ec69446b00dfb7ffcca48b085bf916 |
26-Oct-2010 |
Gloria Wang <gwang@google.com> |
Create directory for DRM plug-ins. Change-Id: I1bfef96b1949f288852cd88222e0ce2bbb186f40
nit.rc
|
a215823fc92d6c0f8623fe18a407d9853aef87cf |
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
am b7171987: am b4d65399: disable console in user builds
|
b7171987382b768466a472c4c5f84cc496c95aea |
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
am b4d65399: disable console in user builds
|
b4d65399fde02280b718e3b5b5cb1464a885c4b0 |
28-Oct-2010 |
Brian Swetland <swetland@google.com> |
disable console in user builds Also, run console as shell/log instead of root/root. Change-Id: I6104f1edddfd5e11843ff41d7839d0c296e6a6f9
nit.rc
|
8c5669f9f9a228efebf4059fd4ceace5cece578b |
27-Oct-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Let SocketClient users write binary data to clients. This is a dependency for the DNS proxy CLs. This CL also adds a new socket for the netd process to inherit which is owned by the inet group. (so only apps with the INTERNET permission can use the DNS proxy...) Change-Id: Ic3475c697913ba85805b4e49801b65e7a1d59289
nit.rc
|
7ffa661595df7bc71f1ae2e8cefcd658b0f9bdf5 |
27-Oct-2010 |
Brian Swetland <swetland@google.com> |
am 60afdedc: am 146481b9: add rules to set perms for input device sysfs attributes
|
60afdedc4c1a8532893b09d95907d70d577f9d4b |
27-Oct-2010 |
Brian Swetland <swetland@google.com> |
am 146481b9: add rules to set perms for input device sysfs attributes
|
146481b9468ff60214e41c93896259a7201df7cb |
27-Oct-2010 |
Brian Swetland <swetland@google.com> |
add rules to set perms for input device sysfs attributes Change-Id: I28ab7f1ac5cc07ade7830e87f5e70c96464bb686
eventd.rc
|
98b1378606780c28501708ca02560c82bb1fda53 |
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
am f3c29f0c: am 5988ea72: add sdcard access permission to ril daemon Merge commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6' * commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6': add sdcard access permission to ril daemon
|
f3c29f0cf287ec3d329b012a2d48808b064632f6 |
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
am 5988ea72: add sdcard access permission to ril daemon Merge commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6' into gingerbread-plus-aosp * commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6': add sdcard access permission to ril daemon
|
5988ea726e91fbdc69485b729ea2f532fedfa1d6 |
23-Oct-2010 |
Brian Swetland <swetland@google.com> |
add sdcard access permission to ril daemon Some RIL daemons write crashdumps to sdcard. Change-Id: I49a8d2cb342fd7f8bd23dbb1bcc378726e10a579
nit.rc
|
d7482b2f4cdd6a35f8707d94536801a958120b6b |
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 33357f54: am 6490257d: Make netd restart when system server hangs on it. Merge commit '33357f5477a24cb16bd3dd692fe5ca14755ab033' * commit '33357f5477a24cb16bd3dd692fe5ca14755ab033': Make netd restart when system server hangs on it.
|
33357f5477a24cb16bd3dd692fe5ca14755ab033 |
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 6490257d: Make netd restart when system server hangs on it. Merge commit '6490257d116c35d3da927ee7b91179dde64ef713' into gingerbread-plus-aosp * commit '6490257d116c35d3da927ee7b91179dde64ef713': Make netd restart when system server hangs on it.
|
6490257d116c35d3da927ee7b91179dde64ef713 |
22-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Make netd restart when system server hangs on it. netd has been seen hanging (cause suspected but unconfirmed) which then brings down the system server which blocks forever on its main thread trying to connect to netd with its hung event loop. This then results in an infinite watchdog runtime restart loop because the situation never improves: netd is still borked. Instead, we should kill netd and give it another chance when the system server dies. Bug: 3018996 Bug: 3017876 Change-Id: Ibf9ecf0ffcb78e48c38e5167f21cbeefe0e2a47f
nit.rc
|
d06df51bcd7bcc2656089a529fa6a455bad00d37 |
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
resolved conflicts for merge of 3b5214a6 to master Change-Id: Id73c53c6c2e9c21eb9b1d1e624aaeb25097ea7a4
|
3b5214a67f43e2e4f69428e98d3a2c130c7c87d8 |
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 02863b95: add /vendor support Merge commit '02863b957cfbfc302d3136ed78c0cba86accacd8' into gingerbread-plus-aosp * commit '02863b957cfbfc302d3136ed78c0cba86accacd8': add /vendor support
|
02863b957cfbfc302d3136ed78c0cba86accacd8 |
19-Sep-2010 |
Brian Swetland <swetland@google.com> |
add /vendor support - look in /vendor/firmware/... in addition to /system/etc/firmware/... for firmware loading - add /vendor/bin to path before /system/bin - add /vendor/lib to ldpath before /system/lib - configure appropriate permissions for /system/vendor/bin - symlink /vendor -> /system/vendor Change-Id: I0c06ca1e38a44f0c7024cee6cea8907aa93a4532
nit.rc
|
a5220b24d1b17b142e373aacbadf79a00effbbf0 |
10-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 26ce6e0e: manual merge from readonly-korg-master Merge commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1' * commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1': - Add drm and drmio service
|
26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1 |
10-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
manual merge from readonly-korg-master Change-Id: Id17f69d22fbbc84578be5aadd5e8e906ff0eb548
|
bb130ba7998e82e79cd94cddee2b97b1ed977f21 |
09-Sep-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "- Add drm and drmio service - Add /data/drm directory for storing DRM related data"
|
e6d8a5f1dfb81113b9421ea353915cde426023ed |
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 8df3a4a5: am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread Merge commit '8df3a4a554184afba71887995c5f0983ce81196f' * commit '8df3a4a554184afba71887995c5f0983ce81196f': remount / as read-only only on post-fs to allow per-target config of /
|
8df3a4a554184afba71887995c5f0983ce81196f |
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread Merge commit '4012c0a46ab2ebdf6a1298bc4e85ed3368d1b8a4' into gingerbread-plus-aosp * commit '4012c0a46ab2ebdf6a1298bc4e85ed3368d1b8a4': remount / as read-only only on post-fs to allow per-target config of /
|
56de7a1263431819ff9a53dcd9e8e3306149ed99 |
09-Sep-2010 |
Brian Swetland <swetland@google.com> |
remount / as read-only only on post-fs to allow per-target config of / Change-Id: Ia89dd2021e0f960201b4cee573227f0addd48431
nit.rc
|
3c659a8d647b2650d83712f9a6724b8ac50ef5ae |
05-Aug-2010 |
Brian Carlstrom <bdc@google.com> |
am f2af88e8: Tracking merge of dalvik-dev to gingerbread Merge commit 'f2af88e81af5efb2d585963507f798d5a8b93d67' into gingerbread-plus-aosp * commit 'f2af88e81af5efb2d585963507f798d5a8b93d67': Tracking merge of dalvik-dev to gingerbread
|
f2af88e81af5efb2d585963507f798d5a8b93d67 |
05-Aug-2010 |
Brian Carlstrom <bdc@google.com> |
Tracking merge of dalvik-dev to gingerbread git cherry-pick --no-commit b99a099c git cherry-pick --no-commit 9811671e023ceb82029040f7acf599013c773e6b git cherry-pick --no-commit d0645bf0cc76ef7be11cf77a8e1995233a1972e4 Change-Id: Ie70fecaeaba97a25f114cd2717e381b5107533b1
nit.rc
|
e306a9044a1ef97019871eb8cdd102223307f1c9 |
31-Jul-2010 |
Iliyan Malchev <malchev@google.com> |
Revert "system/core: add system/audio persmissions for /dev/audio*" This reverts commit 7e8b01229dde701bee555ea1cf10986b773d5de0.
eventd.rc
|
7e8b01229dde701bee555ea1cf10986b773d5de0 |
30-Jul-2010 |
Iliyan Malchev <malchev@google.com> |
system/core: add system/audio persmissions for /dev/audio* Change-Id: If214241f8150f5ff6cce8b9a76c6c8e5bad9c35a Signed-off-by: Iliyan Malchev <malchev@google.com>
eventd.rc
|
30be93c6e2b5c2eb6c6e9e21a04dc0dbe2f4c8ca |
30-Jul-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 60c8f863: resolved conflicts for merge of 0fcbdb41 to gingerbread-plus-aosp Merge commit '60c8f863ca84f3e5bb8e78d8001c53511f094d53' * commit '60c8f863ca84f3e5bb8e78d8001c53511f094d53': Userland support for VM interconnection
|
60c8f863ca84f3e5bb8e78d8001c53511f094d53 |
30-Jul-2010 |
Jean-Baptiste Queru <jbq@google.com> |
resolved conflicts for merge of 0fcbdb41 to gingerbread-plus-aosp Change-Id: I1396cd97b28f316849016d55596ad52fffd3235c
|
0fcbdb4147858d40d581d3b034f5150962632943 |
30-Jul-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Userland support for VM interconnection"
|
e572d596b3715198fb48b3d8cef4939a71d58db2 |
27-Jul-2010 |
aimitakeshi <aimitakeshi@gmail.com> |
- Add drm and drmio service - Add /data/drm directory for storing DRM related data Change-Id: Ifd8922a3de109dbf5cd3f9cabbf4e5689b16c1d7
nit.rc
|
5687abe6ef0fe5820547cf68bbcec9c968c28870 |
16-Jul-2010 |
The Android Open Source Project <initial-contribution@android.com> |
am 544e1f86: merge from open-source master Merge commit '544e1f866edcbe55b3d8f65d50bc831dfb818657' * commit '544e1f866edcbe55b3d8f65d50bc831dfb818657': Fix sdcard mount issue.
|
544e1f866edcbe55b3d8f65d50bc831dfb818657 |
16-Jul-2010 |
The Android Open Source Project <initial-contribution@android.com> |
merge from open-source master Change-Id: I03f6a73a782706a7c77041db4e626c40dffa647a
|
f848a429dde741742988e2365d257058d57acbf8 |
15-Jul-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 3cac9cb3 to master Change-Id: I86b5173ad49522eae082bf2a3d096dbfb5240129
|
c7858a3dde9db1c4cf2563a4388f422ff1bcb334 |
15-Jul-2010 |
Kenny Root <kroot@google.com> |
Add directories for OBB mounting Change-Id: Ib73e9bca50fb168ab5d147cc260666a770092961
nit.rc
|
2ee12e7a3404749add55e3d98358ab52b579fd57 |
15-Jul-2010 |
Ravi K Yenduri <yenduri@pv.com> |
Fix sdcard mount issue. Push vold.fstab on to the emulator, which is now denoted by TARGET_PRODUCT=full. Change-Id: I502af9b06903808fa2448c1013ddd8904f6000ca
ndroid.mk
|
2a743730c7d1a8adba8a922f7af46cef0b35363a |
18-Jan-2010 |
Dries Harnie <botje.linux@gmail.com> |
Userland support for VM interconnection Change-Id: I699608f3072b39c8da1a7cc313bd0b736e90f225
tc/init.goldfish.sh
|
d0645bf0cc76ef7be11cf77a8e1995233a1972e4 |
30-Jun-2010 |
Brian Carlstrom <bdc@google.com> |
updated BOOTCLASSPATH to track merge from dalvik-dev Change-Id: I10e6895ad3647dd789fe5fc7a7d37c4b71c61717
nit.rc
|
69286093d00186ecf2354d8f19934630500b21c4 |
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
ueventd.rc: Give the USB group read/write access to the MTP USB driver. Change-Id: I305671848dbdf427333dc088f83f88cea1b33945 Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
5f81c272c18a0ef8b5e6e56f1528dd46db310d0d |
17-Jun-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Move UART device permissions to device specific init files. Change-Id: I548386601d7546831bfeb044d15b1c9bf71f3e96
eventd.rc
|
a2dffa9db6c08c240e9511faee1c16fea535ef3e |
16-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
init.rc: Move SD card support to device specific init.rc files Change-Id: I5745e91df2b7c5722bd6e650931d3d2d7d0eadcb Signed-off-by: Mike Lockwood <lockwood@android.com>
tc/init.goldfish.rc
nit.rc
|
c5947806740172e66c1fd5259e86bc5543d873ac |
11-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
am 0c6672c6: am 8b0ec20d: Update OOM adj levels. Merge commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c' * commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c': Update OOM adj levels.
|
8b0ec20d6f9636def6740085b203302c1680fa81 |
11-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Update OOM adj levels. This introduces some new buckets that will be used by the activity manager, and adjusts the default levels to match what we had been setting for Droid. It turns out Passion has been using the old levels, which makes no sense for how much memory it has. Also it is a problem with these definitions spreading to other projects for different devices, so I am going to update the defaults to be appropriate for our newer devices, and put here a file to tune them down for something like the sapphire. Change-Id: Ia4f33c4c3b94aeb3656f60b9222072a1d11e9e68
nit.lowmem.rc
nit.rc
|
f96e700b338e9a0edee6c2114cc7310f7be48bc4 |
03-Jun-2010 |
Christopher Tate <ctate@google.com> |
am 25e7b8fc: am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
|
25e7b8fcc3708b58736c7825ecf612d04020716e |
02-Jun-2010 |
Christopher Tate <ctate@google.com> |
am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable Merge commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163' into kraken * commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163': Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
|
230cb33fd1ab335c6f808c72db891993b00110a0 |
02-Jun-2010 |
Christopher Tate <ctate@google.com> |
Make /proc/kmsg and /proc/sysrq-trigger system-process-readable This is so that the system process can capture kernel thread stacks when the watchdog detects a deadlock. Previously, /proc/kmsg was root/root and mode 0400, and /proc/sysrq-trigger was root/root and mode 0200. With this change, /proc/kmsg becomes root/system and 0440, and /proc/sysrq-trigger becomes root/system and 0220. Change-Id: Iac46bd10bd11d495024afeb5d693107ce5074791
nit.rc
|
c0d8fb5842f57bbc244e9c9596707787caabf44e |
17-May-2010 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE resolved conflicts for merge of e95aad61 to kraken this change is already in master Change-Id: Ica43eae28b50d89d50217851aff7e62978abfa27 Signed-off-by: Mike Lockwood <lockwood@android.com>
|
9811671e023ceb82029040f7acf599013c773e6b |
05-May-2010 |
Jesse Wilson <jessewilson@google.com> |
Moving junit out of core.jar and into core-junit.jar. Change-Id: I603cba084c06ddbec21fc88bbaab7cde96952cb1
nit.rc
|
b717dc85d8aca2431a553ca0e1b3438d1d8e2072 |
06-May-2010 |
Mike Lockwood <lockwood@android.com> |
init: Add support for /dev/bus/usb/ file system and add new unix group AID_USB. init now creates files in /dev/bus/usb/ for user access to USB devices. Files are chmod 660 with group AID_USB. Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
|
44b65d047cc39baf30e21bfd8dd438f6bc1f77f5 |
20-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Add ueventd.rc parsing to ueventd Change-Id: Iea53050d6c10e8cabf563e5d80e84eaf78873695
ndroid.mk
tc/ueventd.goldfish.rc
eventd.rc
|
f83d0b9af5cbe4440cc41ceaa8a7806a13c86282 |
21-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move uevent handling to an external ueventd process Change-Id: Iea6c56013062ade633a1754f7bcf8cf09b3dedc1
nit.rc
|
31712beaf7de127a1249b909cdefffbc25fff076 |
09-Apr-2010 |
Colin Cross <ccross@android.com> |
Move filesystem mounting into a new "fs" init level Devices with non-MTD storage need to override the filesystem mounting commands in init.rc. Moving them to a new "fs" init level allows a custom init.<device>.rc to handle the mounting. Change-Id: If0e655139b9734650fb798b6eb0a90e2241fc29b
nit.rc
|
dc61c9cda5d1b9ec455ff4b26595f523a36557c8 |
09-Apr-2010 |
Colin Cross <ccross@android.com> |
Add a build dependency for ramdisk.img on system/core/rootdir/init.rc Change-Id: Id9698a88720cc0c70e3d9c43c9bac9b74f4798b6
ndroid.mk
|
c741f22d8533226ce60903649a7a57b3f05a65af |
24-Mar-2010 |
Nick Pelly <npelly@google.com> |
Add NET_RAW to mediaserver so that it can open a raw HCI socket to configure BT chip. Change-Id: I22065b313c7af28b4791c74ea3d403a628738102
nit.rc
|
bbf3ea46fb6df3b666cb66a09104d3a7694926dc |
13-Mar-2010 |
Jean-Baptiste Queru <jbq@google.com> |
cleanup init.rc Change-Id: I7f7fefd61c6032c84fa63e597ea0e6bbe66d2e79
nit.rc
|
89f235c5e028466bb273dbaacb3346f1f0ba9f1e |
01-Mar-2010 |
Mike Chan <mike@android.com> |
init.rc: Add cpuacct to cgroup mount for cpu statistic Cpu accounting statistics expored in /acct Change-Id: I8a35816e94b69d9e67a3dd65aae16520864777d7 Signed-off-by: Mike Chan <mike@android.com>
nit.rc
|
b91bf4ba864a392412397913ee09a8c1f2e7cc87 |
27-Feb-2010 |
San Mehat <san@google.com> |
Revert "init.rc: Add cpuacct to cgroup mount for cpu statistics" This reverts commit a7d88224ff7283c210c25ce6d57239b4053b5f14. This cgroup subsys should be mounted on it's own mount-point, since it's addition to /dev/cpuctl causes the cpu subsys to EPERM
nit.rc
|
a7d88224ff7283c210c25ce6d57239b4053b5f14 |
26-Feb-2010 |
Mike Chan <mike@android.com> |
init.rc: Add cpuacct to cgroup mount for cpu statistics Change-Id: Ic1893e1bf7b2c45659419b0bc55d42f50d030c9f Signed-off-by: Mike Chan <mike@android.com>
nit.rc
|
f0cb74e3b07d5de49dc875f8405e21d2a102e749 |
26-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Enable I/O priorities for media server and vold Sets the media-server to class 'real-time' pri 4, and vold to class 'best effort' pri 2 Signed-off-by: San Mehat <san@google.com>
nit.rc
|
eafdd86f4d8f4ccc69f0c16550c65aa392f678d6 |
08-Jan-2010 |
Jaikumar Ganesh <jaikumar@google.com> |
Update bluetooth data files path.
nit.rc
|
a9db22f1228996d8f81e4f4903fa5c598a606fbd |
24-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Add 'ASEC_MOUNTPOINT' environment variable. Signed-off-by: San Mehat <san@google.com>
nit.rc
|
bbfe1368d909be470f919b2349a974bee8dd0a9c |
17-Feb-2010 |
Chia-chi Yeh <chiachi@android.com> |
Remove dead services from init.rc.
nit.rc
|
6f957c3f25ed96a5ea13122764c66e18f1e72d2d |
20-Feb-2010 |
San Mehat <san@google.com> |
generic_rootdir: vold_fstab: Change '/sdcard' -> '/mnt/sdcard' Signed-off-by: San Mehat <san@google.com>
tc/vold.fstab
|
6ea3cc6089393286ab8b6cc459cfa9d7e58fc203 |
20-Feb-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Create secure staging directories, and a compat symlink Signed-off-by: San Mehat <san@google.com>
nit.rc
|
55a1f0827be9920b093152cffb6eddd613d04bc9 |
27-Jan-2010 |
Vasu Nori <vnori@google.com> |
dont create sqlite_stmt_journals dir. this shoudl not be required any longer. in fact, some test-writers are abusing this dir.
nit.rc
|
92175e04a56db804d4dae75fc49fdd5edc6a2968 |
17-Jan-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Fix typo in chown of /dev/cpuctl Signed-off-by: San Mehat <san@google.com>
nit.rc
|
192277c0154eff542ddbce27d7c35995c0671748 |
15-Jan-2010 |
San Mehat <san@google.com> |
rootdir: init.rc: Add netd to startup services list Signed-off-by: San Mehat <san@google.com>
nit.rc
|
1851d80959bd314af730451ebfb2a5e00bb0a83a |
07-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Adjust perms on /asec Signed-off-by: San Mehat <san@google.com>
nit.rc
|
d0aa32c3d99aeb0e6949ab1c4fae83283a946567 |
06-Jan-2010 |
Oscar Montemayor <oam@google.com> |
Apps on SD project. Small change to support apps on SD file system key storage.
nit.rc
|
900570e2a833bde0683cce5254d9dc102509cabc |
06-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Create a small tmpfs on /asec so we can create mountpoints Signed-off-by: San Mehat <san@google.com>
nit.rc
|
37c71dd9a7f488563c97fdca88cca701e2962e45 |
04-Jan-2010 |
San Mehat <san@google.com> |
init.rc: Add new /asec mount point Signed-off-by: San Mehat <san@google.com>
nit.rc
|
5184fc5c797849ee861dd4068ad57cbbe829c9d6 |
17-Dec-2009 |
San Mehat <san@google.com> |
rootdir: Switch to vold.fstab Signed-off-by: San Mehat <san@google.com>
ndroid.mk
tc/vold.conf
tc/vold.fstab
|
37c586e6b11138beab400d1208183d49c12a9ef2 |
03-Dec-2009 |
Oscar Montemayor <oam@google.com> |
Encrypted File Systems Project. Temporarily creating emulated encrypted directories manually. Will remove those lines once a true encrypted FS is mounted, and proper framework chanfes have been made. This is required for the feature to work with the other changes.
nit.rc
|
d2633cb70978b42bc8b2c524951a39de197a5edd |
24-Nov-2009 |
Dan Egnor <egnor@google.com> |
am 7359c16a: Don\'t copy /proc/last_kmsg to /data/dontpanic/last_kmsg -- it gets generated on every boot, so this is a bunch of writing for no particularly good reason. Merge commit '7359c16a852c23740ef2874aa6b66f629d1473b7' into eclair-mr2-plus-aosp * commit '7359c16a852c23740ef2874aa6b66f629d1473b7': Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg --
|
7359c16a852c23740ef2874aa6b66f629d1473b7 |
24-Nov-2009 |
Dan Egnor <egnor@google.com> |
Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg -- it gets generated on every boot, so this is a bunch of writing for no particularly good reason.
nit.rc
|
6114b2dfb4170e07e075b134a35c20ff3f5292a2 |
20-Nov-2009 |
Doug Zongker <dougz@android.com> |
am eb67fac4: change /cache/recovery group to cache Merge commit 'eb67fac4723892ac8ae3fae87c05e776c49029c5' into eclair-mr2-plus-aosp * commit 'eb67fac4723892ac8ae3fae87c05e776c49029c5': change /cache/recovery group to cache
|
eb67fac4723892ac8ae3fae87c05e776c49029c5 |
20-Nov-2009 |
Doug Zongker <dougz@android.com> |
change /cache/recovery group to cache To unbundle system update, we need users other than system to be able to write the /cache/recovery directory.
nit.rc
|
879f398a44f8cbb73dec71d8c21931f8a5c46073 |
03-Nov-2009 |
Jean-Michel Trivi <jmtrivi@google.com> |
am 5a8cf57e: am 5e7db233: Make the RIL daemon part of the audio group so it can load region-specific acoustic parameters. Merge commit '5a8cf57eb7aa70f1647b28315a2419c4a6d36828' into eclair-mr2-plus-aosp * commit '5a8cf57eb7aa70f1647b28315a2419c4a6d36828': Make the RIL daemon part of the audio group so it can load region-specific
|
5e7db233004a0869125d0f2d64a9e747faf252da |
03-Nov-2009 |
Jean-Michel Trivi <jmtrivi@google.com> |
Make the RIL daemon part of the audio group so it can load region-specific acoustic parameters.
nit.rc
|
dd7105a7a11553260be0ea71985ff026aad2cf21 |
13-Oct-2009 |
San Mehat <san@google.com> |
am aaad7ab4: am fd110c7f: Merge change I831d8e1e into eclair Merge commit 'aaad7ab4ae9e6913481fe4348b040e5d3e2aaec1' into eclair-mr2-plus-aosp * commit 'aaad7ab4ae9e6913481fe4348b040e5d3e2aaec1': rootdir: init.rc: Adjust background dirty writeout policy
|
831d8e1e3a08520369561087112ebf898e31704c |
13-Oct-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Adjust background dirty writeout policy Signed-off-by: San Mehat <san@google.com>
nit.rc
|
46c9658f4f29cf06e8d84cafdfcda3eba7f37741 |
10-Oct-2009 |
Dan Bornstein <danfuzz@android.com> |
am 1dec5032: Force the mediaserver process to restart whenever the zygote or system server do. Merge commit '1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d' into eclair-plus-aosp * commit '1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d': Force the mediaserver process to restart whenever the zygote or system
|
1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d |
09-Oct-2009 |
Dan Bornstein <danfuzz@android.com> |
Force the mediaserver process to restart whenever the zygote or system server do. Change-Id: I16ce4ae656473055e7e244ccd4af7055959e3c1c
nit.rc
|
19257e7c00afaed6ba9fa0b3557e8bd5de094fad |
09-Oct-2009 |
Rebecca Schultz Zavin <rebecca@android.com> |
am ea935c1d: Merge change I7b04795c into eclair Merge commit 'ea935c1d9771fa2cc00583720586c209463f2791' into eclair-plus-aosp * commit 'ea935c1d9771fa2cc00583720586c209463f2791': Make vmallocinfo readable by group log so we can put it in bugreports
|
14d898e0141287cd9d8991bea5b63650bb8f5145 |
09-Oct-2009 |
Rebecca Schultz Zavin <rebecca@android.com> |
Make vmallocinfo readable by group log so we can put it in bugreports Change-Id: I7b04795c029c51108132e7a9eaf46b97de06de6f Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
nit.rc
|
64e5c1d5d2c59271a0244816465ecaa419db7e0f |
07-Oct-2009 |
Brian Swetland <swetland@google.com> |
am aa7d9710: init.rc: don\'t mount debugfs Merge commit 'aa7d97106abf8c390e1aed71f7c175fb77fead38' into eclair-plus-aosp * commit 'aa7d97106abf8c390e1aed71f7c175fb77fead38': init.rc: don't mount debugfs
|
aa7d97106abf8c390e1aed71f7c175fb77fead38 |
07-Oct-2009 |
Brian Swetland <swetland@google.com> |
init.rc: don't mount debugfs We'll do this in the product-specific init files.
nit.rc
|
b0cc66698fde10592638fee13a8db75b2df1ecf5 |
07-Oct-2009 |
San Mehat <san@google.com> |
am 529520e8: Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support" Merge commit '529520e8240e6865aca77ae9abf78dacbaa72e2c' into eclair-plus-aosp * commit '529520e8240e6865aca77ae9abf78dacbaa72e2c': Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support"
|
529520e8240e6865aca77ae9abf78dacbaa72e2c |
06-Oct-2009 |
San Mehat <san@google.com> |
Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support" This reverts commit 35ad5f41c39c5f3af7a8f00185a13366f4901e69.
nit.rc
|
6b4e9ebc4cab1dab3b8769a27868addd202a29b5 |
23-Sep-2009 |
David 'Digit' Turner <digit@google.com> |
am a0c98ef0: Ensure -user builds can run the dex preopt pass in the emulator. Merge commit 'a0c98ef01a4c5a859fdde35fed7977b1eb919007' into eclair-plus-aosp * commit 'a0c98ef01a4c5a859fdde35fed7977b1eb919007': Ensure -user builds can run the dex preopt pass in the emulator.
|
a0c98ef01a4c5a859fdde35fed7977b1eb919007 |
23-Sep-2009 |
David 'Digit' Turner <digit@google.com> |
Ensure -user builds can run the dex preopt pass in the emulator. This is done by ensuring that /init.goldfish.rc and /system/etc/init.goldfish.sh are part of the system image, even if it lacks other emulator related bits.
ndroid.mk
|
eed96af19d81803d982c8cb91e2a120c8035e980 |
21-Sep-2009 |
Chia-chi Yeh <chiachi@android.com> |
am 9b4f1ff2: init.rc: specify keystore directory and fix permissions. Merge commit '9b4f1ff210c449920890581b191da3568c10fbd1' into eclair-plus-aosp * commit '9b4f1ff210c449920890581b191da3568c10fbd1': init.rc: specify keystore directory and fix permissions.
|
9b4f1ff210c449920890581b191da3568c10fbd1 |
18-Sep-2009 |
Chia-chi Yeh <chiachi@android.com> |
init.rc: specify keystore directory and fix permissions.
nit.rc
|
dea31b41331b87bf825e796c6a1bec6a39bfbb04 |
20-Sep-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
am 1320687b: Remove logwrapper for Bluetoothd. Merge commit '1320687bdb6df2de1c27fb03c827b69384d26f87' into eclair-plus-aosp * commit '1320687bdb6df2de1c27fb03c827b69384d26f87': Remove logwrapper for Bluetoothd.
|
1320687bdb6df2de1c27fb03c827b69384d26f87 |
19-Sep-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove logwrapper for Bluetoothd. Change-Id: I6d16bc0dbdf9f3aff2080f8c7968ff3cb592811e
nit.rc
|
656944243786dc4e7569f4ae22b5943aeba9e919 |
19-Sep-2009 |
Brian Swetland <swetland@google.com> |
am bb6f68c6: init.rc: mount debugfs for debugging Merge commit 'bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4' into eclair-plus-aosp * commit 'bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4': init.rc: mount debugfs for debugging
|
bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4 |
19-Sep-2009 |
Brian Swetland <swetland@google.com> |
init.rc: mount debugfs for debugging - put it at /sys/kernel/debug so Arve will be happy - symlink /d to /sys/kernel/debug so Brian will be happy.
nit.rc
|
da17dee0332375abfc1da6d74de851f906c0357b |
17-Sep-2009 |
repo sync <san@google.com> |
resolved conflicts for merge of 35ad5f41 to eclair-plus-aosp
|
b183eb18917a099a1a9238003a5bd9c8fa9b1c10 |
16-Sep-2009 |
San Mehat <san@google.com> |
am 7baff71b: rootdir: init.rc: tweak cfs scheduler - disable child_runs_first Merge commit '7baff71b0d8fe320df9143b2fa59db0af1b7aa96' into eclair-plus-aosp * commit '7baff71b0d8fe320df9143b2fa59db0af1b7aa96': rootdir: init.rc: tweak cfs scheduler - disable child_runs_first
|
35ad5f41c39c5f3af7a8f00185a13366f4901e69 |
16-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support Signed-off-by: San Mehat <san@google.com>
nit.rc
|
7baff71b0d8fe320df9143b2fa59db0af1b7aa96 |
16-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: tweak cfs scheduler - disable child_runs_first Signed-off-by: San Mehat <san@google.com>
nit.rc
|
6088a9ad876314b14d24fc75cb9321f7b34bb5e7 |
11-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
am 25f1a5aa: init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root Merge commit '25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940' into eclair-plus-aosp * commit '25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940': init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root
|
25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940 |
11-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root Change-Id: Iff83310f9411c39e1833b3d710b029b12f702993 Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
3ebc52eb710c75a1ef51dca7c767701bab74a9ee |
10-Sep-2009 |
David 'Digit' Turner <digit@google.com> |
am 2f21659d: Merge change 24213 into eclair Merge commit '2f21659d4565afd65da1be07c28317a3cb4287a1' into eclair-plus-aosp * commit '2f21659d4565afd65da1be07c28317a3cb4287a1': Fix a bug that prevented the "generic" product builds from working in the emulator.
|
2f21659d4565afd65da1be07c28317a3cb4287a1 |
10-Sep-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
Merge change 24213 into eclair * changes: Fix a bug that prevented the "generic" product builds from working in the emulator.
|
aae43f9e7582a403b8c4f20d59e26c36bbde5219 |
09-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
am 9332482e: init.rc: Make /data/dontpanic files readable only by the system process. Merge commit '9332482ed2945174d94615f0720f88702cb92667' into eclair-plus-aosp * commit '9332482ed2945174d94615f0720f88702cb92667': init.rc: Make /data/dontpanic files readable only by the system process.
|
9332482ed2945174d94615f0720f88702cb92667 |
09-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Make /data/dontpanic files readable only by the system process. Change-Id: If87470b7bcbb1c0774d10296ac82605db3dd9bf0 Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
ca8177d81443bb93b522c1ab7ff11c0bbc2e0014 |
09-Sep-2009 |
David 'Digit' Turner <digit@google.com> |
Fix a bug that prevented the "generic" product builds from working in the emulator. This also ensures that emulator-specific files /init.goldfish.rc and /system/etc/init.goldfish.sh are never part of -user builds, which correspond to production devices.
ndroid.mk
|
f914c821e15c815cca65fd837d9ee45170bced3d |
06-Sep-2009 |
San Mehat <san@google.com> |
am 82a6014d: rootdir: init.rc: Allow all processes access to /data/dontpanic Merge commit '82a6014d90c94a2032e014901917e1d503475d5e' into eclair-plus-aosp * commit '82a6014d90c94a2032e014901917e1d503475d5e': rootdir: init.rc: Allow all processes access to /data/dontpanic
|
82a6014d90c94a2032e014901917e1d503475d5e |
06-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Allow all processes access to /data/dontpanic ***STOPSHIP*** Signed-off-by: San Mehat <san@google.com>
nit.rc
|
410776e1cf896f152272e71900d2d022846f756f |
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
am e991decf: Merge changes 23694,23695,23696 into eclair Merge commit 'e991decf340e24203ed63f87d9313598cd09a46c' into eclair-plus-aosp * commit 'e991decf340e24203ed63f87d9313598cd09a46c': init.rc: Add dumpstate service init: Add support for enforcing setprop by caller's group. adb: "adb bugreport" now runs dumpstate via init rather than execing it in the shell.
|
abe3a9c30595846b7e3d705dd4b0aca37fb2f748 |
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Add dumpstate service Change-Id: Iaf7094dd4693c47566c1acf860b750b762af840c Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
991e9189a4897fd29bb7a5e4e2fb0b6e0d541e09 |
02-Sep-2009 |
San Mehat <san@google.com> |
am 020f35f2: rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data. Merge commit '020f35f274594f55eec956fdcfec90ad3d7a5c65' into eclair-plus-aosp * commit '020f35f274594f55eec956fdcfec90ad3d7a5c65': rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data.
|
020f35f274594f55eec956fdcfec90ad3d7a5c65 |
02-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data. This is a temporary measure until bugreports are taken as root. *****STOPSHIP***** Signed-off-by: San Mehat <san@google.com>
nit.rc
|
c6a81332c91e55bedc378534163bb8cab444d3a5 |
02-Sep-2009 |
San Mehat <san@google.com> |
am f26d6cea: rootdir: init.rc: Clean up dump collection Merge commit 'f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa' into eclair-plus-aosp * commit 'f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa': rootdir: init.rc: Clean up dump collection
|
f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa |
01-Sep-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Clean up dump collection Signed-off-by: San Mehat <san@google.com>
nit.rc
|
8c92ba1921fc8dc3fc7cc39ef854e9ee70fafc67 |
01-Sep-2009 |
Jean-Baptiste Queru <jbq@google.com> |
merge from open-source master
|
2dfe490f439e126119055e1888703cc3745f5389 |
31-Aug-2009 |
San Mehat <san@google.com> |
system: vold: Ensure a default vold.conf exists for generic target Signed-off-by: San Mehat <san@google.com>
ndroid.mk
tc/vold.conf
|
15681df3563dbea684b7cd27c85af5bde7cd153e |
28-Nov-2008 |
Simon Braunschmidt <simon.braunschmidt@gmail.com> |
BUGFIX - ro.kernel.android.{qemud | ril} and ro.android.noril This fixes both a typo and the fact that sh seems not to have test or [. (see also sh/builtins.def: ##testcmd commented out) The handling of these properties was broken, having the effect that the Modem in ... internal/telephony/test/Simulated*.java was never run, even if it would have been the users/developers intention. See also issue #1380 http://code.google.com/p/android/issues/detail?id=1380 Signed-off-by: Simon.Braunschmidt@gmail.com>
tc/init.goldfish.sh
|
21541872c3cdc93e60e18ba496715f8307f990b2 |
27-Aug-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Copy kernel crash dumps to /data and free kernel resources Signed-off-by: San Mehat <san@google.com>
nit.rc
|
7acf3386cca6dcfc22cfe45113cc5839502ad811 |
26-Aug-2009 |
Hiroshi Takekawa <sian@big.or.jp> |
init.rc: Fixes typo: sytem -> system.
nit.rc
|
6bc6794f97aa4368237f23c3d3f7cafd6a796bf3 |
07-Aug-2009 |
San Mehat <san@google.com> |
am ee40fc4e: rootdir: init.rc: Bump up background cpu shares to 5.0% Merge commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5' * commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5': rootdir: init.rc: Bump up background cpu shares to 5.0%
|
ee40fc4e64e1656a16603778bee895ea389ec7d5 |
06-Aug-2009 |
San Mehat <san@google.com> |
rootdir: init.rc: Bump up background cpu shares to 5.0% Signed-off-by: San Mehat <san@google.com>
nit.rc
|
630f5f049b53c8586cca5a1acb928f83332baef5 |
24-Jul-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Add Bluetooth PBAP service.
nit.rc
|
d39e972831d45d4f8f8effd11691fd2c52d235c6 |
24-Jul-2009 |
Doug Zongker <dougz@android.com> |
am d52f54c4: install recovery image using patch mechanism Merge commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f' * commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f': install recovery image using patch mechanism
|
d52f54c4552d2f35b3c2c2ac60350ac83760222f |
24-Jul-2009 |
Doug Zongker <dougz@android.com> |
install recovery image using patch mechanism With the corresponding change in build/tools, the recovery image is installed via a shell script that is emitted by the OTA builder.
nit.rc
|
b44aeb7b6ad8799c31d87a6304d20f41387081a7 |
15-Jul-2009 |
Nick Pelly <npelly@google.com> |
Add OPUSH to register obex server.
nit.rc
|
eced01b171d8b1c0c3183b3b54c6e229f94a5d4e |
13-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 160d4b05: Merge change 6738 into donut Merge commit '160d4b0509e4566930ef9af4f2b9d63b33aebee5' * commit '160d4b0509e4566930ef9af4f2b9d63b33aebee5': rootdir: Remove ip-up-vpn script, which is replaced by an executable.
|
160d4b0509e4566930ef9af4f2b9d63b33aebee5 |
13-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
Merge change 6738 into donut * changes: rootdir: Remove ip-up-vpn script, which is replaced by an executable.
|
1219448dc7c2012edaf8fbb6b03c11d8dc419f89 |
09-Jul-2009 |
Chia-chi Yeh <chiachi@android.com> |
rootdir: Remove ip-up-vpn script, which is replaced by an executable.
ndroid.mk
tc/ppp/ip-up-vpn
|
3338e5511402c395d0f771e16f92a7a95c0cab82 |
09-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
am 48d116ed: init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf Merge commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67' * commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67': init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf
|
48d116edf9c785ed284626cbe0bbf5c958cf5e67 |
09-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf The touch command does not exist, and the chown commands are unnecessary because the system_server is in the WIFI group. Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
|
3bbaec5a7b7aea8a4e1bb5bde3e0b1d2bbc461c1 |
06-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
am eefef323: Set the permissions of wifi supplicant file so that system can access it. Merge commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa' * commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa': Set the permissions of wifi supplicant file so that system can access it.
|
91217ca5cbbf3ca2a96d596713e79f072da2c491 |
02-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 5c49135b: Merge change 5852 into donut Merge commit '5c49135b032235f82560d5e55b0e4c547506516b' * commit '5c49135b032235f82560d5e55b0e4c547506516b': rootdir: Modify init.rc to run mtpd/racoon as a non-root user.
|
eefef3234ae1e3b0f2db71415f134c7ec49899fa |
02-Jul-2009 |
Amith Yamasani <yamasani@google.com> |
Set the permissions of wifi supplicant file so that system can access it. Create the required directories and set the correct owner and permissions.
nit.rc
|
51afbf583819f3bdfc96f3c66c9c3444803e792a |
01-Jul-2009 |
Chia-chi Yeh <chiachi@android.com> |
rootdir: Modify init.rc to run mtpd/racoon as a non-root user. Note that this change requires a new prebuilt kernel for AID_NET_ADMIN.
nit.rc
|
acc9a25ef745fce040e2e4e7adfa3d9e200aee99 |
30-Jun-2009 |
San Mehat <san@google.com> |
am 4322f2d7: init: Enable sched_yield() compatability mode on boot. Merge commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029' * commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029': init: Enable sched_yield() compatability mode on boot.
|
fff1092b7111e2087e68c6b26061f5a038b5160b |
30-Jun-2009 |
Chia-chi Yeh <chiachi@android.com> |
am 3860b6e6: rootdir: Obsolete ppp/peers/common and racoon/racoon.conf. Merge commit '3860b6e67c72afceddf316c0a3282f53496de8af' * commit '3860b6e67c72afceddf316c0a3282f53496de8af': rootdir: Obsolete ppp/peers/common and racoon/racoon.conf.
|
24f3a2fe8f4b63497654a774af11615cd70b4c2b |
30-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am bbdab64d: Merge change 4592 into donut Merge commit 'bbdab64ddd5341bb7f7c923bc86f43bdbc7d89dc' * commit 'bbdab64ddd5341bb7f7c923bc86f43bdbc7d89dc': rootdir: Remove gprs/pppd related scripts.
|
4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029 |
29-Jun-2009 |
San Mehat <san@google.com> |
init: Enable sched_yield() compatability mode on boot. In CFS, the (somewhat undefined) behavior of sched_yield() changed. See: http://kerneltrap.org/Linux/CFS_and_sched_yield This change enables 'compat' mode for sched_yield() Signed-off-by: San Mehat <san@google.com>
nit.rc
|
3860b6e67c72afceddf316c0a3282f53496de8af |
27-Jun-2009 |
Chia-chi Yeh <chiachi@android.com> |
rootdir: Obsolete ppp/peers/common and racoon/racoon.conf.
ndroid.mk
tc/ppp/peers/common
tc/racoon/racoon.conf
|
bbdab64ddd5341bb7f7c923bc86f43bdbc7d89dc |
27-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
Merge change 4592 into donut * changes: rootdir: Remove gprs/pppd related scripts.
|
a65044fad8d668fad71769555486254eee7b8dc3 |
26-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am a1140ad4: Merge change 5455 into donut Merge commit 'a1140ad45dc90e6f51944a12d0a690e757c9bd0b' * commit 'a1140ad45dc90e6f51944a12d0a690e757c9bd0b': Add new PPP IPCP script for VPN.
|
34ccf656e23038ca89dcacf29045c3e1a50639a0 |
26-Jun-2009 |
Hung-ying Tyan <tyanh@google.com> |
Add new PPP IPCP script for VPN.
tc/ppp/ip-up-vpn
|
abd54c1b78983ce425250dba137e203b7020637e |
18-Jun-2009 |
Chia-chi Yeh <chiachi@android.com> |
rootdir: Remove gprs/pppd related scripts. vpn related scripts will be updated in the next change.
ndroid.mk
tc/init.gprs-pppd
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
|
f1d63f3751ca787b2ebe76b6680342aa1ff3ca49 |
18-Jun-2009 |
San Mehat <san@google.com> |
am bfa2f8e9: init: Bump up the max cpu bandwidth shares ratio for background. Merge commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34' * commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34': init: Bump up the max cpu bandwidth shares ratio for background.
|
bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34 |
17-Jun-2009 |
San Mehat <san@google.com> |
init: Bump up the max cpu bandwidth shares ratio for background. New ratio is 1024/16 (1.5625% for background when cpu is under load) Signed-off-by: San Mehat <san@google.com>
nit.rc
|
6df2e9fc2e04fc1e908935190837675d6f7599a6 |
15-Jun-2009 |
Mike Chan <mike@android.com> |
am d709b582: remove 3G timeout values from init.rc, this should be device specific Merge commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56' * commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56': remove 3G timeout values from init.rc, this should be device specific
|
d709b582604e7f9d53b97f9ae13c5e12b2466c56 |
12-Jun-2009 |
Mike Chan <mike@android.com> |
remove 3G timeout values from init.rc, this should be device specific Signed-off-by: Mike Chan <mike@android.com>
nit.rc
|
9862028d79f8cd29dc69d87f3f5dbd393476bafc |
12-Jun-2009 |
Chung-yih Wang <cywang@google.com> |
am 0bd9a9f5: Add the ipcp scripts for pppd and racoon configuration for ipsec-tools. Merge commit '0bd9a9f5bcaefda8d7d37c9383b004b516009b85' * commit '0bd9a9f5bcaefda8d7d37c9383b004b516009b85': Add the ipcp scripts for pppd and racoon configuration for ipsec-tools.
|
0bd9a9f5bcaefda8d7d37c9383b004b516009b85 |
12-Jun-2009 |
Chung-yih Wang <cywang@google.com> |
Add the ipcp scripts for pppd and racoon configuration for ipsec-tools. 1. add ip-up/ip-down script 2. add /etc/ppp/peers/common 3. add /etc/racoon/racoon.conf
ndroid.mk
tc/ppp/ip-down
tc/ppp/ip-up
tc/ppp/peers/common
tc/racoon/racoon.conf
|
6f5fb6fda101cac4208e4caecee0f70680e2d996 |
10-Jun-2009 |
San Mehat <san@google.com> |
am 3d6f16e5: init.rc: Set default cpu shares for background scheduler group to < 1% Merge commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919' * commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919': init.rc: Set default cpu shares for background scheduler group to < 1%
|
3d6f16e5edc9834b13a0bcc8a33c98e25518d919 |
10-Jun-2009 |
San Mehat <san@google.com> |
init.rc: Set default cpu shares for background scheduler group to < 1% Signed-off-by: San Mehat <san@google.com>
nit.rc
|
1d36696821cd81ed7b668bb9d2b0b8a43540ccd2 |
06-May-2009 |
Jaikumar Ganesh <jaikumar@google.com> |
Bluez4 changes Rename hcid to bluetoothd and change permissions.
nit.rc
|
720f08f3ffb27084f2a9c98d661dae53d7191ebf |
09-Jun-2009 |
Dmitry Shmidt <dimitrysh@google.com> |
Add /config mounting point Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
nit.rc
|
1f75d709c10f49d2e2390b888e766bcfd17da860 |
01-Jun-2009 |
Chung-yih Wang <cywang@google.com> |
Add VPN and Keystore services and data directories. -- changed the default mode to 0770 for keystore with the new user 'keystore'. -- add the keystore service providing the basic key lookup/install/remove, but only keystore user can access the key content.
nit.rc
|
17df71e0b277372de1d915c168c07c8877e82395 |
06-Jun-2009 |
Christopher Tate <ctate@google.com> |
Add an OOM adjustment category for apps undergoing backup In this initial commit, apps undergoing backup are treated equivalently to apps hosting services: more important than anything other than the foreground app.
nit.rc
|
653164b6a0febe3c6b8dcdf0c5367ad0fefc313f |
26-May-2009 |
David 'Digit' Turner <digit@google.com> |
Modify init.goldfish.sh to launch the 'qemu-props' program when the emulator boots up. Its purpose is to receive a list of system property (name,value) pairs and set them on launch.
tc/init.goldfish.sh
|
8b2cf9f04b924f299d2d250ae4d6826627847842 |
21-May-2009 |
Mathias Agopian <mathias@google.com> |
add bootanimation service to init.rc
nit.rc
|
269946c09faaff88403289bcfa2519e994f75c21 |
06-May-2009 |
San Mehat <san@google.com> |
init.rc: Add Nexus to services (disabled for now) Signed-off-by: San Mehat <san@google.com>
nit.rc
|
4933098e22747a9066b5352273c38856b0203931 |
21-Apr-2009 |
San Mehat <san@google.com> |
cgroups: Initialize cgroups at startup. Signed-off-by: San Mehat <san@google.com>
nit.rc
|
01161168aa87ea9f1513d2b7b1232521c84e1ea4 |
26-Mar-2009 |
Nick Pelly <> |
Automated import from //branches/donutburger/...@142809,142809
nit.rc
|
f614d64d4b4dfcd20c77ac3ccf2d9c9090a49303 |
19-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@140373
tc/init.goldfish.rc
nit.rc
|
e037fd7e193ecccbb5c0888e49f6d58c224bc11d |
13-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@138607
nit.rc
|
2015549667fb77706a9879e974a3875ebccd8198 |
11-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137873
nit.rc
|
e4749f30e5bd8cec727a6d7504b10fc80426316a |
09-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137197
nit.rc
|
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 |
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
ndroid.mk
tc/dbus.conf
tc/hosts
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/init.gprs-pppd
tc/init.testmenu
tc/mountd.conf
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
nit.rc
|
e54eebbf1a908d65ee8cf80bab62821c05666d70 |
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
ndroid.mk
tc/dbus.conf
tc/hosts
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/init.gprs-pppd
tc/init.testmenu
tc/mountd.conf
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
nit.rc
|
13f797da7f190e9ea52f2f3d235210b8a4963b21 |
11-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@130745
ndroid.mk
|
35237d135807af84bf9b0e5b8d7f8633e58db6f5 |
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
ndroid.mk
tc/dbus.conf
tc/hcid.conf
tc/init.goldfish.rc
tc/mountd.conf
nit.rc
|
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 |
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
ndroid.mk
tc/dbus.conf
tc/hcid.conf
tc/hosts
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/init.gprs-pppd
tc/init.testmenu
tc/mountd.conf
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
nit.rc
|