History log of /system/core/rootdir/
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
9e9970d7ce2ed45d34b8585273b60c6b38783041 19-Jun-2018 Doheon Lee <doheon1.lee@lge.com> Determine product partition path on build time

Path of product partitoin can be set as /product or /system/product
whether generate extra product partition or not.
Substitute %PRODUCT% to relevant path to know linker which path should
search and permit.

Bug: 110286945
Test: m -j # Check /system/etc/ld.config.$(PLATFORM_VNDK_VERSION).txt
Change-Id: I6ca177d0c9c5af00ad821879fece40848331fc8d
Merged-In: I6ca177d0c9c5af00ad821879fece40848331fc8d
(cherry picked from commit cccad0bf8461ab575a5861f9bc68c9f8f69db582)
(cherry picked from commit 93d837f3a90acec007647f21ed4573f044fa6f1e)
ndroid.mk
tc/ld.config.txt
987e94eb8f614de55d5ce91276024b7cb0aad78c 18-Jun-2018 Inseob Kim <inseob@google.com> Add /system/product/* paths to permitted paths

As linker doesn't resolve paths in permitted paths, /system/product
variants should be added to support devices having product partition
under /system.

Bug: 110286945
Test: m -j succeeds on taimen and libraries under /system can dlopen
libraries under /system/product/apps

Change-Id: Icd102d44511702e4ec66c07a367b59c3d9700a44
Merged-In: Icd102d44511702e4ec66c07a367b59c3d9700a44
(cherry picked from commit 3918936b9e7fee51828d285a1217c7202d5cb2d1)
(cherry picked from commit c4cf62f4b4e9186a897e943b2419fb9a13739c1b)
tc/ld.config.txt
9bd3ee1c4f14f268b0959edd891ef852b95370b8 31-May-2018 Inseob Kim <inseob@google.com> Support /product/bin

Bug: 80422611
Test: m -j succeeded and permissions of files under /product/bin are set
correctly

Change-Id: I83377d809c47c92da6b226d2853ea6a7462fb127
Merged-In: I83377d809c47c92da6b226d2853ea6a7462fb127
(cherry picked from commit 25195daaca079e048e47b38b83fc41527a89ccb0)
tc/ld.config.txt
tc/ld.config.vndk_lite.txt
e5c2de355b3d37015f332af5fc97d535d97f9693 04-May-2018 Inseob Kim <inseob@google.com> Support product-specific libraries

Product-specific libraries in /product/lib can be exposed to Android
apps by adding the list of the libs into
/product/etc/public.libraries-<companyname>.txt. The libs MUST be named
as lib<name>.<companyname>.so.

Bug: 73095206
Test: with taimen
mma -j and runtest.sh. The libs are all loaded in system, but not in
vendor. After reinstalling app using adb -r and reopening app, only
libraries listed in .txt are loaded

Change-Id: I7c386813c72a7b225a7f244b6c5fec4ac0660fd3
Merged-In: I7c386813c72a7b225a7f244b6c5fec4ac0660fd3
(cherry picked from commit 67cb05654cfa677fd5db33ea0629a9496a9ae907)
tc/ld.config.txt
tc/ld.config.vndk_lite.txt
428a6ffaf8fb3b9420180a6f54ad4e0f229c96d7 22-May-2018 Jordan Liu <jminjie@google.com> Merge "Add a new directory to store downloaded apns" into pi-dev
f0a5bbda88762e5680e1fa3921fd0831e55ca496 21-May-2018 Niklas Lindgren <niklas.lindgren@sony.com> Add a new directory to store downloaded apns

downloaded apns-conf.xml will be stored in the folder
/data/misc/apns/ to make sure TelephonyProvider gets
access.

Bug: 79948106
Test: Manual
Change-Id: I4ba0596fa6523c0eb96328dbe46ead02587bd9b8
Merged-In: I4ba0596fa6523c0eb96328dbe46ead02587bd9b8
nit.rc
fe305ab286cadea129f2b8af01c0132631efc109 17-May-2018 Paul Crowley <paulcrowley@google.com> Add option to create metadata mount point

Test: booted metadata-encrypted device
Bug: 79781913
Change-Id: Ie922db20314c04409c98700bfb1aff3d111275f0
ndroid.mk
nit.rc
6a145749be79978c533b82352cef96f3f7c02524 08-May-2018 Logan Chien <loganchien@google.com> Always use versioned VNDK directory

Bug: 78605339
Test: sailfish-userdebug builds and boots
Test: sailfish boots with GSI
Change-Id: I7da5845b5c1caed3b73d7665f1db672f2764c2a8
ndroid.mk
658ae90f699bd21ec8d79b18a34765ed5993c828 13-Apr-2018 Tim Murray <timmurray@google.com> cutils: add restricted cpuset

Bug 78197570
Test: CTS
Exempt-From-Owner-Approval: owner OOO, build cop says it's fine

Change-Id: I6df972950b75a839caa463ae282ad000b959e8ae
nit.rc
b35c019d5c8a8dde9bc83f5edd8d579198263a35 17-Apr-2018 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Add /mnt/vendor rw mount point for vendor partitions." into pi-dev
b51147566461d411ad452df81d54dc800c554e06 11-Apr-2018 Tri Vo <trong@google.com> Add /mnt/vendor rw mount point for vendor partitions.

Changes to init's behavior during early mount:
1. Mounting of tmpfs on /mnt is moved from init stage to early mount.
2. init creates /mnt/vendor used to mount vendor partitions.
3. If a device tree fstab entry for early mount specifies a mount point
under /mnt/vendor e.g. /mnt/vendor/foo, init will create
/mnt/vendor/foo mount point.

Bug: 64905218
Test: change dt fstab entry to mount persist to /mnt/vendor/persist;
mount point is created correctly, and partition is mounted in early
mount. See go/pag/1069774
Test: device boots with /mnt/vendor and previous contents of /mnt present,
and selinux label "mnt_vendor_file" is applied correctly.
Test: cts-tradefed run commandAndExit cts --skip-all-system-status-check
--primary-abi-only --skip-preconditions -m CtsAppSecurityHostTestCases
-t android.appsecurity.cts.PermissionsHostTest
Change-Id: I3739130739eadf508355c7f2531366fcaed74175
nit.rc
7fdcbdfc7bd2fc18e64824d1164ad0fc69f4c0e8 13-Apr-2018 Paul Lawrence <paullawrence@google.com> Fix FDE

Need a larger tmpfs to stop crashes
Need to run start-zygote after mounting the real data

Test: Cherry-pick ag/3898232. System boots, can set pattern, system
reboots. Wifi works at all points.
Bug: 76452634

Change-Id: Id24241db940d352fd3bcdef594b5358854c6f71d
nit.rc
fd1aa70a0f05578fb7ac1502255aa62178e7f0ce 04-Apr-2018 Yifan Hong <elsk@google.com> healthd: add healthd.rc

Split healthd section from init.rc into its own. This allows
healthd.rc to be excluded from the build when healthd is excluded.

Test: builds
Test: exclude healthd from build, healthd.rc is not installed
Bug: 77541952
Change-Id: I1c055f14c5862631f359fd0029289da8f43af063
nit.rc
e9aaadfb2b26df361411f973d154b3bac45572fb 29-Mar-2018 Logan Chien <loganchien@google.com> Allow VNDK-SP extensions to use vendor lib

This commit adds a wildcard linker namespace link between the "vndk"
namespace and the "sphal" namespace of the system processes. This is
created for VNDK-SP-Ext to load vendor libs in "sphal" namespace.

Bug: 77249955
Test: lunch aosp_walleye-userdebug && make -j8 # runs unit tests
Test: lunch aosp_sailfish-userdebug && make -j8 # runs unit tests
Test: Create a VNDK-SP-Ext, link to vendor libs, and run it.
Change-Id: I71b0fb604a84272156aa119130c272f891847008
Merged-In: I71b0fb604a84272156aa119130c272f891847008
(cherry picked from commit fbaf9767b51891491903521c24b0d4a1ec1c87e8)
tc/ld.config.txt
50108b3f49b22f9c45bb9a3c6730b9f5bbbfb9a3 02-Mar-2018 Jerry Zhang <zhangjerry@google.com> Remove sys.usb.ffs.mtp.ready property

With the usb control fd changes, there
is no longer a need to wait for this
property to trigger before starting the
connection.

Bug: 72877174
Test: switch config to mtp/ptp
Change-Id: Ib29419e7948025be3f3295106cad18943d314f0b
nit.usb.configfs.rc
1f70d1cac570550daa67796241f3885dd09f7e2e 21-Mar-2018 Benedict Wong <benedictwong@google.com> Merge "Set SPI Allocation Timeout to One Hour" into pi-dev
89c9c9b18bec440f1507e686f98af61e9b611cb7 13-Mar-2018 Benedict Wong <benedictwong@google.com> Set SPI Allocation Timeout to One Hour

This change increases the default expiration length of an SA to 1h. The
IPsec API expects that SPIs are allocated indefinitely, but potential
for instability requires that these get cleaned up automatically. As
such, the duration was chosen as a sane, but long timeout value.

Bug: 72316671
Test: Added CTS tests to enforce this behavior
Merged-In: I47aef9cea4a09da253b2ec048a8797af5fa25529
Change-Id: I47aef9cea4a09da253b2ec048a8797af5fa25529
(cherry picked from commit 00308f85540ec1e3557e991811e220455290e4d3)
nit.rc
955029aa1baff0c72295cdbf4a4d4211c5947e45 19-Mar-2018 Jiyong Park <jiyong@google.com> /postinstall/* does not search for a lib in /vendor or /odm

There has been no section in the linker config file for the binaries
under /postinstall. As a result, the binaries were run with the legacy
default config where /vendor/lib and /odm/lib are added to the search
paths. This is causing selinux denials as the binaries for OTA are not
allowed to access /vendor/lib or /odm/lib, but the dynamic linker calls
realpath(3) on the paths to canonicalize them.

Fixing the issue by letting /postinstall/* binaries to run with a
dedicated linker namespace config, where /vendor/lib and /odm/lib are
not added to the search paths. Not having the paths is okay because
he OTA binaries should not have dependency to the libs there.

Bug: 75287236
Test: do the OTA, selinux denials on postinstall_file is not shown
Test: above test should pass on wahoo, marlin and pre-treble devices
Merged-In: I49c11a0929002adfef667890c0a375c2b41054f4
Change-Id: I49c11a0929002adfef667890c0a375c2b41054f4
(cherry picked from commit d7e6cb27b6758fe96b200dde33b75dbe5ba5bf6b)
tc/ld.config.legacy.txt
tc/ld.config.txt
tc/ld.config.vndk_lite.txt
6795ef7bb2c2dde730174a3ccac15aef96818415 14-Mar-2018 Bowgo Tsai <bowgotsai@google.com> Support /odm partition

Bug: 64195575
Test: boot a device

Change-Id: I52c0da32aef80c060f6efa47ddf62577fb543ad8
Merged-In: I52c0da32aef80c060f6efa47ddf62577fb543ad8
(cherry picked from commit 39476ffd8a7c299df2f1980e16435a17a5b18256)
tc/ld.config.txt
ca8b2c699584cc498ff5f761fca9789c54ea1219 15-Nov-2017 Bowgo Tsai <bowgotsai@google.com> Adding /odm support

Treble system-as-root GSI needs to work on devices with and without /odm
partition. This change creates the following symlinks for devices without
/odm partition:

/odm/app ->/vendor/odm/app
/odm/bin ->/vendor/odm/bin
/odm/etc ->/vendor/odm/etc
/odm/firmware ->/vendor/odm/firmware
/odm/framework ->/vendor/odm/framework
/odm/lib -> /vendor/odm/lib
/odm/lib64 -> /vendor/odm/lib64
/odm/overlay -> /vendor/odm/overlay
/odm/priv-app -> /vendor/odm/priv-app

For devices with odm partition, /odm will be used as the mount point and
those symlinks will be hidden after mount.

Bug: 70678783
Test: boot a A/B device without /odm partition, checks those symlinks exist
Test: boot a A/B device with /odm partition, checks those symlinks don't exist
Change-Id: I4d960b52e2754f461188f3ab562c751f502046ea
(cherry picked from commit 00749affc4a9185953d7444c88f614c5b7694504)
ndroid.mk
0ee6c22f58e29c9ae4a0c07f19a6b8e81b8f46ad 15-Feb-2018 Luis Hector Chavez <lhchavez@google.com> Merge "init.rc: Mount /mnt with nodev,nosuid,noexec" am: 6698482ca4 am: 0802d45683
am: cfd9a3af86

Change-Id: I9be6cffa4deb4df7c4b781e2900d7fa79fd558ca
b0d8b26e0fc415742bde933f61cd050284981624 15-Feb-2018 Luis Hector Chavez <lhchavez@google.com> Merge "init.rc: Remount / with MS_REMOUNT|MS_BIND" am: 008576080e am: c37d85953e
am: 655d6d5451

Change-Id: Idb18188ad9b3b667411d428ae616498748b8281a
465c8f307f4506afca18cfb0d88cce433117e613 14-Feb-2018 Luis Hector Chavez <lhchavez@google.com> init.rc: Add nodev,noexec,nosuid to /config

This change adds some additional flags to the /config mount. This is to
reduce the number of mounts with unnecessary privileges.

Bug: 73255020
Test: aosp_sailfish still boots
Test: CtsAppSecurityHostTestCases {ExternalStorageHostTest,StorageHostTest}
Change-Id: If3409d917cdf76a67ebfb7c4035a3ae8fee6189f
nit.rc
081aa0a303ab09f10741d2ac2b1a409710792c72 14-Feb-2018 Luis Hector Chavez <lhchavez@google.com> init.rc: Mount /mnt with nodev,nosuid,noexec

This change adds some additional flags to /mnt. This is to reduce
the number of mounts with unnecessary flags.

Bug: 73255020
Test: aosp_sailfish still boots
Test: CtsAppSecurityHostTestCases {StorageHostTest,ExternalStorageHostTest}
Test: CtsOsTestCases StorageManagerTest
Test: find /mnt | egrep -v '^/mnt/runtime/(default|read|write)/emulated' | \
xargs ls -lZd # Shows no character devices or executable files
Change-Id: I54739133119d9626ebeb2ef9a1c127f7a90fa098
nit.rc
30780a73053d968460cbe9595f8024de07460c4e 14-Feb-2018 Luis Hector Chavez <lhchavez@google.com> init.rc: Remount / with MS_REMOUNT|MS_BIND

Since we only want to change the ro flag on / (and leave all other mount
flags alone), this can also be achieved by passing MS_REMOUNT|MS_BIND,
even if the mount is not a bind-mount.

This aims to make running Android within a user namespace easier, since
remounts without the MS_BIND flag are forbidden.

Bug: 73255020
Test: aosp_sailfish still boots
Test: rootfs on / type rootfs (rw,seclabel)
/dev/root on / type ext4 (ro,seclabel,relatime,data=ordered)
Change-Id: I2f89a8badfc467db47304c9355648e8fd8ad1272
nit.rc
f88ab0b4ec907a1495751de83ef8db9ca6cb0b43 14-Feb-2018 Justin Yun <justinyun@google.com> Merge "Move libz to llndk from vndk-sp for non-VNDK-enforced devices." am: 524254f3df am: 7987a191f6
am: e86a98bfac

Change-Id: I894549e82aebc48e39133ccc9138410b7ce70c82
8065a608a68cfec6b843a668b255b75afdffc400 14-Feb-2018 Justin Yun <justinyun@google.com> Move libz to llndk from vndk-sp for non-VNDK-enforced devices.

For non-VNDK-enforced devices, libz cannot be installed in vndk-sp
to avoid CTS test failure.
Move libz to llndk from vndk-sp for generating the namespace
configuration from ld.config.vndk_lite.txt.

Bug: 73296261
Test: run android.jni.cts test on marlin/sailfish
Change-Id: I1b8b43cd87dc8dfdd2667001ae1e50d9eaedf93d
ndroid.mk
9420397267ae469e089af314b56bb3c6fc919a0e 14-Feb-2018 Luis Hector Chavez <lhchavez@google.com> Merge "init.rc: Perform some mounts with nodev,nosuid,noexec" am: cd66e4c6ea am: 8cb681fa1f
am: c876c660e0

Change-Id: I588550f4cad7e18067d916a6e1b4eed3b1fb2265
f8a7e37b2de50eb7a2bcd59b305adb8f68f204c1 12-Feb-2018 Luis Hector Chavez <lhchavez@google.com> init.rc: Perform some mounts with nodev,nosuid,noexec

This change adds some additional flags to some mounts. This is to reduce
the number of mounts with these flags.

Bug: 73255020
Test: aosp_sailfish still boots
Change-Id: I285e6d7b3dcc19f691a3d6780e7d3a3a5d7cb3de
nit.rc
eab887b60ecb11ba2e3c71fd087878e3a3d3858c 08-Feb-2018 Justin Yun <justinyun@google.com> Merge changes from topic "vndk-sp-list-update" am: 4c0ee1e8a0 am: 6edfca6e3b
am: 0d77d80aad

Change-Id: I366d50eee8edb40f243c551a2051d5efebdb3e72
27bdc37facad2e88d631c3b5f3bb42bd2b784c78 08-Feb-2018 Justin Yun <justinyun@google.com> Rename namespace configuration source files.

For strict VNDK runtime restriction, use ld.config.txt as a source
file. For treblized devices without BOARD_VNDK_VERSION, use
ld.config.vndk_lite.txt file.

Test: Build and boot on Pixel 2017 and 2018 devices.
Change-Id: Ie5b77facd4c11bc73219ecf13ad1298ac5d60d8e
ndroid.mk
tc/ld.config.txt
tc/ld.config.vndk.txt
tc/ld.config.vndk_light.txt
tc/ld.config.vndk_lite.txt
8a9a8eeb853ab6ebb5ec26bf50d731f08c32ad5d 02-Feb-2018 Justin Yun <justinyun@google.com> Use actual VNDK list for non-VNDK-enforcing devices

Rename ld.config.txt.in to ld.config.vndk.txt and
ld.config.txt to ld.config.vndk_light.txt.

For FULL_TREBLE devices without BOARD_VNDK_VERSION, update the VNDK
library list in ld.config.vndk_light.txt with the actual VNDK list.

Bug: 69526027
Test: Build marlin/sailfish and check boot
Change-Id: Idbb0cc97d11037c1493d4739e84961297ce51dbd
Merged-In: Idbb0cc97d11037c1493d4739e84961297ce51dbd
ndroid.mk
tc/ld.config.txt
tc/ld.config.txt.in
tc/ld.config.vndk.txt
tc/ld.config.vndk_light.txt
181056b424a9439017e4221553e94b81cac3420c 02-Feb-2018 Justin Yun <justinyun@google.com> Use actual VNDK list for non-VNDK-enforcing devices

Rename ld.config.txt.in to ld.config.vndk.txt and
ld.config.txt to ld.config.vndk_light.txt.

For FULL_TREBLE devices without BOARD_VNDK_VERSION, update the VNDK
library list in ld.config.vndk_light.txt with the actual VNDK list.

Bug: 69526027
Test: Build marlin/sailfish and check boot
Change-Id: Idbb0cc97d11037c1493d4739e84961297ce51dbd
ndroid.mk
tc/ld.config.txt
tc/ld.config.txt.in
tc/ld.config.vndk.txt
tc/ld.config.vndk_light.txt
5b3196430b0c734826a8a6581b78af49a6cd9575 05-Feb-2018 bohu <bohu@google.com> Merge "emulator: not start adbd upon ro.kernel.qemu=1" am: 7c271bdc3b am: 466b098b87
am: 83255e337a

Change-Id: I26732caa7cc8346e27ec4c8e4816b5cace2577cd
b40193e50a0b6128cb33436807413aae8f2e3354 04-Feb-2018 bohu <bohu@google.com> emulator: not start adbd upon ro.kernel.qemu=1

clean up emulator specific rules.

BUG: 72900827

Change-Id: Ica60838562fd773bcde5752c11586183ce55b71a
nit.usb.rc
1519e3c9b394ce430dde93e15aa7dad5d8233c41 26-Jan-2018 Logan Chien <loganchien@google.com> Merge "ld.config.txt: Link vendor vndk ns to default ns" am: 1e11f5f709 am: 161efac4f0
am: f20d8a1f1e

Change-Id: I915c4409df864bbb69ccb9b8f684c98ce3a3892d
1e11f5f709e1e2ce43de276052500d2a713d0687 26-Jan-2018 Logan Chien <loganchien@google.com> Merge "ld.config.txt: Link vendor vndk ns to default ns"
207a211804a60cb46d7ee9785c5055968e609188 25-Jan-2018 Jaekyun Seok <jaekyun@google.com> Merge "Support /product partition" am: 8f324542a2 am: 10e1ec7de3
am: 83ffef2cb1

Change-Id: Ia1933bbede3db2489151e5ab8ead574582b87f7a
dff165d3a2db868689bae12db1ed8b3c74fa7d60 27-Nov-2017 Jaekyun Seok <jaekyun@google.com> Support /product partition

This CL will enable reading /product/build.prop and add product paths
into ld.config.txt.in.

Bug: 64195575
Test: tested with 'PRODUCT_PRODUCT_PROPERTIES := ro.product.abc=abc' on
sailfish

Change-Id: Ie996def20e25dc1afe0c74af2096af844934b2dc
ndroid.mk
tc/ld.config.txt.in
a03134ea22e13092d9a0979ceff79bfe0ce6485e 22-Jan-2018 Andreas Huber <andih@google.com> Fingerprint data is now stored in one of two ways depending on the

shipping API version:

For devices shipped before Android P nothing changes, data
is stored under /data/system/users/<user-id>/fpdata/...

Devices shipped from now on will instead store
fingerprint data under /data/vendor_de/<user-id>/fpdata.

Support for /data/vendor_de and /data/vendor_ce has been added to vold.

Bug: 36997597
Change-Id: I83f87e88d1731e515b459a3d6d5bf3104afe6cfe
Test: manually
nit.rc
ea4a2bdd448ae6811d3073b2ee3f04632739c9cf 17-Jan-2018 Logan Chien <loganchien@google.com> ld.config.txt: Link vendor vndk ns to default ns

This commit links the vndk namespace of vendor processes to the default
namespace of vendor processes. allow_all_shared_libs is specified so
that VNDK extensions can link with other vendor libraries in
/vendor/lib[64].

Bug: 69824336

Test: Create a vndk-ext lib that links to vendor lib and use that
vndk-ext lib in a vendor executable.

Change-Id: Ibd3dc2e5f0f2e6ff9fc9677c6bcfcf87a1a70e50
tc/ld.config.txt.in
736e4f10799716fb89d3022fc6a1225825d392ef 23-Jan-2018 Logan Chien <loganchien@google.com> Merge "ld.config.txt: Move vendor vndk to vndk namespace" am: c6805c3e9c am: 0779a259b7
am: 5aa3d78ea7

Change-Id: I68cbb5429e57f6f2a72775c5fc50b4b5e20b8cd4
91b3fb4f3f172d1c314415d7b05873872951e08c 11-Jan-2018 Logan Chien <loganchien@google.com> ld.config.txt: Move vendor vndk to vndk namespace

This commit moves /{odm,vendor}/lib[64]/vndk[-sp] to vndk namespace so
that vndk extension can override vndk libs from
/system/lib[64]/vndk[-sp].

Bug: 69824336

Test: Create libutils_ext locally and it can be called from
android.hardware.nfc@1.0-service.

Change-Id: Id63e58d665fa41eda85950ee1d16fe06c35cd7d3
tc/ld.config.txt.in
905c99b80e94b5a25f71543a4fdc51351801e0f9 20-Jan-2018 Max Bires <jbires@google.com> Merge "Adding /data/local/traces for traceur app" am: 658e4ddd03 am: 69c428e5a6
am: cd4fa12263

Change-Id: I0ba68a132cc840b0d5b63a9d22b54276b8c168de
658e4ddd0398ca65936359b26390cb293d202899 20-Jan-2018 Treehugger Robot <treehugger-gerrit@google.com> Merge "Adding /data/local/traces for traceur app"
82b85d0b7c0dc843104f97d7d5c80b4de43df457 19-Jan-2018 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Change /configfs/sdcardfs to 0770"
181d11c5cb4d0dc10216e1aa89b8e2510f87b85c 18-Jan-2018 Max Bires <jbires@google.com> Adding /data/local/traces for traceur app

Traceur app is being split out of shell user. Previously it logged to
shell's bugreports directory. It no longer has access, so it needs a
new, user-friendly file location to store trace data.

Bug:68126425
Test: Traceur can write and shell can read from this directory
Change-Id: I9e344973fd43eb5699f7a848524e20b06458fb77
nit.rc
93b1df1cd114e951ad21003a858aa14873c42557 17-Jan-2018 Justin Yun <justinyun@google.com> Merge "Add VNDK version suffix in ld.config.txt on build time." am: 447280cea0 am: 3060be356f
am: 5a31c03fa6

Change-Id: Ie58dca02b6f267b882b8f1f59cda57c141c8892c
cbbf195e46fcd1ea0ec6449739608b41c9a242be 16-Jan-2018 Justin Yun <justinyun@google.com> Add VNDK version suffix in ld.config.txt on build time.

As we use different ld.config.txt per version, we don't need to
substitute the VNDK_VER on run time.
Remove all ${VNDK_VER} from the linker namespace configuration files.

Bug: 70603313
Test: build and boot GSI for walleye and sailfish
Change-Id: Ief8aee5c3308b2462cafaffc2423deda4e51a7bb
ndroid.mk
tc/ld.config.txt
tc/ld.config.txt.in
128274a3f2dd7f09d23098f6fcc501596620e9e2 17-Jan-2018 Oscar Shu <xshu@google.com> Merge "Firmware dump create directory" am: da007e0deb am: b4d9751eab
am: b8deb4de2f

Change-Id: I3eba1b745d75d8cc0a3eba7cf0fea7ad54b992c2
da007e0deb1f7149565766ae72499e48fb821bf0 17-Jan-2018 Oscar Shu <xshu@google.com> Merge "Firmware dump create directory"
dc95eeadf41ce40650d9f12f53ffa47e43ba81b4 16-Jan-2018 Chenbo Feng <fengc@google.com> Merge "Mount eBPF file system and cgroupv2 root directory" am: 4719ecd28c am: 7a65861d7c
am: 94cff89571

Change-Id: Id2a58f55f16994dba0b6dbf86d4724943dbc8141
2cba6f2e0e9b6a53fc90cddd30f668c1d5131923 23-Oct-2017 Chenbo Feng <fengc@google.com> Mount eBPF file system and cgroupv2 root directory

Mount the eBPF file system under /sys/fs/bpf to allow netd to pin and
retrieve persistent eBPF map object from the file system. It helps the
system to maintain a consistent eBPF data store when netd crashed and
restart. Mount the cgroupv2 module and use the root folder of it to
monitor network statistics through eBPF program attached.

Test: eBPF map object show up under /sys/fs/bpf after netd start.
Bug: 30950746
Change-Id: Ie475112116603798fe75a75c5a84f4bbe5b942ec
nit.rc
538caefba9681b9f58e105dd3fc25585d4bdbeca 16-Jan-2018 Jeff Vander Stoep <jeffv@google.com> Merge "OWNERS: add myself" am: 4ba3ebbc2f am: d64b97e0fd
am: 14bf561f03

Change-Id: Idf3ff9fe3089b8a9788cbe260e94456b680d1dc6
9a7a5b61c4db8c0c8f04526767d36c6ab62144b4 18-Dec-2017 xshu <xshu@google.com> Firmware dump create directory

Setting up infanstructure for vendor tombstone in dir:
/data/vendor/tombstones

Wifi specific dumps will go into:
/data/vendor/tombstones/wifi

Bug: 70170285
Test: compile, run on device.
Change-Id: Ie16dd8236d9b5df19adb9818b4c62ce01e0d0b10
nit.rc
e2f77d8ef1fb417da407443facb9289b1107067d 12-Jan-2018 Jeff Vander Stoep <jeffv@google.com> OWNERS: add myself

Test: none
Change-Id: I150226c19370a2c5f06781003ec88befa0e91da7
WNERS
79035230155859111b8a8c922d7b123e359f6039 29-Nov-2017 Daniel Rosenberg <drosen@google.com> Change /configfs/sdcardfs to 0770

Change-Id: I0a66f6b3ebc3dee398e4f23f5a58ebf7d62cc4c3
Bug: 69929297
Test: setenforce 0
su
mkdir /config/sdcardfs/test
su u0_a0,u0_a0,u0_a0
echo 10000 > /config/sdcardfs/test/appid
Write should fail
Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
d7bfaea62b07d1f6104d2ccad445e2b084b6e946 11-Jan-2018 Justin Yun <justinyun@google.com> Merge "Do not append VNDK version if VNDK is not used" am: 4d281880e0 am: 9c378b0e37
am: 30ac0d7a27

Change-Id: I4493f92bf877d9a792837df5c062570f972a6901
dd16301babc01b0d3f49d297097c8a61d8b45863 10-Jan-2018 Justin Yun <justinyun@google.com> Do not append VNDK version if VNDK is not used

If BOARD_VNDK_VERSION is not defined, ro.vndk.version will not be
set. In this case, the device, is not able to use versioned
configuration files.
Check BOARD_VNDK_VERSION to append the VNDK version to the namespace
configuration files.

Bug: 71730104
Test: Check boot on both 2016 and 2017 Pixel devices.
Change-Id: I1df27c75de42a526768a156387f22a934cda6d72
ndroid.mk
439efda1e7b3bdff31fc9690f24236a0106d32a2 09-Jan-2018 Siarhei Vishniakou <svv@google.com> Merge "Allow input system access to /dev/v4l-touch" am: f6363989f4 am: 31209d7ada
am: f82541140b

Change-Id: I7ea315e14fc97ade4f49293b13fc8438b4e19024
f6363989f42f6b9b13ff4ce86618192616a1665c 09-Jan-2018 Treehugger Robot <treehugger-gerrit@google.com> Merge "Allow input system access to /dev/v4l-touch"
fc86b1fee0d4681f20888c55aa64b1508d76915b 09-Jan-2018 Justin Yun <justinyun@google.com> Merge "Removed unused part in ld.config.txt.in" am: 8fa3e72846 am: 7b7339d339
am: ebf514bab3

Change-Id: Ib94c656453658409081f6820a5901ab75de8fa60
939f06b4291060855275dc79a69d55de68a9cb89 08-Jan-2018 Justin Yun <justinyun@google.com> Removed unused part in ld.config.txt.in

In the namespace with "isolated = false", "permitted.paths" is not
used.

Bug: 71727966
Test: walleye device boot
Change-Id: I6f624be3c4e2c4070bb784632d0757408ec12db0
tc/ld.config.txt.in
f431cd84e4dd33adb70baa1e6d7266d1a4ed9452 09-Jan-2018 Jeff Sharkey <jsharkey@android.com> Merge changes from topic "resgidz" am: a7004e5fed am: b162da3a47
am: c16340c646

Change-Id: Iaf01b79c1e51f4cba06ee9ea6227c00a3cec4d4d
a1c597896740706bf601ac557001d67ec2f53ccc 09-Jan-2018 Steve Muckle <smuckle@google.com> Merge "rootdir: make sure the /odm mountpoint is always available" am: fcec40de0b am: ada4b7782d
am: 34f29a86fd

Change-Id: Icbc30f9ed92163119307d7c5f25e06d9cd93e9a4
a7004e5fedff5d7cdeaae120f561ac2e8bfb16e7 08-Jan-2018 Jeff Sharkey <jsharkey@android.com> Merge changes from topic "resgidz"

* changes:
Add reserved disk GID to critical component.
Set reserved GID when setting reserved blocks.
Allocate GID to use reserved disk space.
9410d572fb6202727580fa62815b694998b6421f 06-Jan-2018 Jeff Sharkey <jsharkey@android.com> Add reserved disk GID to critical component.

We recently created a new GID that can be granted to critical system
processes, so that the system is usable enough for the user to free
up disk space used by abusive apps.

Test: builds, boots
Bug: 62024591
Change-Id: Ia5af7535cc05a214f8720ac08c594c6db888597a
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
1a3e3065fb07e72a8e0a0790a728b598bfc23b67 04-Jan-2018 Steve Muckle <smuckle@google.com> rootdir: make sure the /odm mountpoint is always available

The odm partition will eventually be required. Prepare for this by
creating its mount point.

Bug: 37322799
Test: run cts-dev -m CtsPermissionTestCases
Change-Id: Ibd031b68dd7328c853ded401bb2690dbd6675141
ndroid.mk
02fbb27e73c8e2583ffdadb5d2a7dede11f04ddf 03-Jan-2018 Ricky Wai <rickywai@google.com> Merge "Create Network Watchlist data folder for ConfigUpdater"
38d4352fce8ee48dcdc5cff721191802fb32ea1d 23-Dec-2017 Siarhei Vishniakou <svv@google.com> Allow input system access to /dev/v4l-touch

Bug: 62940136
Test: read /dev/v4l-touchX from inputflinger

Change-Id: I394686e4167855f50ddd6ff9aebcf3c94f6550b0
eventd.rc
2fd29edc710004211a7ceb669705fee304aba32b 21-Dec-2017 Logan Chien <loganchien@google.com> Merge "Separate VNDK libs into another linker namespace" am: b00ed37a66 am: 3d5afa7b34
am: 2a736774dc

Change-Id: I11667b8f5e5bb450fb355fcfc6d1e533be78958c
b00ed37a66d42357f542f4bd74fef0af02342667 21-Dec-2017 Logan Chien <loganchien@google.com> Merge "Separate VNDK libs into another linker namespace"
3688e713e78d069fc352c53ab7beaec5b4a84444 20-Dec-2017 Jiyong Park <jiyong@google.com> Merge "/vendor/lib/hw is removed from search paths for vendor default ns" am: 3388af49e6 am: 17f0ae765e
am: b7d35b7d09

Change-Id: Ib638acc46f3c96ca459755a06df977799dd90822
3388af49e6953c9d01a6b522dd741f4d073d2de6 20-Dec-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "/vendor/lib/hw is removed from search paths for vendor default ns"
483cd2e2fe99a70a33679f1cce1fca3cb8399c49 19-Dec-2017 Jiyong Park <jiyong@google.com> /vendor/lib/hw is removed from search paths for vendor default ns

Shared libraries in the directory should be dlopened with full file
paths. That was a workaround for some legacy prebuilt binaries and they
are all now fixed. Thus removing.

Bug: 70551668
Test: walleye, aosp_walleye, taimen, aosp_taimen boot to the UI

Change-Id: Ifb123b09c13f873cbefa7784e76dfe5f35575a8d
tc/ld.config.txt
tc/ld.config.txt.in
225b71d8c58a85994d074f077493b1b32d07d3b5 15-Dec-2017 Logan Chien <loganchien@google.com> Separate VNDK libs into another linker namespace

This commit extracts /system/lib[64]/vndk and /system/lib[64]/vndk-sp
into another namespace in the vendor section. This commit is necessary
because LLNDK libraries (e.g. libc or libnativewindow) may otherwise
link to the shared libraries in /system/lib[64]/vndk-sp, which may be
older than the one LLNDK libraries built with.

Test: aosp_walleye boots
Bug: 70816018
Change-Id: I6fceb0da92c978ad940af91f5efe84e673c9247e
tc/ld.config.txt.in
0327278abfb066b37fa7bc898e85f7bd435ad9dd 18-Dec-2017 Jiyong Park <jiyong@google.com> Merge "Do not use versioned VNDK directory in vendor partition" am: 3459e5823e am: c56fafa4fc
am: 963685ed53

Change-Id: Ib19db37bdb6d030806f42ac9ecbeb88f71007456
88d5dcbd81d22462c54bdff301cb8580852b4795 27-Oct-2017 Ricky Wai <rickywai@google.com> Create Network Watchlist data folder for ConfigUpdater

Bug: 63908748
Test: Able to boot

Change-Id: I8db6b5706cce17a60e2a7db9be80020f8681531d
nit.rc
baca81639c65abac99191cd547ec7fec14137b54 15-Dec-2017 Jiyong Park <jiyong@google.com> Merge "Re-format ld.config.*.txt files" am: eef035f641 am: ca33a874fe
am: 6546c650fa

Change-Id: If26449caae94fb2e372c382d25033930f3c6d5b5
60a2966fc91b776fdbc3d3f21d7d3820625480cd 13-Dec-2017 Jiyong Park <jiyong@google.com> Do not use versioned VNDK directory in vendor partition

Paths for extended VNDK libs don't need version suffix, because there
always is the single version that the vendor(odm) modules are built
against.

Bug: 70601582
Test: walleye boots to the UI.
Test: No further test is possible since we don't have extended VNDK yet
in our source tree.

Change-Id: Idbf4bb820ddb136d00744f64ddf6ebe6442ad16e
tc/ld.config.txt
tc/ld.config.txt.in
2498e1b1d3b060775a11990bea1212baa042b93c 12-Dec-2017 Jiyong Park <jiyong@google.com> Re-format ld.config.*.txt files

Re-format the files by splitting lines using +=.

Also add /odm/${LIB} where needed.

A few directories that are no longer required are removed from the
search paths and permitted paths.

Test: walleye and sailfish boots to the UI, renderscript, camera,
camcodder, sound, etc. are working.

Change-Id: I3150f0c3d35130d6b1a665e3f0813d33b1b7f546
tc/ld.config.legacy.txt
tc/ld.config.txt
tc/ld.config.txt.in
97772e425b44d5967a6e2716b1e9215fcc157f88 12-Dec-2017 Logan Chien <loganchien@google.com> android.hardware.graphics.allocator@2.0 is no longer VNDK-SP

The interface lib has been in VNDK-SP because
android.hardware.graphics.mapper@1.0 was using it. However, since the
dependency has gone [1], there is no need keep it in VNDK-SP. The
VNDK-SP set should be kept as small as possible because libs in VNDK-SP
are subject to double-loading.

[1] https://android.googlesource.com/platform/hardware/interfaces/+/79d13ff0f5cd3c4242445baf5b2f01a52f0ed06f

Bug: 69480083
Test: /system/lib64/vndk-sp/android.hardware.graphics.allocator@2.0.so
disappears.
Test: sailfish boots

Change-Id: I0e6518f169dd620d6b1a9ada47754e371ef4a739
Merged-In: I0e6518f169dd620d6b1a9ada47754e371ef4a739
(cherry picked from commit 9d898f3678f8ecc7fb35107c36f73c1fc9235848)
tc/ld.config.txt
52a2137d05e889dcee0d5d7f68811c1437189e3d 13-Dec-2017 Jiyong Park <jiyong@google.com> Merge "/vendor/priv-app is added to the permitted paths for the default ns" am: 5dde5e38d2 am: 3c28804815
am: d1a4cbd742

Change-Id: I0ca43f5107d451ecbdb1674fd1436292b9aa3506
3f663e0b29ea34466abc2e1c6b33d957b1f38df5 13-Dec-2017 Vishwath Mohan <vishwath@google.com> Merge "Fix asan permitted paths in the default namespace." am: 32c03800c0 am: 22e81897b2
am: c75631bc5e

Change-Id: Ibf5767decc7e5b3b26b389e37caeab33f7986da3
5029612451970bb1d4065704a15dfd52ae685385 13-Dec-2017 Justin Yun <justinyun@google.com> Merge "Add VNDK version for namespace configuration files" am: a6e6780418 am: a159b310d6
am: 635ddcb894

Change-Id: I791663afc81779ce2306b909db46eb82e895a32c
5dde5e38d28ed083b2ea226ddad39bae17cba434 13-Dec-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "/vendor/priv-app is added to the permitted paths for the default ns"
32c03800c02b34cbf877708836741b80cc50cb23 13-Dec-2017 Vishwath Mohan <vishwath@google.com> Merge "Fix asan permitted paths in the default namespace."
bf24c70ad48ba9c38714d6ed4f57e27f28e9478c 13-Dec-2017 Logan Chien <loganchien@google.com> Merge "android.hardware.graphics.allocator@2.0 is no longer VNDK-SP"
210ff9485dd1401962d2dffc8c6a20bf28550bb7 07-Dec-2017 Justin Yun <justinyun@google.com> Add VNDK version for namespace configuration files

If PLATFORM_VNDK_VERSION is set to a version other than "current",
add the version to the file names of the namespace configuration
files.

Bug: 69883025
Test: device boot
Change-Id: I27377549581125b6c750c1422d0ee4a607dda5e8
ndroid.mk
cede134907f2703e564a9db489ec3c660132edbe 13-Dec-2017 Vishwath Mohan <vishwath@google.com> Fix asan permitted paths in the default namespace.

This CL fixes an error with the asan permitted paths in
ld.config.txt.in.

Bug: 63927538
Test: lunch walleye_asan-userdebug && m -j40
Change-Id: Ica0504cb52ef6e6b3e4ce2deae3ce5984e38cc93
tc/ld.config.txt.in
9c6587ad1fde2f0b820634b5af5007897ef328c0 12-Dec-2017 Jiyong Park <jiyong@google.com> Merge "Use normalize-path-list" am: c034cd5d04 am: f01f51c41f
am: 4c550887a6

Change-Id: I8d6ef704857de733cdfd380fd28271329e206d3b
9d898f3678f8ecc7fb35107c36f73c1fc9235848 12-Dec-2017 Logan Chien <loganchien@google.com> android.hardware.graphics.allocator@2.0 is no longer VNDK-SP

The interface lib has been in VNDK-SP because
android.hardware.graphics.mapper@1.0 was using it. However, since the
dependency has gone [1], there is no need keep it in VNDK-SP. The
VNDK-SP set should be kept as small as possible because libs in VNDK-SP
are subject to double-loading.

[1] https://android.googlesource.com/platform/hardware/interfaces/+/79d13ff0f5cd3c4242445baf5b2f01a52f0ed06f

Bug: 69480083
Test: /system/lib64/vndk-sp/android.hardware.graphics.allocator@2.0.so
disappears.
Test: sailfish boots

Change-Id: I0e6518f169dd620d6b1a9ada47754e371ef4a739
tc/ld.config.txt
b52ff3e247da5de1820404ed2efbd97e569f24e1 11-Dec-2017 Jiyong Park <jiyong@google.com> Use normalize-path-list

Let's use the existing macro.

Test: build walleye, boots to the UI.
Change-Id: Ic23d3454c629a02bfd96d0ca19c0c5c068ae7a03
ndroid.mk
9797e0f35e99aa748479e6cb2e60d77fe6989052 12-Dec-2017 Andreas Gampe <agampe@google.com> Merge "ASAN: Remove old list of services" am: e78accb103 am: fc7a327a4a
am: 428fb9525e

Change-Id: I044b3ec691e5f711de62590847f672161a0ce3c7
e78accb103bf29209a5f2c241e711628f639fe6c 12-Dec-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "ASAN: Remove old list of services"
27b8fcdfcfeb4552daac3441a667fbbb09a8b119 11-Dec-2017 Andreas Gampe <agampe@google.com> ASAN: Remove old list of services

Remove list of services and support for asan.options. This has not
been used in a while, and there is contention about listing names
of device-specific services.

Bug: 70387666
Test: m
Change-Id: I766c6b3a0c44b6b992a3259a3c4215a688452907
ndroid.mk
san.options.off.template
588f5ba383147c742f7ae001f5861a343798727c 11-Dec-2017 Justin Yun <justinyun@google.com> Merge "Use versioned VNDK directories in ld.config.txt" am: 84de4c0a89 am: 27e44ad179
am: c82c963e28

Change-Id: I4ac01e17f3930635b900128220d923312b2fbb6d
44bb46f60446c00a2869fac212530a2238dbf2a0 07-Dec-2017 Justin Yun <justinyun@google.com> Use versioned VNDK directories in ld.config.txt

All vndk/vndk-sp directories will have version suffix if
"ro.vndk.version" is set.

Bug: 69984421
Bug: 66074376
Test: Build with BOARD_VNDK_VERSION=current and
BOARD_VNDK_RUNTIME_DISABLE=true. Check boot.

Change-Id: I03849f9f96bc6c7880aa70c517e963aab4e033b8
tc/ld.config.txt
fd3225492b4b8f683b3028e9f17dda269a240a2a 09-Dec-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Fix media on W/T"
3e2b34136a19aed6fb9fb6a63637bc808fd5dd35 08-Dec-2017 Elliott Hughes <enh@google.com> Merge "Add OWNERS." am: 3289b9c928 am: 515c8fe572
am: aede8375fe

Change-Id: I28f7a8f3fa9c9837f4043768e70c0d985ed95abd
3d0fc2a60b39fd51e2726f9315d25b409a8f4cd6 08-Dec-2017 Elliott Hughes <enh@google.com> Merge "Add a /bin symlink for convenience." am: dcc0f8f76b am: 7a54ed9e28
am: 17197ac3e0

Change-Id: I1371ba22037f4466ec2799bb5a8b5056d57a2de2
b07cc5e0c0c3743e014b940b0585bdbeb392d733 08-Dec-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge changes I3978cbe2,I7b8e1232

* changes:
Reland "Prevent vendors from accessing private VNDK libs"
Permitted and search path change
3289b9c9282dec777363256e27fcc23cd97001c1 08-Dec-2017 Elliott Hughes <enh@google.com> Merge "Add OWNERS."
693d63f9cfc21e3334c6f8f228d73c4fb60ced8b 07-Dec-2017 Elliott Hughes <enh@google.com> Add OWNERS.

Bug: N/A
Test: N/A
Change-Id: Ie785058c0f5eb9b4086c98ccba6e63e3ed411b65
WNERS
dcc0f8f76b6f8bc4ce9e747e0798b6791c4ebed4 07-Dec-2017 Elliott Hughes <enh@google.com> Merge "Add a /bin symlink for convenience."
d083db9bc9592f9054ae3124b2a53656bf04e4bd 29-Nov-2017 Jiyong Park <jiyong@google.com> /vendor/priv-app is added to the permitted paths for the default ns

We will have apps under /vendor/priv-app. Add the path to the permitted
paths so that the apks and so libs under the directory can be loaded.

Bug: 35301609
Test: None since we don't have priv vendor app yet.
Change-Id: Ida998adb2e180852b1922e9933f25b988517399e
tc/ld.config.txt.in
4ad1a34289d83556b705d14c13c8f4eac1306a65 04-Oct-2017 Marco Nelissen <marcone@google.com> Fix media on W/T

W/T enforce restrictions on linker paths, which M/S do not.
Because of this, media.extractor was unable to load its extractors on W/T.

Bug: 67405932
Test: play sounds successfully
Merged-In: I8914da74780c909da815beaffcd4d76fbe2cc6b5
Change-Id: I8914da74780c909da815beaffcd4d76fbe2cc6b5
(cherry picked from commit 593b43910b418eff7a2e63b631ee8d7fdebf2985)
tc/ld.config.txt.in
ad7ddd5a02e3ae0bd6e57d2c9df7715425fe2fc0 07-Dec-2017 Jiyong Park <jiyong@google.com> Reland "Prevent vendors from accessing private VNDK libs"

This reverts commit 875fe42a81696f44cc03eeaa538f370b44639bb7.

... and fixes a bug that private VNDK libs are not accessible even to
RenderScript framework libraries (such as libRS_internal.so). This is
fixed by exceptionally allowing the private libs only to 'rs'
namespace.

Bug: 70260989
Bug: 70279973
Bug: 63878960
Test: Build for walleye and tested Photos edit.
Test: other renderscript app (camerascript) works as well
Merged-In: I3978cbe2e869f6a1c214c755ded038349bde7b6b
Change-Id: I3978cbe2e869f6a1c214c755ded038349bde7b6b
(cherry picked from commit 781c47f4da82062c5445d53064566673c70119ee)
ndroid.mk
tc/ld.config.txt.in
e93d7f994182ece10259b95f660a53af8d6ad37a 10-Oct-2017 Sundong Ahn <sundongahn@google.com> Permitted and search path change

The permitted and search paths should be changed according to VNDK version.
However these paths are fixed with vndk and vndk-sp. So I define the
directory name as below
- /system/${LIB}/vndk${VNDK_VERSION}
- /system/${LIB}/vndk-sp${VNDK_VERSION}
${VNDK_VERSION} will be set by the property "ro.vndk.version".

Bug: 66074376
Test: build & run
Merged-In: I7b8e12327af89d131c4c49cb9b459a393c7dacb8
Change-Id: I7b8e12327af89d131c4c49cb9b459a393c7dacb8
(cherry picked from commit 85c773f0a28d034646ae526ba79d769cdba8d591)
tc/ld.config.txt.in
74857cccd2d7de08c74ec8a5b882cc00fefbf9f8 13-Oct-2017 Jiyong Park <jiyong@google.com> Remove *.dep files for ld.config.txt, [llndk|vndksp].libraries.txt

The dep files are not required because change in the command line
triggers the rule.

Test: m -j ld.config.txt llndk.libraries.txt vndksp.libraries.txt
Re-run the build after adding or removing libs to/from the vndk set.
The txt files are updated accordingly.

Merged-In: I9c9e22088cc2afeb66e8b159f611b25d698cf800
Change-Id: I9c9e22088cc2afeb66e8b159f611b25d698cf800
(cherry picked from commit 81088bf131bee8d7b10ac9a3d028b46b60953c08)
ndroid.mk
781c47f4da82062c5445d53064566673c70119ee 07-Dec-2017 Jiyong Park <jiyong@google.com> Reland "Prevent vendors from accessing private VNDK libs"

This reverts commit 875fe42a81696f44cc03eeaa538f370b44639bb7.

... and fixes a bug that private VNDK libs are not accessible even to
RenderScript framework libraries (such as libRS_internal.so). This is
fixed by exceptionally allowing the private libs only to 'rs'
namespace.

Bug: 70260989
Bug: 70279973
Bug: 63878960
Test: Build for walleye and tested Photos edit.
Test: other renderscript app (camerascript) works as well
Change-Id: I3978cbe2e869f6a1c214c755ded038349bde7b6b
ndroid.mk
tc/ld.config.txt.in
875fe42a81696f44cc03eeaa538f370b44639bb7 06-Dec-2017 Yang Ni <yangni@google.com> Revert "Prevent vendors from accessing private VNDK libs"

Bug: 70260989
Bug: 70279973

This reverts commit 6b369bee69fda98e52c580d95e94fe820a44189c.

Test: Build for Walley and tested Photos edit.
ndroid.mk
tc/ld.config.txt.in
ff1ef9f2b10d98131ea8945c642dd8388d9b0250 06-Dec-2017 Elliott Hughes <enh@google.com> Add a /bin symlink for convenience.

We already have /etc and /sbin. As the Android world moves towards / being
on the system partition, the circumstances under which a /bin symlink
won't work are reduced. This should already be usable most of the time.

Bug: http://b/63142920
Test: `adb shell /bin/date`
Change-Id: I81c2209ae808ced186d05fbe1d5417ce8dd93ea7
ndroid.mk
nit.rc
778447ad7d1f72eb3351a94c76abc6a141dd9579 06-Dec-2017 Alin Jerpelea <alin.jerpelea@sonymobile.com> Merge "add odm partition to ld.config.legacy" am: cc06663c04 am: 6ba4207461
am: 61860a37aa

Change-Id: I06c52549ab1b316f6bb1854d9b2a71fbdbbabe36
6ba4207461b6a5d6570438c8448ad009e4185143 06-Dec-2017 Alin Jerpelea <alin.jerpelea@sonymobile.com> Merge "add odm partition to ld.config.legacy"
am: cc06663c04

Change-Id: I4251acfd4d37b09041aedfdbf926da0d2e64ff67
0f288d8630493a6efbfd05b460a876ba6f0b6462 05-Dec-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Prevent vendors from accessing private VNDK libs"
fa7958e1fb389383e62bfffbcc403da5c5a2550e 27-Sep-2017 Alin Jerpelea <alin.jerpelea@sonymobile.com> add odm partition to ld.config.legacy

change is needed to be able to load libraries from /odm partition

/odm partition should have the lowest priority so that it can not override
the libraries from /vendor or /system partitions

Test: libraries are loaded ok.
Change-Id: Ifdfc22a3406ae3ad1fde53618d4120fd0498f615
Signed-off-by: Alin Jerpelea <alin.jerpelea@sony.com>
tc/ld.config.legacy.txt
tc/ld.config.txt
8890f7431e83a7dd4458debb83f98cb79148c1da 29-Nov-2017 Steven Moreland <smoreland@google.com> Merge "ld.config.txt.in typo: absolution -> absolute" am: 34778d24ae am: 6cf3cd2288
am: be997bf245

Change-Id: If1e3b4f780fcf7a2a35626129b2e7e4841947201
6cf3cd2288b76f3f3a84052fb8bc03be0822c641 29-Nov-2017 Steven Moreland <smoreland@google.com> Merge "ld.config.txt.in typo: absolution -> absolute"
am: 34778d24ae

Change-Id: Ib541b7b0f3e5162845f49673e65cac5ab1fc909d
ab338c10e664d3ac9d762796a3131e941a41b46d 28-Nov-2017 Steven Moreland <smoreland@google.com> ld.config.txt.in typo: absolution -> absolute

Test: none
Change-Id: I247722c0881fa733226eec6578f17b1a481d1e91
tc/ld.config.txt.in
6b369bee69fda98e52c580d95e94fe820a44189c 17-Nov-2017 Jiyong Park <jiyong@google.com> Prevent vendors from accessing private VNDK libs

Private VNDK libs are VNDK libs that are only accessible from other VNDK
libs but are inaccessible from vendor libraries. The private VNDK libs
are marked as vendor_available: false.

To enforce this at runtime, the private VNDK libs are excluded from the
list of lib names that links the namespaces.

Also, linker namespaces for vendor processes are modified so that the
VNDK-core and VNDK-SP libs are now loaded in the 'system' namespace and
not in the 'default' namespace.

Bug: 63878960
Test: wahoo devices boot, log does not show any new dlopen error.

Change-Id: Ibfc4f31a97aa6edd7f05cd6177daeb52c165bfeb
ndroid.mk
tc/ld.config.txt.in
e04e4e7dfe8bfb50f9320bacb43af5756c54340c 22-Aug-2017 Jiyong Park <jiyong@google.com> add llndk|vndksp.libraries.txt to vndk_package

List of llndk and vndk-sp libraries are written in the txt file so that
they can be available at run-time. The information is used by
libnativeloader to configure the classloader-namespace specially for
vendor apks.

Bug: 64882323
Test: build 2017 pixel devices. check that the two files exist on
/system/etc.

Merged-In: Ifbe339a5862f6ef57a8213a14a022765ccf77283
Change-Id: Ifbe339a5862f6ef57a8213a14a022765ccf77283
(cherry picked from commit 26335f89b1b25fd386adbc89edfcc600191b9e07)
ndroid.mk
39b9f7cc18cc895ecc5a04e783d732fcfa6833ab 27-Nov-2017 Vishnu Nair <vishnun@google.com> Merge "Create location to store surface and window trace files on init" am: 3dfba33d67 am: 4d736b5fa5
am: e6c35c8608

Change-Id: I02663a6cb3fd019d104807ac375ed7092e3fddab
4d736b5fa525391b8ffa0f198b6ff62a63cc6a20 27-Nov-2017 Vishnu Nair <vishnun@google.com> Merge "Create location to store surface and window trace files on init"
am: 3dfba33d67

Change-Id: Ibcd26a9644e954d4e9fa5be1d538e45c44fcd1b9
3dfba33d67a54c5a894510372d20f2a13a7e687b 27-Nov-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Create location to store surface and window trace files on init"
d09ab7a217eb13d09eddd031b46c6418b881ab6c 27-Nov-2017 Vishnu Nair <vishnun@google.com> Create location to store surface and window trace files on init

Bug: 64831661
Test: adb shell su root rm /data/misc/wmtrace && adb reboot && adb shell su ls /data/misc/wmtrace
Change-Id: I60979c26a9226534df534abd3d59df309f6ea6ad
nit.rc
f8b9d77b81dd3bdb29d1dacc36c8431b1b16a7f4 22-Nov-2017 Tom Cherry <tomcherry@google.com> Merge "Move mkdir /data/nfc/... to rootdir init.rc" am: fa65396ca2 am: 4b3bcf2a10
am: 77ad3f58ae

Change-Id: Ic2ba51690b3dd5b64ea76ec83cb6007b7894810f
4b3bcf2a108de290ca68831c4640339c1fd9ca74 22-Nov-2017 Tom Cherry <tomcherry@google.com> Merge "Move mkdir /data/nfc/... to rootdir init.rc"
am: fa65396ca2

Change-Id: I623f24df9b42500f347ae427f4ffd94395abaa56
fa65396ca278a0ecc21b14b9fb7603f219004ba2 22-Nov-2017 Tom Cherry <tomcherry@google.com> Merge "Move mkdir /data/nfc/... to rootdir init.rc"
df482d03add1a83a7b38823adc13500efea7ac45 22-Nov-2017 Chen Xu <fionaxu@google.com> Merge "a new folder to store OTA carrier id update"
am: 76adcdf688

Change-Id: I052a0810830b2a81a8a992d66e8e59cda343b347
06b8e2e1309a921fce687437a3b130c26c729ccd 21-Nov-2017 fionaxu <fionaxu@google.com> a new folder to store OTA carrier id update

Bug:64131637
Test: Build
Change-Id: I0ce4322f297bab427d70aed3c329345c899786bb
(cherry picked from commit 45713ff62159c90e1627af0eb970641ad33dade2)
nit.rc
45713ff62159c90e1627af0eb970641ad33dade2 21-Nov-2017 fionaxu <fionaxu@google.com> a new folder to store OTA carrier id update

Bug:64131637
Test: Build
Change-Id: I0ce4322f297bab427d70aed3c329345c899786bb
nit.rc
c319310f9b63065ec3e1b5f54fb89ddfdc975971 21-Nov-2017 Tom Cherry <tomcherry@google.com> Move mkdir /data/nfc/... to rootdir init.rc

These are directories used by the system so they should be created by
the system.

Test: treehugger
Change-Id: I2a721ef7871c8842fa912497f5ec6988fcec9e58
nit.rc
23e27db576d06761363365494327baf062468a66 14-Nov-2017 Xin Li <delphij@google.com> Merge commit 'a63ccea6abc7ea02e2d98e41c80793ca97237bd3' from
oc-mr1-dev-plus-aosp into stage-aosp-master

Change-Id: Ia33311cd1fd26dfaea59a69317b306fb91203c40
Merged-In: I03d06b10807e8a313c9654c2e1db36bfb59e3f99
2eaa098bfeacd40c8ca0d211dd5ece2e4c2ae5f3 13-Nov-2017 Steven Moreland <smoreland@google.com> Merge "PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt" am: c437e14c17 am: 5bd7b32c15
am: 2c531b007e

Change-Id: Iee1ac7081e7954099e9ee77c07480e8db30adb67
2c531b007edab780ac59a5bb28b5d2e9e854d7fa 13-Nov-2017 Steven Moreland <smoreland@google.com> Merge "PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt" am: c437e14c17
am: 5bd7b32c15

Change-Id: I0958fea7b320025bb329defe2d26a922e7f236bb
c437e14c179c2df426fb711a704d7d39bf8f1b19 13-Nov-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt"
aae9ad533cff8f6bad110bad2a7286e1f452bbdf 10-Nov-2017 Yifan Hong <elsk@google.com> healthd is class hal

because it serves health 2.0 HAL. This forces it to restart when
hwservicemanager dies.

Bug: 69069765
Test: kill hwservicemanager, lshal shows backup instance

Change-Id: Ib51caa0e718031a0f8797d8af4c2459b4958a62e
nit.rc
41dee1e2be6f177b9b7d767b7e511d1e85ece4fa 10-Nov-2017 Tianjie Xu <xunchang@google.com> Merge "Create a new directory on boot for update_engine logs" am: 78d882bb5f am: 5d86509d19
am: 2ca0bbfae3

Change-Id: Ibfb3c4054bb0f06446e5c959335ff2abdbe17370
2ca0bbfae30c59b139b06f4e25564ad98c0ede05 10-Nov-2017 Tianjie Xu <xunchang@google.com> Merge "Create a new directory on boot for update_engine logs" am: 78d882bb5f
am: 5d86509d19

Change-Id: I01611463c081fafd60fc315a4a91418a4ddef22a
4e641e3b6a00d62b4e2f67c6c50757389ad11c90 09-Nov-2017 Steven Moreland <smoreland@google.com> PRODUCT_TREBLE_LINKER_NAMESPACES for ld.config.txt

PRODUCT_FULL_TREBLE is being deprecated in favor
of smaller flags. Use the appropriate one instead.

Bug: 62019611
Test: manual
Change-Id: Id5d127c29f908cd3011031b3b698ddec3dcba9c1
ndroid.mk
74fa3cab4eb564678d3cdeefdd18da2504948b74 03-Nov-2017 Tianjie Xu <xunchang@google.com> Create a new directory on boot for update_engine logs

Partners require to access update_engine's logs on the file system with
non-root permission.

Bug: 65568605
Test: directory created with the correct permission on boot
Change-Id: I1c1fb4acb8b0f2e7352ffa9e7d05a864940b5986
nit.rc
a2935e0c8b4c3ca1244c1c92bb87200b31b013f2 28-Sep-2017 Jiyong Park <jiyong@google.com> Tests are run with proper namespace configs by their locations

Tests in /data/[nativetest|benchmarktest] run with namespace config for
system and tests in /data/[nativetest|benchmarktest]/vendor run with
namespace config for vendor.

They no longer run in the 'test' namespace config which didn't impose
any restriction for libraries.

Bug: 67028906
Test: sailfish/marlin builds and boots
Test: no VTS regression on system.img from GSI + vendor.img from
marlin/sailfish
Test: VtsKernelLibcutilsTest successful in above config

Merged-In: I28cdef960d087565c8a22dca0e9a154fb1c3bb94
Change-Id: I28cdef960d087565c8a22dca0e9a154fb1c3bb94
(cherry picked from commit 326b783ad92048432c4a8a70a35c8342b35128b0)
tc/ld.config.txt
6ed1a1c339e33a5d83096262b07e909cc365b629 25-Sep-2017 Jiyong Park <jiyong@google.com> Fix: make vndk namespace visible for 2016 Pixes

The nativeloader tries to find the 'vndk' namespace when there is a
vendor apk in the classloader paths. This can happen even for a
downloaded app if the app is using a vendor apk via <uses-library> tag.

In order to prevent the nativeloader from failing to find the vndk
namespace, the namespace is marked as visible.

Bug: 66482442
Test: download the app mentioned in the bug, it does not crash.
Merged-In: I82e2394eb6eedcb8645e1a5b3735bbfe2735b312
Change-Id: I82e2394eb6eedcb8645e1a5b3735bbfe2735b312
(cherry picked from commit 1cc09e749f196774a4e6fa4afedfd4eda623ee67)
tc/ld.config.txt
7f654c3243ddf4859ce17e36ce7fe389a3c9a337 23-May-2017 Jiyong Park <jiyong@google.com> vndk: remove vendor/lib from the search path of the 'vndk' namespace

'vndk' namespace is the place for VNDK-SP libs. So /vendor/lib must be
removed from its search paths. It was there just because libhardware
(which is VNDK-SP) is loading HAL libs in vendor partition from there.
However this problem has been solved by modifying the libhardware so
that HAL libs are loaded from the 'sphal' namespace and not from the
current (the 'vndk') namespace.

Bug: 37731053
Test: sailfish builds and boots
Merged-In: Ia88934a975aa8811e05b5ba408e42d132f20f4e9
Change-Id: Ia88934a975aa8811e05b5ba408e42d132f20f4e9
(cherry picked from commit f01b52895dfb44c3a7e98a870ab415672aee0960)
tc/ld.config.txt
e58fa1b0c617f53a0697a158139f57e9f2a70d8a 31-Aug-2017 Jiyong Park <jiyong@google.com> libz is back to LLNDK

For 2016 pixel devices, where VNDK is not fully enforced, move libz back
to LLNDK so that we can pass the CTS without requiring the default
namespace to be isolated.

If we have libz in vndk-sp directory, test_linker_namespaces fails
because /system/lib/vndk-sp/libz.so becomes accessible. In order to make
the lib inaccessible, we have to make the default namespace isolated,
but this can't be done for 2016 pixel devices where VNDK is not fully
enforced. So, we choose to remove /system/lib/vndk-sp/libz.so and keep
the single copy at /system/lib.

Bug: 65018779
Test: android.jni.cts.JniStaticTest#test_linker_namespaces successful on
2016 pixel devices

Merged-In: Ib6b6560b02be69d2015c0afb86acf07c02b30c2f
Change-Id: Ib6b6560b02be69d2015c0afb86acf07c02b30c2f
(cherry picked from commit 697eb2da0db5eaaa8b518e6da3b7b6377312825e)
tc/ld.config.txt
7075bca364718a3d060bd373c3d1b20db2e89bfc 16-Aug-2017 Jiyong Park <jiyong@google.com> Make the rs namespace visible

This allows us to dlopen libRS_internal.so directly from the rs
namespace, not from the sphal namespace.

Bug: 64747884
Test: VtsHalRenderscriptV1_0TargetTest successful on the device built
with BOARD_VNDK_VERSION=current and [system] namespace config is applied
to /data/nativetest[64]/* processes.

Merged-In: I0b441791e395798e80a84592ca01e771bb1c201a
Change-Id: I0b441791e395798e80a84592ca01e771bb1c201a
(cherry picked from commit 421a5e46b780cab394e4bc18745b8555ba26afa5)
tc/ld.config.txt
136eb058923bc5b4fc4434751797bb70783da539 13-Aug-2017 Justin Yun <justinyun@google.com> Add libft2.so to ll-ndk for rs namespace

libft2.so is changed to ll-ndk that is available only for rs
namespace.

Bug: 64425518
Test: build and boot with BOARD_VNDK_VERSION=current
Merged-In: I991dc774ca9b92fb6e95a7656243a6a4ecdc0ab9
Change-Id: I991dc774ca9b92fb6e95a7656243a6a4ecdc0ab9
(cherry picked from commit 513f76394a767192965888ed495305102b318dab)
tc/ld.config.txt
8ebf6ee6f6c18aca03f4ac4b33a65194562dc0d4 10-Aug-2017 Justin Yun <justinyun@google.com> Move libz vndk-sp from ll-ndk

The ABI of libz is not as stable as it is for ll-ndk.

Bug: 37617391
Test: build and boot
Merged-In: I883bc6fda268e98cc7cdd5888264170c58688794
Change-Id: I883bc6fda268e98cc7cdd5888264170c58688794
(cherry picked from commit dadd3a846fae03b1d4416fcb8f2499b8296d9e83)
tc/ld.config.txt
e7be481a7b459f7b14832bb852284ea73d566268 28-Oct-2017 Josh Gao <jmgao@google.com> Merge "Delete obsolete debuggerd references." am: 1193f3bff6 am: 2bf84f9cdd
am: bfdff800a5

Change-Id: I8f98856436285659ba41276242c799453255eed8
bfdff800a56521ba3444402ccfaa411c666ddc9d 28-Oct-2017 Josh Gao <jmgao@google.com> Merge "Delete obsolete debuggerd references." am: 1193f3bff6
am: 2bf84f9cdd

Change-Id: I08060b18ac0c767bf07ad16a04f9e7ec24993113
18ea0978cf6be4cfcec473789d19cb70ded10b6a 28-Oct-2017 Josh Gao <jmgao@google.com> Delete obsolete debuggerd references.

Test: treehugger
Change-Id: Ic1a8cfb867decd76443fdc26333f2bcaa98b61bb
ndroid.mk
49bb5794c815ff58ab013dceb8222d7b8805108b 26-Oct-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Permitted and search path change"
446ab4a3781e3f003c9ef758886de965a9b0ee9b 25-Oct-2017 Elliott Hughes <enh@google.com> Merge "Remove Foreground Boost CPUSet" am: 77451492bc am: 17c8a89a08
am: 4921f97fe3

Change-Id: I8f5d7f438c41969a623d0468bb96150824feded7
4921f97fe323d665d50197f651dceeb61ab41b14 25-Oct-2017 Elliott Hughes <enh@google.com> Merge "Remove Foreground Boost CPUSet" am: 77451492bc
am: 17c8a89a08

Change-Id: I08f25d4a799fdb7f3c5b415675dd3c50fa65fe93
77451492bc3667e6b201f222adffffdc553ebe76 25-Oct-2017 Elliott Hughes <enh@google.com> Merge "Remove Foreground Boost CPUSet"
60bc597183e75446f2719dc86a50be31fdee47bc 24-Oct-2017 Jake Weinstein <jake@aospa.co> Remove Foreground Boost CPUSet

This functionality was removed at
https://android.googlesource.com/platform/frameworks/base/+/a712d4058f6f85268838
nit.rc
a909e5e2a1e5342a45d73588544fe78656e22a68 23-Oct-2017 Jae Shin <jaeshin@google.com> Merge changes from topic "rs_vndk_step2"
am: 678efa25a6

Change-Id: Idcab36c112406e3dc1fe4eb9cfd5c345cafc0290
324f3ed393ad0cf0f121c4be90fccdbbb3d023fd 23-Oct-2017 Jiyong Park <jiyong@google.com> templatize ld.config.txt
am: ecc703c792

Change-Id: Ic9dc2f35a4a9a2c2a56cb24a9ac02e9373ed78df
6683a8735bf7acf6cf8d66fb0aa4657c2d2fb79a 23-Oct-2017 Jiyong Park <jiyong@google.com> Make default namespace for system processes isolated
am: 246338f90e

Change-Id: I2f2d2799ab57031a3c3b24830c0e10376e035acd
e96c957e571be949bd6eeac1e1fc5265feb05e8c 23-Oct-2017 Justin Yun <justinyun@google.com> vndk: add vendor/lib(64)/vndk for vendor namespace
am: b5ddc5ae6b

Change-Id: I1e22e9a994932e3e93cbbafb8d5defd5efd69b7c
c82e43034be74c295b0439b6aa2b0df9eee529ce 23-Oct-2017 Justin Yun <justinyun@google.com> Implement system namespace for vendor process
am: 333845c710

Change-Id: I0fda3fe689832b0b5cc13a381dacdd633886e27a
6d9f5e401244591f8c0fe9eadda160e02c9d9630 23-Oct-2017 Jiyong Park <jiyong@google.com> Use the legacy linker namespace configs when target is sanitized
am: 614c5521a3

Change-Id: I80ff3cb047a9ad351590524a5602cdc0f9df3e61
b9d74495b1a8dc00127b7a89dbaa821a05dbe86a 23-Oct-2017 Jiyong Park <jiyong@google.com> Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace
am: b5c0fc3ceb

Change-Id: Ic74e02582c7c2f5b7e9900bf77026168a2947fd2
1cd1a2b81257a1afac6c0dfbdef8446ac418ca1f 23-Oct-2017 Justin Yun <justinyun@google.com> Add system/${LIB}/vndk to default namespace for vendor.
am: e373672afd

Change-Id: I4f4e47bb297ec604f79007260883112da5de67e1
257de3def5092797a9ab29551c94bcc57e07eaa0 31-Aug-2017 Jiyong Park <jiyong@google.com> fix: boot fails on ASAN builds with VNDK restriction

Fix the bug that caused boot failure on ASAN builds with VNDK
restriciton. The major cause is because incorrect (old) ld.config.txt
was used when the build is sanitized, which prevented the dynamic linker
to find some VNDK libs that only exist in /system/lib/vndk; the old
ld.config.txt does not have the directory in its search paths. So, this
CL fixes the problem by having the same ld.config.txt for both sanitized
and non-sanitizied builds.

Furthermore, ld.config.txt is modified so that dependency to
libclang_rt* libs are redirected to those in /system/lib directory. This
ensures that the sanitizer runtime libs are not dual loaded but are
provided for both platform and vendors.

Bug: 65217017
Test: SANITIZE_TARGET=integer_overflow SANITIZE_TARGET_DIAG=integer_overflow m
on 2017 pixel devices. The build is successful and the device boots to
the UI.

Merged-In: I0e21e20d9aca340b984968e07d4ce542ae10fd31
Change-Id: I0e21e20d9aca340b984968e07d4ce542ae10fd31
(cherry picked from commit faefa6bd3682a0e8f5de2184cca5960a82a00020)
ndroid.mk
tc/ld.config.txt.in
ecc703c792651c1406592eed9f730c8e97ebc3cf 04-Aug-2017 Jiyong Park <jiyong@google.com> templatize ld.config.txt

Lists of libraries in between the linker namespaces are no longer
hard-coded in ld.config.txt, but instead come from Soong.

Bug: 37139976
Test: build 2017 pixel device with BOARD_VNDK_VERSION=current m -j
Test: the device is bootable, basic functionalities (camera, camcorder,
wifi, bt, gps, etc.) work.
Merged-In: I8170e6c3f6ee04b16359791d64cc46bd2714a073
Change-Id: I8170e6c3f6ee04b16359791d64cc46bd2714a073

(cherry picked from commit 367984602abab743630d1fba8e4940f0a69e678b)
ndroid.mk
tc/ld.config.txt.in
tc/ld.config.vndk.txt
246338f90ef660e3078f4643f35df92f7c31bece 28-Aug-2017 Jiyong Park <jiyong@google.com> Make default namespace for system processes isolated

The default namespace for system process now becomes isolated, which
means it can load only the libs that are in search.paths and under
permitted.paths.

/system/framework, /system/app, /system/priv-app, /vendor/app, /data,
etc are added to the permitted paths since libart should be able to
dlopen odex files under the locations.

Following directories become unavailable:
/system/lib/vndk
/system/lib/vndk-sp

Bug: 37013858
Bug: 64888291
Bug: 64950640
Test: 2017 pixel devices builds and boots
Test: android.jni.cts.JniStaticTest#test_linker_namespaces passes
Merged-In: I2bbe9cc19940c3633c2fb901f9bf8ab813e38c13
Change-Id: I2bbe9cc19940c3633c2fb901f9bf8ab813e38c13
(cherry picked from commit 55f05d79f9e83757acb72d3d300262f5954a00af)
tc/ld.config.vndk.txt
b5ddc5ae6b16cb58e4cb49c923ae7cdcec4f9ab6 24-Aug-2017 Justin Yun <justinyun@google.com> vndk: add vendor/lib(64)/vndk for vendor namespace

When the vndk is extended by vendor, the libs in vendor/lib(64)/vndk
will override system/lib(64)/vndk libs. Vendor binaries will search
vndk libs in vendor/lib(64)/vndk prior to system/lib(64)/vndk.

Also, remove a workaround for libsdm-color.so

Bug: 65032513
Test: build and boot check for libsdm-color.so will be loaded on boot
Test: currently no libs exist on vendor/lib(64)/vndk. No test for it
Merged-In: I99ed37eb1a9e92c83533e2d92c9c06db11f01e97
Change-Id: I99ed37eb1a9e92c83533e2d92c9c06db11f01e97
(cherry picked from commit 3094de968443c60345f63318f14a5d919df762d5)
tc/ld.config.vndk.txt
333845c710822e16fc8a6d7d32f931416beb8dbb 16-Jun-2017 Justin Yun <justinyun@google.com> Implement system namespace for vendor process

For vendor process default namespace searches as following order:
1. /vendor/lib/(hw|egl), /vendor/lib: Vendor libs + VNDK-vnd-ext
2. /system/lib/vndk-$(ver): VNDK libs
3. /vendor/lib/vndk-sp-$(ver): VNDK-SP-vnd-ext
4. /system/lib/vndk-sp-$(ver): VNDK-SP
and searches system namespace (/system/lib) only for LL-NDK libs.
This configuarion is used only with BOARD_VNDK_VERSION is defined.

Bug: 37192038
Test: build with 'BOARD_VNDK_VERSION=current' and boot

Merged-In: If9778b9266a084846ba8fe73e6bff25828359d33
Change-Id: If9778b9266a084846ba8fe73e6bff25828359d33
(cherry picked from commit 24c29f1be49f47a6d8a098a10591d9c3f0d4e8ee)
ndroid.mk
tc/ld.config.vndk.txt
614c5521a370978f4431abcc13f666c3f46992b2 11-Jul-2017 Jiyong Park <jiyong@google.com> Use the legacy linker namespace configs when target is sanitized

The new linker namespace config causes problem when the target is
sanitized: vendor libs which are loaded in the sphal namespace can't
link against to libclang_rt* libs which are in /system/lib directory
because the directory is not allowed for sphal namsapce.

Long-term solution would be installing libclang_rt* to both /system/lib
and /vendor/lib so that vendor libs can link against to the one in
/vendor/lib.

Until the work is done, let's just disable the new linker namespace
config when the target is to be sanitized.

Bug: 63535130
Test: make SANITIZE_TARGET=integer_overflow
SANITIZE_TARGET_DIAG=integer_overflow builds and boots to the UI

Merged-In: I6afb69885aaa3d25e554b9ca699a572248bfc50a
Change-Id: I6afb69885aaa3d25e554b9ca699a572248bfc50a
(cherry picked from commit fff6f75fc1de2963254271d7d254e53ae187cada)
ndroid.mk
b5c0fc3ceb027247c4e488e695d6eaac196355c8 04-Aug-2017 Jiyong Park <jiyong@google.com> Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace

android.hidl.memory@1.0-impl.so is a SP-HAL located in
/system/lib/vndk-sp/hw. This can't be moved to /vendor/lib since it is a
framework HAL.

Bug: 62930720
Test: 2017 pixel builds and boots with BOARD_VNDK_VERSION on
Merged-In: I9c456983ef68120c5e8c629efc6dd66a26220ecb
Change-Id: I9c456983ef68120c5e8c629efc6dd66a26220ecb
(cherry picked from commit 7d4cf3fd3364a86c895371337a849ab40c99b232)
tc/ld.config.txt
e373672afd23f9cdbed9481816a9f95dc4ff0491 25-Jul-2017 Justin Yun <justinyun@google.com> Add system/${LIB}/vndk to default namespace for vendor.

With BOARD_VNDK_VERSION=current, vndk libs will be installed in
system/${LIB}/vndk. To make them available for vendor, it must be
added to default namespace.

Bug: 63866913
Test: build and boot with BOARD_VNDK_VERSION=current
Merged-In: I9e467a6125fc89513754b56a2420975559144f98
Change-Id: I9e467a6125fc89513754b56a2420975559144f98
(cherry picked from commit 90a2487776d464e867c7bad1dc8d993ed50df09e)
tc/ld.config.txt
c8ae86afdd150059e1ec0650886da60b19f79f8b 20-Jul-2017 Jiyong Park <jiyong@google.com> Add [test] section for /data/[nativetest|benchmarktest]

We have both system and vendor tests in the same directory
/data/nativetest. Since we can't distinguish system and vendor tests at
runtime, we choose to run all of them with the legacy namespace
configuration where /system/lib and /vendor/lib are both accessible
without any restriction. Furthermore, /system/lib/vndk-sp is added to
the list of accessible directories for tests since some libs (such as
libion.so) exist only in the directory but not in /system/lib.

This will change in the future when we install system and vendor tests
into different directories (vendor tests goes into ./vendor subdir).
Then, we will run the tests with [system] or [vendor] configurations
depending on their paths.

Bug: 63597267
Test: run bionic-unit-tests
Test: run linker-unit-tests
Merged-In: I810003b2da0b30335200c130f484ea7b041f9f80
Change-Id: I810003b2da0b30335200c130f484ea7b041f9f80
(cherry picked from commit c034a43d44d87a6bb85bbdec9876b41b46ab5625)
tc/ld.config.txt
433fe3a8a2acc9cb76cec84d114dd6fbc0693791 14-Jul-2017 Jiyong Park <jiyong@google.com> /data/nativetest[64] processes are running with the new ns config

Native tests under /data/nativetest[64] directory is now running with
the same linker namespace configuration as /system/bin/* processes.

This allows us to stop mimicing the linker namespace configuration of the
/system/bin/* processes using LD_LIBRARY_PATH.

Bug: 63597267
Test: run bionic-unit-tests
Test: run linker-unit-tests
Merged-In: If8e2ed0b8016e4e07bf6829735b8e02f952042d0
Change-Id: If8e2ed0b8016e4e07bf6829735b8e02f952042d0
(cherry picked from commit 9d1e50b809c091c01d92b9f7039ec83d94f3f05a)
tc/ld.config.txt
81088bf131bee8d7b10ac9a3d028b46b60953c08 13-Oct-2017 Jiyong Park <jiyong@google.com> Remove *.dep files for ld.config.txt, [llndk|vndksp].libraries.txt

The dep files are not required because change in the command line
triggers the rule.

Test: m -j ld.config.txt llndk.libraries.txt vndksp.libraries.txt
Re-run the build after adding or removing libs to/from the vndk set.
The txt files are updated accordingly.

Change-Id: I9c9e22088cc2afeb66e8b159f611b25d698cf800
ndroid.mk
31da436566a2d28ce1b598fbc39cf13467a232a5 11-Oct-2017 Dmitry Shmidt <dimitrysh@google.com> Merge "console: Add setenv HOSTNAME console" am: d2c66b31a0 am: 5884f608d9 am: 825915bfde
am: 455faa53ed

Change-Id: I4454a732810ef6f6d70b1f7d91455c8fb45b145f
455faa53ed578234672d9e705ec32d86d23f2af6 11-Oct-2017 Dmitry Shmidt <dimitrysh@google.com> Merge "console: Add setenv HOSTNAME console" am: d2c66b31a0 am: 5884f608d9
am: 825915bfde

Change-Id: Ia845dfb8cba654766dfff15f2eab7dbee621a45d
5884f608d96cc760d7ea749672bbe682bf0ebc50 11-Oct-2017 Dmitry Shmidt <dimitrysh@google.com> Merge "console: Add setenv HOSTNAME console"
am: d2c66b31a0

Change-Id: I85addec989872b9e66f0e68c4fea20b969a1eb25
d0fb2510e2d4d6f57afb4e1222378c099674852a 11-Oct-2017 Dmitry Shmidt <dimitrysh@google.com> console: Add setenv HOSTNAME console

Bug: 67678999
Test: Run serial console on Hikey

Change-Id: Ia5fa9c2af4771508d96545f6a8814a81d5ccee3c
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
nit.rc
85c773f0a28d034646ae526ba79d769cdba8d591 10-Oct-2017 Sundong Ahn <sundongahn@google.com> Permitted and search path change

The permitted and search paths should be changed according to VNDK version.
However these paths are fixed with vndk and vndk-sp. So I define the
directory name as below
- /system/${LIB}/vndk${VNDK_VERSION}
- /system/${LIB}/vndk-sp${VNDK_VERSION}
${VNDK_VERSION} will be set by the property "ro.vndk.version".

Bug: 66074376
Test: build & run
Change-Id: I7b8e12327af89d131c4c49cb9b459a393c7dacb8
tc/ld.config.txt.in
593b43910b418eff7a2e63b631ee8d7fdebf2985 04-Oct-2017 Marco Nelissen <marcone@google.com> Fix media on W/T

W/T enforce restrictions on linker paths, which M/S do not.
Because of this, media.extractor was unable to load its extractors on W/T.

Bug: 67405932
Test: play sounds successfully
Change-Id: I8914da74780c909da815beaffcd4d76fbe2cc6b5
tc/ld.config.txt.in
773ebbdfe37a822e044401b1c5d32812187b3db0 30-Sep-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "resolve merge conflicts of 73d9596bc to oc-mr1-dev-plus-aosp" into oc-mr1-dev-plus-aosp
dfe8bb87dfe70bbb2699e3e683e2193d21fd3135 30-Sep-2017 Keun Soo Yim <yim@google.com> Merge "Tests are run with proper namespace configs by their locations" into oc-mr1-dev am: aedc1c9ab0
am: 202c5af4be

Change-Id: I5e794726de781c2faf72c89c442c115862009417
202c5af4be8f804ee68bdca82e760473b211b25c 30-Sep-2017 Keun Soo Yim <yim@google.com> Merge "Tests are run with proper namespace configs by their locations" into oc-mr1-dev
am: aedc1c9ab0

Change-Id: I121703da98b8c66f24bbf0efced1c592c2fc113e
aedc1c9ab06de16eae2e96941193086f2cebac25 30-Sep-2017 Keun Soo Yim <yim@google.com> Merge "Tests are run with proper namespace configs by their locations" into oc-mr1-dev
62398781f5a4ce32906cdbfc1ad8c34357e19eac 30-Sep-2017 Bowgo Tsai <bowgotsai@google.com> resolve merge conflicts of 73d9596bc to oc-mr1-dev-plus-aosp

Change-Id: I8272038fe905a88273ce9aa690af0ee0005a6b67
cf3c29837607bba0c332064170700c46897c643e 29-Sep-2017 Jiyong Park <jiyong@google.com> Merge "Fix: make vndk namespace visible for 2016 Pixes" into oc-mr1-dev am: 2f00c80c2b
am: f196067a8f

Change-Id: Ic9c2a52d2c07174716e2e33b2e52f8169809e94b
f196067a8f2eb6d6efb02d1c05d698d7065e3b9e 29-Sep-2017 Jiyong Park <jiyong@google.com> Merge "Fix: make vndk namespace visible for 2016 Pixes" into oc-mr1-dev
am: 2f00c80c2b

Change-Id: I7659a648f88559ddf65c879e695c1766b3854686
2f00c80c2b5fcd5ea5cdb752269ae107ab1d424c 29-Sep-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Fix: make vndk namespace visible for 2016 Pixes" into oc-mr1-dev
afc8dda11187599584c6d97de13dc17f796a7935 29-Sep-2017 Jiyong Park <jiyong@google.com> Merge "Remove workaround for VNDK violations" into oc-mr1-dev am: 152687b26e
am: f631a98a31

Change-Id: Ic9c4597df4d26675524ce6ebb626d60e1eb9a014
f631a98a31da2bba0af62b7d997a1e510e27f031 29-Sep-2017 Jiyong Park <jiyong@google.com> Merge "Remove workaround for VNDK violations" into oc-mr1-dev
am: 152687b26e

Change-Id: I40798ad3c2a394d3210a3c218fd52ea38fc8cbff
d29ac08509092f3ef98ffe7455d16a50a9f1b858 29-Sep-2017 Bowgo Tsai <bowgotsai@google.com> Merge "Removing $(PRODUCT_OUT)/root/root"
am: 8cbbacdc15

Change-Id: Ia671976f8d7d4b83478c58d566e309f36af125ab
326b783ad92048432c4a8a70a35c8342b35128b0 28-Sep-2017 Jiyong Park <jiyong@google.com> Tests are run with proper namespace configs by their locations

Tests in /data/[nativetest|benchmarktest] run with namespace config for
system and tests in /data/[nativetest|benchmarktest]/vendor run with
namespace config for vendor.

They no longer run in the 'test' namespace config which didn't impose
any restriction for libraries.

Bug: 67028906
Test: sailfish/marlin builds and boots
Test: no VTS regression on system.img from GSI + vendor.img from
marlin/sailfish
Test: VtsKernelLibcutilsTest successful in above config

Change-Id: I28cdef960d087565c8a22dca0e9a154fb1c3bb94
tc/ld.config.txt
144893e5ec6cd8d6a0ff11d8adc5440e6f86635a 12-Sep-2017 Bowgo Tsai <bowgotsai@google.com> Removing $(PRODUCT_OUT)/root/root

Bug: 65570851
Test: boot sailfish
Change-Id: I80c3c3de23c57343187fde207980731b5341bc1f
Merged-In: I80c3c3de23c57343187fde207980731b5341bc1f
(cherry picked from commit ededee3e400d4caa50c04c2e0ec5d92a56e39425)
ndroid.mk
f8025aae822fa45091807611a70bdfc2157f0d47 25-Sep-2017 Jiyong Park <jiyong@google.com> Remove workaround for VNDK violations

lib-dplmedia.so and qseeproxydaemon no longer depend on non-VNDK
libraries. Remove the workaround.

Bug: 64427765
Bug: 64820887
Test: 2017 pixel devices boots
Change-Id: Ib8bcbbb16169dc5c997d6c0dad061c66dcd0ccfe
tc/ld.config.txt.in
1cc09e749f196774a4e6fa4afedfd4eda623ee67 25-Sep-2017 Jiyong Park <jiyong@google.com> Fix: make vndk namespace visible for 2016 Pixes

The nativeloader tries to find the 'vndk' namespace when there is a
vendor apk in the classloader paths. This can happen even for a
downloaded app if the app is using a vendor apk via <uses-library> tag.

In order to prevent the nativeloader from failing to find the vndk
namespace, the namespace is marked as visible.

Bug: 66482442
Test: download the app mentioned in the bug, it does not crash.
Change-Id: I82e2394eb6eedcb8645e1a5b3735bbfe2735b312
tc/ld.config.txt
ededee3e400d4caa50c04c2e0ec5d92a56e39425 12-Sep-2017 Bowgo Tsai <bowgotsai@google.com> Removing $(PRODUCT_OUT)/root/root

Bug: 65570851
Test: boot sailfish
Change-Id: I80c3c3de23c57343187fde207980731b5341bc1f
ndroid.mk
25a03a23a82ba11ecb30daa4ab8e9277473cc1db 14-Sep-2017 Jiyong Park <jiyong@google.com> Merge changes from topic "vndk_jni" into oc-mr1-dev
am: 6f7d928940

Change-Id: I69af1cdf06bf71f1125644c7064b40444613eaa7
6eaa30765e0256e88839f73acec1114e530213c7 14-Sep-2017 Jiyong Park <jiyong@google.com> add llndk|vndksp.libraries.txt to vndk_package
am: 26335f89b1

Change-Id: Idc8d3ff696c782963337fa21ead8a7665c0a1e98
6f7d928940381d1d7489762411cf7dec489642c5 14-Sep-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge changes from topic "vndk_jni" into oc-mr1-dev

* changes:
vendor apk is unbundled
add llndk|vndksp.libraries.txt to vndk_package
299591e4640285d3edf2a878b506825ed7cede4d 08-Sep-2017 Jiyong Park <jiyong@google.com> Merge "fix: boot fails on ASAN builds with VNDK restriction" into oc-mr1-dev
am: 80206d8f03

Change-Id: I051d1683e95171bc1e3e3d16007c5d25ea923bc2
80206d8f0354ad1f4f76be01650ac209f6405175 08-Sep-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "fix: boot fails on ASAN builds with VNDK restriction" into oc-mr1-dev
a07f3057d00a1da240099aa77d55aaf83362c489 22-Aug-2017 Jiyong Park <jiyong@google.com> vendor apk is unbundled

For devices where VNDK restrictions are all enforced, vendor apks are
recognized as unbundled; since system partition and vendor partition can
be updated independently from each other.

However, since vendor apks are still bundled in the vendor partition,
they are allowed to do more than ordinaly unbundled apks that are
downloaded and installed to the data partition.

1) /vendor/lib is allowed. So the path is added to the search_paths and
permitted paths of the classloader namespace.
2) LLNDK libs are allowed in addition to the NDK libs. So, LLNDK lib list
from llndk.libraries.txt is added to the list from public.libraries.txt.
3) VNDK-SP libs are allowed. To do so, the classloader namespace is
linked to the 'vndk' namespace where VNDK-SP libs are searched and
loaded from. The list of available VNDK-SP libs is read from
vndksp.libraries.txt file.
4) Name of the namespace is changed to 'vendor-classloader-namespace'
since the namespace is configured differently from the ordinary
'classloader-namespace'.

Bug: 63553457
Test: 2017 pixel devices build and boots to the UI
Test: a vendor apk (e.g. TimeService.apk) works. Turn the airplain mode on.
Set time. Reboot the device. The time is not reset.
Test: 1) set target as 2017 pixel
2) m -j CtsVendorJniTestCases
3) copy the built apk into /vendor/app/CtsVendorJniTestCases
4) reboot / factory reset
5) adb shell am instrument -w android.jni.vendor.cts

Change-Id: I447452eb025c0a0fd076b5c9ac081d453dc6074e
tc/ld.config.txt.in
26335f89b1b25fd386adbc89edfcc600191b9e07 22-Aug-2017 Jiyong Park <jiyong@google.com> add llndk|vndksp.libraries.txt to vndk_package

List of llndk and vndk-sp libraries are written in the txt file so that
they can be available at run-time. The information is used by
libnativeloader to configure the classloader-namespace specially for
vendor apks.

Bug: 64882323
Test: build 2017 pixel devices. check that the two files exist on
/system/etc.

Change-Id: Ifbe339a5862f6ef57a8213a14a022765ccf77283
ndroid.mk
533062b8d66ec9e7ad501fa3328fa8ddb267597a 01-Sep-2017 Jiyong Park <jiyong@google.com> Merge "templatize ld.config.txt" into oc-mr1-dev
am: 2d3cf6799e

Change-Id: I570d4d52b630c3de0e82ec67638c6c37c48d1074
2d3cf6799e3402e401d7f36075bbc2cbe67cb0cb 01-Sep-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "templatize ld.config.txt" into oc-mr1-dev
8e14484166aef8e3640107ac1e13c53673ee3a93 01-Sep-2017 Jiyong Park <jiyong@google.com> Merge "libz is back to LLNDK" into oc-mr1-dev
am: d9d20baf6f

Change-Id: Id2649fcd9c66003a5e84d75d91a34604b5f5d7e0
d9d20baf6f188d47f509e3ad3850fe526d750aec 01-Sep-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "libz is back to LLNDK" into oc-mr1-dev
faefa6bd3682a0e8f5de2184cca5960a82a00020 31-Aug-2017 Jiyong Park <jiyong@google.com> fix: boot fails on ASAN builds with VNDK restriction

Fix the bug that caused boot failure on ASAN builds with VNDK
restriciton. The major cause is because incorrect (old) ld.config.txt
was used when the build is sanitized, which prevented the dynamic linker
to find some VNDK libs that only exist in /system/lib/vndk; the old
ld.config.txt does not have the directory in its search paths. So, this
CL fixes the problem by having the same ld.config.txt for both sanitized
and non-sanitizied builds.

Furthermore, ld.config.txt is modified so that dependency to
libclang_rt* libs are redirected to those in /system/lib directory. This
ensures that the sanitizer runtime libs are not dual loaded but are
provided for both platform and vendors.

Bug: 65217017
Test: SANITIZE_TARGET=integer_overflow SANITIZE_TARGET_DIAG=integer_overflow m
on 2017 pixel devices. The build is successful and the device boots to
the UI.

Change-Id: I0e21e20d9aca340b984968e07d4ce542ae10fd31
ndroid.mk
tc/ld.config.txt.in
367984602abab743630d1fba8e4940f0a69e678b 04-Aug-2017 Jiyong Park <jiyong@google.com> templatize ld.config.txt

Lists of libraries in between the linker namespaces are no longer
hard-coded in ld.config.txt, but instead come from Soong.

Bug: 37139976
Test: build 2017 pixel device with BOARD_VNDK_VERSION=current m -j
Test: the device is bootable, basic functionalities (camera, camcorder,
wifi, bt, gps, etc.) work.
Change-Id: I8170e6c3f6ee04b16359791d64cc46bd2714a073
ndroid.mk
tc/ld.config.txt.in
tc/ld.config.vndk.txt
ab8de9ebc351b18f498db24ac5ae215ca68cf614 31-Aug-2017 Jiyong Park <jiyong@google.com> Make default namespace for system processes isolated
am: 55f05d79f9

Change-Id: Idd31e85fbe01a506f11c88fd4dcecb23db936d0e
697eb2da0db5eaaa8b518e6da3b7b6377312825e 31-Aug-2017 Jiyong Park <jiyong@google.com> libz is back to LLNDK

For 2016 pixel devices, where VNDK is not fully enforced, move libz back
to LLNDK so that we can pass the CTS without requiring the default
namespace to be isolated.

If we have libz in vndk-sp directory, test_linker_namespaces fails
because /system/lib/vndk-sp/libz.so becomes accessible. In order to make
the lib inaccessible, we have to make the default namespace isolated,
but this can't be done for 2016 pixel devices where VNDK is not fully
enforced. So, we choose to remove /system/lib/vndk-sp/libz.so and keep
the single copy at /system/lib.

Bug: 65018779
Test: android.jni.cts.JniStaticTest#test_linker_namespaces successful on
2016 pixel devices

Change-Id: Ib6b6560b02be69d2015c0afb86acf07c02b30c2f
tc/ld.config.txt
f390f043815b02ee41ffa9e201c9fa40f4f863cd 31-Aug-2017 Bowgo Tsai <bowgotsai@google.com> Merge "Move adbd from root to system"
am: 3d6f85167e

Change-Id: I3b89a7a8e98252319f850a225ef7ba2080e54879
3d6f85167eb885452d049d7b7b7cd88503793a6e 31-Aug-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Move adbd from root to system"
55f05d79f9e83757acb72d3d300262f5954a00af 28-Aug-2017 Jiyong Park <jiyong@google.com> Make default namespace for system processes isolated

The default namespace for system process now becomes isolated, which
means it can load only the libs that are in search.paths and under
permitted.paths.

/system/framework, /system/app, /system/priv-app, /vendor/app, /data,
etc are added to the permitted paths since libart should be able to
dlopen odex files under the locations.

Following directories become unavailable:
/system/lib/vndk
/system/lib/vndk-sp

Bug: 37013858
Bug: 64888291
Bug: 64950640
Test: 2017 pixel devices builds and boots
Test: android.jni.cts.JniStaticTest#test_linker_namespaces passes
Change-Id: I2bbe9cc19940c3633c2fb901f9bf8ab813e38c13
tc/ld.config.vndk.txt
698da688009d16c98772cd7818ccc3d7facb094d 29-Aug-2017 Tom Cherry <tomcherry@google.com> Merge "Globally allow up to 32K FDs open per process" am: 451ff37052 am: 42fb030221
am: 32e268561a

Change-Id: I07f13cb0ccfa5e5b1bbf9ef3c4dfb27d2e711a02
42fb030221d54676c1e10370473d3d369b00a558 29-Aug-2017 Tom Cherry <tomcherry@google.com> Merge "Globally allow up to 32K FDs open per process"
am: 451ff37052

Change-Id: Icb14faacb7d10fd99dd66e2172e04c0e73a8b170
cb5fccc83c6c757f25436884e96c318f72743ffd 28-Aug-2017 Tom Cherry <tomcherry@google.com> Globally allow up to 32K FDs open per process

We've seen crashes due to processes exceeding the current soft limit
for open FDs of 1024, mainly due to increases in using FDs for shared
memory and gralloc memory objects.

There is not a compelling reason to keep this limit artificially low,
so we raise it to 32K. This matches my desktop linux limit, so it is
with precedent.

Bug: 64894637
Test: open 32K FDs in a process without failure then fail after 32K
Change-Id: Ibecfc486e9c61f273a432a108893137d2d13a530
nit.rc
566ae3ebf61d63a45100de3245849ba17dc41ced 28-Aug-2017 Nick Kralevich <nnk@google.com> Merge "init.rc: Lock down access to /proc/net/fib_trie" into oc-mr1-dev
am: c3090ba2f4

Change-Id: I9ffa9c76b807c8439f05388f4b8aae3d131bac5a
15ffc53f6d57a46e3041453865311035a18e047a 25-Aug-2017 Nick Kralevich <nnk@google.com> init.rc: Lock down access to /proc/net/fib_trie

Make /proc/net/fib_trie only readable to root.

Bug: 31269937
Test: Device boots, file has appropriate permissions.
Change-Id: I0d01ce5c043d576344a6732b0b9ff93d62fcaa34
nit.rc
8b2136afe0a211c4c923f73150e23212840dc366 25-Aug-2017 Mark Salyzyn <salyzyn@google.com> Merge "Switch /data/misc/reboot/last_reboot_reason to persistent property" am: 13cb599536 am: 37c6015d9d
am: a0641b5c13

Change-Id: Ia78340ffa961a3375dfa5f6b012f4f98bd7b01e3
37c6015d9d9130ab5cb3a82d161f93da27036195 25-Aug-2017 Mark Salyzyn <salyzyn@google.com> Merge "Switch /data/misc/reboot/last_reboot_reason to persistent property"
am: 13cb599536

Change-Id: Ib6c1b51668b892288db931b09b099bf5ed28fbae
e2c3cb16342c3ad26ac4054f3597ff53038a9e71 25-Aug-2017 Justin Yun <justinyun@google.com> vndk: add vendor/lib(64)/vndk for vendor namespace
am: 3094de9684

Change-Id: I389ceda99569f3aaebac1a8b5f04e02e146fa8f0
3094de968443c60345f63318f14a5d919df762d5 24-Aug-2017 Justin Yun <justinyun@google.com> vndk: add vendor/lib(64)/vndk for vendor namespace

When the vndk is extended by vendor, the libs in vendor/lib(64)/vndk
will override system/lib(64)/vndk libs. Vendor binaries will search
vndk libs in vendor/lib(64)/vndk prior to system/lib(64)/vndk.

Also, remove a workaround for libsdm-color.so

Bug: 65032513
Test: build and boot check for libsdm-color.so will be loaded on boot
Test: currently no libs exist on vendor/lib(64)/vndk. No test for it
Change-Id: I99ed37eb1a9e92c83533e2d92c9c06db11f01e97
tc/ld.config.vndk.txt
73e6b49c0c24d22b345498ed60300a51750825fa 15-Aug-2017 Mark Salyzyn <salyzyn@google.com> Switch /data/misc/reboot/last_reboot_reason to persistent property

Switch from /data/misc/reboot/last_reboot_reason to persistent
Android property persist.sys.boot.reason for indicating why the
device is rebooted or shutdown.

persist.sys.boot.reason has a standard as outlined in b/63736262 and
the associated investigation. Made adjustments to the values so that
we did not create a problem even before we started. Compliance is
part of the tests in boot_reason_test.sh.

Test: system/core/bootstat/boot_reason_test.sh
Bug: 64687998
Change-Id: I812c55a12faf7cb7ff92101009be058ad9958d07
nit.rc
7b9a4d5bcd2cf49d464b82f0c7780fe3bcfd651f 28-Jul-2017 Bowgo Tsai <bowgotsai@google.com> Move adbd from root to system

Bug: 63910933
Test: normal boot sailfish, checks adb works
Test: recovery boot sailfish, checks adb works
Test: normal boot bullhead, checks adb works
Test: recovery boot bullhead, checks adb works

Change-Id: I1b27910c06a4172ca718b3344736ec8e3429f477
Merged-In: I1b27910c06a4172ca718b3344736ec8e3429f477
(cherry picked from commit 93defc17f376041437e5157a7c4d9e0344441811)
nit.usb.rc
2e887ef819f6482b9f040eefa6c961b6f3880079 22-Aug-2017 Justin Yun <justinyun@google.com> Implement system namespace for vendor process
am: 24c29f1be4

Change-Id: Ie5358aea408aaf817a1f0a76bf6907051cb207e4
24c29f1be49f47a6d8a098a10591d9c3f0d4e8ee 16-Jun-2017 Justin Yun <justinyun@google.com> Implement system namespace for vendor process

For vendor process default namespace searches as following order:
1. /vendor/lib/(hw|egl), /vendor/lib: Vendor libs + VNDK-vnd-ext
2. /system/lib/vndk-$(ver): VNDK libs
3. /vendor/lib/vndk-sp-$(ver): VNDK-SP-vnd-ext
4. /system/lib/vndk-sp-$(ver): VNDK-SP
and searches system namespace (/system/lib) only for LL-NDK libs.
This configuarion is used only with BOARD_VNDK_VERSION is defined.

Bug: 37192038
Test: build with 'BOARD_VNDK_VERSION=current' and boot

Change-Id: If9778b9266a084846ba8fe73e6bff25828359d33
ndroid.mk
tc/ld.config.vndk.txt
2a64967b7a7afd8deb2b5395ff59285df280ccff 18-Aug-2017 Bowgo Tsai <bowgotsai@google.com> Merge "Move adbd from root to system" into oc-mr1-dev
am: 0bb4cb6fa2

Change-Id: I0be7a2d6f0d58add826f61df14a5c6503e77413d
0bb4cb6fa211f063890d0d27db82853ebf19b878 18-Aug-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Move adbd from root to system" into oc-mr1-dev
b62e979d72abca2f2f5d88122e98ebe1b2dfeaf1 18-Aug-2017 Jiyong Park <jiyong@google.com> Merge "Make the rs namespace visible" into oc-mr1-dev
am: f34814e06c

Change-Id: I194fb3044998a8f02ff80caefae283a765594417
421a5e46b780cab394e4bc18745b8555ba26afa5 16-Aug-2017 Jiyong Park <jiyong@google.com> Make the rs namespace visible

This allows us to dlopen libRS_internal.so directly from the rs
namespace, not from the sphal namespace.

Bug: 64747884
Test: VtsHalRenderscriptV1_0TargetTest successful on the device built
with BOARD_VNDK_VERSION=current and [system] namespace config is applied
to /data/nativetest[64]/* processes.

Change-Id: I0b441791e395798e80a84592ca01e771bb1c201a
tc/ld.config.txt
27e501f100120af572b9d4747e7015d1f48cec8e 15-Aug-2017 Justin Yun <justinyun@google.com> Merge "Add libft2.so to ll-ndk for rs namespace" into oc-mr1-dev
am: acda9cba2e

Change-Id: I6835036af67f2328c8ad807b68de2970f2a99fb3
93defc17f376041437e5157a7c4d9e0344441811 28-Jul-2017 Bowgo Tsai <bowgotsai@google.com> Move adbd from root to system

Bug: 63910933
Test: normal boot sailfish, checks adb works
Test: recovery boot sailfish, checks adb works
Test: normal boot bullhead, checks adb works
Test: recovery boot bullhead, checks adb works

Change-Id: I1b27910c06a4172ca718b3344736ec8e3429f477
nit.usb.rc
513f76394a767192965888ed495305102b318dab 13-Aug-2017 Justin Yun <justinyun@google.com> Add libft2.so to ll-ndk for rs namespace

libft2.so is changed to ll-ndk that is available only for rs
namespace.

Bug: 64425518
Test: build and boot with BOARD_VNDK_VERSION=current
Change-Id: I991dc774ca9b92fb6e95a7656243a6a4ecdc0ab9
tc/ld.config.txt
53ed5e47291f190d51e874722283c0e14dac4750 11-Aug-2017 Justin Yun <justinyun@google.com> Merge "Move libz vndk-sp from ll-ndk" into oc-mr1-dev
am: 28d4818037

Change-Id: Ic058ced0f22045c7141c312537c1c37816868b68
dadd3a846fae03b1d4416fcb8f2499b8296d9e83 10-Aug-2017 Justin Yun <justinyun@google.com> Move libz vndk-sp from ll-ndk

The ABI of libz is not as stable as it is for ll-ndk.

Bug: 37617391
Test: build and boot
Change-Id: I883bc6fda268e98cc7cdd5888264170c58688794
tc/ld.config.txt
ce88f9878fc4409c48a4afb7181abe9807b65108 10-Aug-2017 Ryan Campbell <ryanjcampbell@google.com> Merge "Include asan options from data partition." am: 5d89e6c7fe am: 725fa57109 am: e817549d2a
am: 2c2595bfef

Change-Id: I240527da233e95c1eb79d71562e40c3cd5c288a6
2c2595bfeff2049cea198ce4185341eca1f0d33e 10-Aug-2017 Ryan Campbell <ryanjcampbell@google.com> Merge "Include asan options from data partition." am: 5d89e6c7fe am: 725fa57109
am: e817549d2a

Change-Id: Id77b2dd5847e391ef9db0a092ee9d4c4ecd09a2f
725fa57109a696b9241b3d577dda1ee037cd7a32 10-Aug-2017 Ryan Campbell <ryanjcampbell@google.com> Merge "Include asan options from data partition."
am: 5d89e6c7fe

Change-Id: I22bfd9e46cd377b4532e1726522b8c9fdcdfeb04
ce30d07b117fedcc78b6cbf549677237a2a042d0 09-Aug-2017 Ryan Campbell <ryanjcampbell@google.com> Include asan options from data partition.

Look for asan options under /data/asan so that multi-process coverage
can be enabled on a newly-started remote process without disabling
verity and without forcing it to be always-on.

Test: adb shell echo "include_if_exists=/data/asan/asan.options.%b" >>
/system/asan.options && adb shell echo
"coverage=1\ncoverage_dir=/data/misc/trace" >
/data/asan/asan.options.android.hardware.light@2.0-service && adb shell killall
android.hardware.light@2.0-service
Bug: 64019182

Change-Id: I241ad8478439323681dc1cfde2fa0770f030ae75
san.options
4220c1ab53e13647e26bd9d0b920a57a947809e7 09-Aug-2017 Jiyong Park <jiyong@google.com> Merge "Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace" into oc-mr1-dev
am: 42a2f5c992

Change-Id: Ifad4a6062b24db1a56994eae4776096f94cf3d07
7d4cf3fd3364a86c895371337a849ab40c99b232 04-Aug-2017 Jiyong Park <jiyong@google.com> Permit /system/lib/vndk-sp/hw/ for 'sphal' namespace

android.hidl.memory@1.0-impl.so is a SP-HAL located in
/system/lib/vndk-sp/hw. This can't be moved to /vendor/lib since it is a
framework HAL.

Bug: 62930720
Test: 2017 pixel builds and boots with BOARD_VNDK_VERSION on
Change-Id: I9c456983ef68120c5e8c629efc6dd66a26220ecb
tc/ld.config.txt
6a8cb78acb31b63f6cdc57e019c940260e1a7ae1 02-Aug-2017 Elliott Hughes <enh@google.com> Merge "Add comments to "public.libraries.*.txt"." am: e7b8fc22af am: 601e5ac55b am: 3cdb21a8c7
am: 54f2e52ab5

Change-Id: Id4b155e157da0c18f2cddebf4085366ae2d0afe0
54f2e52ab57b2934d3df04e6e1a4925b3587cf40 02-Aug-2017 Elliott Hughes <enh@google.com> Merge "Add comments to "public.libraries.*.txt"." am: e7b8fc22af am: 601e5ac55b
am: 3cdb21a8c7

Change-Id: I049c98243b522b8c3fcb64d917ff64a1e6d576c0
601e5ac55b4b3e82157d2e46ab2cfed1a29ce214 02-Aug-2017 Elliott Hughes <enh@google.com> Merge "Add comments to "public.libraries.*.txt"."
am: e7b8fc22af

Change-Id: I8519a128238758433d194f35f6090633aeb85f0a
e7b8fc22af00bc7606289cbd10393e961855b2d1 02-Aug-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Add comments to "public.libraries.*.txt"."
24d43899cd5f835132e08f6455d940b652f73c98 01-Aug-2017 Jean-Luc Brouillet <jeanluc@google.com> Merge "Make the Neural Networks library loadable by apps." into oc-mr1-dev
bd0ad88202ce728096519964994482525cdde25b 29-Jul-2017 Elliott Hughes <enh@google.com> Add comments to "public.libraries.*.txt".

Folks don't know how to add public native API. Point them in the right
direction.

Bug: 63905942
Test: boots
Change-Id: I5e1f04fb852348255a2f7f87aa961948c41c47fd
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
4de04ccb6b8ed41abf879164e15310b5a699047e 28-Jul-2017 Joel Galenson <jgalenson@google.com> Merge "Move chmod of /sys/kernel/debug/tracing to fix tracing." am: 13c3a582de am: c4f2163954
am: 68e79940ea

Change-Id: Ie2ca46038cef82d7a63bed3473656c17e94bb503
c4f21639543fc6ccd0c18bfcdc12d34d5d7d4339 28-Jul-2017 Joel Galenson <jgalenson@google.com> Merge "Move chmod of /sys/kernel/debug/tracing to fix tracing."
am: 13c3a582de

Change-Id: I63ca85ffce7aead567c34069135fb066c5a026de
d48c4cf23469281eb159b635dd5a5b761ec490b3 13-Jun-2017 Joel Galenson <jgalenson@google.com> Move chmod of /sys/kernel/debug/tracing to fix tracing.

This is a temporary fix, since we're still not sure exactly what the
bug is.

Bug: 62547086
Test: Built, flashed, and booted Sailfish. Verified that the file has
the correct permission and that wifi and atrace work.

Change-Id: I43275e974a11754eca274f1b77d15cdd03a3b365
(cherry picked from commit 62962dd5b7a37478da2bad786e084345d366f984)
nit.rc
97d2b6d785cf7e796d2eaba2056ff4511cbf4119 27-Jul-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Add system/${LIB}/vndk to default namespace for vendor." into oc-mr1-dev
e5fa38c73187e23ac3c4d10e808a601abb4cc220 27-Jul-2017 Siqi Lin <siqilin@google.com> Merge "rootdir: record last build fingerprint"
am: 4e8227420e

Change-Id: I59664c816a8fbf4d7776270b28f4673418d30bcb
94aeecea3ba683e2aa54a668ca08dba4abdc73c8 27-Jul-2017 Siqi Lin <siqilin@google.com> rootdir: record last build fingerprint
am: b9b76de6ff

Change-Id: Ie1c4444c147969dd74a51ca5acd9fe86825f8e3a
870353633256641aa646c7a206d1fb809c987fa0 27-Jul-2017 Siqi Lin <siqilin@google.com> rootdir: record last build fingerprint
am: b9b76de6ff

Change-Id: I2d781eb8684a860dbb4cb9590ba43bf9d2f3b4c6
16bb36197b4d5acc4d6c3b27b9117d01ad08280f 26-Jul-2017 Siqi Lin <siqilin@google.com> rootdir: record last build fingerprint

We can't copy /default.prop so just write the value of
$(ro.build.fingerprint) to /data/misc/recovery/ro.build.fingerprint
and rotate it after reboot instead.

Bug: 62793047
Test: manual - reboot phone and check /data/misc/recovery
Change-Id: I130a4b7a01d9e1bfe9baecde2781626eb72e768b
(cherry picked from commit b9b76de6ff0600dba846c2af5cccd082494f7243)
nit.rc
b9b76de6ff0600dba846c2af5cccd082494f7243 26-Jul-2017 Siqi Lin <siqilin@google.com> rootdir: record last build fingerprint

We can't copy /default.prop so just write the value of
$(ro.build.fingerprint) to /data/misc/recovery/ro.build.fingerprint
and rotate it after reboot instead.

Bug: 62793047
Test: manual - reboot phone and check /data/misc/recovery
Change-Id: I130a4b7a01d9e1bfe9baecde2781626eb72e768b
nit.rc
90a2487776d464e867c7bad1dc8d993ed50df09e 25-Jul-2017 Justin Yun <justinyun@google.com> Add system/${LIB}/vndk to default namespace for vendor.

With BOARD_VNDK_VERSION=current, vndk libs will be installed in
system/${LIB}/vndk. To make them available for vendor, it must be
added to default namespace.

Bug: 63866913
Test: build and boot with BOARD_VNDK_VERSION=current
Change-Id: I9e467a6125fc89513754b56a2420975559144f98
tc/ld.config.txt
12f81dfdffb63d71c138d44c245c8a649264b308 22-Jul-2017 Jean-Luc Brouillet <jeanluc@google.com> Make the Neural Networks library loadable by apps.

Add to the whitelist the NN API lib.

Bug: 63905942
Test: Ran an app that uses the NN API.
Change-Id: I83c1acdff58b8fe99fbd7a8fbfb5444fe77b7902
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
342e022547338ae88629e8a5d236d0e79309f88d 20-Jul-2017 Jiyong Park <jiyong@google.com> Add [test] section for /data/[nativetest|benchmarktest]
am: c034a43d44

Change-Id: I11b98ea29bbba4c3bc29f28fe7ba9864306245dd
7847934b8a757f9c4b8dc782298df6c31c90c889 20-Jul-2017 Jiyong Park <jiyong@google.com> Add [test] section for /data/[nativetest|benchmarktest]
am: c034a43d44

Change-Id: Ib068a73923a167f46368ea2adda9ff6625c7fcee
c034a43d44d87a6bb85bbdec9876b41b46ab5625 20-Jul-2017 Jiyong Park <jiyong@google.com> Add [test] section for /data/[nativetest|benchmarktest]

We have both system and vendor tests in the same directory
/data/nativetest. Since we can't distinguish system and vendor tests at
runtime, we choose to run all of them with the legacy namespace
configuration where /system/lib and /vendor/lib are both accessible
without any restriction. Furthermore, /system/lib/vndk-sp is added to
the list of accessible directories for tests since some libs (such as
libion.so) exist only in the directory but not in /system/lib.

This will change in the future when we install system and vendor tests
into different directories (vendor tests goes into ./vendor subdir).
Then, we will run the tests with [system] or [vendor] configurations
depending on their paths.

Bug: 63597267
Test: run bionic-unit-tests
Test: run linker-unit-tests
Change-Id: I810003b2da0b30335200c130f484ea7b041f9f80
tc/ld.config.txt
5dcd83c6a04eb86a4b94bb624839ee9f7f7bc464 19-Jul-2017 Jiyong Park <jiyong@google.com> Merge "/data/nativetest[64] processes are running with the new ns config" into oc-dr1-dev am: c5aba9702e
am: df13c1473d

Change-Id: I42d01009bef11774a3a1c7e22771d9ef72f8f39d
df13c1473dc741d68a0084eb50f07b5150b12f0d 19-Jul-2017 Jiyong Park <jiyong@google.com> Merge "/data/nativetest[64] processes are running with the new ns config" into oc-dr1-dev
am: c5aba9702e

Change-Id: Icf29b590738b6e3287b3635d352fe2c01d185fd8
9d1e50b809c091c01d92b9f7039ec83d94f3f05a 14-Jul-2017 Jiyong Park <jiyong@google.com> /data/nativetest[64] processes are running with the new ns config

Native tests under /data/nativetest[64] directory is now running with
the same linker namespace configuration as /system/bin/* processes.

This allows us to stop mimicing the linker namespace configuration of the
/system/bin/* processes using LD_LIBRARY_PATH.

Bug: 63597267
Test: run bionic-unit-tests
Test: run linker-unit-tests
Change-Id: If8e2ed0b8016e4e07bf6829735b8e02f952042d0
tc/ld.config.txt
3ec9aa4a91e4d04c324f89e8327d0a4b2bf1482c 14-Jul-2017 Mark Salyzyn <salyzyn@google.com> rootdir: record last build signature and kernel version

(cherry pick from commit 93394034a24534a6807da25b4dabeda36867cd8f)

Rotate /default.prop and /proc/version into /data/misc/recovery/
as an aid in determining the vintage of the LAST_LOGCAT and
LAST_DMESG in the bugreport collection.

Signed-off-by: Mark Salyzyn <salyzyn@google.com>
Test: manually confirm content rotation through reboots
Bug: 62793047
Change-Id: Ibbe546c76041f20e308e58e5548939afac75db97
nit.rc
d16eebd96dda483dd772859e5bc49409c4637486 14-Jul-2017 Mark Salyzyn <salyzyn@google.com> Merge "rootdir: record last build signature and kernel version" am: 91a17a41f6 am: 97e90c6bb8 am: a62497c189
am: 77bf7449b2

Change-Id: Ic2d43115a4423e3870870406fdf992f7449565bd
77bf7449b20a765a36795da37eb4bfe7e61b6ebd 14-Jul-2017 Mark Salyzyn <salyzyn@google.com> Merge "rootdir: record last build signature and kernel version" am: 91a17a41f6 am: 97e90c6bb8
am: a62497c189

Change-Id: Ieaddd4f3b02c7b67fd2b98e9874b037af77a0702
97e90c6bb8342f15704c10182d97ff054583b27d 14-Jul-2017 Mark Salyzyn <salyzyn@google.com> Merge "rootdir: record last build signature and kernel version"
am: 91a17a41f6

Change-Id: I86afacf1540ad02f5e70c08f39a5c76f98d47c4e
93394034a24534a6807da25b4dabeda36867cd8f 14-Jul-2017 Mark Salyzyn <salyzyn@google.com> rootdir: record last build signature and kernel version

Rotate /default.prop and /proc/version into /data/misc/recovery/
as an aid in determining the vintage of the LAST_LOGCAT and
LAST_DMESG in the bugreport collection.

Signed-off-by: Mark Salyzyn <salyzyn@google.com>
Test: manually confirm content rotation through reboots
Bug: 62793047
Change-Id: Ibbe546c76041f20e308e58e5548939afac75db97
nit.rc
01af80094e9472215e9a5672ffcf1dda9cc43df9 12-Jul-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Use the legacy linker namespace configs when target is sanitized"
ed73c5c71ada6ebade1e47fe3c5897fac461ebee 12-Jul-2017 Robert Benea <robenea@google.com> Merge "Use mem cgroups in libprocessgroup if they're available" am: 3c7f566495 am: 92ad7c02d4 am: 43c6c844de
am: 6a4482a438

Change-Id: I307fb64713d44d2447f835f4a74b7c40ccd61b4f
6a4482a4382dea661e026828f0c761d202702c07 12-Jul-2017 Robert Benea <robenea@google.com> Merge "Use mem cgroups in libprocessgroup if they're available" am: 3c7f566495 am: 92ad7c02d4
am: 43c6c844de

Change-Id: I9c2976886372f5c6e1ae008872cacc0f01fc282f
92ad7c02d4335e6c6f2a634a98af97bad6a65611 12-Jul-2017 Robert Benea <robenea@google.com> Merge "Use mem cgroups in libprocessgroup if they're available"
am: 3c7f566495

Change-Id: I7b50c83c5ba053faf6be62200570738744dd1e7b
3280e48847e5dd16521ad7040d53eb30b66bf740 28-Jun-2017 Robert Benea <robenea@google.com> Use mem cgroups in libprocessgroup if they're available

Use mem cgroups if the kernel is built with CONFIG_MEMCG=y,
additionally add system group.

test: verified on both kernel with/without memcg enabled
Change-Id: Ia2ae89efa3905e9da68fa77adac1225c667864d1
nit.rc
fff6f75fc1de2963254271d7d254e53ae187cada 11-Jul-2017 Jiyong Park <jiyong@google.com> Use the legacy linker namespace configs when target is sanitized

The new linker namespace config causes problem when the target is
sanitized: vendor libs which are loaded in the sphal namespace can't
link against to libclang_rt* libs which are in /system/lib directory
because the directory is not allowed for sphal namsapce.

Long-term solution would be installing libclang_rt* to both /system/lib
and /vendor/lib so that vendor libs can link against to the one in
/vendor/lib.

Until the work is done, let's just disable the new linker namespace
config when the target is to be sanitized.

Bug: 63535130
Test: make SANITIZE_TARGET=integer_overflow
SANITIZE_TARGET_DIAG=integer_overflow builds and boots to the UI

Change-Id: I6afb69885aaa3d25e554b9ca699a572248bfc50a
ndroid.mk
7af0deb144292d4a226c607b68827ae5606094b7 08-Jul-2017 Tim Murray <timmurray@google.com> Merge "Revert "Use mem cgroups in libprocessgroup if they're available"" am: e8a75e8f76 am: 7f857bb9ff am: ac68c7fc8c
am: 2c0f9c3a72

Change-Id: I36ef31b921d56222902c4bba8f891d6d21dad947
2c0f9c3a72e5170630513d85b1d88ee08e518ca0 08-Jul-2017 Tim Murray <timmurray@google.com> Merge "Revert "Use mem cgroups in libprocessgroup if they're available"" am: e8a75e8f76 am: 7f857bb9ff
am: ac68c7fc8c

Change-Id: I19e5d24a936e992bb634fd589ce04416dbf07c21
7f857bb9ffb1fb97968998ebc4eda9ef92f590bb 08-Jul-2017 Tim Murray <timmurray@google.com> Merge "Revert "Use mem cgroups in libprocessgroup if they're available""
am: e8a75e8f76

Change-Id: Iec01b90ae7d49d1eaf4a6e0c5324749a358db5d6
e8a75e8f76d0c0fb97aed77758a9fbea65992134 08-Jul-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Revert "Use mem cgroups in libprocessgroup if they're available""
fc10e3d5e5385081853b7d1b3cc41f882ac6325d 08-Jul-2017 Tim Murray <timmurray@google.com> Revert "Use mem cgroups in libprocessgroup if they're available"

This reverts commit 32375c23284704a7d044ed79060c4431468b4b4e.

bug 63164307

Change-Id: I3336bbf7c2f3297b231c5b0a1ef538faff9513fd
nit.rc
cea7028cf44970c11a65c7b9a0f106dce82c651b 07-Jul-2017 Wei Wang <wvw@google.com> Merge "init: Support custom shutdown actions" into oc-dr1-dev
5d4d6f72695d532ee138d8a412dd13a7ea9a0025 28-Jun-2017 Wei Wang <wvw@google.com> init: Support custom shutdown actions

We have been seeing panics and errors during shutdown sequence in
some vendor's platform, and it is required to disable error handling
during shutdown.

This CL separates the shutdown request to execute another "shutdown"
trigger at the beginning of shutdown stage. And vendor can use this
trigger to add custom commands needed for shutting down gracefully.

Bug: 38203024
Bug: 62084631
Test: device reboot/shutdown
Change-Id: I3fac4ed59f06667d86e477ee55ed391cf113717f
(cherry picked from commit eeab491efd8f456324f88e444f228b1016712e45)
nit.rc
f5b616dabf0a82c5d3f11f7763a77f94ae5d8603 06-Jul-2017 Keun-young Park <keunyoung@google.com> Merge "add "shutdown critical" to service" am: b3915d113d am: a4ad5d0328 am: 19ec8e7bcf
am: bedc5faea7

Change-Id: I62cd1bc82531b88f5d8c8ac2dd637d5ec9d52572
bedc5faea7d38f67b6874af0e91bdfa3cbdfcb77 06-Jul-2017 Keun-young Park <keunyoung@google.com> Merge "add "shutdown critical" to service" am: b3915d113d am: a4ad5d0328
am: 19ec8e7bcf

Change-Id: Ide84d7f87a9884068ebc1cc9680c997507727af3
d266d37e4cb6d0b31eb9422b73f051632ea7365f 05-Jul-2017 Keun-young Park <keunyoung@google.com> add "shutdown critical" to service

- "shutdown critical" prevents killing the service during
shutdown. And the service will be started if not running.
- Without it, services will be killed by SIGTERM / SIGKILL during shutdown.
- Even services with "shutdown critical" will be killed if shutdown
times out.
- Removes ueventd and vold from hard coded list. Each service's rc will
be updated to add "shutdown critical". watchdogd is still kept in the list.

bug: 37626581
Test: reboot and check last kmsg

(cherry picked from commit cccb34fce8798f2a359c6eb0e394ef9460673629)

Change-Id: I3c6aeb7151e64beca4b435f843ae64455217262d
nit.rc
a4ad5d0328334eb390368ef57d87ddd92fd51b5d 06-Jul-2017 Keun-young Park <keunyoung@google.com> Merge "add "shutdown critical" to service"
am: b3915d113d

Change-Id: I25b6f42478efda7077e00141042a427245393d28
b3915d113df4d24dfc4a72092f9b414422eaa9fc 06-Jul-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "add "shutdown critical" to service"
a89b61ad99ea6aa731fbac6d5e3095a831a938d6 06-Jul-2017 Wei Wang <wvw@google.com> Merge "init: Support custom shutdown actions" am: c1bc4241f8 am: 5b89535442 am: b39890048c
am: 2a38e6d119

Change-Id: I6776039ebf9f87b41193cc24a9786dc80db99e43
2a38e6d11990caa40fba9572bbf65b7d0382be1d 06-Jul-2017 Wei Wang <wvw@google.com> Merge "init: Support custom shutdown actions" am: c1bc4241f8 am: 5b89535442
am: b39890048c

Change-Id: I57a0422f47094cc061163510138e9562648fdd98
5b895354427ac2d0861beeeaf0cd71454df4bf88 06-Jul-2017 Wei Wang <wvw@google.com> Merge "init: Support custom shutdown actions"
am: c1bc4241f8

Change-Id: I6bb1789dbc5edbb10f2f4d712e9ca83e6302fdf4
cccb34fce8798f2a359c6eb0e394ef9460673629 05-Jul-2017 Keun-young Park <keunyoung@google.com> add "shutdown critical" to service

- "shutdown critical" prevents killing the service during
shutdown. And the service will be started if not running.
- Without it, services will be killed by SIGTERM / SIGKILL during shutdown.
- Even services with "shutdown critical" will be killed if shutdown
times out.
- Removes ueventd and vold from hard coded list. Each service's rc will
be updated to add "shutdown critical". watchdogd is still kept in the list.

bug: 37626581
Test: reboot and check last kmsg

Change-Id: Ie8cc699d1efbc59b9a2561bdd40fec64aed5a4bb
nit.rc
eeab491efd8f456324f88e444f228b1016712e45 28-Jun-2017 Wei Wang <wvw@google.com> init: Support custom shutdown actions

We have been seeing panics and errors during shutdown sequence in
some vendor's platform, and it is required to disable error handling
during shutdown.

This CL separates the shutdown request to execute another "shutdown"
trigger at the beginning of shutdown stage. And vendor can use this
trigger to add custom commands needed for shutting down gracefully.

Bug: 38203024
Bug: 62084631
Test: device reboot/shutdown
Change-Id: I3fac4ed59f06667d86e477ee55ed391cf113717f
nit.rc
bee0ff25249d11c2c35168fce7d37c114c3f429f 05-Jul-2017 Logan Chien <loganchien@google.com> Revert "Move libz to vndk-sp" am: f499bcdde7
am: b0bff4a55c

Change-Id: I30ff5acb75c0e6f8c4285703f9a8b4f5ce44bf70
b0bff4a55ccf611fe1597416cd3fe4f256f09c3c 05-Jul-2017 Logan Chien <loganchien@google.com> Revert "Move libz to vndk-sp"
am: f499bcdde7

Change-Id: I7f641efd4c8e88289496507c7f940db9ea60f745
f499bcdde70772368d5817d342242cf8bd8743ca 29-Jun-2017 Logan Chien <loganchien@google.com> Revert "Move libz to vndk-sp"

This commit removes libz.so from the exported libs of "vndk" linker
namespace and export libz.so from "default" linker namespace instead.

We have to remove libz.so from vndk-sp because we don't have a good
mechanism to stop "classloader" linker namespace from loading
/system/lib[64]/vndk-sp/libz.so. Other alternatives require significant
changes to dynamic linker or CTS test cases.

Let's temporarily revert the commit to fix b/62195853 for oc-dr1-dev.
The long-term solution will be discussed in b/37617391.

This reverts commit 63226400f34f9ec1f07990d5b5e36b3443188463.

Bug: 62195853
Bug: 37617391
Test: Boot sailfish to home screen.
Change-Id: I4a97819b080f7091b633152d4a11353b24c463ee
tc/ld.config.txt
ea5fd4d828398a14d9e8b231ee1f845160081c64 30-Jun-2017 Robert Benea <robenea@google.com> Merge "Use mem cgroups in libprocessgroup if they're available" am: d3afc124b6 am: 46706e6824 am: 74c02e7b58
am: 888d9e198b

Change-Id: I6f3a475bfff19801792ff7017150be6955cdd631
888d9e198b824d16c395a618e2b0f7c33d3544ba 30-Jun-2017 Robert Benea <robenea@google.com> Merge "Use mem cgroups in libprocessgroup if they're available" am: d3afc124b6 am: 46706e6824
am: 74c02e7b58

Change-Id: Iba2c643286063a9ffa22f3917f8acbcca1d77ef3
46706e6824acf9fd6da30c44b7e0432fea438f93 30-Jun-2017 Robert Benea <robenea@google.com> Merge "Use mem cgroups in libprocessgroup if they're available"
am: d3afc124b6

Change-Id: Idd72671eb144343a73a02bfbde8603265ca78650
32375c23284704a7d044ed79060c4431468b4b4e 28-Jun-2017 Robert Benea <robenea@google.com> Use mem cgroups in libprocessgroup if they're available

Use mem cgroups if the kernel is built with CONFIG_MEMCG=y,
additionally add system group.

test: verified on both kernel with/without memcg enabled
Change-Id: Ib9d1c8e3c797e75f160e0e92edf3f11c9d8e9f17
nit.rc
4a4259b51bb74229f67f4123e0050a6e2f1fc324 28-Jun-2017 Mark Salyzyn <salyzyn@google.com> Merge changes Ibe1feb39,I05be83e4,If1422e4d am: a4f086ab20 am: 3a156e6c2b am: ca0c0bb96e
am: 872206fd80

Change-Id: I9c08baaf94f2eaaf2ad9633e70b9cd0c1dd484ed
872206fd807719102080a263946e87db64e5bdf3 27-Jun-2017 Mark Salyzyn <salyzyn@google.com> Merge changes Ibe1feb39,I05be83e4,If1422e4d am: a4f086ab20 am: 3a156e6c2b
am: ca0c0bb96e

Change-Id: I21636d01cf0cb0bd581104d2bfb5624877bfaf6a
3a156e6c2b75ae8fad999dc25196470bc40cc9c3 27-Jun-2017 Mark Salyzyn <salyzyn@google.com> Merge changes Ibe1feb39,I05be83e4,If1422e4d
am: a4f086ab20

Change-Id: I7e5d431c992f9860ca7b42ca81edfbfd1d8e0a1c
4eb0ba058c6fca6a5f8a81308f006b52567fc3c5 27-Jun-2017 Mark Salyzyn <salyzyn@google.com> init.rc: setup console-ramoops-0

On later kernels /sys/fs/pstore/console-ramoops becomes
/sys/fs/pstore/console-ramoops-0

Test: none
Bug: 63058217
Change-Id: Ibe1feb39ef9081b1ab2316510674bf181bdc7b0c
nit.rc
0821c9c4e039b764a98a87e04f2d1eb20eb33ccd 23-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Export android.hidl.memory@1.0-impl am: bd7503dae7
am: 6db67ddca3

Change-Id: Ifeda019991f85a45e4d938d80a82f2940c0a0952
735a32e30e6cd77844249df5e12606428b072df7 23-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Export android.hidl.memory@1.0-impl
am: fb2a4f0874

Change-Id: Ib23a91581514f275642cb05afddbfc5324bca3bb
fb2a4f08745d1673133ad524237c71878165f2c2 22-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Export android.hidl.memory@1.0-impl

This commit exports android.hidl.memory@1.0-impl.so from default linker
namespace to vndk (VNDK-SP) linker namespace. This fixes
libhidlmemory.so failure.

Note: Exposing android.hidl.memory@1.0-impl.so from default linker
namespace to vndk (VNDK-SP) linker namespace shall be fine because its
APIs are frozen and won't be changed in the future.

Note: android.hidl.memory@1.0-impl.so is NOT exported to sphal linker
namespace.

Bug: 35107583
Bug: 62778280
Test: Write a test SP-HAL lib which links libhidlmemory.so, load that
SP-HAL lib into system executable, and make sure mapMemory() works.
Test: sailfish boots w/o problems.

Merged-In: Ia36350dcf1f8c8dc6d7bf2c7a6ae65e0ebaef578
Merged-In: Iddb723558c3a814a905cd42797594a707bc651da
Change-Id: I69034595b2cd355e786ce7943fed7dddf1b12525
(cherry picked from commit bd7503dae7008bfecbd729ba9e473c73ada17141)
(cherry picked from commit 3251e582f268b2b30a35e482e026fc9026b3956c)
tc/ld.config.txt
bd7503dae7008bfecbd729ba9e473c73ada17141 22-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Export android.hidl.memory@1.0-impl

This commit exports android.hidl.memory@1.0-impl.so from default linker
namespace to vndk (VNDK-SP) linker namespace. This fixes
libhidlmemory.so failure.

Note: Exposing android.hidl.memory@1.0-impl.so from default linker
namespace to vndk (VNDK-SP) linker namespace shall be fine because its
APIs are frozen and won't be changed in the future.

Note: android.hidl.memory@1.0-impl.so is NOT exported to sphal linker
namespace.

Bug: 35107583
Bug: 62778280
Test: Write a test SP-HAL lib which links libhidlmemory.so, load that
SP-HAL lib into system executable, and make sure mapMemory() works.
Test: sailfish boots w/o problems.

Change-Id: Ia36350dcf1f8c8dc6d7bf2c7a6ae65e0ebaef578
tc/ld.config.txt
34d0b91b156904fb7172cc1d1bfaacf23ccce7e3 21-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Add HIDL memory libs to VNDK-SP am: d7a6fb9383
am: 78daf5696d

Change-Id: I2f0d1f2d74acb74a9defb6ef0f7bec9c955152a4
7b66b21773281d16b7cd7cc74da62230465cb626 19-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Add HIDL memory libs to VNDK-SP

This commit adds libhidlmemory.so and android.hidl.memory@1.0.so to the
exported libs of the `vndk` linker namespace (aka. VNDK-SP). This is
necessary because some vendors' GLES implementation uses
libhidlmemory.so. Check http://b/35107583#comment15 for the context.

Bug: 35107583
Test: sailfish boots

Merged-In: Idb5ba4ed4a89795e0e6105d55a84e7f6bbffff51
Change-Id: I1556b7499bd981af995f000519b7a314c70567d1
tc/ld.config.txt
d7a6fb93833102b3fd6a024b7cb330344b871ca3 19-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Add HIDL memory libs to VNDK-SP

This commit adds libhidlmemory.so and android.hidl.memory@1.0.so to the
exported libs of the `vndk` linker namespace (aka. VNDK-SP). This is
necessary because some vendors' GLES implementation uses
libhidlmemory.so. Check http://b/35107583#comment15 for the context.

Bug: 35107583
Test: sailfish boots
Change-Id: Idb5ba4ed4a89795e0e6105d55a84e7f6bbffff51
tc/ld.config.txt
ea2719f9f1ef8047b28927ef67136291235b36bb 19-Jun-2017 Logan Chien <loganchien@google.com> ld-config: Add HIDL memory libs to VNDK-SP

This commit adds libhidlmemory.so and android.hidl.memory@1.0.so to the
exported libs of the `vndk` linker namespace (aka. VNDK-SP). This is
necessary because some vendors' GLES implementation uses
libhidlmemory.so. Check http://b/35107583#comment15 for the context.

Bug: 35107583
Test: sailfish boots

Merged-In: Idb5ba4ed4a89795e0e6105d55a84e7f6bbffff51
Merged-In: I1556b7499bd981af995f000519b7a314c70567d1
Change-Id: I5af7c954d432a2e8de6c6b744cedbada836bbd98
tc/ld.config.txt
62962dd5b7a37478da2bad786e084345d366f984 13-Jun-2017 Joel Galenson <jgalenson@google.com> Move chmod of /sys/kernel/debug/tracing to fix traceur.

This is a temporary fix, since we're still not sure exactly what the
bug is.

Bug: 62547086
Test: Built, flashed, and booted Marlin. Verified that the file has
the correct permission and that traceur does not popup an error.

Change-Id: I43275e974a11754eca274f1b77d15cdd03a3b365
nit.rc
b4929b219477ca18025571a5e9e0026485b0ae19 12-Jun-2017 Jiyong Park <jiyong@google.com> Merge "Don't allow libui.so to RS drivers." into oc-dr1-dev am: 1a7a5419d0
am: 5e4da5195f

Change-Id: I4c495f24ed4bab5fbca4f0d6432f8612ba2c6132
9242f68c0dc27fc3eff58f4216b3368926b90c34 09-Jun-2017 Jiyong Park <jiyong@google.com> Don't allow libui.so to RS drivers.

libui.so is not VNDK-SP, so it must not be allowed to RS drivers.

Bug: 37550338
Test: camerascript app works well in 2017 pixel devices
Change-Id: I34971baebdc91f11935d1eb4ddd07d89d4c38958
tc/ld.config.txt
ef9a611bb7360ba7a1ac4e39a158a90f8a0461e3 07-Jun-2017 Logan Chien <loganchien@google.com> Add libion.so to vndk-sp am: 5c880b948e
am: 60c9e4486b

Change-Id: If9947f17c2af1253bef9b2d8664deaba6a222e11
184505597f6182577eab627118be5341c3ca1b2b 07-Jun-2017 Logan Chien <loganchien@google.com> Add libion.so to vndk-sp

This commit adds libion.so to VNDK-SP so that some vendor's
gralloc.${chipset}.so can run without problems.

Bug: 62280700
Test: Boots a device from our partners
Merged-In: I2bcfe40ed9342de6d81dd310313e984a2c64964b
Change-Id: Ib745dfe52107d792296426b097e13b7c7755d88c
tc/ld.config.txt
40624c5d1dcb08313361367e0a11feab380d5a21 06-Jun-2017 Logan Chien <loganchien@google.com> Add libion.so to vndk-sp

This commit adds libion.so to VNDK-SP so that some vendor's
gralloc.${chipset}.so can run without problems.

Bug: 62280700
Test: Boots a device from our partners
Merged-In: Ib745dfe52107d792296426b097e13b7c7755d88c
Merged-In: I2bcfe40ed9342de6d81dd310313e984a2c64964b
Change-Id: If30657b93157a2abea29fadcdb0004b37ad9eaf2
tc/ld.config.txt
5c880b948eabcad8d6126e024167734a45c47d90 07-Jun-2017 Logan Chien <loganchien@google.com> Add libion.so to vndk-sp

This commit adds libion.so to VNDK-SP so that some vendor's
gralloc.${chipset}.so can run without problems.

Bug: 62280700
Test: Boots a device from our partners
Change-Id: I2bcfe40ed9342de6d81dd310313e984a2c64964b
tc/ld.config.txt
f01b52895dfb44c3a7e98a870ab415672aee0960 23-May-2017 Jiyong Park <jiyong@google.com> vndk: remove vendor/lib from the search path of the 'vndk' namespace

'vndk' namespace is the place for VNDK-SP libs. So /vendor/lib must be
removed from its search paths. It was there just because libhardware
(which is VNDK-SP) is loading HAL libs in vendor partition from there.
However this problem has been solved by modifying the libhardware so
that HAL libs are loaded from the 'sphal' namespace and not from the
current (the 'vndk') namespace.

Bug: 37731053
Test: sailfish builds and boots
Change-Id: Ia88934a975aa8811e05b5ba408e42d132f20f4e9
tc/ld.config.txt
ec39a758a15bd43e1f9617674ff4e322bb571289 01-Jun-2017 Robert Benea <robenea@google.com> Merge "cgroups used by init must be mounted before any services start" am: 63c15c1b11 am: cc6da8ec5b am: b30ad069ec
am: 9c18097147

Change-Id: I49aee8cae9374ba40312f6a929909a77f2df6492
9c180971470b01d9fcbf7051ac1e5db2427700c4 01-Jun-2017 Robert Benea <robenea@google.com> Merge "cgroups used by init must be mounted before any services start" am: 63c15c1b11 am: cc6da8ec5b
am: b30ad069ec

Change-Id: I5627d6720aa0c237aca0cdd1cb75b654cb183158
c638569c2ebdc36f93a05190cd52dc08f4321d1b 01-Jun-2017 Robert Benea <robenea@google.com> cgroups used by init must be mounted before any services start

init uses /acct and optionally /dev/memcg for tracking services and
therefore these must be started before any services start.

Test: check that cgroups are mounted appropriately.

Change-Id: Ice095287963181fe687dbe6b7d291076e674d1cc
nit.rc
f97d96b8f4c3291f139a035ea05197eccc0c56f1 18-May-2017 Yueyao Zhu <yueyao@google.com> init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc

/init.${ro.hardware}.rc would sometime rely on being parsed before other
.rc files. In this case all vendors are still able to have a .rc file
included before all the ones in /vendor/etc/init.

Merged-In: I3fb6df13a39204a516874ea94f5e5ad84bca42c6
Bug: 38301110
Change-Id: I3fb6df13a39204a516874ea94f5e5ad84bca42c6
(cherry picked from commit f7c34ad4bf1f4afdb7f901bcf908128ad7c2ca3a)
nit.rc
948624faca49c7dad43169fa0fc16711e7655ed2 24-May-2017 Logan Chien <loganchien@google.com> Merge "Move libz to vndk-sp"
2a20488a77ee833abe4ea8078ed873d42631b61d 19-May-2017 Thierry Strudel <tstrudel@google.com> Merge "init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc" into oc-dev am: 64bea883cb
am: b1fad8a5b0

Change-Id: I0f1f47059715fc55bf9ebe4b9a61e3f6d2d50726
b1fad8a5b0dedead07451d3d29599663f2c49dff 19-May-2017 Thierry Strudel <tstrudel@google.com> Merge "init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc" into oc-dev
am: 64bea883cb

Change-Id: I785aac40d7ee2617213f949fd9074bf6f394c952
f7c34ad4bf1f4afdb7f901bcf908128ad7c2ca3a 18-May-2017 Yueyao Zhu <yueyao@google.com> init.rc: import /vendor/etc/init/hw/init.${ro.hardware}.rc

/init.${ro.hardware}.rc would sometime rely on being parsed before other
.rc files. In this case all vendors are still able to have a .rc file
included before all the ones in /vendor/etc/init.

Bug: 38301110
Change-Id: I3fb6df13a39204a516874ea94f5e5ad84bca42c6
nit.rc
a214d3123e702baf36e35c8a9ee659a688bd2881 17-May-2017 Jiyong Park <jiyong@google.com> Allow vndk-sp to be extended by vendors am: eb9694a2d1
am: ee7da4f37d

Change-Id: I7cb5b7c225774d14bc72219143ce22e1246b2ad7
ee7da4f37d38e95e26f06fc15db9e24be69a92bc 17-May-2017 Jiyong Park <jiyong@google.com> Allow vndk-sp to be extended by vendors
am: eb9694a2d1

Change-Id: I35e4a6f0f7a712e01923a9e1d3456c81d5c0367a
eb9694a2d195fad283485c5c54aaf622fa59ad84 09-May-2017 Jiyong Park <jiyong@google.com> Allow vndk-sp to be extended by vendors

Exteded vndk-sp should go to /vendor/lib/vndk-sp.

Bug: 37940694
Test: sailfish builds and boots
Test: manually copying a lib from /system/lib/vndk-sp to
/vendor/lib/vndk-sp. Check that the copied one in /vendor partition is
loaded instead of the original one.

Change-Id: Ia5dd6f35bd31d4a20a794bec148e1fc3c6d7b72b
tc/ld.config.txt
c9c527f81f9e5cad429bdc74103c918aaf9c2a1b 16-May-2017 Jiyong Park <jiyong@google.com> resolve merge conflicts of fbe942724 to oc-dev-plus-aosp

Test: I solemnly swear I tested this conflict resolution.
Merged-In: I137c17d55940b783eab6d0125bc4d26b96bcc2f2
Change-Id: I90c3ff7c82a9b53ce00057fd87cf227d5faf0975
63226400f34f9ec1f07990d5b5e36b3443188463 08-May-2017 Logan Chien <loganchien@google.com> Move libz to vndk-sp

This commit moves libz.so from default namespace to vndk namespace.
Accodring to b/37617391, libz.so is not as stable as we thought, thus
it should be vndk-sp instead of ll-ndk.

Bug: 37617391
Test: sailfish builds, boots, no new dynamic linker errors in log
Change-Id: I3922895a169303c33914a8a0f4b50cb993a724c9
tc/ld.config.txt
15d7483bb77158b5fe631454208cfb2e130572f7 10-May-2017 Jiyong Park <jiyong@google.com> add libvndksupport.so to ll-ndk

libvndksupport.so is a new member of ll-ndk.

Bug: 37323945
Test: sailfish builds and boots

Merged-In: Ic5db48292a30a6face7f263d939f27a0760240b1
Change-Id: Ic5db48292a30a6face7f263d939f27a0760240b1
(cherry picked from commit 7000859b7cb0b0947d11f9fbe4ffddb6f66cabc4)
tc/ld.config.txt
abaab6ff03c61e73e52fac515a76f1afe13e97ac 25-Apr-2017 Jiyong Park <jiyong@google.com> libbacktrace is VNDK-SP

libbacktrace and its dependents are now VNDK-SP. Since they are in
/vendor/lib/vndk-sp directory, they are accessible directly from the
vndk namespace. Therefore, libbacktrace is removed from the exported
shared libs list of the default namespace.

Bug: 37413104
Test: sailfish builds and boots
Merged-In: I137c17d55940b783eab6d0125bc4d26b96bcc2f2
Change-Id: I137c17d55940b783eab6d0125bc4d26b96bcc2f2
(cherry picked from commit b2a4b8cd18e5f45571b8e929088047b445b6f63b)
tc/ld.config.txt
f50d1091e9e92c4b72cb3122305cbc96cb07238c 19-Dec-2016 Joel Fernandes <joelaf@google.com> init.rc: Add a new schedtune group 'rt' for rt tasks

Add a new boost group for rt tasks. Device specific changes will be in
the device init rc.

Bug: 33085313

Change-Id: I99ca085d0933d878795bb0eda639bb2075419415
Signed-off-by: Joel Fernandes <joelaf@google.com>
nit.rc
583c5c1b2d0d3d41d8249144062b3e2f98023cf3 12-May-2017 Steve Muckle <smuckle@google.com> Revert "disable module loading after BOOT_COMPLETED broadcast" am: f59c55aa7a
am: e8240c4551

Change-Id: I5d78cb0eded0f11bf7009ed792484b414f2aa704
e8240c4551fdcd1b222fa72622b57d40e825cdce 12-May-2017 Steve Muckle <smuckle@google.com> Revert "disable module loading after BOOT_COMPLETED broadcast"
am: f59c55aa7a

Change-Id: Ib871ab1f2005c074dad0dd207e4dc41bd35568d6
f608eb283a13fad440f75bdf2d43eda13456956d 12-May-2017 Siarhei Vishniakou <svv@google.com> Merge "Adding 'uhid' permission for access to /dev/uhid." am: cecbc9993d am: 04daed4793 am: d819380f50
am: b995b58631

Change-Id: I0c4f2e22d6195f219a2e1b0ef346ce89b642dc6c
b995b58631daf00c4cbe2dc48224a363c20d58be 12-May-2017 Siarhei Vishniakou <svv@google.com> Merge "Adding 'uhid' permission for access to /dev/uhid." am: cecbc9993d am: 04daed4793
am: d819380f50

Change-Id: If06b07c88276c32cdf5b53e6afcf0563e6538544
cecbc9993d5f5951e0287922aebbb3fd606166a5 11-May-2017 Siarhei Vishniakou <svv@google.com> Merge "Adding 'uhid' permission for access to /dev/uhid."
7000859b7cb0b0947d11f9fbe4ffddb6f66cabc4 10-May-2017 Jiyong Park <jiyong@google.com> add libvndksupport.so to ll-ndk

libvndksupport.so is a new member of ll-ndk.

Bug: 37323945
Test: sailfish builds and boots

Change-Id: Ic5db48292a30a6face7f263d939f27a0760240b1
tc/ld.config.txt
0729dd1edb1e392f60f9a2ad5cc06a84df2ab1f6 09-May-2017 Siarhei Vishniakou <svv@google.com> Adding 'uhid' permission for access to /dev/uhid.

This CL is in support of another CL c/2048848, topic
'Refactor hid command in /frameworks/base/cmds' in
internal master. Adding the permissions for
shell here to access uhid_node as part of the
new 'uhid' group.

Bug: 34052337
Test: Tested on angler, bluetooth mouse works OK.

Change-Id: If9e100aa1262d689fb8adc5c0ce93f157c96399e
eventd.rc
f59c55aa7a40085d5df1e2b17719f8e23a433316 10-May-2017 Steve Muckle <smuckle@google.com> Revert "disable module loading after BOOT_COMPLETED broadcast"

This reverts commit 6ed19d1675ab7a9b45d1b82c90aac2be8f408a2e.

Allow devices to decide for themselves whether to allow
module loading after boot.

Bug: 38204366
Test: boot sailfish, load a kernel module
Change-Id: Ib9e77381de9003fb5160463664015a95316ddfc5
nit.rc
657b967d48fb0a915e7ebf411b30654ca05b97be 09-May-2017 Tom Cherry <tomcherry@google.com> Merge "Revert "Make /data/data a symlink to /data/user/0"" am: 823816ee9f am: 20a74298a5 am: e4f35b111e
am: 2920471ffa

Change-Id: I9057d2ee58e3f99e422ac1a203bd219e7f552ba0
2920471ffa77dda3d655452f6f81d9f48f9b1146 08-May-2017 Tom Cherry <tomcherry@google.com> Merge "Revert "Make /data/data a symlink to /data/user/0"" am: 823816ee9f am: 20a74298a5
am: e4f35b111e

Change-Id: I9fdb4b5d8e6b1dcf89b853a737f389553cc1a1df
982e0693ce69021636e779c759ff6c596038dd1f 05-May-2017 Tom Cherry <tomcherry@google.com> Revert "Make /data/data a symlink to /data/user/0"

This reverts commit d147cb5887f1ee9c978f58cdf59e9ddb99209ac6.

Original change breaks AVD
Original changes breaks SF/AF
Bug: 38026755
Bug: 38030346
Bug: 38114264

Change-Id: Iab56244f0dc0f6b0df2916c691277a882fc7d184
nit.rc
b2a4b8cd18e5f45571b8e929088047b445b6f63b 25-Apr-2017 Jiyong Park <jiyong@google.com> libbacktrace is VNDK-SP

libbacktrace and its dependents are now VNDK-SP. Since they are in
/vendor/lib/vndk-sp directory, they are accessible directly from the
vndk namespace. Therefore, libbacktrace is removed from the exported
shared libs list of the default namespace.

Bug: 37413104
Test: sailfish builds and boots
Change-Id: I137c17d55940b783eab6d0125bc4d26b96bcc2f2
tc/ld.config.txt
55337fd5ccef969bd03ca6689d99bf35eded3b27 03-May-2017 Steven Moreland <smoreland@google.com> Remove redundant dependencies

android.hidl.base@1.0 and android.hidl.manager@1.0 are built into libhidltransport.

Test: boot internal marlin
Bug: 33276472
Change-Id: I32dc22607f2df5c71555161178865900b35fc75b
(cherry picked from commit fa5ea6a81a9f85b4f24beb20e2b9cca411eb58b4)
tc/ld.config.txt
04df8f456c13bdd857957e0310491c2c9ae28c8b 04-May-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Remove redundant dependencies"
c1c4dada312bffa9a8a876e81be4dedb4fc8f4f6 04-May-2017 Jiyong Park <jiyong@google.com> Merge "update /vendor/*/vndk-sp to /system/*/vndk-sp" into oc-dev am: d5398bf97d
am: 874ed5ec96

Change-Id: I965e8ccb742a0133ba75fd913ffd2edb9559359a
874ed5ec965706f185e646c7264246b4b5364586 04-May-2017 Jiyong Park <jiyong@google.com> Merge "update /vendor/*/vndk-sp to /system/*/vndk-sp" into oc-dev
am: d5398bf97d

Change-Id: I77ff71643767c0c0933d80d835b648673d68a343
4ffa5c5de91825bad66ec3214ad23b1a895e091b 04-May-2017 Tom Cherry <tomcherry@google.com> Merge "Make /data/data a symlink to /data/user/0" am: 49bbe16447 am: c43da33005 am: f95686e0cf
am: b4f7e5b0c4

Change-Id: I225a92299452373b3e428b3b303dfb823acd3c6c
b4f7e5b0c4bb7f8ae6fbe67793de2378503447d9 04-May-2017 Tom Cherry <tomcherry@google.com> Merge "Make /data/data a symlink to /data/user/0" am: 49bbe16447 am: c43da33005
am: f95686e0cf

Change-Id: I081704dc6d7d60edaca979f6af2b1c4418ebc844
d147cb5887f1ee9c978f58cdf59e9ddb99209ac6 11-Apr-2017 cjbao <cathy.bao@intel.com> Make /data/data a symlink to /data/user/0

For legacy reason, /data/data is a real dir and /data/user/0 is a
symbolic link to it. Overhead for linux kernel to walk through
symbolic link is not negligible. This is unnessary overhead to
carry over. This patch is to make /data/user/0 a a real dir and
make legacy folder /data/data a symbolic link. OTAed system does
not get impacted.

Test: Manual test
Change-Id: I419564a75f6ebf3154badb8725ba9831164592b6
Signed-off-by: cjbao <cathy.bao@intel.com>
nit.rc
fa5ea6a81a9f85b4f24beb20e2b9cca411eb58b4 03-May-2017 Steven Moreland <smoreland@google.com> Remove redundant dependencies

android.hidl.base@1.0 and android.hidl.manager@1.0 are built into libhidltransport.

Test: boot internal marlin
Bug: 33276472
Change-Id: I32dc22607f2df5c71555161178865900b35fc75b
tc/ld.config.txt
c641e19c7ee83b7418ec5aba2394706e95137d9b 03-May-2017 Jiyong Park <jiyong@google.com> update /vendor/*/vndk-sp to /system/*/vndk-sp

Some paths weren't updated.

Bug: 37522144
Test: sailfish builds and boots
Change-Id: I7aeb5d6e0d61bbc6bde4e6f221e90b21ca422622
tc/ld.config.txt
82ab44ce0948cdc880edc151262e46ff9d3057d9 29-Apr-2017 Guang Zhu <guangzhu@google.com> Merge "Revert "Enable metadata encryption""
9709c5a7ff7446f2faac53df5ab45b9bc002b9fa 29-Apr-2017 Guang Zhu <guangzhu@google.com> Revert "Enable metadata encryption"

Bug: 37792477

This reverts commit 2bf87eebe4dd4de23f3dac5d33f8fea4218bd035.

Change-Id: I1a43793beda24c01f0fe9e25a7c183af1200fa76
nit.rc
4f4a2baa213b612e7ad41edbd0c0a2633b738dcd 28-Apr-2017 Nick Desaulniers <ndesaulniers@google.com> Merge "Enable metadata encryption"
2bf87eebe4dd4de23f3dac5d33f8fea4218bd035 25-Apr-2017 Paul Lawrence <paullawrence@google.com> Enable metadata encryption

Bug: 26778031
Test: Boots, reboots, sector 0 of userdata encrypted
Make sure an FDE device, both default and password protected,
boots.
Make sure an FBE device without metadata encryption boots.
Change-Id: I55135f2d81002f4010a857c021ee840f792f7917
nit.rc
d6ab6456c56d63ec069fe637cd5b9aad87ef5133 27-Apr-2017 Abodunrinwa Toki <toki@google.com> Initialize textclassifier model update directory

Test: Builds successfully. Directory is initialized on install. Tests pass.
bit FrameworksCoreTests:android.view.textclassifier.TextClassificationManagerTest
Bug: 34780396

Merged-In: Icbf7962f11b66579931f48053132da6e03e62c61
Change-Id: Icbf7962f11b66579931f48053132da6e03e62c61
nit.rc
3e6e90644868a0c7d3de17812151a731db3eee65 28-Apr-2017 Abodunrinwa Toki <toki@google.com> Merge "Initialize textclassifier model update directory" am: a079e453a3 am: f566376046 am: d13dca13e8
am: 552a4c10b3

Change-Id: I3067795ddd40e8ff1a8eca10fa2188f36c0769ba
af96b5e80b9530df94b0af08a07c5bf8cb1227ef 28-Apr-2017 Jerry Zhang <zhangjerry@google.com> Merge "Move adbd stopped trigger for configfs into core." am: e21b2fb6b4 am: fa14b1de73 am: b3988e670d
am: ee82936ecd

Change-Id: Ib276a0384eafe25d81a684c76f8d5d58a5596414
552a4c10b33dcd1e6c24ab11fd6c4d46b6cf4d26 28-Apr-2017 Abodunrinwa Toki <toki@google.com> Merge "Initialize textclassifier model update directory" am: a079e453a3 am: f566376046
am: d13dca13e8

Change-Id: Icb4af42818bd715709858abfb75e610c52ce48db
a079e453a3c8839369ffdfc8c2123feb99ec9bfe 28-Apr-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Initialize textclassifier model update directory"
ee82936ecd9a608ce047308790f22c8678f5fb05 28-Apr-2017 Jerry Zhang <zhangjerry@google.com> Merge "Move adbd stopped trigger for configfs into core." am: e21b2fb6b4 am: fa14b1de73
am: b3988e670d

Change-Id: I303a29c590df9e018d00e18c1818f8ca0f1dd3ce
423af1a86a01b365e17ac6b160f4df25e0050f88 28-Apr-2017 Jerry Zhang <zhangjerry@google.com> Merge "Add ffs.mtp.ready triggers to mtp configs." am: a06ac26dd1 am: c6faf65758 am: 78a4f0f567
am: c9fd178fb0

Change-Id: I09be5a5f34f81b8594184cf64d6897349aa9c82f
c9fd178fb0d1d36374cced14f13544b869922444 28-Apr-2017 Jerry Zhang <zhangjerry@google.com> Merge "Add ffs.mtp.ready triggers to mtp configs." am: a06ac26dd1 am: c6faf65758
am: 78a4f0f567

Change-Id: Ibb785165c83341c098edc254520b0cfeda9c8a79
75f8d89a8a3e5950dc80cc421998e6322d8392ac 27-Apr-2017 Jerry Zhang <zhangjerry@google.com> Move adbd stopped trigger for configfs into core.

This trigger resets ffs.ready in situations where
adbd is stopped via commandline.

Test: stop adbd
Change-Id: Ib5028d55c4883a8291d6de2dbcb0641ff8eb7a48
nit.usb.configfs.rc
40673e3381cbb661212f965432d190f0458644bd 27-Apr-2017 Abodunrinwa Toki <toki@google.com> Initialize textclassifier model update directory

Test: Builds successfully. Directory is initialized on install. Tests pass.
bit FrameworksCoreTests:android.view.textclassifier.TextClassificationManagerTest
Bug: 34780396

Change-Id: Icbf7962f11b66579931f48053132da6e03e62c61
nit.rc
b185e01a884fe587bf395fc1a9d2ecc121f51489 27-Apr-2017 Jiyong Park <jiyong@google.com> Merge "Relocate VNDK-SP to /system/lib/vndk-sp and add RS libs to VNDK-SP" into oc-dev am: c43a4ad4bc
am: 7eccd838c0

Change-Id: I6a5ec9f6a65ddd39736691c1c208d9ca33ed340c
7eccd838c06d505d46ad71e374c99ce913d21d67 27-Apr-2017 Jiyong Park <jiyong@google.com> Merge "Relocate VNDK-SP to /system/lib/vndk-sp and add RS libs to VNDK-SP" into oc-dev
am: c43a4ad4bc

Change-Id: Ib2c7ba873d7e71aa23bcf28702c2e188f6918c15
fb256b696b0e05f3e8043b818e3a5edf2fd59d80 15-Apr-2017 Jerry Zhang <zhangjerry@google.com> Add ffs.mtp.ready triggers to mtp configs.

This allows devices to use functionfs for mtp and ptp instead
of the ordinary functions. The property is set regardless of
which function is enabled so mtp and ptp functions will continue
to work.

Bug: 33220530
Test: use mtp with ffs and non ffs devices
Change-Id: I4527e153bd10ef1e262e487482ae455835d1c698
nit.usb.configfs.rc
8252e664f3a9e9aa35fddb44a71ec5958dbc0b2a 26-Apr-2017 Andreas Gampe <agampe@google.com> Merge "Linker: Add ASAN support to treble ld.config" into oc-dev
am: 57e3528d2e

Change-Id: I694aaf1f3307270f973845644dedf51786dcc6cd
bfa03ee9dc53b3cd78ee3a31a8819fbb71965be2 21-Apr-2017 Jiyong Park <jiyong@google.com> Relocate VNDK-SP to /system/lib/vndk-sp and add RS libs to VNDK-SP

VNDK-SP is relocated back to /system partition from /vendor partition,
following the original design.

In addition, the namespace for RenderScript is added. The namespace is
dedicated for loading VNDK-SP libs for RenderScript such as
libRS_internal.so. The reason for having a separate namespace is that
RenderScript requires more permitted paths (/data/*) which should not be
allowed for normal SP-HALs.

Bug: 37522144
Bug: 37550338
Test: sailfish builds and boots well
Test: lsof shows VNDK-SP libs are loaded from /system/lib/vndk-sp
Test: RenderScript app (CameraScript) runs well
Change-Id: Id139f626cafae2e43ee4eefc5a57a204e31bbbc9
tc/ld.config.txt
57e3528d2e85572f2e31cf223d0464c5b38ab6c7 26-Apr-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Linker: Add ASAN support to treble ld.config" into oc-dev
07fc6421cf1082fe9273c4c14d70e6eb0ee241cd 25-Apr-2017 Wei Wang <wvw@google.com> Merge "Revert "Revert "Ensure update_verifier run before zygote""" am: 5fe07acd07 am: 0380041304 am: b8fdeb4c5a
am: b0d85903cd

Change-Id: I77a093146a7db8651e6a6bd204ccd97ca2e37412
53842e7dc6c9c08a73b87775e2daccb35d400902 20-Apr-2017 Wei Wang <wvw@google.com> Ensure update_verifier run before zygote

Currently zygote is started early for FBE device but update_verifier is run later
which creates a potential risk. This CL ensures update_verifier run before
zygote touches anything within data/ partition. With this change, we also start zygote
early for unencrypted/unsupported encryption state device.

Bug: 37543411
Test: marlin boots

(cherry picked from commit 5dc05effecca88f06da090dbcdd257666e69c2c7)

Change-Id: I97cde0c20f74b1b17c995d84c2e31c86fe006395
nit.rc
b0d85903cdade840af2d6e029de47d0aa338d020 25-Apr-2017 Wei Wang <wvw@google.com> Merge "Revert "Revert "Ensure update_verifier run before zygote""" am: 5fe07acd07 am: 0380041304
am: b8fdeb4c5a

Change-Id: Ief5492dd4b08de351c5ef8c72aeb3ffb09f6feff
c7c2d7bcd471c44ff18d19201eacaa17475584d5 22-Apr-2017 Andreas Gampe <agampe@google.com> Linker: Add ASAN support to treble ld.config

Add asan counterparts.

Bug: 37579959
Test: m && m SANITIZE_TARGET=address
Merged-in: I23f05436b79fbcb3f6fa11d84c95fcd180fad3b3
Change-Id: I23f05436b79fbcb3f6fa11d84c95fcd180fad3b3
tc/ld.config.txt
35a2ee84d5f58c592da16c8377f4edead8a39f10 24-Apr-2017 Wei Wang <wvw@google.com> Revert "Revert "Ensure update_verifier run before zygote""

This reverts commit 2de3344180f0308a8e8c9ffa533bbd572e6fd89d.

Change-Id: Ifc49bf389ed43a56baf5bb55d5f2028b8725083d
nit.rc
146b9a72545af9181ecf4fc456bf96933e869b30 22-Apr-2017 Andreas Gampe <agampe@google.com> Linker: Add ASAN support to treble ld.config

Add asan counterparts.

Bug: 37579959
Test: m && m SANITIZE_TARGET=address
Change-Id: I23f05436b79fbcb3f6fa11d84c95fcd180fad3b3
tc/ld.config.txt
4971972b544237f2ddf3228672a584a81b141bf7 22-Apr-2017 Keun-young Park <keunyoung@google.com> Merge "Revert "Ensure update_verifier run before zygote"" am: a037bddd8a am: 615211301e am: 2e211888c0
am: 1a6eb1628c

Change-Id: Ia7afc768cc1f140787f99c021859a99e59fa0762
1a6eb1628c67846c0b522276cb8a11a986178947 22-Apr-2017 Keun-young Park <keunyoung@google.com> Merge "Revert "Ensure update_verifier run before zygote"" am: a037bddd8a am: 615211301e
am: 2e211888c0

Change-Id: Ie9eb8fc13d35a615ff14d120816e675d8ea20f2b
2de3344180f0308a8e8c9ffa533bbd572e6fd89d 22-Apr-2017 Keun-young Park <keunyoung@google.com> Revert "Ensure update_verifier run before zygote"

This reverts commit 5dc05effecca88f06da090dbcdd257666e69c2c7.

Change-Id: Ic041860dee8a2993c6b4890beca4da745cfbfb60
nit.rc
34f0c315d06f2dc2becd55a0ed087df188ea0a3d 22-Apr-2017 Wei Wang <wvw@google.com> Merge "Ensure update_verifier run before zygote" am: a42ec8a9e3 am: 29a0f68c11 am: 73fc12cbda
am: 1214e236eb

Change-Id: I13cb7894245cd242890574473a60a636dc598854
1214e236eba66baddba07befbe791c53627faf0d 22-Apr-2017 Wei Wang <wvw@google.com> Merge "Ensure update_verifier run before zygote" am: a42ec8a9e3 am: 29a0f68c11
am: 73fc12cbda

Change-Id: Ife005b30f6115747309f0b3f096f5380e17f192a
5dc05effecca88f06da090dbcdd257666e69c2c7 20-Apr-2017 Wei Wang <wvw@google.com> Ensure update_verifier run before zygote

Currently zygote is started early for FBE device but update_verifier is run later
which creates a potential risk. This CL ensures update_verifier run before
zygote touches anything within data/ partition. With this change, we also start zygote
early for unencrypted/unsupported encryption state device.

Bug: 37543411
Test: marlin boots
Change-Id: I95daa73bc1a503eecb70d7be78251b74b773abf8
nit.rc
d1cb50c66ac5b9ddf0f1786327c8b84a975feef0 21-Apr-2017 Keun-young Park <keunyoung@google.com> Merge "early start zygote_secondary as well" am: a0bf415cad am: b7896f0a0d am: 1abccccb71
am: 93ee9b3cb3

Change-Id: I8080e62c965fce0db456e3f61a2098794d5e448e
93ee9b3cb3ccccf7a2e25617a51b50e91218a763 21-Apr-2017 Keun-young Park <keunyoung@google.com> Merge "early start zygote_secondary as well" am: a0bf415cad am: b7896f0a0d
am: 1abccccb71

Change-Id: I0bf50e54aacc5cd2f967c44dd5176800ee69a695
5fb5b81fc78cf73000c92942fb6cbbe44dae8062 20-Apr-2017 Keun-young Park <keunyoung@google.com> early start zygote_secondary as well

- late start of zygote_secondary leads into occasional
1 second wait for starting system service.
- Early start secondary zygote so that there is no additional
wait.

bug: 37508384
Test: python packages/services/Car/tools/bootanalyze/bootanalyze.py -r -c packages/services/Car/tools/bootanalyze/config.yaml -n 100 -f -e 16 -w 30

(cherry picked from commit f8532445b4c2c693d6c4e8794a7d9a69da1e0a5f)

Change-Id: Ia46b07f3d6abb090cc169ebd807e21b16694d172
nit.rc
f8532445b4c2c693d6c4e8794a7d9a69da1e0a5f 20-Apr-2017 Keun-young Park <keunyoung@google.com> early start zygote_secondary as well

- late start of zygote_secondary leads into occasional
1 second wait for starting system service.
- Early start secondary zygote so that there is no additional
wait.

bug: 37508384
Test: python packages/services/Car/tools/bootanalyze/bootanalyze.py -r -c packages/services/Car/tools/bootanalyze/config.yaml -n 100 -f -e 16 -w 30
Change-Id: I2e4eb0b59a9a8417b56a72fe2de6fa2a6e1ab0a2
nit.rc
a2b67d6063e5c46f5dbd446deed553278a6cf0b3 20-Apr-2017 Andreas Gampe <agampe@google.com> Asan_extract: Use sys.powerctl

rc-style powerctl has beem removed. Accordingly, asan_extract now
needs to access sys.powerctl directly.

Bug: 36458146
Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true
Change-Id: Ic65a858962b4b3dd613fdbfa09f93d21425bf892
san_extract.rc
san_extract.sh
46487922288663385b095916b6b33773701a8ed0 05-Apr-2017 Andreas Gampe <agampe@google.com> Asan_extract: Set access flags.

After untar-ing, set correct access flags.

Bug: 36458146
Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true
Change-Id: Ibd98dfaeb58a0040ff2a9fee0bb880a281a673e8
san_extract.sh
cb46b011675a7edb9d7604e537fdcbc8f744c5a3 19-Apr-2017 Andreas Gampe <agampe@google.com> Asan_extract: Add FDE check

Under full-disk encryption, we must skip extracting libraries
into the temporary /data directory. It is too small, and the
framework will not be able to come up.

Add a check for the vold.decrypt system property. As it turns
out that we can't reliably use this, also add a size check
(and use 512M = 131072 4K blocks as the limit).

Bug: 36458146
Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true
Change-Id: Ib350094b049b6e75832d393527b8b62a58a7fece
san_extract.sh
1b0895300f1458aa523ae6c0d00154a40d16484c 19-Apr-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge changes I33ad185f,I5fc2d727 into oc-dev

* changes:
init.rc: move load_system_props to beginning of 'on fs'
liblog: __android_logger_property_bool svelte+eng default
82a395de27cd7d54cd0d6b32e757607194d7a949 18-Apr-2017 Mark Salyzyn <salyzyn@google.com> init.rc: move load_system_props to beginning of 'on fs'

(cherry pick from commit 3510359a3c382269e1b58bd5ce8d147e5f1c06e7)

ro.logd.kernel, ro.config.low_ram, ro.logd.timestamp and ro.debuggable
need to be retrieved prior to logd start in order for the service to
behave in a configured manner. Other essential services are also
dependent on these system properties as well, so it just makes sense
to pick them all up first in 'on fs'.

Test: smoke test
Bug: 37425809
Change-Id: I33ad185f397ee527ed3c84cc2bcb40ff8ca785b5
nit.rc
ac0aa5f30c2b191a7a432f050fb928cbadf6d4b3 19-Apr-2017 Wei Wang <wvw@google.com> Merge "init.rc: set initial cpuset to all cores" into oc-dev
2563a726fb69cf1a60472bd37ffbb692eb0d46ae 19-Apr-2017 Mark Salyzyn <salyzyn@google.com> Merge "init.rc: move load_system_props to beginning of 'on fs'" am: 798ac73dcf am: 03393e6f63 am: 925a895266
am: e4f22b16a5

Change-Id: Ib999ec2f8c052a80cd4db64939a77031cd8f2cd5
e4f22b16a5efddefd6e711c22b3019f6f5ab0826 19-Apr-2017 Mark Salyzyn <salyzyn@google.com> Merge "init.rc: move load_system_props to beginning of 'on fs'" am: 798ac73dcf am: 03393e6f63
am: 925a895266

Change-Id: I4ea086b0fcf12a0d5df279712807e4e44e82f955
3510359a3c382269e1b58bd5ce8d147e5f1c06e7 18-Apr-2017 Mark Salyzyn <salyzyn@google.com> init.rc: move load_system_props to beginning of 'on fs'

ro.logd.kernel, ro.config.low_ram, ro.logd.timestamp and ro.debuggable
need to be retrieved prior to logd start in order for the service to
behave in a configured manner. Other essential services are also
dependent on these system properties as well, so it just makes sense
to pick them all up first in 'on fs'.

Test: smoke test
Bug: 37425809
Change-Id: I33ad185f397ee527ed3c84cc2bcb40ff8ca785b5
nit.rc
5ceb7b3ebde818eaa3efe21b40d3481a4b653751 18-Apr-2017 Tom Cherry <tomcherry@google.com> init: handle sys.powerctl immediately

Currently if a process sets the sys.powerctl property, init adds this
property change into the event queue, just like any other property.
The actual logic to shutdown the device is not executed until init
gets to the action associated with the property change.

This is bad for multiple reasons, but explicitly causes deadlock in
the follow scenario:

A service is started with `exec` or `exec_start`
The same service sets sys.powerctl indicating to the system to
shutdown
The same service then waits infinitely

In this case, init doesn't process any further commands until the exec
service completes, including the command to reboot the device.

This change causes init to immediately handle sys.powerctl and reboot
the device regardless of the state of the event queue, wait for exec,
or wait for property conditions.

Bug: 37209359
Bug: 37415192

Test: Init reboots normally
Test: Update verifier can reboot the system
Change-Id: Iff2295aed970840f47e56c4bacc93001b791fa35
(cherry picked from commit 98ad32a967079be80a101458d8a29d7ecefbb547)
nit.rc
3b6367af468e3b9c9dc8dc232996c932eb7ed8f6 18-Apr-2017 Tom Cherry <tomcherry@google.com> Merge "init: handle sys.powerctl immediately" am: 14ed55bae8 am: e6bfb53196 am: 8972f887d2
am: 1f49801ab1

Change-Id: I6af3f4e1850593f13f27a3fd48f1310e0c3e369c
1f49801ab184c97f3fdb2897d44d550671ff49a2 18-Apr-2017 Tom Cherry <tomcherry@google.com> Merge "init: handle sys.powerctl immediately" am: 14ed55bae8 am: e6bfb53196
am: 8972f887d2

Change-Id: I3af0841fc3c23e2758ec5f330e9ba03f7695d50f
14ed55bae8f2f64005cdde61cb407ed34d0effef 18-Apr-2017 Tom Cherry <tomcherry@google.com> Merge "init: handle sys.powerctl immediately"
dd39cf5e051d393bdd1c0f5202ba45b454b10b4a 18-Apr-2017 Jiyong Park <jiyong@google.com> Merge "linker: don't allow libui to SP-HALs and fix warning" into oc-dev am: 02012596c1
am: 9cd5ed710b

Change-Id: I730e0cec8bdd2f8dfb6158f50a66a08519b6f562
9cd5ed710b8c8ded4974a4ec0cbc8a8a424b5768 18-Apr-2017 Jiyong Park <jiyong@google.com> Merge "linker: don't allow libui to SP-HALs and fix warning" into oc-dev
am: 02012596c1

Change-Id: Ia82a1515e8e47e5a8a39d5fb214ca8a5690efe5e
98ad32a967079be80a101458d8a29d7ecefbb547 18-Apr-2017 Tom Cherry <tomcherry@google.com> init: handle sys.powerctl immediately

Currently if a process sets the sys.powerctl property, init adds this
property change into the event queue, just like any other property.
The actual logic to shutdown the device is not executed until init
gets to the action associated with the property change.

This is bad for multiple reasons, but explicitly causes deadlock in
the follow scenario:

A service is started with `exec` or `exec_start`
The same service sets sys.powerctl indicating to the system to
shutdown
The same service then waits infinitely

In this case, init doesn't process any further commands until the exec
service completes, including the command to reboot the device.

This change causes init to immediately handle sys.powerctl and reboot
the device regardless of the state of the event queue, wait for exec,
or wait for property conditions.

Bug: 37209359
Bug: 37415192

Test: Init reboots normally
Test: Update verifier can reboot the system
Change-Id: Iff2295aed970840f47e56c4bacc93001b791fa35
nit.rc
7b701de5e035a1b382423316938e88e382e5e7ec 18-Apr-2017 Jiyong Park <jiyong@google.com> linker: don't allow libui to SP-HALs and fix warning

libui.so is not used by SP-HALs, so it is removed from the list of libs
exposed from the default namespace.

Also, this fixes a warning message "property value is empty" caused by
the automatically removed trailing '/' for the section 'legacy'. Since
the legacy behavior is already implemented by the linker itself, the
behavior doesn't need to specified in ld.config.txt.

Test: marlin/sailfish boots
Test: no warning message is shown
Change-Id: Ib679794d63b01c6794663dc88f1ab7e72cfb11d3
tc/ld.config.txt
81794deecf2881c36af05b30726665ec4f1ef135 17-Apr-2017 Wei Wang <wvw@google.com> Merge "init.rc: set initial cpuset to all cores" am: 66f44d823f am: eb9ddd14f1 am: d7652f553c
am: c9c66cd486

Change-Id: Ibb9248214e48f937c80bf6af88124d602e32d502
c9c66cd4864e6447d174ed9204f5fd20c103d4b6 17-Apr-2017 Wei Wang <wvw@google.com> Merge "init.rc: set initial cpuset to all cores" am: 66f44d823f am: eb9ddd14f1
am: d7652f553c

Change-Id: I1e1fee25ddd8f990dac12712dc1ae1955736f2d8
66f44d823f51c2283ec6ec59675953949a4a63fb 17-Apr-2017 Wei Wang <wvw@google.com> Merge "init.rc: set initial cpuset to all cores"
2e24e8e2f0d92a5578f4eb489ab9742d189209e4 15-Apr-2017 Jiyong Park <jiyong@google.com> Merge "Configure ld.config.txt for SP-HALs" into oc-dev am: 43b72b58f2
am: 7610066315

Change-Id: I59ede8903c6890b976ef3ca42c7ad1d220470a42
76100663152f7176bfe36af82fdecf1e749cef4a 15-Apr-2017 Jiyong Park <jiyong@google.com> Merge "Configure ld.config.txt for SP-HALs" into oc-dev
am: 43b72b58f2

Change-Id: I3e7e5f142f6c8e76da26e25362eccd35f10b81f1
43b72b58f2f1ef1aa2aee00f4112c5544a66cd4c 15-Apr-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Configure ld.config.txt for SP-HALs" into oc-dev
8dbd12b948e732105ff6bf698972e34e7731d14d 14-Apr-2017 Wei Wang <wvw@google.com> init.rc: set initial cpuset to all cores

Starting zygote early requires cpuset to be initialized to all cores for
foreground cpuset. Change to expolit all cores by default at boot and
let device manufacturers override to proper values in device specific
init script.

Bug: 36576280
Test: marlin boot fast and checked cpuset during early boot
Change-Id: I2c1ce0630e58a7b04d1a453c6740d3f0bce9de9f
(cherry picked from commit 2e83b86a8a10c825799062770ed8c85878e5b4e1)
nit.rc
2e83b86a8a10c825799062770ed8c85878e5b4e1 14-Apr-2017 Wei Wang <wvw@google.com> init.rc: set initial cpuset to all cores

Starting zygote early requires cpuset to be initialized to all cores for
foreground cpuset. Change to expolit all cores by default at boot and
let device manufacturers override to proper values in device specific
init script.

Bug: 36576280
Test: marlin boot fast and checked cpuset during early boot
Change-Id: I2c1ce0630e58a7b04d1a453c6740d3f0bce9de9f
nit.rc
450cff4b68ce09a65a82284ec64fae83b2ef3313 05-Apr-2017 Jiyong Park <jiyong@google.com> Configure ld.config.txt for SP-HALs

Now, framework process (any process that is executing /system/bin/* or
/system/xbin/*) are started with three namespaces; default, sphal and
vndk.

default namespace is the namespace that is responsible for loading libs
from /system/lib. It can't load libs from other places such as
/vendor/lib. (However, we temporarily open the path since we haven't
finished the system partition cleanup, but will do eventually).

sphal namespace is the namespace where SP-HAL (Same-process HAL) is
loaded. SP-HAL are the only vendor libraries that are allowed to be
loaded inside framework processes. libEGL_<chipset>.so and
android.hardware.graphics.mapper@2.0-impl.so, etc are SP-HALs. When
framework needs to load those SP-HALs, it explicitly loads it from this
namespace using android_get_exported_namespace() and
android_dlopen_ext().

vndk namespace is the namespace for loading vndk-sp (Vendor-NDK for
Same-Process) libs, which is a small set of framework libraries that
SP-HALs can link against. These libraries are compiled for the same
version of Android that the vendor partition is compiled against.
SP-HALs can not use libraries other than vndk-sp and ndk libs.
Membership to vndk-sp and ndk are strictly closed.

Note that in a system, there are two copies of vndk-sp libs. One at
/system/lib and the other at /vendor/lib/vndk-sp. As a result, there can
be two instances of a same library in a process.

Also adds ld.config.legacy.txt which is used on non-Treble devices where
PRODUCT_FULL_TREBLE is not set to true.
Note, this split can be cleaned up further after b/37139976 is solved.

Bug: 34407260
Test: git diff HEAD:rootdir/etc/ld.config.legacy.txt
HEAD^:rootdir/etc/ld.config.txt => 0
Test: sailfish boots (because BOARD_VNDK_VERSION is not set to
'current')

Change-Id: I8331d94edc38f22c4f8abc66cdf2050af9d0605b
ndroid.mk
tc/ld.config.legacy.txt
tc/ld.config.txt
4224f030c4a5668320c49a298f5c97476204624d 14-Apr-2017 Todd Poynor <toddpoynor@google.com> Merge changes I76212f65,I6a29c678 into oc-dev am: 5975d4e337
am: a03b4dc574

Change-Id: Ib202914daeb62057d4575e4815329f5a7bee80f0
e61f5c42faa837bfc99206a492aac86980a20769 14-Apr-2017 Wei Wang <wvw@google.com> Merge "init.rc: start all 3 servicemanagers early" into oc-dev am: d12835d19f
am: c74c092929

Change-Id: Ib436e16a88570a6b896ec917b40be87cf9a66fe0
a03b4dc574e0113fdbebdb3d23a78380aaab93f4 14-Apr-2017 Todd Poynor <toddpoynor@google.com> Merge changes I76212f65,I6a29c678 into oc-dev
am: 5975d4e337

Change-Id: I0441dc1f8a9ff11429a253d0510790b20b42e3b4
5975d4e33724047d73883ca84fda8b360f2fe000 14-Apr-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge changes I76212f65,I6a29c678 into oc-dev

* changes:
init.rc: create /data/misc/reboot owned by system
reboot: fix owner and permissions of last_reboot_reason file
c74c0929296884741e6707d49a58043a719a3887 14-Apr-2017 Wei Wang <wvw@google.com> Merge "init.rc: start all 3 servicemanagers early" into oc-dev
am: d12835d19f

Change-Id: I935cc9f8b353a6b513fb825e989156684f27a9dd
e092b72bf493ffb45013acb4b0ed567339446b18 14-Apr-2017 Todd Poynor <toddpoynor@google.com> init.rc: create /data/misc/reboot owned by system

Directory will be read and modified by system uid.

Bug: 37251463
Test: Manual: reboot and inspect
Change-Id: I76212f65af991ff9ad0969b9c0b8460b80fb9cd2
nit.rc
e1e6edcf336f88c643a7a3d703bd53eed9233b72 14-Apr-2017 Todd Poynor <toddpoynor@google.com> init.rc: create /data/misc/reboot owned by system

Directory will be read and modified by system uid.

Bug: 37251463
Test: Manual: reboot and inspect
Change-Id: I76212f65af991ff9ad0969b9c0b8460b80fb9cd2
nit.rc
ec1d24f522a3881558b7ec3ff50f5e63d08aa5df 14-Apr-2017 Tom Cherry <tomcherry@google.com> Merge changes Ie5ec609a,I5a2ac369,I690137b5 am: 659b78ed10 am: 01b87aac9c am: 8d9eee4f2b
am: aa85663027

Change-Id: I69be112c0020f7b4ce1a9a92c1e60e8f2941c5a9
aa85663027e8b33058842c10dc8eeac8e7ac1aaa 13-Apr-2017 Tom Cherry <tomcherry@google.com> Merge changes Ie5ec609a,I5a2ac369,I690137b5 am: 659b78ed10 am: 01b87aac9c
am: 8d9eee4f2b

Change-Id: I5cd7d00f71bfd3970189481f381629cedc358c9b
659b78ed10fb9116e5dbbf6971fc2e36ca88a465 13-Apr-2017 Tom Cherry <tomcherry@google.com> Merge changes Ie5ec609a,I5a2ac369,I690137b5

* changes:
ueventd: Fix up string handling in handle_*_device_event()
ueventd: convert mkdir_recursive() to std::string
ueventd: move subsystem logic from code to ueventd.rc
00cdc106623dc252fa3d76de6b86eed1ab3b8114 13-Apr-2017 Wei Wang <wvw@google.com> init.rc: start all 3 servicemanagers early

With the binder traffic of composer moved to vndbinder,
vndservicemanager is needed to be started early to get bootanim
displayed quickly.

Also servicemanager is required to be start early to support early
bootanim and sufaceflinger.

Bug: 37306311
Test: bootanim regression fixed
Change-Id: Ice1e05bdb3fe4e67a63a49f1db8afdb018c7b61b
nit.rc
498e500e8fc925add59c78522a3c729a54b1503d 13-Apr-2017 Jaesoo Lee <jaesoo@google.com> Merge "disable module loading after BOOT_COMPLETED broadcast" into oc-dev am: a02b1f5bed
am: 00b0b347a0

Change-Id: I62f0b7d807a96276d08d13adcd758d126a509c39
780a71e779e8e41681c3f0ee12d7f559dc52b7a7 05-Apr-2017 Tom Cherry <tomcherry@google.com> ueventd: move subsystem logic from code to ueventd.rc

Test: Boot bullhead
Test: Boot sailfish, observe no boot time regression
Test: init unit tests

Change-Id: I690137b584fcc2b9cd2dd932a2678f75a56d6737
eventd.rc
00b0b347a004a085b2552a6952c5d52cf70d8a41 13-Apr-2017 Jaesoo Lee <jaesoo@google.com> Merge "disable module loading after BOOT_COMPLETED broadcast" into oc-dev
am: a02b1f5bed

Change-Id: I7c750c9838b22cbcd9acb849c10be47ba7a50feb
20b7f78204b0c0e7991471207bac396a37515a9d 13-Apr-2017 Jaesoo Lee <jaesoo@google.com> Merge "disable module loading after BOOT_COMPLETED broadcast"
a72518f5880fdcbc45b7c3529268fa6e7d0c3202 12-Apr-2017 Tom Cherry <tomcherry@google.com> Merge "ueventd: remove /dev/log" am: 120add07ab am: 9ae606d659 am: 6c2e8b10fe
am: 6289bb1341

Change-Id: I688c8cca7ebca7f4cd86ac8d3595b6ba01be9221
6289bb1341cd1f1370dfe6da1f5b376ea5721cfe 12-Apr-2017 Tom Cherry <tomcherry@google.com> Merge "ueventd: remove /dev/log" am: 120add07ab am: 9ae606d659
am: 6c2e8b10fe

Change-Id: Ic257774710a74e72a97f4187e48587150ee3d613
dcf4d19dd9ace8b04b8659bd3e3c4803d315b3a5 10-Apr-2017 Jaesoo Lee <jaesoo@google.com> disable module loading after BOOT_COMPLETED broadcast

This CL disables module loading by writing 1 to
/proc/sys/kernel/modules_disabled when the property sys.boot_completed
is set to 1 by ActivityManagerService (at the broadcast of
PHASE_BOOT_COMPLETED).

Bug: 36515654
Test: tested on sailfish and verified that module loading is disabled in
userdebug and enabled in eng mode
Merged-In: Id38d34a6395966ab21e440614337c0cfca791ad0
(cherry picked from commit 6ed19d1675ab7a9b45d1b82c90aac2be8f408a2e)

Change-Id: I2faa459b450b3a64f854c832c6b91cbf682bbffa
nit.rc
d4ff8d83d3fcc23c07d928f8d463a54aa584e739 11-Apr-2017 Tom Cherry <tomcherry@google.com> ueventd: remove /dev/log

This was marked deprecated in 2014 and removed in 2015, let's remove
the uevent rule now too.

Test: see that logging still works on bullhead
Change-Id: Idaf3f49a1afe7046eba6c976628b9f1c8b3ec094
eventd.rc
6ed19d1675ab7a9b45d1b82c90aac2be8f408a2e 10-Apr-2017 Jaesoo Lee <jaesoo@google.com> disable module loading after BOOT_COMPLETED broadcast

This CL disables module loading by writing 1 to
/proc/sys/kernel/modules_disabled when the property sys.boot_completed
is set to 1 by ActivityManagerService (at the broadcast of
PHASE_BOOT_COMPLETED).

Bug: 36515654
Test: tested on sailfish and verified that module loading is disabled in
userdebug and enabled in eng mode
Change-Id: Id38d34a6395966ab21e440614337c0cfca791ad0
nit.rc
ec0ab6524e78d79fe6a50aebcc5154ffa8d87072 06-Apr-2017 Janis Danisevskis <jdanis@google.com> Move early_hal start to late-fs trigger action

The class early_hal is essentially for the keymaster hal which needs
to be up before vold tries to unlock a storage encryption key (FDE or
FBE). The current position is too early in the boot process, because
on devices with legacy HAL the wrapper service uses system properties
to find the legacy HAL.

This patch moves the start of the early_hal class to the late-fs trigger
action which runs right after the system property action.

Test: Manually tested and update tested on bullhead, sailfish, and
another device.
Bug: 35764921

Change-Id: I34b45b85f8450e9ef18861535fdb2ee963df8c9b
(cherry picked from commit 1ad8d21947ae41bfb912f959fa8b93e7c86052fb)
nit.rc
71132a8608b51ea83af9a8a763ca36d2fc43cdf6 07-Apr-2017 Janis Danisevskis <jdanis@google.com> Merge "Move early_hal start to late-fs trigger action" into oc-dev am: 9cadfde2d6
am: a074e16357

Change-Id: I4dc06d4929a68a5ad1d8dc1386876e8d772802e5
1ad8d21947ae41bfb912f959fa8b93e7c86052fb 06-Apr-2017 Janis Danisevskis <jdanis@google.com> Move early_hal start to late-fs trigger action

The class early_hal is essentially for the keymaster hal which needs
to be up before vold tries to unlock a storage encryption key (FDE or
FBE). The current position is too early in the boot process, because
on devices with legacy HAL the wrapper service uses system properties
to find the legacy HAL.

This patch moves the start of the early_hal class to the late-fs trigger
action which runs right after the system property action.

Test: Manually tested and update tested on bullhead, sailfish, and
another device.
Bug: 35764921

Change-Id: I34b45b85f8450e9ef18861535fdb2ee963df8c9b
nit.rc
2ad7aafa235ddd00c971f256f592baf852ba2bc2 05-Apr-2017 Steven Moreland <smoreland@google.com> Merge "init.rc: add class_start early_hal" am: 7bbd2a5290 am: 795eb840a7 am: 4bf15ab6b5
am: 53ae57e0bf

Change-Id: I10c10cfde7c6f4ffeabcad04eb738b62dfcbb831
53ae57e0bf17fa992db6be0f7da84814b6cfcd73 05-Apr-2017 Steven Moreland <smoreland@google.com> Merge "init.rc: add class_start early_hal" am: 7bbd2a5290 am: 795eb840a7
am: 4bf15ab6b5

Change-Id: Ieae51492b03168b13224c252d075c03c8f80942d
38b573598743e93de663722a2abf60fbf49d2f91 29-Mar-2017 Steven Moreland <smoreland@google.com> init.rc: add class_start early_hal

This class is used to start hals which are required in order to mount
data (for instance keymaster).

Test: works to start early_hal in internal
Bug: 36278706
Change-Id: If06908135e59b187683d8cf4cc4a00b490559081
(cherry picked from commit 5d56bad4bde0168fb00da666cb136ff8f6d51b0f)
nit.rc
5d56bad4bde0168fb00da666cb136ff8f6d51b0f 29-Mar-2017 Steven Moreland <smoreland@google.com> init.rc: add class_start early_hal

This class is used to start hals which are required in order to mount
data (for instance keymaster).

Test: works to start early_hal in internal
Bug: 36278706
Change-Id: If06908135e59b187683d8cf4cc4a00b490559081
nit.rc
1e667f1e1947914f4e776506c67e6ca4d0cc4b88 04-Apr-2017 Martijn Coenen <maco@google.com> Merge "Add /dev/vndbinder to ueventd.rc" into oc-dev am: 026d17dab3
am: 92b49c03b5

Change-Id: I5d6d3f65a3f6cd66f503c6e915bb9e5404ed8bac
62c5b47b9f0ceb4216ff740c90f17536c7764b9a 04-Apr-2017 Martijn Coenen <maco@google.com> Add /dev/vndbinder to ueventd.rc

Bug: 36052864
Test: vndservicemanager can access /dev/vndbinder
Change-Id: I208ae91e722185f015fe8f0047c54087be6d21a2
eventd.rc
4542eda998e475d6b820d23fbbbd588b6da2388e 03-Apr-2017 Andreas Gampe <agampe@google.com> ASAN: Fix ASAN directory in asan_extract.sh

Move things over to the new layout.

Bug: 36458146
Test: m && m SANITIZE_TARGET=address SANITIZE_TARGET_SYSTEM=true
Change-Id: I4dba269f82e4f88e39f926c6c2dd3c5efa07b2a1
san_extract.sh
df5496aa65c3a890c6bb584f052c97324330b9ca 22-Mar-2017 Andreas Gampe <agampe@google.com> ASAN-Extract

Add init script and shell script to unzip a tar containing ASAN
libraries on boot.

Bug: 36458146
Test: m && m SANITIZE_TARGET=address
Test: manual (build steps for tar missing)
Change-Id: I1bcf332f86c5bf2e0333cbe3def684999c1002f8
ndroid.mk
san_extract.rc
san_extract.sh
aaeb7923124790fd1971dc59f69bef0d0b113031 28-Mar-2017 Tom Cherry <tomcherry@google.com> init.rc: launch update_verifier with exec_start

This allows update_verifier to raise it's priority and ioprio.

Bug: 36511808
Bug: 36102163
Test: Boot bullhead
Test: Verify boottime decrease on sailfish
Change-Id: I5710c6a98dc7acee9063d1fa1d1c80668f0f1528
(cherry picked from commit 1e2d8c7fce132773da8058f7210c0d990c4cb1a9)
nit.rc
61c5bdf6de706f211a5bb06fa5c3e277f55f9912 29-Mar-2017 Tom Cherry <tomcherry@google.com> Merge changes from topic 'exec-start-update-verifier' am: 8772b3686e am: 571cb53797
am: 5b591daf83

Change-Id: I9b6a559f4295dd25e84d17e89d93ee0cb3c3a7f2
1e2d8c7fce132773da8058f7210c0d990c4cb1a9 28-Mar-2017 Tom Cherry <tomcherry@google.com> init.rc: launch update_verifier with exec_start

This allows update_verifier to raise it's priority and ioprio.

Bug: 36511808
Bug: 36102163
Test: Boot bullhead
Test: Verify boottime decrease on sailfish
Change-Id: I5710c6a98dc7acee9063d1fa1d1c80668f0f1528
nit.rc
da48f4938a75abc9672b9b70ad867618fbdd11f3 27-Mar-2017 Steven Moreland <smoreland@google.com> Merge "Revert "Revert "Start hwservicemanager earlier.""" am: ca622b4e78 am: e326cb121e
am: 352b3d737c

Change-Id: I7cb77ed1a7e4d7d8cee945a1ddee0c448f350452
ca622b4e78cd6ddc8b7d10a5acc9f685b3f11c04 27-Mar-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Revert "Revert "Start hwservicemanager earlier."""
0bc3add41b366819149405e571c3a718a340f1cb 25-Mar-2017 Dimitry Ivanov <dimitry@google.com> Merge "Add ld.config.txt to /system/etc" am: d444f8663d am: e6f9497cca
am: 7bbe56c46b

Change-Id: I17bd0af0e7acdb8f4cea33c29812825ec78d5f3f
d444f8663daf935c2bc34bd42f329bace2edb05c 25-Mar-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Add ld.config.txt to /system/etc"
d627502bb074e8982cb86ce86de5fb3e35b310d1 24-Mar-2017 Steven Moreland <smoreland@google.com> Revert "Revert "Start hwservicemanager earlier.""

This reverts commit 5011270225b7b61cd485cb67f694d15d8570a0e1.

Now starting even earlier.

Reason for revert: Needed change, reverted b/c broken device.

Bug: 36278706
Test: original DOA device boots
Test: angler, bullhead, fugu, marlin, ryu
Test: all these devices boot with wipe
Test: all these devices boot with w/o wipe
Test: lshal shows all included services

Change-Id: Ic639aedf7834b1bd3a26d23d109727f5559317e9
nit.rc
7d8408663933c517ce7500e33f299c45096cbfc0 24-Mar-2017 Thierry Strudel <tstrudel@google.com> Merge "Revert "Start hwservicemanager earlier."" am: 3ba313597d am: 263cf5c8d9
am: ea6de14c5e

Change-Id: Ia0b57d328df2fc47e7f5dee35930e43bb514c4f5
3ba313597d82f9b69142c8526440727477904d2e 24-Mar-2017 Thierry Strudel <tstrudel@google.com> Merge "Revert "Start hwservicemanager earlier.""
5011270225b7b61cd485cb67f694d15d8570a0e1 24-Mar-2017 Steven Moreland <smoreland@google.com> Revert "Start hwservicemanager earlier."

This reverts commit 9e363311743f6a33d642f715d8a16b53b4ee9304.

Reason for revert: a DOA device

Bug: 36546734

Change-Id: I0456247d362fe43b8c37623d04432eb494f68f68
nit.rc
5659c9cf1d882476a56100020fafde3a7d02d4ab 23-Mar-2017 Jeff Vander Stoep <jeffv@google.com> Merge "Create dir in /data for vendor customization" am: c39a31f002 am: bfc4da8369
am: bc4d384d49

Change-Id: Ic14d961fb28c1cbad6a2082a321a679580a69d2c
c39a31f002d291607126bd27b846408ee7030c04 23-Mar-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Create dir in /data for vendor customization"
61efb0dab850a2ac76216e28cc05392a1398276d 23-Mar-2017 Jeff Vander Stoep <jeffv@google.com> Create dir in /data for vendor customization

Vendor owns /data/vendor.

HAL data must go in /data/vendor/hardware/.

Bug: 34980020
Test: build and boot AOSP Marlin. Observe /data/vendor and
/data/vendor/hardware exist and are empty.
Change-Id: I6fe96e3c76a10a5eb480ba10e10d4d006de56c12
nit.rc
2b9a3391d0928f49d264d920e6ba0288e2e83e44 23-Mar-2017 Steven Moreland <smoreland@google.com> Merge "Start hwservicemanager earlier." am: fcd509298d am: 0a85db775e
am: 6c546660d9

Change-Id: Ifd4e04fef289f8ece3884434efa1a3c6d47890fa
fcd509298db10df8badbd15a1b9d44a8be946a2c 23-Mar-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "Start hwservicemanager earlier."
9e363311743f6a33d642f715d8a16b53b4ee9304 22-Mar-2017 Steven Moreland <smoreland@google.com> Start hwservicemanager earlier.

Also start hals where hwservicemanager was started before.

Bug: 36278706
Test: internal marlin+angler boots
Change-Id: Ia55d2ef747fcbd086a09e1bb856824b14343118b
nit.rc
33a55b3d52836dd84333e665685206b21fbf0734 22-Mar-2017 Wei Wang <wvw@google.com> init.rc: remove bg_non_interactive cgroup am: a27a91a5fd am: 20943abad0
am: 7d4d63ca18

Change-Id: I5c1d3a860c64dae63be5edcc91734805863d6f85
a27a91a5fd23730c9ef0af751cddf119d869e029 20-Mar-2017 Wei Wang <wvw@google.com> init.rc: remove bg_non_interactive cgroup

We have seen cases when threads in this cgroup not scheduled for more than
a few seconds in heavy workload situation and causing device freeze.
In Linux, multiple threads placed in ROOT cgroup cause the CPU resource to
be split per thread, rather than per group.
Currently we have many threads in ROOT cgroup, which makes threads in
bg_non_interactive cgroup to have "tiny" CPU resource other than 5%
quota defined.

Bug: 34193533
Test: on marlin
Change-Id: I7721f6196560fbedf6265e8b6db130cec9edefd7
nit.rc
ee34aecafef5f0d0c3dc6574f8cf99b3171d5bab 15-Feb-2017 Dimitry Ivanov <dimitry@google.com> Add ld.config.txt to /system/etc

This file describes how loader should set up
default namespace for different kind of binaries.

Note that vendor and some of system binaries are
not yet ready for this config to be enabled - they
rely on libraries they shouldn't be relying upon.

Bug: http://b/30435785
Test: m
Change-Id: I7d5853a6b55db169be1dc2c38cc682711bf7f7f5
tc/ld.config.txt
13b8bd01756e3f61bd04735751eb2088744a91f1 16-Mar-2017 Jeff Vander Stoep <jeffv@google.com> Merge "init-debug.rc: don't mount debugfs" am: 54e7365fee am: 9a1ed6106d
am: 038a906997

Change-Id: Ie32933ee52b6b81c3b51adfbe93cf176b3805198
082807f3b4b55c83afe48219e8745945279c96a8 15-Mar-2017 Jeff Vander Stoep <jeffv@google.com> init-debug.rc: don't mount debugfs

Motivation:
1. Reduce skew between userdebug and user builds.
2. Make the decision to mount debugfs on debug builds on a
per-device basis.
3. Prepare to not mount it at all to reduce the attack surface
of the kernel, reduce boot time, and free up memory.
4. Remove the selinux denial on devices that mount twice, i.e.
unconditionally in the device specific .rc file and in the
init-debug.rc file.
avc: denied { mounton } for path="/sys/kernel/debug" dev="debugfs"
ino=1 scontext=u:r:init:s0 tcontext=u:object_r:debugfs:s0
tclass=dir permissive=0

If desired, debugfs may be mounted in device specific rc files
instead.

Bug: 31856701
Bug: 35197529
Test: Build and boot Marlin. Selinux denial no longer observed.
Change-Id: Ie0d954f77f7cf70ed2b94f67a57a6c9eba45ba8e
nit-debug.rc
a44f638a018d93a80334c13a1397c8ff810e3354 11-Mar-2017 David Lin <dtwlin@google.com> Merge "init.rc: enable ledtrig-transient support for vibrator" am: 75b66a6f2a am: 64af4183a1
am: f357e1989a

Change-Id: I98daea756aceeaeaca099bfb6dd668c68c58a8dd
75b66a6f2a8df72c98e6290435438c67f6c23081 11-Mar-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "init.rc: enable ledtrig-transient support for vibrator"
19c4f38402020e520c41302868cf99cae52e68a3 10-Mar-2017 Andreas Gampe <agampe@google.com> Merge "ASAN: Separate SANITIZE_LITE from asan.options" am: e7195be772 am: ee7be79816
am: df13a9e51e

Change-Id: Ia3f1b5b5a7ecac19658da9b1700d9f860f3005ae
21bb2e0388059dce89e9767de0d52f580081497d 10-Mar-2017 Andreas Gampe <agampe@google.com> ASAN: Separate SANITIZE_LITE from asan.options

Add SANITIZE_LITE_SERVICES to drive usage of asan.options for a
large set of native services.

Test: m SANITIZE_TARGET=address SANITIZE_LITE=true
Test: m SANITIZE_TARGET=address SANITIZE_LITE=true SANITIZE_LITE_SERVICES=true
Change-Id: I84458dcc1b193b762daeb3004cf6c49e2fd8fae2
ndroid.mk
8c1e3292a83d01dc86bc919514e31c5ee2d13e89 10-Mar-2017 Wei Wang <wvw@google.com> Merge "init.rc: make sure netd start after post-fs-data" am: f58280e7dc am: 449b59873f
am: 07ace62093

Change-Id: I68103aafa9a23e0bf177d91544e4fbd743d222e4
bae9ba340267225438900654a05bd1113998ecfb 09-Mar-2017 Wei Wang <wvw@google.com> init.rc: make sure netd start after post-fs-data

Current init doesn't order the triggeres it scaned, and there is no
guarantee that general event trigger exec first and then event+property
triggers.

This CL will make sure netd started after post-fs-data trigger is done.

Bug: 35110957
Test: marlin boots
Change-Id: I7bb55af4e00f336682388abfa8a06eac2136b7d4
nit.rc
27b2c1e678468d5001f1540c78ada9ba2d1e236e 09-Mar-2017 David Lin <dtwlin@google.com> init.rc: enable ledtrig-transient support for vibrator

This change makes the init process to always attempts to enable
transient trigger for vibrator. This allows the exported properties to
change the ownership later at the on boot stage.

Test: device vibrates with the driver supports ledtrig-transient

Change-Id: If5eb7b7feaefe803f2ead634fbe4fc7b48da84ea
Signed-off-by: David Lin <dtwlin@google.com>
nit.rc
36baabf07bc83f6ba2c855d53f6b3157bd04cc8b 09-Mar-2017 Wei Wang <wvw@google.com> Merge "init.rc: start netd and zygote early for file based encryption devices" am: 4bf2bc078f am: 1a65e43878
am: 3b272c7bf8

Change-Id: Ie44f4fd8a04b1fa1d0a5c6f7e01410246589c9d9
d08467f341254f2c2f3a93319c6e6f6efc23594f 05-Mar-2017 Jesse Hall <jessehall@google.com> Add NDK libsync to linker whitelists

Test: make
Change-Id: Idb9ddfce7032a3faef7213327d3160968d4a80ba
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
7f32aa4d046ad8573d6b636b0dfb010a2ea2d28f 08-Mar-2017 Wei Wang <wvw@google.com> init.rc: start netd and zygote early for file based encryption devices

Bug: 35110957
Test: marlin boots
Change-Id: Ibe4c413e41fcf25a68b50d99ee66d9b70706a6a1
nit.rc
43a356d2137fdac0b0077df0dc1f62c98e7de2aa 08-Mar-2017 Wei Wang <wvw@google.com> Merge "init.rc: add a new zygote-start trigger" am: 4e5e797d26 am: 0d9416ba2e
am: 2980bc1139

Change-Id: I56e6907db4063f6b527be710b00de9200aa8914a
4e5e797d26272dc08b6336def8d7878443881f0e 08-Mar-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "init.rc: add a new zygote-start trigger"
a2058036ed70cac9943885cef0581cab6d14c058 08-Mar-2017 Wei Wang <wvw@google.com> init.rc: add a new zygote-start trigger

Bug: 35110957
Test: marlin boots
Change-Id: I12b41588371486e79938df2f7a2152cda18530d1
nit.rc
ae31fd48b073549cbd040f1cf243cd55997b724a 08-Mar-2017 David Lin <dtwlin@google.com> Merge "init.rc: remove duplicated chown entry for timed_output" am: e88882e16e am: 9c23fcbcd9
am: 197b3f736c

Change-Id: I4a87933290c31305b03fbcaa5c719503d8928b32
489450abe38a225db60b90a0f30f644c95a730ba 08-Mar-2017 David Lin <dtwlin@google.com> init.rc: remove duplicated chown entry for timed_output

Test: build

Change-Id: Ib15be4188cdce270a15bd90304be0704d9e54cbf
Signed-off-by: David Lin <dtwlin@google.com>
nit.rc
f77e32cb6f3cc8048784c48d7677e5507dbb0eb9 03-Mar-2017 Mathias Agopian <mathias@google.com> add libnativewindow to the linker whitelist

Test: compile
Bug: treble
Change-Id: I59c614ef045dad79e68bbf6fe86f786ecd14ce78
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
a4f5d12b7155ec815fe6e1edbdb2f0fd79469c2e 01-Mar-2017 Ryan Campbell <ryanjcampbell@google.com> Merge "Add global GCOV_PREFIX option." am: df0f792a9e am: 2d3378350a
am: 11339c7e34

Change-Id: I10d53220ea5e433ae0f027bf21750a239a588e9c
0b364732723e5dcecc1a74a4f592e8afcbadd2ba 22-Feb-2017 Ryan Campbell <ryanjcampbell@google.com> Add global GCOV_PREFIX option.

When native coverage is enabled, add a global GCOV_PREFIX
environment variable specifying that gcda files be output
with path prefix /data/local/tmp.

Bug: 35635587
Test: make NATIVE_COVERAGE=true; check init.environ.rc
Change-Id: I40972aea3ca3168d0687bdc93e9d4b7b3a1071b9
ndroid.mk
nit.environ.rc.in
nit.rc
330eb9e33aeb9f88300c4eec334c995006579b25 21-Feb-2017 Michael Wright <michaelwr@google.com> Merge "Revert "Only allow system to write to existing input nodes."" am: 05009d9336 am: 8eef0a5dfb
am: ba1f83d70c

Change-Id: Iac642c0e1e78f09302f3954b0d779e15c73fae4c
14667c19cdf8fa4b9fb6661cdd610f60556a4f5d 21-Feb-2017 Michael Wright <michaelwr@google.com> Revert "Only allow system to write to existing input nodes."

This reverts commit 344e929e6d8cc2925e55d7f72262002fcc181f52.

Bug: 35301292
Change-Id: Ib6805c986c0aa88d14652de59ad4602b1cce8b56
eventd.rc
59e8e07c89682dc730558c58130717a298227e15 16-Feb-2017 Narayan Kamath <narayan@google.com> Merge "Revert "Revert "Lazily preload secondary zygote resources."""
f403e64bd055a538ab93e27a2b503168da0d25c6 07-Feb-2017 Narayan Kamath <narayan@google.com> Revert "Revert "Lazily preload secondary zygote resources.""

This reverts commit b248cb469a18e00131338b300f8b344aac52fcb5.

Test: manual
Bug: 34810190
Change-Id: I999e759a5681a58962aa5a0783946c15237bf45c
nit.zygote64_32.rc
47876633227b178df843e1a470ac66c7c6d06fc3 14-Feb-2017 Narayan Kamath <narayan@google.com> Merge "Reapply 13398711387e9ce1: Only apply schedTune boost to top-app tasks" am: dce4b65fe0 am: 9babb434ed am: 321a861b79
am: dd950ba9d4

Change-Id: I5b247c8fcbc76f9c36a203011fb693bafab7eb6c
eeabbeba161a83fb9b664fc8136c5ed625ec7b9d 13-Feb-2017 Narayan Kamath <narayan@google.com> Reapply 13398711387e9ce1: Only apply schedTune boost to top-app tasks

Parts of this change were accidentally reverted by an incorrect
manual merge conflict resolution.

Bug: 35306127
Test: manual
Change-Id: I8e6d6b07dcaa548775213dd42ba9def7431c62d3
nit.zygote32_64.rc
nit.zygote64_32.rc
1cf50050e636f43e8c57cce38d76ccf8efd40120 10-Feb-2017 Todd Poynor <toddpoynor@google.com> Merge "init.rc: create /data/misc/reboot for storing reboot reason" am: e499403bf4 am: 4dbefe4d4c am: 23b31ba7e3
am: 0561551951

Change-Id: I5ea693f7f34903305e34391fcd7d7a7174c2ffd8
44ee2b0ef84b10f19f77e21a16141a2e7c931d9c 08-Feb-2017 Todd Poynor <toddpoynor@google.com> init.rc: create /data/misc/reboot for storing reboot reason

Create /data/misc/reboot if not already.

Bug: 30994946
Test: manual: reboot command; modified thermal-engine.conf
Change-Id: I66418beba539f76759b44742af7700f26a2c1f87
nit.rc
73b4f8aeed2094e9ec14c616b750b95fa3ddccac 10-Feb-2017 Phil Burk <philburk@google.com> libaaudio: changed name from liboboe

Bug: 34749573
Test: CTS test_aaudio.cpp
Change-Id: Ic95f21fcaf0f13e09f57dfb612d5bcc4755f447b
Signed-off-by: Phil Burk <philburk@google.com>
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
344e929e6d8cc2925e55d7f72262002fcc181f52 19-Jan-2017 Michael Wright <michaelwr@google.com> Only allow system to write to existing input nodes.

This prevents the shell user from injecting input as if it were coming
from an existing input device, which in turn makes it easier for malware
/ abuse analysis to detect when someone is injecting input via the
command line vs a real user using a device.

(cherrypick of 95637eb2a332b9a09914b1bf32c10fccfba4a175.)

Bug: 30861057
Test: ran getevent, saw correct output, played with device
Change-Id: Ib53eea1b7767f25510b5d36fe6109101a9fad8e0
eventd.rc
f437ace00dac4cff0d65c0adf6ca334f37f6144f 09-Feb-2017 Michael Wright <michaelwr@google.com> Merge "Only allow system to write to existing input nodes."
f3d891031ef0c0687224c98aa0e6ca9d55758858 10-Nov-2016 Narayan Kamath <narayan@google.com> Revert "Lazily preload secondary zygote resources."

This reverts commit e5aee79e9cd54703d8da9b1466d3e3c25ba0a44a.

Given recent improvements to boot timing, and higher paralellization,
the lazy preloading of zygote resources makes boot time slightly slower
by ~100-250ms. Therefore, the change is being reverted until we can do
it properly and defer it to a later point in the boot process. This work
is being tracked by b/34810190

BEFORE
------
successive-online : 17290.0,17633.0,17329.0,17655.0,16802.0,16888.0,17645.0,17369.0,17572.0,16932.0,
successive-online_avg : 17311.5
successive-boot : 24834.0,25119.0,25122.0,25091.0,25617.0,25535.0,25047.0,27462.0,25088.0,25648.0,
successive-boot_avg : 25456.3

AFTER
-----
successive-online : 16973.0,16530.0,17015.0,17953.0,17367.0,17098.0,16887.0,17377.0,18039.0,16742.0,
successive-online_avg : 17198.1
successive-boot : 24921.0,25622.0,25781.0,25449.0,25128.0,24774.0,24554.0,25029.0,24544.0,25809.0,
successive-boot_avg : 25161.1

Test: Boot timings collected with tradefed harness.
Bug: 34810190
Change-Id: I9a6dd5ce31bda067e74fc088b057711fa4a7a0fb
nit.zygote64_32.rc
314bb2faf2afb763b68b3c74577a40c2c70f8276 26-Jan-2017 Steven Moreland <smoreland@google.com> Merge "init.rc, typo: fs-post-data -> post-fs-data" am: 5b202c4376 am: e0ac5d8304 am: 311e4295dc
am: 06e9f5de8c

Change-Id: I1525db8d43c3c27fe7ae1b17dd97a99f28321c13
f38aab462179dea763207c5e7abc975a8302f82e 25-Jan-2017 Steven Moreland <smoreland@google.com> init.rc, typo: fs-post-data -> post-fs-data

Test: pass
Change-Id: Icafdb7ec61935b35db85096b49e7f232a456f620
nit.rc
5150a8fb85d4cc63f8d0bf786d0702b23efdb5a5 24-Jan-2017 Josh Gao <jmgao@google.com> Actually don't start tombstoned until /data is mounted. am: 0ad5107e51 am: 1170d8201d am: bf8bd27bb3
am: 32d18e2204

Change-Id: I45fe22d5b83e6399aadc374976986e7f660d9eba
0ad5107e51cb71c78a6de02cab2835ba9c1ae61d 24-Jan-2017 Josh Gao <jmgao@google.com> Actually don't start tombstoned until /data is mounted.

Bug: http://b/34461270
Test: boot is actually faster
Test: tombstoned still started by init
Change-Id: I4976abef108bbb6fad264f9b68cbc1fba711085b
nit.rc
95637eb2a332b9a09914b1bf32c10fccfba4a175 19-Jan-2017 Michael Wright <michaelwr@google.com> Only allow system to write to existing input nodes.

This prevents the shell user from injecting input as if it were coming
from an existing input device, which in turn makes it easier for malware
/ abuse analysis to detect when someone is injecting input via the
command line vs a real user using a device.

Bug: 30861057
Test: ran getevent, saw correct output, played with device
Change-Id: Ib53eea1b7767f25510b5d36fe6109101a9fad8e0
eventd.rc
8c98938853678e7847a9ed0561d7223e6e764f5c 20-Jan-2017 Josh Gao <jmgao@google.com> Merge "init: don't start tombstoned until /data is mounted." am: b479a5002e am: f83489c02c am: d7db8378d0
am: 5d6ea5a9bd

Change-Id: I5ad79b54f9f42e6b04d81ca8123e5b41b03e92fb
b479a5002e99e7454ed07d7b4631704d4c611193 20-Jan-2017 Treehugger Robot <treehugger-gerrit@google.com> Merge "init: don't start tombstoned until /data is mounted."
42a0fed78b761ab06f220786c29f51459265bdec 20-Jan-2017 Josh Gao <jmgao@google.com> init: don't start tombstoned until /data is mounted.

When vold mounts the encrypted /data partition, it first checks for and
kills processes that have open fds to the tmpfs placeholder at /data.
This resulted in a 20 second boot-time regression (vold's timeout period)
when tombstoned was started before vold.

Bug: http://b/34461270
Test: boot is faster, no messages from vold in console spew
Test: tombstoned still started by init
Change-Id: Ib5e9ddb05f40c9da852f00e103861c6ff2d94888
nit.rc
4b499a1b137a7aa1aeb0d92e5402e1e91fd68baa 20-Jan-2017 Dave Weinstein <olorin@google.com> Merge "Move the kptr_restrict setting from init.rc to init.cpp." am: c734a0a9ee am: 776978788b am: 7e79a571fd
am: a69b7ea3a4

Change-Id: Iabde07f1c50e62b5394386f5718ae5a3d40e7c3b
44f7e4f42190fdb5309b818d5acc0ff6b0f87249 20-Jan-2017 Dave Weinstein <olorin@google.com> Move the kptr_restrict setting from init.rc to init.cpp.

Also ensure that it uses the highest supported value, and
abort if the value is not above a minimum threshold.

Test: Tested against the curent kernel (maximum value of 2,
set to 0 by the kernel initially) and against a
modified kernel (maximum value of 4, set to 4 by the
kernel initially)

Bug: 30368199
Change-Id: I608db577258b68b390ffe96f452e1f7c0bc9ad8a
nit.rc
9450e741d373239c27b46cc990ad151978080de1 18-Jan-2017 Winter Wang <wente.wang@nxp.com> Merge "init: usb: fix audio_source function typo" am: 56098eed3b am: 6a5f085288 am: 8aefa0a8f3
am: 912ea6bb10

Change-Id: I48933d7b08d2bb2f2a108ddb20f25d85e5fb5c88
60c763ed52004a3c2330fd8ab7c5b2b6968e7822 06-Jun-2016 Winter Wang <wente.wang@nxp.com> init: usb: fix audio_source function typo

for audio_source function instance, there exist 2 function name here:
"audio_source.gs2" and "audio_source.gs3"
I believe this usb accessory audio name "audio_source.gs2" is a typo,
as there is no need to create another audio_source instance.

Test: Manual

Change-Id: I70b513db474632eb990131c285c8d5105c17970f
Signed-off-by: Winter Wang <wente.wang@nxp.com>
nit.usb.configfs.rc
2af02ff24fc803df70eb82d709c0b7f6afdc3333 12-Jan-2017 Josh Gao <jmgao@google.com> Merge "adb: remove support for legacy f_adb interface." am: 72d4c42cd5 am: 6865111e9c am: 5e0caf8d1b
am: bb7261421d

Change-Id: I7ef24f4fd1d4d951d293ff19eeeb8f16bd4188d0
72d4c42cd548b1e852fa6bda9abad3f9705aaf6c 12-Jan-2017 Josh Gao <jmgao@google.com> Merge "adb: remove support for legacy f_adb interface."
8cf0eba307d1d715d0eff6e00eb0973db550af87 12-Jan-2017 Paul Lawrence <paullawrence@google.com> Merge "Set right attributes on tracing folder" am: 5d8bf9e6e2 am: f014e41731 am: 36eeceec84
am: 87b62dc44c

Change-Id: Ie1eeaf4d1e0dc63c80262376720abe96684a2590
3d8ade3f247f34a6b47fef75dfacdad015b6ecc7 12-Jan-2017 Paul Lawrence <paullawrence@google.com> Set right attributes on tracing folder

Since splitting tracefs out from debugfs, we now need to set the
attributes explicitly on tracing folder.

Test: Run adb shell atrace -c -b 16000 -t 5 gfx
Bug: 34197733
Change-Id: If2a962332b6d1ec227e289bdf952213756e26186
nit.rc
183b73e665a4cd369ef88c657019cd29f009672b 11-Jan-2017 Josh Gao <jmgao@google.com> adb: remove support for legacy f_adb interface.

Everything should be using the functionfs interface instead by now.

Bug: http://b/34228376
Test: grepping for f_adb, android_adb in source tree
Test: m
Change-Id: I6bc41049c49a867499832588dac8ed108c636c11
eventd.rc
67bfc5dd2c8f77ff66f9caa392e61c3b4100a489 09-Jan-2017 Wei Wang <wvw@google.com> Merge "Restart wificond when zygote died"
38fcd33e46ba2718b75b4e456700b7fca4401732 20-Dec-2016 Wei Wang <wvw@google.com> Restart wificond when zygote died

This helps to avoid tearDownInterfaces call from WiFiStateMachine's
constructor.

Bug: 33752168
Test: on device

(cherry picked from commit 0db195d0757e36c73b9da5a95d9b9986386f0f2e)

Change-Id: I55f56dd8daa5089073ff8dd424e92d09326c7d00
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
54ad10455391a40dbaa9185cb9518418eefb2410 20-Dec-2016 Wei Wang <wvw@google.com> Restart wificond when zygote died

This helps to avoid tearDownInterfaces call from WiFiStateMachine's
constructor.

Bug: 33752168
Test: on device
Change-Id: I44527ee39700c5ac3259bba3a007dde6979170ff
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
e5aee79e9cd54703d8da9b1466d3e3c25ba0a44a 10-Nov-2016 Narayan Kamath <narayan@google.com> Lazily preload secondary zygote resources.

Companion to change Id387b7132d0 in frameworks/base.

Test: manual
Change-Id: I3f50327aafddce8530a990505cd436225c5fe7a7
nit.zygote64_32.rc
815024d24e05568993985dbc4935c0f3c48da8b1 22-Dec-2016 Phil Burk <philburk@google.com> Oboe: make liboboe.so public

Bug: 30210002
Test: in frameworks/av/media/liboboe/tests

Change-Id: Id7d0b0eebf68bc5e93fc257c2f924205db57312c
Signed-off-by: Phil Burk <philburk@google.com>
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
b0aea04065409e45d788a77add95e40cbdac2295 16-Dec-2016 Elliott Hughes <enh@google.com> Merge "Improve init bootcharting." am: 4ee7861ee1 am: a6532b4717 am: 1a947725b8
am: 352b9c6282

Change-Id: I58b258cbf13bdcc874bcce35d4bb07378a8a1864
4ee7861ee1665b74b491f267636d367bbfe11dd3 16-Dec-2016 Elliott Hughes <enh@google.com> Merge "Improve init bootcharting."
9b2e2070993ab4886c7322723581272b1197db70 14-Dec-2016 Sandeep Patil <sspatil@google.com> Merge "socket: uevent: use SO_RCVBUF instead of SO_RCVBUFFORCE" am: 0a2080bced am: 571e246983 am: c345388bea
am: e432dc58c1

Change-Id: Iab5bafe3e156dfb2fc75634c8d25b5f67991915e
5fee496e6220228b4a9059e06e430178ee1ba1ec 07-Dec-2016 Sandeep Patil <sspatil@google.com> socket: uevent: use SO_RCVBUF instead of SO_RCVBUFFORCE

The SO_RCVBUFFORCE option requires the caller of uevent_create_socket()
to have net_admin capabilities.

Set platform default rcv/snd buffer sizes to 256kb that will always be
overridden by the device/target. However, it will allow
ueventd / healthd to use the uevent_create_socket() API w/o requiring
the net_admin capability.

Note: All devices override the buffer sizes according to the technology
maximum to at least ~8MB. So, the init.rc change here is to make sure
platform code can work w/o any overrides.

Test: no SELinux failures for healthd with 'net_admin' removed.

Bug: https://b/32733887

Change-Id: Ida346468cd550ad07901bf3a78ad508939849906
Signed-off-by: Sandeep Patil <sspatil@google.com>
nit.rc
a3641af22fdb0f1b3127e4d56e65c13ad108d74a 11-Nov-2016 Elliott Hughes <enh@google.com> Improve init bootcharting.

Most notably, there's no longer any need to guess an end time.

Bug: http://b/23478578
Bug: http://b/33450491
Test: rebooted with bootcharting on/off
Change-Id: Icb7d6859581da5526d77dfc5aa4d57c9bfbfd7e2
nit.rc
107b8ec454d8ef3a8096a23b6fbafe8ed5442ce3 23-Nov-2016 Nick Kralevich <nnk@google.com> Merge "change /data/bugreports to /bugreports" am: 1b2e6abf3b am: 5fae86b5fa am: cb9fbb4cf6
am: c3f9d38a4c

Change-Id: Ie10d1db864543ad6cc8695267344453599408c52
5fae86b5fa60a9af4e48745989554bf504bedc60 23-Nov-2016 Nick Kralevich <nnk@google.com> Merge "change /data/bugreports to /bugreports"
am: 1b2e6abf3b

Change-Id: I7de15de91a688f8fe4a203a84b54e7dcfa106782
c4084c669495fd1b41ce8b6568c71b1f46d26969 19-Nov-2016 Nick Kralevich <nnk@google.com> change /data/bugreports to /bugreports

It's 5 characters shorter, has no runtime costs, can be stored on a
read-only partition, and avoids problems like b/27262109 and b/27204904.
It allows makes some security hardening easier.

Bug: 27262109
Bug: 27204904
Bug: 32799236
Test: verified new symlink created and old one not present
Change-Id: Ief362e13569ad9c868a7f0f9c4dbd6a328c96c6b
ndroid.mk
nit.rc
8e22b4b9ecc3a6bdbd4bdaf1d02cb99f3485252c 20-Nov-2016 Nick Kralevich <nnk@google.com> init.rc: delete extra whitespace am: 715e33452e am: 70056e91fe
am: 6bef57560f

Change-Id: I8379eecc012dafb16e037e7fae8386df6b677303
715e33452e728855251578d918467d94666fe10a 20-Nov-2016 Nick Kralevich <nnk@google.com> init.rc: delete extra whitespace

causes merge conflicts.

Test: none
Change-Id: Ic83db2b3e2f972955efadfc8df8fe8ec918a7609
nit.rc
0705fcb2f4ecf0cf3b9799dc1741b9b6c0f8ab3a 17-Nov-2016 Paul Lawrence <paullawrence@google.com> Merge "Add flags to restorecon_recursive to traverse filesystems" am: 5fbd1cfd34 am: ffa3689107 am: a99490c813
am: e799e3317a

Change-Id: Icd4b867d450c7b84f86f9d91b39faf6792544cb1
ffa3689107d0e9c944e5d877dd8e857e1d22cb65 17-Nov-2016 Paul Lawrence <paullawrence@google.com> Merge "Add flags to restorecon_recursive to traverse filesystems"
am: 5fbd1cfd34

Change-Id: I539d7e9d441c7bb3f5602b892408a85436b857e8
a8d8434c42b27f0186be7ecd78c2acc9d459b068 15-Nov-2016 Paul Lawrence <paullawrence@google.com> Add flags to restorecon_recursive to traverse filesystems

Use to solve the problem of tracefs conditionally being mounted
under debugfs and needing restorecon'd without boot performance
penalty.

Also move skip-ce to a flag for consistency.

Test: Check that trace_mount has correct attributes after boot
Bug: 32849675
Change-Id: Ib6731f502b6afc393ea5ada96fa95b339f14da49
nit.rc
c488087aa0d13ed0b73b7fabbd65c4cd57905192 13-Jul-2016 Tianjie Xu <xunchang@google.com> Start update_verifier in cache group

Start update_verifier in cache group to avoid dac_override

Bug: 30020920
Change-Id: I227b4a0e1c07e7b9bf209b432e9db02275ffe660
Test: mma
(cherry picked from commit 1e4635f0a8c307592b015476bc69ee2da28c41af)
nit.rc
cb221cee180d9b30f5278fc24160c5deede9d739 09-Nov-2016 Sandeep Patil <sspatil@google.com> Merge changes from topic 'healthd-charger-split'

* changes:
healthd: refactor healthd code to split into 'charger' and 'healthd'
healthd: build 'charger' and 'healthd' binaries
healthd: refactor to split charger and framework facing code
6012db553c87f4f4b039a7d42e3b80ce9480f20f 01-Nov-2016 Sandeep Patil <sspatil@google.com> healthd: build 'charger' and 'healthd' binaries

This renames the old '/sbin/healthd' to '/sbin/charger'
which is to be only used in recovery and charger-only mode.

.. and adds a new dynamically linked executable in /system/bin/healthd
to be used as 'healthd' in Android.

text data bss dec hex filename
817404 36704 37960 892068 d9ca4 root/sbin/charger {was healthd}
72717 11064 12984 96765 179fd system/bin/healthd {*new*}
890121 47768 50944 988833 f16a1 (TOTALS)

Corresponding changes in recovery and charger-only .rc files are
required change how 'charger' is launched in each mode.

Update the seclable for healthd with the launch path in init.rc

Test: Boot tested and verified all 3 modes (recovery, charge-only,
android)

Change-Id: I4ada27a4c113258c5be1fd10adb0f58232b10024
Signed-off-by: Sandeep Patil <sspatil@google.com>
nit.rc
ef2479247dc9cace694854a8ba4e526cd0f1d171 07-Nov-2016 Paul Lawrence <paullawrence@google.com> Merge "Fix selinux warning on tracefs systems" am: 0ad600bdc6 am: 3915012a46 am: 67387a3510
am: a0d26e7cdd

Change-Id: I004165050ab96c3a9a7f1fbcdadf84c22b8256d9
3915012a461c2e9d77e5547c9b056e43d95bf07c 07-Nov-2016 Paul Lawrence <paullawrence@google.com> Merge "Fix selinux warning on tracefs systems"
am: 0ad600bdc6

Change-Id: Ibaab6580caf0fe216cfae72bf5d2560fec02afdf
d2abcbd0aba8197040e940d898eb8e28b9fc675d 02-Nov-2016 Paul Lawrence <paullawrence@google.com> Fix selinux warning on tracefs systems

restorecon_recursive doesn't traverse filesystem boundaries. On
tracefs systems, tracing is a separate filesystem, so restorecon
this as well

Bug: 30963384
Test: Boot hikey, and check that there are no debugfs_tracing denials in dmesg
Change-Id: I24abd3ad80d2cfdab4f64fecee799fc0c24ed238
nit.rc
9ec05b1381341e7532ff9f7f23e928f10b9a5b36 03-Nov-2016 Nick Kralevich <nnk@google.com> Merge "give zygote AID_READPROC" am: 3a724a8f5d am: d3a2573eea am: 1af7e94c93
am: ab1413013f

Change-Id: Ice5e5aaa8ef0699ecfad9840b36cb6c3ec5e0541
d3a2573eea19e0019c0a7e7c31e8625b101091d4 03-Nov-2016 Nick Kralevich <nnk@google.com> Merge "give zygote AID_READPROC"
am: 3a724a8f5d

Change-Id: Ie877330cba17a429ec3cd26eafaaeca3df66cc59
3a724a8f5d7876b97e4e7f39a0cfc2f0fdc87fd3 03-Nov-2016 Treehugger Robot <treehugger-gerrit@google.com> Merge "give zygote AID_READPROC"
f8f334966da0158eea5ba8d6e6f1aa8b462c35a6 02-Nov-2016 Steven Moreland <smoreland@google.com> Merge "Update for hidlized hwservicemanager." am: 480af3f633 am: 82c67f5662 am: b394786624
am: 0c54c1e8d6

Change-Id: I8a186016e14aa4137233fc97f949b14bac7f19cd
82c67f566203bf4812774e3154a40518a2197d62 02-Nov-2016 Steven Moreland <smoreland@google.com> Merge "Update for hidlized hwservicemanager."
am: 480af3f633

Change-Id: I2c11b0249ab77e9dc22a76f6aa66026ebf3ed00d
c21169c59f5f7571ab38cc5a2c29ff3e69bee54d 02-Nov-2016 Nick Kralevich <nnk@google.com> give zygote AID_READPROC

In zygote wrapping mode, ZygoteConnection does a check to see if the pid
reported by the wrapped process is either child process that was
forked, or a decendent of it. This requires read access to other
processes /proc files. Grant zygote AID_READPROC to allow this access.

Bug: 32610632
Test: manual inspection of /proc files to verify group.
Test: manual inspection of zygote's children to make sure they do not
inherit AID_READPROC

Change-Id: I3619a9ae33c8077e068e8024f7c7d44cfca6fb76
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
ba825ac33f280e41bf6226370029551d89b39b28 24-Oct-2016 Steven Moreland <smoreland@google.com> Update for hidlized hwservicemanager.

Bug: 32313592
Test: end to end
Change-Id: I76a7ee01413b28e95e9f19fcde90f6372502ec67
nit.rc
1797eb1f09958b4a464262b476d674c2f2559a0c 27-Sep-2016 Iliyan Malchev <malchev@google.com> init.rc: have hwservicemanager start the HAL class am: 57d66b8447 am: ad0cbcf21c am: f0099ccb23
am: 121fe849e8

Change-Id: I6cba53d417d505b56e8294afaad473399f692beb
121fe849e866b34426d5d3a60c24c0b776283d8b 27-Sep-2016 Iliyan Malchev <malchev@google.com> init.rc: have hwservicemanager start the HAL class am: 57d66b8447 am: ad0cbcf21c
am: f0099ccb23

Change-Id: I5c24ecbf89d723c478a02bcab8cffc4e9e4385e9
ac129cbaa2e36c19d85d780a089ace800b60c742 27-Sep-2016 Martijn Coenen <maco@google.com> Add hwbinder dev node permissions. am: f5110ea029 am: a2249bc1bd
am: 2008af6af5

Change-Id: I18c7c1b8b372f59f609e12a2532bd9e435e1ba81
57d66b84478ef39aa5d39c4c58f1b6b04be10993 20-Sep-2016 Iliyan Malchev <malchev@google.com> init.rc: have hwservicemanager start the HAL class

b/31458381
Test: passing build and runtime tests

Change-Id: I1d26af5ca1d0e9c7bbd97cfd88d0b432b50b7216
Signed-off-by: Iliyan Malchev <malchev@google.com>
nit.rc
f5110ea02975e9f0e0ec95332162841f99af89a4 25-May-2016 Martijn Coenen <maco@google.com> Add hwbinder dev node permissions.

b/31458381
Test: pass

Change-Id: I8ec92a29287b17636c363c55a8565dacab19043d
Signed-off-by: Iliyan Malchev <malchev@google.com>
eventd.rc
ac657cd0d2118ab19bf14bc984f81cd1624f9a81 23-Sep-2016 Ajay Panicker <apanicke@google.com> Merge "Remove net_bt_stack group and replace it with bluetooth" am: 7875407bb7 am: f924c252bd am: b0db9714bb
am: 531b201eb6

Change-Id: Ie822dd8f259f240eb457f5d67948c417f84817c6
531b201eb684512fe5f10a2e6387369cd800d66f 22-Sep-2016 Ajay Panicker <apanicke@google.com> Merge "Remove net_bt_stack group and replace it with bluetooth" am: 7875407bb7 am: f924c252bd
am: b0db9714bb

Change-Id: I025c5301fecf0566d8184efce099a195fdbfc460
604208e957ad6fb692c445b0f598579051d2071a 20-Sep-2016 Ajay Panicker <apanicke@google.com> Remove net_bt_stack group and replace it with bluetooth

Bug: 31549206
Change-Id: I667963e5f9fd1a5dc9ad74378b318e3b782e6883
nit.rc
eventd.rc
35a0ef524bc610512603c85d3337874b487d7634 20-Sep-2016 Ajay Panicker <apanicke@google.com> Merge "Allow bluetooth service to access bluetooth directory and add /logs (1/6)" am: 2c2a3f7a95 am: 3a9a16ee79 am: f5ffb20e6f
am: bf2b7a93b2

Change-Id: Iac994fa66eeb7b4e84cd72891ff7449bb51f9da3
bf2b7a93b2c1f7cc2059f590658da6af6304c0b1 19-Sep-2016 Ajay Panicker <apanicke@google.com> Merge "Allow bluetooth service to access bluetooth directory and add /logs (1/6)" am: 2c2a3f7a95 am: 3a9a16ee79
am: f5ffb20e6f

Change-Id: Ied3f4a26681d0c1e3bd72d4f1d0de77fa9e7803a
59d6a8cf8a4867a10f56b36057bffcc344715d3f 16-Sep-2016 Ajay Panicker <apanicke@google.com> Allow bluetooth service to access bluetooth directory and add /logs (1/6)

Bug: 31466840
Change-Id: I2c2766a2366600def81708d97cf3f3f13e0eb655
nit.rc
9453ea8ba9f46ebd7bb3ffb7d1feaa20908e8cc7 13-Sep-2016 Todd Kjos <tkjos@google.com> resolve merge conflicts of c6937f2 to nyc-mr1-dev-plus-aosp

Change-Id: I82638b0dab5e1b5117f4ed4752fd2cbdaf8c47b1
049f38ed6e9ffb0e2bae724bef981f5d172b81a5 08-Sep-2016 TuHailong <tuhailong@gmail.com> Fix zygote energy-aware scheduler tuning bug

Change-Id: Ib612e99f7b115c2fbd1503e0994948fd0b0a2dec
nit.zygote32_64.rc
nit.zygote64_32.rc
d90a55c4bfe56b8b40fc4876899ad2b5176a14dc 08-Sep-2016 TuHailong <tuhailong@gmail.com> Fix zygote energy-aware scheduler tuning bug

Change-Id: Ib612e99f7b115c2fbd1503e0994948fd0b0a2dec
nit.zygote32_64.rc
nit.zygote64_32.rc
d61a7e2da4e6184797f866abf8020bfe3b928ab0 23-Aug-2016 Wei Wang <wvw@google.com> Split fstab mount into 2 phases

This will make it possible to start some key services before mounting
data partition

Bug: 30118894
Change-Id: Ia9f8cc035de6cc0df9a61605864915efa0266d7f
(cherry picked from commit abfbec342fdd2fc9d139a88a2d950953918e1b4e)
nit.rc
254f44363b85f4665b1942762a708bf87301a462 23-Aug-2016 Wei Wang <wvw@google.com> Split fstab mount into 2 phases

This will make it possible to start some key services before mounting
data partition

(cherry picked from commit abfbec342fdd2fc9d139a88a2d950953918e1b4e)

Bug: 30118894
Change-Id: Ia9f8cc035de6cc0df9a61605864915efa0266d7f
nit.rc
abfbec342fdd2fc9d139a88a2d950953918e1b4e 23-Aug-2016 Wei Wang <wvw@google.com> Split fstab mount into 2 phases

This will make it possible to start some key services before mounting
data partition

Bug: 30118894
Change-Id: Ia9f8cc035de6cc0df9a61605864915efa0266d7f
nit.rc
9acbbbddc91c9b5709e1a9c3d682deae64d0bd80 17-Aug-2016 Andreas Gampe <agampe@google.com> Asan.options: Use abort_on_error am: 67b7e85b18 am: 4f31cff93b
am: bdbe675fa1

Change-Id: I4f9c8b507e9f5fc84790eac8c2cc6d65aed8d5f8
bdbe675fa1652eaeb92ab2cc44e676356f5215a8 17-Aug-2016 Andreas Gampe <agampe@google.com> Asan.options: Use abort_on_error am: 67b7e85b18
am: 4f31cff93b

Change-Id: I8c06aea3ede9f93493aa905ceb0c363e8abc3c1f
67b7e85b1868392526def50c1ec20e53af348aa0 17-Aug-2016 Andreas Gampe <agampe@google.com> Asan.options: Use abort_on_error

Use abort to have debuggerd act and create a tombstone.

Bug: 30775464
Change-Id: I359c7c7c094880b7b55304cd2aa3f4b360b729d8
san.options
d80cd744264e81040d3d7a94b8fbb7c2ab31000a 11-Aug-2016 Badhri Jagan Sridharan <Badhri@google.com> Remove redundant action triggers on persist.sys.usb.config am: 05e04a134e am: ab5c247b0d
am: 9306e7c17a

Change-Id: Ifc8ae396e1401cafc37709f88b34601d1ed37953
9306e7c17ac71c3ce3f9a984714ab92bd9c470d5 11-Aug-2016 Badhri Jagan Sridharan <Badhri@google.com> Remove redundant action triggers on persist.sys.usb.config am: 05e04a134e
am: ab5c247b0d

Change-Id: I470da113930539b5ae0ad4a706c8dfe080a52ee2
05e04a134e2a7f854f99186306c8033e02328fc0 01-Aug-2016 Badhri Jagan Sridharan <Badhri@google.com> Remove redundant action triggers on persist.sys.usb.config

persist.sys.usb.config stores the usb functions which need to be enabled
when the phone boots up. When the phone is actually booted, setting this
would also activate the following action trigger on sys.usb.config

From init.usb.rc:
Used to set USB configuration at boot and to switch the configuration
when changing the default configuration
on property:persist.sys.usb.config=*
setprop sys.usb.config ${persist.sys.usb.config}

sys.usb.config is anyways set to the actual functions by UsbDeviceManager
once it is set to none. Therefore add "on boot" condition to the above
action trigger so that persist.sys.usb.config does not race with
sys.usb.config.

BUG: 30440213
Change-Id: I3333d0b8334fb627469c7faad250bf3151bb1ebf
nit.usb.rc
451dc52cb9261fd5c4dfd393314f816be84302cb 29-Jul-2016 Amit Pundir <amit.pundir@linaro.org> Merge \\\\"init: usb: delete rndis func to unregister n/w interface\\\\" am: 060b15e20a am: 6d287b3de7 am: e2f4d9e770
am: 9c23e55189

Change-Id: I7541b31811680cfdf85432a11880623fcc6142a8
9c23e551893fc6b944680d6dc002144bdc321607 29-Jul-2016 Amit Pundir <amit.pundir@linaro.org> Merge \\\"init: usb: delete rndis func to unregister n/w interface\\\" am: 060b15e20a am: 6d287b3de7
am: e2f4d9e770

Change-Id: I10e03cad4cb026c86ce5882f6c25829830bf8d9f
6d287b3de7245061d7917852063064bbf281ed57 29-Jul-2016 Amit Pundir <amit.pundir@linaro.org> Merge \"init: usb: delete rndis func to unregister n/w interface\"
am: 060b15e20a

Change-Id: I26e6e414f81fdee55fdfeb017ac0c4f5b0941eea
e90c3da3abeaf5870d7282b82a69299f4350ccda 25-May-2016 Martijn Coenen <maco@google.com> Add hwbinder dev node permissions.

Change-Id: I8ec92a29287b17636c363c55a8565dacab19043d
(cherry picked from commit e029e7c03dd798e70b5c3e5efdffb84c7f64a417)
eventd.rc
aae7b4984c6a136bc6eb3716673dcbd0a5101f51 07-Jun-2016 Amit Pundir <amit.pundir@linaro.org> init: usb: delete rndis func to unregister n/w interface

Rndis n/w interface "usb0" registration/deregistration is broken. If a
user try to switch to other functions or disable usb tethering or unplug
the usb cable then it doesn't kill "usb0" interface.

Fix is to delete Rndis function to unregister tethering interface when
switching from tethering to other functions or disable/unplug the
tethering cable. If we don't do that then the rndis netdev interface
will never be freed or unregistered.

This also means the rndis function has to be created everytime user
enable tethering function from Settings instead of creating it at
"on boot" in init.$hardware.usb.rc like we do currently. A relevant fix,
Change-Id: Icb49020d624fb21ef2607d473948cbbf3b9cc469, for reference has
already been submitted for device/linaro/hikey

Change-Id: If1f922e02277cccdc8c0b263be63989ee102cc80
Reported-by: Winter Wang <wente.wang@nxp.com>
Signed-off-by: Amit Pundir <amit.pundir@linaro.org>
nit.usb.configfs.rc
7edd3146c7ee2e8794dba1300cdc9430c81c823d 15-Jul-2016 Tianjie Xu <xunchang@google.com> Merge \\"Start update_verifier in cache group\\" into nyc-mr1-dev am: eddde7a130
am: 872b6e8790

Change-Id: Iac20bb4571292da8b783de8185dff93dc04850b9
872b6e879001952d61437272fd78076a3b385d18 15-Jul-2016 Tianjie Xu <xunchang@google.com> Merge \"Start update_verifier in cache group\" into nyc-mr1-dev
am: eddde7a130

Change-Id: Ia17697a852687f319050a8cf260316f522564085
eddde7a130e8ee732ead4ba5453c6d6d3078d091 15-Jul-2016 Tianjie Xu <xunchang@google.com> Merge "Start update_verifier in cache group" into nyc-mr1-dev
5408a76637eb8370eff5fafc50cf0bfe6ee9d2b7 14-Jul-2016 Pat Tjin <pattjin@google.com> Merge \\"core/init.rc: Add /data/cache/* directory creation\\" into nyc-mr1-dev am: 46066ef405
am: b05988b33a

Change-Id: Iae9bc319eaad99364b59772260867fb90b08eeae
b05988b33a3a2a97a9c5d6f1062aa25a8accdb44 14-Jul-2016 Yueyao (Nathan) Zhu <yueyao@google.com> Merge \"core/init.rc: Add /data/cache/* directory creation\" into nyc-mr1-dev
am: 46066ef405

Change-Id: Id67c7a2177520da1f3848642a68442c55b4f863d
46066ef405fc0679d73d0f6c0b14f2f50f4f2ed6 14-Jul-2016 Pat Tjin <pattjin@google.com> Merge "core/init.rc: Add /data/cache/* directory creation" into nyc-mr1-dev
1e4635f0a8c307592b015476bc69ee2da28c41af 13-Jul-2016 Tianjie Xu <xunchang@google.com> Start update_verifier in cache group

Start update_verifier in cache group to avoid dac_override

Bug: 30020920
Change-Id: I227b4a0e1c07e7b9bf209b432e9db02275ffe660
nit.rc
e43d1d523e550284fa85d44c7139ff0c662b3ada 12-Jul-2016 Tim Murray <timmurray@google.com> Merge \\"Add support for background stune group.\\" into nyc-mr1-dev am: 531bdd5a2c
am: b386d72266

Change-Id: Ib0e2efeef7e015e0e8244e29a825bf3da50297a8
51dcc811dc564990761c12133b7326314e4faaf9 12-Jul-2016 Irina Patru <irina.patru@intel.com> Merge \\"init.rc: Remove cpu weight set on the root cgroup\\" into nyc-mr1-dev am: ac957cbd72
am: ddb0f3c612

Change-Id: Ia872bcedde94c70dadc2c3a4e69e2d5cd375c28f
1af798ddc5435683a398273fc68c716f03dfd772 12-Jul-2016 Tim Kryger <tkryger@google.com> Merge \\\\"Remove attempt to write sched_compat_yield\\\\" am: 3f2db32b8c am: 49a986bf73 am: f789bd0133
am: 3886aaeae4

Change-Id: I6da3999160ca054e0d8e819e4b35420ae19507c7
17b1c0c0611d1acd97b4416f738e825592d540c7 12-Jul-2016 Tim Murray <timmurray@google.com> Merge changes from topic \\'stune\\' into nyc-mr1-dev am: 4b75a86858
am: b8a19f4499

Change-Id: Iecdd4d4693534640aef408f40aa3fd1e1fa9b93e
3f947d1c58774487579ab5cc784ae781fe7c44c8 12-Jul-2016 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Remove attempt to write sched_compat_yield" into nyc-mr1-dev
b386d72266fd8eb933fed0037e4f6e1bbcdce126 12-Jul-2016 Tim Murray <timmurray@google.com> Merge \"Add support for background stune group.\" into nyc-mr1-dev
am: 531bdd5a2c

Change-Id: Ia3be10db68dffc44e2d70535544c7c59d0933f7d
531bdd5a2cde3a8152ae6c10336525518430ae25 12-Jul-2016 Tim Murray <timmurray@google.com> Merge "Add support for background stune group." into nyc-mr1-dev
ddb0f3c6129939b2b1f8a43e4eee6c703646a09e 12-Jul-2016 Irina Patru <irina.patru@intel.com> Merge \"init.rc: Remove cpu weight set on the root cgroup\" into nyc-mr1-dev
am: ac957cbd72

Change-Id: I00c942a5d3e283efe40541c12f7daac2d2c77770
f3e1f13d81138f9afb573dbcbd5cb321d48e676c 11-Jul-2016 Tim Kryger <tkryger@google.com> Remove attempt to write sched_compat_yield

The sched_compat_yield option was eliminated in Linux 2.6.38 by commit
ac53db596cc0 ("sched: Use a buddy to implement yield_task_fair()") and
as a result, the following error is printed to the log during boot up.

init: write_file: Unable to open '/proc/sys/kernel/sched_compat_yield':
No such file or directory"

Bug: 30034121
Change-Id: Idbdb68de0cb3ab1f67d82a4d66af880bcfdfe261
(cherry picked from commit 724dfbac70ce69c48d3457229411c1c84e9f1c3d)
nit.rc
ac957cbd72ceb7a916e2e500242189c86d82e20a 12-Jul-2016 TreeHugger Robot <treehugger-gerrit@google.com> Merge "init.rc: Remove cpu weight set on the root cgroup" into nyc-mr1-dev
3886aaeae4dff26219c5785a37ca7637b2c73d8d 11-Jul-2016 Tim Kryger <tkryger@google.com> Merge \\\"Remove attempt to write sched_compat_yield\\\" am: 3f2db32b8c am: 49a986bf73
am: f789bd0133

Change-Id: I7434b27cf1662543efbe7b5d9fee6bac16cc9f26
49a986bf735d707ab45f6c375c0585fd65f9525a 11-Jul-2016 Tim Kryger <tkryger@google.com> Merge \"Remove attempt to write sched_compat_yield\"
am: 3f2db32b8c

Change-Id: I13c56436dd00cf2d5336ba757ae2c32d2e2504b5
5dcff8f2b19a53abe7c632a22f455df396554afe 11-Jul-2016 Tim Murray <timmurray@google.com> Add support for background stune group.

bug 29512132

Change-Id: If8144bfee0fb30cf11f2bb26494ca5e83c11d4d7
nit.rc
b8a19f4499240fbc8bc88a7e4fd0365deaeca737 11-Jul-2016 Tim Murray <timmurray@google.com> Merge changes from topic \'stune\' into nyc-mr1-dev
am: 4b75a86858

Change-Id: Ib11061d5d539f2e82ad16f122ea7d7b621bd988d
23ad7517d21c9751f571232c91f9e74822a5f60e 12-May-2016 Irina Patru <irina.patru@intel.com> init.rc: Remove cpu weight set on the root cgroup

It isn't allowed to change the cpu.share value for the root cgroup.
See kernel commit:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec7dc8ac73e4a56ed03b673f026f08c0d547f597

This fixes the following error seen in dmesg:
init: write_file: Unable to write to '/dev/cpuctl/cpu.shares': Invalid argument

BUG: 28735908

Change-Id: I5ef359fb275792f99d13d35c62499026d354f6af
Signed-off-by: Irina Patru <irina.patru@intel.com>
(cherry picked from commit c560c6310fdb6f8d4a44b05c0d15cad7ac6f4bb1)
nit.rc
724dfbac70ce69c48d3457229411c1c84e9f1c3d 11-Jul-2016 Tim Kryger <tkryger@google.com> Remove attempt to write sched_compat_yield

The sched_compat_yield option was eliminated in Linux 2.6.38 by commit
ac53db596cc0 ("sched: Use a buddy to implement yield_task_fair()") and
as a result, the following error is printed to the log during boot up.

init: write_file: Unable to open '/proc/sys/kernel/sched_compat_yield':
No such file or directory"

Bug: 30034121
Change-Id: Idbdb68de0cb3ab1f67d82a4d66af880bcfdfe261
nit.rc
955694b657012c50312de99e6f78084beae52d60 11-Jul-2016 Tim Murray <timmurray@google.com> Add support for top-app stune group.

bug 29512132

Change-Id: I41ec2dd80a469309f48dbb59fc27fbe43fcd67b3
nit.rc
0a5bbe421f042487bfcff2f5e44485ebbab3cb15 09-Jul-2016 Dan Willemsen <dwillemsen@google.com> Merge \\\\"Use BOARD_USES_VENDORIMAGE to detect vendor image presence\\\\" am: 5d420e791b am: bdd01e86a5 am: a5b9b8f452
am: d377004c98

Change-Id: I9b56d6e84a121120f1c7df054a0bfdc96076aecb
d377004c987e0509ba4cb706aa5dc0dfd3379219 09-Jul-2016 Dan Willemsen <dwillemsen@google.com> Merge \\\"Use BOARD_USES_VENDORIMAGE to detect vendor image presence\\\" am: 5d420e791b am: bdd01e86a5
am: a5b9b8f452

Change-Id: Iceb0c03fa05a7f6126428128c8e5dced5e7e6cef
bdd01e86a5c37a40f71f327db5835524b9d7f0a8 09-Jul-2016 Dan Willemsen <dwillemsen@google.com> Merge \"Use BOARD_USES_VENDORIMAGE to detect vendor image presence\"
am: 5d420e791b

Change-Id: I3a65ccc6bc5d6b3c63484baaa6d816939bd48073
0790431f754aed8f00fb1af9827e21aa1a506af9 09-Jul-2016 Dan Willemsen <dwillemsen@google.com> Use BOARD_USES_VENDORIMAGE to detect vendor image presence

When building without vendor/... in the tree, we won't be creating a
vendorimage, so BOARD_VENDORIMAGE_FILE_SYSTEM_TYPE won't be defined. But
we still need to use the vendor image that will be present.

Bug: 30040825
Change-Id: I756adc615aea11da60da4d3a4568caca9fed93ab
ndroid.mk
10b2ad167a11e78857fb7a964ebc9225f00a1f6e 07-Jul-2016 Tim Murray <timmurray@google.com> resolve merge conflicts of 3a29e34 to nyc-mr1-dev-plus-aosp
am: 6469fa2a7e

Change-Id: I36b1580a9ce0548b27059699998289aa34fade7d
6469fa2a7e1ef0b8ac977df321a0360f22556cba 07-Jul-2016 Tim Murray <timmurray@google.com> resolve merge conflicts of 3a29e34 to nyc-mr1-dev-plus-aosp

Change-Id: I4edd53094a98fcb3cd3e1b063122d13f80d36d3c
3a29e344b0d0b184954d505a58e61141300e0dd2 17-Jun-2016 Tim Murray <timmurray@google.com> Update FIFO settings for new uses of FIFO.

Adjust FIFO timings as well as allow SurfaceFlinger to use FIFO.

bug 24503801

Change-Id: I2c21d4c1788777c2d0d77227bb872701b35c4ff6
nit.rc
62657800943b455e1c406bd50cda72ffd5805a52 24-Jun-2016 Andreas Gampe <agampe@google.com> Rootdir: Add more asan.options support am: 8ccc1ad0f7
am: e33c9e426b

Change-Id: Ia6a03d301832ec649976bc9889694a0b4203696f
e33c9e426be8add027be66b5c2d3bb7a283297fc 24-Jun-2016 Andreas Gampe <agampe@google.com> Rootdir: Add more asan.options support
am: 8ccc1ad0f7

Change-Id: Ia72be83e461a3f09d6cd86fca99a89d9b6a71bb2
8ccc1ad0f71d0587edfbc4c637d6d8de196fe7df 23-Jun-2016 Andreas Gampe <agampe@google.com> Rootdir: Add more asan.options support

Extend the asan.options file to read binary-specific configuration
from files out of /system. For early services, the system image
location is important as /data may not be available when they are
started.

Add a template that turns most sanitization off. At this point in
time, it is, however, impossible to get to a zero overhead state
after the fact. The template is meant to adapt a build after the
fact, and work around issues with LOCAL_SANITIZE := never.

Add a Make variable and rule copying the template to the path and
name expected by ASAN. Add SANITIZE_LITE to automatically add a
large set of options files.

Bug: 29498013
Change-Id: I8e9e6929a55cee3f3fa0acb377a886bfa7006c91
ndroid.mk
san.options
san.options.off.template
60c6dacd62cf671cd6038285f3754d33631f643c 21-Jun-2016 Yueyao (Nathan) Zhu <yueyao@google.com> core/init.rc: Add /data/cache/* directory creation

Bug: 28845422
Change-Id: I2abcc67176cf94f34706f8f005a24ef5f70e0494
nit.rc
c9a21ef605a541579f53f8e37df81f85ba3cf6a1 16-Jun-2016 Vitalii Tomkiv <vitalit@google.com> Merge \\\\"Set zygote process priority to -20 to speed up VM startup time.\\\\" am: 92774329dd am: bf5f0fae07 am: b20a94398b
am: 7a1a6b91a7

Change-Id: I59cd191b21693481ab004a8d1abc092620b178ed
7a1a6b91a7f2cdb4a8bab8b94ed81ead3cf5b13e 16-Jun-2016 Vitalii Tomkiv <vitalit@google.com> Merge \\\"Set zygote process priority to -20 to speed up VM startup time.\\\" am: 92774329dd am: bf5f0fae07
am: b20a94398b

Change-Id: I65c0b4e96718c89ff3706516727cd6e6fed3d66b
bf5f0fae076be99357ec002eb45a2175c61b8d37 16-Jun-2016 Vitalii Tomkiv <vitalit@google.com> Merge \"Set zygote process priority to -20 to speed up VM startup time.\"
am: 92774329dd

Change-Id: I3c70a90e4d4e07f7c733a3a2738b0067ac09b6dd
372e5474d4b7832901d52c274e9ce26e7da66922 19-May-2016 Vitalii Tomkiv <vitalit@google.com> Set zygote process priority to -20 to speed up VM startup time.

Tests for Nexus9 device shows 450ms boot time speedup, 180ms for Nexus
5X.

Bug: 28866384

Change-Id: Icefd130d4bfe5538dae5b9518250807351b0789e
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
abb116523661acce48fa8fc11f4056b9ca24f240 07-Jun-2016 Tao Bao <tbao@google.com> Merge "Create /data/ota_package for OTA packages." into nyc-mr1-dev am: f9b7f7fdba
am: 27bbf8953d

* commit '27bbf8953d5a141912fe9325a4995da18ca86a6d':
Create /data/ota_package for OTA packages.

Change-Id: I243ec91e45bf202a6867645504eb963b64262556
27bbf8953d5a141912fe9325a4995da18ca86a6d 07-Jun-2016 Tao Bao <tbao@google.com> Merge "Create /data/ota_package for OTA packages." into nyc-mr1-dev
am: f9b7f7fdba

* commit 'f9b7f7fdba6f62309372fee7c619de1edd8aa389':
Create /data/ota_package for OTA packages.

Change-Id: I8d0cb3b8687d376efbfbbf186f858bef1c7ccf8e
380d6b1b4dae020e2319add3abb6b0e6fa0c79d3 26-May-2016 Tao Bao <tbao@google.com> Create /data/ota_package for OTA packages.

We will store OTA packages there for both A/B and non-A/B OTAs. The
directory will be accessed by GMSCore (for both), uncrypt (non-A/B),
update_engine (A/B), update_verifier (A/B) and possibly system server
(for non-A/B OTAs to clean up half-way uncrypt'd packages).

Bug: 28944800
Change-Id: I5aa8156ec5052bd15dfadd4d8c28925d464e4401
nit.rc
52ebee98657082155ad4108bb0f75ba37f7ea394 02-Jun-2016 Daniel Micay <danielmicay@gmail.com> add a property for controlling perf_event_paranoid
am: fe01f56c0d

* commit 'fe01f56c0d5c42508e1e82f5976e4c10bb00f632':
add a property for controlling perf_event_paranoid

Change-Id: I1059ecb2c1d1aba95cd3c93f208ae7ca904cf95e
f97ae58686c556d0fb463f393785b697d8323999 02-Jun-2016 Jeffrey Vander Stoep <jeffv@google.com> Merge "add a property for controlling perf_event_paranoid" am: 9292d7dae3 am: a6d6f45037 am: 680b2f3cb6
am: 0e7344f1ca

* commit '0e7344f1cad902133480d5137af2bdae1bf255e4':
add a property for controlling perf_event_paranoid

Change-Id: Ib4536fb05b7a3842f208e29bb6ace43ec87f1a39
fe01f56c0d5c42508e1e82f5976e4c10bb00f632 04-Sep-2015 Daniel Micay <danielmicay@gmail.com> add a property for controlling perf_event_paranoid

(Cherry picked from commit 2b22a66382db8a2fdf5ed7a685085a6d7d67cf12)

This adds a system property for controlling unprivileged access to
perf_event_paranoid. It depends on adding kernel support for
perf_event_paranoid=3 based on grsecurity's PERF_HARDEN feature to
completely disable unprivileged access to perf. A minimal port of this
feature is used in the vanilla Debian kernel by default.

It hides the non-hardened value as an implementation detail, since while
it is currently 1, it will probably become 2 in the future.

Bug: 29054680

Change-Id: I6e3ae3cf18d8c76df94f879c34fb6fde519b89a9
nit.rc
0e7344f1cad902133480d5137af2bdae1bf255e4 02-Jun-2016 Daniel Micay <danielmicay@gmail.com> Merge "add a property for controlling perf_event_paranoid" am: 9292d7dae3 am: a6d6f45037
am: 680b2f3cb6

* commit '680b2f3cb61e29a46d0d6bdf89394dd96e82f201':
add a property for controlling perf_event_paranoid

Change-Id: I23b928d61d2fa81637aefa09c34bf0e20777ad55
680b2f3cb61e29a46d0d6bdf89394dd96e82f201 02-Jun-2016 Jeffrey Vander Stoep <jeffv@google.com> Merge "add a property for controlling perf_event_paranoid" am: 9292d7dae3
am: a6d6f45037

* commit 'a6d6f45037025175b3074661c9d2d80931d71817':
add a property for controlling perf_event_paranoid

Change-Id: Ic1e1a1365735f73edde6767bf71da8c6e59b46a4
bc3ff3a7a2dd7658f24d210eaf2fe532cb878eaa 01-Jun-2016 David Sehr <sehr@google.com> add /data/misc/profman for output am: 0eb24e1bc7 am: cdc503c13b
am: 0be76bb96f

* commit '0be76bb96f718d802cfed09b41202fb07ba867af':
add /data/misc/profman for output

Change-Id: Ic2c4c42e2cb59cfb609963a36b29325f7044041d
0be76bb96f718d802cfed09b41202fb07ba867af 01-Jun-2016 David Sehr <sehr@google.com> add /data/misc/profman for output am: 0eb24e1bc7
am: cdc503c13b

* commit 'cdc503c13b153c8a9216725dcd0f03ee6414161e':
add /data/misc/profman for output

Change-Id: I60764f97eacd6853f17baed62bb6beee67fbc6fa
cdc503c13b153c8a9216725dcd0f03ee6414161e 01-Jun-2016 David Sehr <sehr@google.com> add /data/misc/profman for output
am: 0eb24e1bc7

* commit '0eb24e1bc7317eb5764567223cdd9405d16aefa7':
add /data/misc/profman for output

Change-Id: I8d8ebc0dc37aee1ac54f8e50e374cad77a6fe77a
b829f909f7ea2e7c14f0121390f83130b4b9b4a5 01-Jun-2016 David Sehr <sehr@google.com> add /data/misc/profman for output
am: 0eb24e1bc7

* commit '0eb24e1bc7317eb5764567223cdd9405d16aefa7':
add /data/misc/profman for output

Change-Id: Id672a7e5f4b64c9b3d707b4f45f1e7f8ce40ca34
0eb24e1bc7317eb5764567223cdd9405d16aefa7 28-May-2016 David Sehr <sehr@google.com> add /data/misc/profman for output

Bug: 28748264
Change-Id: Ib57ccc570de446e03ea8c27ce8e404929138b213
nit.rc
2b22a66382db8a2fdf5ed7a685085a6d7d67cf12 04-Sep-2015 Daniel Micay <danielmicay@gmail.com> add a property for controlling perf_event_paranoid

This adds a system property for controlling unprivileged access to
perf_event_paranoid. It depends on adding kernel support for
perf_event_paranoid=3 based on grsecurity's PERF_HARDEN feature to
completely disable unprivileged access to perf. A minimal port of this
feature is used in the vanilla Debian kernel by default.

It hides the non-hardened value as an implementation detail, since while
it is currently 1, it will probably become 2 in the future.

Bug: 29054680

Change-Id: I6e3ae3cf18d8c76df94f879c34fb6fde519b89a9
nit.rc
492883c839f2a3fb17d68093ca736e0f10d2b90e 24-May-2016 Srinath Sridharan <srinathsr@google.com> Merge "Only apply schedTune boost to top-app tasks" into nyc-mr1-dev am: 87a4f046f0
am: e7b8d06f18

* commit 'e7b8d06f186450977426cb07b5ee212cdc93246d':
Only apply schedTune boost to top-app tasks

Change-Id: I25d51e00c5dfc1e3bca359c6332bd388a37c513c
e7b8d06f186450977426cb07b5ee212cdc93246d 24-May-2016 Srinath Sridharan <srinathsr@google.com> Merge "Only apply schedTune boost to top-app tasks" into nyc-mr1-dev
am: 87a4f046f0

* commit '87a4f046f01ff49d69e4ff2446266c29557fb5e1':
Only apply schedTune boost to top-app tasks

Change-Id: I32ec1f0811971a527234672cadeeddcb50fd1369
87a4f046f01ff49d69e4ff2446266c29557fb5e1 24-May-2016 Srinath Sridharan <srinathsr@google.com> Merge "Only apply schedTune boost to top-app tasks" into nyc-mr1-dev
13398711387e9ce193c907c11191ce0998dda5af 06-May-2016 Srinath Sridharan <srinathsr@google.com> Only apply schedTune boost to top-app tasks

When using EAS, the foreground tasks were all getting boosted
during touchboosts. Limit it to top-app tasks.


BUG: 28378389
Change-Id: I72b7158a614bfd9b6c61024774e408ceba61fc9c
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
032a45f435edaf7964b068e2dcade5492854b0d4 16-May-2016 Badhri Jagan Sridharan <badhri@google.com> Merge "init: usb: disable usb function switch until adbd is ready" am: 2a26c2a836 am: b61ecb5213 am: 7e11db1b32
am: 66d69b902f

* commit '66d69b902f4ba15f2d2ad6b3d8214ae3355076cd':
init: usb: disable usb function switch until adbd is ready

Change-Id: Ib9022f062bece4a7fee2772df1d8f917c04f8e55
66d69b902f4ba15f2d2ad6b3d8214ae3355076cd 16-May-2016 Winter Wang <wente.wang@nxp.com> Merge "init: usb: disable usb function switch until adbd is ready" am: 2a26c2a836 am: b61ecb5213
am: 7e11db1b32

* commit '7e11db1b3206cd92d52fca0b324f6a5260a68aec':
init: usb: disable usb function switch until adbd is ready

Change-Id: I12e8fab36f39a9b97e52ace30ab54b3a9fd7bf0f
7e11db1b3206cd92d52fca0b324f6a5260a68aec 16-May-2016 Badhri Jagan Sridharan <badhri@google.com> Merge "init: usb: disable usb function switch until adbd is ready" am: 2a26c2a836
am: b61ecb5213

* commit 'b61ecb5213e1c94e823f23d7f5a8a0a93db617d6':
init: usb: disable usb function switch until adbd is ready

Change-Id: I5fc733ee946b4d0accf58f56c80270f9e13d9f63
2a26c2a836af9109ce4aa6cf8128a385d14878d3 16-May-2016 Badhri Jagan Sridharan <badhri@google.com> Merge "init: usb: disable usb function switch until adbd is ready"
f44442215d3268bef1de5d74f7b68a1c66727973 14-May-2016 Patrick Tjin <pattjin@google.com> Create symlink in the case where device has no cache partition am: c6535a343f
am: 31788415ed

* commit '31788415ed6d89eba11ee757f04ff32ee260a7c1':
Create symlink in the case where device has no cache partition

Change-Id: Ic5813d8f9fab4a02d6e0fab4add2fa0a8a72c008
31788415ed6d89eba11ee757f04ff32ee260a7c1 14-May-2016 Patrick Tjin <pattjin@google.com> Create symlink in the case where device has no cache partition
am: c6535a343f

* commit 'c6535a343f0b0bdd0f4171f0b4c9be401beebf77':
Create symlink in the case where device has no cache partition

Change-Id: Ibcec898104e6509e70647576611ecc7d887f163d
c6535a343f0b0bdd0f4171f0b4c9be401beebf77 13-May-2016 Patrick Tjin <pattjin@google.com> Create symlink in the case where device has no cache partition

Create symlink from /cache to /data/cache for devices
which have no cache partition.

Bug: 28747374
Change-Id: Ifb0c3250f1be345ce46fcdb78533e36c2250bb85
ndroid.mk
0ba7983b9f00a4ca1398cab665a4f242ae749086 12-May-2016 Irina Patru <irina.patru@intel.com> Merge "init.rc: Remove cpu weight set on the root cgroup" am: 422492c506 am: 2618d90c2f am: 12397f202f
am: 403461f67d

* commit '403461f67d47e1156115d6e1be3925e48cb182f7':
init.rc: Remove cpu weight set on the root cgroup

Change-Id: Iabaf0f78e60a5e3ac28f88d6951d49cde8717940
403461f67d47e1156115d6e1be3925e48cb182f7 12-May-2016 Irina Patru <irina.patru@intel.com> Merge "init.rc: Remove cpu weight set on the root cgroup" am: 422492c506 am: 2618d90c2f
am: 12397f202f

* commit '12397f202f97da7dcd40d45159696bc6be50aaf6':
init.rc: Remove cpu weight set on the root cgroup

Change-Id: I256d702368c1b4ed8688006abb5202dcc0d11f83
12397f202f97da7dcd40d45159696bc6be50aaf6 12-May-2016 Irina Patru <irina.patru@intel.com> Merge "init.rc: Remove cpu weight set on the root cgroup" am: 422492c506
am: 2618d90c2f

* commit '2618d90c2fa3f952a195dfd4ecd9f92ec462bccb':
init.rc: Remove cpu weight set on the root cgroup

Change-Id: I2663c368032a3c9f851de7d1e47f68c3a25b0d52
c560c6310fdb6f8d4a44b05c0d15cad7ac6f4bb1 12-May-2016 Irina Patru <irina.patru@intel.com> init.rc: Remove cpu weight set on the root cgroup

It isn't allowed to change the cpu.share value for the root cgroup.
See kernel commit:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec7dc8ac73e4a56ed03b673f026f08c0d547f597

This fixes the following error seen in dmesg:
init: write_file: Unable to write to '/dev/cpuctl/cpu.shares': Invalid argument

BUG: 28735908

Change-Id: I5ef359fb275792f99d13d35c62499026d354f6af
Signed-off-by: Irina Patru <irina.patru@intel.com>
nit.rc
54c2ab9732f7cf458a4179008341aa152fbc95f9 26-Apr-2016 Srinath Sridharan <srinathsr@google.com> marlin/eas: Fixing foreground/schedtune.boost path. am: 7ac34d0
am: f746166

* commit 'f746166fdc627d48a3e8b3a6baf0a86cd93b7271':
marlin/eas: Fixing foreground/schedtune.boost path.

Change-Id: I8e5a7a6742bbec4a5d00e852780e827bb7833f52
f746166fdc627d48a3e8b3a6baf0a86cd93b7271 26-Apr-2016 Srinath Sridharan <srinathsr@google.com> marlin/eas: Fixing foreground/schedtune.boost path.
am: 7ac34d0

* commit '7ac34d08efb3290bab77c6ed3bbbec067aeddf09':
marlin/eas: Fixing foreground/schedtune.boost path.

Change-Id: I0a549cb1fe0e5bd5ce89a7178d1468f808f175f7
7ac34d08efb3290bab77c6ed3bbbec067aeddf09 25-Apr-2016 Srinath Sridharan <srinathsr@google.com> marlin/eas: Fixing foreground/schedtune.boost path.

BUG: 28378389
Change-Id: I613fd5622d3d27deafe6054bbf2a4799d97f9170
nit.zygote32_64.rc
nit.zygote64_32.rc
77e05cd29a5ac223db51ce5adf045cf23f703169 19-Apr-2016 Paul Lawrence <paullawrence@google.com> Merge "Don\'t start defaultcrypto twice" into nyc-dev am: fe5d55a am: 1a920d7
am: fa3e4ea

* commit 'fa3e4ea7c3dec9e7715ac46553714b8493005bb1':
Don't start defaultcrypto twice

Change-Id: I7d225afe784949d96e5a628d97c18f90c1038721
1a920d72dcc6f8c91fd6ec04954facd4d351fb9d 19-Apr-2016 Paul Lawrence <paullawrence@google.com> Merge "Don\'t start defaultcrypto twice" into nyc-dev
am: fe5d55a

* commit 'fe5d55a68b9dc3a593d3f6ee5be919b8a9de710c':
Don't start defaultcrypto twice

Change-Id: I0e9a27208ea046a2cf738992ba97141da9026c08
fe5d55a68b9dc3a593d3f6ee5be919b8a9de710c 19-Apr-2016 Paul Lawrence <paullawrence@google.com> Merge "Don't start defaultcrypto twice" into nyc-dev
1f99218612fa12f2c3354c29bf8d761a27e50148 19-Apr-2016 Paul Lawrence <paullawrence@google.com> Don't start defaultcrypto twice

The old way (using triggers) starts defaultcrypto twice because
queue_property_triggers_action retriggers the action.

Bug: 27452459
Change-Id: I48c844836f551673d0dbfed6c33bd8ee1e035f40
nit.rc
2deb078895ab2422c1e0846833a6fb88534dda3d 18-Apr-2016 Jeff Sharkey <jsharkey@android.com> Merge "Create legacy /data/system/user directory." into nyc-dev am: e4f870a am: 2a9974a
am: 1b59b81

* commit '1b59b815bab116d11347011791c020981432a99d':
Create legacy /data/system/user directory.

Change-Id: Ib1983ee798a81b316d055cf2f8c9a239bdfd1253
1b59b815bab116d11347011791c020981432a99d 18-Apr-2016 Jeff Sharkey <jsharkey@google.com> Merge "Create legacy /data/system/user directory." into nyc-dev am: e4f870a
am: 2a9974a

* commit '2a9974a9682291f4e7dcbb2e940ac2e42a0d6c2c':
Create legacy /data/system/user directory.

Change-Id: I20b29a6fb802966be184cb78534b4dd7d36eee66
0ef5c5cb203eae0656f86e500274eb5bd856b88c 18-Apr-2016 Jeff Sharkey <jsharkey@android.com> Merge "Create legacy /data/system/user directory." into nyc-dev
am: e4f870a

* commit 'e4f870a0bb260f351208b9fe3cf7334e58c16a14':
Create legacy /data/system/user directory.

Change-Id: I9b18134310c101974eb353d635c9cc8f8488877f
c9b84a362a92b7ce709095c1986be871eacbb010 15-Apr-2016 Jeff Sharkey <jsharkey@android.com> Create legacy /data/system/user directory.

We create per-user directories under this location, so it should
only be created once by init, similar to all the other user-specific
directories.

Bug: 27896918
Change-Id: I9ec55e4fd763c0eda6c6e50483694a6377344586
nit.rc
bc725db93a30428c93de74f08f977ad8bdc7ee53 13-Apr-2016 Nick Kralevich <nnk@google.com> init.rc: Restore the /mnt/sdcard symlink am: d2f0a2c
am: bcf98cf

* commit 'bcf98cfcd40f2d408f601061ba1071b52d92ffbc':
init.rc: Restore the /mnt/sdcard symlink

Change-Id: I50ec25bcc48f4cc312b8559b5985a8371feef5ae
bcf98cfcd40f2d408f601061ba1071b52d92ffbc 13-Apr-2016 Nick Kralevich <nnk@google.com> init.rc: Restore the /mnt/sdcard symlink
am: d2f0a2c

* commit 'd2f0a2c0653e332b906875077b9048e64b929d94':
init.rc: Restore the /mnt/sdcard symlink

Change-Id: Icd4eea67bdf9ea416f1e15ec9f1666e74e85b3eb
d2f0a2c0653e332b906875077b9048e64b929d94 13-Apr-2016 Nick Kralevich <nnk@google.com> init.rc: Restore the /mnt/sdcard symlink

"You are in a maze of twisty little symlinks, all alike."

Restore the /mnt/sdcard symlink, for compatibility with older Android
apps. This symlink was suppose to have been removed in the Gingerbread
time frame, but lives on.

Note: The /mnt/sdcard symlink was originally created in device specific
*.rc files in the device/vendor/hardware/* directory. This change moves
the creation of the symlink into the common init.rc file.

Bug: 25801877
Bug: 28108983
Change-Id: I2f9bf71bddffadb587d7376dfdfc8a546c84ec28
nit.rc
46c313b694fbeead5a7ac652d5f0fc6ff1313784 24-Mar-2016 Winter Wang <wente.wang@nxp.com> init: usb: disable usb function switch until adbd is ready

In the case of adb enabled, When a usb function switch happens
e.g mtp,adb -> ptp,adb, framework will set sys.usb.config from
"mtp,adb" to "none" and stop adbd first.
At this time, the property "sys.usb.ffs.ready", which is set after
the ready of the perious start adbd, is still "1".
So , when framework goes on setting the sys.usb.config to "ptp,adb",
init.usb.configfs.rc will trigger actions to bind() f_fs without
waiting for adbd is actually ready.

This will produce some error messages:
------------
configfs-gadget ci_hdrc.0: failed to start g1: -19
init: write_file: Unable to write to '/config/usb_gadget/g1/UDC': No such device
------------
this error msg is caused by configFS start binding f_fs before adbd is ready.

Add setting the "sys.usb.ffs.ready" to "0" will help clear this error msg,
as the bind process in kernel gadget driver will wait for the set of
this property, which is the sign of adbd is ready.

Signed-off-by: Winter Wang <wente.wang@nxp.com>
nit.usb.configfs.rc
7c17b0c87d619c333ea897056c8ca8a71a8f53ff 18-Mar-2016 Eino-Ville Talvala <etalvala@google.com> Add camera2 NDK library to public library lists am: 5f31ca2
am: 3c30fe1

* commit '3c30fe1106c5a0b52d387231e3dd87c192edebf1':
Add camera2 NDK library to public library lists
3c30fe1106c5a0b52d387231e3dd87c192edebf1 18-Mar-2016 Eino-Ville Talvala <etalvala@google.com> Add camera2 NDK library to public library lists
am: 5f31ca2

* commit '5f31ca2231a2d743b09d0f9f902d20b30a4baca7':
Add camera2 NDK library to public library lists
5f31ca2231a2d743b09d0f9f902d20b30a4baca7 18-Mar-2016 Eino-Ville Talvala <etalvala@google.com> Add camera2 NDK library to public library lists

It was dropped in the migration to the public.libraries format
NDK is the same on standard Android and Wear.

Bug: 27742249
Change-Id: I1eafbb649c0ccc5b9a93471fa387624d838bd3d0
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
afef45141f82577d2466b9d5b76371393931dc54 17-Mar-2016 Daniel Rosenberg <drosen@google.com> Merge "Set up configfs" into nyc-dev am: 290127b
am: 7972040

* commit '7972040588b1921c743d93a68435e095cb352858':
Set up configfs
7972040588b1921c743d93a68435e095cb352858 17-Mar-2016 Daniel Rosenberg <drosen@google.com> Merge "Set up configfs" into nyc-dev
am: 290127b

* commit '290127b29290c133f759eda3fc992e3dcbfb7cb1':
Set up configfs
290127b29290c133f759eda3fc992e3dcbfb7cb1 17-Mar-2016 Daniel Rosenberg <drosen@google.com> Merge "Set up configfs" into nyc-dev
5e11727101c784e5c0f6bdfb2b132e53c2ec1643 17-Mar-2016 Dimitry Ivanov <dimitry@google.com> Merge "Add libvulkan.so to the list of public libraries" into nyc-dev am: eb43104
am: 44837bd

* commit '44837bd892abababf0884ad3a882268f2808b196':
Add libvulkan.so to the list of public libraries
8239061a22d5e90c038509772f1845f51dadfa5a 17-Mar-2016 Dimitry Ivanov <dimitry@google.com> Merge changes from topic \'fix-nativeloader-todo\' into nyc-dev am: c8bc211
am: 0583bc6

* commit '0583bc610b56dfba646d16e5ee88131b6b918cdd':
Move list of public libraries to a config file
Revert "libnativeloader: Make webviewchromium so file optional"
44837bd892abababf0884ad3a882268f2808b196 17-Mar-2016 Dimitry Ivanov <dimitry@google.com> Merge "Add libvulkan.so to the list of public libraries" into nyc-dev
am: eb43104

* commit 'eb43104db148976581c6525b12b1abf25f65987b':
Add libvulkan.so to the list of public libraries
0583bc610b56dfba646d16e5ee88131b6b918cdd 17-Mar-2016 Dimitry Ivanov <dimitry@google.com> Merge changes from topic \'fix-nativeloader-todo\' into nyc-dev
am: c8bc211

* commit 'c8bc211e6658cf56c5ac8ff5217a1d9a3a64143b':
Move list of public libraries to a config file
Revert "libnativeloader: Make webviewchromium so file optional"
dbae9a9b775acde6549fcdfb8d5a2195062e5cc1 17-Mar-2016 Dimitry Ivanov <dimitry@google.com> Add libvulkan.so to the list of public libraries

Accidentally dropped it in 4b0e963872715775a63f36b385150cba4801b1d0

Bug: http://b/27546414
Change-Id: I28835ce3229f778387efedf269d7f32572e09184
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
d1fdb9883011f57ab7a3fdcde4d835ef6918b14c 15-Mar-2016 Dimitry Ivanov <dimitry@google.com> Move list of public libraries to a config file

This list contains libraries that should directly or indirectly
be accessible to apps for the platform. Note that this list is
not device specific but rather device class specific.

For now we have 2 separate lists; one for Android Phones and Tablets,
and another one for Android Wear devices.

Bug: http://b/27546414
Bug: http://b/22548808
Change-Id: I83de5e3cf67392d0e9af66f70123898bd5997146
(cherry picked from commit 4b0e963872715775a63f36b385150cba4801b1d0)
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
4b0e963872715775a63f36b385150cba4801b1d0 15-Mar-2016 Dimitry Ivanov <dimitry@google.com> Move list of public libraries to a config file

This list contains libraries that should directly or indirectly
be accessible to apps for the platform. Note that this list is
not device specific but rather device class specific.

For now we have 2 separate lists; one for Android Phones and Tablets,
and another one for Android Wear devices.

Bug: http://b/27546414
Bug: http://b/22548808
Change-Id: I83de5e3cf67392d0e9af66f70123898bd5997146
tc/public.libraries.android.txt
tc/public.libraries.wear.txt
4edec2539693690e116799cbbcf468147e02cb4b 19-Feb-2016 Daniel Rosenberg <drosen@google.com> Set up configfs

Bug: 19160983
Change-Id: I8fddf11fb6124950dfa2528a4f420abd9d461df6
Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
e45d59b05be81863bfceac78d885d259dc892b44 14-Mar-2016 Mihai Serban <mihai.serban@intel.com> Merge "init-debug.rc: mount debugfs" am: bf6c67f234
am: 8bf6e6908b

* commit '8bf6e6908b97f785b5d7036e616438f839e9da1d':
init-debug.rc: mount debugfs
8bf6e6908b97f785b5d7036e616438f839e9da1d 14-Mar-2016 Mihai Serban <mihai.serban@intel.com> Merge "init-debug.rc: mount debugfs"
am: bf6c67f234

* commit 'bf6c67f234b591afd3cf936632ca00730b89eb73':
init-debug.rc: mount debugfs
bf6c67f234b591afd3cf936632ca00730b89eb73 14-Mar-2016 Elliott Hughes <enh@google.com> Merge "init-debug.rc: mount debugfs"
bae1efe5001093d1654b5fd00a2c9f039fbab8ae 13-Mar-2016 Janis Danisevskis <jdanis@google.com> Merge "Leftovers of the SELinux policy update mechanism" am: b9c0788806
am: 0af61f0024

* commit '0af61f0024d137e7a2f1ac0d9e002711cd01092c':
Leftovers of the SELinux policy update mechanism
0af61f0024d137e7a2f1ac0d9e002711cd01092c 13-Mar-2016 Janis Danisevskis <jdanis@google.com> Merge "Leftovers of the SELinux policy update mechanism"
am: b9c0788806

* commit 'b9c078880644b51bc9e6c314eed157f230fce43c':
Leftovers of the SELinux policy update mechanism
3d1dff22311bb6b3c01115f0c4400dcdc37c35c3 08-Mar-2016 Janis Danisevskis <jdanis@google.com> Leftovers of the SELinux policy update mechanism

Remove references to SELinux policy files in /data/security
from libselinux/android.c. In the process all code that is
apparently related to handling an alternate policy and/or
reloading the policy has been removed.

Bug: 26544104
Change-Id: I47bf76ac3c26c5d71f92a21ffac2b17ba14262ea
nit.rc
ec8637ef6d0bc5bf69eb03aa1461b549e02a136f 09-Mar-2016 Hidehiko Abe <hidehiko@google.com> Split slave-bind mount into two.

mount(2) does not work with MS_BIND | MS_SLAVE at a time.
Instead, this CL calls mount twice.

Change-Id: I36b2eb2853f19efc2b0677fb07b6822392aac37c
nit.rc
afebc25bdd923b46c2e315c30ffbfb70558d1acf 07-Mar-2016 Mihai Serban <mihai.serban@intel.com> init-debug.rc: mount debugfs

Enable debugfs on non "user" builds.

BUG=27520850
Change-Id: I2bcc72b686d0477b553c0605adfd4c023e72cbfb
Signed-off-by: Mihai Serban <mihai.serban@intel.com>
nit-debug.rc
e120b471acbe136e27e257fdf493590e1cc4ba73 01-Mar-2016 Alex Deymo <deymo@google.com> Add /postinstall partition when using the A/B updater.

The new top level directory /postinstall is used by the A/B updater to
mount the new partition and run a post-install program before rebooting
into that new system.

init.rc was extended to label this new directory since the initrd has
no extended attributes.

Bug: 27177071
TEST=`ls -laZ /` shows the /postinstall directory on edison-eng

(cherry picked from commit bb968fb04db3ec5227e84571e1c6bfd265836085)

Change-Id: Iff993135c7ce3a1a0f6450892ef7382da408fd5e
ndroid.mk
nit.rc
40345ef6b89b589f88c49bfa6a861ade88154782 04-Mar-2016 Alex Deymo <deymo@google.com> Merge "Add /postinstall partition when using the A/B updater." am: 700b15dacf
am: e2ad3cfae4

* commit 'e2ad3cfae4f9f9ddec2746c0c57cdb3dc1991a43':
Add /postinstall partition when using the A/B updater.
e2ad3cfae4f9f9ddec2746c0c57cdb3dc1991a43 04-Mar-2016 Alex Deymo <deymo@google.com> Merge "Add /postinstall partition when using the A/B updater."
am: 700b15dacf

* commit '700b15dacfa42bcc5c4d768b92530e9f20f0211b':
Add /postinstall partition when using the A/B updater.
bb968fb04db3ec5227e84571e1c6bfd265836085 01-Mar-2016 Alex Deymo <deymo@google.com> Add /postinstall partition when using the A/B updater.

The new top level directory /postinstall is used by the A/B updater to
mount the new partition and run a post-install program before rebooting
into that new system.

init.rc was extended to label this new directory since the initrd has
no extended attributes.

Bug: 27177071
TEST=`ls -laZ /` shows the /postinstall directory on edison-eng

Change-Id: I6cdee7eb1d61ac7d447528962a4fad1a7bbf138d
ndroid.mk
nit.rc
be54c543bd6e76d8b505028cf64233e1a9213776 01-Mar-2016 Keun Soo Yim <yim@google.com> mkdir /data/misc/cameraserver for AVD's camera HALs

cameraserver from nyc uses cameraserver as its username.
thus this change is needed for AVD (android virtual device)'s
camera HAL which is attached to cameraserver to work as that
HAL writes some files to /data/misc/media. the backward compatibility
issue should be handled as separate changes. this approach is
preferred for finer-grained security isolation.

Change-Id: If028667d62df8fcac634ff1001759c39703b00dd
nit.rc
d125f6e8a95a998d74175df49d54251489723933 26-Feb-2016 Todd Kjos <tkjos@google.com> Merge "Mount schedTune cgroup as /dev/stune" into nyc-dev
0836c9e38624da1f109f6438f24fada3621e6d7a 04-Dec-2015 Chien-Yu Chen <cychen@google.com> Sync internal<->AOSP user list.

Bug: 27299198

Cherry-picked from:

Restart cameraserver

Bug: 24511454
Change-Id: Ia27f4ef0eb71f891c789f637a21b04afe0b1c4e9
nit.zygote32_64.rc
nit.zygote64_32.rc
845a4ffef800949c45dc722deec5523d239ed41e 24-Feb-2016 Glenn Kasten <gkasten@google.com> Restore audio tee sink

Bug: 27323882
Change-Id: I1131c0537942c8f7cbf9ff6cc6847ab7e93e6187
nit.rc
11cde567a8fd6fd37cd462e24dd97d0f57bb12a4 23-Feb-2016 Todd Kjos <tkjos@google.com> Mount schedTune cgroup as /dev/stune

Make stune consistent with the other cgroups mounted under /dev

Change-Id: I0fe7120ad2afbe8e6a3c9f72cc3f465de618d344
nit.rc
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
aed972dead82d2a74c3a9be296ba3390477d30cf 22-Feb-2016 Calin Juravle <calin@google.com> Merge "Create profiles folders" into nyc-dev
002aecf6e8eda5d5affe412e20a22458c371a355 19-Feb-2016 Jeff Sharkey <jsharkey@android.com> Temporary fix for bugreport symlink.

Bug: 27262109
Change-Id: I011da38f8ad1eeaf717dc03a0fb6f9fdc5654c4c
nit.rc
807f23aff210064274d332866b3d5f59d0fb743c 01-Feb-2016 Calin Juravle <calin@google.com> Create profiles folders

Current profiles (the ones which have not been used for
compilation) are stored in /data/misc/profiles/cur/0/pkgname/.

Reference profiles (the merged of all user profiles, used for
compilation) are stored in /data/misc/profiles/ref/pkgname/.

Add a method to get the shared app gid from an uid or appid.

Bug: 26719109
Bug: 26563023
Change-Id: I89601d7dbeb3041df882c141a9127dac200a645e
nit.rc
4409f1446caa4eb06122d60c96573503b73ea84b 17-Feb-2016 Bill Yi <byi@google.com> Merge commit '4352ee87fd74b931d4b58192fb8974e91aa899d0' into HEAD
623b56af5da59fb57abcb2d984762669c82f57e9 08-Feb-2016 Martijn Coenen <maco@google.com> Fix libprocessgroup SELinux denials.

libprocessgroup checks whether it can use memory
cgroups for keeping track of forked processes by
seeing whether /dev/memcg/apps is writable. However,
on systems with memory cgroups disabled, SELinux
(correctly) no longer classifies this directory as a cgroup,
and starts denying zygote access. To fix this,
first check whether /dev/memcg/apps/tasks exists to
see if the cgroup is mounted; only then check whether
we can write to the directory.

Bug: 27046965
Change-Id: I6e44cd62d8c396e20ceb162c50606b3e86f2cb3e
nit.rc
c457610e786f20b673796e2e875eb86df454c4f3 07-Feb-2016 Jeff Sharkey <jsharkey@android.com> Follow migration of Shell app to DE storage.

The Shell app that stores bugreports now lives under DE storage for
all devices, both FBE and non-FBE.

Bug: 26668510
Change-Id: Iead1dcb98181a5caccf4d0c1e86de62abc6dc990
nit.rc
c895f11cf1c08ffc03234bc0a5c6b2cebda15ae3 05-Feb-2016 Jeff Sharkey <jsharkey@google.com> Merge "User 0 directories are created by vold now."
a2eba56f983a1dcc8d2a55bb8fd635045a0adcc5 05-Feb-2016 Mark Salyzyn <salyzyn@google.com> Merge "init-debug.rc: add runtime mmc max speed property actors" am: 20a6f0ff3b
am: c883cdec82

* commit 'c883cdec825e021007672d3ce9b199589ed2cba6':
init-debug.rc: add runtime mmc max speed property actors
c883cdec825e021007672d3ce9b199589ed2cba6 05-Feb-2016 Mark Salyzyn <salyzyn@google.com> Merge "init-debug.rc: add runtime mmc max speed property actors"
am: 20a6f0ff3b

* commit '20a6f0ff3bf21e2bc82ebfe06357f6225c991ee9':
init-debug.rc: add runtime mmc max speed property actors
3b9c83a0f69778253f82730404363b5f5f795eb2 03-Feb-2016 Jeff Sharkey <jsharkey@android.com> User 0 directories are created by vold now.

This ensures that all users on device follow a consistent path for
setup and validation of encryption policy.

Also add remaining user-specific directories and fix linking order.

Bug: 25796509
Change-Id: I8c2e42a78569817f7f5ea03f54b743a6661fdb9c
nit.rc
7864e3675161ace4d6e54f32a822a90d2e1960f0 28-Jan-2016 Mark Salyzyn <salyzyn@google.com> init-debug.rc: add runtime mmc max speed property actors

persist.mmc.max_read_speed - KB/s speed cap
persist.mmc.max_write_speed - KB/s speed cap
persist.mmc.cache_size - MB of high-speed on-device write cache

device default directly to associated /sys/block/mmcblk0/ attributes,
not delivered on "user" builds.

Bug: 26976972
Change-Id: Ic82b9614489b6406ce830d127c85affc9095e256
ndroid.mk
nit-debug.rc
95c220e6b7aad1f589be3b65c6232560b18f1dca 03-Feb-2016 Mark Salyzyn <salyzyn@google.com> Merge "init.rc: too many start logd" am: 989daeaf5b
am: d8e0e52099

* commit 'd8e0e520998e83ae16fcff317704bb6c00b7fb31':
init.rc: too many start logd
d8e0e520998e83ae16fcff317704bb6c00b7fb31 03-Feb-2016 Mark Salyzyn <salyzyn@google.com> Merge "init.rc: too many start logd"
am: 989daeaf5b

* commit '989daeaf5b2f50d96da69ad476adf434522e35e7':
init.rc: too many start logd
fcad79fe10ab73b8a0bdedc4f5d30838c52cb44b 03-Feb-2016 Andreas Gampe <agampe@google.com> Merge "Init: add OTA directory"
0604f6fbae9bf963b55c5d8f5b5730e9583f05e3 03-Feb-2016 Mark Salyzyn <salyzyn@google.com> init.rc: too many start logd

Bug: 26934873
Change-Id: Ia00da6253a50bedc8ba825df1cf641b86cdebeed
nit.rc
1ee7abd066e3e5161f3ec53ab9c0c9d7b1389ede 02-Feb-2016 Elliott Hughes <enh@google.com> Merge "Start debuggerd as soon as logd is up." am: 1b729b3e04
am: 1ef5b78a2f

* commit '1ef5b78a2ffc471e5ac2e30b424f00d15d581a8c':
Start debuggerd as soon as logd is up.
1ef5b78a2ffc471e5ac2e30b424f00d15d581a8c 02-Feb-2016 Elliott Hughes <enh@google.com> Merge "Start debuggerd as soon as logd is up."
am: 1b729b3e04

* commit '1b729b3e04b210d096ee2d447945f6b2c53b6029':
Start debuggerd as soon as logd is up.
2f74a5dae5ec456844bcc95dee1cf264bba4e084 02-Feb-2016 Elliott Hughes <enh@google.com> Start debuggerd as soon as logd is up.

Makes debugging early boot crashes easier.

Bug: http://b/26918597
Change-Id: I5bb883f1350ea5f7a545cb0e9f1034ecfcf47cdb
nit.rc
2f076739576ca7ca2d13fac77bf80af3add584e6 02-Feb-2016 Martijn Coenen <maco@google.com> Merge "Reuse mem cgroups for tracking forked PIDs."
88185f9ee8e15afdf69ca9374ff2608ab81a59ba 02-Feb-2016 Tim Murray <timmurray@google.com> Merge "Enable top-app cpuset support."
6647bb51301ea101b73e7431888f70bb35a4fabb 12-Jan-2016 Tim Murray <timmurray@google.com> Enable top-app cpuset support.

Allows ActivityManager to use the top-app cpuset to grant the currently
focused app exclusive access to a CPU core.

Change-Id: I45bca5170477e413dec6e5889338399d0859706c
nit.rc
7026d48d84b4bf536e52853a3438b0a1dce490a7 01-Feb-2016 Greg Hackmann <ghackmann@google.com> Merge "init.rc: add missing /dev/fd symlink" am: 54bf0718f4
am: ef605cb749

* commit 'ef605cb7495cec368f7be015f924479969dd8fc2':
init.rc: add missing /dev/fd symlink
ef605cb7495cec368f7be015f924479969dd8fc2 01-Feb-2016 Greg Hackmann <ghackmann@google.com> Merge "init.rc: add missing /dev/fd symlink"
am: 54bf0718f4

* commit '54bf0718f4eb1b170f55bbd07207cd6ad2e7e0f5':
init.rc: add missing /dev/fd symlink
b82bab66f318896ebad80c1feee2347c58e3ce37 21-Jan-2016 Martijn Coenen <maco@google.com> Reuse mem cgroups for tracking forked PIDs.

It turns out we were using the CPU accounting
cgroups for keeping track of processes that were
forked by an app without the framework's knowledge,
so we could kill all of them reliably (see b/15313911
for context).

Since we want to use memory cgroups for other purposes,
we might as well use memory cgroups for tracking forked
PIDs if they're enabled. This also gets us automatic cleanup
of empty mem cgroups.

Also, removed old mem cgroup mount point that is no
longer used, as well as cgroup release agent code that
we're not using.

Change-Id: I69d5cc31c162ffa49ef6945755f41381e306cc8b
nit.rc
40a96e4ba07d1b1b79115eaa2727000f72707381 01-Feb-2016 Greg Hackmann <ghackmann@google.com> init.rc: add missing /dev/fd symlink

The Linux kernel implicitly expects /dev/fd to symlink to /proc/self/fd.

This change fixes the exec/execveat.c kernel selftest.

Change-Id: Ia08d50023336fdbfc098527299c326d9d59039a9
Signed-off-by: Greg Hackmann <ghackmann@google.com>
nit.rc
5949745534e11a877ec839931af76c569f78e058 01-Feb-2016 Paul Crowley <paulcrowley@google.com> On FDE devices, initialize user 0

Fix ugly special cases for user 0: initialize them explicitly.

Bug: 26704408
Change-Id: I1b8536b9e5e87ea98b4009a309f2e22c56006651
nit.rc
63c463fe2873b1f68c73b427a396eae463bba648 29-Jan-2016 Christopher Tate <ctate@google.com> Have init set up the backup stage dir on /cache

Bug 26834865

Change-Id: Idc63c1706f68d42b2a9cee05997c63a9bbcb0fb9
nit.rc
7dfcc92beeda542b0148c71490cac29007cce38f 08-Dec-2015 Andreas Gampe <agampe@google.com> Init: add OTA directory

Add /data/ota in init so that the right selinux labels are applied.

Bug: 25612095
Change-Id: I8fd093147f8e0a5c3bd1a4007a61b0b759911cf2
nit.rc
113f88e36546ced277205e08283dc9010b051d1f 28-Jan-2016 Chien-Yu Chen <cychen@google.com> Merge "Restart cameraserver"
89a31c4499013119807d13242d87333ee108d7a0 27-Jan-2016 Kevin Cernekee <cernekee@google.com> Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes" am: fa432b0e2f
am: 54b47105ae

* commit '54b47105aea0e93ee287f76d4a4dc6bfe6ddf698':
ueventd.rc: Document the different rule formats for /dev and /sys nodes
54b47105aea0e93ee287f76d4a4dc6bfe6ddf698 27-Jan-2016 Kevin Cernekee <cernekee@google.com> Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes"
am: fa432b0e2f

* commit 'fa432b0e2f87e9a029ac0094e5bceaaff258368a':
ueventd.rc: Document the different rule formats for /dev and /sys nodes
fa432b0e2f87e9a029ac0094e5bceaaff258368a 27-Jan-2016 Kevin Cernekee <cernekee@google.com> Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes"
cd2ef4ef1cc91997c305925af7e24318cc00913a 04-Dec-2015 Chien-Yu Chen <cychen@google.com> Restart cameraserver

Bug: 24511454
Change-Id: Ia27f4ef0eb71f891c789f637a21b04afe0b1c4e9
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
1293fed9a3371ad2096785e1af99ddd66c7a8344 25-Jan-2016 Tim Murray <timmurray@google.com> Merge "Improve cpuset support for surfaceflinger."
b797e78f8bfa5d8b5ea36f4dbe102ce30dff16a4 23-Jan-2016 Nick Kralevich <nnk@google.com> Merge "init.rc: mix device-specific data into the Linux RNG" am: e04b60d2b9
am: 9deaf7c8a6

* commit '9deaf7c8a6eca900e1e50cccc1aeef17d04d70e2':
init.rc: mix device-specific data into the Linux RNG
9deaf7c8a6eca900e1e50cccc1aeef17d04d70e2 23-Jan-2016 Nick Kralevich <nnk@google.com> Merge "init.rc: mix device-specific data into the Linux RNG"
am: e04b60d2b9

* commit 'e04b60d2b9bf0e6560e3cde6f671f294b796fcdb':
init.rc: mix device-specific data into the Linux RNG
27cb41035264e5ff299a5784dc6ca60e791347d2 23-Jan-2016 Nick Kralevich <nnk@google.com> init.rc: mix device-specific data into the Linux RNG

Mix the contents of /proc/cmdline and /default.prop
into /dev/urandom. /proc/cmdline often contains
androidboot.serialno, a device-specific unique
identifier. Similarly, /default.prop contains the
build fingerprint and timestamp, which vary between
device families.

Change-Id: I8803b38c7089b2a1217b99a7c1808b29a3b138cf
nit.rc
4284f9f3a3d471208d7a9341056e4d7af886dab3 10-Nov-2015 Tim Murray <timmurray@google.com> Improve cpuset support for surfaceflinger.

SurfaceFlinger needs some of its threads in the system-background cpuset
and some of its threads (the binder pool) outside of the
system-background cpuset in order to improve UI perf/power
consumption. Remove surfaceflinger from the system-background cpuset in
init.rc and allow a thread to place itself in the system-background
cpuset given enough permissions.

bug 25745866

Change-Id: I85f7e41c5439e6ad7cc2d355e51f5dfb3a0c7088
nit.rc
558d8f4364c87e7ba34ef4c127654cdd9e049072 20-Jan-2016 Paul Crowley <paulcrowley@google.com> Remove no-longer-needed crypto init builtins

Changes to the way FBE works to support lifecycles mean that these
commands aren't needed any more.

Bug: 22358539
Change-Id: Id73339e0aa8070dd688f35b5d59de75236961395
nit.rc
d78b55fba2c2deeb145354fc6c6ae89e51967f44 13-Jan-2016 Jeff Sharkey <jsharkey@android.com> Move some directory creation out of installd.

Core system directories should be created here in init.rc instead
of making installd do the creation.

Bug: 26466827
Change-Id: I313a332e74699641872c41fce5a7ca35bfce8f82
nit.rc
e8b97fc0b0eec1c98053cfa51db6b450657ef876 08-Jan-2016 Elliott Hughes <enh@google.com> Merge "init.rc: Reland "mkdir /data/misc/vold""
am: 19616ce100

* commit '19616ce100771d0f570bc9cf19d08fbbe8feec0f':
init.rc: Reland "mkdir /data/misc/vold"
c1149ff0c33f0a7100428402cc934296d7170e42 08-Jan-2016 Yu Ning <yu.ning@intel.com> init.rc: Reland "mkdir /data/misc/vold"

Creation of /data/misc/vold was first introduced by commit 25775e8. It
then got reverted, probably inadvertently, by:

commit 2e24bcfdce030d410cbc8e8c8fa3e8c1260ba65d
Author: Paul Lawrence <paullawrence@google.com>
Date: Fri May 22 18:31:55 2015 +0000

Revert "Set up crypto for user directories in init."

This folder is required by vold. In its absence, if one tries to format
an SD card as internal storage, an error will occur, with the following
message printed to logcat:

01-08 06:31:48.389 1002 1069 E vold : Failed to persist key

Restoring /data/misc/vold fixes this bug.

This fix has been verified on the emulator, which currently does not
allow its virtual SD card to be adopted, but another CL will be uploaded
to enable that.

Change-Id: Ibb87ee821630a038a6f9b7b6a9da50fe03ca690d
Signed-off-by: Yu Ning <yu.ning@intel.com>
nit.rc
7705e0384eb38b5a15168136cbeb5e9c3672011e 29-Dec-2015 Pavlin Radoslavov <pavlin@google.com> Merge "Use GID "wakelock" to control access to kernel wakelock"
am: 0f0498ad50

* commit '0f0498ad508e6747dc7b72a6e63de2f2befa2e1c':
Use GID "wakelock" to control access to kernel wakelock
17d80c84e1ec6fc803f7b30df4e7f436a72e79d4 24-Nov-2015 Pavlin Radoslavov <pavlin@google.com> Use GID "wakelock" to control access to kernel wakelock

* Added new kernel GID named "wakelock" (AID_WAKELOCK = 3010)
* Changed the group access for /sys/power/wake_lock and
/sys/power/wake_unlock from "system" to "wakelock"
* Added "wakelock" to the list of groups for the healthd process/service

Bug: 25864142
Change-Id: Ieabee9964cccec3107971a361a43aa9805164aa9
nit.rc
0eca10751270462c865de16e5aa2443cee92b9b9 24-Nov-2015 Pavlin Radoslavov <pavlin@google.com> Use GID "wakelock" to control access to kernel wakelock

* Added new kernel GID named "wakelock" (AID_WAKELOCK = 3010)
* Changed the group access for /sys/power/wake_lock and
/sys/power/wake_unlock from "system" to "wakelock"
* Added "wakelock" to the list of groups for the healthd process/service

Bug: 25864142
Change-Id: Ieabee9964cccec3107971a361a43aa9805164aa9
nit.rc
1a9c4531c7ae4a6538443a5f7b7f272b42bce1ee 14-Dec-2015 Felipe Leme <felipeal@google.com> Moved 'bugreportplus' from init.rc to dumpstate.rc

BUG: 26034608
Change-Id: Id6923cff0b2b3bd9d2ec9320ebcdb3fbead8df83
nit.rc
c7ae5210a7f558835f167d9788f8ecf60a5d25f5 11-Dec-2015 Andy Hung <hunga@google.com> Merge "Add audioserver uid and restart service when needed"
db8548442304f103e3bc70d34e86e99c2acde15c 11-Dec-2015 Daichi Hirono <hirono@google.com> Merge "Add /mnt/appfuse mount point to init.rc."
7abc71ecd3d9f0ac4a88dedaaf6be952a7b7c909 11-Dec-2015 Daichi Hirono <hirono@google.com> Add /mnt/appfuse mount point to init.rc.

BUG=25755834

Change-Id: I00b1185aec7a95baa6ef2f345a49761f3d006c4d
nit.rc
c5733cfadbf98c8b6a1b280306cb9abac162f26c 09-Dec-2015 Paul Lawrence <paullawrence@google.com> Add createuserkey

Needed so we can make the user0 key on first boot

Change-Id: I4699dbf2efdec44bb09bc4cfa7eeb59e56cb93ab
nit.rc
27ca1eb2940f3be640afe4ffd89a5d8cf852b578 09-Dec-2015 Tao Bao <tbao@google.com> Merge "rootdir: Execute update_verifier for A/B update." am: df13f60ce0
am: 8ca8664956

* commit '8ca8664956bf4bce783d9b84a9f0fd0ff8a9c11f':
rootdir: Execute update_verifier for A/B update.
8ca8664956bf4bce783d9b84a9f0fd0ff8a9c11f 09-Dec-2015 Tao Bao <tbao@google.com> Merge "rootdir: Execute update_verifier for A/B update."
am: df13f60ce0

* commit 'df13f60ce0152bc9a38e18fcb9c7c839d8eba5e3':
rootdir: Execute update_verifier for A/B update.
df13f60ce0152bc9a38e18fcb9c7c839d8eba5e3 09-Dec-2015 Tao Bao <tbao@google.com> Merge "rootdir: Execute update_verifier for A/B update."
c94d92f5ad92444ada64b519cd8e6e64ff9f2be6 08-Dec-2015 Nick Kralevich <nnk@google.com> Merge "init.rc: restorecon_recursive /sys/kernel/debug" am: 6d85c06aa1 am: 070288241d
am: baaeddfa23

* commit 'baaeddfa239625a9d54091c628242d84a9191514':
init.rc: restorecon_recursive /sys/kernel/debug
baaeddfa239625a9d54091c628242d84a9191514 08-Dec-2015 Nick Kralevich <nnk@google.com> Merge "init.rc: restorecon_recursive /sys/kernel/debug" am: 6d85c06aa1
am: 070288241d

* commit '070288241d5c3d1a169e21ba4439a5943ce476d8':
init.rc: restorecon_recursive /sys/kernel/debug
070288241d5c3d1a169e21ba4439a5943ce476d8 08-Dec-2015 Nick Kralevich <nnk@google.com> Merge "init.rc: restorecon_recursive /sys/kernel/debug"
am: 6d85c06aa1

* commit '6d85c06aa1600e905cf3e0b093e939fa3866ee59':
init.rc: restorecon_recursive /sys/kernel/debug
715c4dc3f9972f312d2c072dd9e47d1408ee6f55 08-Dec-2015 Nick Kralevich <nnk@google.com> init.rc: restorecon_recursive /sys/kernel/debug

If /sys/kernel/debug is present, make sure it has all the appropriate
SELinux labels.

Labeling of /sys/kernel/debug depends on kernel support
added in commit https://android-review.googlesource.com/122130

This patch depends on an external/sepolicy change with the
same Change-Id as this patch.

Change-Id: Id1d6a9ad6d0759d6de839458890e8cb24685db6d
nit.rc
97df3956834f00dd084773f1b544f8541584ff32 05-Dec-2015 Tao Bao <tbao@google.com> rootdir: Execute update_verifier for A/B update.

update_verifier verifies the updated partitions and marks the current
slot as having booted successfully. It needs to be triggered prior to
the start of the framework, otherwise it won't be able to fall back to
the old system without a data wipe.

Bug: 26039641
Change-Id: I6fd183cdd3dfcc72feff2a896368158875b28591
nit.rc
088113f419a50f360efa66efd9d88df849576e45 07-Dec-2015 Todd Kennedy <toddke@google.com> Merge "Create new ephemeral app directory"
171b5d8be3f940793f910e1002aa944760fe187f 04-Dec-2015 Felipe Leme <felipeal@google.com> Created service 'bugreportplus'

This service is an enhanced version of bugreport that provides a better
user interface (like displaying progress and allowing user to enter
details).

It will be typically triggered by the 'Take Bug Report' UI, which will
now offer the option for the traditional or enhanced options (services
'bugreport' and 'bugreportplus' respectively).

BUG: 26034608
Change-Id: I39ea92c3e329a801b51f60a558c73faaf890c068
nit.rc
a5954de3bb61bee797024bbef1a795cd071c90e3 30-Nov-2015 Jeff Sharkey <jsharkey@android.com> Create credential-encrypted system dir for owner.

Other user directories are created correctly, but owner is still
special cased.

Bug: 22358539
Change-Id: I2bbd3023cdbcbb5315ebc32ba54dc3ddb9a280d6
nit.rc
0a2733582d85f52b4901e3e7cc5fefea56ec93fc 24-Nov-2015 Todd Kennedy <toddke@google.com> Create new ephemeral app directory

Bug: 25119046
Change-Id: Ie005430700a73ef1ba492dae4101419a41da4071
nit.rc
af1e35e07b986fb8f0f8c5324e10fa06eb0c8a06 18-Nov-2015 Jeff Sharkey <jsharkey@android.com> Create user_de directory for user 0.

This mirrors what we do for "/data/data" for user 0. Eventually we
should move to vold/installd doing the user 0 initialization.

Bug: 22358539
Change-Id: I48cd27b990e6bd6e37870c41aef0e7dc3106caa4
nit.rc
5c331c5be821fe5c900cee56a842a3a8b4a12315 18-Nov-2015 Daniel Rosenberg <drosen@google.com> Remove creation of root directory folders
am: c97e1cb39d

* commit 'c97e1cb39d9ba129d8326605d121a10c9ae491e7':
Remove creation of root directory folders
13c8e8d8ace6b3e697bade2850608b4d75600b76 18-Nov-2015 Junichi Uekawa <uekawa@google.com> Merge "Fix non-vendor.img configuration." am: 1337349ea1 am: ef7197eefa
am: 1aa74e687e

* commit '1aa74e687ecdd2bef8fb786d8027512b6953b6ad':
Fix non-vendor.img configuration.
88b5892d74978df60585ce59dd283d188fecdafa 18-Nov-2015 Todd Kjos <tkjos@google.com> resolve merge conflicts of ed60788968 to mnc-dr2-dev-plus-aosp.

Change-Id: I9b07dd8dcb8fc74b658466b8dd47546cefffab1d
6426874cdda284d46d9d6785627018b66b5e8407 18-Nov-2015 Calin Juravle <calin@google.com> Merge "Don\'t create profiles directory under dalvik-cache." am: 942f8ea84f am: 2a095e186b
am: cdef6fb917

* commit 'cdef6fb91725f771ab23d0eea03a97aa3c161d75':
Don't create profiles directory under dalvik-cache.
ef7197eefa2d000b0e446cf1fb223a55746ae2c3 17-Nov-2015 Junichi Uekawa <uekawa@google.com> Merge "Fix non-vendor.img configuration."
am: 1337349ea1

* commit '1337349ea11a6bb5c44ba5c5bb064c750bd626c5':
Fix non-vendor.img configuration.
07b69961f2291f002f15cc4168726ba1e306914c 11-Nov-2015 Junichi Uekawa <uekawa@google.com> Fix non-vendor.img configuration.

If / is not write-able and system.img contains system/vendor, symlink
for `/vendor/ -> /system/vendor/` that is otherwise done in init.rc
should be done at build time.

BUG=b:25512724

Change-Id: Iaa63d6440373a4fd754a933c9f1960b3787a6d98
ndroid.mk
d792c986063ca0f6207cfb20da18157e657b8270 17-Nov-2015 Daniel Rosenberg <drosen@google.com> Remove creation of root directory folders
am: c97e1cb39d

* commit 'c97e1cb39d9ba129d8326605d121a10c9ae491e7':
Remove creation of root directory folders
ba8a47531c5ebc5e1322088354d2114f6892f3fd 27-Oct-2015 Todd Kjos <tkjos@google.com> Actively mangage EAS schedtune nodes

Move foreground tasks to /sys/fs/cgroup/stune/boost/tasks (boosted
weight in EAS scheduler). Move background tasks to
/sys/fs/cgroup/stune/tasks (default weight). For services started
with init, set "foreground" services to boosted.

Change-Id: I0e489fad9510727c13e6754dabaf311c2391f395
nit.rc
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
c97e1cb39d9ba129d8326605d121a10c9ae491e7 09-Jul-2015 Daniel Rosenberg <drosen@google.com> Remove creation of root directory folders

Folders in the root directory are now created during the build,
as we may be building without a ramdisk, and when we do that,
the root directory will be read-only. With those changes,
these mkdirs will never need to run.

Change-Id: I49c63e8bfc71d28e3f938ed41f81d108359fa57a
nit.rc
ed60788968be61f4f6f47890e5f3cb182a6a2b6e 27-Oct-2015 Todd Kjos <tkjos@google.com> Actively mangage EAS schedtune nodes

Move foreground tasks to /sys/fs/cgroup/stune/boost/tasks (boosted
weight in EAS scheduler). Move background tasks to
/sys/fs/cgroup/stune/tasks (default weight). For services started
with init, set "foreground" services to boosted.

Change-Id: I0e489fad9510727c13e6754dabaf311c2391f395
nit.rc
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
4c9c516d2088fe1ef9a35f704dff7e16f84d3d23 15-Jul-2015 Daniel Rosenberg <drosen@google.com> rootdir: Create cache folder in Android.mk

system.img may contain the root directory as well. In that case, we
need to create some folders init.rc would during the build.

Change-Id: I312104ff926fb08d98ac8256b76d01b0a90ea5e5
ndroid.mk
9262546184e97249cdbea5239d83ce2a60965e74 06-Jun-2015 Daniel Rosenberg <drosen@google.com> rootdir: Create folders in Android.mk

system.img may contain the root directory as well. In that case, we
need to create some folders init.rc would during the build.

Change-Id: I157ccbebf36bee9916f3f584551704ec481ae1d1
ndroid.mk
2a095e186b2ff28d3c5a2e5f20f3cf61cc1942f0 16-Nov-2015 Calin Juravle <calin@google.com> Merge "Don\'t create profiles directory under dalvik-cache."
am: 942f8ea84f

* commit '942f8ea84f3f96c2e2556fe90ebba0ec76730553':
Don't create profiles directory under dalvik-cache.
942f8ea84f3f96c2e2556fe90ebba0ec76730553 16-Nov-2015 Calin Juravle <calin@google.com> Merge "Don't create profiles directory under dalvik-cache."
439419b713736c1280386253945a599bd6d6bac4 12-Nov-2015 Jeff Sharkey <jsharkey@google.com> Merge "Create some new encryption paths."
8e9791357e8c59c35ffc12742e816e9b98cc875d 11-Nov-2015 Calin Juravle <calin@google.com> Merge "Create a folder to store method traces activated with -Xmethod-trace" am: 7605a56fbc am: 5d1a9688b8
am: a8dcfc0622

* commit 'a8dcfc062260bdce7ca471baa5f081e512d5da7f':
Create a folder to store method traces activated with -Xmethod-trace
5d1a9688b8623c12a00b76e2256f5b418aa1dace 11-Nov-2015 Calin Juravle <calin@google.com> Merge "Create a folder to store method traces activated with -Xmethod-trace"
am: 7605a56fbc

* commit '7605a56fbcf5706b6e2892da9d9dc0fd20efb395':
Create a folder to store method traces activated with -Xmethod-trace
11705863ffe2fe6b2bee0720aa37e4b014035eb9 10-Nov-2015 Jeff Sharkey <jsharkey@android.com> Create some new encryption paths.

Bug: 22358539
Change-Id: I2e7533cd3dbd18e9ae115f611c5714b0c7ba4917
nit.rc
9b3e5d59feaa1c6863ba74a764293295e52c9e34 10-Nov-2015 Calin Juravle <calin@google.com> Create a folder to store method traces activated with -Xmethod-trace

Bug: 25612377
Change-Id: I370b858594ccc88c12099b23a0d1aac22acd4969
nit.rc
bdf20142b93999acf59c8e488972ede62ce3a39b 09-Nov-2015 Nick Kralevich <nnk@google.com> Merge "Enable hidepid=2 on /proc" am: 2d8f1d4c47 am: ea8452cc72
am: 7dafe5b818

* commit '7dafe5b818f7771cb00c4a0ea3ab1dbf74593185':
Enable hidepid=2 on /proc
ea8452cc720cfcf2d8d1f469bbaafec968202e99 09-Nov-2015 Nick Kralevich <nnk@google.com> Merge "Enable hidepid=2 on /proc"
am: 2d8f1d4c47

* commit '2d8f1d4c478b9d921730d3fc9b290315e2ff9f04':
Enable hidepid=2 on /proc
c39ba5ae32afb6329d42e61d2941d87ff66d92e3 08-Nov-2015 Nick Kralevich <nnk@google.com> Enable hidepid=2 on /proc

Add the following mount options to the /proc filesystem:

hidepid=2,gid=3009

This change blocks /proc access unless you're in group 3009
(aka AID_READPROC).

Please see
https://github.com/torvalds/linux/blob/master/Documentation/filesystems/proc.txt
for documentation on the hidepid option.

hidepid=2 is preferred over hidepid=1 since it leaks less information
and doesn't generate SELinux ptrace denials when trying to access
/proc without being in the proper group.

Add AID_READPROC to processes which need to access /proc entries for
other UIDs.

Bug: 23310674
Change-Id: I22bb55ff7b80ff722945e224845215196f09dafa
nit.rc
933bc0a3d12e24cc2845507dd70d7c5d1cbe28c5 04-Nov-2015 Calin Juravle <calin@google.com> Don't create profiles directory under dalvik-cache.

Bug: 24698874
Bug: 17173268
Change-Id: Ic81258a8df90818fa6b4ee64fd1507ac18fe3f04
nit.rc
1ec36aaeb02a97a287eb0467b9b2fc9eea38a15c 03-Nov-2015 Bill Yi <byi@google.com> Merge commit 'f85d6cd8045ce933dfdc19bc888228cd9382e48c' into HEAD
eba626f56d129075138d72c1846fa930908980cb 03-Nov-2015 Daniel Rosenberg <drosen@google.com> Merge "rootdir: Allow board specific folders and symlinks in root directory" am: 6e699df21e am: 64ea814c31
am: 1c1a7906c5

* commit '1c1a7906c5f1131fb1295c54e0669ea76111ff90':
rootdir: Allow board specific folders and symlinks in root directory
1c1a7906c5f1131fb1295c54e0669ea76111ff90 02-Nov-2015 Daniel Rosenberg <drosen@google.com> Merge "rootdir: Allow board specific folders and symlinks in root directory" am: 6e699df21e
am: 64ea814c31

* commit '64ea814c312ec43c59e9f132909be121cdf02ab3':
rootdir: Allow board specific folders and symlinks in root directory
64ea814c312ec43c59e9f132909be121cdf02ab3 02-Nov-2015 Daniel Rosenberg <drosen@google.com> Merge "rootdir: Allow board specific folders and symlinks in root directory"
am: 6e699df21e

* commit '6e699df21e1b08aa2e9eb18ef1c44788549ae8ed':
rootdir: Allow board specific folders and symlinks in root directory
52b59159458a574e11f03940840d63feeb648883 28-Oct-2015 Daniel Rosenberg <drosen@google.com> rootdir: Allow board specific folders and symlinks in root directory

Building without ramdisk requires a way to specify board specific
directoryies and symlinks in the root directory at build time.

Change-Id: I11301e98228bc4761f3aee177a546146651b9f25
(cherry picked from commit d7549c9a65cad886f672af41f5fca6f0bd0c12fa)
ndroid.mk
fec47527b4e8499bcdf9d0501980d929cd414745 30-Oct-2015 Andy Hung <hunga@google.com> Add audioserver uid and restart service when needed

Bug: 24511453
Change-Id: I6987a82149d23ad671478cf21488c62cb1ecfc93
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
f2630adeef9b690e1ec2fad99f76c5856c406b36 24-Oct-2015 Evgenii Stepanov <eugenis@google.com> Merge "Disable container overflow detect on target." am: 151e49726b am: 5562351b50
am: ec6ff936b0

* commit 'ec6ff936b0e994b3f6d2b812e4b67aa950fe35f2':
Disable container overflow detect on target.
ec6ff936b0e994b3f6d2b812e4b67aa950fe35f2 24-Oct-2015 Evgenii Stepanov <eugenis@google.com> Merge "Disable container overflow detect on target." am: 151e49726b
am: 5562351b50

* commit '5562351b50fbbcda030ddfffcb3b2dbef82bcdc9':
Disable container overflow detect on target.
5562351b50fbbcda030ddfffcb3b2dbef82bcdc9 24-Oct-2015 Evgenii Stepanov <eugenis@google.com> Merge "Disable container overflow detect on target."
am: 151e49726b

* commit '151e49726bf743bfbd7e44695f9d673735e62119':
Disable container overflow detect on target.
151e49726bf743bfbd7e44695f9d673735e62119 24-Oct-2015 Evgenii Stepanov <eugenis@google.com> Merge "Disable container overflow detect on target."
f3009f21d5e7600d6e7ecede7e27cbd9b446d5d5 23-Oct-2015 Evgenii Stepanov <eugenis@google.com> Disable container overflow detect on target.

Container overflow annotations may cause false positives in partially
instrumented binaries.

Bug: 25228125, 25212198
Change-Id: Ic587d41698c02e306dece4ad7c6a2a8810c52dbd
san.options
e41937d9b31fa1c7c627428d131361ae077bce6c 21-Oct-2015 Tim Murray <timmurray@google.com> Reorder init.rc to avoid a kernel warning. am: f429d37807 am: e56b566401
am: 538697b315

* commit '538697b3153a9a71bdfd197d0461a74d29fd2fae':
Reorder init.rc to avoid a kernel warning.
2b216aa89b76dbadb315322e4fd31aa37059b262 21-Oct-2015 Paul Lawrence <paullawrence@google.com> Merge "Don't show UI on default encryption" into mnc-dr-dev
538697b3153a9a71bdfd197d0461a74d29fd2fae 21-Oct-2015 Tim Murray <timmurray@google.com> Reorder init.rc to avoid a kernel warning. am: f429d37807
am: e56b566401

* commit 'e56b566401aad8e7175306b2969f78baa0b8f9c6':
Reorder init.rc to avoid a kernel warning.
f429d37807a005c1de38a7616669bf1834d45432 15-Oct-2015 Tim Murray <timmurray@google.com> Reorder init.rc to avoid a kernel warning.

3.18 has a warning in dmesg that appears when the parent cpuset's cpus
and mems are changed to something other than what the child has. Reorder
init.rc to prevent this warning from appearing.

bug 24941443

Change-Id: I49d8394063b23dce03222dcc9ddccdc32bb97ea2
nit.rc
09cf06fc74a814176852abb587f1a6aa6b152fc8 10-Oct-2015 Nick Kralevich <nnk@google.com> am 2f63adce: am 28107143: am 9e27cab6: Merge "init.rc: Disable sysrq from the keyboard"

* commit '2f63adcea8e4e4a64d85b59044224f198016e093':
init.rc: Disable sysrq from the keyboard
281071435a00e8f8d9cd91f3a12f31e7c64ac878 10-Oct-2015 Nick Kralevich <nnk@google.com> am 9e27cab6: Merge "init.rc: Disable sysrq from the keyboard"

* commit '9e27cab695b0e2a4910cf576d306a3379991f1f7':
init.rc: Disable sysrq from the keyboard
d28a535d9aa5a30deb682cd02b18c9bbd772c44f 10-Oct-2015 Nick Kralevich <nnk@google.com> init.rc: Disable sysrq from the keyboard

Don't allow the accidental triggering of sysrq functionality
from the keyboard. The only expected use of sysrq functionality
is via /proc/sysrq-trigger

Please see https://www.kernel.org/doc/Documentation/sysrq.txt for
additional information on /proc/sys/kernel/sysrq

Bug: 13435961
Change-Id: I60dc92a4b2b4706e8fa34a6cead9abd449f7375f
nit.rc
8e15f8d0964551e48235572d99cf7356a6bf3c1d 07-Oct-2015 David Zeuthen <zeuthen@google.com> am 8c06f8cc: am 10bb4e51: Merge "init.rc: mkdir /data/misc/update_engine 0700 root root"

* commit '8c06f8ccd41c5d1206d721b4f19dd6b5ede9ad9e':
init.rc: mkdir /data/misc/update_engine 0700 root root
8c06f8ccd41c5d1206d721b4f19dd6b5ede9ad9e 07-Oct-2015 David Zeuthen <zeuthen@google.com> am 10bb4e51: Merge "init.rc: mkdir /data/misc/update_engine 0700 root root"

* commit '10bb4e5161ecca1a9660d1e5967b3fb5e7662839':
init.rc: mkdir /data/misc/update_engine 0700 root root
10bb4e5161ecca1a9660d1e5967b3fb5e7662839 07-Oct-2015 David Zeuthen <zeuthen@google.com> Merge "init.rc: mkdir /data/misc/update_engine 0700 root root"
159147853efb9b2ea81824e4940b815821f76656 07-Oct-2015 David Zeuthen <zeuthen@google.com> init.rc: mkdir /data/misc/update_engine 0700 root root

Ensure that /data/misc/update_engine exists since it will be referenced
by selinux policy.

Bug: 23186405
Change-Id: I96e4ff341086da6474ef7f7c934f1f35bffc1439
nit.rc
d80ddaabe12a22451f17730b584520ecd08f6de2 28-Sep-2015 Mark Salyzyn <salyzyn@google.com> am 936d65f5: am cb2ab20d: am 87122ce1: Merge "logd: increase dgram_max_qlen to 600"

* commit '936d65f59bbab071898390c8bd6982055be5ab4b':
logd: increase dgram_max_qlen to 600
936d65f59bbab071898390c8bd6982055be5ab4b 28-Sep-2015 Mark Salyzyn <salyzyn@google.com> am cb2ab20d: am 87122ce1: Merge "logd: increase dgram_max_qlen to 600"

* commit 'cb2ab20d480cdf488e5b5bf37dc55ca7f0ddee67':
logd: increase dgram_max_qlen to 600
cb2ab20d480cdf488e5b5bf37dc55ca7f0ddee67 28-Sep-2015 Mark Salyzyn <salyzyn@google.com> am 87122ce1: Merge "logd: increase dgram_max_qlen to 600"

* commit '87122ce1d60dd6fbc18e747d976db734d502f2bf':
logd: increase dgram_max_qlen to 600
39944c89a9223ee646cd9263317b284149baa4f1 08-Sep-2015 Mark Salyzyn <salyzyn@google.com> logd: increase dgram_max_qlen to 600

Seeing liblog messages on system_server runtime restart
(too much system_server spam, 566 messages in 72ms)

Bug: 23788621
Change-Id: I5171f2c19a3538da190fc6c2b40e978d89bf0e20
nit.rc
3c6ffbc6fec456bd25a3dad85d45a444b807d020 21-Sep-2015 Tom Cherry <tomcherry@google.com> am 984bd832: resolved conflicts for 5caca3dd to mnc-dr-dev-plus-aosp

* commit '984bd8323dcb5e494a04b2058ab7de40bf347ee5':
add system-background cpuset
984bd8323dcb5e494a04b2058ab7de40bf347ee5 21-Sep-2015 Tom Cherry <tomcherry@google.com> resolved conflicts for 5caca3dd to mnc-dr-dev-plus-aosp

Change-Id: I773e514a8232b77cdd566dc36c9efc4e15f206f0
f09111a9dd118b9aac7ac09059fddf653f6b14dc 20-Sep-2015 Evgenii Stepanov <eugenis@google.com> am fbaaddc5: am 19584247: am ee08fb53: Merge "asan: update condition to work with multiple SANITIZE_TARGET values."

* commit 'fbaaddc588f9d716cff71225a5c510f3b33b90cf':
asan: update condition to work with multiple SANITIZE_TARGET values.
fbaaddc588f9d716cff71225a5c510f3b33b90cf 18-Sep-2015 Evgenii Stepanov <eugenis@google.com> am 19584247: am ee08fb53: Merge "asan: update condition to work with multiple SANITIZE_TARGET values."

* commit '195842474a6722fdf2d967446b81d8accbd4648c':
asan: update condition to work with multiple SANITIZE_TARGET values.
195842474a6722fdf2d967446b81d8accbd4648c 18-Sep-2015 Evgenii Stepanov <eugenis@google.com> am ee08fb53: Merge "asan: update condition to work with multiple SANITIZE_TARGET values."

* commit 'ee08fb53bb59cb5037755d68de09e6e5bc3f8bc6':
asan: update condition to work with multiple SANITIZE_TARGET values.
cba6ad7449bf8027bf045c9a60ff0821e84f3726 18-Sep-2015 Tim Murray <timmurray@google.com> add system-background cpuset

add a new cpuset for system services that should not run on
larger cores

bug 24144797

Change-Id: I21a54f0d6b46b3b8bd8c4564b8685c88cfc4a57d
nit.rc
5039d8cd2180e3ba3c8f320a616a1b84f499e0cf 18-Sep-2015 Ivan Krasin <krasin@google.com> asan: update condition to work with multiple SANITIZE_TARGET values.

The goal is to enable SANITIZE_TARGET='address coverage', which
will be used by LLVMFuzzer.

Bug: 22850550
Change-Id: Iea756eaaedaa56aee4daf714510269efe3aaa553
ndroid.mk
1450d6a37ae21674004134b70481075e09c84b8b 10-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> am 4c96af5e: am c939c61c: am a6c377b2: init: usb: Add configfs commands for USB gadget

* commit '4c96af5e5a67c123fb5d8b40fda87cc2398aec00':
init: usb: Add configfs commands for USB gadget
4c96af5e5a67c123fb5d8b40fda87cc2398aec00 10-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> am c939c61c: am a6c377b2: init: usb: Add configfs commands for USB gadget

* commit 'c939c61c71559271cbbd2c046e35e8a97b501b07':
init: usb: Add configfs commands for USB gadget
751dfddc198b64409d035b8a80b526c0815432fb 09-Sep-2015 Paul Lawrence <paullawrence@google.com> Don't show UI on default encryption

Bug: 22989588
Change-Id: I8e7023767f1da80c872adc45871be1f8851926ad
nit.rc
a6c377b2f62175d6d5268c63885de3d882edbe2b 03-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> init: usb: Add configfs commands for USB gadget

Adds init support for:
accessory
audio_source
midi
adb
rndis

Bug=23633457

Change-Id: I12e68e25969adafcf3170769f91ae939d08b7dbc
nit.usb.configfs.rc
d22aaaac097b1e24bbdc21f9858b3a56b67f479d 07-Sep-2015 Vincent Palatin <vpalatin@chromium.org> am 2a048110: am 100de590: am 5e294902: Merge "init.usb.rc: fix USB typec property names" into mnc-dr-dev

* commit '2a0481109baaa8385bd9e43a95eac24cd6f89e43':
init.usb.rc: fix USB typec property names
2a0481109baaa8385bd9e43a95eac24cd6f89e43 04-Sep-2015 Vincent Palatin <vpalatin@chromium.org> am 100de590: am 5e294902: Merge "init.usb.rc: fix USB typec property names" into mnc-dr-dev

* commit '100de590e7f82e1039eebc10e60ea554deeb1c3f':
init.usb.rc: fix USB typec property names
4c5d655e3d425ea0bb17d6e6675661e57e231be3 04-Sep-2015 Tom Cherry <tomcherry@google.com> am 4bc10de9: am cd1a65b6: am 30c13c49: Merge "move uncrypt from init.rc to uncrypt.rc"

* commit '4bc10de99f3f84b89b40c46203cbc051224f931d':
move uncrypt from init.rc to uncrypt.rc
fd53a3bf82fe0b4d0d2b53e5d8bdf020e5fb3c9c 04-Sep-2015 Tom Cherry <tomcherry@google.com> am c74403b4: am b00a8a06: am e8b0fcec: Merge "combine adbd.rc with init.usb.rc"

* commit 'c74403b4c9c8acae326b39f06905a3a291a5471f':
combine adbd.rc with init.usb.rc
4bc10de99f3f84b89b40c46203cbc051224f931d 04-Sep-2015 Tom Cherry <tomcherry@google.com> am cd1a65b6: am 30c13c49: Merge "move uncrypt from init.rc to uncrypt.rc"

* commit 'cd1a65b69ad2da81e654adab8edeead457a1b1f5':
move uncrypt from init.rc to uncrypt.rc
c74403b4c9c8acae326b39f06905a3a291a5471f 04-Sep-2015 Tom Cherry <tomcherry@google.com> am b00a8a06: am e8b0fcec: Merge "combine adbd.rc with init.usb.rc"

* commit 'b00a8a066f5b6ae5b8d0c03ee7f680389b38a260':
combine adbd.rc with init.usb.rc
cd1a65b69ad2da81e654adab8edeead457a1b1f5 04-Sep-2015 Tom Cherry <tomcherry@google.com> am 30c13c49: Merge "move uncrypt from init.rc to uncrypt.rc"

* commit '30c13c4954a959c2e6c5ba126f26d88b2e56be61':
move uncrypt from init.rc to uncrypt.rc
b00a8a066f5b6ae5b8d0c03ee7f680389b38a260 04-Sep-2015 Tom Cherry <tomcherry@google.com> am e8b0fcec: Merge "combine adbd.rc with init.usb.rc"

* commit 'e8b0fcecf4a17cf37b5fefbcceef0920788f776e':
combine adbd.rc with init.usb.rc
30c13c4954a959c2e6c5ba126f26d88b2e56be61 04-Sep-2015 Tom Cherry <tomcherry@google.com> Merge "move uncrypt from init.rc to uncrypt.rc"
008eb9b80a4094d0f1b4fe29ebfbc3e40cde9575 04-Sep-2015 Tom Cherry <tomcherry@google.com> move uncrypt from init.rc to uncrypt.rc

Move uncrypt from /init.rc to /system/etc/init/uncrypt.rc using the
LOCAL_INIT_RC mechanism

Bug 23186545

Change-Id: Ibd838dd1d250c0e6536e44b69f11fb5ed42ba10b
nit.rc
2270dbbc841f0c98d2c7a6fafea128350aa3abf4 04-Sep-2015 Tom Cherry <tomcherry@google.com> combine adbd.rc with init.usb.rc

init.usb.rc and adbd.rc contain similar contents and belong in the same
file.

This file also belongs on the ramdisk as adbd is on the ramdisk, not the
system partition, therefore resolving to keep init.usb.rc in its current
location and combining the contents of adbd.rc is the best approach

Change-Id: I430f8fea58694679e7b8b7be69ce87daadd616f4
nit.usb.rc
b111a0796226bf88ef080a9826b208e624f16eb5 04-Sep-2015 Tom Cherry <tomcherry@google.com> am fdc6fbd0: am b2acb6b2: am b4998341: Merge "move init.trace.rc to frameworks/native"

* commit 'fdc6fbd0c7f98fa44b86e834a88441cce3bdedaa':
move init.trace.rc to frameworks/native
fdc6fbd0c7f98fa44b86e834a88441cce3bdedaa 04-Sep-2015 Tom Cherry <tomcherry@google.com> am b2acb6b2: am b4998341: Merge "move init.trace.rc to frameworks/native"

* commit 'b2acb6b2ce07bf9e1c944eadcdc2dafe3e41efaf':
move init.trace.rc to frameworks/native
b2acb6b2ce07bf9e1c944eadcdc2dafe3e41efaf 04-Sep-2015 Tom Cherry <tomcherry@google.com> am b4998341: Merge "move init.trace.rc to frameworks/native"

* commit 'b499834121854fd98664d8d96734c733f96dbc1f':
move init.trace.rc to frameworks/native
b0d5184774ae46726113ac3ac59dc89507b7ff02 03-Sep-2015 Tom Cherry <tomcherry@google.com> move init.trace.rc to frameworks/native

init.trace.rc will be renamed to atrace.rc and use the LOCAL_INIT_RC
mechanism to be included on /system appropriately.

Bug 23186545

Change-Id: I55c37d3ff98c9ac10e6c1a713fadc7eb37346195
nit.rc
nit.trace.rc
3b7995b72e53e229b04604e92d9ad67fa69a6402 03-Sep-2015 Vincent Palatin <vpalatin@chromium.org> init.usb.rc: fix USB typec property names

Fix typos in the usb typec properties (sys.usb.typec.*),
so the data_role and the power_role can be written properly in the sysfs.

Bug: 23790832
Change-Id: I90f591ab37825a07e0610ef1fec0e831eb19515d
nit.usb.rc
6d6acf4afede7177f223389a3911cd80590f3356 03-Sep-2015 Tim Murray <timmurray@google.com> am c9b308d1: am bb641d5f: am bc8c731a: Add zygote to the foreground cpuset.

* commit 'c9b308d155c181ae78489454f64877759de98170':
Add zygote to the foreground cpuset.
c9b308d155c181ae78489454f64877759de98170 03-Sep-2015 Tim Murray <timmurray@google.com> am bb641d5f: am bc8c731a: Add zygote to the foreground cpuset.

* commit 'bb641d5f7714bdb8cd3ecc4f47cdd7c68e75d17a':
Add zygote to the foreground cpuset.
d8cf000d6cba28f57daf50d080fdb68688d4f09d 03-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> am b081b8cd: am ddc296e8: am e1801863: init: usb: Add init scripts for configfs commands

* commit 'b081b8cdd17ef678fd84dccb9b5645bd72f26c5b':
init: usb: Add init scripts for configfs commands
5917b8a3bcc54ec82efa2b3c4f14b4aa29ba4fbe 03-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> am 1c791dfd: am 723b410f: am 48d59acc: init.usb.rc: Add new system property for configfs

* commit '1c791dfd3d8e5df380068dda0982ddb9149dcbd9':
init.usb.rc: Add new system property for configfs
a89568c29ed11a32bbc17dfc32da72b3638de070 03-Sep-2015 Tim Murray <timmurray@google.com> am adef754b: am 25a1b489: am 4a1f02ea: Merge "Add foreground/boost cpuset." into mnc-dr-dev

* commit 'adef754b4548b391c6c2cac3065c91ccaa783a1b':
Add foreground/boost cpuset.
b081b8cdd17ef678fd84dccb9b5645bd72f26c5b 03-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> am ddc296e8: am e1801863: init: usb: Add init scripts for configfs commands

* commit 'ddc296e841fa98bc89c0459d1dd3e438c790f15d':
init: usb: Add init scripts for configfs commands
1c791dfd3d8e5df380068dda0982ddb9149dcbd9 03-Sep-2015 Badhri Jagan Sridharan <Badhri@google.com> am 723b410f: am 48d59acc: init.usb.rc: Add new system property for configfs

* commit '723b410ff50920cea270b282c19edcfaf6f444e2':
init.usb.rc: Add new system property for configfs
adef754b4548b391c6c2cac3065c91ccaa783a1b 03-Sep-2015 Tim Murray <timmurray@google.com> am 25a1b489: am 4a1f02ea: Merge "Add foreground/boost cpuset." into mnc-dr-dev

* commit '25a1b4894d9fc249535f0e0b3851643eb172202f':
Add foreground/boost cpuset.
bc8c731aab0fce447e2b792f443aa5b6d72f55f2 02-Sep-2015 Tim Murray <timmurray@google.com> Add zygote to the foreground cpuset.

This ensures that newly forked zygote processes will end up
in the corret cpuset.

bug 23751126

Change-Id: I987a2828cf2504963f1317d17f0b51d26cf22a70
nit.zygote32.rc
nit.zygote32_64.rc
nit.zygote64.rc
nit.zygote64_32.rc
e18018639bd38e959118d16d567c7567bb88d80b 29-Aug-2015 Badhri Jagan Sridharan <Badhri@google.com> init: usb: Add init scripts for configfs commands

This CL adds a new init script init.usb.configfs.rc
to add generic configfs commands. Setting
sys.usb.configfs in init.usb.{hardware}.rc
enables executing commands in this script

Bug=23633457

Change-Id: Iaae844a7957d6c9bf510648aaff86d56aa0c6243
nit.rc
nit.usb.configfs.rc
48d59acc57701dce66113544ccf2a711e21fb1f4 29-Aug-2015 Badhri Jagan Sridharan <Badhri@google.com> init.usb.rc: Add new system property for configfs

This CL helps to execute a different set of
commands for the usb configs specified in
init.usb.rc. Aimed at using configfs based
commands over android composition driver.

Bug=23633457

Change-Id: Ifa5f804e1cff93d15ad57d0ed553300bc5868936
nit.usb.rc
3985dda1c3e668d76ecb689cb89ca8ff6614c7e9 25-Aug-2015 Tim Murray <timmurray@google.com> Add foreground/boost cpuset.

This is used for app launches (and maybe other high priority tasks
in the future). It's to be set to whatever cores should be used
for short term high-priority tasks.

bug 21915482

Change-Id: Id0ab0499146c09e860b97f4cb8095834cb12dd50
nit.rc
9f727002892ef5e49945536e6344d8a886035568 25-Aug-2015 Tom Cherry <tomcherry@google.com> am 5ff07b26: am 9b2bc347: am 77d634f7: Merge "remove TARGET_PROVIDES_INIT_RC"

* commit '5ff07b26851f5f416844e767645876f9f6e11e23':
remove TARGET_PROVIDES_INIT_RC
5ff07b26851f5f416844e767645876f9f6e11e23 25-Aug-2015 Tom Cherry <tomcherry@google.com> am 9b2bc347: am 77d634f7: Merge "remove TARGET_PROVIDES_INIT_RC"

* commit '9b2bc347659de454796acfc9402cbbc170efd133':
remove TARGET_PROVIDES_INIT_RC
fbe3fa84ff2564b909eaad4f427d4501bf5eb285 25-Aug-2015 Tom Cherry <tomcherry@google.com> am 9b2bc347: am 77d634f7: Merge "remove TARGET_PROVIDES_INIT_RC"

* commit '9b2bc347659de454796acfc9402cbbc170efd133':
remove TARGET_PROVIDES_INIT_RC
0ea4ffdc0658982a0744de1da24c781035015830 24-Aug-2015 Tom Cherry <tomcherry@google.com> remove TARGET_PROVIDES_INIT_RC

Change-Id: I15105a8dc11e218d95d4f5a4cee5b2a166d3d639
ndroid.mk
ef6556b8f9a89708b6c96106a2b79c97dc9b2fc5 22-Aug-2015 Tom Cherry <tomcherry@google.com> resolved conflicts for merge of 22bc242a to master

Change-Id: I80546955611db9d003466c78588e8a7316ca9a6d
57a082f4de1864daf545e9f11f7373a409614326 22-Aug-2015 Tom Cherry <tomcherry@google.com> resolved conflicts for merge of b21de5f6 to mnc-dev-plus-aosp

Change-Id: Ia0c7f2e33e22b2419811f7e68da276e02e156d08
22bc242a5b3ecc3efc88d82f99d96a7eb05996fa 22-Aug-2015 Tom Cherry <tomcherry@google.com> resolved conflicts for merge of b21de5f6 to mnc-dr-dev-plus-aosp

Change-Id: I13fd71d5af0b0a66d0c3e2f026581c60e9b95e8b
837135a64fff9f9d5ae630642cfba41cc95d07f8 14-Aug-2015 Tom Cherry <tomcherry@google.com> remove bundled services from rootdir/init.rc

Services definitions for core services are now bundled with the source
for the service itself in the form of <service name>.rc. These
individual .rc files are now located in /system/init/... and are
parsed when the system partition is mounted.

Bug: 23186545
Change-Id: Ia1b73af8d005633aa4252d603892064d7804163d
nit.rc
f1ed73fdf789c0fb2973dd269d049cd43c6162da 19-Aug-2015 Tim Kilbourn <tkilbourn@google.com> am bb41f7d6: am 94653364: Merge "Use init to write usb typec props" into mnc-dr-dev

* commit 'bb41f7d6ed03073ae9df41e3cc0edb80d89574b9':
Use init to write usb typec props
bb41f7d6ed03073ae9df41e3cc0edb80d89574b9 19-Aug-2015 Tim Kilbourn <tkilbourn@google.com> am 94653364: Merge "Use init to write usb typec props" into mnc-dr-dev

* commit '946533648c49f2700b6e0f73383699597649ee60':
Use init to write usb typec props
8c12fdf4abee092df34e449fa91a66f999e34682 12-Aug-2015 Tim Kilbourn <tkilbourn@google.com> Use init to write usb typec props

The sysfs nodes are owned by root, so use init to write role changes.

Bug: 21615151
Change-Id: I39ad03a23af0be9ac859d4fb79a46edc27e30f4e
nit.usb.rc
3aa4f5314ecc9105c8c2b5c642767f90fff96457 17-Aug-2015 Evgenii Stepanov <eugenis@google.com> am 548f53d0: am 1ec3ba44: am 428f626d: Merge "Read global ASAN_OPTIONS from a file."

* commit '548f53d0666dc4fc850989c8af260888584e40d9':
Read global ASAN_OPTIONS from a file.
6c74e5454456e7652b80fb6d19292a7a8948123c 17-Aug-2015 Evgenii Stepanov <eugenis@google.com> am 1ec3ba44: am 428f626d: Merge "Read global ASAN_OPTIONS from a file."

* commit '1ec3ba4471d5883742b2500ba53ed2272539e756':
Read global ASAN_OPTIONS from a file.
548f53d0666dc4fc850989c8af260888584e40d9 17-Aug-2015 Evgenii Stepanov <eugenis@google.com> am 1ec3ba44: am 428f626d: Merge "Read global ASAN_OPTIONS from a file."

* commit '1ec3ba4471d5883742b2500ba53ed2272539e756':
Read global ASAN_OPTIONS from a file.
428f626d1ba9819156549c4ce5b044aadbda014b 16-Aug-2015 Evgenii Stepanov <eugenis@google.com> Merge "Read global ASAN_OPTIONS from a file."
2decff086cea9148939bc4d9fd87550e472dbcbf 13-Aug-2015 Riley Andrews <riandrews@google.com> am 94ee212a: am bc2cdfa8: am b81c410a: Merge "Added file permissions for binder tracing"

* commit '94ee212af135a1e602c9dac73f22dc6807409370':
Added file permissions for binder tracing
19fe5c944252c327f6ae6a0d6529cb65f1c66f50 13-Aug-2015 Riley Andrews <riandrews@google.com> am f63f3685: am 4a4dc5f3: am a3a193ff: Merge "Added shell permisisons for memreclaim tracing"

* commit 'f63f36859eecb3b5a2a43b6ae75fdbbb0f2bc039':
Added shell permisisons for memreclaim tracing
94ee212af135a1e602c9dac73f22dc6807409370 13-Aug-2015 Riley Andrews <riandrews@google.com> am bc2cdfa8: am b81c410a: Merge "Added file permissions for binder tracing"

* commit 'bc2cdfa8a00980f4c38ebcd67bac888b355e3787':
Added file permissions for binder tracing
87ea6cfb6219222fef991713aba21a739bf4f121 13-Aug-2015 Riley Andrews <riandrews@google.com> am bc2cdfa8: am b81c410a: Merge "Added file permissions for binder tracing"

* commit 'bc2cdfa8a00980f4c38ebcd67bac888b355e3787':
Added file permissions for binder tracing
f63f36859eecb3b5a2a43b6ae75fdbbb0f2bc039 13-Aug-2015 Riley Andrews <riandrews@google.com> am 4a4dc5f3: am a3a193ff: Merge "Added shell permisisons for memreclaim tracing"

* commit '4a4dc5f313953764079a4020a3791e36ec43ba0c':
Added shell permisisons for memreclaim tracing
c1490ad9a00b34e13e60a3da056b441242449680 13-Aug-2015 Riley Andrews <riandrews@google.com> am 4a4dc5f3: am a3a193ff: Merge "Added shell permisisons for memreclaim tracing"

* commit '4a4dc5f313953764079a4020a3791e36ec43ba0c':
Added shell permisisons for memreclaim tracing
cd1d99e26840d4fb23498d3fb0be527a9202bd0b 10-Jul-2015 Scott Bauer <bauers@google.com> Added file permissions for binder tracing
nit.trace.rc
a3a193ffd9ee69a8b4dc41a592257bc134bc40da 13-Aug-2015 Riley Andrews <riandrews@google.com> Merge "Added shell permisisons for memreclaim tracing"
0d2dde57fef4db0d0e51369a1d9d9cfa5deb7235 08-Aug-2015 Evgenii Stepanov <eugenis@google.com> Read global ASAN_OPTIONS from a file.

Instead of setting global ASAN_OPTIONS in immutable init.environ.rc,
load them from a file that can be changed later. The file has to be
on the /system partition to both be editable and available at the
early stages of boot.

Also add allocator_may_return_null=1 as that is closer to the
non-ASan allocator behavior.

Bug: 22846541
Change-Id: Ib0f41393c528f2e7cb398470e41f50abf5f4f455
ndroid.mk
san.options
063d4b07abf39ec44e4184cb5410eb9d4ac84940 06-Aug-2015 Jeff Sharkey <jsharkey@android.com> am 94629bde: resolved conflicts for merge of 779a38a5 to mnc-dr-dev-plus-aosp

* commit '94629bdec34b253fa2e9cd9ec800715b3c3a4f7f':
Protect runtime storage mount points.
94629bdec34b253fa2e9cd9ec800715b3c3a4f7f 06-Aug-2015 Jeff Sharkey <jsharkey@android.com> resolved conflicts for merge of 779a38a5 to mnc-dr-dev-plus-aosp

Change-Id: Ieaa0dcd8e93fba3060e9a85f17b1f5eabc6b8c9e
fdf14874930e92933eda7c756fd3bfe1f5e6c09a 06-Aug-2015 Jeff Sharkey <jsharkey@android.com> resolved conflicts for merge of b9f438ff to mnc-dev-plus-aosp

Change-Id: I7103bacb1b2d7dc29b4f8d9dddb2fec1feb869d3
779a38a5cd8dab1741ae4a45907bfdf0449bd546 06-Aug-2015 Jeff Sharkey <jsharkey@android.com> am b9f438ff: Protect runtime storage mount points.

* commit 'b9f438ff841f87c8ffbca85b13a533718a18e15f':
Protect runtime storage mount points.
b9f438ff841f87c8ffbca85b13a533718a18e15f 06-Aug-2015 Jeff Sharkey <jsharkey@android.com> Protect runtime storage mount points.

We have a bunch of magic that mounts the correct view of storage
access based on the runtime permissions of an app, but we forgot to
protect the real underlying data sources; oops.

This series of changes just bumps the directory heirarchy one level
to give us /mnt/runtime which we can mask off as 0700 to prevent
people from jumping to the exposed internals.

Also add CTS tests to verify that we're protecting access to
internal mount points like this.

Bug: 22964288
Change-Id: I32068e63a3362b37e8ebca1418f900bb8537b498
nit.rc
5fa4fbc53ecf503867b658b1b744c60fdedc0efd 04-Aug-2015 Daniel Rosenberg <drosen@google.com> am 0dbbb935: am e20a4194: am 516d30d5: Merge "rootdir: Create symlinks in Android.mk"

* commit '0dbbb935f9e358d31e8f37b9928520ee926886b4':
rootdir: Create symlinks in Android.mk
764b7f561ba5bcecd94b7dd342bab2bf8cc287b7 04-Aug-2015 Daniel Rosenberg <drosen@google.com> am e20a4194: am 516d30d5: Merge "rootdir: Create symlinks in Android.mk"

* commit 'e20a4194b8faacc542aee519a62a01954376be60':
rootdir: Create symlinks in Android.mk
0dbbb935f9e358d31e8f37b9928520ee926886b4 04-Aug-2015 Daniel Rosenberg <drosen@google.com> am e20a4194: am 516d30d5: Merge "rootdir: Create symlinks in Android.mk"

* commit 'e20a4194b8faacc542aee519a62a01954376be60':
rootdir: Create symlinks in Android.mk
595003a3d06a13862052ef2f4f578371dae5ad65 29-Jul-2015 Daniel Rosenberg <drosen@google.com> rootdir: Create symlinks in Android.mk

system.img may contain the root directory as well. In that case, we
need to create some symlinks init.rc would during the build.

Change-Id: I4e7726f38c0f9cd9846c761fad1446738edb52c0
ndroid.mk
91e1b0135d322a1f604fbdc8ec26fad1d2a8bdd9 30-Jul-2015 Yasuhiro Matsuda <mazda@google.com> resolved conflicts for merge of 70ab38a5 to master

Change-Id: I7092ecb87f4020add5fe8843f188955a5579c284
70ab38a5702129ae1cc064345c76f66b4bfa57c2 30-Jul-2015 Yasuhiro Matsuda <mazda@google.com> am 102ead3a: am b10e562b: Merge "Introduce a mechanism to trace boot sequence."

* commit '102ead3ae187a007b8a90b61ea243197927b6ae2':
Introduce a mechanism to trace boot sequence.
6b802c4b9565c83a863c88416e6b7e5c3d418aeb 30-Jul-2015 Yasuhiro Matsuda <mazda@google.com> am 102ead3a: am b10e562b: Merge "Introduce a mechanism to trace boot sequence."

* commit '102ead3ae187a007b8a90b61ea243197927b6ae2':
Introduce a mechanism to trace boot sequence.
f93db4b827818806ca4cee80e6ec954d7aa40632 15-Jun-2015 Yasuhiro Matsuda <mazda@google.com> Introduce a mechanism to trace boot sequence.

This CL adds a trigger and a service so that Systrace can be used
for tracing events during boot.
persist.debug.atrace.boottrace property is used for switching on
and off tracing during boot. /data/misc/boottrace/categories
file is used for specifying the categories to be traced.
These property and file are rewritten by Systrace when the newly
added option --boot is specified.

Here is an example of tracing events of am and wm catetories
during boot.

$ external/chromium-trace/systrace am wm --boot

This command will cause the device to reboot. Once the device has
booted up, the trace report is created by hitting Ctrl+C.

As written in readme.txt, this mechanism relies on persistent
property, so tracing events that are emitted before that are not
recorded. This is enough for tracing events after zygote is
launched though.
This only works on userdebug or eng build for security reason.

BUG: 21739901
Change-Id: I03f2963d77a678f47eab5e3e29fc7e91bc9ca3a4
nit.rc
nit.trace.rc
3fe84e009e20e2104d6a0a6322f18c856b460477 28-Jul-2015 Jeffrey Vander Stoep <jeffv@google.com> am f05256b3: am 4b70dd4c: am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev

* commit 'f05256b32b815fc5d8be65e2fbc2e4a9f4da5ccd':
init.rc: add healthd to system group to allow write to /dev/cpuset
f05256b32b815fc5d8be65e2fbc2e4a9f4da5ccd 28-Jul-2015 Jeffrey Vander Stoep <jeffv@google.com> am 4b70dd4c: am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev

* commit '4b70dd4c8f5c5c2baed8cb1f8436bf74971e20c6':
init.rc: add healthd to system group to allow write to /dev/cpuset
6beb774d5e1606a2a1791c3d165cdecb4fb62b36 28-Jul-2015 Jeffrey Vander Stoep <jeffv@google.com> am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev

* commit '26f0f657ec027430bde7d2237890ba59b3fd174a':
init.rc: add healthd to system group to allow write to /dev/cpuset
4b70dd4c8f5c5c2baed8cb1f8436bf74971e20c6 28-Jul-2015 Jeffrey Vander Stoep <jeffv@google.com> am 26f0f657: Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev

* commit '26f0f657ec027430bde7d2237890ba59b3fd174a':
init.rc: add healthd to system group to allow write to /dev/cpuset
26f0f657ec027430bde7d2237890ba59b3fd174a 28-Jul-2015 Jeffrey Vander Stoep <jeffv@google.com> Merge "init.rc: add healthd to system group to allow write to /dev/cpuset" into mnc-dev
a30a8e02dd41505f46e692f29943011a032a5210 28-Jul-2015 Jeff Vander Stoep <jeffv@google.com> init.rc: add healthd to system group to allow write to /dev/cpuset

Also add to root group to avoid introducting new bugs.

Bug: 22699101
Change-Id: I9da31e0cc955efd711df3f4c6b17e39d74c01549
nit.rc
b4a5b3bac591268337ea17efde88b3749d8c2e24 27-Jul-2015 Nick Kralevich <nnk@google.com> am b57ba047: am ba03cc95: am 5f3b05ad: Merge "init.rc: mkdir /data/anr 0775 system system"

* commit 'b57ba047805fd7a779927075be4581f03f3ad938':
init.rc: mkdir /data/anr 0775 system system
b57ba047805fd7a779927075be4581f03f3ad938 27-Jul-2015 Nick Kralevich <nnk@google.com> am ba03cc95: am 5f3b05ad: Merge "init.rc: mkdir /data/anr 0775 system system"

* commit 'ba03cc953ff9076d5b01748912b102db43911f7f':
init.rc: mkdir /data/anr 0775 system system
0f42f3937126a6de329406216b1bac73da79ef35 26-Jul-2015 Nick Kralevich <nnk@google.com> am ba03cc95: am 5f3b05ad: Merge "init.rc: mkdir /data/anr 0775 system system"

* commit 'ba03cc953ff9076d5b01748912b102db43911f7f':
init.rc: mkdir /data/anr 0775 system system
c2ea70ae6ebcf98bd067e06b3e33894ef5c260c8 26-Jul-2015 Nick Kralevich <nnk@google.com> init.rc: mkdir /data/anr 0775 system system

Ensure that /data/anr always exists. This allows us to eliminate
some code in system_server and dumpstate. In addition, this change
solves a common problem where people would create the directory
manually but fail to set the SELinux label, which would cause
subsequent failures when they used the directory for ANRs.

Bug: 22385254
Change-Id: I29eb3deb21a0504aed07570fee3c2f87e41f53a0
nit.rc
9752a4696eefe82e6dfe37879bb8ee19c291ead7 25-Jul-2015 Jeff Vander Stoep <jeffv@google.com> am 552f23de: am 1d0fe13a: am 3f62a020: logd: allow logd to write to /dev/cpuset files

* commit '552f23deef9491f4e60b78f1ca6f89b7b60c5de2':
logd: allow logd to write to /dev/cpuset files
552f23deef9491f4e60b78f1ca6f89b7b60c5de2 25-Jul-2015 Jeff Vander Stoep <jeffv@google.com> am 1d0fe13a: am 3f62a020: logd: allow logd to write to /dev/cpuset files

* commit '1d0fe13a9e720a88766b38070195670183274e30':
logd: allow logd to write to /dev/cpuset files
1d0fe13a9e720a88766b38070195670183274e30 25-Jul-2015 Jeff Vander Stoep <jeffv@google.com> am 3f62a020: logd: allow logd to write to /dev/cpuset files

* commit '3f62a020c48d5d812fb2898759b93a59dc24d310':
logd: allow logd to write to /dev/cpuset files
c200e9564b3ec7eea4b55badbeb0882c9674513d 25-Jul-2015 Jeff Vander Stoep <jeffv@google.com> am 3f62a020: logd: allow logd to write to /dev/cpuset files

* commit '3f62a020c48d5d812fb2898759b93a59dc24d310':
logd: allow logd to write to /dev/cpuset files
3f62a020c48d5d812fb2898759b93a59dc24d310 24-Jul-2015 Jeff Vander Stoep <jeffv@google.com> logd: allow logd to write to /dev/cpuset files

Required by logd on devices with USE_CPUSETS defined.

Make /dev/cpuset/background, /dev/cpuset/foreground and
/dev/cpuset/task writeable by system gid. Add logd to system
group for writing to cpuset files and to root group to avoid
regressions. When dropping privs, also drop supplementary groups.

Bug: 22699101
Change-Id: Icc01769b18b5e1f1649623da8325a8bfabc3a3f0
nit.rc
42525a1b24af0e90a8c7b45c4a38278c9d84953f 21-Jul-2015 Riley Andrews <riandrews@google.com> am 7c1ae005: am e850f578: Disable scaling of the cfs tunables.

* commit '7c1ae0051d8492b12862f0983521883a1325bdd3':
Disable scaling of the cfs tunables.
7c1ae0051d8492b12862f0983521883a1325bdd3 21-Jul-2015 Riley Andrews <riandrews@google.com> am e850f578: Disable scaling of the cfs tunables.

* commit 'e850f5786cdd4d3e4f1157db8785de3e6ff77eab':
Disable scaling of the cfs tunables.
e850f5786cdd4d3e4f1157db8785de3e6ff77eab 21-Jul-2015 Riley Andrews <riandrews@google.com> Disable scaling of the cfs tunables.

The cfs tunables auto-scale with the number of active cpus by default. Given
that the tunable settings are in device-independent code and it's not
known how many cores are currently active when the init.rc file runs,
the cfs tunables can vary pretty significantly across devices depending
on the state at boot. Disable scaling of the the tunables so that we
can get more consistent behavior of cfs across devices. If we want to
do per-device tuning of these values, we can override what's written
here in device specific files.

Bug: 22634118
Change-Id: Id19b24ef819fef762521e75af55e6d4378cfc949
nit.rc
2a9e682c11b28a3ca29b1686ad287e5806912d30 20-Jul-2015 Daniel Rosenberg <drosen@google.com> am b381f0a5: am 71ca82bf: am 8da23664: Merge "rootdir: Create cache folder in Android.mk"

* commit 'b381f0a5e11bf7a75ee0c06ddb4771a1312a1bea':
rootdir: Create cache folder in Android.mk
b381f0a5e11bf7a75ee0c06ddb4771a1312a1bea 20-Jul-2015 Daniel Rosenberg <drosen@google.com> am 71ca82bf: am 8da23664: Merge "rootdir: Create cache folder in Android.mk"

* commit '71ca82bf954c4bd5b8817eeabb78418fafde90ce':
rootdir: Create cache folder in Android.mk
d2bb8134d337d35c6abfcf57a8a6c754fdba9d45 20-Jul-2015 Daniel Rosenberg <drosen@google.com> am 71ca82bf: am 8da23664: Merge "rootdir: Create cache folder in Android.mk"

* commit '71ca82bf954c4bd5b8817eeabb78418fafde90ce':
rootdir: Create cache folder in Android.mk
8da23664e78dc5b5a483385fb55328d0d7639867 20-Jul-2015 Daniel Rosenberg <drosen@google.com> Merge "rootdir: Create cache folder in Android.mk"
fc1a8c1d353403a07ca035203d6823c4a5031bcb 18-Jul-2015 Elliott Hughes <enh@google.com> am 69b2c2a1: am 6657d224: am 069f62de: Merge "Fix N9 boot."

* commit '69b2c2a125f655a43f54a181d5ddbe714f4848ca':
Fix N9 boot.
69b2c2a125f655a43f54a181d5ddbe714f4848ca 18-Jul-2015 Elliott Hughes <enh@google.com> am 6657d224: am 069f62de: Merge "Fix N9 boot."

* commit '6657d2248e902289476c4b937f5d6a1585c95ec2':
Fix N9 boot.
546738a4e7afbb216876cf65791c87adb0541e7d 18-Jul-2015 Elliott Hughes <enh@google.com> am 6657d224: am 069f62de: Merge "Fix N9 boot."

* commit '6657d2248e902289476c4b937f5d6a1585c95ec2':
Fix N9 boot.
04b2022f7eebffda31f1f86e4f9ee06c45fd0578 18-Jul-2015 Elliott Hughes <enh@google.com> Fix N9 boot.

Without this, sdcard fails to start because its mount point doesn't
exist.

Bug: http://b/22568628
Change-Id: Ic6a2f51fc74c5bd1f23d97592049495ac3822bb3
nit.rc
cf0ca5047991a275379694b46e12eb6fbcfe436a 16-Jul-2015 Scott Bauer <bauers@google.com> Added shell permisisons for memreclaim tracing
nit.trace.rc
86b151cbe892b2481aeedbf6fd3c9f893bd56135 15-Jul-2015 Daniel Rosenberg <drosen@google.com> rootdir: Create cache folder in Android.mk

system.img may contain the root directory as well. In that case, we
need to create some folders init.rc would during the build.

Change-Id: I312104ff926fb08d98ac8256b76d01b0a90ea5e5
ndroid.mk
15db3551d005a58407a8ac97b73a879530dd3e74 15-Jul-2015 Daniel Rosenberg <drosen@google.com> resolved conflicts for merge of 074ee014 to mnc-dev-plus-aosp

Change-Id: Iead524946a84503a6e89c17861d3f54e4cf276a0
nit.rc
cdf768fe7c13f1dfae2bde6fb6d32b8400d56393 15-Jul-2015 Daniel Rosenberg <drosen@google.com> am f3cd170c: am 3470855e: Merge "rootdir: Create folders in Android.mk"

* commit 'f3cd170cdbc1950a9c5efffb5c41c346c4cba298':
rootdir: Create folders in Android.mk
6e1fd8dde739a205e58ebc64347ebc63ddd02a39 14-Jul-2015 Daniel Rosenberg <drosen@google.com> am 1c45c0ff: Merge "resolved conflicts for merge of 074ee014 to mnc-dr-dev-plus-aosp" into mnc-dr-dev-plus-aosp

* commit '1c45c0ff5d1cbd49d2d77fa837e1be0724fa77b3':
Remove creation of root directory folders
cfda5bb47ac558d3628074904e386178c3fc58e1 14-Jul-2015 Daniel Rosenberg <drosen@google.com> resolved conflicts for merge of 074ee014 to mnc-dr-dev-plus-aosp

Change-Id: I346583851035950350433136599f73ab2bedba4b
6158942f27c4007eb32f96d0a80b7cacdfe24d44 14-Jul-2015 Daniel Rosenberg <drosen@google.com> am 26a81c1d: am f3cd170c: am 3470855e: Merge "rootdir: Create folders in Android.mk"

* commit '26a81c1d1a8f7c40cd79648edff0585bfc94e281':
rootdir: Create folders in Android.mk
26a81c1d1a8f7c40cd79648edff0585bfc94e281 14-Jul-2015 Daniel Rosenberg <drosen@google.com> am f3cd170c: am 3470855e: Merge "rootdir: Create folders in Android.mk"

* commit 'f3cd170cdbc1950a9c5efffb5c41c346c4cba298':
rootdir: Create folders in Android.mk
b7f1f61fbc1c2eae7a689df476da401847a936d9 14-Jul-2015 Paul Crowley <paulcrowley@google.com> am ee923139: Merge "Set up user directory crypto in init." into mnc-dr-dev

* commit 'ee923139c346e6751203fc7d2a341388e01c7b19':
Set up user directory crypto in init.
logd: switch to unordered_map from BasicHashtable
rootdir: make sure the /oem mountpoint is always available
f3fbfaef220ead1f68dd5f6a6b2a10ae019764c4 14-Jul-2015 Paul Lawrence <paullawrence@google.com> am c1fa34b9: am d5ef9841: Merge "Change init sequence to support file level encryption" into mnc-dr-dev

* commit 'c1fa34b9f600c827769b4401d8b12e7c587b68f4':
Change init sequence to support file level encryption
ee923139c346e6751203fc7d2a341388e01c7b19 13-Jul-2015 Paul Crowley <paulcrowley@google.com> Merge "Set up user directory crypto in init." into mnc-dr-dev
c1fa34b9f600c827769b4401d8b12e7c587b68f4 13-Jul-2015 Paul Lawrence <paullawrence@google.com> am d5ef9841: Merge "Change init sequence to support file level encryption" into mnc-dr-dev

* commit 'd5ef984195779aa9e27d7baabdd751d641eea1a0':
Change init sequence to support file level encryption
64dffd3975824512353244684c960845be8bdde2 09-Jul-2015 Daniel Rosenberg <drosen@google.com> Remove creation of root directory folders

Folders in the root directory are now created during the build,
as we may be building without a ramdisk, and when we do that,
the root directory will be read-only. With those changes,
these mkdirs will never need to run.

Change-Id: I49c63e8bfc71d28e3f938ed41f81d108359fa57a
nit.rc
58458b66d4c6b0c7c54fc92f174c78378b81ad1d 06-Jun-2015 Daniel Rosenberg <drosen@google.com> rootdir: Create folders in Android.mk

system.img may contain the root directory as well. In that case, we
need to create some folders init.rc would during the build.

Change-Id: I157ccbebf36bee9916f3f584551704ec481ae1d1
ndroid.mk
2ed2e30120778b3b4e2fe67c7e1871465c87ad7f 07-Jul-2015 Paul Lawrence <paullawrence@google.com> am e8308f85: am 81046166: Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev

* commit 'e8308f852c867bc676e71875ea57de022464ea09':
Revert "Change init sequence to support file level encryption"
948410a4936fda5348304af9711db932926bcc1a 01-Jul-2015 Paul Lawrence <paullawrence@google.com> Change init sequence to support file level encryption

File level encryption must get the key between mounting userdata and
calling post_fs_data when the directories are created. This requires
access to keymaster, which in turn is found from a system property.

Split property loaded into system and data, and load in right order.

Bug: 22233063
nit.rc
e8308f852c867bc676e71875ea57de022464ea09 07-Jul-2015 Paul Lawrence <paullawrence@google.com> am 81046166: Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev

* commit '8104616696ac5e806b16a393ea02c4f5d8efc328':
Revert "Change init sequence to support file level encryption"
c011b031c988038f81c72875fdd6ac7349774f35 07-Jul-2015 Paul Lawrence <paullawrence@google.com> am 81046166: Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev

* commit '8104616696ac5e806b16a393ea02c4f5d8efc328':
Revert "Change init sequence to support file level encryption"
8104616696ac5e806b16a393ea02c4f5d8efc328 07-Jul-2015 Paul Lawrence <paullawrence@google.com> Merge "Revert "Change init sequence to support file level encryption"" into mnc-dev
437bc5dceca1608456c1c40b694645bc2d100ad4 07-Jul-2015 Paul Lawrence <paullawrence@google.com> Revert "Change init sequence to support file level encryption"

This reverts commit d815178b7512cb44d8b5f234e3f823b5a3e44dea.

Change-Id: I7e3f55d3092fcd04ea9f62f1971c9d42570f096c
nit.rc
d80e24341176ca9d4048dfae41d99d9435285ee4 07-Jul-2015 Andres Morales <anmorales@google.com> am 722d4a54: am 833f142d: Merge "[init] start gatekeeperd after device decryption" into mnc-dev

* commit '722d4a54d9fa49581931e7c88fee5aa0c1f3c5f8':
[init] start gatekeeperd after device decryption
1c875cc40fa3290c79c463140cbbff98eb524941 07-Jul-2015 Paul Lawrence <paullawrence@google.com> am 22d0ee6a: am a65e402b: Merge "Change init sequence to support file level encryption" into mnc-dev

* commit '22d0ee6a25b3bedd6c3cd52473df1404fce8615f':
Change init sequence to support file level encryption
722d4a54d9fa49581931e7c88fee5aa0c1f3c5f8 07-Jul-2015 Andres Morales <anmorales@google.com> am 833f142d: Merge "[init] start gatekeeperd after device decryption" into mnc-dev

* commit '833f142d201a4b682885ff9d95c6b3ab32fd0618':
[init] start gatekeeperd after device decryption
775b58d08f207cc1752deca50e4526f19ac14583 07-Jul-2015 Andres Morales <anmorales@google.com> am 833f142d: Merge "[init] start gatekeeperd after device decryption" into mnc-dev

* commit '833f142d201a4b682885ff9d95c6b3ab32fd0618':
[init] start gatekeeperd after device decryption
833f142d201a4b682885ff9d95c6b3ab32fd0618 07-Jul-2015 Andres Morales <anmorales@google.com> Merge "[init] start gatekeeperd after device decryption" into mnc-dev
22d0ee6a25b3bedd6c3cd52473df1404fce8615f 06-Jul-2015 Paul Lawrence <paullawrence@google.com> am a65e402b: Merge "Change init sequence to support file level encryption" into mnc-dev

* commit 'a65e402b613e927697d35e7936c6d80908d77e88':
Change init sequence to support file level encryption
d3669ff27f782ce1da324f0a6043204a3a4e9f3f 06-Jul-2015 Paul Lawrence <paullawrence@google.com> am a65e402b: Merge "Change init sequence to support file level encryption" into mnc-dev

* commit 'a65e402b613e927697d35e7936c6d80908d77e88':
Change init sequence to support file level encryption
4dd2982dd31d43e905f6792201c404a2e549ca17 06-Jul-2015 Andres Morales <anmorales@google.com> [init] start gatekeeperd after device decryption

gatekeeperd depends on having /data to determine whether
to call setup routines for qcom HALs.

Bug: 22298552
Change-Id: I6c552016dc863bbb04bd5a949a2317a720c8263f
nit.rc
d815178b7512cb44d8b5f234e3f823b5a3e44dea 01-Jul-2015 Paul Lawrence <paullawrence@google.com> Change init sequence to support file level encryption

File level encryption must get the key between mounting userdata and
calling post_fs_data when the directories are created. This requires
access to keymaster, which in turn is found from a system property.

Split property loaded into system and data, and load in right order.

Bug: 22233063
Change-Id: I8a6c40d44e17de386417a443c9dfc3b4e7fe59a5
nit.rc
35e0cc552c4466c46cf3fc4c326b708313a2e1f9 26-Jun-2015 Jeff Sharkey <jsharkey@android.com> am 96835733: am f38f29c8: Let\'s reinvent storage, yet again!

* commit '96835733b397da908c86e2a1190b8c8baf06a441':
Let's reinvent storage, yet again!
96835733b397da908c86e2a1190b8c8baf06a441 26-Jun-2015 Jeff Sharkey <jsharkey@android.com> am f38f29c8: Let\'s reinvent storage, yet again!

* commit 'f38f29c87d97cea45d04b783bddbd969234b1030':
Let's reinvent storage, yet again!
f38f29c87d97cea45d04b783bddbd969234b1030 23-Jun-2015 Jeff Sharkey <jsharkey@android.com> Let's reinvent storage, yet again!

Now that we're treating storage as a runtime permission, we need to
grant read/write access without killing the app. This is really
tricky, since we had been using GIDs for access control, and they're
set in stone once Zygote drops privileges.

The only thing left that can change dynamically is the filesystem
itself, so let's do that. This means changing the FUSE daemon to
present itself as three different views:

/mnt/runtime_default/foo - view for apps with no access
/mnt/runtime_read/foo - view for apps with read access
/mnt/runtime_write/foo - view for apps with write access

There is still a single location for all the backing files, and
filesystem permissions are derived the same way for each view, but
the file modes are masked off differently for each mountpoint.

During Zygote fork, it wires up the appropriate storage access into
an isolated mount namespace based on the current app permissions. When
the app is granted permissions dynamically at runtime, the system
asks vold to jump into the existing mount namespace and bind mount
the newly granted access model into place.

Bug: 21858077
Change-Id: I5a016f0958a92fd390c02b5ae159f8008bd4f4b7
nit.rc
c25f0dc38bf4b7d1d91742657e50add72f41898d 24-Jun-2015 Evgenii Stepanov <eugenis@google.com> am c7b86c16: am eaa97876: am 2e8d31f6: Merge "SANITIZE_TARGET: set global ASAN_OPTIONS"

* commit 'c7b86c1661c7d178784dc2b9f09e478569a2886c':
SANITIZE_TARGET: set global ASAN_OPTIONS
c7b86c1661c7d178784dc2b9f09e478569a2886c 24-Jun-2015 Evgenii Stepanov <eugenis@google.com> am eaa97876: am 2e8d31f6: Merge "SANITIZE_TARGET: set global ASAN_OPTIONS"

* commit 'eaa978768beef315c5dca9db964d4e80c462cf74':
SANITIZE_TARGET: set global ASAN_OPTIONS
749af8c08f6db8da4202ad93f9a6d06884b27c0d 28-May-2015 Paul Crowley <paulcrowley@google.com> Set up user directory crypto in init.

(cherry-picked from commit b94032b79c3cded501e2d5f7c328cf8c0c3911c4)

Bug: 19704432
Change-Id: Ife4928ffbee39c8ae69e6ba66d9ce5ef5a0beb76
nit.rc
a88a084e94e348206298b796eb1f9709e06cfc14 23-Jun-2015 Pavlin Radoslavov <pavlin@google.com> am 233286f4: am 4caa9f39: Merge "Fix the file permissions of /data/misc/bluedroid/bt_config.conf" into mnc-dev

* commit '233286f40bdd84ad26b5ebf615d9f62fc30e19bf':
Fix the file permissions of /data/misc/bluedroid/bt_config.conf
233286f40bdd84ad26b5ebf615d9f62fc30e19bf 23-Jun-2015 Pavlin Radoslavov <pavlin@google.com> am 4caa9f39: Merge "Fix the file permissions of /data/misc/bluedroid/bt_config.conf" into mnc-dev

* commit '4caa9f39bb3415358dcb737d0eb9058c34192806':
Fix the file permissions of /data/misc/bluedroid/bt_config.conf
8175bb235277f637faf30138b30e97e07fb85b8e 20-Jun-2015 Pavlin Radoslavov <pavlin@google.com> Fix the file permissions of /data/misc/bluedroid/bt_config.conf

Fix the file access permissions and group ownership of
"/data/misc/bluedroid/bt_config.conf" so the file can be reused when
switching users on the device.
For that purpose, we need to do the following:

1. Set the set-group-ID (bit 02000) flag for directory "/data/misc/bluedroid"
so the files created in that directory will have group-id of
"net_bt_stack" .

2. Change the file's permissions of file "/data/misc/bluedroid/bt_config.conf"
to Read/Write by User and Group.

Bug: 21493919
Change-Id: Ie00ab4695198ef2aa299b484ef9d4f17bd41b98a
nit.rc
1cbe3d944a93fa3a0f0d7a444bb69c644c83f385 13-Jun-2015 Evgenii Stepanov <eugenis@google.com> SANITIZE_TARGET: set global ASAN_OPTIONS

allow_user_segv_handler=1 is required to run ART under ASan
detect_odr_violation=0 and alloc_dealloc_mismatch=0 suppress some of
the existing bug reports during boot.

Bug: 21951850, 21785137
Change-Id: I4d36967c6d8d936dacbfdf1b94b87fa94766bd3e
ndroid.mk
nit.environ.rc.in
c15560d49637c3d57a0291eb6d17e948a30ac6e5 12-Jun-2015 Tim Kilbourn <tkilbourn@google.com> Merge "Don't restart zygote when inputflinger dies."
766ca5cd6cf841869aa1baaa4c9b40b1363a2444 12-Jun-2015 Tim Kilbourn <tkilbourn@google.com> Merge "Revert "Track removal of the inputflinger binary.""
83da7c6a54be49adf9e0fc7892c910cbe2f11fec 12-Jun-2015 Tim Murray <timmurray@google.com> am 63e38313: am e5b0c837: Merge "add cpuset support to libcutils" into mnc-dev

* commit '63e383136b8a76fdf619aa878b58b815a094e6ee':
add cpuset support to libcutils
63e383136b8a76fdf619aa878b58b815a094e6ee 12-Jun-2015 Tim Murray <timmurray@google.com> am e5b0c837: Merge "add cpuset support to libcutils" into mnc-dev

* commit 'e5b0c837856007812ace8ec5849f6852015d5d2b':
add cpuset support to libcutils
b769c8d24fd7be96f8968aa4c80b669525b930d3 08-Jun-2015 Tim Murray <timmurray@google.com> add cpuset support to libcutils

bug 21782794

Change-Id: I249531754fb29442dc3c7434d77dbb103f4220a7
nit.rc
7c6020ba53b4b0c2560c11b2aae0e579f44aee29 06-May-2015 Tim Kilbourn <tkilbourn@google.com> Don't restart zygote when inputflinger dies.

During development it is useful to be able to kill inputflinger and have
init restart it without bringing down the entire system server.

Change-Id: I8b13b94331c5045086db2f5c73a8f49efc5992cb
nit.rc
f8fcd6a616cad9424d98e91783d6f14c6f542a1a 24-Feb-2015 Tim Kilbourn <tkilbourn@google.com> Revert "Track removal of the inputflinger binary."

This reverts commit 2422c17c5e5dc4aaaaca6ec99953497d87091a50.

Change-Id: I11d1624947dcc3cdcd0d648de6cc25901c91dac6
nit.rc
04b10b9aa3d4d80addbf5079e1d72b4001ce4172 11-May-2015 Tao Bao <tbao@google.com> Change pre-recovery into two services

/system/bin/uncrypt needs to be triggered to prepare the OTA package
before rebooting into the recovery. Separate pre-recovery (uncrypt)
into two services: uncrypt that does the uncryption work and
pre-recovery that actually reboots the device into recovery.

Also create /cache/recovery on post-fs in case it doesn't exist.

Bug: 20012567
Bug: 20949086
(cherry picked from commit e48aed0f0abd10cb21e14d81ae46214d08872f79)
Change-Id: I9877cd6ac9412ea6a566bb1ec0807940c7a38ce5
nit.rc
b183361199fe206c25ed666f3ad397460939f140 05-Jun-2015 Paul Lawrence <paullawrence@google.com> am a7dcec1d: am 3678a5fb: Merge "Move crypt commands to a different listener in vold" into mnc-dev

* commit 'a7dcec1da38c15d5e5ede7bfdec7ffd880cb6b82':
Move crypt commands to a different listener in vold
a7dcec1da38c15d5e5ede7bfdec7ffd880cb6b82 05-Jun-2015 Paul Lawrence <paullawrence@google.com> am 3678a5fb: Merge "Move crypt commands to a different listener in vold" into mnc-dev

* commit '3678a5fb8d1094c4796c1316f3b571cb63cf7246':
Move crypt commands to a different listener in vold
3678a5fb8d1094c4796c1316f3b571cb63cf7246 04-Jun-2015 Paul Lawrence <paullawrence@google.com> Merge "Move crypt commands to a different listener in vold" into mnc-dev
7dbe806939c164a7b681c57a9725ae9e501f0377 04-Jun-2015 Nick Kralevich <nnk@google.com> am e2722e9b: am a20d6f4e: am 2ec88501: Merge "tzdatacheck: don\'t hard code SELinux domain name"

* commit 'e2722e9bfbeb2f2f349493fbe9b464c24e416ee0':
tzdatacheck: don't hard code SELinux domain name
37fcc5d73ebf31b193cda41731a5a9dcb8206473 03-Jun-2015 Paul Lawrence <paullawrence@google.com> Move crypt commands to a different listener in vold

In order to prevent this bug from happening, we must allow vold cryptfs
commands to complete while a long running mount is underway.

While waiting for vold to be changed to a binder interface, we will simply
create two listeners, one for cryptfs and one for everything else.

Bug: 19197175
Change-Id: Ie3d9567819ced7757b0a8f391547f27db944153c
nit.rc
e2722e9bfbeb2f2f349493fbe9b464c24e416ee0 03-Jun-2015 Nick Kralevich <nnk@google.com> am a20d6f4e: am 2ec88501: Merge "tzdatacheck: don\'t hard code SELinux domain name"

* commit 'a20d6f4e154939722263207ddf5954b3f58f666d':
tzdatacheck: don't hard code SELinux domain name
32512e716750b94c9e72c50a98a5db724857f1d5 03-Jun-2015 Nick Kralevich <nnk@google.com> tzdatacheck: don't hard code SELinux domain name

An automatic domain transition is already defined by SELinux
policy. Avoid having redundant information on the exec line.

This commit depends on commit 17fff893c04971b519d25d52b07f51111353cba5
which made the SELinux process label optional.

(cherrypicked from commit 221fca7ddd2ba1778ec89013c96434a9d36b529e)

Change-Id: I89464f2bd218c7d6e8db08aa6bed2b62ec6dad2a
nit.rc
221fca7ddd2ba1778ec89013c96434a9d36b529e 03-Jun-2015 Nick Kralevich <nnk@google.com> tzdatacheck: don't hard code SELinux domain name

An automatic domain transition is already defined by SELinux
policy. Avoid having redundant information on the exec line.

This commit depends on commit 17fff893c04971b519d25d52b07f51111353cba5
which made the SELinux process label optional.

Change-Id: I89464f2bd218c7d6e8db08aa6bed2b62ec6dad2a
nit.rc
b94032b79c3cded501e2d5f7c328cf8c0c3911c4 28-May-2015 Paul Crowley <paulcrowley@google.com> Set up user directory crypto in init.

Bug: 19704432
Change-Id: Ife4928ffbee39c8ae69e6ba66d9ce5ef5a0beb76
nit.rc
f8a6fa503f13202dea3189eb284d8a8950f80b9e 03-Jun-2015 Paul Crowley <paulcrowley@google.com> Restore creation of /data/misc/vold erroneously rolled back

Rollback commit: 9f403450bcce9ef0ef99ff58b65eb3b1eedc6979

Bug: 19704432
Change-Id: I1a73a2e1d3f4d5441df4d686d420d3a79b3e95bc
nit.rc
d8a99287a411c62a536f9b2b0be35e4d0ca16c0d 03-Jun-2015 Mark Salyzyn <salyzyn@google.com> am 56051554: am e0e56563: am 0bda352f: Merge changes from topic \'logcatd\'

* commit '560515540d3ef4da9dc58e3b7fcfeb6c067bb677':
init.rc: logd: Add logpersistd (nee logcatd)
init: change exec parsing to make SECLABEL optional
logcat: -f run in background
logcat: -f flag to continue
560515540d3ef4da9dc58e3b7fcfeb6c067bb677 03-Jun-2015 Mark Salyzyn <salyzyn@google.com> am e0e56563: am 0bda352f: Merge changes from topic \'logcatd\'

* commit 'e0e565635a7c6c36a05282622c01203afbec5ca5':
init.rc: logd: Add logpersistd (nee logcatd)
init: change exec parsing to make SECLABEL optional
logcat: -f run in background
logcat: -f flag to continue
49ed105fd91677f7c87417890bf7441146953fff 26-May-2015 Mark Salyzyn <salyzyn@google.com> init.rc: logd: Add logpersistd (nee logcatd)

(cherry pick from commit 100658c303919d8f69c76f6f25eac376795712f0)

- logpersistd is defined as a thread or process in the context of the
logd domain. Here we define logpersistd as logcat -f in logd domain
and call it logcatd to represent its service mechanics.
- Use logcatd to manage content in /data/misc/logd/ directory.
- Only turn on for persist.logd.logpersistd = logcatd.
- Add logpersist.start, logpersist.stop and logpersist.cat debug
class executables, thus only in the eng and userdebug builds.

ToDo: Wish to add Developer Options menu to turn this feature on or
off, complicated by the fact that user builds have no tools with
access rights to /data/misc/logd.

Bug: 19608716
Change-Id: I57ad757f121c473d04f9fabe9d4820a0eca06f31
nit.rc
100658c303919d8f69c76f6f25eac376795712f0 26-May-2015 Mark Salyzyn <salyzyn@google.com> init.rc: logd: Add logpersistd (nee logcatd)

- logpersistd is defined as a thread or process in the context of the
logd domain. Here we define logpersistd as logcat -f in logd domain
and call it logcatd to represent its service mechanics.
- Use logcatd to manage content in /data/misc/logd/ directory.
- Only turn on for persist.logd.logpersistd = logcatd.
- Add logpersist.start, logpersist.stop and logpersist.cat debug
class executables, thus only in the eng and userdebug builds.

ToDo: Wish to add Developer Options menu to turn this feature on or
off, complicated by the fact that user builds have no tools with
access rights to /data/misc/logd.

Bug: 19608716
Change-Id: I57ad757f121c473d04f9fabe9d4820a0eca06f31
nit.rc
473a50f1687e8511ff9efcf370adfa68568669ab 02-Jun-2015 Mark Salyzyn <salyzyn@google.com> rootdir: init.trace.rc too early

(cherry pick from commit 89357d23a1d3166f0402734086da77805ca13617)

debugfs is mounted on boot

Bug: 21566233
Change-Id: I2ba106fbb1e8164ff3d8b2d5b16a16d7926c2732
nit.trace.rc
e8f74ae70686d3e7ab9448e2fd28892ab3add7ac 02-Jun-2015 Mark Salyzyn <salyzyn@google.com> am c79daf52: am 1300b16e: am 66e39275: Merge "rootdir: init.trace.rc too early"

* commit 'c79daf522566655c5e18a62c54ae484d14de5373':
rootdir: init.trace.rc too early
c79daf522566655c5e18a62c54ae484d14de5373 02-Jun-2015 Mark Salyzyn <salyzyn@google.com> am 1300b16e: am 66e39275: Merge "rootdir: init.trace.rc too early"

* commit '1300b16e51045b0d1235cfaaa031228ded60924b':
rootdir: init.trace.rc too early
89357d23a1d3166f0402734086da77805ca13617 02-Jun-2015 Mark Salyzyn <salyzyn@google.com> rootdir: init.trace.rc too early

debugfs is mounted on boot

Bug: 21566233
Change-Id: I2ba106fbb1e8164ff3d8b2d5b16a16d7926c2732
nit.trace.rc
0a423d994a0dbd05924ae6cff702b5d4d7dd43f0 29-Apr-2015 Paul Lawrence <paullawrence@google.com> DO NOT MERGE Securely encrypt the master key

(chery-picked from commit 806d10be2336f32cdca16c2540cbf3d548f2fec7)

Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys.

Use ro.crypto.type flag to determine crypto type, which prevents
any issues when running in block encrypted mode, as well as speeding
up boot in block or no encryption.

This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/148586/
https://android-review.googlesource.com/#/c/148604/
https://android-review.googlesource.com/#/c/148606/
https://android-review.googlesource.com/#/c/148607/

Bug: 18151196

Change-Id: I6a8a18f43ae837e330e2785bd26c2c306ae1816b
nit.rc
7cc023a7d59bef9e39ca374d5ba8c80e6f75cd7d 29-May-2015 Tao Bao <tbao@google.com> am 6b0938f7: am 6484f3d1: Merge "Change pre-recovery into two services" into mnc-dev

* commit '6b0938f7fb39ad4ad071c2b493545409a3d69f41':
Change pre-recovery into two services
6b0938f7fb39ad4ad071c2b493545409a3d69f41 29-May-2015 Tao Bao <tbao@google.com> am 6484f3d1: Merge "Change pre-recovery into two services" into mnc-dev

* commit '6484f3d1cb4078c7525e23d16c7e7bcd90afa653':
Change pre-recovery into two services
6484f3d1cb4078c7525e23d16c7e7bcd90afa653 28-May-2015 Tao Bao <tbao@google.com> Merge "Change pre-recovery into two services" into mnc-dev
7c3f575c8a3e65340dc5d07701c7908ddb9b0907 28-May-2015 Than McIntosh <thanm@google.com> am a4fd555f: am 51f8aa27: am f166e38b: Merge "Move perfprofd to late_start class."

* commit 'a4fd555fc9654ba18d947deb13edae303172d575':
Move perfprofd to late_start class.
a4fd555fc9654ba18d947deb13edae303172d575 28-May-2015 Than McIntosh <thanm@google.com> am 51f8aa27: am f166e38b: Merge "Move perfprofd to late_start class."

* commit '51f8aa27fdc5675cf0e621af6e14625a24720ff0':
Move perfprofd to late_start class.
b37c45e90aa311b4d32a5b21dad5fce93c9761a7 27-May-2015 Than McIntosh <thanm@google.com> Move perfprofd to late_start class.

Bug: http://b/19483574
Change-Id: I88649b50b95cbddb7d0671a5499232cbef156c48
(cherry picked from commit e8efd0d6bf41527d67a402ed3a945a8c5f75f10d)
nit.rc
e8efd0d6bf41527d67a402ed3a945a8c5f75f10d 27-May-2015 Than McIntosh <thanm@google.com> Move perfprofd to late_start class.

Bug: http://b/19483574
Change-Id: I88649b50b95cbddb7d0671a5499232cbef156c48
nit.rc
9f403450bcce9ef0ef99ff58b65eb3b1eedc6979 22-May-2015 Paul Lawrence <paullawrence@google.com> am ffdac6dd: am f0b318d6: am 7c789575: Merge "Revert "Set up crypto for user directories in init.""

* commit 'ffdac6ddf2e13370674821159edd9663b5302707':
Revert "Set up crypto for user directories in init."
ffdac6ddf2e13370674821159edd9663b5302707 22-May-2015 Paul Lawrence <paullawrence@google.com> am f0b318d6: am 7c789575: Merge "Revert "Set up crypto for user directories in init.""

* commit 'f0b318d61cc129f4ddd25859500857b9f8e34e69':
Revert "Set up crypto for user directories in init."
2e24bcfdce030d410cbc8e8c8fa3e8c1260ba65d 22-May-2015 Paul Lawrence <paullawrence@google.com> Revert "Set up crypto for user directories in init."

Causes a boot loop in Shamu

This reverts commit ce6f7160969e67c9caa486a6f249ab3e997c5f4c.

Bug: 21396871
Change-Id: I9709053c589807d4530a3a99bd84e5b3177316cd
nit.rc
83e670e6871046f4c0bb19a28d82f811a163938f 22-May-2015 Paul Crowley <paulcrowley@google.com> am e8cbb421: am 5f3c715e: am 7f623dec: Merge "Set up crypto for user directories in init."

* commit 'e8cbb421cd28ec754923a88a919557ee5b174411':
Set up crypto for user directories in init.
e8cbb421cd28ec754923a88a919557ee5b174411 21-May-2015 Paul Crowley <paulcrowley@google.com> am 5f3c715e: am 7f623dec: Merge "Set up crypto for user directories in init."

* commit '5f3c715e1a8331f13ea39264b24dfc03ac8db060':
Set up crypto for user directories in init.
ce6f7160969e67c9caa486a6f249ab3e997c5f4c 06-May-2015 Paul Crowley <paulcrowley@google.com> Set up crypto for user directories in init.

Depends on https://android-review.googlesource.com/#/c/147911/

Bug: 19704432
Change-Id: Ie59c6b67f73c1cadd86e69d3c9673ddaddb49a7e
nit.rc
e48aed0f0abd10cb21e14d81ae46214d08872f79 11-May-2015 Tao Bao <tbao@google.com> Change pre-recovery into two services

/system/bin/uncrypt needs to be triggered to prepare the OTA package
before rebooting into the recovery. Separate pre-recovery (uncrypt)
into two services: uncrypt that does the uncryption work and
pre-recovery that actually reboots the device into recovery.

Also create /cache/recovery on post-fs in case it doesn't exist.

Bug: 20012567
Bug: 20949086
Change-Id: If67fe1e9ee6279593d2788452febcd3f0fe714c2
nit.rc
7ae36219a311f4146d9f33f90dff7c0491e6467a 13-May-2015 Terry Heo <terryheo@google.com> am e4c6666e: am 55431d97: Merge "rootdir: add permission for /dev/dvb*" into mnc-dev

* commit 'e4c6666ea9477b34a535cf9208907277cefa1827':
rootdir: add permission for /dev/dvb*
e4c6666ea9477b34a535cf9208907277cefa1827 13-May-2015 Terry Heo <terryheo@google.com> am 55431d97: Merge "rootdir: add permission for /dev/dvb*" into mnc-dev

* commit '55431d97459210f0f4ac66538ca6cbf8cf3511e9':
rootdir: add permission for /dev/dvb*
1f0dd2210b4a09fd6272289058a1a306da8ed34d 12-May-2015 Kevin Cernekee <cernekee@google.com> ueventd.rc: Document the different rule formats for /dev and /sys nodes

This was causing some confusion during shark bringup and we weren't able
to find docs online, so let's add some hints at the top of the file in
case it comes up again.

Change-Id: Ica2cd8a0fb28efb99077fdc98673dbbdd6f58ff6
Signed-off-by: Kevin Cernekee <cernekee@google.com>
eventd.rc
0853afe8aaf46fcad2fda8fd99809a9bb0663ec2 07-May-2015 Dehao Chen <dehao@google.com> am 3ce52a57: am ac725c12: Add /data/misc/perfprofd to store perf profile.

* commit '3ce52a57c5db5de2eff7cb14497279c7a6e157e8':
Add /data/misc/perfprofd to store perf profile.
ed8ad5978939b5d41d9dd533c19a15dd3a805ccd 07-May-2015 Nick Kralevich <nnk@google.com> am 0847d1bf: am 6ee69177: rootdir: make sure the /oem mountpoint is always available

* commit '0847d1bf2f16aa7161c5b4a01272991500d8609e':
rootdir: make sure the /oem mountpoint is always available
bf81356e22d2fc087ffb3b0f1c9fb816d3256896 08-Apr-2015 Terry Heo <terryheo@google.com> rootdir: add permission for /dev/dvb*

Bug: 20112245
Change-Id: I513c6ed5b65d5bd4edef6cb12d7fc20eb9cad4f1
eventd.rc
3ce52a57c5db5de2eff7cb14497279c7a6e157e8 07-May-2015 Dehao Chen <dehao@google.com> am ac725c12: Add /data/misc/perfprofd to store perf profile.

* commit 'ac725c12da8a67ca33d10c7b6131f8f543ed4449':
Add /data/misc/perfprofd to store perf profile.
0847d1bf2f16aa7161c5b4a01272991500d8609e 07-May-2015 Nick Kralevich <nnk@google.com> am 6ee69177: rootdir: make sure the /oem mountpoint is always available

* commit '6ee6917757bd4b00437cabe07fbaa48ce2621b38':
rootdir: make sure the /oem mountpoint is always available
ac725c12da8a67ca33d10c7b6131f8f543ed4449 06-May-2015 Dehao Chen <dehao@google.com> Add /data/misc/perfprofd to store perf profile.

BUG: 19483574

(cherry picked from commit 30c401fa92f5a32a9a41024d9d1daddd1bc37ea5)

Change-Id: Ibf96db9f7e5db625b395db20b73572acc240b1f9
nit.rc
577c1245aab095e390d35d02567804546bb030f9 06-May-2015 Nick Kralevich <nnk@google.com> Merge "Add /data/misc/perfprofd to store perf profile."
6ee6917757bd4b00437cabe07fbaa48ce2621b38 06-May-2015 Nick Kralevich <nnk@google.com> rootdir: make sure the /oem mountpoint is always available

The /oem mount point is used to mount semi-trusted data, and
many Android One devices depend on it. Make sure it's guaranteed
to always be available.

(cherrypicked from commit f3b554fc614fffaa5fc62ef1b4147131a8fa373c)

Bug: 20816563
Change-Id: Ib5272f025d14d4da6125d753879054b3faeae696
ndroid.mk
f3b554fc614fffaa5fc62ef1b4147131a8fa373c 06-May-2015 Nick Kralevich <nnk@google.com> rootdir: make sure the /oem mountpoint is always available

The /oem mount point is used to mount semi-trusted data, and
many Android One devices depend on it. Make sure it's guaranteed
to always be available.

Bug: 20816563
Change-Id: Ib5272f025d14d4da6125d753879054b3faeae696
ndroid.mk
30c401fa92f5a32a9a41024d9d1daddd1bc37ea5 06-May-2015 Dehao Chen <dehao@google.com> Add /data/misc/perfprofd to store perf profile.

BUG: 19483574

Change-Id: Ib5eb9e789c063bd76d24181c4c03652f9ef12cb7
nit.rc
7d678d8d78b40c9c7697565637ba5e4dc81ec02f 28-Apr-2015 Than McIntosh <thanm@google.com> Invoke perfprofd daemon (only for userdebug/eng builds).

Change-Id: Ifaabe32dda6db249efc62c5db3760e32295eb1a9
(cherry picked from commit d6544d2a405df4c6e1fb517b1038a3640ae5f095)
nit.rc
b12facc2e295ebfcba34af61ca81d36523af26a2 02-May-2015 Elliott Hughes <enh@google.com> am d5fb597c: am 5ea5aaa5: am a668478e: Merge "Invoke perfprofd daemon (only for userdebug/eng builds)."

* commit 'd5fb597c8d21215273e0c48b494a13f989c212dd':
Invoke perfprofd daemon (only for userdebug/eng builds).
d5fb597c8d21215273e0c48b494a13f989c212dd 02-May-2015 Elliott Hughes <enh@google.com> am 5ea5aaa5: am a668478e: Merge "Invoke perfprofd daemon (only for userdebug/eng builds)."

* commit '5ea5aaa561fc011bf58332d48fb6bbf102cc40a4':
Invoke perfprofd daemon (only for userdebug/eng builds).
dd764f5192d67ee6bd7ee79c4b0b4af5aa00ae9a 29-Apr-2015 Paul Lawrence <paullawrence@google.com> Fix whitespace

Change-Id: If13df64f6ba61e0f8742e85a332dea7c5e7640af
nit.rc
b8fca94e81698229970124d7feba4242b4b504f3 29-Apr-2015 Paul Lawrence <paullawrence@google.com> Merge commit '2fe6a631' into manualmerge

Change-Id: Ib8d61ee25711e86a2df3705e87904a50c0ef5187
806d10be2336f32cdca16c2540cbf3d548f2fec7 29-Apr-2015 Paul Lawrence <paullawrence@google.com> Securely encrypt the master key

Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys.

Use ro.crypto.type flag to determine crypto type, which prevents
any issues when running in block encrypted mode, as well as speeding
up boot in block or no encryption.

This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/148586/
https://android-review.googlesource.com/#/c/148604/
https://android-review.googlesource.com/#/c/148606/
https://android-review.googlesource.com/#/c/148607/

Bug: 18151196

Change-Id: I6a8a18f43ae837e330e2785bd26c2c306ae1816b
nit.rc
658801ff9ff59ae0f6102a4e15bb3a07742d3d71 28-Apr-2015 Paul Lawrence <paullawrence@google.com> resolved conflicts for merge of 6a5244bc to mnc-dev-plus-aosp

Change-Id: Ied1bbf09aeeed53daefb53c559498066abd9b767
2b3a4939463cb2eb6b65e416f6544a2e2d3bc29b 28-Apr-2015 Paul Lawrence <paullawrence@google.com> Merge "Revert "Securely encrypt the master key""
7ac2807546487de0cd74a8bbd976753c8f5862f3 28-Apr-2015 Paul Lawrence <paullawrence@google.com> Revert "Securely encrypt the master key"

This reverts commit 4bf1887c787a025aad2fbafe382e556e85ac73b0.

Change-Id: Ie6d1f39de530b99b50a27ddc45bcc900a24e04b5
nit.rc
d6544d2a405df4c6e1fb517b1038a3640ae5f095 28-Apr-2015 Than McIntosh <thanm@google.com> Invoke perfprofd daemon (only for userdebug/eng builds).

Change-Id: Ifaabe32dda6db249efc62c5db3760e32295eb1a9
nit.rc
7880f812f7f7f92db694963027b86716bcd5d777 27-Apr-2015 Paul Lawrence <paullawrence@google.com> resolved conflicts for merge of 72fad66f to mnc-dev-plus-aosp

Change-Id: Ib6659a50ee3f1f1ac3719e5d3397c21f786b9afc
9234b169e62b10e38ecd3dc636ccccb425ea4eed 27-Apr-2015 Paul Lawrence <paullawrence@google.com> Merge "Securely encrypt the master key"
5cb4c8796cf43ddcb11ac5af8cc4bfe6be730154 24-Apr-2015 Mark Salyzyn <salyzyn@google.com> Revert "STOPSHIP: WifiStateMachine logging temporarily disabled"

This reverts commit 15ae6c2e7ce02db583ca5a6be5ca30499d56de87.

Change-Id: I281a65209a5118a6c73ddec65ed40d149c23bf0b
nit.rc
b2beaf7b204952dc5f6447f75e9d247a895e8ed4 24-Apr-2015 Mark Salyzyn <salyzyn@google.com> Merge "Revert "STOPSHIP: Additional Wifi logging temporarily disabled""
03c9267865d34cc4a233776dea03b967ac0b54da 24-Apr-2015 Elliott Hughes <enh@google.com> am a8088f38: am ec389902: am 132440b0: Merge "Revert "Revert "Make init re-exec itself for its SELinux domain transition."""

* commit 'a8088f380932d873a39fafdd816f96328f7caa9c':
Revert "Revert "Make init re-exec itself for its SELinux domain transition.""
ea782d327a3d959d93f2b23b85894aa392e64a2f 24-Apr-2015 Mark Salyzyn <salyzyn@google.com> Revert "STOPSHIP: Additional Wifi logging temporarily disabled"

This reverts commit 18b1da2033440cf362ea5c71ca687d359671096f.

Change-Id: I86cde061a36a9a9e43c8a5df2df1e853ed32b7a0
nit.rc
f65730e620dde083133b8c1ab61c0d07b4dd8c2f 24-Apr-2015 Elliott Hughes <enh@google.com> Revert "Revert "Make init re-exec itself for its SELinux domain transition.""

This reverts commit 4217374611ada50f33aee544f015f6f9dfbf7ced.

It turns out that the kernel passes any unrecognized arguments on to init,
and (at least) N6 and N9 have such arguments. My lazy check of argc was
thus insufficient to recognize what stage of init we were in, so we'd
skip to stage 2 and not set up SELinux. And apparently you can get a
very long way with SELinux off... We'll fix that in a later change.

Bug: 19702273
Change-Id: I43b3fb722fed35dd217cb529cbcac9a29aff4e4b
nit.rc
d6069e21ee5c6941844b31b29732f9ccb84304b5 24-Apr-2015 Nick Kralevich <nnk@google.com> am b706a8ac: am 2db3cd3e: am 46fee19c: Merge "Revert "Make init re-exec itself for its SELinux domain transition.""

* commit 'b706a8acff9c62da7b4045374b93a8739671a8a0':
Revert "Make init re-exec itself for its SELinux domain transition."
46fee19cb27dd24a58bbcad608058f25ca7b3e52 24-Apr-2015 Nick Kralevich <nnk@google.com> Merge "Revert "Make init re-exec itself for its SELinux domain transition.""
4217374611ada50f33aee544f015f6f9dfbf7ced 24-Apr-2015 Nick Kralevich <nnk@google.com> Revert "Make init re-exec itself for its SELinux domain transition."

shamu isn't booting.

This reverts commit adf0d1bbfa4bc560c2106f14afa8258a11c48bf6.

Change-Id: I89d568838cebbe14cc4a8ae3843f0f1ac54987af
nit.rc
8e9b756eab8ec3f91a4349e959e830535c6d6966 24-Apr-2015 Elliott Hughes <enh@google.com> am 77260323: am 20dfbb0f: am fa66b4e1: Merge "Remove long-obsolete file."

* commit '77260323e2e99a996351a98a44ef56db5f1e2767':
Remove long-obsolete file.
2a87d2b155e84424ec8b29ffbc8a409ee932f640 24-Apr-2015 Elliott Hughes <enh@google.com> Remove long-obsolete file.

Change-Id: I728cc13b4a7ac93f9c923d2fc9bda2bb65ffe99d
tc/mountd.conf
45a2329b2d3e928d48f546d6d6822620e0dac057 24-Apr-2015 Elliott Hughes <enh@google.com> am 77434ab3: am ef68fd3f: am d4656784: Merge "Make init re-exec itself for its SELinux domain transition."

* commit '77434ab362b3234accf16499aaf2a5340d568553':
Make init re-exec itself for its SELinux domain transition.
d46567848bfcdc8f2cbc3faeef487cf5c770b43a 24-Apr-2015 Elliott Hughes <enh@google.com> Merge "Make init re-exec itself for its SELinux domain transition."
7076796cab1ae275d9e9336f19e068abf28f946b 24-Apr-2015 Mark Salyzyn <salyzyn@google.com> am 44f1356e: am 85a9566f: am 76520752: Merge "rootfs: init.rc start logd parse error"

* commit '44f1356e42a64fefb194b5c74b62402f4ec2881e':
rootfs: init.rc start logd parse error
765207524fcbe261686c5d96bc42ea3dcc124f0a 24-Apr-2015 Mark Salyzyn <salyzyn@google.com> Merge "rootfs: init.rc start logd parse error"
adf0d1bbfa4bc560c2106f14afa8258a11c48bf6 23-Apr-2015 Elliott Hughes <enh@google.com> Make init re-exec itself for its SELinux domain transition.

Change-Id: I38adabe5789d671e3f7d21936071a758ec8cea8a
nit.rc
4bf1887c787a025aad2fbafe382e556e85ac73b0 30-Mar-2015 Paul Lawrence <paullawrence@google.com> Securely encrypt the master key

Remove unencrypted link since it is easier to manage directly
Move creation of key to vold
Start vold early so this is possible in a timely fashion

This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/144586/
https://android-review.googlesource.com/#/c/144663/
https://android-review.googlesource.com/#/c/144672/
https://android-review.googlesource.com/#/c/144673/

Bug: 18151196
Change-Id: Idb17d1f1a724c6ec509d181ae4427113e9d3b5e6
nit.rc
18b1da2033440cf362ea5c71ca687d359671096f 22-Apr-2015 Mark Salyzyn <salyzyn@google.com> STOPSHIP: Additional Wifi logging temporarily disabled

Bug: 20416721
Change-Id: I1be1c742f47f0e673eef6a8d391246f47c35c336
nit.rc
15ae6c2e7ce02db583ca5a6be5ca30499d56de87 22-Apr-2015 Mark Salyzyn <salyzyn@google.com> STOPSHIP: WifiStateMachine logging temporarily disabled

Bug: 20416721
Change-Id: Id60eb6ab77589ab50800532de0d2877adef1d5b7
nit.rc
5c39e0ada89de6a945ad3df0a0e6181fc3325cca 20-Apr-2015 Mark Salyzyn <salyzyn@google.com> rootfs: init.rc start logd parse error

init: /init.rc: 490: invalid option 'start'

Change-Id: Ica985e45d4652dab0ebd434803344f14cc73d834
nit.rc
1450586ffd1113baa80f415531fb1de378fc8037 20-Apr-2015 Nick Kralevich <nnk@google.com> create /data/misc/gatekeeper

Change-Id: I7631401ac21b60a22f6fd4052814186bf3bc2b05
nit.rc
4e9da84be188d3ad49bc9306723448eccc061ad0 17-Apr-2015 Andres Morales <anmorales@google.com> Merge "Implement SID API"
6a49c2fa4371cad600f4a96da3d1644df862d2a5 16-Apr-2015 Andres Morales <anmorales@google.com> Implement SID API

Change-Id: Id11632a6b4b9cab6f08f97026dd65fdf49a46491
nit.rc
b63190fda8ab7d4271380c6a8512411ec2910c7d 15-Apr-2015 Vinit Deshpande <vinitd@google.com> am b4ef85c..b4ef85c from mirror-m-wireless-internal-release

b4ef85c Add Bluetooth SAP UIM socket
13859d12309c86ca4423484cd07ca56a029064db 13-Apr-2015 Neil Fuller <nfuller@google.com> am 90014d61: am 532d0a11: am 9b83b623: Merge "Executable to run on boot that removes old tzdata if needed"

* commit '90014d61c83ef5105881c171481a50f21fd4dd57':
Executable to run on boot that removes old tzdata if needed
08913228e17f4a16b6fbe77f9f08ca2a13323f5e 31-Mar-2015 Neil Fuller <nfuller@google.com> Executable to run on boot that removes old tzdata if needed

tzdatacheck is exec'd from init.rc early in boot just after /data is
mounted. It checks to make sure that the tz rule data in /data
is newer than the version in /system. If the data is older it is
deleted. This is to address problems with earlier tz rule updates
that occurred: after an OTA upgrade previous updates in /data
would override newer versions in the system partition.

Includes change to init.rc neccessary to run it at boot time. Other
changes are in external/selinux.

Bug: 19941636
Bug: https://code.google.com/p/android/issues/detail?id=35730
Change-Id: I7cc61e058424c856da88f11ff9b259f34cb39dc7
nit.rc
b4ef85c636390d54afcb0e3fbcafe687f050b2b5 10-Apr-2015 Dheeraj Shetty <dshetty@codeaurora.org> Add Bluetooth SAP UIM socket

Change-Id: I1445e51f613ac3e21cf818c0b1364c334579593e
nit.rc
2d08dce0beedcfc63b2a837045d1be7d49157555 04-Apr-2015 Andres Morales <anmorales@google.com> GateKeeper proxy service

Until we have SELinux support for gating access
to individual TEE services, we will proxy TEE requests
to GateKeeper via this daemon.

Change-Id: Ifa316b75f75bff79bdae613a112c8c3c2e7189a8
nit.rc
6abe4295881c9ebd2baf12ea7443a15c9d59da29 08-Apr-2015 Mark Salyzyn <salyzyn@google.com> am 4122304d: am 07e3ed46: am c19572fa: Merge "rootfs: init start logd in post-fs"

* commit '4122304de3990ca1fca2790468fb8e9ddcca11f2':
rootfs: init start logd in post-fs
124ff15bcaeded8b794e18bd1523e3affa97c386 08-Apr-2015 Mark Salyzyn <salyzyn@google.com> rootfs: init start logd in post-fs

The earliest point we can start logd is after /system is mounted.
Ideally on post-fs-system (does not exist), post-fs will do.
As insurance, we will also make sure logd is started if a
logd-reinit is requested. This results in logd starting at least
4 processes earlier than it does currently, with a tighter
grouping of threads which means we are taking advantage of a
lighter CPU load at the time, rather than taking cycles during
heavy activity during core startup.

Change-Id: If4f0bd3a53bb4c47500a54d741ca635d87c0c330
nit.rc
bd3212fd92470fa76577530fbc515c866755e722 08-Apr-2015 Nick Kralevich <nnk@google.com> am 5056cdcd: am 01190672: am de957955: Merge "Create /data/system/heapdump for system_server"

* commit '5056cdcdde4901fe667522cfebf3e1f9e1af3b3b':
Create /data/system/heapdump for system_server
9c0437fba7357ae4abe70b540468799df3bfdbd3 08-Apr-2015 Nick Kralevich <nnk@google.com> Create /data/system/heapdump for system_server

Bug: 20073185
Change-Id: I6fd83d33da33d048fdd6b07fa1f675ecb4f4eb2c
nit.rc
ae0a5acc0e46df569b97a605246e59c6ea4821f8 06-Apr-2015 Jeff Sharkey <jsharkey@android.com> Mount point for expanded storage.

Managed by vold.

Bug: 19993667
Change-Id: I7957b44d37d6a1f572cbec515d03856a8ed54391
nit.rc
b8bd76b7cbfbc4b0d3b7d76070c9b53eec87c83a 02-Apr-2015 Paul Lawrence <paullawrence@google.com> Merge "Revert "Revert "Adding e4crypt support"""
c410b3bd63828730623b9c5ccf15242175ac3c10 26-Mar-2015 Paul Lawrence <paullawrence@google.com> Revert "Revert "Adding e4crypt support""

Fix build break caused by original change

This reverts commit 84b0bab58fcc7f225e9a17a15c531b0c2fc509c5.

(cherry picked from commit bbb4c85bdcc9a1bce315ed9d61a228bb1b992a1c)

Change-Id: If0ead0f2656b69f33f72c64b03a05784455a4143
nit.rc
25775e8e638d9d323c2dbac6d770092b920a5360 01-Apr-2015 Jeff Sharkey <jsharkey@android.com> Different blkid and fsck execution domains.

Tell vold about which SELinux domains to use for different classes
of devices. Also create a directory for vold to store private
files.

Bug: 19993667
Change-Id: Ib7bc80234f2b13a89b143bf90f147140109570cd
nit.rc
b8c9d273a07f3fc45780e763bb3f7f6266b8cab7 26-Mar-2015 Paul Lawrence <paullawrence@google.com> Revert "Revert "Adding e4crypt support""

Fix build break caused by original change

This reverts commit 84b0bab58fcc7f225e9a17a15c531b0c2fc509c5.

Change-Id: I99fbd7c3d1ed92db1f546033c8493bb71a327924
nit.rc
fc0004894a3ff93382493688bb9ab9af83b74ea4 16-Mar-2015 Jeff Sharkey <jsharkey@android.com> Progress towards dynamic storage support.

To support external storage devices that are dynamically added and
removed at runtime, we're changing /mnt and /storage to be tmpfs that
are managed by vold.

To support primary storage being inserted/ejected at runtime in a
multi-user environment, we can no longer bind-mount each user into
place. Instead, we have a new /storage/self/primary symlink which
is resolved through /mnt/user/n/primary, and which vold updates at
runtime.

Fix small mode bugs in FUSE daemon so it can be safely mounted
visible to all users on device.

Bug: 19993667
Change-Id: I0ebf4d10aba03d73d9a6fa37d4d43766be8a173b
nit.environ.rc.in
nit.rc
1ef8498d02a4fa762d24195deefe293556bc807b 28-Mar-2015 Elliott Hughes <enh@google.com> am 4ce3c828: am 0cd316a4: am 5db3936d: Merge "Log more timing information from init."

* commit '4ce3c8288ba030c2d2a80cf94ceb5d2f84a66d26':
Log more timing information from init.
da40c00137f75543a69972f1be506e2d14a41845 28-Mar-2015 Elliott Hughes <enh@google.com> Log more timing information from init.

Also make important events in init's life NOTICE rather than INFO,
and ensure that NOTICE events actually make it to the kernel log.

Also fix the logging so that if you have a printf format string
error, the compiler now catches it.

Also give messages from init, ueventd, and watchdogd distinct tags.
(Previously they'd all call themselves "init", and dmesg doesn't
include pids, so you couldn't untangle them.)

Also include the tag in SELinux messages.

Bug: 19544788
Change-Id: Ica6daea065bfdb80155c52c0b06f346a7df208fe
nit.rc
84b0bab58fcc7f225e9a17a15c531b0c2fc509c5 26-Mar-2015 Paul Lawrence <paullawrence@google.com> Revert "Adding e4crypt support"

This reverts commit 6095afc115fe3a4b7d151b4fcc164e00f9df9659.

Change-Id: Icedfe0036223d7f42eaaefc4a35ad0f2efb14e4e
nit.rc
6095afc115fe3a4b7d151b4fcc164e00f9df9659 26-Feb-2015 Paul Lawrence <paullawrence@google.com> Adding e4crypt support

Add file encryption flag to fstab.

If file encryption flag set in fstab, handle identically to block
encrypted volumes.

Requires matching change:
https://googleplex-android-review.git.corp.google.com/#/c/642778/

Change-Id: I28c236959f2d7d5f0dccc8ea45c325ea0cf871fc
nit.rc
e3b164d024a1f9a21731a42aff442bc575dc03a7 20-Mar-2015 Daniel Cardenas <danielcar@google.com> Merge "Revert "lowmemorykiller: make perms 0220""
429e7424f29ab42e10559340f31a64c25035ce4f 20-Mar-2015 Daniel Cardenas <danielcar@google.com> Revert "lowmemorykiller: make perms 0220"

This reverts commit b3739735b84a88cccfe08c0d69b1017a07004470.
Values are helpful to inspect during memory performance tuning.

b/19847626

Change-Id: I004ed37d5cc67e466c1fd1a84e47348524056e87
nit.rc
07d457c06c146cd1a6750412ab40b555e820e110 18-Mar-2015 Elliott Hughes <enh@google.com> am 169d029c: am 789c99a4: Merge "Switch init over to _PATH_DEFPATH."

* commit '169d029c763a7e652e6d22ae42bb23707675541b':
Switch init over to _PATH_DEFPATH.
cc86fb2b29b13570ff416d4590a8cab705b19ec3 18-Mar-2015 Elliott Hughes <enh@google.com> Switch init over to _PATH_DEFPATH.

Bug: 19564110
Change-Id: I343b4a360b10319dca13ab01f2d411ff940e9052
nit.environ.rc.in
7ad506839a4ea39bb47f203cd1dcd21b9260b3a6 13-Mar-2015 Mark Salyzyn <salyzyn@google.com> am 6025a2bc: am bd518bce: Merge changes I3187aa34,Iadac58e6

* commit '6025a2bc493534b3003ebd2ad7130366cf4f6723':
init.rc: logd --reinit on changes to persistent properties
logd: add reinit command
48d06069a8a6be3a968694dad65ce4c11b7bef22 11-Mar-2015 Mark Salyzyn <salyzyn@google.com> init.rc: logd --reinit on changes to persistent properties

Bug: 19681572
Change-Id: I3187aa348dae79fa5822ffb7ee9566919a7a04e6
nit.rc
87946e714b8efd4448efc90812306afbce62a8c7 27-Feb-2015 Mark Salyzyn <salyzyn@google.com> am 20dc9c01: am 1dd71ae1: am f33c3bc9: Merge "init: drop dontpanic & apanic initialization"

* commit '20dc9c01fabb33ed5a0e17b8efbdcdbe576c0941':
init: drop dontpanic & apanic initialization
1dd71ae12e2e47c9ca63eb04878ee9632cc4417c 27-Feb-2015 Mark Salyzyn <salyzyn@google.com> am f33c3bc9: Merge "init: drop dontpanic & apanic initialization"

* commit 'f33c3bc9602e4a369c4cc5d28357b8f73a3eed6c':
init: drop dontpanic & apanic initialization
1eaba37aae04ba3db65e4c3564192d53b2137bac 27-Feb-2015 Mark Salyzyn <salyzyn@google.com> init: drop dontpanic & apanic initialization

Bug: 19050686
Bug: 19525200
Change-Id: Id81abe3b44283b439390b42db7a9da23748dee0a
nit.rc
be95a75e6f9532bf78a4a8a408a7bf2f337a32d3 26-Feb-2015 Nick Kralevich <nnk@google.com> am 0a316829: am 398ade81: am 7bb72b73: Merge "seclabel use on services out of system partition"

* commit '0a316829fb856f98d8db3ba78667feb19fb12e22':
seclabel use on services out of system partition
398ade817b64308cabbf10883ab5a74e4850e43d 26-Feb-2015 Nick Kralevich <nnk@google.com> am 7bb72b73: Merge "seclabel use on services out of system partition"

* commit '7bb72b73b0291636721d83a45adad175163361ec':
seclabel use on services out of system partition
2422c17c5e5dc4aaaaca6ec99953497d87091a50 24-Feb-2015 Narayan Kamath <narayan@google.com> Track removal of the inputflinger binary.

Change-Id: Ie3c3e5a67e7dfac5bd1672da6979fb053e8483b9
nit.rc
6889007627fa0b50cb393c822e59f4f76d3883aa 23-Feb-2015 William Roberts <w2.roberts@samsung.com> seclabel use on services out of system partition

These services can make use of type transitions already
present in the base policy.

Change-Id: Id785c39c4ea44598c64dc499bd943c73bc55ca85
nit.rc
7630916fb86d87efc94df574c9a644903591e180 14-Feb-2015 Elliott Hughes <enh@google.com> am 9c1bc6bb: am 29576ae8: Merge "/vendor is sometimes on a separate partition now."

* commit '9c1bc6bbc82e3e4f005e9fcacfca94b2dd82ca31':
/vendor is sometimes on a separate partition now.
9c1bc6bbc82e3e4f005e9fcacfca94b2dd82ca31 14-Feb-2015 Elliott Hughes <enh@google.com> am 29576ae8: Merge "/vendor is sometimes on a separate partition now."

* commit '29576ae8901eb95d4c8a34f242a282b2fb73d35f':
/vendor is sometimes on a separate partition now.
3a5d71ac60ea1769aa5a0c4d0d76b08238392247 14-Feb-2015 Elliott Hughes <enh@google.com> /vendor is sometimes on a separate partition now.

Change-Id: I3217c272ea38ab8212056e0432d0ededacd362f6
nit.rc
e6cc8012f5adadca867f5370d235525dff529091 12-Feb-2015 Elliott Hughes <enh@google.com> am 0903c13a: am 265df6f5: Merge "bootchart: fix bootchart can not be triggered problem"

* commit '0903c13ade29e6eedecd198ac54131248a1818f3':
bootchart: fix bootchart can not be triggered problem
0903c13ade29e6eedecd198ac54131248a1818f3 12-Feb-2015 Elliott Hughes <enh@google.com> am 265df6f5: Merge "bootchart: fix bootchart can not be triggered problem"

* commit '265df6f50c508710f0b717d67650732baa906976':
bootchart: fix bootchart can not be triggered problem
a197ff12dd336a9945ad1164402980296f9c235c 05-Dec-2014 Yongqin Liu <yongqin.liu@linaro.org> bootchart: fix bootchart can not be triggered problem

bootchart uses a file on the data partition to decide if it should collect
data for bootchart, but the data partition will be mounted by the mount_all
command in the "on fs" section, and it will be only added into the action
queue when command "trigger fs" is executed, but that's after the
bootchart_init action (late_init).

This change makes bootchart_init a builtin command of init,
and make it executed as the first command of "on post-fs" section
which will be triggered after the "on fs" section.

This change also refactors the bootchart code to all be in bootchart.cpp.

Change-Id: Ia74aa34ca5b785f51fcffdd383075a549b2a99d9
Signed-off-by: Yongqin Liu <yongqin.liu@linaro.org>
nit.rc
d933fc0c05c9dff977ec6824cecb37e49a5b28ff 09-Feb-2015 Paul Lawrence <paullawrence@google.com> am a1738915: am 317b4024: Revert "Make encryption configurable"

* commit 'a1738915329e704ea52fc09c222bb4893e6e51df':
Revert "Make encryption configurable"
a1738915329e704ea52fc09c222bb4893e6e51df 07-Feb-2015 Paul Lawrence <paullawrence@google.com> am 317b4024: Revert "Make encryption configurable"

* commit '317b4024a2a46b8c57abfa08f2a649df13572bd3':
Revert "Make encryption configurable"
317b4024a2a46b8c57abfa08f2a649df13572bd3 06-Feb-2015 Paul Lawrence <paullawrence@google.com> Revert "Make encryption configurable"

This reverts commit bda6272446454886339841a62daaa1b66c07ad60.

The original fix seems to have led to boot failures in QA. Rather than
risk shipping, revert the change. Bug 18764230 reopened.

Requires change
https://googleplex-android-review.git.corp.google.com/#/c/629764/

Bug: 19278390
Bug: 19199624

Change-Id: I8b6ab585666f2b0f585ffb2a5f61ac2e3462e06e
nit.rc
0c713b52436674cac2cb4dc2bac50dfad31042a1 06-Feb-2015 Greg Hackmann <ghackmann@google.com> am 86cdce1a: am f52338fe: Merge "rootdir: enable armv8_deprecated swp hook"

* commit '86cdce1aab39ddbb346e6f7be1ca86531970419f':
rootdir: enable armv8_deprecated swp hook
86cdce1aab39ddbb346e6f7be1ca86531970419f 06-Feb-2015 Greg Hackmann <ghackmann@google.com> am f52338fe: Merge "rootdir: enable armv8_deprecated swp hook"

* commit 'f52338fe1e8f74123a895db591d6a2a53061a2b1':
rootdir: enable armv8_deprecated swp hook
cee8757f921d5b74acbc29b37a1842041b27fb00 26-Jan-2015 Greg Hackmann <ghackmann@google.com> rootdir: enable armv8_deprecated swp hook

The upstream kernel now includes support for emulating legacy AArch32
instructions on ARMv8 devices. By default this framework emulates
deprecated instructions but not obsolete instructions.

Android requires support for the obsolete SWP and SWPB instructions on
all ARM devices, so override this default for the swp emulation hook.

Change-Id: I82b9bdb564413ec7c1a101da75a9928aebe1606b
Signed-off-by: Greg Hackmann <ghackmann@google.com>
nit.rc
07932da9118893563624116dad926d7c49c06424 31-Jan-2015 Nick Kralevich <nnk@google.com> am e1f62802: am d07555db: Merge "ensure /data/tombstones exists on all Android devices"

* commit 'e1f62802f6bec8ecc89100a1bbbdc36b7d18985b':
ensure /data/tombstones exists on all Android devices
e1f62802f6bec8ecc89100a1bbbdc36b7d18985b 31-Jan-2015 Nick Kralevich <nnk@google.com> am d07555db: Merge "ensure /data/tombstones exists on all Android devices"

* commit 'd07555dba01d64011b0d611dd6d3b197b216c163':
ensure /data/tombstones exists on all Android devices
0359d778a564a5c63baba08a33484fb69eda4d1e 31-Jan-2015 Nick Kralevich <nnk@google.com> ensure /data/tombstones exists on all Android devices

/data/tombstones is referenced by core platform code, but is not
guaranteed to exist on all Android devices. Move the directory
creation out of device specific files and into the core
init.rc file.

Bug: https://code.google.com/p/android/issues/detail?id=93207
Change-Id: I94ae5199a6a32c4fe555ca994fc4a8345e0c9690
nit.rc
36d0eaecd7bd7970b91ac35d6753bf715097e3b9 21-Jan-2015 Paul Lawrence <paullawrence@google.com> Make encryption configurable

Delay mounting encryptable but unencrypted volumes until we can
check the ro.vold.forceencrypt flag, then optionally encrypt.

Requires matching vold change from
https://googleplex-android-review.git.corp.google.com/#/c/615309/

Bug: 18764230
Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
nit.rc
e5a84ce55e1a0b5d8a4eed2fd8c96d6579829b85 26-Jan-2015 Paul Lawrence <paullawrence@google.com> am 7e890a4d: am bda62724: Make encryption configurable

* commit '7e890a4d32816d34b30fb5d1f651d966d64bbf36':
Make encryption configurable
7e890a4d32816d34b30fb5d1f651d966d64bbf36 26-Jan-2015 Paul Lawrence <paullawrence@google.com> am bda62724: Make encryption configurable

* commit 'bda6272446454886339841a62daaa1b66c07ad60':
Make encryption configurable
bda6272446454886339841a62daaa1b66c07ad60 21-Jan-2015 Paul Lawrence <paullawrence@google.com> Make encryption configurable

Delay mounting encryptable but unencrypted volumes until we can
check the ro.vold.forceencrypt flag, then optionally encrypt.

Requires matching vold change from
https://googleplex-android-review.git.corp.google.com/#/c/615309/

Bug: 18764230
Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
nit.rc
f756cf143968e0c17b7992b9d850490e8c314bd6 15-Jan-2015 Mark Salyzyn <salyzyn@google.com> am 8c7380b4: am 3802b5d4: Merge "rootdir: add pstore"

* commit '8c7380b4761d5ca02d839ccd337014116134a5b8':
rootdir: add pstore
01a805d2c2ae13279852fab6e21f6456f712b925 14-Jan-2015 Yabin Cui <yabinc@google.com> am 2cd0563c: am d3119b19: Merge "Add ip6-localhost to /system/etc/hosts."

* commit '2cd0563c53c8aa566c924d389ff34d7c46ea43b7':
Add ip6-localhost to /system/etc/hosts.
8c7380b4761d5ca02d839ccd337014116134a5b8 14-Jan-2015 Mark Salyzyn <salyzyn@google.com> am 3802b5d4: Merge "rootdir: add pstore"

* commit '3802b5d4c5cb14864dcdd8820e9140b81a2d7d78':
rootdir: add pstore
4b0313e4d39d4ce9c911907e0f1b34ab3b32dd58 15-Dec-2014 Mark Salyzyn <salyzyn@google.com> rootdir: add pstore

/dev/pmsg0 used to record the Android log messages, then
on reboot /sys/fs/pstore/pmsg-ramoops-0 provides a means
to pull and triage user-space activities leading
up to a panic. A companion to the pstore console logs.

Change-Id: Id92cacb8a30339ae10b8bf9e5d46bb0bd4a284c4
nit.rc
eventd.rc
2cd0563c53c8aa566c924d389ff34d7c46ea43b7 14-Jan-2015 Yabin Cui <yabinc@google.com> am d3119b19: Merge "Add ip6-localhost to /system/etc/hosts."

* commit 'd3119b1962ef5c0d15b9cc22beb9ded040b44dcb':
Add ip6-localhost to /system/etc/hosts.
25147416bb105914c3cdf8fd65ca7cc20dae0f3e 13-Jan-2015 Yabin Cui <yabinc@google.com> Add ip6-localhost to /system/etc/hosts.

Bug: 18791191
Change-Id: Id7cad8cfccadeb319f0dc7dcba8148a457f9f87d
tc/hosts
f3fd1226e05c806dd4ad4552abf56bcac12efe5e 03-Dec-2014 Greg Hackmann <ghackmann@google.com> init.rc: disable ICMP redirects

Bug: 18604139

Change-Id: I4bf22d0029f8b03b0ef4329b7b8632d8e116c8e1
Signed-off-by: Greg Hackmann <ghackmann@google.com>
nit.rc
053ae648202121c38205671bdff642e7582c5e5a 25-Nov-2014 Elliott Hughes <enh@google.com> am a0959e90: am 8eb770d3: Merge "Remove long-dead readtty."

* commit 'a0959e90f550f06969c2e21a0858b8d4cb8d4228':
Remove long-dead readtty.
a0959e90f550f06969c2e21a0858b8d4cb8d4228 25-Nov-2014 Elliott Hughes <enh@google.com> am 8eb770d3: Merge "Remove long-dead readtty."

* commit '8eb770d37cd9470630fdbe496f22b7a04549fef7':
Remove long-dead readtty.
b120134bd1db128d38eb9520a1db53ea5161b00a 24-Nov-2014 Elliott Hughes <enh@google.com> Remove long-dead readtty.

Change-Id: I15ae14542214a3802d43892da0d03cfb33e63c96
tc/init.testmenu
ac12f25004d728fe117c058446fccb0ca0a397c9 05-Nov-2014 Nick Kralevich <nnk@google.com> Ensure /data/adb exists
automerge: 6672300

* commit '667230074b6e4e306a50d84a88a57bf4f1ec0291':
Ensure /data/adb exists
667230074b6e4e306a50d84a88a57bf4f1ec0291 21-Oct-2014 Nick Kralevich <nnk@google.com> Ensure /data/adb exists

Ensure that /data/adb always exists. This directory is used
for writing adb debugging information when persist.adb.trace_mask
is set.

Bug: https://code.google.com/p/android/issues/detail?id=72895

(cherry picked from commit 89252ce31aacb27248e708b6487f730d3a024943)

Change-Id: I44e01bee50125f4e6e5fff6e74c53bb2022ce355
nit.rc
aad358fbc19592cefc37160fb7e3901f732dc033 22-Oct-2014 Bill Yi <byi@google.com> Merge commit 'b2042f7263c7bbacc5115de4a42c5a96b64a06f2' into HEAD
268c887f0c689625701f1218d649217ebc887e15 21-Oct-2014 Nick Kralevich <nnk@google.com> am 147de7e1: am 37d70f53: am c0b4b8b0: Merge "Ensure /data/adb exists"

* commit '147de7e147c9a85158f79b6aeffd87af6b921690':
Ensure /data/adb exists
147de7e147c9a85158f79b6aeffd87af6b921690 21-Oct-2014 Nick Kralevich <nnk@google.com> am 37d70f53: am c0b4b8b0: Merge "Ensure /data/adb exists"

* commit '37d70f53672c8878a5ce5506d6d89b851400f8e6':
Ensure /data/adb exists
89252ce31aacb27248e708b6487f730d3a024943 21-Oct-2014 Nick Kralevich <nnk@google.com> Ensure /data/adb exists

Ensure that /data/adb always exists. This directory is used
for writing adb debugging information when persist.adb.trace_mask
is set.

Bug: https://code.google.com/p/android/issues/detail?id=72895
Change-Id: I9cee2a0202417ff72a5ede7742e25877f51732dd
nit.rc
e272a538dca3e02f452fd80d2bc0a793315fbd39 21-Oct-2014 Arve Hjønnevåg <arve@android.com> am 06850f9c: am b50d0cd5: Merge "rootdir: Make trusty version readable by dumpstate" into lmp-mr1-dev

* commit '06850f9ccd9c7668a8ab80bdfea00c1b275b5af9':
rootdir: Make trusty version readable by dumpstate
b50d0cd53f94b0c654e007464ec32396b0cb1aef 20-Oct-2014 Arve Hjønnevåg <arve@android.com> Merge "rootdir: Make trusty version readable by dumpstate" into lmp-mr1-dev
7770252a84a0981d0e6b3d1b03376ddbecff9654 16-Oct-2014 Arve Hjønnevåg <arve@android.com> rootdir: Make trusty version readable by dumpstate

Change-Id: I761650d286b454f1fe01a585e7cd6ec769bfc527
eventd.rc
976e1b64314d5e0f86221fdc2fb62605a9447ca7 07-Oct-2014 Dmitriy Ivanov <dimitry@google.com> Remove libsigchain from LD_PRELOADs

Bug: 15345057
Bug: 15426766

(cherry picked from commit c9f9f35efa43b3ac75b1a7e76fe1071a2e9d52ea)

Change-Id: If54e1aeaa1e2abe061ac19666af4f4e058b81df2
nit.environ.rc.in
484c55a5343828e3b22bf24414e0d3caf3b68f7c 14-Oct-2014 Dmitriy Ivanov <dimitry@google.com> am b307dcd8: resolved conflicts for merge of 3f95c89d to lmp-mr1-dev-plus-aosp

* commit 'b307dcd8715ea4ffa456d819e8e8812719d5e760':
Remove libsigchain from LD_PRELOADs
b307dcd8715ea4ffa456d819e8e8812719d5e760 14-Oct-2014 Dmitriy Ivanov <dimitry@google.com> resolved conflicts for merge of 3f95c89d to lmp-mr1-dev-plus-aosp

Change-Id: Iac27dc93675c3111129fc594eaaff7f1d6f5c26f
1e2bec489ca1e27bb4765aca947cd46f288eb9d9 14-Oct-2014 Dmitriy Ivanov <dimitry@google.com> resolved conflicts for merge of 3f95c89d to lmp-dev-plus-aosp

Change-Id: I5184dcfa91a11a210c60e60a4fffc26d2c9f116f
49d1ba1743528ae492a24851e4632b0af5917ef5 08-Oct-2014 Riley Andrews <riandrews@google.com> am d1380d64: am 33b33549: Merge "Make the default cgroup, the foreground cgroup." into lmp-mr1-dev

* commit 'd1380d645de163d34a6e590f82eb0ee40d51f408':
Make the default cgroup, the foreground cgroup.
c9f9f35efa43b3ac75b1a7e76fe1071a2e9d52ea 07-Oct-2014 Dmitriy Ivanov <dimitry@google.com> Remove libsigchain from LD_PRELOADs

Bug: 15345057
Bug: 15426766
Change-Id: If0b7f59a59824e30aa0c33dad76c7a44932180de
nit.environ.rc.in
522d72b7020a7d2f975531c7214ff34225391aba 04-Oct-2014 Riley Andrews <riandrews@google.com> Make the default cgroup, the foreground cgroup.

All kernel services will now be in the same cgroup as
foreground applications. This will now make kernel threads
not implicitly higher priority than android foreground
services.

Bug 17681097

Change-Id: I28e81c7aade50428d5395df86f00ce01c1e7af02
nit.rc
157e3a4b22db530daea1c5fc1bfc5ae10484ca66 06-Oct-2014 Mike Lockwood <lockwood@google.com> am 6ee5d62a: am 67479c97: am 24e3e831: am 7569b7b3: Merge "Add bootanimation to audio group so it can play boot sound" into lmp-dev

* commit '6ee5d62ac00fa00d7b86072a7f19d58582a05d18':
Add bootanimation to audio group so it can play boot sound
7569b7b39f4f12cc4e87525113c82dae65c0b250 06-Oct-2014 Mike Lockwood <lockwood@google.com> Merge "Add bootanimation to audio group so it can play boot sound" into lmp-dev
7e58899bcfd83152581867b05bb012c5c4ec4b46 29-Sep-2014 Mike Lockwood <lockwood@google.com> Add bootanimation to audio group so it can play boot sound

Bug: 17674304

Change-Id: I5d31bc024fa36fedac2c0ba5c4a8b100937183ad
nit.rc
ca8079fd05aa5a4c3cd87202ae0ca33832d3ed28 02-Oct-2014 Jesse Hall <jessehall@google.com> am 9ef98912: am 5a9d721b: am 10b13131: am c263e671: Merge "init.trace.rc: fix race condition with class_start core" into lmp-dev

* commit '9ef989128059ce840178b8f19cde1183d32d9cee':
init.trace.rc: fix race condition with class_start core
331a939bf8f966d80a2dbf5caf5741b2446bae1a 30-Sep-2014 Fred Fettinger <fettinge@motorola.com> init.trace.rc: fix race condition with class_start core

The systrace permissions from init.trace.rc and the "class_start core"
which launches surfaceflinger are both in an "on boot" section. However,
the init.trace.rc commands are parsed after all commands in init.rc.
This means that "class_start core" is executed before the chmod command
which allows processes to write to trace_marker. If any services
execute their first trace command before the chmod occurs, then that
service won't be able to write traces until the service is restarted.

To fix this, run all of the init.trace.rc commands in the "early-boot"
section to ensure they are completed first.

Bug: 17612265
Change-Id: Ibf544762173d5ba98272c66ef485d8eab7d70bf3
nit.trace.rc
da0500426fbf60b13d26285b6d33178fc202d149 06-Sep-2014 Badhri Jagan Sridharan <badhri@google.com> am 37441496: am 97b536f1: init.usb.rc: Change product id to for add only config

* commit '374414967a294db75c2706e691ba8b9af9aa1acb':
init.usb.rc: Change product id to for add only config
97b536f1fbfd1fa711833b7dc92aed902dea4bdf 05-Sep-2014 Badhri Jagan Sridharan <badhri@google.com> init.usb.rc: Change product id to for add only config

Change product id from D002 to 4EE7 when adb is the
only supported function

Change-Id: I8f6bcb9a1dc5ea6da0493a2dd730f9ac1f0bed24
nit.usb.rc
074fc3ddfb8fc5676af24d366e071b6bca5614bf 29-Aug-2014 Brian Carlstrom <bdc@google.com> am 68e0d185: am 24d2adba: am 188d4396: Merge "Change /dalvik-cache to be owned by root."

* commit '68e0d185f4640a8e1dc7b6d1aad17b51a802de37':
Change /dalvik-cache to be owned by root.
68e0d185f4640a8e1dc7b6d1aad17b51a802de37 29-Aug-2014 Brian Carlstrom <bdc@google.com> am 24d2adba: am 188d4396: Merge "Change /dalvik-cache to be owned by root."

* commit '24d2adba7a2f9caa82a88be70ad2fe7397ab310a':
Change /dalvik-cache to be owned by root.
c692410e1607a39cd6d55f4be8164fc630d9772c 28-Aug-2014 Alex Light <allight@google.com> Change /dalvik-cache to be owned by root.

Bug: 16875245

(cherry picked from commit 3878ebd72493427ea5537b36dfb9cd7cb38677bb)

Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
nit.rc
3878ebd72493427ea5537b36dfb9cd7cb38677bb 28-Aug-2014 Alex Light <allight@google.com> Change /dalvik-cache to be owned by root.

Bug: 16875245

Change-Id: I29a70215a2207bc4e0db02ab751d32a68edf4b66
nit.rc
22b27ad718418bc86a4d5232ea7b6d5866fc2c93 27-Aug-2014 Andres Morales <anmorales@google.com> am c28be8be: am 314313a9: Move bootanim and surfaceflinger to class core

* commit 'c28be8be68a55a50f20b42101f0f33d558f8a548':
Move bootanim and surfaceflinger to class core
314313a9915c9a274f580c0fcf535a4db2ba0a9a 26-Aug-2014 Andres Morales <anmorales@google.com> Move bootanim and surfaceflinger to class core

They have no dependencies on /data so can be started early.
This permits us to unmount /data while bootanimation is running,
allowing an uninterrupted first boot encryption sequence.

Bug: 17260550
Change-Id: I323fe23e8cf488d8bc136387efdd9fcea96625eb
nit.rc
ad5b54aa6480b384f90ecb0acd9e2c6f30fd45c1 26-Aug-2014 Paul Lawrence <paullawrence@google.com> am a95e10fe: am a005e779: Merge "Enable not rebooting during default encryption" into lmp-dev

* commit 'a95e10fe3187d1dd3fbbd01d6653d7d9c2f9fc4d':
Enable not rebooting during default encryption
a005e7795e3dfb7cc0bd2bc65208d2490bfc89d8 25-Aug-2014 Paul Lawrence <paullawrence@google.com> Merge "Enable not rebooting during default encryption" into lmp-dev
c23074f386ded6cd28b2f8ba2331814b7491c802 18-Aug-2014 Paul Lawrence <paullawrence@google.com> Enable not rebooting during default encryption

Need to not set this property) during mount, since it can't
be changed later (ro property)

Also no reason to start class main on encryption cycle - we'll
show surfaceflinger, which is enough UI for this short cycle.

Bug: 17041092
Change-Id: Ica5339c54e45716d0fe20e23c0ab857f388d23ed
nit.rc
82b76249fbc339e82ab47a956f7e17160247e4c4 04-Aug-2014 Robert Greenwalt <rgreenwalt@google.com> Remove obsolete tcp buffer size system properties.

Change-Id: If6fb6fdcf8975e6102e84594ee3f64a5be6166f6
nit.rc
4fe327b902a1d5ff48878c1801cce8cdbe718d31 19-Aug-2014 Michael Wright <michaelwr@google.com> Merge "Remove inputflinger from init. DO NOT MERGE" into lmp-dev
1de92cffc7ac1e1654bdef5e3849fe542b1fd9fc 19-Aug-2014 Michael Wright <michaelwr@google.com> Remove inputflinger from init. DO NOT MERGE

Change-Id: I6ae2815a0c3f6b9c69e712af3ed6ce9d455ef3d3
nit.rc
1fabc35cb51e6f019141c25430e4e285741625fd 05-Aug-2014 Narayan Kamath <narayan@google.com> Export the new system_server classpath.

bug: 16555230

Change-Id: I99d2d219b5bd6dc4807cb53e44dc5715cc0815b3
ndroid.mk
nit.environ.rc.in
67cb1aeaa5bb8dbd43d5a1bfb21d1a8c39822fb6 16-Jul-2014 Riley Andrews <riandrews@google.com> Remove the /dev/.booting file before triggering boot.

On mako only, there is a race condition such that
core + main services must be started after releasing
ueventd (by removing /dev/.booting).

bug 16304711
bug 16333352
nit.rc
d721f5fc21855fdf7dd36ff1ec8f9b46f6cc33d6 16-Jul-2014 Riley Andrews <riandrews@google.com> Remove the /dev/.booting file before triggering boot.

On mako only, there is a race condition such that
core + main services must be started after releasing
ueventd (by removing /dev/.booting).

bug 16304711
bug 16333352
nit.rc
80c7a5e8a861de42ddade15704f1785953cee345 12-Jul-2014 Riley Andrews <riandrews@google.com> Move unlink("/dev/.booting") until after filesystems are mounted.

Move the unlink out of init.c and into init.rc, so that the file
will be removed after all the filesystems with firmware are up.

Change-Id: Ifdd5dd1e95d7e064dde5c80b70198882d949a710
nit.rc
9464e5a58da50f6cc3503020b38181150cfd01c4 12-Jul-2014 Riley Andrews <riandrews@google.com> Move unlink("/dev/.booting") until after filesystems are mounted.

Move the unlink out of init.c and into init.rc, so that the file
will be removed after all the filesystems with firmware are up.

Change-Id: I7442df2042cc2788d0301f00e3c2fba7d6e0e1c7
nit.rc
ee0388e768bb27eb845809a0b3ba85f4f7f21885 09-Jul-2014 Nick Kralevich <nnk@google.com> am f89ddf76: am d05245a4: am c87237f5: Merge "restorecon_recursive /cache"

* commit 'f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15':
restorecon_recursive /cache
f89ddf76f9e3c10af9002cdb0d9b8eadcd59bf15 09-Jul-2014 Nick Kralevich <nnk@google.com> am d05245a4: am c87237f5: Merge "restorecon_recursive /cache"

* commit 'd05245a4b10044670ed8456c5c869490fd90583f':
restorecon_recursive /cache
b12e40da2526881c1730a3d3387556e4600c7040 08-Jul-2014 Sreeram Ramachandran <sreeram@google.com> am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files."

* commit '0a7b44d55b9e9d038de390457246ec7fd0999cad':
Create a data directory for netd and other network-related files.
e1695914d55d9ced3645fc532191970c9450e9e9 09-Jul-2014 Nick Kralevich <nnk@google.com> restorecon_recursive /cache

Make sure all files / directories within /cache are properly
labeled, not just the directory itself.

Addresses the following denial:

type=1400 audit(0.0:26): avc: denied { getattr } for comm="Thread-85" path="/cache/lost+found" dev="mmcblk0p27" ino=11 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir

Change-Id: I5937b30043efeb696ffaa77258b7294d20d1494e
nit.rc
cddb15b8a9057e7efacf2de9c9a6a887fd666663 08-Jul-2014 dcashman <dcashman@google.com> am b4e74db7: am 3fa71b8e: Merge "Remove sshd."

* commit 'b4e74db79c9fda5e63ae49f299df3c0dd80a87f9':
Remove sshd.
b4cbff47ad4c8f15213189959c2ea33cb0ee529f 08-Jul-2014 dcashman <dcashman@google.com> Remove sshd.

This may require changes to other code, such as fastbootd, which relies on this
service. sshd is not currently, used, however, so this change will force any
such code to be changed.

Bug: 11594902
Change-Id: I07e52008290dab5825be2ad062cbe730fa7dff71
nit.rc
b46efdb08ef8a700654d28be94b90550b8d90822 08-Jul-2014 Sreeram Ramachandran <sreeram@google.com> Create a data directory for netd and other network-related files.

Allows the 'shell' group (which is what dumpstate uses) to read the files in
this directory.

Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
nit.rc
14253c1aab42e4e4ec4e68798c068436b4260288 09-Jul-2014 Nick Kralevich <nnk@google.com> Merge "init.rc: add seclabel to flash_recovery"
a1d97e5d1c15e0adf40b5853f2f85db7008baa77 08-Jul-2014 Nick Kralevich <nnk@google.com> init.rc: add seclabel to flash_recovery

Make sure flash_recovery is always running in the
install_recovery SELinux domain.

Change-Id: I9495eedd03f6b5dfcf2e78c03d1102f6032b327a
nit.rc
85449d360f86ed9faaf1403f972f9657698a8289 08-Jul-2014 Sreeram Ramachandran <sreeram@google.com> am b12e40da: am 0a7b44d5: am ab98d2e6: Merge "Create a data directory for netd and other network-related files."

* commit 'b12e40da2526881c1730a3d3387556e4600c7040':
Create a data directory for netd and other network-related files.
9f3a11edde07af068217581cf11c004f1cdca3f0 08-Jul-2014 dcashman <dcashman@google.com> am cddb15b8: am b4e74db7: am 3fa71b8e: Merge "Remove sshd."

* commit 'cddb15b8a9057e7efacf2de9c9a6a887fd666663':
Remove sshd.
24912dc446439b0aaa1c3417a8159af758f76ff6 27-Jun-2014 Riley Andrews <riandrews@google.com> resolved conflicts for merge of fa6f2543 to master

Change-Id: I04ce82e5d245e90e2cc62b76d688ec902c1a471d
fa6f25432b45958af870674529ce79e84986e0fa 27-Jun-2014 Riley Andrews <riandrews@google.com> am 23340d8a: am 10f8cd1d: Merge changes Ia15b2110,I5498c725

* commit '23340d8adac7bf68a6e47064ab7b48c1e227a077':
Add ability to adjust init log level at runtime.
Improve init's debug printing.
f67d6bd3c0fb41d167c675b9d2b5d377b6f38a74 26-Jun-2014 Daniel Rosenberg <drosen@google.com> Moved symlink back up.

Moving the vendor symlink down was causing issues with some devices.
Moved it back up, and adjusted mount to remove symlinks if necessary.

Change-Id: I77126d77cfbef32250012bea3960c99b55db4cbb
Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
1bbef88e8011805f7a3995a4d81928a853cb5cff 26-Jun-2014 Riley Andrews <riandrews@google.com> Add ability to adjust init log level at runtime.

+ Add a new property, sys.init_log_level, which can be set after init
bootstrap. This will control the level at which init does prints to klog.

Change-Id: Ia15b2110157b5e6b713785ece9b0fb94889be6c8
nit.rc
f530c93c4aab818de51fd7123199bef6621047f8 28-May-2014 Daniel Rosenberg <drosen@google.com> Added support for vendor partition and image

Modified fastboot to flash vendor.img as well. Moved symlink
for /vendor to occur after mounting partitions. Changed mount
to also create the mount point.

Change-Id: I78e1ba24e6bb8b4af96a67ee0569af579439e682
Signed-off-by: Daniel Rosenberg <drosen@google.com>
nit.rc
6bd4588d65977956cadf2e5d384673c64329c8e8 24-Jun-2014 Riley Andrews <riandrews@google.com> resolved conflicts for merge of 079c637f to master

Change-Id: Iab9a857026de954d7497d6b0eaf3751d2d3904c7
079c637f3d269242bbc772b9207179b8cf56738a 23-Jun-2014 Riley Andrews <riandrews@google.com> am 5b45e08a: am 7950fc47: Merge "Add ability to boot from charger mode."

* commit '5b45e08aabd6dcbab527d221584fe348c73c70d4':
Add ability to boot from charger mode.
e4b7b294f37d9b64d6b7c1931e2c9bfb1a500d68 17-Jun-2014 Riley Andrews <riandrews@google.com> Add ability to boot from charger mode.

Add the ability to boot up directly from charger mode, instead of forcing
charger mode to initiate a full restart to launch 'full' android. This
should shave a few seconds off of boot time on supported devices (just
manta for now).

Change-Id: Ieec4494d929e92806e039f834d78b9002afd15c4
nit.rc
aab0d57d18b202d059fec57c832d6443faff6ee3 20-Jun-2014 Riley Andrews <riandrews@google.com> am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc"

* commit '94fa20058fbd0e4f7e3c6d1381cdb9718dd90cde':
Make indentation sane in init.rc
6dfdc7cd0c9d1b266b599b3ee7f5dd3a60e45c39 19-Jun-2014 Riley Andrews <riandrews@google.com> Make indentation sane in init.rc

Change-Id: Ic632fbe1423eeef7ec958877d74db7b87fc385c6
nit.rc
53f24c2f940b946805821db1036466d95061b1e1 20-Jun-2014 Riley Andrews <riandrews@google.com> am aab0d57d: am 94fa2005: am 4f5392cb: Merge "Make indentation sane in init.rc"

* commit 'aab0d57d18b202d059fec57c832d6443faff6ee3':
Make indentation sane in init.rc
fd9cfb4c226fe76b50d828c737e7664d8b04a59b 19-Jun-2014 Ying Wang <wangying@google.com> am 68d97430: am 4924d10a: Merge "Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed."

* commit '68d97430dd2cc25bb753df748d859415520a7dcb':
Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed.
2359b3c1621ff9af7fe2fb3d7f0707ef2efe2440 14-Jun-2014 Ying Wang <wangying@google.com> Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed.

(cherry picked from commit 7011a85606bfdeefbd5f8db668c69b61e8d612a5)

Change-Id: I025fe1f64c87fd406b3a3bf3d20fd3b78be8a940
ndroid.mk
7011a85606bfdeefbd5f8db668c69b61e8d612a5 14-Jun-2014 Ying Wang <wangying@google.com> Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH changed.

Change-Id: I4686c1239aa5ed361c918ce4e7a5abf9a1552ab4
ndroid.mk
8ffe8eac5b4f04ce82ae553f2155959a8b165a61 13-Jun-2014 Nick Kralevich <nnk@google.com> am f8cb68e1: am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles"

* commit 'f8cb68e15ba242200e3525fffa2f969960e18a50':
Create /data/dalvik-cache/profiles
f8cb68e15ba242200e3525fffa2f969960e18a50 13-Jun-2014 Nick Kralevich <nnk@google.com> am 3bff77a8: am 875dc8f3: Merge "Create /data/dalvik-cache/profiles"

* commit '3bff77a8f90e673dbf41d97b7b842a3e4a6986bf':
Create /data/dalvik-cache/profiles
511998fcdb3d35847f1222aec956e6ac6f5a17ba 12-Jun-2014 Nick Kralevich <nnk@google.com> am 44aadc4d: am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell"

* commit '44aadc4daf926155bf06bcf9d8f2daa96f861cdf':
make console shell run as GID=shell
44aadc4daf926155bf06bcf9d8f2daa96f861cdf 12-Jun-2014 Nick Kralevich <nnk@google.com> am 1eebf538: am 59d16c9e: Merge "make console shell run as GID=shell"

* commit '1eebf538d3e5465bbec84d86017bb9ca250a052b':
make console shell run as GID=shell
f2cb352412252f8e609986520cff830096248b9f 12-Jun-2014 Nick Kralevich <nnk@google.com> make console shell run as GID=shell

Change-Id: I240bec07b04de1b26eef14e4f590af56c1aaa276
nit.rc
875dc8f3f31fe9f5ee42d900737149bdeb95f1c7 13-Jun-2014 Nick Kralevich <nnk@google.com> Merge "Create /data/dalvik-cache/profiles"
347ee511e44a4b6419c144917e079c78fde46f32 12-Jun-2014 Nick Kralevich <nnk@google.com> Create /data/dalvik-cache/profiles

Make sure /data/dalvik-cache/profiles gets the correct
permissions and SELinux context, and ownership is properly
assigned to the system UID.

Change-Id: Ic1b44009faa30d704855e97631006c4b990a4ad3
nit.rc
a54b7ca1565d314c88eb31e1f2375948b3c5616a 05-Jun-2014 Robin Lee <rgl@google.com> am b7c07da2: am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory"

* commit 'b7c07da2f4606ca36b93c2b9221e43e6ebe68831':
Create world-searchable /data/misc/user directory
b7c07da2f4606ca36b93c2b9221e43e6ebe68831 05-Jun-2014 Robin Lee <rgl@google.com> am 33154817: am 46fbaf06: Merge "Create world-searchable /data/misc/user directory"

* commit '33154817e274a4c7c381e2f5ef73ead7093e3985':
Create world-searchable /data/misc/user directory
46fbaf062fd94e3fecc7165f4b42d42145e0603d 05-Jun-2014 Robin Lee <rgl@google.com> Merge "Create world-searchable /data/misc/user directory"
664bdde0f1dd43c838dc65f30d3caa9fc85a754b 29-May-2014 Dave Allison <dallison@google.com> am 01546ff2: am dec41a38: am 967729b7: Merge "Add LD_PRELOAD for libsigchain.so to the environment"

* commit '01546ff208cec5ac15f81cc84f507fb8c9a51d98':
Add LD_PRELOAD for libsigchain.so to the environment
01546ff208cec5ac15f81cc84f507fb8c9a51d98 29-May-2014 Dave Allison <dallison@google.com> am dec41a38: am 967729b7: Merge "Add LD_PRELOAD for libsigchain.so to the environment"

* commit 'dec41a388d58ae515c83df4ec084c1e38edb427a':
Add LD_PRELOAD for libsigchain.so to the environment
dec41a388d58ae515c83df4ec084c1e38edb427a 29-May-2014 Dave Allison <dallison@google.com> am 967729b7: Merge "Add LD_PRELOAD for libsigchain.so to the environment"

* commit '967729b7ca675d6f2c895a1bd56216a62b217e50':
Add LD_PRELOAD for libsigchain.so to the environment
967729b7ca675d6f2c895a1bd56216a62b217e50 29-May-2014 Dave Allison <dallison@google.com> Merge "Add LD_PRELOAD for libsigchain.so to the environment"
e7fd4078a225fdfa92edcb6be6d79ba2fd6e8eb9 28-May-2014 Nick Kralevich <nnk@google.com> am 7206eccb: am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict"

* commit '7206eccbd904508a199c7ec302d7395b3b674968':
Remove dmesg_restrict
f9ff246dd7d4d44ad65d7f9690780eddaf74bde0 28-May-2014 Torne (Richard Coles) <torne@google.com> am 4f3ad823: am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit '4f3ad823eaf97fcbcbb1afac67371aff76677b1d':
Add UID and directory for RELRO sharing support.
7206eccbd904508a199c7ec302d7395b3b674968 28-May-2014 Nick Kralevich <nnk@google.com> am c4ffa5f6: am c290bed0: Merge "Remove dmesg_restrict"

* commit 'c4ffa5f62ef256ff286122d0ceea61364aa67e13':
Remove dmesg_restrict
c4ffa5f62ef256ff286122d0ceea61364aa67e13 28-May-2014 Nick Kralevich <nnk@google.com> am c290bed0: Merge "Remove dmesg_restrict"

* commit 'c290bed0350cded5620ed8dbb68b1cfb07d9828c':
Remove dmesg_restrict
c290bed0350cded5620ed8dbb68b1cfb07d9828c 28-May-2014 Nick Kralevich <nnk@google.com> Merge "Remove dmesg_restrict"
4f3ad823eaf97fcbcbb1afac67371aff76677b1d 28-May-2014 Torne (Richard Coles) <torne@google.com> am a8329a36: am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit 'a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9':
Add UID and directory for RELRO sharing support.
a8329a36ca0e5f5799ec2dd14ae360dc0656b9c9 28-May-2014 Torne (Richard Coles) <torne@google.com> am 96109cf3: Merge "Add UID and directory for RELRO sharing support."

* commit '96109cf36c3dd44e9ecfe4b810e21e77eaf834dc':
Add UID and directory for RELRO sharing support.
1a6184baf3e01bf7786fb14de4216bcb4e3b2f70 28-May-2014 Nick Kralevich <nnk@google.com> Remove dmesg_restrict

dmesg_restrict is too coarse of a control. In Android's case,
we want to allow the shell user to see dmesg output, but disallow
others from seeing it.

Rather than rely on dmesg_restrict, use SELinux to control access
to dmesg instead. See corresponding change in external/sepolicy .

Bug: 10020939
Change-Id: I9d4bbbd41cb02b707cdfee79f826a39c1ec2f177
nit.rc
234f696ea7f97dc489290827c1c68f26279de294 22-May-2014 Torne (Richard Coles) <torne@google.com> Add UID and directory for RELRO sharing support.

Define a UID to be used by the process responsible for creating shared
RELRO files for the WebView native library, and create a directory owned
by that UID to use to store the files.

Bug: 13005501
Change-Id: I5bbb1e1035405e5534b2681f554fe16f74e3da1a
nit.rc
ef386b3fb01b7458f2dcf11c9be7bd099f0ea2ed 27-May-2014 Narayan Kamath <narayan@google.com> am b5d6c188: am 9196f5f2: am 5fe6fcc3: Merge "Add a zygote 64/32 bit config."

* commit 'b5d6c18859424d86339ce895a42084a9c08552fd':
Add a zygote 64/32 bit config.
b5d6c18859424d86339ce895a42084a9c08552fd 27-May-2014 Narayan Kamath <narayan@google.com> am 9196f5f2: am 5fe6fcc3: Merge "Add a zygote 64/32 bit config."

* commit '9196f5f2df7890100e8968983680e196e944bd05':
Add a zygote 64/32 bit config.
9196f5f2df7890100e8968983680e196e944bd05 27-May-2014 Narayan Kamath <narayan@google.com> am 5fe6fcc3: Merge "Add a zygote 64/32 bit config."

* commit '5fe6fcc35d10c88dd55213dc5b2303ea73c1883b':
Add a zygote 64/32 bit config.
373d9fa0824226c721c7b0c07952ebe3e3af770e 10-Mar-2014 Jaewan Kim <jaewan@google.com> Support static IP config on Ethernet

Bug: 7606609
Bug: 8687763
Change-Id: I1d76b5783e8511a8e3f5d981e6b4b9fb4fbecdf4
nit.rc
7cdbbcabda9906910548954f0a35cdea366ef467 21-May-2014 Narayan Kamath <narayan@google.com> Add a zygote 64/32 bit config.

64 bit zygote is the "primary" and the system server is run
as a 64 bit process.

Change-Id: Ie1c2b0809faa92937bc407dd66e7a606ebb4f8f3
nit.zygote64_32.rc
50b6a4b1b7f5b4484bccbabf2a8057bf860f8c59 16-May-2014 Dave Allison <dallison@google.com> Add LD_PRELOAD for libsigchain.so to the environment

To remove the need to modify the bionic dynamic linker, add the
signal chaining library as a preload in the environment. This
will be picked up by the dynamic linker and will override
sigaction and sigprocmask to allow for signal chaining.

Change-Id: I6e2d0628b009bd01e0ed9aed0b311871b9c8363a
nit.environ.rc.in
8c56cebd4450d5149828216291eb70d4d53aeb2b 15-May-2014 Narayan Kamath <narayan@google.com> am 08a15076: am a5f7aca8: am 75a8eeb1: Merge "Change app_process reference to app_process32."

* commit '08a1507603d63f07cfce65ead701330e1fe89894':
Change app_process reference to app_process32.
08a1507603d63f07cfce65ead701330e1fe89894 15-May-2014 Narayan Kamath <narayan@google.com> am a5f7aca8: am 75a8eeb1: Merge "Change app_process reference to app_process32."

* commit 'a5f7aca82e63942e9449804fd11eb11aec710419':
Change app_process reference to app_process32.
a5f7aca82e63942e9449804fd11eb11aec710419 15-May-2014 Narayan Kamath <narayan@google.com> am 75a8eeb1: Merge "Change app_process reference to app_process32."

* commit '75a8eeb1ecf9f748b1d53e5ff3a5e138a0cdbebd':
Change app_process reference to app_process32.
75a8eeb1ecf9f748b1d53e5ff3a5e138a0cdbebd 15-May-2014 Narayan Kamath <narayan@google.com> Merge "Change app_process reference to app_process32."
066c9b5a005fdb84ea72a6d27a40ab5bf5e6f0e2 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am 9743f097: am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets."

* commit '9743f09724162186fb280627c3c125a55534a219':
Introduce fwmarkd: a service to set the fwmark of sockets.
9743f09724162186fb280627c3c125a55534a219 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am 09eaad79: Merge "Introduce fwmarkd: a service to set the fwmark of sockets."

* commit '09eaad793a8cec9196255d740ecb89a1426c0bf7':
Introduce fwmarkd: a service to set the fwmark of sockets.
e38d4707141174a8c211d5cb01ff78da8ef1baff 11-May-2014 Sreeram Ramachandran <sreeram@google.com> Introduce fwmarkd: a service to set the fwmark of sockets.

(cherry picked from commit d5121e212c1f53b1cb6458ee83be892d94fdfef3)

Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
nit.rc
b4932d592f1b6a7d44804a7aed04f1d21286ae8a 14-May-2014 Narayan Kamath <narayan@google.com> Change app_process reference to app_process32.

Required due to change 5a7ee9ad63 which makes
app_process a symlink to the primary zygote.

Change-Id: I940f6302db97f74dd57112e310014e989dc586e5
nit.zygote32_64.rc
76202a2dfaeb9ec6a23dfbc4a382b65820a52132 11-May-2014 Sreeram Ramachandran <sreeram@google.com> Introduce fwmarkd: a service to set the fwmark of sockets.

Change-Id: Ieb049fe34ea2b21a7f6108f2099d1a8b8f2c28f7
nit.rc
3c1c730f206d1d2dc25ac555d48513d6a3e5fb7f 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am ca61b484: am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs."

* commit 'ca61b484b6eb1bf92b05bc5386668ec51999e55a':
Set kernel proc files for fwmark reflection and table numbers for RAs.
ca61b484b6eb1bf92b05bc5386668ec51999e55a 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am b8cfcf3d: am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs."

* commit 'b8cfcf3d9beb6ae09512941a182c326723b3ef41':
Set kernel proc files for fwmark reflection and table numbers for RAs.
b8cfcf3d9beb6ae09512941a182c326723b3ef41 14-May-2014 Sreeram Ramachandran <sreeram@google.com> am 32e4479d: Merge "Set kernel proc files for fwmark reflection and table numbers for RAs."

* commit '32e4479d5535887d03625b43b7e3574b458dfc8d':
Set kernel proc files for fwmark reflection and table numbers for RAs.
fd94922329a83c257dd8c65a4b1417a24d67db88 10-Apr-2014 Sreeram Ramachandran <sreeram@google.com> Set kernel proc files for fwmark reflection and table numbers for RAs.

(cherry picked from commit 2c2807ac1041751583e0c3b6892ca56eae423fa2)

Change-Id: I5f0d759cb9b8590555af7f5503f00d3e455ece54
nit.rc
f74cb9534914bd0cb99573b976bead9e3689216c 01-May-2014 Ruchi Kandoi <kandoiruchi@google.com> am 57569b3d: am 1abf4918: am c7580819: Merge "ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq"

* commit '57569b3d3cea0b2096a15e8d25b41df9f836fd08':
ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq
57569b3d3cea0b2096a15e8d25b41df9f836fd08 01-May-2014 Ruchi Kandoi <kandoiruchi@google.com> am 1abf4918: am c7580819: Merge "ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq"

* commit '1abf49180acece56ff7573d53b65c6a28d2a4cb2':
ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq
1abf49180acece56ff7573d53b65c6a28d2a4cb2 01-May-2014 Ruchi Kandoi <kandoiruchi@google.com> am c7580819: Merge "ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq"

* commit 'c7580819934b85e93f58001f9b59b12712bb61b8':
ueventd: Ueventd changes the permission of sysfs files for max/min cpufreq
75b287b771b302c99797d812122b72f83d2f56f9 30-Apr-2014 Ruchi Kandoi <kandoiruchi@google.com> ueventd: Ueventd changes the permission of sysfs files for max/min
cpufreq

The owner and permissions for the sysfs file
/sys/devices/system/cpu*/cpufreq/scaling_max/min_freq is changed.
This would allow the PowerHAL to change the max/min cpufreq even after
the associated CPU's are hotplugged out and back in.

Change-Id: Ibe0b4aaf3db555ed48e89a7fcd0c5fd3a18cf233
Signed-off-by: Ruchi Kandoi <kandoiruchi@google.com>
eventd.rc
1333e012ee65fef59f5f43f33744230574dfc2a2 30-Apr-2014 Bill Yi <byi@google.com> Merge commit '4102af05a86aae36d2560fd8b3f740a52399342c' into HEAD
3094f82a8a4d4b8d2725df85a6af9d306b9f8800 25-Apr-2014 Robin Lee <rgl@google.com> Create world-searchable /data/misc/user directory

installd will create a separate subdirectory for each user.

Change-Id: I95ec09169ea70f35443bbb3209237611e174ca29
nit.rc
0aee64f614d5eae0e50f5e24a1c790dd172b663f 17-Apr-2014 Paul Lawrence <paullawrence@google.com> Make Volantis devices encryptable

Volantis SurfaceFlinger holds open a file on data partition.
SurfaceFlinger is not running when we trigger_default_encryption
but if we start it before starting defaultcrypto it locks open
data, so we can't unmount it.

It will start anyway when main starts, so not starting it here
is safe - it will just cause a 1-2 second delay in the graphics
appearing.

Change-Id: Idd546a578e62a24f999367b1407b37ad0f00f3a2
nit.rc
e29590b08bce1667c6bddebeb80991b7d16344c4 18-Apr-2014 JP Abgrall <jpa@google.com> am 46e6b4f7: am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks"

* commit '46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e':
rootdir: init.rc: update max TCP window sizes for mobile networks
46e6b4f7fd5f6488d0ba06a26d67888136b3ee3e 18-Apr-2014 JP Abgrall <jpa@google.com> am b0397d55: am 9bb44b41: Merge "rootdir: init.rc: update max TCP window sizes for mobile networks"

* commit 'b0397d55a2ff4b3c6664c9545be18ba88c07dea4':
rootdir: init.rc: update max TCP window sizes for mobile networks
ce898489e4ff2567b297c8f8776504b9924f432a 24-Mar-2014 Narayan Reddy <narayanr@nvidia.com> rootdir: init.rc: update max TCP window sizes for mobile networks

GRPS: RTT=600ms, max tput=80kbps (class 12 GMSK 4+1)
EDGE: RTT=300ms, max tput=236kbps (class 12 8PSK)
UMTS: RTT=200ms, max tput=384kbps (R99)
HSDPA: RTT=75ms, max tput=14Mbps (cat 10)
HSUPA: RTT=50ms, max tput=14Mbps
HSPA: RTT=50ms, max tput=14Mbps
HSPA+: RTT=50ms, max tput=42Mbps (cat 20)
LTE: RTT=20ms, max tput=100Mbps (class 3)

bug 67569

Change-Id: I9d62359bbd11dc68e3649a7ea2295d0d4e25e3f2
Signed-off-by: Narayan Reddy <narayanr@nvidia.com>
Signed-off-by: Steve Lin <stlin@nvidia.com>
nit.rc
391224c807d2e28e55817b53ff3a30e57d08e996 11-Apr-2014 Paul Lawrence <paullawrence@google.com> Merge "Fix forceencrypt"
7bd273e04e77a60598d26a358861568fe11f8efc 11-Apr-2014 Narayan Kamath <narayan@google.com> am d85efaa0: am a73f7e92: am 822b1a02: Merge "Add a config for dual mode zygote."

* commit 'd85efaa068708b19db3cc647ba62c0a2feb7da23':
Add a config for dual mode zygote.
d85efaa068708b19db3cc647ba62c0a2feb7da23 11-Apr-2014 Narayan Kamath <narayan@google.com> am a73f7e92: am 822b1a02: Merge "Add a config for dual mode zygote."

* commit 'a73f7e924abb8e7b1aa3f0d64d0177ce7d1c58e6':
Add a config for dual mode zygote.
822b1a024d058641be9aefa14da794f09755ce35 11-Apr-2014 Narayan Kamath <narayan@google.com> Merge "Add a config for dual mode zygote."
f24aab7d744b708a897e70e2cbdb76a81bc069b7 10-Apr-2014 Paul Lawrence <paullawrence@google.com> Fix forceencrypt

When changing vdc cryptfs enablecrypto inplace default in
https://googleplex-android-review.git.corp.google.com/#/c/445001/
forgot to change init.rc

Change-Id: I2a937d3c302ab8eab4829a36101145d6fe726ab1
nit.rc
468b37c106e3a0efa926de24c2690d6db2819bc0 02-Apr-2014 Narayan Kamath <narayan@google.com> Add a config for dual mode zygote.

Note that init.zygote64.rc, which supports a "pure"
64 bit zygote is around only for testing.

The life cycles of both zygotes are controlled by init,
and the assumption here is that they will be available
always. We start the system_server in 32 bit mode.

Note that the distinction between "primary" and "secondary"
simply defines the order in which ABI support is queried,
there's no real requirement that the primary zygote supports
the primary ABI of the device.

bug: 13647418

Change-Id: Id0be001ea6f934c3c2022d89a63aae9fae66cc38
nit.zygote32_64.rc
11673a03e05c21bd254868466e6736b02ef1097e 09-Apr-2014 dcashman <dcashman@google.com> am 8b4ea5a4: am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary."

* commit '8b4ea5a49dda2767af87604713053e1bc418e96f':
Enable world-readable selinuxfs policy binary.
8b4ea5a49dda2767af87604713053e1bc418e96f 09-Apr-2014 dcashman <dcashman@google.com> am 39a5b812: am 2baf2886: Merge "Enable world-readable selinuxfs policy binary."

* commit '39a5b812904ec13390d6261bafccf823729ae21d':
Enable world-readable selinuxfs policy binary.
5822a4af8406fb6e9ecc675297af19852b378ca0 26-Mar-2014 dcashman <dcashman@google.com> Enable world-readable selinuxfs policy binary.

Change-Id: I1eefb457cea1164a8aa9eeb7683b3d99ee56ca99
nit.rc
dc9af896f011698949cf9237094e52eaec9d4e8e 01-Apr-2014 Narayan Kamath <narayan@google.com> resolved conflicts for merge of 6a949b45 to master

Change-Id: Ie123b4fff76ef43e2b1c0583731e88997504320e
6a949b45e9166bcd4fc4b18e795085126a937c7b 01-Apr-2014 Narayan Kamath <narayan@google.com> am ffca173c: am 5da2dbbc: Merge "Move zygote init config to its own file."

* commit 'ffca173c853a2e312610d87f40957f696ac8364a':
Move zygote init config to its own file.
5da2dbbc935356f526cdfb0b522b332fc8b95fc7 01-Apr-2014 Narayan Kamath <narayan@google.com> Merge "Move zygote init config to its own file."
788b27226851160170ee28f7f833dd21b10222e4 31-Mar-2014 Greg Hackmann <ghackmann@google.com> am ae66fbbe: am 697bdc60: am a740b3bb: Merge "rootdir: reduce permissions on /dev/rtc0"

* commit 'ae66fbbe0e747cb2485bac0fa47c9223268a2fc9':
rootdir: reduce permissions on /dev/rtc0
ae66fbbe0e747cb2485bac0fa47c9223268a2fc9 31-Mar-2014 Greg Hackmann <ghackmann@google.com> am 697bdc60: am a740b3bb: Merge "rootdir: reduce permissions on /dev/rtc0"

* commit '697bdc604e8f266ebd6c94fc84eb5057b1a700e3':
rootdir: reduce permissions on /dev/rtc0
a740b3bb409c9acdf4cf6a829b982e57a89d08de 31-Mar-2014 Greg Hackmann <ghackmann@google.com> Merge "rootdir: reduce permissions on /dev/rtc0"
4456a55ce69cd5b8ad39349ed55d3efc3512bffa 31-Mar-2014 Narayan Kamath <narayan@google.com> Move zygote init config to its own file.

This allows us to choose different configs depending on
whether or not the target is 64 capable, and what its preferred
default is.

bug: 13647418
Change-Id: Ie1ce4245a3add7544c87d27c635ee390f4062523
nit.rc
nit.zygote32.rc
nit.zygote64.rc
b34fed34afbc3288d22dad92226650f600d15f71 27-Mar-2014 Greg Hackmann <ghackmann@google.com> rootdir: reduce permissions on /dev/rtc0

Remove world-readable, reduce group permissions to readable by system
daemons

Change-Id: I6c7d7d78b8d8281960659bb8490a01cf7fde28b4
Signed-off-by: Greg Hackmann <ghackmann@google.com>
eventd.rc
5c789b8a31a1924a346b1485410b692b82781406 24-Mar-2014 Paul Lawrence <paullawrence@google.com> Merge "Auto-encrypt drive at startup"
166fa3de7060198252b43a4a9ddd841fb6d65cf7 03-Feb-2014 Paul Lawrence <paullawrence@google.com> Auto-encrypt drive at startup

Modify fs_mgr to unmount encryptable drives after test mounting them and
then trigger an auto-encrypt via the init script

Needs matching vold changes from
https://googleplex-android-review.googlesource.com/#/c/414200/

Feature is limited to list of serial numbers with this change

Bug: 11985952
Change-Id: I84f85a258b6a7e9809467c9149249302e203c41b
nit.rc
bd28bb69c7e52f44743745562f10573c1814ff3c 24-Mar-2014 Mark Salyzyn <salyzyn@google.com> am b5f9e65a: am 0a0cc719: init.rc: Add lmkd service back

* commit 'b5f9e65ad127261df2f7c9ed40d73b9024f492f6':
init.rc: Add lmkd service back
44983ace850dd47384fa7698c362b4cfc9ca7f4c 24-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 68b9d5f0: am bdef5499: resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp

* commit '68b9d5f07a443b44d81e09f65a45fea8c8f4984b':
logd: core requirement
0a0cc7192e1081acff483ae4f455c3aad6370546 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> init.rc: Add lmkd service back

- not impressed with conflict for merge f8f0531b

Change-Id: I5b9a1a93ea0cf7eda4ced8dcfc9d0ad70f7aa6c8
nit.rc
bdef5499d4eb0c4f5e6853471373acd610798c7c 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> resolved conflicts for merge of f8f0531b to klp-modular-dev-plus-aosp

Change-Id: I87228aa0dbd0b909437c85812f2404ca8be39f38
9a305cd168abea5d0eaad0f1b1e65466b9a823c9 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> am f8f0531b: Merge "logd: core requirement"

* commit 'f8f0531bb69a90e87f1bafa875e665e3935610b1':
logd: core requirement
3c253dc88f3e1decb055340c84fd6234b422c409 22-Mar-2014 Mark Salyzyn <salyzyn@google.com> logd: core requirement

- has no dependency on /data, switch from main to core

Change-Id: I4bfe3e67d4cbd31e943c609f5626e533857a27a9
nit.rc
d94ed2c8fea4733684e4ebbf55c112828562b7a7 14-Mar-2014 JP Abgrall <jpa@google.com> am 7283db6d: am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60

* commit '7283db6d2694c8deae644a0d815cf292309a6176':
init.rc: prep tcp_default_init_rwnd, set the default to 60
7283db6d2694c8deae644a0d815cf292309a6176 14-Mar-2014 JP Abgrall <jpa@google.com> am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60

* commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781':
init.rc: prep tcp_default_init_rwnd, set the default to 60
10f229d4291da55c379ce7ae0e87b1a1878199e8 14-Mar-2014 JP Abgrall <jpa@google.com> am efbf36f2: init.rc: prep tcp_default_init_rwnd, set the default to 60

* commit 'efbf36f2dad8f083de6f48dbb682461d7cfa9781':
init.rc: prep tcp_default_init_rwnd, set the default to 60
efbf36f2dad8f083de6f48dbb682461d7cfa9781 21-Feb-2014 JP Abgrall <jpa@google.com> init.rc: prep tcp_default_init_rwnd, set the default to 60

The kernel's default is between 4~20.

Prepare for javaland to modify the value at runtime.

It can be done via
setprop sys.sysctl.tcp_def_init_rwnd <value>


Bug: 12020135
Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2
(cherry picked from commit 7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4)
nit.rc
f447c1b3ae6d467392500a985e3974facb1b095f 11-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value"

* commit '858d0dd1e529575181abd8de607e46f7b273cc9d':
set /proc/sys/net/unix/max_dgram_qlen to large value
9509103cd4f28cf05a9fc6c5b6fd97504875097c 11-Mar-2014 Nick Kralevich <nnk@google.com> am 9453bce4: Merge "Apply restorecon_recursive to all of /data."

* commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5':
Apply restorecon_recursive to all of /data.
01c5199665cfa5c6631696d410c077c3dceb871e 11-Mar-2014 Mark Salyzyn <salyzyn@google.com> am e9c8fb90: Merge "logd: initial checkin."

* commit 'e9c8fb900a460699201208870ce9997a734261cc':
logd: initial checkin.
dfda9b0b4703329745fc873a78034868937921ea 07-Mar-2014 Colin Cross <ccross@android.com> am 27fd413d: Merge "Start debuggerd64 for 64-bit processes"

* commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32':
Start debuggerd64 for 64-bit processes
c1f1eb374e3153e71419b50e8e9642a0ffaaea1e 07-Mar-2014 Nick Kralevich <nnk@google.com> am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file."

* commit 'ba023b063d25b73923f2df536b6258967f756ff6':
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
1d39c53e29a9c56893d170f1eac3d720076e0e55 04-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 00eaae3a: am 556c9c24: am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value"

* commit '00eaae3aaa6ea3ca2c9c00e0559fa6937ce33e37':
set /proc/sys/net/unix/max_dgram_qlen to large value
556c9c245de257efe8bda09ff23d2c4f7add5e49 04-Mar-2014 Mark Salyzyn <salyzyn@google.com> am 858d0dd1: Merge "set /proc/sys/net/unix/max_dgram_qlen to large value"

* commit '858d0dd1e529575181abd8de607e46f7b273cc9d':
set /proc/sys/net/unix/max_dgram_qlen to large value
581edc1b6c3799238cfb674dfddb97db44f2818e 20-Nov-2013 Mark Salyzyn <salyzyn@google.com> set /proc/sys/net/unix/max_dgram_qlen to large value

- init: set /proc/sys/net/unix/max_dgram_qlen to 300
- libsysutils: Add listen backlog argument to startListener
- logd: set listen backlog to 300

Change-Id: Id6d37d6c937ba2d221e76258d89c9516619caeec
nit.rc
5c3c77ed7855d262645c44b7e239476d9b66393d 29-Jan-2014 Stephen Smalley <sds@tycho.nsa.gov> Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.

mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed
in the various device-specific init*.rc files but seems generic.
Move it to the main init.rc file.

Drop the separate chown for /data/misc/dhcp as this is handled by mkdir
built-in if the directory already exists.

Add a restorecon_recursive /data/misc/wifi/sockets.

Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
d7ce27e8ae637b9bbaf0a31cd469a461b6651ab0 26-Feb-2014 Nick Kralevich <nnk@google.com> am e6fb169f: am e570fd3a: am 9453bce4: Merge "Apply restorecon_recursive to all of /data."

* commit 'e6fb169fd69bfa6775737f37d45041c5b229321c':
Apply restorecon_recursive to all of /data.
e570fd3a32a3a3525a2e6a069d2b69c6184db56e 26-Feb-2014 Nick Kralevich <nnk@google.com> am 9453bce4: Merge "Apply restorecon_recursive to all of /data."

* commit '9453bce4cff952aab5c90f5b30c6c12d3e1521e5':
Apply restorecon_recursive to all of /data.
1bb3489e600876979146a6222ac5bb2a684702bf 26-Feb-2014 Nick Kralevich <nnk@google.com> resolved conflicts for merge of e9c8fb90 to klp-modular-dev-plus-aosp

Change-Id: I9ee9908a915258937b343de90dce5774d914f03a
9453bce4cff952aab5c90f5b30c6c12d3e1521e5 26-Feb-2014 Nick Kralevich <nnk@google.com> Merge "Apply restorecon_recursive to all of /data."
0175b0747a1f55329109e84c9a1322dcb95e2848 26-Feb-2014 Mark Salyzyn <salyzyn@google.com> logd: initial checkin.

* Create a new userspace log daemon for handling logging messages.

Original-Change-Id: I75267df16359684490121e6c31cca48614d79856
Signed-off-by: Nick Kralevich <nnk@google.com>

* Merge conflicts
* rename new syslog daemon to logd to prevent confusion with bionic syslog
* replace racy getGroups call with KISS call to client->getGid()
* Timestamps are filed at logging source
* insert entries into list in timestamp order
* Added LogTimeEntry tail filtration handling
* Added region locking around LogWriter list
* separate threads for each writer
* /dev/socket/logd* permissions

Signed-off-by: Mark Salyzyn <salyzyn@google.com>

(cherry picked from commit 3e76e0a49760c4970b7cda6153e51026af98e4f3)

Author: Nick Kralevich <nnk@google.com>
Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
nit.rc
7c862c8b5e59cbe216a5bc092c01f1ecba8e9de4 21-Feb-2014 JP Abgrall <jpa@google.com> init.rc: prep tcp_default_init_rwnd, set the default to 60

The kernel's default is between 4~20.

Prepare for javaland to modify the value at runtime.

It can be done via
setprop sys.sysctl.tcp_def_init_rwnd <value>


Bug: 12020135
Change-Id: Id34194b085206fd02e316401c0fbbb9eb52522d2
nit.rc
4046c132dc385fb9f2ae2e2198fd32269dd14a20 20-Feb-2014 Mark Salyzyn <salyzyn@google.com> Merge changes I929dddc7,Ice88b141,I243b1338

* changes:
logd: prune more aggressively when over the top
logd: initial checkin.
logcat: test: add clear and blocking check
b6391ce26b6e5f7360efc7aba0fac8455cba53b4 16-Feb-2014 Colin Cross <ccross@android.com> am ee9de136: am bb2da79f: am 27fd413d: Merge "Start debuggerd64 for 64-bit processes"

* commit 'ee9de136c52555e8775611ad32fc8ee47c75e3d1':
Start debuggerd64 for 64-bit processes
bb2da79fdab68c9643a30f5156e7dcabb379b139 16-Feb-2014 Colin Cross <ccross@android.com> am 27fd413d: Merge "Start debuggerd64 for 64-bit processes"

* commit '27fd413d6d02a53c453cf926717b67e9a8d1eb32':
Start debuggerd64 for 64-bit processes
78ef91aa5ec29cc45bf3f0d4b32cd92db000a95a 16-Feb-2014 Dan Willemsen <dwillemsen@nvidia.com> Start debuggerd64 for 64-bit processes

Change-Id: I2fc33d9eb2726b043d2f13bfab0c605dbb6083c7
nit.rc
3e76e0a49760c4970b7cda6153e51026af98e4f3 15-Dec-2011 Nick Kralevich <nnk@google.com> logd: initial checkin.

* Create a new userspace log daemon for handling logging messages.

Original-Change-Id: I75267df16359684490121e6c31cca48614d79856
Signed-off-by: Nick Kralevich <nnk@google.com>

* Merge conflicts
* rename new syslog daemon to logd to prevent confusion with bionic syslog
* replace racy getGroups call with KISS call to client->getGid()
* Timestamps are filed at logging source
* insert entries into list in timestamp order
* Added LogTimeEntry tail filtration handling
* Added region locking around LogWriter list
* separate threads for each writer
* /dev/socket/logd* permissions

Signed-off-by: Mark Salyzyn <salyzyn@google.com>

Change-Id: Ice88b1412d8f9daa7f9119b2b5aaf684a5e28098
nit.rc
b6e3b3cea2c2606fcff0364d680335fc3433247b 14-Feb-2014 Paul Lawrence <paullawrence@google.com> Merge "Mount default encrypted devices at boot"
b3739735b84a88cccfe08c0d69b1017a07004470 13-Feb-2014 Nick Kralevich <nnk@google.com> lowmemorykiller: make perms 0220

Set

* /sys/module/lowmemorykiller/parameters/adj
* /sys/module/lowmemorykiller/parameters/minfree

to 0220. This better indicates that these files are only intended
to be written to, never read.

Change-Id: I9ef054f032b3955e04128fc1a472a17c7b1fa792
nit.rc
13d5bb4badf59e22d9d983d104596da3ec4f2753 30-Jan-2014 Paul Lawrence <paullawrence@google.com> Mount default encrypted devices at boot

If userdata is default encrypted, we should mount it at boot
to avoid bringing the framework up and then down unnecessarily.

Needs matching vold changes from
https://googleplex-android-review.googlesource.com/#/c/412649/

Bug: 8769627
Change-Id: I4b8276befd832cd788e15c36edfbf8f0e18d7e6b
nit.rc
f2b7ee765516c84a9995e3acdc8fbcd7dc1b33cc 06-Feb-2014 Stephen Smalley <sds@tycho.nsa.gov> Apply restorecon_recursive to all of /data.

With the following prior changes:
I77bf2a0c4c34b1feef6fdf4d6c3bd92dbf32f4a1
I698b1b2c3f00f31fbb2015edf23d33b51aa5bba1
I8dd915d9bb80067339621b905ea2b4ea0fa8d71e
it should now be safe (will correctly label all files)
and reasonably performant (will skip processing unless
file_contexts has changed since the last call) to call
restorecon_recursive /data from init.rc.

The call is placed after the setprop selinux.policy_reload 1 so that
we use any policy update under /data/security if present.

Change-Id: Ib8d9751a47c8e0238cf499fcec61898937945d9d
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
6edd1bdf53fe6fdeeca3b4031896df4f8007de3e 04-Feb-2014 Doug Zongker <dougz@android.com> Merge "set permissions of recovery install script"
9526202d84387df3950bf526bbbaeac1ede129d2 04-Feb-2014 Doug Zongker <dougz@android.com> set permissions of recovery install script

The script that writes the recovery partition after a successful
update of system needs to be made executable. This change also moves
it from /system/etc to /system/bin.

Bug: 12893978
Change-Id: I686e2392a2392515a6859a7381b735de1007b7ea
nit.rc
d9d8a60e42b0acc8ad6285fb8d6244d508ad0250 04-Feb-2014 Nick Kralevich <nnk@google.com> am fbca9d94: am 7e3d72d9: am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file."

* commit 'fbca9d9449231839b805ef4b11e4b2d968e601e3':
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
7e3d72d974d21932c2a6a0323c59fed2f689d323 04-Feb-2014 Nick Kralevich <nnk@google.com> am ba023b06: Merge "Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file."

* commit 'ba023b063d25b73923f2df536b6258967f756ff6':
Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.
82e87ed4799b12b7bd2e20a6fe5fdc19e0350fc3 29-Jan-2014 Stephen Smalley <sds@tycho.nsa.gov> Move creation of /data/misc/wifi and /data/misc/dhcp to main init.rc file.

mkdir /data/misc/wifi subdirectories and /data/misc/dhcp is performed
in the various device-specific init*.rc files but seems generic.
Move it to the main init.rc file.

Drop the separate chown for /data/misc/dhcp as this is handled by mkdir
built-in if the directory already exists.

Add a restorecon_recursive /data/misc/wifi/sockets.

Change-Id: I51b09c5e40946673a38732ea9f601b2d047d3b62
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
35ef36456d89b4e823f32c328c4d0e6d15ae41e2 24-Jan-2014 Nick Kralevich <nnk@google.com> am c3af60af: am c7e28899: am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root"

* commit 'c3af60aff5d097c717b19721f143499891d5ca3d':
adbd: switch to su domain when running as root
c7e28899c3917ad6e72d5dc99401bcd133cbd475 24-Jan-2014 Nick Kralevich <nnk@google.com> am 16384312: am 0620e3dd: Merge "adbd: switch to su domain when running as root"

* commit '16384312244b8dccd53478a7bdeeb9a492821807':
adbd: switch to su domain when running as root
16384312244b8dccd53478a7bdeeb9a492821807 24-Jan-2014 Nick Kralevich <nnk@google.com> am 0620e3dd: Merge "adbd: switch to su domain when running as root"

* commit '0620e3ddb85582f66612d046d1295dc20bf1a4f5':
adbd: switch to su domain when running as root
d49aa2537cf0b454dfaa4b0312a403ebff202d70 18-Jan-2014 Nick Kralevich <nnk@google.com> adbd: switch to su domain when running as root

When adbd runs as root, it should transition into the
su domain. This is needed to run the adbd and shell
domains in enforcing on userdebug / eng devices without
breaking developer workflows.

Introduce a new device_banner command line option.

Change-Id: Ib33c0dd2dd6172035230514ac84fcaed2ecf44d6
nit.rc
d0f2c265d8b7457bbb9b809e00b6e8b18bbef7c9 16-Jan-2014 Doug Zongker <dougz@android.com> Merge "add the pre-recovery service"
7baebf1345ff9e861ea8ccf9712128a3b7cd9fcc 14-Jan-2014 Doug Zongker <dougz@android.com> add the pre-recovery service

Add a service called "pre-recovery" which is normally stopped but can
be started by the system server when we want to go into recovery. It
will do any preparation needed (currently needed to handle update
packages that reside on an encrypted /data partition) and then set
sys.powerctl when it's ready to actually reboot.

Bug: 12188746
Change-Id: I894a4cb200395a0f6d7fe643ed4c2ac0a45d2052
nit.rc
32a32c9eb2b6975d76dae1dc5a2dbc73bb05f757 15-Jan-2014 Nick Kralevich <nnk@google.com> am 11190d0c: am 4552987e: am c93904b4: am e847f429: Merge "restorecon /data/misc/media."

* commit '11190d0ccb1216307043ceecf5360f1a1a946cd1':
restorecon /data/misc/media.
4552987e6a1338dac26f13f0851657335d998ffb 15-Jan-2014 Nick Kralevich <nnk@google.com> am c93904b4: am e847f429: Merge "restorecon /data/misc/media."

* commit 'c93904b445830cd17fd9dd6d4fe236987577a478':
restorecon /data/misc/media.
c93904b445830cd17fd9dd6d4fe236987577a478 15-Jan-2014 Nick Kralevich <nnk@google.com> am e847f429: Merge "restorecon /data/misc/media."

* commit 'e847f429f43ae56aaa406697ca603c8469e2100b':
restorecon /data/misc/media.
9e9f05e5ebf72a60930a53e5cf45f575534fc29d 15-Jan-2014 Stephen Smalley <sds@tycho.nsa.gov> restorecon /data/misc/media.

Otherwise it will be mislabeled on upgrades with existing userdata.

Change-Id: Ibde88d5d692ead45b480bb34cfe0831baeffbf94
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
c3149359a0d0f5dd9773a9a0340efc4bc0e88be7 15-Jan-2014 Elliott Hughes <enh@google.com> am af16bf4f: am 9c1cbe83: am 53cd1484: am aead003c: Merge "Don\'t set LD_LIBRARY_PATH globally."

* commit 'af16bf4f5160c03c858b32c40900f07f1e9c0366':
Don't set LD_LIBRARY_PATH globally.
9c1cbe8373f28c9a6d6ba489af3e9247647dc469 15-Jan-2014 Elliott Hughes <enh@google.com> am 53cd1484: am aead003c: Merge "Don\'t set LD_LIBRARY_PATH globally."

* commit '53cd1484aa13c43b4d6973c1c203dbff9c996d14':
Don't set LD_LIBRARY_PATH globally.
53cd1484aa13c43b4d6973c1c203dbff9c996d14 15-Jan-2014 Elliott Hughes <enh@google.com> am aead003c: Merge "Don\'t set LD_LIBRARY_PATH globally."

* commit 'aead003c8bc677218329c535b063a5bb66695414':
Don't set LD_LIBRARY_PATH globally.
bb07b536f528d5a55bde2571babe5d0f7878a86e 14-Jan-2014 Elliott Hughes <enh@google.com> Don't set LD_LIBRARY_PATH globally.

On a 64-bit system, 64-bit processes will want one path, 32-bit processes
another. The dynamic linker already provides the correct defaults for
native code, and we've coupled the VM and dynamic linker so that
LD_LIBRARY_PATH will be set correctly in any VM during startup if it's not
being manually overridden.

Change-Id: Icbffc0d451dbc242cdfb9267413d8bcac434e108
nit.environ.rc.in
0a05f002fbc86e4fe410c4efbaf9d720739a21c3 09-Jan-2014 Colin Cross <ccross@android.com> am 4082bf8c: am ce1340c6: am 5a369629: am cd0f824a: Merge "Fix tracing on user builds"

* commit '4082bf8c963dbd44fe2f6367fa687217cbac58d3':
Fix tracing on user builds
ce1340c665e8840c8856898bbfb7ee3b33765359 09-Jan-2014 Colin Cross <ccross@android.com> am 5a369629: am cd0f824a: Merge "Fix tracing on user builds"

* commit '5a3696297b2f8d463ba601772df7af5966321d2e':
Fix tracing on user builds
5a3696297b2f8d463ba601772df7af5966321d2e 09-Jan-2014 Colin Cross <ccross@android.com> am cd0f824a: Merge "Fix tracing on user builds"

* commit 'cd0f824a7cfe91f4db24511830658228487ae919':
Fix tracing on user builds
cd0f824a7cfe91f4db24511830658228487ae919 09-Jan-2014 Colin Cross <ccross@android.com> Merge "Fix tracing on user builds"
0969ec3a558723ae55f033c163b052e1dbf97669 09-Jan-2014 Nick Kralevich <nnk@google.com> am 218878d4: am df8d0ffd: am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files."

* commit '218878d447b58b357f0dc97bfe6b77196d35a729':
Label existing /data/mediadrm files.
df8d0ffd73f8359def90d2f79d25059023018213 08-Jan-2014 Nick Kralevich <nnk@google.com> am 72f269f3: am 8830b53b: Merge "Label existing /data/mediadrm files."

* commit '72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7':
Label existing /data/mediadrm files.
72f269f3050b3e5b2fd6be7d0a6a485114cc6ee7 08-Jan-2014 Nick Kralevich <nnk@google.com> am 8830b53b: Merge "Label existing /data/mediadrm files."

* commit '8830b53b76c05416c021df3eb0cea1dd541bc3ac':
Label existing /data/mediadrm files.
2dcbb81d89c86144b38c0f0b56ea7420c74a7f5a 08-Jan-2014 rpcraig <rpcraig rpcraig@tycho.ncsc.mil> Label existing /data/mediadrm files.

Use restorecon_recursive to label devices
where the directory and subfiles have
already been built and labeled.

Change-Id: I0dfe1e542fb153ad20adf7b2b1f1c087b4956a12
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
nit.rc
950909c301e316783e5b4687dbc422ed845cb69a 11-Jul-2013 Todd Poynor <toddpoynor@google.com> init.rc: start lmkd

Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
nit.rc
cb1f0147d729d1a3e9b4898ea98de3e6761233e4 02-Jan-2014 Nick Kralevich <nnk@google.com> am 88d040a3: am 3df76c0c: am 6bec36ec: am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."

* commit '88d040a32feac727a7e11658198c32d9cc563d8e':
Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
6bec36ecc92af488f0193e03c386eaab409ca17c 02-Jan-2014 Nick Kralevich <nnk@google.com> am 5b8abdf6: Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."

* commit '5b8abdf6278a4142736d918d1371d10c54c91db3':
Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
5b8abdf6278a4142736d918d1371d10c54c91db3 02-Jan-2014 Nick Kralevich <nnk@google.com> Merge "Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls."
3dd470552c6b1c88cd344c3a366666ba464bd994 27-Dec-2013 Colin Cross <ccross@android.com> am 469035b8: am fed48bb6: am 6604f2d1: am 2dcc2759: Merge "Run the console service shell in the shell domain."

* commit '469035b83546a847a1f12c1feca50a1c7e5e1062':
Run the console service shell in the shell domain.
6604f2d1ef5e78e7f129f94abe7a763dd0e0dd1d 27-Dec-2013 Colin Cross <ccross@android.com> am 2dcc2759: Merge "Run the console service shell in the shell domain."

* commit '2dcc275936aefbb5badf3b4822d492260077144d':
Run the console service shell in the shell domain.
5e1461dc906f68f6590df1c79f2f4d69e0af18c5 23-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.

If checkreqprot == 1, SELinux only checks the protection flags passed
by the application, even if the kernel internally adds PROT_EXEC for
READ_IMPLIES_EXEC personality flags. Switch to checkreqprot == 0
to check the final protection flags applied by the kernel.

Change-Id: Ic39242bbbd104fc9a1bcf2cd2ded7ce1aeadfac4
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
610653fe930d016e1d962661c4fcbe2a8747e5ac 23-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Run the console service shell in the shell domain.

This allows it to be permissive in userdebug/eng builds
but confined/enforcing in user builds.

Change-Id: Ie322eaa0acdbefea2de4e71ae386778c929d042b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
d9a5df44c5866a8cdd63d5ba39d70a0287a6df71 18-Dec-2013 Greg Hackmann <ghackmann@google.com> am 5ae67beb: am c042bb01: am e25864b7: am 537f53b6: Merge "rootdir: add permissions for /dev/rtc0"

* commit '5ae67bebc46a4974869458eb35270b23633aba0c':
rootdir: add permissions for /dev/rtc0
e25864b752db0bc8ddc55f2c22cf1b8bcb2602bf 18-Dec-2013 Greg Hackmann <ghackmann@google.com> am 537f53b6: Merge "rootdir: add permissions for /dev/rtc0"

* commit '537f53b682eb0d99e90da2a3e7389ea474bc583d':
rootdir: add permissions for /dev/rtc0
a585e662e0141d8b3445749ef83b8d9b138d7905 13-Dec-2013 Greg Hackmann <ghackmann@google.com> rootdir: add permissions for /dev/rtc0

Change-Id: If9d853bdae2399b1e7434f45df375ba1fd6dbe9c
Signed-off-by: Greg Hackmann <ghackmann@google.com>
eventd.rc
f7f823e46b285169637c1f1a9c17e16ae1566b92 16-Dec-2013 Nick Kralevich <nnk@google.com> am 8b0d10c8: am a24e9a86: am 02ad8700: am e4335483: Merge "Relabel /data/misc/zoneinfo"

* commit '8b0d10c870efbe8254f407e02c406c05bedfa0b5':
Relabel /data/misc/zoneinfo
02ad8700dd22d5bf5d73c638e3a45c35d5ef3d1d 16-Dec-2013 Nick Kralevich <nnk@google.com> am e4335483: Merge "Relabel /data/misc/zoneinfo"

* commit 'e4335483e78292800e27c7bf0a67d23bee47dc84':
Relabel /data/misc/zoneinfo
354e9edbd73ad9453e6c284c0551105ccf6aac14 14-Dec-2013 Nick Kralevich <nnk@google.com> Relabel /data/misc/zoneinfo

The files in zoneinfo changed from system_data_file to
zoneinfo_data_file. Fixup pre-existing files.

Change-Id: Idddbd6c2ecf66cd16b057a9ff288cd586a109949
nit.rc
6b3867fc6b3cb45e6163c15cc831fd150a8b104c 09-Dec-2013 Nick Kralevich <nnk@google.com> am 7d1f3a3d: am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce."

* commit '7d1f3a3daa721892b3247e847f72f1e948a0a68f':
Do not change ownership on /sys/fs/selinux/enforce.
7d1f3a3daa721892b3247e847f72f1e948a0a68f 09-Dec-2013 Nick Kralevich <nnk@google.com> am bdf53e2a: Merge "Do not change ownership on /sys/fs/selinux/enforce."

* commit 'bdf53e2a59654d2b1e8469616f1b0175b275219d':
Do not change ownership on /sys/fs/selinux/enforce.
17bec835d5cf1dfd3fa94df3b0da84a1e731e447 09-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Do not change ownership on /sys/fs/selinux/enforce.

There is no longer any reason to permit system UID to set enforcing mode.

Change-Id: Ie28beed1ca2b215c71f2847e2390cee1af1713c3
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
7fc7a07b237e0887f3815822c4551b9968267b37 05-Dec-2013 The Android Open Source Project <initial-contribution@android.com> Merge commit '252d9030cd4b2e3e6cf13fa33f328eccedb5e26c' into HEAD
dd8fddd503ecffb607013109a42ee9614bd9c47c 05-Dec-2013 Carton He <carton.he@marvell.com> Fix tracing on user builds

Need the set correct permission for print-tgid option or tracing of
sched can't work on user build.

Change-Id: Ia88aabe58128b911afd78f01c27f7da884ed03f0
Signed-off-by: Carton He <carton.he@marvell.com>
nit.trace.rc
bf5e7ed84e51f40da30a1350cdc3124c19a3484c 27-Nov-2013 Greg Hackmann <ghackmann@google.com> am 5ebd8e43: am b2406973: Merge changes I727d9135,I3bd1b59d,I0d05aa28

* commit '5ebd8e43ba992d12fcdac4aedf7da51b50d6b949':
rootdir: add ueventd.rc rule for adf subsystem
init: add subsystem rules to ueventd.rc
init: handle ueventd path truncation better
5ebd8e43ba992d12fcdac4aedf7da51b50d6b949 26-Nov-2013 Greg Hackmann <ghackmann@google.com> am b2406973: Merge changes I727d9135,I3bd1b59d,I0d05aa28

* commit 'b240697339b1ff1f45217a48dc9d3fa8a2f21a2b':
rootdir: add ueventd.rc rule for adf subsystem
init: add subsystem rules to ueventd.rc
init: handle ueventd path truncation better
95b348c5d7d1dbccee2c39f48010fd19e8396e44 19-Nov-2013 Greg Hackmann <ghackmann@google.com> rootdir: add ueventd.rc rule for adf subsystem

Change-Id: I727d91355229692c11e0e309c0fcac051269eba3
Signed-off-by: Greg Hackmann <ghackmann@google.com>
eventd.rc
66ed50af6870210ce013a5588a688434a5d48ee9 22-Nov-2013 The Android Open Source Project <initial-contribution@android.com> Merge commit '536dea9d61a032e64bbe584a97463c6638ead009' into HEAD

Change-Id: I5c469a4b738629d99d721cad7ded02d6c35f56d5
fabe8716f81ec419ec854799d0a63c444e91edd3 22-Nov-2013 Todd Poynor <toddpoynor@google.com> am fd1dd864: am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions

* commit 'fd1dd864a896bd6233ee8c75b84d9771148dd9b3':
init.rc: mount pstore fs, set console-ramoops permissions
fd1dd864a896bd6233ee8c75b84d9771148dd9b3 22-Nov-2013 Todd Poynor <toddpoynor@google.com> am 479efb54: init.rc: mount pstore fs, set console-ramoops permissions

* commit '479efb540a198a9b7cd278387b0d45009a05bb2b':
init.rc: mount pstore fs, set console-ramoops permissions
9350d80e706f385c8a4dc6bc4fd9be15e6e0a850 22-Nov-2013 Elliott Hughes <enh@google.com> am b6ee39bc: am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi"

* commit 'b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9':
split setptop ethernet tcp buffer from wifi
479efb540a198a9b7cd278387b0d45009a05bb2b 22-Nov-2013 Todd Poynor <toddpoynor@google.com> init.rc: mount pstore fs, set console-ramoops permissions

Change-Id: I44cb00f9123c6044a03de926b6a616da753bb549
nit.rc
b6ee39bca4b774cf2ffbad8eb12dcfc13b8814c9 22-Nov-2013 Elliott Hughes <enh@google.com> am 4a4616f6: am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi"

* commit '4a4616f6450f191faf168a10b6e2ffaba14803bd':
split setptop ethernet tcp buffer from wifi
4a4616f6450f191faf168a10b6e2ffaba14803bd 21-Nov-2013 Elliott Hughes <enh@google.com> am 048bb92f: Merge "split setptop ethernet tcp buffer from wifi"

* commit '048bb92f3f33196d96a51b446c73805e208a5333':
split setptop ethernet tcp buffer from wifi
52ea510f8fa84b634ffff18b75b5a3f95e302ba6 15-Nov-2013 Jianzheng Zhou <jianzheng.zhou@freescale.com> split setptop ethernet tcp buffer from wifi

Change-Id: I0582ec75fddb904ca14b9cbddf593ddbd4195c41
Signed-off-by: Jianzheng Zhou <jianzheng.zhou@freescale.com>
nit.rc
fb7e395455c9a2acee13aaa527768558d0a58b7c 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> am 9b41f452: am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev

* commit '9b41f452013123d0a394e696f597467da73108ed':
vold no longer does MS_MOVE; remove tmpfs.
9b41f452013123d0a394e696f597467da73108ed 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> am a9e453f1: Merge "vold no longer does MS_MOVE; remove tmpfs." into klp-dev

* commit 'a9e453f1b552699f69dca19599c7624a581089bd':
vold no longer does MS_MOVE; remove tmpfs.
00c8e1a2199b2f9c50935bb4ea8bb3b86ba1bbef 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> vold no longer does MS_MOVE; remove tmpfs.

MS_MOVE was used when staging external storage devices, which no
longer occurs. In fact, having a writable tmpfs was masking a vold
bug around moving apps to SD cards.

Bug: 11175082
Change-Id: Ib2d7561c3a0b6fde94f651a496cb0c1f12f88d96
nit.rc
eef6fca832c7270dfe48a9bb2aad632bba3d0ea8 09-Oct-2013 Jeff Sharkey <jsharkey@android.com> am a5fdea71: am e93a0517: Set GID required to write, media_rw mount point.

* commit 'a5fdea7189239d7edeafa528c299306cba55e6c6':
Set GID required to write, media_rw mount point.
a5fdea7189239d7edeafa528c299306cba55e6c6 08-Oct-2013 Jeff Sharkey <jsharkey@android.com> am e93a0517: Set GID required to write, media_rw mount point.

* commit 'e93a0517f4c88310066ac39c6b268ebfcceef44e':
Set GID required to write, media_rw mount point.
e93a0517f4c88310066ac39c6b268ebfcceef44e 08-Oct-2013 Jeff Sharkey <jsharkey@android.com> Set GID required to write, media_rw mount point.

Add sdcard FUSE daemon flag to specify the GID required for a package
to have write access. Normally sdcard_rw, but it will be media_rw
for secondary external storage devices, so DefaultContainerService
can still clean up package directories after uninstall.

Create /mnt/media_rw which is where vold will mount raw secondary
external storage devices before wrapping them in a FUSE instance.

Bug: 10330128, 10330229
Change-Id: I4385c36fd9035cdf56892aaf7b36ef4b81f4418a
nit.rc
ecb2e3903bf24a511032654532f44486362de765 04-Oct-2013 Colin Cross <ccross@android.com> am ad296139: am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."

* commit 'ad2961397f1c7b79b114672108a3bc9b87dc8174':
Set security context of /adb_keys and /data/misc/adb/adb_keys.
dcf2771bb77e0c3c4047893272a6488ad137be74 04-Oct-2013 Alex Klyubin <klyubin@google.com> am ea1f56e7: am b1dd1765: am b42fc74f: Merge "Expose /dev/hw_random to group "system"."

* commit 'ea1f56e7ffec235cc5d48e7cd9cb7d39f4ba1598':
Expose /dev/hw_random to group "system".
ad2961397f1c7b79b114672108a3bc9b87dc8174 04-Oct-2013 Colin Cross <ccross@android.com> am 410f8c30: am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."

* commit '410f8c305b416484f17f068c37b785605a2f69eb':
Set security context of /adb_keys and /data/misc/adb/adb_keys.
ea1f56e7ffec235cc5d48e7cd9cb7d39f4ba1598 04-Oct-2013 Alex Klyubin <klyubin@google.com> am b1dd1765: am b42fc74f: Merge "Expose /dev/hw_random to group "system"."

* commit 'b1dd176520896efacbabd1df65d8bb56e1bfeb71':
Expose /dev/hw_random to group "system".
410f8c305b416484f17f068c37b785605a2f69eb 04-Oct-2013 Colin Cross <ccross@android.com> am 79b277ab: Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."

* commit '79b277ab73711313690d03a9fb2e9cb3f9242b39':
Set security context of /adb_keys and /data/misc/adb/adb_keys.
b1dd176520896efacbabd1df65d8bb56e1bfeb71 04-Oct-2013 Alex Klyubin <klyubin@google.com> am b42fc74f: Merge "Expose /dev/hw_random to group "system"."

* commit 'b42fc74f0db60e1e86deaf527b3b7e7ec53dcc54':
Expose /dev/hw_random to group "system".
79b277ab73711313690d03a9fb2e9cb3f9242b39 04-Oct-2013 Colin Cross <ccross@android.com> Merge "Set security context of /adb_keys and /data/misc/adb/adb_keys."
b2478a713a39ab745017308e8859467017fb6fa5 03-Oct-2013 Alex Klyubin <klyubin@google.com> Expose /dev/hw_random to group "system".

This is needed to let EntropyMixer (runs inside system_server) read
from /dev/hw_random.

Change-Id: Ifde851004301ffd41b2189151a64a0c5989c630f
eventd.rc
41c9fd6480771ec7ab4c160aef046e0d27a085a0 02-Oct-2013 Colin Cross <ccross@android.com> am 0d3ac55d: am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data."

* commit '0d3ac55d0654fe4f6d37923782dcd41f0590c741':
Trigger a policy reload from post-fs-data.
0d3ac55d0654fe4f6d37923782dcd41f0590c741 02-Oct-2013 Colin Cross <ccross@android.com> am 230252d5: am 61afb07b: Merge "Trigger a policy reload from post-fs-data."

* commit '230252d5cd70f5be4c24046c7a409e9498ac97f5':
Trigger a policy reload from post-fs-data.
230252d5cd70f5be4c24046c7a409e9498ac97f5 02-Oct-2013 Colin Cross <ccross@android.com> am 61afb07b: Merge "Trigger a policy reload from post-fs-data."

* commit '61afb07b9b14233f76a969840f74ce1ced22bf58':
Trigger a policy reload from post-fs-data.
deb41e512760f9d18cb718b007ced367018b3667 01-Oct-2013 Stephen Smalley <sds@tycho.nsa.gov> Set security context of /adb_keys and /data/misc/adb/adb_keys.

I97b3d86a69681330bba549491a2fb39df6cf20ef introduced a separate type
for the adb_keys file. Set the security context of the adb_keys file
accordingly by adding restorecon commands to init.rc.

Change-Id: I30e4d2a1ae223a03eadee58a883c79932fff59fe
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
61afb07b9b14233f76a969840f74ce1ced22bf58 30-Sep-2013 Colin Cross <ccross@android.com> Merge "Trigger a policy reload from post-fs-data."
63144019468b2043393aabd7cba6f03b2e9a4234 24-Sep-2013 Ken Sumrall <ksumrall@android.com> am dfcbf02b: am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev

* commit 'dfcbf02bb0a6705e3714a59e42e052fbb0ce8799':
Create a separate copy of the fsck logs
dfcbf02bb0a6705e3714a59e42e052fbb0ce8799 24-Sep-2013 Ken Sumrall <ksumrall@android.com> am 6b1a0272: Merge "Create a separate copy of the fsck logs" into klp-dev

* commit '6b1a027239689a817aa5ca44a2bcbfe48ed21408':
Create a separate copy of the fsck logs
6b1a027239689a817aa5ca44a2bcbfe48ed21408 23-Sep-2013 Ken Sumrall <ksumrall@android.com> Merge "Create a separate copy of the fsck logs" into klp-dev
4676550b5684da8355f9ee0b2db964005ce9ea4f 17-Sep-2013 Todd Poynor <toddpoynor@google.com> init.rc: use oom_score_adj instead of oom_adj

Use kernel oom_score_adj interface to make init and children unkillable.

Stop using older, deprecated oom_adj interface.

Use OOM_SCORE_ADJ_MIN to make the processes unkillable (previously the processes
were set to a very low score, but not unkillable).

Change-Id: I680965009585c2a5a580859fb946f2d0caa95d9c
nit.rc
4eaf905858c6a1d7cf0639bed3e8de3bd7987646 19-Sep-2013 Ken Sumrall <ksumrall@android.com> Create a separate copy of the fsck logs

The log_target parameter of android_fork_execvp_ext() is now a
bit field, and multiple targets can be set to log to multiple
places at the same time.

The new target LOG_FILE will log to a file specified by the new
parameter file_path.

Set LOG_FILE and log to a file in /dev (the only writable filesystem
avilable when e2fsck runs) when invoking e2fsck in fs_mgr.

Bug: 10021342

Change-Id: I63baf644cc8c3afccc8345df27a74203b44d0400
nit.rc
aa4a3228f00fedd870c25dc37a112e439682dbde 21-Sep-2013 Jeff Sharkey <jsharkey@android.com> am 9729b415: am 44d6342c: Remove mkdir() side effect, add .nomedia, utils.

* commit '9729b41574ca5e5e87c86b203a2096cbdc72cfea':
Remove mkdir() side effect, add .nomedia, utils.
9729b41574ca5e5e87c86b203a2096cbdc72cfea 21-Sep-2013 Jeff Sharkey <jsharkey@android.com> am 44d6342c: Remove mkdir() side effect, add .nomedia, utils.

* commit '44d6342caa0db1f613809e9ba1ea8d9af0183b74':
Remove mkdir() side effect, add .nomedia, utils.
44d6342caa0db1f613809e9ba1ea8d9af0183b74 12-Sep-2013 Jeff Sharkey <jsharkey@android.com> Remove mkdir() side effect, add .nomedia, utils.

Before this change, FUSE lookup() would have the side effect of
creating the directory on behalf of apps. This resulted in most
directories being created just by Settings trying to measure disk
space. Instead, we're switching to have vold do directory creation
when an app doesn't have enough permissions.

Create fs_mkdirs() utility to create all parent directories in a
path as needed. Allow traversal (+x) into /storage directories.

Fix FUSE derived permissions to be case insensitive. Mark well-known
directories as .nomedia when created.

Bug: 10577808, 10330221
Change-Id: I53114f2e63ffbe6de4ba6a72d94a232523231cad
nit.rc
5660da25b9cd0b2e8d4e5d89de5b1cc281bce9bd 19-Sep-2013 Nick Kralevich <nnk@google.com> am 1998e505: am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."

* commit '1998e505a98ad445bead87c2bb047053f1aea648':
Do not change ownership of /sys/fs/selinux/load to system UID.
1998e505a98ad445bead87c2bb047053f1aea648 19-Sep-2013 Nick Kralevich <nnk@google.com> am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."

* commit '2e9402863b40fe8bf2ddd8169c62f2419d968ff9':
Do not change ownership of /sys/fs/selinux/load to system UID.
2e9402863b40fe8bf2ddd8169c62f2419d968ff9 19-Sep-2013 Nick Kralevich <nnk@google.com> am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."

* commit '0f507339ec474a2f67227466efc9045630f1f1a4':
Do not change ownership of /sys/fs/selinux/load to system UID.
cc13e8ab87f74143293722e5301480fbe31b788d 26-Aug-2013 Stephen Smalley <sds@tycho.nsa.gov> Do not change ownership of /sys/fs/selinux/load to system UID.

Policy reload is handled by setting the selinux.reload_policy property
and letting the init process perform the actual loading of policy into
the kernel. Thus, there should be no need for the system UID to directly
write to /sys/fs/selinux/load.

Change-Id: I240c5bb2deaee757a2e1e396e14dea9e5d9286f5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
5d4be690935ea7970a53837914f31de0a4f0690d 18-Sep-2013 Nick Kralevich <nnk@google.com> am 0e7bd81c: am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev

* commit '0e7bd81c938611cfa4ebf44870668300a5bba875':
Initialize /dev/urandom earlier in boot.
0e7bd81c938611cfa4ebf44870668300a5bba875 18-Sep-2013 Nick Kralevich <nnk@google.com> am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev

* commit '4f18183bd6d3d2ed5d698c176ecc239211bdb82e':
Initialize /dev/urandom earlier in boot.
b410eb19130cf1eca158a672bba8f515e7627f11 18-Sep-2013 Nick Kralevich <nnk@google.com> Initialize /dev/urandom earlier in boot.

It's a security best practice to carry entropy across reboots.
(see "man 4 random"). Currently, entropy saving and mixing occur
in the system_server, via the EntropyMixer code. Unfortunately, the
EntropyMixer code runs fairly late in the boot process, which means
early boot doesn't have high quality entropy. This has caused security
problems in the past.

Load entropy data as soon as we can in the early boot process, so that
we can get /dev/random / /dev/urandom into a "random" state earlier.

Bug: 9983133
Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
nit.rc
59e51e792a13e017d0f1b85a02fcc56815ea83d6 11-Sep-2013 Todd Poynor <toddpoynor@google.com> init.rc: no longer start healthd in charger mode

Being moved to healthd/charger mode in board-specific init.rc.

Change-Id: Ie9fc2e5abc1737fbffec8fb071c73f5fd96e4d17
nit.rc
8d0a92ddc568c4fb065d8e9ec098f1ef4ff9e6ac 11-Sep-2013 Rom Lemarchand <romlem@google.com> am 342077e7: am 67b00d8b: init.rc: change mem cgroups permissions

* commit '342077e78da9411c252232313bc40fb4ce5f6137':
init.rc: change mem cgroups permissions
342077e78da9411c252232313bc40fb4ce5f6137 11-Sep-2013 Rom Lemarchand <romlem@google.com> am 67b00d8b: init.rc: change mem cgroups permissions

* commit '67b00d8b2d96e8133c249bcbc0fb63c49e10e022':
init.rc: change mem cgroups permissions
67b00d8b2d96e8133c249bcbc0fb63c49e10e022 11-Sep-2013 Rom Lemarchand <romlem@google.com> init.rc: change mem cgroups permissions

Changing mem cgroups permissions to only be accessible by root and system.

Bug: 10210529
Bug: 10210900
Change-Id: Ib4fff6f49b33013b3629d40ae98a5e2464571b2d
nit.rc
aacded70196acf958ddd26149dec9709571f1f56 11-Jul-2013 Todd Poynor <toddpoynor@google.com> init.rc: start lmkd

Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
nit.rc
6552f6885fc2a94501ca064bffc4c18ad40caad8 26-Aug-2013 Stephen Smalley <sds@tycho.nsa.gov> Trigger a policy reload from post-fs-data.

Once userdata is available and decrypted, trigger a policy reload to pick
up any policy update files stored under /data/security.

Change-Id: Ic2b3121c3395429b108c40d1d7f5a3124a5896c5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
a34f1391bd9c368aceecb3f8dec158b2cb8b2dd4 23-Aug-2013 Colin Cross <ccross@android.com> am 30caffc0: resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp

* commit '30caffc025aff450ebb354ee693174cc1732732b':
Handle policy reloads within ueventd rather than restarting it.
30caffc025aff450ebb354ee693174cc1732732b 23-Aug-2013 Colin Cross <ccross@android.com> resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp

Change-Id: I08e9898940f7cdd466469b76760807cc5d5c67e4
a1af5cf6d1c008dbde2e40121940d65faa0816bf 23-Aug-2013 Colin Cross <ccross@android.com> am d8d99c45: Merge "Handle policy reloads within ueventd rather than restarting it."

* commit 'd8d99c45b704399d50ae0a5e4df938d825c70cfa':
Handle policy reloads within ueventd rather than restarting it.
46a24db563f46736f6e02c4d80656ab51d94ff77 23-Aug-2013 Jeff Brown <jeffbrown@google.com> Remove input flinger stubs. (DO NOT MERGE)

Bug: 10446930
Change-Id: I88b926380dbe1e866c0b87ec95b3489d87c5907b
nit.rc
13f4c9fb279f1b34a3b47a6eac80b8a09d2d3a79 20-Jun-2013 Todd Poynor <toddpoynor@google.com> healthd: normal and charger mode startup

Command line flag -n tells healthd not to use (or wait for) servicemanager
in charger mode.

Change-Id: I255f9597dff6fc904f5ed20fd02f52c0531d14f8
nit.rc
5ba57f9a951728593aed559ece93ba821c33e45c 27-Jul-2013 Colin Cross <ccross@android.com> Merge "add property to adjust extra_free_kbytes kernel vm tunable"
e2eb69db6d818b41f5c0f2090cc643f7cff31734 16-Apr-2013 Stephen Smalley <sds@tycho.nsa.gov> Handle policy reloads within ueventd rather than restarting it.

Restarting ueventd upon policy reloads has reportedly created
stability problems for some users and could cause events to be lost.
Stop restarting ueventd and instead handle policy reloads within ueventd.

Also stops restarting installd upon policy reloads.

Change-Id: Ic7f310d69a7c420e48fbc974000cf4a5b9ab4a3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
57fdb5cfd2b20f47299a12c2050ff8bb2707c788 25-Jul-2013 Colin Cross <ccross@android.com> add property to adjust extra_free_kbytes kernel vm tunable

ActivityManager can't directly write to extra_free_kbytes because
/proc/sys rejects all chown and chmod syscalls. Proxy the writes
through init by using the sys.sysctl.extra_free_kbytes property.

Bug: 10024467
Change-Id: I441e00478421254355fcafb252bc878166483d4c
nit.rc
5748ee972de22e3a53bd3ef7d998ed15ea726a69 24-Jul-2013 Ying Wang <wangying@google.com> Generate init.environ.rc by populating BOOTCLASSPATH

- BOOTCLASSPATH now is derived from PRODUCT_BOOT_JARS, which is a product
configuration variable set up by the core build system.
- Moved files from the legacy ALL_PREBUILT to PRODUCT_COPY_FILES in
build/target/product/embedded.mk.

Bug: 9990214
Change-Id: I98bac36c1ca8c779dda572a0a5e0a22b7e4c4a7a
ndroid.mk
nit.environ.rc.in
nit.rc
f498ec8fafcce6fe30ba3a80bbdbce6577b6b921 20-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> am dafa66af: am 2aa33a3d: Add writable data space for radio.

* commit 'dafa66afdd3729e2c65ccb8dced8ca3e137db437':
Add writable data space for radio.
dafa66afdd3729e2c65ccb8dced8ca3e137db437 19-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> am 2aa33a3d: Add writable data space for radio.

* commit '2aa33a3dbd1147558098d9a2948450d363ffe468':
Add writable data space for radio.
57fc1ceebc6a8c84fa6e9cbf268b5ffca3052c2d 18-Jul-2013 Jeff Brown <jeffbrown@google.com> Split framework jar.

Change-Id: I590de05f23669cf625030b479c786423f21c6159
nit.rc
2aa33a3dbd1147558098d9a2948450d363ffe468 16-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> Add writable data space for radio.

Storing carrier provisioning urls updates in /data/misc/radio.
bug:9623159

Change-Id: I8d62d4638229733dea0f11f1729c4d22ae2295d1
I36697ed341353b7a3dbec5afe20241102e76f6f1
nit.rc
3884a9b252c1852e88a2ad75c22b042d25a633f4 13-Jul-2013 Jeff Brown <jeffbrown@google.com> init.rc: Add input flinger.

Change-Id: Ibcb1116bdcd9189272db620910b9958c8ffb4552
nit.rc
4a291b339e1ab682609485aef6fbb46b66b0de90 15-Jul-2013 Rom Lemarchand <romlem@google.com> Merge "init.rc: configure memory cgroups"
56adf992676e39175f227ac1a542d841bb6c0c24 15-Jul-2013 Nick Kralevich <nnk@google.com> am 9a4913d4: init.rc: remove "on fs" section

* commit '9a4913d422f4c18033333afe8e2e1d699b112d44':
init.rc: remove "on fs" section
435a52ef07a5c97bdd717f20cb3115a585eb6d3c 10-Jul-2013 Rom Lemarchand <romlem@google.com> init.rc: configure memory cgroups

Create the memory cgroups folders and configure them

Change-Id: I06c4bb486b204f7e98b0bc6757deec8bd7f6349e
nit.rc
9a4913d422f4c18033333afe8e2e1d699b112d44 12-Jul-2013 Nick Kralevich <nnk@google.com> init.rc: remove "on fs" section

This was only ever used by the emulator. Now the emulator
uses an fstab file.

Change-Id: I1a071e567e1f1a379f9c8079cc2dc17660d8455f
nit.rc
e1dbdd697894f84e2cb8882160f0e4104f739064 12-Jul-2013 Nick Kralevich <nnk@google.com> am 7d6ddc7d: am 2713be91: am fb1c9cf6: Merge "use ext4 instead of yaffs"

* commit '7d6ddc7d395e909d841bb7eadfc12a167076aecf':
use ext4 instead of yaffs
2713be91a84078e8b0b9b755ce17881b750e85a7 12-Jul-2013 Nick Kralevich <nnk@google.com> am fb1c9cf6: Merge "use ext4 instead of yaffs"

* commit 'fb1c9cf6fa4efafb3e0c6b0bc93c7f087d926a48':
use ext4 instead of yaffs
f4c1512db8f0d2fd19d80487d96db3af7ceaacb5 10-Jul-2013 Nick Kralevich <nnk@google.com> use ext4 instead of yaffs

This is needed to allow the emulator to use ext4 images.

Bug: https://code.google.com/p/android/issues/detail?id=38561
Change-Id: I02fde6382ad67cf7f4f3b695396841f70bb9301d
nit.rc
fafcabd0dd4432de3c7f5956edec23f6ed241b56 04-Jul-2013 Colin Cross <ccross@android.com> Merge "Added net.dns1 prop for emulator, as Android emulator ignores it by default."
317ec9246b28c8be373d2915be5fbfd85b2854e2 04-Jun-2013 Torne (Richard Coles) <torne@google.com> Add webviewchromium to BOOTCLASSPATH.

Add /system/framework/webviewchromium.jar to BOOTCLASSPATH. This jar
contains the implementation classes for the new WebView. It has been
processed with jarjar to ensure that it doesn't define any classes
outside of com.android.

Change-Id: If65913638df0088f4dd7d62a087750b90038a7fb
nit.rc
71952461310cff9f35a4852415c608d14c92236a 21-May-2013 Colin Cross <ccross@android.com> am 5f1a938e: am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"

* commit '5f1a938e9c65829c3afebb4d92c8e93caecc3e11':
init.rc: remove duplicated led-related nodes
5f1a938e9c65829c3afebb4d92c8e93caecc3e11 21-May-2013 Colin Cross <ccross@android.com> am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"

* commit '3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2':
init.rc: remove duplicated led-related nodes
3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2 21-May-2013 Colin Cross <ccross@android.com> am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"

* commit '9246f8d6def40a50933a980fac773a909f2138d7':
init.rc: remove duplicated led-related nodes
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae 21-May-2013 gcondra@google.com <gcondra@google.com> am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status."

* commit '253e91b4ffb631b188fdac0c1624786103471f05':
Revert "Add persistent property for SELinux enforcment status."
acef650dbc11355f9792923b69d8277a4ce89fab 21-May-2013 gcondra@google.com <gcondra@google.com> am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition."

* commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1':
Revert "Reload policy after setting up the data partition."
9a8cb3abf8985586172d8f891933b04ff419f81c 21-May-2013 gcondra@google.com <gcondra@google.com> am b9866649: am 52351300: Revert "Add a version check for SELinux policy on device."

* commit 'b9866649e24d7b6eedcaf2e03ffc605a3417537d':
Revert "Add a version check for SELinux policy on device."
253e91b4ffb631b188fdac0c1624786103471f05 21-May-2013 gcondra@google.com <gcondra@google.com> am 477e35d6: Revert "Add persistent property for SELinux enforcment status."

* commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6':
Revert "Add persistent property for SELinux enforcment status."
43329bc1c99c0f5f3670a8aaab39e54df34819a1 21-May-2013 gcondra@google.com <gcondra@google.com> am 8a387870: Revert "Reload policy after setting up the data partition."

* commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8':
Revert "Reload policy after setting up the data partition."
b9866649e24d7b6eedcaf2e03ffc605a3417537d 21-May-2013 gcondra@google.com <gcondra@google.com> am 52351300: Revert "Add a version check for SELinux policy on device."

* commit '52351300d156826bf22c493828571f45a1cea16a':
Revert "Add a version check for SELinux policy on device."
a8d392da915b46a59dc5eab82a2b6cf17a9b3a86 20-May-2013 Sungmin Choi <sungmin.choi@lge.com> init.rc: remove duplicated led-related nodes

Change-Id: Ibee7ef9137594fc4c30d3ab6ee7bdf3515836c62
nit.rc
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 17-May-2013 repo sync <gcondra@google.com> Revert "Add persistent property for SELinux enforcment status."

This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
nit.rc
8a3878700eb9cd8ecf495cd01f15face5c3879c8 17-May-2013 repo sync <gcondra@google.com> Revert "Reload policy after setting up the data partition."

This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
nit.rc
52351300d156826bf22c493828571f45a1cea16a 17-May-2013 repo sync <gcondra@google.com> Revert "Add a version check for SELinux policy on device."

This reverts commit 921be8b6568df0057c4eacbac2e1022b71e09620.
nit.rc
b1b45b9bd4f8610d7bda99849cac0b14e9ad771d 16-May-2013 Ron Munitz <ron@nubosoftware.com> Added net.dns1 prop for emulator, as Android emulator ignores it by default.

This commit sets up the system property which is actually used by the
Connectivity Service
(frameworks/base/services/java/com/android/server/ConnectivityService.java).
It fixes an (obsolete?) convention where the dns was affected directly by
the interface (i.e. "net.eth0.dns1=10.0.2.3"), which causes the Android
Emulator (goldfish) to ignore this value, and effectively have no DNS
resolving at all.

An immediate fix can be either add reference to net.eth%s.dns%s in the
ConnectivityService and possibly on the dhcp code as well which would be
bloated, or just stick to the apparant new convention.

I chose the latter as a one line fix which gets the job done.

Change-Id: Id4364129e9a82c1f48403068a837aca54de07944
tc/init.goldfish.rc
e45710f19f3843dd0ec02d1a5c7f679f34a33846 15-May-2013 gcondra@google.com <gcondra@google.com> am 5a98566d: am 921be8b6: Add a version check for SELinux policy on device.

* commit '5a98566d589408c78e35f4476f478a2fa1c13e78':
Add a version check for SELinux policy on device.
5a98566d589408c78e35f4476f478a2fa1c13e78 15-May-2013 gcondra@google.com <gcondra@google.com> am 921be8b6: Add a version check for SELinux policy on device.

* commit '921be8b6568df0057c4eacbac2e1022b71e09620':
Add a version check for SELinux policy on device.
921be8b6568df0057c4eacbac2e1022b71e09620 10-May-2013 repo sync <gcondra@google.com> Add a version check for SELinux policy on device.

This helps to ensure that when a new system image is installed,
old userdata policy isn't applied over the top of it.

Bug: 8841348
Change-Id: I135af32250aa62979763e775842ce0af3c8b6f9f
nit.rc
8577e8649062953a59e0ac652b5ac16c96c1c1f4 09-May-2013 Mathias Agopian <mathias@google.com> surfaceflinger is now always running in its own process

Change-Id: I1ae63347a8b6d406306ed894665674dd726b7d51
nit.rc
69e9b17fa1a7ac4dea56963008096a4961245277 01-May-2013 Colin Cross <ccross@android.com> am cb4b9605: am 8794b2ee: Merge "Fix perms on /data/security"

* commit 'cb4b9605cb923d071a546b444d10cbe21367d878':
Fix perms on /data/security
cb4b9605cb923d071a546b444d10cbe21367d878 01-May-2013 Colin Cross <ccross@android.com> am 8794b2ee: Merge "Fix perms on /data/security"

* commit '8794b2eeb2bbd717ca18b8bef5d853f99334aabc':
Fix perms on /data/security
8794b2eeb2bbd717ca18b8bef5d853f99334aabc 01-May-2013 Colin Cross <ccross@android.com> Merge "Fix perms on /data/security"
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a 01-May-2013 gcondra@google.com <gcondra@google.com> am 63577d92: am fee250d2: Reload policy after setting up the data partition.

* commit '63577d9280e7919bfb7221030d211b833e66bb1e':
Reload policy after setting up the data partition.
63577d9280e7919bfb7221030d211b833e66bb1e 01-May-2013 gcondra@google.com <gcondra@google.com> am fee250d2: Reload policy after setting up the data partition.

* commit 'fee250d27a9c03af1ba439047b976d89563b1887':
Reload policy after setting up the data partition.
fee250d27a9c03af1ba439047b976d89563b1887 30-Apr-2013 repo sync <gcondra@google.com> Reload policy after setting up the data partition.

This forces a policy reload + fixcon to deal with dynamically
delivered policy changing labels on device nodes.

It's implemented as a new keyword in init.

Bug: 8702843
Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
nit.rc
152a43215143f62ee4bedda96ce73604530a6f1d 30-Apr-2013 Kenny Root <kroot@google.com> am d14586e3: resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp

* commit 'd14586e35a3df39cc3aa6aff6a54463270a5e1a7':
Track change to JSSE provider
d14586e35a3df39cc3aa6aff6a54463270a5e1a7 30-Apr-2013 Kenny Root <kroot@google.com> resolved conflicts for merge of a69af5af to jb-mr2-dev-plus-aosp

Change-Id: If41560f0fef3103cad2172061a7988ceb5556377
ca0404b83e9e5712531e040675212a4bd0d7f6a8 24-Apr-2013 Kenny Root <kroot@google.com> Track change to JSSE provider

Change-Id: Iff9103fff3591983f2b172f83fd2a6e924986aa7
nit.rc
ada3291c8d13a9c3896102932abefed155a5b3fe 26-Apr-2013 gcondra@google.com <gcondra@google.com> am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev

* commit '14ad786183455ad9c8298e24946d4da0f24458d7':
Add persistent property for SELinux enforcment status.
14ad786183455ad9c8298e24946d4da0f24458d7 26-Apr-2013 gcondra@google.com <gcondra@google.com> am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev

* commit '538b5d4e8e4c480b2120aa957fe3e11a2836a1b3':
Add persistent property for SELinux enforcment status.
538b5d4e8e4c480b2120aa957fe3e11a2836a1b3 26-Apr-2013 repo sync <gcondra@google.com> Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev
b89bdfde422eff751b3f939f10ab57e22af83eaa 24-Apr-2013 repo sync <gcondra@google.com> Add persistent property for SELinux enforcment status.

Also adds triggers for going between enforcing and
permissive status.

Bug: 8702843
Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
nit.rc
7629bf19a139cbc204e8ae78cb82c2faeba6d2f0 25-Apr-2013 Jeff Tinker <jtinker@google.com> am 9e9ed1b4: am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev

* commit '9e9ed1b40010745e709157a6977ba6d053d46c49':
Add a new group for MediaDrm engine plugins
9e9ed1b40010745e709157a6977ba6d053d46c49 25-Apr-2013 Jeff Tinker <jtinker@google.com> am 131ee07b: Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev

* commit '131ee07b77e0250c16cebe2b0e226c5bff8e9587':
Add a new group for MediaDrm engine plugins
131ee07b77e0250c16cebe2b0e226c5bff8e9587 25-Apr-2013 Jeff Tinker <jtinker@google.com> Merge "Add a new group for MediaDrm engine plugins" into jb-mr2-dev
af1cbd4c10cfc28235d7a60941290986a77affda 24-Apr-2013 Matthew Xie <mattx@google.com> am 0db6600a: am 7ee2e26e: Remove DBUS from make and header files

* commit '0db6600a60e8d604aaef5e43db9ae52ed7380979':
Remove DBUS from make and header files
0db6600a60e8d604aaef5e43db9ae52ed7380979 24-Apr-2013 Matthew Xie <mattx@google.com> am 7ee2e26e: Remove DBUS from make and header files

* commit '7ee2e26eb98da10eaddf5a8e864d508cceab946b':
Remove DBUS from make and header files
08d64308b93594c587036cffcd8f6780eaf2c417 24-Apr-2013 Jeff Tinker <jtinker@google.com> Add a new group for MediaDrm engine plugins

bug: 8702754
Change-Id: I3b7988b64b1dcf4685624e4c1af938e132b82696
nit.rc
7ee2e26eb98da10eaddf5a8e864d508cceab946b 23-Apr-2013 Matthew Xie <mattx@google.com> Remove DBUS from make and header files

DBUS had been needed by bluetooth bluz stack. It is not needed after
we replaced bluez stack with bluedroid stack.
bug 6872904

Change-Id: I3fa41c1dd4ac80bc679d5950b3b20c7f6d12265f
ndroid.mk
tc/dbus.conf
ca8e66a8b0f843812014a28d49208f9f6f64ecbc 18-Apr-2013 Nick Kralevich <nnk@google.com> Make init handle reboots

Move the responsibility for rebooting the system from the
reboot command to init. Init is in a better position to take
actions to bring the system down cleanly, including making sure
filesystems are mounted read-only.

The only UIDs which can perform an init triggered reboot are
root, system, and shell.

Modify the reboot command so that it calls into init to perform
the reboot. The reboot command no longer requires CAP_SYS_BOOT.

Remove the -n reboot option and code which supports it. Anyone needing
to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'.

Modify adb so that it calls into init to perform a shutdown.

Bug: 8646621
Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
nit.rc
d43bab7b98d329ead0b5304be79d430b5a92ad10 15-Apr-2013 William Roberts <w.roberts@sta.samsung.com> Fix perms on /data/security

installd and zygote need to be able
to search the directory to access
the policy files.

Change-Id: I0679fd2084d2664dfb5a594f493317eff058415d
nit.rc
ad999a09ab973c5ed5c54a78cdaa4dbc06eb485e 05-Apr-2013 Keun-young Park <keunyoung@google.com> Merge "rootdir: goldfish: mount debugfs on boot time"
76c674451c831c1e9c3e3ee134ea8af26ae19ac1 03-Apr-2013 Brian Carlstrom <bdc@google.com> Merge "resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp" into jb-mr2-dev-plus-aosp
d3f0e0ae379f4420b01bb9de932a764c035ff2a6 03-Apr-2013 Brian Carlstrom <bdc@google.com> resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp

Change-Id: I63d6a2f975a6c0df5c238a2f7592f357441eb767
c2594f36e789bbd49cbeeb9421a7b6a16cd30ba4 31-Mar-2013 Geremy Condra <gcondra@google.com> Give system ownership of selinux load and enforce files.

This is necessary to enable remote updates.

Change-Id: I05fb979c0360eca4cc6e4add48bb42f712a1ba17
nit.rc
8637e8186ac572df92a34253f93bf405bf634b03 30-Mar-2013 jwilson <jwilson@squareup.com> Add OkHttp to the boot classpath.

Change-Id: I185b803b5b804ff8680ef928ce5163727adbf0bd
nit.rc
6b5de1cda2e5c4946aa08a11a38ad0a7eee115ce 25-Mar-2013 Todd Poynor <toddpoynor@google.com> init.rc: Set owner/perm for interactive governor io_is_busy

Change-Id: I7537d56a23ca787daf92a9d91778056f987097bd
nit.rc
fb39c0d19860fe48bc598d5d180a8cce9f59e33b 23-Mar-2013 Geremy Condra <gcondra@google.com> am 4d71493e: am e849970c: Merge "Fix mode on /data/security."

* commit '4d71493e74ed1ea39e554146351cc39e47cb5d02':
Fix mode on /data/security.
bfd71b489b283fe54669dc5d1ccdc97b453d2fb4 23-Jan-2013 William Roberts <w.roberts@sta.samsung.com> Create a new location for /data policy files

Adding a new location for policy files under
/data, the new location is /data/security. The
new location is used before attempting to use
any other location.
This requires a new directory to be created by
the init script and an update to the location of
the property_contexts file for property service.

Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
nit.rc
c0317a75793ecbcd4a8e19f477458eb677024869 28-Jan-2013 Stephen Smalley <sds@tycho.nsa.gov> Fix mode on /data/security.

Change-Id: Id97d06a1c360c7871361db147f76b8a2eaceca42
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
46e1bd89b457713bf91d2dc751795822cc202658 23-Jan-2013 William Roberts <w.roberts@sta.samsung.com> Create a new location for /data policy files

Adding a new location for policy files under
/data, the new location is /data/security. The
new location is used before attempting to use
any other location.
This requires a new directory to be created by
the init script and an update to the location of
the property_contexts file for property service.

Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
nit.rc
fb4f7acefb31a51679cec194562c7aeb3922f728 14-Mar-2013 Jeff Sharkey <jsharkey@android.com> Add symlink to bugreport storage location.

Change-Id: I16f024c24767cfa1f5800d568d39fb098a408127
nit.rc
7d312208a16a3d9bac01467369ae9b86fd0cf29b 10-Mar-2013 Young-Ho Cha <ganadist@gmail.com> rootdir: goldfish: mount debugfs on boot time

goldfish is ported to linux-3.4 and have capability to run atrace.
But can't run atrace yet because debugfs is not mounted on boot time.

Change-Id: I0ce23bde3b8d1b2a88d4238272123e3ab8cb6970
Signed-off-by: Young-Ho Cha <ganadist@gmail.com>
tc/init.goldfish.rc
f5eb8035431a130f4666f5f067242df7392e8bc3 26-Feb-2013 Keun young Park <keunyoung@google.com> move goldfish stuffs to device/generic/goldfish

- each files will be pulled in emulator.mk as PRODUCT_COPY_FILES

Change-Id: I4772e2fd863e6d2663f477c3acd8a90cb95b498a
ndroid.mk
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/ueventd.goldfish.rc
tc/vold.fstab
65e203070c0cb25f5401502d60e924ff2b5bdae5 23-Feb-2013 Glenn Kasten <gkasten@google.com> Merge "Add directory for mediaserver"
b0f908a95714fbbfd63ee498e5773c44712b30e2 22-Feb-2013 Glenn Kasten <gkasten@google.com> Add directory for mediaserver

Bug: 8223560
Change-Id: Iccc6d439a848445cac0f5b30d1d663aed3f5344e
nit.rc
fe8425b5c5156c60691927a982672abd7927b777 22-Feb-2013 Nick Kralevich <nnk@google.com> am c5ce4108: am 1b64957a: Merge "init.rc: allow IPPROTO_ICMP support"

* commit 'c5ce4108facc5a1b94fcf9469a189b2cbdfd5e76':
init.rc: allow IPPROTO_ICMP support
be341cc348257a07c68bcbfdc526835d49283329 22-Feb-2013 Nick Kralevich <nnk@google.com> init.rc: allow IPPROTO_ICMP support

Allow userspace programs to create IPPROTO_ICMP sockets.

This socket type allows an unprivileged program to safely
send ICMP_ECHO messages and receive the corresponding
ICMP_ECHOREPLY messages, without relying on raw sockets or
setuid programs.

Please see http://lwn.net/Articles/443051/ for details.

In particular, this allows us to use a version of ping
which doesn't have any capabilities
(https://android-review.googlesource.com/52072).
In addition, this allows us to safely implement an IPv4 ICMP
based version of InetAddress.isReachable()
(https://code.google.com/p/android/issues/detail?id=20106)

Change-Id: I876718151efa8219c4f34f573e35e21256fe2316
nit.rc
38a260547ba65b495ddcb16ef32f219aff5e389e 29-Jan-2013 Wink Saville <wink@google.com> Merge "Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip"
c0d399df697850712432cb6092d63669ffa0fc23 29-Jan-2013 Wink Saville <wink@google.com> Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip

Add voip-common to BOOTCLASSPATH

Change-Id: Ieaba759a0f69b45c4b8839cbed1fe757cdf190c5
nit.rc
31c8095cac4cd652c360feb85c47854363233a1c 16-Jan-2013 Benoit Goby <benoit@android.com> Revert "init.usb.rc: set sys.usb.config to none before changing it"

This can cause init to be stucked in a loop in very rare cases where
persist.sys.usb.config is set to "none" (because the "setprop
sys.usb.config none" action is added twice to the action list).
The original issue on encrypted devices has been fixed differently
by change # I350c5aab986f8ca86b95f316398d03012553e581

This reverts commit 80828af3def1f37eff1d483520df79ebe4238d55.

Change-Id: Id0a7af8dd861c8d10b80a13b540c8a339b432007
nit.usb.rc
a44404154730e54615d44c389b11cec9dd86c001 05-Jan-2013 JP Abgrall <jpa@google.com> am ba900f2e: am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files"

* commit 'ba900f2e708f0b654cdaa827804cbb21af4e4fb4':
init.rc: setup qtaguid group ownership of ctrl and stat files
ba900f2e708f0b654cdaa827804cbb21af4e4fb4 05-Jan-2013 JP Abgrall <jpa@google.com> am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files"

* commit 'fb69c2e2577e056bb7a054343a9f6d781cedbf3d':
init.rc: setup qtaguid group ownership of ctrl and stat files
3e54aabc63535572242477fadbf13ec42b06649e 04-Jan-2013 JP Abgrall <jpa@google.com> init.rc: setup qtaguid group ownership of ctrl and stat files

This will help get rid of android_aid.h in the kernel.
The group of the proc entries will be used in place of the default
values picked up by the xt_qtaguid netfilter module
(AID_NET_BW_STATS, AID_NET_BW_ACCT).
This change has no effect until the matching kernel changes are submitted.

Change-Id: I3c177e7b5caf9c59300eba6bd4a976634b333674
nit.rc
2b5b3bb103f59d9d3bf25c0c1f8035db036917da 21-Dec-2012 Todd Poynor <toddpoynor@google.com> rootdir: init.rc: set perms for new interactive governor attrs

/sys/devices/system/cpu/cpufreq/interactive/timer_slack
/sys/devices/system/cpu/cpufreq/interactive/target_loads

Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
nit.rc
e2aab2cce821149fcb807d4b67753c470a5f2028 22-Dec-2012 Elliott Hughes <enh@google.com> am 38219ee6: Merge "Track the setsebool change in the emulator init.rc."

* commit '38219ee6116943269b0501a1a0210c76e2ba69c3':
Track the setsebool change in the emulator init.rc.
334ad0ed49356db93ef17c173cad19d098923ffe 21-Dec-2012 Elliott Hughes <enh@google.com> Track the setsebool change in the emulator init.rc.

setsebool's syntax changed in November. This is the sole
caller in AOSP.

Change-Id: I0da608ee974bc3a9060372ef68a71c52726a44a6
tc/init.goldfish.rc
191af2f2c3effc5a60f1643dd6283ecc5a521603 21-Dec-2012 Todd Poynor <toddpoynor@google.com> am 367f1e4b: am 4f247d75: rootdir: init.rc: set perms for cpufreq governor boostpulse_duration

* commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42':
rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
4f247d753a8865cd16292ff0b720b72c28049786 20-Dec-2012 Todd Poynor <toddpoynor@google.com> rootdir: init.rc: set perms for cpufreq governor boostpulse_duration

Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
nit.rc
9e2182adc2f91ed3a5e7713ce214aafb537fab43 07-Dec-2012 Benoit Goby <benoit@android.com> am 6d3e6099: am a2411eed: Merge "init.usb.rc: set sys.usb.config to none before changing it" into jb-mr1.1-dev

* commit '6d3e6099770c9f78264f573897a8b1923edbee63':
init.usb.rc: set sys.usb.config to none before changing it
80828af3def1f37eff1d483520df79ebe4238d55 06-Dec-2012 Benoit Goby <benoit@android.com> init.usb.rc: set sys.usb.config to none before changing it

On encrypted devices, persistent properties are loaded after the device
is decrypted. To properly change sys.usb.config to its persistent value,
it must first be set to "none" and then to ${persist.sys.usb.config}.

Bug: 7678835
Change-Id: I4f91245cedc04e3178ce9cee21390f5b657733c9
nit.usb.rc
92781808bab8f045752aa1824a57956ddd52fcbd 13-Nov-2012 Kenny Root <kroot@google.com> Switch keystore to binder

Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
nit.rc
066d3f9b3bd77df71542b132adda8eb25bc013c0 22-Oct-2012 Elliott Hughes <enh@google.com> resolved conflicts for merge of 3e5e9e9e to jb-mr1-dev-plus-aosp

Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
f820e85164a1863e4384f5e1ca8b6f46902bd74e 20-Oct-2012 Elliott Hughes <enh@google.com> Add a directory for tzdata updates.

Bug: 7012465
Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
nit.rc
9f239afc3565770f39ae94c2969addb520af3a40 17-Oct-2012 Zhihai Xu <zhihaixu@google.com> second user doesnot pickup input operations from A2DP

bug 7335014

Change-Id: I39e450d254647f0b84a07f38f2f2571711fca075
eventd.rc
4ef6e4baa9b0d5aadb6668734881bdfae0ac9464 16-Oct-2012 Todd Poynor <toddpoynor@google.com> init.trace.rc: Set perms for power/clock_set_rate events

Bug: 7351763

Change-Id: I1ee3d7c9b55d1b55df6cafb1bf21f9139d964646
nit.trace.rc
bdec5ead7417769ba9fc75b6ca86d191b49f2be8 11-Oct-2012 Matthew Xie <mattx@google.com> Change dev/uhid group id from bluetooth to net_bt_stack

Secondary user need that group id to access the file to support hid
bug 7315419

Change-Id: I9d2d3d5a5114d289dc4d83c697421622db4beae6
eventd.rc
c6f8bd396614d422d80ac9f24c91fa44a713894a 08-Oct-2012 Dima Zavin <dima@android.com> Merge "rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups" into jb-mr1-dev
ece565cca2a4babe897f5fd68ab14a7af5071b30 05-Oct-2012 Dima Zavin <dima@android.com> rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups

This is necessary for some HWC hals to be able to communicate with
secure side to grant protected access to hardware owned by the
hwc. This is necessary on some architectures to grant access to
secure buffers to overlay/csc hardware

Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
971153aa4a65c4fbc8d916c619a17d3912b2cb02 04-Oct-2012 Matthew Xie <mattx@google.com> Create bluetooth stack aid for sharing gid between all bluetooth processes

bug 6925422

Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
nit.rc
d6d478058fc201bfc70f353019477e17c71a29d4 27-Sep-2012 Robert Greenwalt <rgreenwalt@google.com> Add writable data space for radio.

Storing Premium SMS regex's in /data/misc/sms.
bug:7221402

Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
nit.rc
9481266ea360e0a8f326fec1106ea445f2ef883c 25-Sep-2012 Dima Zavin <dima@android.com> init.rc: chmod slabinfo to 440 to capture slabinfo in BRs

Bug: 7232205
Change-Id: I0d785302818a37b722e79bf740644ede52c60148
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
f1c50bf63857b9cdabcf930363c372defc6383a8 21-Sep-2012 Todd Poynor <toddpoynor@google.com> init: import init.trace.rc after h/w-specific rc

Board-specific .rc file mounts debugfs, then fixup perms on tracing
sysfs files for systrace.

Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
nit.rc
5054417c1025b0f3f36f4b537e51ddd3eea981c8 09-Sep-2012 Kenny Root <kroot@google.com> Add /data/app-lib for native library sharing

Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
nit.rc
58d3980f314d08f86347ba83db85c2d4c6066599 06-Sep-2012 Jeff Sharkey <jsharkey@android.com> Keep /mnt/secure private to default namespace.

When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE
those mountpoints when vetting is finished. However, the kernel
doesn't allow MS_MOVE when the source is shared to child namespaces.

To work around this, create a tmpfs at /mnt/secure and mark it as
private (not shared). Verified that vold can now successfully move
from the staging area.

Bug: 7094858
Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
nit.rc
35ea5e4f2365ad791824ee49d1c999be81b705c5 28-Aug-2012 Mike Lockwood <lockwood@google.com> import init.${ro.hardware}.rc last to allow overriding default USB configuration

Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
nit.rc
f824ad7b35c3bf866d60662404be0d55fe753e3d 23-Aug-2012 Wink Saville <wink@google.com> am 582b1152: am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"

* commit '582b11527cd6d968f163fbee73f92d82b679e330':
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
42a1e6c9d827fc3d64ad3b0750b87de1f4c436e7 23-Aug-2012 Jeff Sharkey <jsharkey@android.com> Merge "Iteration on multi-user external storage." into jb-mr1-dev
582b11527cd6d968f163fbee73f92d82b679e330 23-Aug-2012 Wink Saville <wink@google.com> am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"

* commit 'baba99840400f5b835d44b6d91e2190136277988':
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
baba99840400f5b835d44b6d91e2190136277988 23-Aug-2012 Wink Saville <wink@google.com> Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
bfcd810b792f7ffbb2ec1360c0c2662725fd0362 22-Aug-2012 Jeff Sharkey <jsharkey@android.com> Iteration on multi-user external storage.

Define /storage as top-level concept, so that we enforce permissions
uniformly. Moves external storage paths from headers to per-device
environment variables. Added missing mount flags, and we no longer
have adb-specific external storage.

Bug: 6925012
Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
nit.rc
61f1359486e578bc0fc12bc4f42c7cd65991fc5c 20-Aug-2012 Jeff Sharkey <jsharkey@android.com> Remove sdcard groups from services.

Even with the groups, services no longer have access.

Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
nit.rc
5dd0f86fbfed631b31c9055109889f1d9559a3ea 18-Aug-2012 Jeff Sharkey <jsharkey@android.com> Migrate sdcard0 to shell-accessible location.

Also remove mount() from adb, since it can come online long before
data partition is ready. Set EXTERNAL_STORAGE environment variable
to point to owner for backwards compatibility.

Bug: 7005701
Change-Id: I63444f6636624eb7ad89f053daa289663424639e
nit.rc
2be5338a84f19b24b6515c0bfcf2f3f7b55262c1 16-Aug-2012 Jeff Sharkey <jsharkey@android.com> Merge "Multi-user external storage support." into jb-mr1-dev
edb2d634b35ec1b0268ac7d9ddab8c8fc082a14e 16-Aug-2012 Scott Anderson <saa@android.com> Merge "ueventd.rc: Add /dev/uhid for bluedroid" into jb-mr1-dev
885342a0f2c834a6b680284047c47c9d04b32565 15-Aug-2012 Jeff Sharkey <jsharkey@android.com> Multi-user external storage support.

Remount rootfs as recursively shared, so that mount changes are
propagated into child namespaces. Mount external storage for access
from adb.

Clean multi-user dependencies for use in Dalvik. Also define
external storage paths.

Bug: 6925012
Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
nit.rc
3ad289dca66ce950f417280b2c071a8dd1975598 16-Aug-2012 Scott Anderson <saa@android.com> ueventd.rc: Add /dev/uhid for bluedroid

Change-Id: Ica71265856fce1abc0a0ba9c0b1ca016510c61b7
Signed-off-by: Scott Anderson <saa@android.com>
eventd.rc
847cb4d125fa9eeb4272a0676e1dac847d4b8a96 15-Aug-2012 Keun-young Park <keunyoung@google.com> am 8f19b11a: am c4c731e7: Merge "[MIPS] Enable SD-card functionality to work"

* commit '8f19b11a42423ecd4ac8373041f64cb3001caf78':
[MIPS] Enable SD-card functionality to work
8f19b11a42423ecd4ac8373041f64cb3001caf78 15-Aug-2012 Keun-young Park <keunyoung@google.com> am c4c731e7: Merge "[MIPS] Enable SD-card functionality to work"

* commit 'c4c731e78ca1a3527093a35280381616d1cb667d':
[MIPS] Enable SD-card functionality to work
c4c731e78ca1a3527093a35280381616d1cb667d 15-Aug-2012 Keun-young Park <keunyoung@google.com> Merge "[MIPS] Enable SD-card functionality to work"
96539e8153dadeccb8b7d334cda8b2acaaa68f06 14-Aug-2012 Jean-Baptiste Queru <jbq@google.com> am ee0d281a: am c95c15b1: Merge "Char device /dev/dri/card0 was not created during startup."

* commit 'ee0d281a3e5fe611bdda23db18fa0e5684ee43ed':
Char device /dev/dri/card0 was not created during startup.
ee0d281a3e5fe611bdda23db18fa0e5684ee43ed 14-Aug-2012 Jean-Baptiste Queru <jbq@google.com> am c95c15b1: Merge "Char device /dev/dri/card0 was not created during startup."

* commit 'c95c15b1923611f48c44c18ad158e57b9d915fdf':
Char device /dev/dri/card0 was not created during startup.
c95c15b1923611f48c44c18ad158e57b9d915fdf 14-Aug-2012 Jean-Baptiste Queru <jbq@google.com> Merge "Char device /dev/dri/card0 was not created during startup."
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa 13-Aug-2012 Kenny Root <kroot@google.com> resolved conflicts for merge of 4dcd52ab to jb-mr1-dev

Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
4dcd52ab11d25fe3d53aab52b6c233e692da4eae 13-Aug-2012 Kenny Root <kroot@android.com> am 297f802f: Merge "Add support for reloading policy from /data/system."

* commit '297f802f25d093274c1f5fb890ee8dfacfbf159e':
Add support for reloading policy from /data/system.
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 01-May-2012 Stephen Smalley <sds@tycho.nsa.gov> Add support for reloading policy from /data/system.

To support runtime policy management, add support for reloading
policy from /data/system. This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.

Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
nit.rc
b35e36e5a92ac984a57ec15b14dc6ad3b0ecf1c5 03-Aug-2012 Colin Cross <ccross@android.com> init.rc: make last_kmsg readable only by user system and group log

chown /proc/last_kmsg to user system group log during init, and
chmod it to readable only by user and group.

Bug: 6925227
Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
nit.rc
35fc46d8e338181ee3caedc30f3627bad2ffe35e 01-Aug-2012 Dima Zavin <dima@android.com> am 018227f5: am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android."

* commit '018227f5394c3126f4a858596cb85dee1893b895':
Modify init.rc and init.goldfish.rc for SE Android.
018227f5394c3126f4a858596cb85dee1893b895 01-Aug-2012 Dima Zavin <dima@android.com> am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android."

* commit 'ce76e2d00e63339083ea693db33de05cbba5600e':
Modify init.rc and init.goldfish.rc for SE Android.
ce76e2d00e63339083ea693db33de05cbba5600e 01-Aug-2012 Dima Zavin <dima@android.com> Merge "Modify init.rc and init.goldfish.rc for SE Android."
0245e15bb78cf08b3225b31c77bda77d43995bd4 10-May-2012 Benoit Goby <benoit@android.com> rootdir: Create /data/misc/adb on boot

Change-Id: I0f8d11391cdcfbaa50f87f637a2962c6663b2767
nit.rc
0574d6b07711e90547d8166c222e09d80f702620 25-Apr-2012 Benoit Goby <benoit@android.com> init.rc: Add socket for adbd

Change-Id: Ic97fd464440ff4a29fc9da7ad15949ac5215ade3
nit.rc
1eee419e7a1c5789f81e1e3a19693403495e70f1 13-Jan-2012 Stephen Smalley <sds@tycho.nsa.gov> Modify init.rc and init.goldfish.rc for SE Android.

Set the security context for the init process.
Restore the security contexts of /cache and /data in case they were reset.
Specify the security context for services launched from the rootfs since
we cannot label their executables.
If on the emulator, set a policy boolean and restore the context of
/sys/qemu_trace to allow accesses not normally permitted on a device.

Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
tc/init.goldfish.rc
nit.rc
e8b76a36bacd11ab54332ba5a25d8593d9c3f57f 26-Jul-2012 Naveen Kalla <nkalla@codeaurora.org> Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO

Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
nit.rc
e6f8d45da8c61d67dc9fdc1cec53f40594043817 28-Sep-2011 Lukasz Anaczkowski <lukasz.anaczkowski@intel.com> Char device /dev/dri/card0 was not created during startup.

This device is required by libdrm for GPUs like IvyBridge.

Change-Id: I0ac47056a9cec2100f3e6eaa5591571fe6bbc145
Signed-off-by: Lukasz Anaczkowski <lukasz.anaczkowski@intel.com>
Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
eventd.rc
b3a679386d26677290a09fdf4e3406c57e835fd0 13-Jun-2012 Wink Saville <wink@google.com> Add telephony-common and mms-common to BOOTCLASSPATH - DO NOT MERGE

Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
nit.rc
4c3ac516ff391d9fc93ec997ce254f83af722a1a 08-Apr-2012 Matthew Xie <mattx@google.com> remove dbus and bluetoothd, create bluedroid data dirs

Change-Id: Ifacd570dbadc075e498a626935e035c76a0d83c4
nit.rc
5acf1d6625e3e45ccdc29fd49222defc2788ada0 13-Jul-2012 Jeff Sharkey <jsharkey@android.com> am 87314036: am 55b763ff: Grant sdcard_r to ril-daemon.

* commit '873140368613af2d1c06e18ac2fd6fe24623b9bb':
Grant sdcard_r to ril-daemon.
873140368613af2d1c06e18ac2fd6fe24623b9bb 13-Jul-2012 Jeff Sharkey <jsharkey@android.com> am 55b763ff: Grant sdcard_r to ril-daemon.

* commit '55b763ff7b779d7ee91f245e0887332db8782afe':
Grant sdcard_r to ril-daemon.
55b763ff7b779d7ee91f245e0887332db8782afe 13-Jul-2012 Jeff Sharkey <jsharkey@android.com> Grant sdcard_r to ril-daemon.

Bug: 6793799
Change-Id: Ife23c98c30d7b08479d75798c7075005bf281119
nit.rc
557ed7a487795b2b3ac441bbbbe619788c93b78f 12-Jul-2012 Wink Saville <wink@google.com> Merge commit 'de016eef' into mit

* commit 'de016eef':
Add telephony-common and mms-common to BOOTCLASSPATH
de016eef3366739d69d7908e4e6dbd54785632ab 13-Jun-2012 Wink Saville <wink@google.com> Add telephony-common and mms-common to BOOTCLASSPATH

Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
nit.rc
c06be8a15d8d89bcc8ac505b25b5e828e90a5be6 12-Jun-2012 Jamie Gennis <jgennis@google.com> am 1e96e16f: am 0f3974c3: Merge "Enable tracing on user builds" into jb-dev

* commit '1e96e16f81ce46adf5329b1db4662b53b927d4e2':
Enable tracing on user builds
0f3974c3d0ee2ffe5e0cb9a56658ba18d511f6ea 11-Jun-2012 Jamie Gennis <jgennis@google.com> Merge "Enable tracing on user builds" into jb-dev
1279013dee790c84758e5fc5bed33b5c9df2af9b 07-Jun-2012 Jamie Gennis <jgennis@google.com> Enable tracing on user builds

This change adds init.rc steps to:
* allow kernel tracing to be enabled via adb
* allow a limited set of kernel trace events to be enabled via adb
* allow the kernel trace to be read via adb
* allow all users to write to the kernel trace from userland

Bug: 6513400
Change-Id: Ic3c189b5697aa5edf88d2f507c932971bed6caff
nit.rc
nit.trace.rc
a7fbf8a673e90918d55e441dbd5a29a87615dfa9 08-Jun-2012 Bhanu Chetlapalli <bhanu@mips.com> [MIPS] Enable SD-card functionality to work

Change-Id: I711f533214b9b7bce2ff1000a55d6b8f310f2399
Signed-Off-By: Bhanu Chetlapalli <bhanu@mips.com>
ndroid.mk
6ba76f019040a0445575deb6995cd32ea72903dd 07-Jun-2012 Arve Hjønnevåg <arve@android.com> Merge "init.rc: Set owner for /sys/power/autosleep"
5f2d00b0677cbe9ad42ea0394def0a51aef7bdda 04-Jun-2012 Dima Zavin <dima@android.com> rootdir: init.rc: remove audio app/sys groups, merge to fg

With this change, the audio rr/fifo threads will just run in
the fg cgroup.

Also, the RR budget for the apps fg/bg threads has been bumped
to 80%. Ideally, the bg budget would be much smaller but there
are legacy libraries that seem to be very sensitive to this so
for now keep it at this value.

Bug: 6528015
Change-Id: I08f295e7ba195a449b96cd79d954b0529cee8636
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
df44b88621f60e933d7d31090bf0bb892e88142c 04-Jun-2012 Dima Zavin <dima@android.com> core: init.rc: create apps cgroup for fg tasks, move bg under it

Bug: 6538553
Change-Id: I7c29975aa376bcdda9d6bbd1fd3e04fdb1c1b1fe
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
4c48025c484e9fb0e10bb9c6a1b9bbd5a2def555 16-May-2012 Colin Cross <ccross@android.com> Increase cpu.rt_runtime_us to 10% for fg and bg groups

GPS on yakju puts SCHED_RR threads in the fg and bg groups, and
is unhappy with 0.1% limits. Increase the limits to 10%.

Change-Id: I971c9b0a815890d41694b965fdd2b023937a4411
nit.rc
50efaf2f7fc87692649497dba5615e54efd9c637 12-May-2012 Todd Poynor <toddpoynor@google.com> Merge "init: Set perms for interactive cpufreq governor boostpulse" into jb-dev
367e7b195b144772464e560352caa2017a53058c 10-May-2012 Colin Cross <ccross@android.com> Increase rt_runtime_us to 1000 for foreground and bg_non_interactive

rt_runtime_us=0 can cause deadlocks if a SCHED_FIFO/SCHED_RR thread
is moved into the wrong cgroup.

Change-Id: I4633392fb529039dff6ba5d3a6b672e0de9fc2d9
nit.rc
4ff10e63c3814f7b40c6e4e672c895135a1b1a3d 04-May-2012 Todd Poynor <toddpoynor@google.com> init: Set perms for interactive cpufreq governor boostpulse

Change-Id: Ia4b028f58f9d48bad2525744497f10884d11c5d6
nit.rc
70a163f519db14532b7dcde4bc65d1d658a760e4 03-May-2012 Arve Hjønnevåg <arve@android.com> init.rc: Set owner for /sys/power/autosleep

Change-Id: Ia18cce973c71e7561ca84b23e37b0b8e056a7143
nit.rc
7e057eb0047819ee4d8af52d2747a7bf29b0cc56 02-May-2012 Glenn Kasten <gkasten@google.com> Merge "Increase budget" into jb-dev
94a55df34d917492cb3613b9445ffb1659459186 02-May-2012 Jeff Tinker <jtinker@google.com> Merge "Fix failure to play pinned movies" into jb-dev
59e6eb09997125aecc122c7d7d9a6e3ec00be4c4 01-May-2012 Glenn Kasten <gkasten@google.com> Increase budget

Change-Id: I6706a408990abf8d420db73280df2818b8827140
nit.rc
65f1fbcad3247997cf0f0eca54b88f0692781109 01-May-2012 Jeff Tinker <jtinker@google.com> Fix failure to play pinned movies

DRM server process needs to be able to access movies on sdcard
to acquire rights.

related-to-bug: 6414503

Change-Id: If90404e32fd437b8fb7d5a6ec8dfb30a499ef733
nit.rc
33045a627d4dac8c4c8a910241298ca5da02f87b 28-Apr-2012 Todd Poynor <toddpoynor@google.com> init: Set perms for cpufreq interactive governor input boost sysfs

Change-Id: Ie475c95d81635a068db11e7018895024247878b4
nit.rc
25dd43a9a5073f0e59102750cb0410b8e9bc9847 27-Jan-2012 Nick Kralevich <nnk@google.com> Restrict zygote to system user.

CVE-2011-3918: Address denial of service attack against Android's
zygote process. This change enforces that only UID=system can
directly connect to zygote to spawn processes.

Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
nit.rc
8d3ea1d1e198e71ca3f856c6f397faf40922f562 25-Apr-2012 Todd Poynor <toddpoynor@google.com> init: set perms for cpufreq interactive governor boost -- DO NOT MERGE

Change-Id: I6509cda358b4a75706afd01a5b5a36eabe492554
Signed-off-by: Todd Poynor <toddpoynor@google.com>
nit.rc
f8bbaba57bf309fec83dc9842176d996831e6db1 13-Apr-2012 Kenny Root <kroot@google.com> Add directory for forward locked apps in ASECs

Forward locked apps on internal storage will be stored in ASEC
containers using ext4. This way permissions can be preserved whether on
internal or external storage.

Change-Id: I942f8f0743c210330a11e2b1d0204df7a5ddb2ae
nit.rc
b91bd9f599c43b602eac334244173000a6ce011a 20-Apr-2012 Glenn Kasten <gkasten@google.com> Update cgroups

Change-Id: If4488944e8a1c8af7b13847069d03b7ea4a30785
nit.rc
f35c203558b0648c351a5262568b383d41639a8b 19-Apr-2012 Todd Poynor <toddpoynor@google.com> init.rc: Set perms for cpufreq interactive governor above_hispeed_delay

Change-Id: Ib9c3fb4e43759af590a6e033b8ba04c0023d5f07
nit.rc
b47cd10acf6eb9449fc12a93f17f720b21e998c8 17-Apr-2012 Mike Lockwood <lockwood@google.com> Merge "init.rc: Add support for new USB accessory configurations"
5fa860dea3618d5397bb580645f057a6e975786e 13-Apr-2012 Robert Greenwalt <rgreenwalt@google.com> Merge "Add MDNS service"
6a35bb3529520dd1a47a5d0f58abf91d38eb0222 12-Apr-2012 Todd Poynor <toddpoynor@google.com> Merge "init.rc: Set owner and permissions for cpufreq files"
0653b97b2594d5e3f21c6326fb121741bfbf65f7 11-Apr-2012 Todd Poynor <toddpoynor@google.com> init.rc: Set owner and permissions for cpufreq files

Change-Id: Iaaf8491915567dbe22cab1798081a00fed4fb2e2
nit.rc
4f5d5176a3d732baebe92ab3748a12166406a198 04-Apr-2012 Mike Lockwood <lockwood@google.com> init.rc: Add support for new USB accessory configurations

Also moved USB scripts to new file init.usb.rc

Change-Id: I98e099fbd8de3eb3e1e18c9ef69312608033a50c
Signed-off-by: Mike Lockwood <lockwood@google.com>
ndroid.mk
nit.rc
nit.usb.rc
db49739f390992a3d68303765ac36f14ed09b68a 10-Apr-2012 Jamie Gennis <jgennis@google.com> Add tracing initialization to init.rc.

This change adds init.rc steps to allow kernel tracing to support inserting
messages from any userland process.

Change-Id: I01970728d7132a25408fed09a213a015ac05ccaf
nit.rc
1d91fcf7c0a31d27097b196579a37873ba1c0934 28-Mar-2012 Robert Greenwalt <rgreenwalt@google.com> Add MDNS service

Adds both the new service and another socket for netd.

Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
nit.rc
c8583c680a62dcd8f66952a71cd986f477aa1241 29-Mar-2012 Nick Kralevich <nnk@google.com> Merge "change files in /dev/log/ to 666"
3439cc6145d24d2495490dab3e48d91cf36bccc3 29-Mar-2012 Nick Kralevich <nnk@google.com> change files in /dev/log/ to 666

With newer Android kernels, anyone can read from the files in
/dev/log. If you're in the logs group (have the READ_LOGS) permission,
you'll see all entries. If you're not in that group, you'll see
log messages associated with your UID.

Relax the permissions on the files in /dev/log/ to allow an application
to read it's own log messages.

Bug: 5748848
Change-Id: Ie740284e96a69567dc73d738117316f938491777
eventd.rc
71513567dc0249af1b304e458ceac391ffcbeff5 27-Mar-2012 Marius Renn <renn@google.com> Multi-Project Commit: Move of filterfw out of system/media (6 of 7)

This is part of the multi-project commit to move the filter-framework
from system/media/mca to frameworks/base/media/mca.

Note that the filter-framework will soon be replaced with a refactored
version currently under API review (also to go under frameworks/base).
This move is done now to unblock the PDK efforts.

Change-Id: I87d034a30bb4b98a85a028cb728e37fb97256039
nit.rc
31fb85865431f98008608b62964cb1c975ca4b71 26-Mar-2012 Nick Kralevich <nnk@google.com> Merge "drmserver: add group drm"
62e5cbaebc29d83148dd1ce30a620a37dcdbe7ed 26-Mar-2012 Benoit Goby <benoit@android.com> Merge "Revert "Reimplement the "adb root" command to more closely match its previous behavior""
3c9eed88c529374c8d80e1daa62ad9bf25c9670e 26-Mar-2012 Nick Kralevich <nnk@google.com> drmserver: add group drm

Make the drm server run as UID=drm, GID=drm. This ensures that
any files created by the drmserver app do not have GID=system.

Bug: 5834297
Change-Id: I3409ad350e9cc82bb0982cdbe470ec1f10b1ca67
nit.rc
2affe824ba249b532c5b39941bcdc15800900f6c 22-Mar-2012 Kenny Root <kroot@google.com> Merge "Put keystore into the drmrpc group"
9865be95cf60848d91364b42c2cadd90e63fec66 22-Mar-2012 Mike Lockwood <lockwood@google.com> Merge commit '19155b5'

Do not start sshd by default

Change-Id: I22e6dbb6834321709e9b7c5ae49846d7f9f7c67a
a9bb7261b4db2372ee0f339d250079c967262758 22-Mar-2012 Mike Lockwood <lockwood@google.com> Merge commit '9dd2eef'

sshd to init.rc

Change-Id: I8eedc3b47f1260502034067d9006cac827cb1089
19155b5cd3ee8674a13f7bf111e06b05f0114433 21-Mar-2012 Mike Lockwood <lockwood@google.com> init.rc: Do not start sshd by default

Change-Id: Ieacd4e8fbfcd91ed2342b7a104a9b1f4114fc6d5
Signed-off-by: Mike Lockwood <lockwood@google.com>
nit.rc
1670f831a56f7232f337407c746e97c5929ee417 21-Mar-2012 Arve Hjønnevåg <arve@android.com> init.rc: Fix permissions on /sys/power/state and /sys/power/wakeup_count

Change-Id: I06a1a2affebdf64f008eaa61a0851f1e832059c5
nit.rc
7941cf87f624e7747b5bb868a27904c7a3be0ca4 16-Mar-2012 Benoit Goby <benoit@android.com> Revert "Reimplement the "adb root" command to more closely match its previous behavior"

This reverts commit 535164e9d9649a83d4d63829f3389f2bea339fe1.
nit.rc
f3ef1271f225d9f00bb4ebb0573eb3e03829f9a8 14-Mar-2012 Nick Kralevich <nnk@google.com> init.rc: Add documentation

Android developers should never place files in /data/local/tmp.
Files or directories in /data/local/tmp can be minipulated by the
shell user.

Android developers should never create world-writable files
or directories. This is a common source of security vulnerabilities.

Change-Id: I6d2cd620ab49d8ca3f39282f7d2ed682a9ba91c3
nit.rc
ad5b9c7205ac2a9ac500c6d455bf46f8ab3aafe0 24-Feb-2012 Kenny Root <kroot@google.com> Put keystore into the drmrpc group

The keystore service needs to access hardware crypto devices to
fulfill its function on devices with hardware crypto. This role
was assigned to the (now misnamed) drmrpc group.

Change-Id: Ia32f9e96b4372f0974984451680f9a0f6157aa01
nit.rc
89c5926f08fdf551c33ccbfbec5d6bb7d911f067 08-Mar-2012 Chia-chi Yeh <chiachi@android.com> am 0b32a75b: am c8d1a0e1: am 5ebced39: init.rc: update the permission of /data/local.

* commit '0b32a75b7c7f25bd9ab325f44626c402fd9b9b23':
init.rc: update the permission of /data/local.
c8d1a0e18e008009fe75aa2cc7d3deace0479fce 08-Mar-2012 Chia-chi Yeh <chiachi@android.com> am 5ebced39: init.rc: update the permission of /data/local.

* commit '5ebced39093d1223566166b8cc6abfe6729c487d':
init.rc: update the permission of /data/local.
5383476727659544875b90d49a5371886a31c1fe 08-Mar-2012 Chia-chi Yeh <chiachi@android.com> am 5ebced39: init.rc: update the permission of /data/local.

* commit '5ebced39093d1223566166b8cc6abfe6729c487d':
init.rc: update the permission of /data/local.
5ebced39093d1223566166b8cc6abfe6729c487d 07-Mar-2012 Chia-chi Yeh <chiachi@android.com> init.rc: update the permission of /data/local.

Bug: 6131945
Change-Id: I3094a471dcfb02b786f47b6778c8fed3726325ec
nit.rc
e7fd911fd42b1f8bea6a004e2bcc1d2dda4ec718 27-Jan-2012 Nick Kralevich <nnk@google.com> Restrict zygote to system user.

CVE-2011-3918: Address denial of service attack against Android's
zygote process. This change enforces that only UID=system can
directly connect to zygote to spawn processes.

Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
nit.rc
dae26c6ac44e9c47cc60fcaa3d04c54d68d66760 12-Jan-2012 James Dong <jdong@google.com> am 3e9c9ac5: am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1

* commit '3e9c9ac5ee7a36653b90cb86eb6445496b536c16':
Close a security hole - do not give world readable/writable access to /data/drm
d95c6152197cf3976797267ad40e61b7344933de 12-Jan-2012 James Dong <jdong@google.com> am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1

* commit '032afc1d52289f486538c9ed53f17b9889ea94df':
Close a security hole - do not give world readable/writable access to /data/drm
3e9c9ac5ee7a36653b90cb86eb6445496b536c16 12-Jan-2012 James Dong <jdong@google.com> am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1

* commit '032afc1d52289f486538c9ed53f17b9889ea94df':
Close a security hole - do not give world readable/writable access to /data/drm
f90b0e04a61ab3bf5239afb2f7157aabe5fbca8f 10-Jan-2012 Dima Zavin <dima@android.com> rootdir: convert all usages of $prop to ${prop}

Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
3e7b7739e3d4d7aaaa363645501036dafcc30ed3 16-Dec-2011 Dima Zavin <dima@android.com> init: import the hardware specific init file in init.rc

This removes the hardcoding of the file import in init and instead
allows the init.rc file to fully control what is loaded.

Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
683a09352a0adf8924d67c9aa80bce244592aa25 10-Jan-2012 Dima Zavin <dima@android.com> rootdir: convert all usages of $prop to ${prop}

Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
09cdc0ea12598651d1c074974c9b593fd1c0e4ba 07-Jan-2012 James Dong <jdong@google.com> Close a security hole - do not give world readable/writable access to /data/drm

o related-to-bug: 5834297

Change-Id: I8e459610b4f69999be37364c2359b2bac82d4a2a
nit.rc
7634bf87cf6490e5544f040fb403eb164cf0ee5f 16-Dec-2011 Dima Zavin <dima@android.com> init: import the hardware specific init file in init.rc

This removes the hardcoding of the file import in init and instead
allows the init.rc file to fully control what is loaded.

Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
9dd2eef07bbee6ff5b1d1a9ccda6e3499391ecb6 12-Dec-2011 Mike Lockwood <lockwood@google.com> add sshd to init.rc

Change-Id: Ide6e8cca58f090e84d85d0298058c523863d1c43
Signed-off-by: Mike Lockwood <lockwood@google.com>
nit.rc
27cca21a5d0a6beff31d2f9ff1441afc1271a346 05-Dec-2011 Nick Kralevich <nnk@google.com> set mmap_min_addr to 32768

Bug: 5712789
Change-Id: I586a99cd63d8fba06bc2562b1cfce531ee4f554c
nit.rc
f9557fba347bcb837892458fabd7454e1a1a4d6a 08-Nov-2011 Nick Kralevich <nnk@google.com> Set /proc/sys/kernel/dmesg_restrict to 1

Set dmesg_restrict to 1 to help limit inadvertent information leaks
from the kernel to non-privileged programs. Root and programs with
CAP_SYSLOG will continue to have access to dmesg output.

See "dmesg_restrict" in Documentation/sysctl/kernel.txt from the
Linux kernel source code.

Bug: 5585365
Change-Id: Iffcf060ea4bd446ab9acf62b8b61d315d4ec4633
nit.rc
1e339a710e0993c18c8b96f9224ebd3aa29cf8cd 08-Nov-2011 Nick Kralevich <nnk@google.com> Merge "Set kptr_restrict to 2."
3c58933aa785ab26f77284f6a1a4e93d2ebfcf04 07-Nov-2011 Dima Zavin <dima@android.com> am 4a253908: rootdir: init.rc: write default oom_adj before starting ueventd

* commit '4a2539085062a715b0d345eb50ea48738423c909':
rootdir: init.rc: write default oom_adj before starting ueventd
4a2539085062a715b0d345eb50ea48738423c909 04-Nov-2011 Dima Zavin <dima@android.com> rootdir: init.rc: write default oom_adj before starting ueventd

Otherwise, ueventd's oom_adj value would have been 0 and it could
easily get killed early during low memory events

Change-Id: I1adbd18c37215b26ae77e70f7b8dbd1e143fc2d4
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
2e7c833279349a694af15f2447cc214dc30bcc01 02-Nov-2011 Nick Kralevich <nnk@google.com> Set kptr_restrict to 2.

To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict
to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms

Bug: 5555668
Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b
nit.rc
04a875902ece07769101a5202e3af554af31a911 31-Oct-2011 Mathias Agopian <mathias@google.com> restart surfaceflinger and drmserver when servicemanager dies

Bug: 5450389

Change-Id: Ib4e73836721e25e2a88185167b030ea75e0d74e3
nit.rc
8cdd4c335f0d6e35e6def5ea73dcefb9687071b0 18-Oct-2011 sinikang <sinikang@samsung.com> am aa75df74: [maguro] : add setprop net.tcp.buffersize.hspa

* commit 'aa75df74db5beffd25821ed6c360c36197d7bac1':
[maguro] : add setprop net.tcp.buffersize.hspa
aa75df74db5beffd25821ed6c360c36197d7bac1 16-Oct-2011 sinikang <sinikang@samsung.com> [maguro] : add setprop net.tcp.buffersize.hspa

-window size optimized for hspa
-Patchset2 : space removed

Change-Id: Ia4d1043d1a93c929721a4d7cca60ce9ff8bbf67a
Signed-off-by: sinikang <sinikang@samsung.com>
nit.rc
d707fb3fb6448be04d6e14f7e478df7e298ebf35 06-Oct-2011 Nick Kralevich <nnk@google.com> enable heap randomization.

Bug: 5250555

Change-Id: I7acb0645402611875c481aec33ece85fced7a336
nit.rc
4e803c3c18ad6a0cebbb16e2cf623a174f5201e1 10-Oct-2011 Wink Saville <wink@google.com> Merge "Add log group to rild to improve log collection on modem issue"
f791e17bc94e1308245bf8bf16d1d98e7fd9dcda 08-Oct-2011 Jeffrey Tinker <jtinker@google.com> Merge "Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls"
65c4df51f895b79fc599d3bfa796ddfc660d47e4 07-Oct-2011 Jeffrey Tinker <jtinker@google.com> Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls

Bug 4598045 Implementing secure video path on TI OMAP4 chip for ICS

Change-Id: Iacfe3e79f067172085b96bb4cd4484101aa5be1e
nit.rc
e65e946382033a94f99f0f05678bb1e6329e3182 29-Sep-2011 Kazuhiro Ondo <kazuhiro.ondo@motorola.com> Add log group to rild to improve log collection on modem issue

Add log group to ril-daemon service. rild is the best place to
know the issue on the modem in many time. It would be helpful
if rild alone can capture the snapshot of logcat buffers at
the moment of problem.

Change-Id: Ie0dcda126fb748a00e650427de35541672359287
nit.rc
a503456526359767ffb383a06835308f62172dde 16-Sep-2011 David 'Digit' Turner <digit@google.com> emulator: Move qemu-props to core service

The qemu-props program is launched at boot to read a series of
system property assignments from the emulator and apply them.

This is necessary to deal with the dynamic nature of the emulated
platform (e.g. the screen density which depends on the skin and
cannot be hard-coded in the platform image).

This patch ensures that qemu-props is started before any other
service that may read one of these properties (e.g. surface flinger).
This is done by encapsulating the program into a 'core' service.
Core services are all stared before regular ones.

Before the patch, qemu-props was started manually inside a script
that is called from a late emulator-specific boot service
(goldfish-setup).

The problem was that sometimes qemu-props was run too late.
This resulted in random flakiness, especially when running
on a low-end host machine.

Fix for bug 2161189 (and probably a few others)

Change-Id: I2933a25dcb5fecbb1fc238f157264e621b8f295b
tc/init.goldfish.rc
tc/init.goldfish.sh
8e3ff70444ac919d0b70eaa1fbe97a3ef5bdb9ef 12-Sep-2011 JP Abgrall <jpa@google.com> init.rc: allow all users to open the qtaguid misc dev

The netfilter xt_qtaguid module uses a misc dev so that processes
that use the module can be tracked.
Every process that does socket tagging must open that dev.

Change-Id: I6af3e0f0180637b14455dd9607724523f142c402
nit.rc
1ac40f4ef18799e252115d9c9ad17396ffb68f3d 08-Sep-2011 Robert Greenwalt <rgreenwalt@google.com> Increase the window sizes on wifi and lte.

Set to 524288,1048576,2097152, 262144,524288,1048576.

bug:5226360
Change-Id: Id9d4257c51a355d78246b4ca59ab462fbe5b72be
nit.rc
ca47cef7491caf6072984d9d64c768717baad09a 25-Aug-2011 Dima Zavin <dima@android.com> init: add charge mode handling

Introduces a 'charger' section that is processed when androidboot.mode
supplied on the kernel commandline is "charger".

In this mode, sections such as fs, post-fs, etc are skipped. Only the
'early-init' and 'init' sections of the init rc files are processed before
processing the 'charger' section.

Change-Id: If9eb6334de18f04cbcf2aab784578e2993615242
Signed-off-by: Dima Zavin <dima@android.com>
nit.rc
85e37b0a81f2f24f223c8917db69221779f0d2b0 18-Aug-2011 JP Abgrall <jpa@google.com> init: allow mediaserver to tag socket (group net_bw_acct)

The mediaserver needs to do communication on behalf of other apps
(browser, ...).
It needs to be able to tag sockets. The kernel will check for net_bw_acct
group membership.

Change-Id: I7fb063fdb7d9435d7f979df6622ff17f34049cbc
nit.rc
d09196d00cb5bf3bffb22d3aae45c8797f1ddf4c 08-Aug-2011 Dianne Hackborn <hackbod@google.com> Merge "Activity Manager now takes care of setting OOM values."
a24687197d69ac677d176dbc41d5cfd65d1afc44 08-Aug-2011 Chia-chi Yeh <chiachi@android.com> init.rc: add inet permission to VPN daemons explicitly.

Racoon still needs it after dropping root privilege, or pure IPSec VPN
will fail. Mtpd works without it because net_raw implies inet. However
it would be better to set all of them clearly without the assumption.

Change-Id: I50762af2c25ec9cc559e528c7b14f469494fd553
nit.rc
06787f4089093fed8a01ec3a3d2092e10919b77e 08-Aug-2011 Dianne Hackborn <hackbod@google.com> Activity Manager now takes care of setting OOM values.

All init needs to do is make these files writeable so that the
activity manager can set them.

Change-Id: Ieea43208fadc01504d813be379aecbafcadf0d34
nit.lowmem.rc
nit.rc
7804cbf4833cba82bd38f6adaf567bcb8262c3ad 29-Jul-2011 Mike Lockwood <lockwood@android.com> Move some common USB configuration logic to init.rc

Change-Id: Ib75ccfd9c4aa8aace936370c33f33a922ca3c51f
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
3507616870acd71bbd26e045528b0cfe716d37cd 24-Jul-2011 Eric Laurent <elaurent@google.com> Fix issue 4604090: notification sound interrupted.

Removed system from mediaserver groups. Not needed anymore
now that AudioFlinger acquires wake locks via PowerManagerService.

Change-Id: I177b968a0a30557d871188bf3991b96d9b391d3c
nit.rc
4a2b0fcd6e166499fe51e920aca5f9640dd05939 15-Jul-2011 Conley Owens <cco3@android.com> am aa4a66a1: am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache."

* commit 'aa4a66a16dd9b97fb876bb296366442b8745a10b':
Create world readable, system writeable /data/resource-cache.
aa4a66a16dd9b97fb876bb296366442b8745a10b 15-Jul-2011 Conley Owens <cco3@android.com> am 1e5e2d76: am af6e3266: am d0b93f43: Merge "Create world readable, system writeable /data/resource-cache."

* commit '1e5e2d7673a9ea915283f6626fa692cc169b0e67':
Create world readable, system writeable /data/resource-cache.
56286d6fdb07d8b1310c27eeb59bdf05500f166e 11-Jul-2011 Chia-chi Yeh <chiachi@android.com> Merge "init: update permissions for VPN."
9bb4d411e01c8e6330b5c27c489485592360576b 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: update permissions for VPN.

VPN no longer uses system properties to keep network parameters.
Besides, profiles are now stored and encrypted by keystore.

Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
nit.rc
50d9819ef49c2d557ad0b33a7880a7a3b72e3fb8 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> Merge "init: clean up init.rc as now mkdir handles EEXIST."
ea7441415997faf34f7ae44f462f916f5f7ea0df 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: clean up init.rc as now mkdir handles EEXIST.

Change-Id: I3fa2a618ef27197315fc128738a284ac644e86c0
nit.rc
f48fd5d403d77c4586ad0e715affd601a0934334 07-Jul-2011 Eric Laurent <elaurent@google.com> Temporary workaround for issue 4604090

There was a regression caused by a change in Honeycomb that removed
mediaserver process from system group to improve security: This prevents
the audio HAL (which runs in mediaserver process) from taking wake locks
while audio is playing thus causing the pcm stream to get unexpectedly
suspended.

This temporary workaround is just to allow ICS dogfood in better conditions until
a real fix taking into account the security issue is implemented.

Change-Id: Ic19a23da4b4383559188b6f5c3a82604c3d95d74
nit.rc
e89675584df1f02dd4642585493a19ac3e691bc5 07-Jul-2011 Mike Lockwood <lockwood@android.com> Merge "init.rc: Allow system process to configure RNDIS USB ethernet address"
64416c816cbe1161a09d6e6a65732399fac4e3ca 06-Jul-2011 Mathias Agopian <mathias@google.com> Merge "don't restart surfaceflinger when the window manager dies"
9350a00ce65a6425ba4566fe943c954373240f6c 06-Jul-2011 Mike Lockwood <lockwood@android.com> init.rc: Allow system process to configure RNDIS USB ethernet address

Change-Id: Id339d8359e592dbc1279e423d9a5adc3a775949d
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
b4daef45310891d550ea9cfb89ab4bf5b3e15ef5 02-Jul-2011 Mathias Agopian <mathias@google.com> don't restart surfaceflinger when the window manager dies

Change-Id: Ia3c60e6c5471e2b72d53c936de44b730c68095e0
nit.rc
856f63c0df9cd4e8783ca65140fe386e3a98a274 01-Jul-2011 Brian Carlstrom <bdc@google.com> Merge "Revert "Add keychain user""
1c9a996c50e096eb9f54dc806aae6d82fa3cc2e8 20-Jun-2011 Eino-Ville Talvala <etalvala@google.com> Add mobile filter framework library into the bootclasspath.

Change-Id: Ia9ae45de5d58ba5e98821fd04add96c6062c1a18
nit.rc
04918930236981a6d2a096a73854caa96cb94bda 01-Jul-2011 Brian Carlstrom <bdc@google.com> Revert "Add keychain user"

This reverts commit 6541ef1562ccf93e498d653598330a7fc80ad2b2.

Bug:4970237
Change-Id: I23a90eb89c1d19893d2ba7065fc624c0521cb06e
nit.rc
9d94942bcd6347d6ee8524b23bc94b95ba32d8e0 27-Jun-2011 vidya rao <vidya.rao@motorola.com> am 6a18a077: am 04cf629b: Move RILD to class main

* commit '6a18a07774123c409cefd9a92f1c4c6504f4edfd':
Move RILD to class main
6a18a07774123c409cefd9a92f1c4c6504f4edfd 25-Jun-2011 vidya rao <vidya.rao@motorola.com> am 04cf629b: Move RILD to class main

* commit '04cf629be5e99a3a920aecc0b059444bd07e9d84':
Move RILD to class main
04cf629be5e99a3a920aecc0b059444bd07e9d84 24-Jun-2011 vidya rao <vidya.rao@motorola.com> Move RILD to class main

-- This is needed so the modems (LTE & CDMA) are powered on and running
before unlocking encrypted devices

Change-Id: I842f5286499fd76abc554ded550fb837d12b324e
nit.rc
535164e9d9649a83d4d63829f3389f2bea339fe1 22-Jun-2011 Mike Lockwood <lockwood@android.com> Reimplement the "adb root" command to more closely match its previous behavior

The adb gadget driver used to reset the USB bus when the adbd daemon exited,
and the host side adb relied on this behavior to force it to reconnect
with the new adbd instance after init relaunches it. The new gadget
drivers no longer automatically reset the USB bus when adbd is restarted
which caused adb to hang since it was no longer forced to reconnect with the
device. We attempted to work around this on the host side adb, but that
work around has not been reliable.

This change adds a property trigger on the service.adb.root system property
which will reset the USB bus and restart the adbd daemon when adbd sets
the property to 1. This should be much closer to the previous behavior
and will hopefully fix some problems with automated testing.

Change-Id: I177c37400009a3d83f21a5f9431f94fd1cc19b9b
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
352dfdfaea55601f2c36fe7286a158e84028bcf3 09-Jun-2011 Mike Lockwood <lockwood@android.com> init.rc: Changes for new USB gadget drivers

Change-Id: I68fcf167c9fc71bb5f44793648a35d3181fd36d7
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
b45280d259c5036dd066782d725c55284c7dae90 30-May-2011 MÃ¥rten Kongstad <marten.kongstad@sonyericsson.com> Create world readable, system writeable /data/resource-cache.

/data/resource-cache is used to store idmap files.

Change-Id: I9b1dbc8d607333b71c05f55a4a402ae92193c36c
nit.rc
2b8f76cdbb254ac1170087a40dbf30b7627f3516 05-May-2011 jeffhao <jeffhao@google.com> Tracking merge of dalvik-dev to master

Reordered bootclasspath to allow verification of all framework methods.
git cherry-pick --no-commit ec164a0170955fe63106c2576a65bc4ffb1df425

Address CVE-2011-1090.
git cherry-pick --no-commit 3365288d3c00072689cd9d733e055561cadc87b5

Change-Id: I6a89bc600ced06a0cb84ae1670cb7a6ea39de9c8
nit.rc
70080d97cfcb3fe273207b1c739df587f5f93767 17-May-2011 Brian Carlstrom <bdc@google.com> Merge "Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6)"
a31a3511825375177d26ab27067352c2c8f42038 05-May-2011 Brian Carlstrom <bdc@google.com> Make CertInstaller installed CA certs trusted by applications via default TrustManager (6 of 6)

frameworks/base

Adding IKeyChainService APIs for CertInstaller and Settings use
keystore/java/android/security/IKeyChainService.aidl

libcore

Improve exceptions to include more information
luni/src/main/java/javax/security/auth/x500/X500Principal.java

Move guts of RootKeyStoreSpi to TrustedCertificateStore, leaving only KeyStoreSpi methods.
Added support for adding user CAs in a separate directory for system.
Added support for removing system CAs by placing a copy in a sytem directory
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/RootKeyStoreSpi.java
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStore.java

Formerly static methods on RootKeyStoreSpi are now instance methods on TrustedCertificateStore
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java

Added test for NativeCrypto.X509_NAME_hash_old and X509_NAME_hash
to make sure the implementing algorithms doe not change since
TrustedCertificateStore depend on X509_NAME_hash_old (OpenSSL
changed the algorithm from MD5 to SHA1 when moving from 0.9.8 to
1.0.0)

luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java

Extensive test of new TrustedCertificateStore behavior
luni/src/test/java/org/apache/harmony/xnet/provider/jsse/TrustedCertificateStoreTest.java

TestKeyStore improvements
- Refactored TestKeyStore to provide simpler createCA method (and
internal createCertificate)
- Cleaned up to remove use of BouncyCastle specific X509Principal
in the TestKeyStore API when the public X500Principal would do.
- Cleaned up TestKeyStore support methods to not throw Exception
to remove need for static blocks for catch clauses in tests.

support/src/test/java/libcore/java/security/TestKeyStore.java
luni/src/test/java/libcore/java/security/KeyStoreTest.java
luni/src/test/java/org/apache/harmony/xnet/provider/jsse/NativeCryptoTest.java

Added private PKIXParameters contructor for use by
IndexedPKIXParameters to avoid wart of having to lookup and pass
a TrustAnchor to satisfy the super-class sanity check.

luni/src/main/java/org/apache/harmony/xnet/provider/jsse/TrustManagerImpl.java
luni/src/main/java/org/apache/harmony/xnet/provider/jsse/IndexedPKIXParameters.java
luni/src/main/java/java/security/cert/PKIXParameters.java

packages/apps/CertInstaller

Change CertInstaller to call IKeyChainService.installCertificate
for CA certs to pass them to the KeyChainServiceTest which will
make them available to all apps through the
TrustedCertificateStore. Change PKCS12 extraction to use AsyncTask.

src/com/android/certinstaller/CertInstaller.java

Added installCaCertsToKeyChain and hasCaCerts accessor for use by
CertInstaller. Use hasUserCertificate() internally. Cleanup coding
style.

src/com/android/certinstaller/CredentialHelper.java

packages/apps/KeyChain

Added MANAGE_ACCOUNTS so that IKeyChainService.reset
implementation can remove KeyChain accounts.

AndroidManifest.xml

Implement new IKeyChainService methods:
- Added IKeyChainService.installCaCertificate to install certs
provided by CertInstaller using the TrustedCertificateStore.
- Added IKeyChainService.reset to allow Settings to remove the
KeyChain accounts so that any app granted access to keystore
credentials are revoked when the keystore is reset.

src/com/android/keychain/KeyChainService.java

packages/apps/Settings

Changed com.android.credentials.RESET credential reset action to
also call IKeyChainService.reset to remove any installed user CAs
and remove KeyChain accounts to have AccountManager revoke
credential granted to private keys removed during the RESET.

src/com/android/settings/CredentialStorage.java

Added toast text value for failure case

res/values/strings.xml

system/core

Have init create world readable /data/misc/keychain to allow apps
to access user added CA certificates installed by the CertInstaller.

rootdir/init.rc

Change-Id: I768ca8e8e990ff333ce0f7069a0935173498c5ed
nit.rc
69f43c90cbf7e1a0952f7001796b45f22d48c3dc 12-May-2011 Chia-chi Yeh <chiachi@android.com> Update the device permission of /dev/tun.

Change-Id: Ie8ad60047fc7160997100bd28a0abb439406806a
eventd.rc
7db617efc079ccc1f384ef7939f7e8c444dfff7a 29-Apr-2011 David 'Digit' Turner <digit@google.com> resolved conflicts for merge of b013bfc1 to honeycomb-plus-aosp

Change-Id: I159dd58c403bc38f9637163d8cd5e6270e4f201c
b013bfc17110787f4a735552f7e0c03261a3f2b5 28-Apr-2011 David 'Digit' Turner <digit@android.com> am 52a64057: Merge "ueventd.rc: Move /dev/qemu_trace to ueventd.goldfish.rc"

* commit '52a64057b60b0ad242e95fdc285ec60e0191d5b5':
ueventd.rc: Move /dev/qemu_trace to ueventd.goldfish.rc
f431d0499b3521caa38673b1fcd8c36a1072c9e6 26-Apr-2011 David 'Digit' Turner <digit@android.com> ueventd.rc: Move /dev/qemu_trace to ueventd.goldfish.rc

+ Add /dev/qemu_pipe line for QEMU pipes.

Change-Id: If3c5c675bfc1585a1d6ffcd1042aaedbc2e94763
tc/ueventd.goldfish.rc
eventd.rc
f642c3d12f4cffdc349b9ebfc4107de254ad8db9 17-Mar-2011 Jeffrey Tinker <jtinker@google.com> Make drmserver's primary group be system, so setgid is not required in ueventd.stingray.rc

Change-Id: Ie8a287620d22b5c1bdc459fb288b7403589ab474
nit.rc
cfce2826780dc1c4811619b89ba8d358e3f30f11 14-Mar-2011 Glenn Kasten <gkasten@google.com> Bug 4089635 mediaserver fewer supplementary groups

Change-Id: I90111567564397ca08e87dcfcbdf23337bf79ae6
nit.rc
b7b770dd76d664b1e44adb2f98b8caf594f6d3c8 11-Mar-2011 Glenn Kasten <gkasten@google.com> Bug 4086255 drmserver process needs system group

Change-Id: If9a325b9e716abe00f3ad6f20b012861308abd2d
nit.rc
5db0897c6530502e1343a75b258868122030e4a5 11-Mar-2011 Ken Sumrall <ksumrall@android.com> Merge "Load the persistent properties after decrypting the /data partition" into honeycomb-mr1
c5c51033c86353d1a448c72e0e9388906eed7114 09-Mar-2011 Ken Sumrall <ksumrall@android.com> Load the persistent properties after decrypting the /data partition

Fix for bug 3415286. The persistent properties are normally read early
in the boot process after /data is mounted. However, for an encrypted
system, at that point /data is a tmpfs ramdisk. This change adds a new
command to init (load_persist_props) to read the persistent properties,
and adds an action to init.rc to load the persistent properties. This
action is triggered by setting a property in vold, but that's in a
different CL.

Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
nit.rc
a40481b2cc604b8b278d509f120cf496c4c318f2 04-Mar-2011 Mathias Agopian <mathias@google.com> Run surfaceflinger in its own process. [DO NOT MERGE]

This is to allow OpenGL ES rendering from the system process,
and help with debugging.

Bug: 4086003
Change-Id: I732e95f4fcaa358f430cc195d8e63a69263bffdc
nit.rc
f0900adeb2b260068e7dae5509b821c8f5aa45eb 03-Mar-2011 David Turner <digit@android.com> am 663268ca: am fe111c83: am e6b638be: Merge "x86: Add vold.fstab to mount the SD card"

* commit '663268caac636e32b19173743594899e52df0830':
x86: Add vold.fstab to mount the SD card
663268caac636e32b19173743594899e52df0830 02-Mar-2011 David Turner <digit@android.com> am fe111c83: am e6b638be: Merge "x86: Add vold.fstab to mount the SD card"

* commit 'fe111c83708dd3c8746b3a05d4b2f53c7a9f4477':
x86: Add vold.fstab to mount the SD card
fe111c83708dd3c8746b3a05d4b2f53c7a9f4477 02-Mar-2011 David Turner <digit@android.com> am e6b638be: Merge "x86: Add vold.fstab to mount the SD card"

* commit 'e6b638be199a5f16f3eaff69710d92ea248d60a3':
x86: Add vold.fstab to mount the SD card
0c8b18b96038c1634735cdae2bd5f8cf25c7dbef 28-Feb-2011 Mike Lockwood <lockwood@android.com> am 126d4bc1: Give system server permission to enable and disable USB functions DO NOT MERGE

* commit '126d4bc18c93f06016998cf6d014c6055c2d3a40':
Give system server permission to enable and disable USB functions DO NOT MERGE
5ebe6fe6779fcbd4961de22301a5ec5d83f5cdea 28-Feb-2011 Mike Lockwood <lockwood@android.com> am 642075b6: Set USB group for /dev/usb_accessory DO NOT MERGE

* commit '642075b6f74faeca53d9449ec9b74d7c66fe7cdd':
Set USB group for /dev/usb_accessory DO NOT MERGE
126d4bc18c93f06016998cf6d014c6055c2d3a40 02-Feb-2011 Mike Lockwood <lockwood@android.com> Give system server permission to enable and disable USB functions DO NOT MERGE

Change-Id: Ie43b6679838436ac004d0b5fa59d3d98cb5b0c76
Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
642075b6f74faeca53d9449ec9b74d7c66fe7cdd 30-Jan-2011 Mike Lockwood <lockwood@android.com> Set USB group for /dev/usb_accessory DO NOT MERGE

Change-Id: I41264272ff6ce245cb2b8989ddee4a82059444a0
Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
012cf8f2de3cf48645e05209123d11bdb0ed8de7 22-Feb-2011 Ken Sumrall <ksumrall@android.com> Merge "Fix for bug 3379244, non-eMMC devices don't start all services."
dd4d786cbf993a024fcd0f926fd40b90c8a08d51 18-Feb-2011 Ken Sumrall <ksumrall@android.com> Fix for bug 3379244, non-eMMC devices don't start all services.

Fix for non-eMMC based devices to properly start the "on nonencrypted"
action.

Change-Id: I5d2966db352b02f1a1724fb105e1cefc46037e42
tc/init.goldfish.rc
0db0921b59cd02186b5aa588d69213cc9d5d3e1d 14-Feb-2011 Jun Nakajima <jnakajim@gmail.com> x86: Add vold.fstab to mount the SD card

Change-Id: Ie1f70a22dd4e27e8ea956d5e627877d1e2379b95
Signed-off-by: Jun Nakajima <jun.nakajima@intel.com>
ndroid.mk
ddc4cfd8b2dd556b30898c6d7b02883b57ce96b0 02-Feb-2011 Mike Lockwood <lockwood@android.com> ueventd.rc: Give system process permission to enable and disable USB functions

Change-Id: I4af1f3fed857df2be96a640f65cd612577c957c7
Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
45e96d0e49a02c710520d9a023b699a578352c5b 30-Jan-2011 Mike Lockwood <lockwood@android.com> Set USB group for /dev/usb_accessory

Change-Id: I17db8d9bb1bf6336979e9b7bce62306d0d7a79d2
Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
9ac8484e0b677802474e2fd73edb9cbac02d98a6 08-Feb-2011 Ying Wang <wangying@google.com> Merge "Reorder BOOTCLASSPATH to match change 7eff81df2a"
04e5232ac2b3fc87596c6d82c07c667e52e2d7c2 08-Feb-2011 Ying Wang <wangying@google.com> Reorder BOOTCLASSPATH to match change 7eff81df2a

Bug: 3385161
Change-Id: I8bb91753c02c031c32ab0070dd424a6ac859311a
nit.rc
b03afaafb542e84a6ae9b09d89f7eb3a9d1ccf7a 03-Feb-2011 Glenn Kasten <gkasten@google.com> Merge "Bug 3381298 Remove old /data/drm/plugins/native"
63e99f447fed821b57f3f13e33abd740b3b04c03 30-Jan-2011 Rebecca Schultz Zavin <rebecca@android.com> am e442cff0: am 58fb8220: Raise the viking killer min free values to match the system properties

* commit 'e442cff05ff9f083c91caa3bed74e37318a69fda':
Raise the viking killer min free values to match the system properties
58fb822024a04641d5ca1d0341456a2706aee853 29-Jan-2011 Rebecca Schultz Zavin <rebecca@android.com> Raise the viking killer min free values to match the system properties

Change-Id: Idcbdb106d704ef63c9a44e635b6e995e0e5f6479
Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
nit.rc
24823cfa84d1a4dcb719c1949092facf8c92804a 29-Jan-2011 Dianne Hackborn <hackbod@google.com> am fee2cfb0: am 9efdcd96: Fix issue #3401380: Raise OOM killer limits

* commit 'fee2cfb01165f6797d783c6a8c0b1fba4f591355':
Fix issue #3401380: Raise OOM killer limits
9efdcd969ed03cfbe8cfa692b8adcc46d954914a 29-Jan-2011 Dianne Hackborn <hackbod@google.com> Fix issue #3401380: Raise OOM killer limits

Change-Id: Ia9c82e7d31b7f1b89bf9650ebea697d9b3a64506
nit.rc
b81dfcb4f6275bf675e7afe64ccecc29c1b8c3ae 23-Jan-2011 Glenn Kasten <gkasten@google.com> Bug 3381298 Remove old /data/drm/plugins/native

Change-Id: Ic299d328f2e04a65a9dce68909c7b83f3ac03b20
nit.rc
328c0d4a89d7c04c829c587657b95b3241f64f60 23-Jan-2011 Glenn Kasten <gkasten@google.com> Merge "Bug 3361124 Remove drmioserver"
0897a4353ec74e05d4be23eb422080d4ad9c7c30 22-Jan-2011 David 'Digit' Turner <digit@google.com> am 100511ff: am 88af5ff4: Merge "goldfish: Work-around to start the RIL daemon." into honeycomb

* commit '100511ffaa11b33a6856a434c62ad326a899f252':
goldfish: Work-around to start the RIL daemon.
dc743112ca561242052d7fd5e4b11f6db38f99aa 22-Jan-2011 David 'Digit' Turner <digit@google.com> goldfish: Work-around to start the RIL daemon.

This change forces the start of the RIL daemon used to provide
3G connectivity to the system. It should normally be started
automatically by init.rc but there is a bug within
system/core/init/builtins.c that prevents this to happen.

Fixes the "No network connectivity" bug while the network
interface and route were properly setup.

Change-Id: Ieec0f513aabf92b8a59f0a86f64a16e97057c3c3
tc/init.goldfish.rc
b29b33841bd2f5143e2705525bfc4f8a2d2b6316 20-Jan-2011 Glenn Kasten <gkasten@google.com> Bug 3361124 Remove drmioserver

Change-Id: Ie3b20b487c1466737921567ab2d043e230356bf4
Note: safe to re-use the drmio uid/gid as no files were ever created.
nit.rc
852c13d1b2404e5a360375ae75291ac1a9dae026 20-Jan-2011 Ken Sumrall <ksumrall@android.com> am afa099a1: am 3a159d62: Move rild to the late_start class

* commit 'afa099a1909c02196574d125d735adb0c8918392':
Move rild to the late_start class
3a159d62a9d771f2a2d38129f1db56d873598696 20-Jan-2011 Ken Sumrall <ksumrall@android.com> Move rild to the late_start class

Now that rild can be killed in a reasonable amount of time, move it
from the core class to late_start. I was going to move it to main,
but it would get killed and restarted right after the disk crypto
password was entered, which is when the late_start class is started,
and I was seeing issues with rild not re-connecting to the network
when it was killed and restarted.

Change-Id: I60479ddb853953029890fc816538d615ef5a96ab
nit.rc
ba3bcef0244321916799442f9c028229733a1767 19-Jan-2011 David 'Digit' Turner <digit@google.com> am 794fb914: am eeeca4dd: rootdir: goldfish: Fix network route during emulation.

* commit '794fb914bef34c1c5f32764947801c95575ecd41':
rootdir: goldfish: Fix network route during emulation.
eeeca4dd45899c20d4fc187c59bda58af43352f2 18-Jan-2011 David 'Digit' Turner <digit@google.com> rootdir: goldfish: Fix network route during emulation.

The net.eth0.gw system property is used by the ConnectivityService
to set the default route when it detects that 3G connectivity is
established. Because the property was undefined, the route was
unset which broke networking.

+ Format / document init.goldfish.sh

Change-Id: I1133cf6c093609300315cd0ea363c9e139b42521
tc/init.goldfish.rc
tc/init.goldfish.sh
a42f152b4ae365e2f8d232237a8aa0168061feb4 18-Jan-2011 David 'Digit' Turner <digit@google.com> Merge "rootdir: Fix system emulation startup." into honeycomb
701d40f721573c5c9e0b45b59a383e04c582f6d0 18-Jan-2011 Ken Sumrall <ksumrall@android.com> am 383b76f8: am e4349157: Add a new trigger to support a progress bar UI for encrypt in place.

* commit '383b76f86af48d4a1a502d7767ab79f024483864':
Add a new trigger to support a progress bar UI for encrypt in place.
e434915787c38a6d84e1058044fed3be2ed02235 17-Jan-2011 Ken Sumrall <ksumrall@android.com> Add a new trigger to support a progress bar UI for encrypt in place.

Change-Id: I6a14eb43462505cb7fecfee9fd1ecdea50065963
nit.rc
95df887ac0cd2fab3f5d3148feb7839b5f65223f 06-Jan-2011 David 'Digit' Turner <digit@google.com> rootdir: Fix system emulation startup.

This fixes the goldfish-specific config scripts used by init and ueventd
to properly setup the system under emulation. This fixes a lot of broken-ess
introduced by recent permission changes in the system.

Note that there are still several problems after this patch is applied, but
at least it becomes possible to get an adb connection to the emulated system,

Change-Id: Iff47bbf0fe5cb759fa93089284bb0f71e32405a2
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/ueventd.goldfish.rc
eventd.rc
30d5d038a94b09bd906d8a07a9c4b79640d36c2e 14-Jan-2011 Jesse Wilson <jessewilson@google.com> Move apache-xml to external. (project 4 of 4)

Change-Id: I8e1ea723481ae6d8e609563331c187576f306bce
http://b/3351604
nit.rc
63990cf56fc64033c0382ac19a3ffba7f525fb30 13-Jan-2011 Ken Sumrall <ksumrall@android.com> Merge "Move rild to the core class." into honeycomb
a02714bd3e8e75298c6e684ef375407fe02dd9b0 11-Jan-2011 Ken Sumrall <ksumrall@android.com> Move rild to the core class.

Changes in init.stingray.rc now prevent rild from making sockets
or named pipes on /data. Now that rild no longer prevents /data
from being unmounted, we can put it in the core class, which doesn't
restart when we enable encryption. This speeds up the boot by 20+
seconds.

Change-Id: I737baf804e089f4ddbd664eaa1e675a7bd62e699
nit.rc
f3c42b6ee4f0bb042cf93e1ac6c9c4d72e1558fa 11-Jan-2011 Ken Sumrall <ksumrall@android.com> Move rild to the core class.

Changes in init.stingray.rc now prevent rild from making sockets
or named pipes on /data. Now that rild no longer prevents /data
from being unmounted, we can put it in the core class, which doesn't
restart when we enable encryption. This speeds up the boot by 20+
seconds.

Change-Id: I71c426dab1b725e401116234167d41c7ccd958c1
nit.rc
a44aca6580b6f39459195275f4631682410aae4b 11-Jan-2011 Gloria Wang <gwang@google.com> Temporarily disable the drm service. do not merge

Change-Id: I5cb04a9c2cc5b95443c6c0ea77132a4102ca47fc
nit.rc
48b911c573c92742aa80270b734811f722c67c37 10-Jan-2011 Mike Lockwood <lockwood@android.com> am af7bdc64: Add separate permission and group for access to MTP USB driver

* commit 'af7bdc646088e3112052f4fd35061bb720393287':
Add separate permission and group for access to MTP USB driver
af7bdc646088e3112052f4fd35061bb720393287 10-Jan-2011 Mike Lockwood <lockwood@android.com> Add separate permission and group for access to MTP USB driver

Since the "usb" group and ACCESS_USB permission will be used by regular apps
to access USB devices in host mode, we need a separate permission for the
device side MTP driver.

Change-Id: Ibb546b8726d61e041fc7c273f71929624ad1575b
Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
16209418de5179603ddd93da91190b4c2e42eb39 07-Jan-2011 Gloria Wang <gwang@google.com> Merge "To remove drm service from groups of "system" and "root"."
60b5b408cfcac450ce0cc56952d3b1c087b25428 07-Jan-2011 Gloria Wang <gwang@google.com> To remove drm service from groups of "system" and "root".

Change-Id: Ieac11c667c72465f7082baab0787dc740797049f
nit.rc
a2a1f3149fb32d95bc81ddfd713d5bba9d6cbc61 27-Oct-2010 Brad Fitzpatrick <bradfitz@android.com> Let SocketClient users write binary data to clients.

This is a dependency for the DNS proxy CLs.

This CL also adds a new socket for the netd process to inherit which
is owned by the inet group. (so only apps with the INTERNET
permission can use the DNS proxy...)

Change-Id: I8a51924e0ed56c6066f77e6f1b02d39bdadac51e
nit.rc
1f2565ca08ecd92181eb662899f68f306695d74a 06-Jan-2011 David 'Digit' Turner <digit@google.com> rootdir: Fix system emulation startup.

This fixes the goldfish-specific config scripts used by init and ueventd
to properly setup the system under emulation. This fixes a lot of broken-ess
introduced by recent permission changes in the system.

Note that there are still several problems after this patch is applied, but
at least it becomes possible to get an adb connection to the emulated system,

Change-Id: I1e8f5828b4d5cbb3a4338878df875dc718276b38
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/ueventd.goldfish.rc
eventd.rc
752923c168009d03e9e00e590155fbd0a2880ccb 04-Dec-2010 Ken Sumrall <ksumrall@android.com> Changes to init to support encrypted filesystems.

These are the changes to init and init.rc necessary to
support booting with and encrypted /data filesystem.
A corresponding change to init.<device>.rc goes along
with this change.

Change-Id: I0c7e2cc39568358014a82e317735c0eae14dd683
nit.rc
333f24bfbd9eea1347f20c2e88c5c1565b84aafe 10-Dec-2010 Nick Kralevich <nnk@google.com> don't run services with gid=0

Ensure that we drop privileges for servicemanager
and drmioserver. These should not be running with
gid=0.

Bug: 3275526
Testing: Applied change and successfully rebooted
the device. No obvious bugs.

Change-Id: I782fbda812cb88e0a365788b45b3b32894623177
nit.rc
1612425c50d2728542cac607fc71a4c8781bf1df 13-Dec-2010 Jaikumar Ganesh <jaikumar@google.com> Remove services for adding SDP records.

This was an inefficient way of doing things and was
temporary. There are now direct calls to Bluez to add reserved
SDP records.

This improves connection time after turning on BT by 6-8 secs.

Change-Id: I8750f44e1de73c9cc935d68710b8964e3f50c3a6
nit.rc
6388cfe03c1d5695d7cabe244b031af02ef686a8 08-Dec-2010 Iliyan Malchev <malchev@google.com> Revert "HACK: slow_start for mediaserver to prevent restart race condition"

This reverts commit 9db7945ed2f9eb5756aa0c1e5e72fa6240f74847.
nit.rc
9db7945ed2f9eb5756aa0c1e5e72fa6240f74847 05-Dec-2010 Paul Eastham <eastham@google.com> HACK: slow_start for mediaserver to prevent restart race condition

Change-Id: Ia76385612fd127c5f11b3d64205e350f27acfd82
nit.rc
d49b4ef51eeba026e77f51e9c454464d0c5b9cd9 19-Nov-2010 Mike Lockwood <lockwood@android.com> init.rc: Allow console in userdebug builds

Change-Id: Ib5734c6d3e2bf5a9da3d44721c529971f2345120
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
4640fc0504ec69446b00dfb7ffcca48b085bf916 26-Oct-2010 Gloria Wang <gwang@google.com> Create directory for DRM plug-ins.

Change-Id: I1bfef96b1949f288852cd88222e0ce2bbb186f40
nit.rc
a215823fc92d6c0f8623fe18a407d9853aef87cf 28-Oct-2010 Brian Swetland <swetland@google.com> am b7171987: am b4d65399: disable console in user builds
b7171987382b768466a472c4c5f84cc496c95aea 28-Oct-2010 Brian Swetland <swetland@google.com> am b4d65399: disable console in user builds
b4d65399fde02280b718e3b5b5cb1464a885c4b0 28-Oct-2010 Brian Swetland <swetland@google.com> disable console in user builds

Also, run console as shell/log instead of root/root.

Change-Id: I6104f1edddfd5e11843ff41d7839d0c296e6a6f9
nit.rc
8c5669f9f9a228efebf4059fd4ceace5cece578b 27-Oct-2010 Brad Fitzpatrick <bradfitz@android.com> Let SocketClient users write binary data to clients.

This is a dependency for the DNS proxy CLs.

This CL also adds a new socket for the netd process to inherit which
is owned by the inet group. (so only apps with the INTERNET
permission can use the DNS proxy...)

Change-Id: Ic3475c697913ba85805b4e49801b65e7a1d59289
nit.rc
7ffa661595df7bc71f1ae2e8cefcd658b0f9bdf5 27-Oct-2010 Brian Swetland <swetland@google.com> am 60afdedc: am 146481b9: add rules to set perms for input device sysfs attributes
60afdedc4c1a8532893b09d95907d70d577f9d4b 27-Oct-2010 Brian Swetland <swetland@google.com> am 146481b9: add rules to set perms for input device sysfs attributes
146481b9468ff60214e41c93896259a7201df7cb 27-Oct-2010 Brian Swetland <swetland@google.com> add rules to set perms for input device sysfs attributes

Change-Id: I28ab7f1ac5cc07ade7830e87f5e70c96464bb686
eventd.rc
98b1378606780c28501708ca02560c82bb1fda53 23-Oct-2010 Brian Swetland <swetland@google.com> am f3c29f0c: am 5988ea72: add sdcard access permission to ril daemon

Merge commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6'

* commit 'f3c29f0cf287ec3d329b012a2d48808b064632f6':
add sdcard access permission to ril daemon
f3c29f0cf287ec3d329b012a2d48808b064632f6 23-Oct-2010 Brian Swetland <swetland@google.com> am 5988ea72: add sdcard access permission to ril daemon

Merge commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6' into gingerbread-plus-aosp

* commit '5988ea726e91fbdc69485b729ea2f532fedfa1d6':
add sdcard access permission to ril daemon
5988ea726e91fbdc69485b729ea2f532fedfa1d6 23-Oct-2010 Brian Swetland <swetland@google.com> add sdcard access permission to ril daemon

Some RIL daemons write crashdumps to sdcard.

Change-Id: I49a8d2cb342fd7f8bd23dbb1bcc378726e10a579
nit.rc
d7482b2f4cdd6a35f8707d94536801a958120b6b 22-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> am 33357f54: am 6490257d: Make netd restart when system server hangs on it.

Merge commit '33357f5477a24cb16bd3dd692fe5ca14755ab033'

* commit '33357f5477a24cb16bd3dd692fe5ca14755ab033':
Make netd restart when system server hangs on it.
33357f5477a24cb16bd3dd692fe5ca14755ab033 22-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> am 6490257d: Make netd restart when system server hangs on it.

Merge commit '6490257d116c35d3da927ee7b91179dde64ef713' into gingerbread-plus-aosp

* commit '6490257d116c35d3da927ee7b91179dde64ef713':
Make netd restart when system server hangs on it.
6490257d116c35d3da927ee7b91179dde64ef713 22-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> Make netd restart when system server hangs on it.

netd has been seen hanging (cause suspected but unconfirmed)
which then brings down the system server which blocks forever
on its main thread trying to connect to netd with its hung
event loop.

This then results in an infinite watchdog runtime restart loop
because the situation never improves: netd is still borked.

Instead, we should kill netd and give it another chance when
the system server dies.

Bug: 3018996
Bug: 3017876
Change-Id: Ibf9ecf0ffcb78e48c38e5167f21cbeefe0e2a47f
nit.rc
d06df51bcd7bcc2656089a529fa6a455bad00d37 19-Sep-2010 Brian Swetland <swetland@google.com> resolved conflicts for merge of 3b5214a6 to master

Change-Id: Id73c53c6c2e9c21eb9b1d1e624aaeb25097ea7a4
3b5214a67f43e2e4f69428e98d3a2c130c7c87d8 19-Sep-2010 Brian Swetland <swetland@google.com> am 02863b95: add /vendor support

Merge commit '02863b957cfbfc302d3136ed78c0cba86accacd8' into gingerbread-plus-aosp

* commit '02863b957cfbfc302d3136ed78c0cba86accacd8':
add /vendor support
02863b957cfbfc302d3136ed78c0cba86accacd8 19-Sep-2010 Brian Swetland <swetland@google.com> add /vendor support

- look in /vendor/firmware/... in addition to /system/etc/firmware/... for firmware loading
- add /vendor/bin to path before /system/bin
- add /vendor/lib to ldpath before /system/lib
- configure appropriate permissions for /system/vendor/bin
- symlink /vendor -> /system/vendor

Change-Id: I0c06ca1e38a44f0c7024cee6cea8907aa93a4532
nit.rc
a5220b24d1b17b142e373aacbadf79a00effbbf0 10-Sep-2010 Jean-Baptiste Queru <jbq@google.com> am 26ce6e0e: manual merge from readonly-korg-master

Merge commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1'

* commit '26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1':
- Add drm and drmio service
26ce6e0e1608a9e804fa9721cc6326cdbaa5b7c1 10-Sep-2010 Jean-Baptiste Queru <jbq@google.com> manual merge from readonly-korg-master

Change-Id: Id17f69d22fbbc84578be5aadd5e8e906ff0eb548
bb130ba7998e82e79cd94cddee2b97b1ed977f21 09-Sep-2010 Jean-Baptiste Queru <jbq@google.com> Merge "- Add drm and drmio service - Add /data/drm directory for storing DRM related data"
e6d8a5f1dfb81113b9421ea353915cde426023ed 09-Sep-2010 Brian Swetland <swetland@google.com> am 8df3a4a5: am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread

Merge commit '8df3a4a554184afba71887995c5f0983ce81196f'

* commit '8df3a4a554184afba71887995c5f0983ce81196f':
remount / as read-only only on post-fs to allow per-target config of /
8df3a4a554184afba71887995c5f0983ce81196f 09-Sep-2010 Brian Swetland <swetland@google.com> am 4012c0a4: Merge "remount / as read-only only on post-fs to allow per-target config of /" into gingerbread

Merge commit '4012c0a46ab2ebdf6a1298bc4e85ed3368d1b8a4' into gingerbread-plus-aosp

* commit '4012c0a46ab2ebdf6a1298bc4e85ed3368d1b8a4':
remount / as read-only only on post-fs to allow per-target config of /
56de7a1263431819ff9a53dcd9e8e3306149ed99 09-Sep-2010 Brian Swetland <swetland@google.com> remount / as read-only only on post-fs to allow per-target config of /

Change-Id: Ia89dd2021e0f960201b4cee573227f0addd48431
nit.rc
3c659a8d647b2650d83712f9a6724b8ac50ef5ae 05-Aug-2010 Brian Carlstrom <bdc@google.com> am f2af88e8: Tracking merge of dalvik-dev to gingerbread

Merge commit 'f2af88e81af5efb2d585963507f798d5a8b93d67' into gingerbread-plus-aosp

* commit 'f2af88e81af5efb2d585963507f798d5a8b93d67':
Tracking merge of dalvik-dev to gingerbread
f2af88e81af5efb2d585963507f798d5a8b93d67 05-Aug-2010 Brian Carlstrom <bdc@google.com> Tracking merge of dalvik-dev to gingerbread

git cherry-pick --no-commit b99a099c
git cherry-pick --no-commit 9811671e023ceb82029040f7acf599013c773e6b
git cherry-pick --no-commit d0645bf0cc76ef7be11cf77a8e1995233a1972e4

Change-Id: Ie70fecaeaba97a25f114cd2717e381b5107533b1
nit.rc
e306a9044a1ef97019871eb8cdd102223307f1c9 31-Jul-2010 Iliyan Malchev <malchev@google.com> Revert "system/core: add system/audio persmissions for /dev/audio*"

This reverts commit 7e8b01229dde701bee555ea1cf10986b773d5de0.
eventd.rc
7e8b01229dde701bee555ea1cf10986b773d5de0 30-Jul-2010 Iliyan Malchev <malchev@google.com> system/core: add system/audio persmissions for /dev/audio*

Change-Id: If214241f8150f5ff6cce8b9a76c6c8e5bad9c35a
Signed-off-by: Iliyan Malchev <malchev@google.com>
eventd.rc
30be93c6e2b5c2eb6c6e9e21a04dc0dbe2f4c8ca 30-Jul-2010 Jean-Baptiste Queru <jbq@google.com> am 60c8f863: resolved conflicts for merge of 0fcbdb41 to gingerbread-plus-aosp

Merge commit '60c8f863ca84f3e5bb8e78d8001c53511f094d53'

* commit '60c8f863ca84f3e5bb8e78d8001c53511f094d53':
Userland support for VM interconnection
60c8f863ca84f3e5bb8e78d8001c53511f094d53 30-Jul-2010 Jean-Baptiste Queru <jbq@google.com> resolved conflicts for merge of 0fcbdb41 to gingerbread-plus-aosp

Change-Id: I1396cd97b28f316849016d55596ad52fffd3235c
0fcbdb4147858d40d581d3b034f5150962632943 30-Jul-2010 Jean-Baptiste Queru <jbq@google.com> Merge "Userland support for VM interconnection"
e572d596b3715198fb48b3d8cef4939a71d58db2 27-Jul-2010 aimitakeshi <aimitakeshi@gmail.com> - Add drm and drmio service
- Add /data/drm directory for storing DRM related data

Change-Id: Ifd8922a3de109dbf5cd3f9cabbf4e5689b16c1d7
nit.rc
5687abe6ef0fe5820547cf68bbcec9c968c28870 16-Jul-2010 The Android Open Source Project <initial-contribution@android.com> am 544e1f86: merge from open-source master

Merge commit '544e1f866edcbe55b3d8f65d50bc831dfb818657'

* commit '544e1f866edcbe55b3d8f65d50bc831dfb818657':
Fix sdcard mount issue.
544e1f866edcbe55b3d8f65d50bc831dfb818657 16-Jul-2010 The Android Open Source Project <initial-contribution@android.com> merge from open-source master

Change-Id: I03f6a73a782706a7c77041db4e626c40dffa647a
f848a429dde741742988e2365d257058d57acbf8 15-Jul-2010 Kenny Root <kroot@google.com> resolved conflicts for merge of 3cac9cb3 to master

Change-Id: I86b5173ad49522eae082bf2a3d096dbfb5240129
c7858a3dde9db1c4cf2563a4388f422ff1bcb334 15-Jul-2010 Kenny Root <kroot@google.com> Add directories for OBB mounting

Change-Id: Ib73e9bca50fb168ab5d147cc260666a770092961
nit.rc
2ee12e7a3404749add55e3d98358ab52b579fd57 15-Jul-2010 Ravi K Yenduri <yenduri@pv.com> Fix sdcard mount issue.

Push vold.fstab on to the emulator, which is now denoted by
TARGET_PRODUCT=full.

Change-Id: I502af9b06903808fa2448c1013ddd8904f6000ca
ndroid.mk
2a743730c7d1a8adba8a922f7af46cef0b35363a 18-Jan-2010 Dries Harnie <botje.linux@gmail.com> Userland support for VM interconnection

Change-Id: I699608f3072b39c8da1a7cc313bd0b736e90f225
tc/init.goldfish.sh
d0645bf0cc76ef7be11cf77a8e1995233a1972e4 30-Jun-2010 Brian Carlstrom <bdc@google.com> updated BOOTCLASSPATH to track merge from dalvik-dev

Change-Id: I10e6895ad3647dd789fe5fc7a7d37c4b71c61717
nit.rc
69286093d00186ecf2354d8f19934630500b21c4 29-Jun-2010 Mike Lockwood <lockwood@android.com> ueventd.rc: Give the USB group read/write access to the MTP USB driver.

Change-Id: I305671848dbdf427333dc088f83f88cea1b33945
Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
5f81c272c18a0ef8b5e6e56f1528dd46db310d0d 17-Jun-2010 Jaikumar Ganesh <jaikumar@google.com> Move UART device permissions to device specific init files.

Change-Id: I548386601d7546831bfeb044d15b1c9bf71f3e96
eventd.rc
a2dffa9db6c08c240e9511faee1c16fea535ef3e 16-Jun-2010 Mike Lockwood <lockwood@android.com> init.rc: Move SD card support to device specific init.rc files

Change-Id: I5745e91df2b7c5722bd6e650931d3d2d7d0eadcb
Signed-off-by: Mike Lockwood <lockwood@android.com>
tc/init.goldfish.rc
nit.rc
c5947806740172e66c1fd5259e86bc5543d873ac 11-Jun-2010 Dianne Hackborn <hackbod@google.com> am 0c6672c6: am 8b0ec20d: Update OOM adj levels.

Merge commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c'

* commit '0c6672c66a93f7a81d07ff3f59eee87ddb16db3c':
Update OOM adj levels.
8b0ec20d6f9636def6740085b203302c1680fa81 11-Jun-2010 Dianne Hackborn <hackbod@google.com> Update OOM adj levels.

This introduces some new buckets that will be used by the activity
manager, and adjusts the default levels to match what we had been
setting for Droid.

It turns out Passion has been using the old levels, which makes no
sense for how much memory it has. Also it is a problem with these
definitions spreading to other projects for different devices, so
I am going to update the defaults to be appropriate for our newer
devices, and put here a file to tune them down for something like
the sapphire.

Change-Id: Ia4f33c4c3b94aeb3656f60b9222072a1d11e9e68
nit.lowmem.rc
nit.rc
f96e700b338e9a0edee6c2114cc7310f7be48bc4 03-Jun-2010 Christopher Tate <ctate@google.com> am 25e7b8fc: am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
25e7b8fcc3708b58736c7825ecf612d04020716e 02-Jun-2010 Christopher Tate <ctate@google.com> am b1fb3bd1: am 230cb33f: Make /proc/kmsg and /proc/sysrq-trigger system-process-readable

Merge commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163' into kraken

* commit 'b1fb3bd13a4da8bc46a44ec5eef6de9cb952f163':
Make /proc/kmsg and /proc/sysrq-trigger system-process-readable
230cb33fd1ab335c6f808c72db891993b00110a0 02-Jun-2010 Christopher Tate <ctate@google.com> Make /proc/kmsg and /proc/sysrq-trigger system-process-readable

This is so that the system process can capture kernel thread stacks when the
watchdog detects a deadlock. Previously, /proc/kmsg was root/root and mode
0400, and /proc/sysrq-trigger was root/root and mode 0200. With this
change, /proc/kmsg becomes root/system and 0440, and /proc/sysrq-trigger
becomes root/system and 0220.

Change-Id: Iac46bd10bd11d495024afeb5d693107ce5074791
nit.rc
c0d8fb5842f57bbc244e9c9596707787caabf44e 17-May-2010 Mike Lockwood <lockwood@android.com> DO NOT MERGE resolved conflicts for merge of e95aad61 to kraken

this change is already in master

Change-Id: Ica43eae28b50d89d50217851aff7e62978abfa27
Signed-off-by: Mike Lockwood <lockwood@android.com>
9811671e023ceb82029040f7acf599013c773e6b 05-May-2010 Jesse Wilson <jessewilson@google.com> Moving junit out of core.jar and into core-junit.jar.

Change-Id: I603cba084c06ddbec21fc88bbaab7cde96952cb1
nit.rc
b717dc85d8aca2431a553ca0e1b3438d1d8e2072 06-May-2010 Mike Lockwood <lockwood@android.com> init: Add support for /dev/bus/usb/ file system and add new unix group AID_USB.

init now creates files in /dev/bus/usb/ for user access to USB devices.
Files are chmod 660 with group AID_USB.

Signed-off-by: Mike Lockwood <lockwood@android.com>
eventd.rc
44b65d047cc39baf30e21bfd8dd438f6bc1f77f5 20-Apr-2010 Colin Cross <ccross@android.com> init: Add ueventd.rc parsing to ueventd

Change-Id: Iea53050d6c10e8cabf563e5d80e84eaf78873695
ndroid.mk
tc/ueventd.goldfish.rc
eventd.rc
f83d0b9af5cbe4440cc41ceaa8a7806a13c86282 21-Apr-2010 Colin Cross <ccross@android.com> init: Move uevent handling to an external ueventd process

Change-Id: Iea6c56013062ade633a1754f7bcf8cf09b3dedc1
nit.rc
31712beaf7de127a1249b909cdefffbc25fff076 09-Apr-2010 Colin Cross <ccross@android.com> Move filesystem mounting into a new "fs" init level

Devices with non-MTD storage need to override the filesystem mounting
commands in init.rc. Moving them to a new "fs" init level allows a
custom init.<device>.rc to handle the mounting.

Change-Id: If0e655139b9734650fb798b6eb0a90e2241fc29b
nit.rc
dc61c9cda5d1b9ec455ff4b26595f523a36557c8 09-Apr-2010 Colin Cross <ccross@android.com> Add a build dependency for ramdisk.img on system/core/rootdir/init.rc

Change-Id: Id9698a88720cc0c70e3d9c43c9bac9b74f4798b6
ndroid.mk
c741f22d8533226ce60903649a7a57b3f05a65af 24-Mar-2010 Nick Pelly <npelly@google.com> Add NET_RAW to mediaserver so that it can open a raw HCI socket to configure
BT chip.

Change-Id: I22065b313c7af28b4791c74ea3d403a628738102
nit.rc
bbf3ea46fb6df3b666cb66a09104d3a7694926dc 13-Mar-2010 Jean-Baptiste Queru <jbq@google.com> cleanup init.rc

Change-Id: I7f7fefd61c6032c84fa63e597ea0e6bbe66d2e79
nit.rc
89f235c5e028466bb273dbaacb3346f1f0ba9f1e 01-Mar-2010 Mike Chan <mike@android.com> init.rc: Add cpuacct to cgroup mount for cpu statistic

Cpu accounting statistics expored in /acct

Change-Id: I8a35816e94b69d9e67a3dd65aae16520864777d7
Signed-off-by: Mike Chan <mike@android.com>
nit.rc
b91bf4ba864a392412397913ee09a8c1f2e7cc87 27-Feb-2010 San Mehat <san@google.com> Revert "init.rc: Add cpuacct to cgroup mount for cpu statistics"

This reverts commit a7d88224ff7283c210c25ce6d57239b4053b5f14.

This cgroup subsys should be mounted on it's own mount-point, since it's
addition to /dev/cpuctl causes the cpu subsys to EPERM
nit.rc
a7d88224ff7283c210c25ce6d57239b4053b5f14 26-Feb-2010 Mike Chan <mike@android.com> init.rc: Add cpuacct to cgroup mount for cpu statistics

Change-Id: Ic1893e1bf7b2c45659419b0bc55d42f50d030c9f
Signed-off-by: Mike Chan <mike@android.com>
nit.rc
f0cb74e3b07d5de49dc875f8405e21d2a102e749 26-Feb-2010 San Mehat <san@google.com> rootdir: init.rc: Enable I/O priorities for media server and vold

Sets the media-server to class 'real-time' pri 4, and vold to class 'best effort'
pri 2

Signed-off-by: San Mehat <san@google.com>
nit.rc
eafdd86f4d8f4ccc69f0c16550c65aa392f678d6 08-Jan-2010 Jaikumar Ganesh <jaikumar@google.com> Update bluetooth data files path.
nit.rc
a9db22f1228996d8f81e4f4903fa5c598a606fbd 24-Feb-2010 San Mehat <san@google.com> rootdir: init.rc: Add 'ASEC_MOUNTPOINT' environment variable.

Signed-off-by: San Mehat <san@google.com>
nit.rc
bbfe1368d909be470f919b2349a974bee8dd0a9c 17-Feb-2010 Chia-chi Yeh <chiachi@android.com> Remove dead services from init.rc.
nit.rc
6f957c3f25ed96a5ea13122764c66e18f1e72d2d 20-Feb-2010 San Mehat <san@google.com> generic_rootdir: vold_fstab: Change '/sdcard' -> '/mnt/sdcard'

Signed-off-by: San Mehat <san@google.com>
tc/vold.fstab
6ea3cc6089393286ab8b6cc459cfa9d7e58fc203 20-Feb-2010 San Mehat <san@google.com> rootdir: init.rc: Create secure staging directories, and a compat symlink

Signed-off-by: San Mehat <san@google.com>
nit.rc
55a1f0827be9920b093152cffb6eddd613d04bc9 27-Jan-2010 Vasu Nori <vnori@google.com> dont create sqlite_stmt_journals dir.

this shoudl not be required any longer. in fact, some test-writers are
abusing this dir.
nit.rc
92175e04a56db804d4dae75fc49fdd5edc6a2968 17-Jan-2010 San Mehat <san@google.com> rootdir: init.rc: Fix typo in chown of /dev/cpuctl

Signed-off-by: San Mehat <san@google.com>
nit.rc
192277c0154eff542ddbce27d7c35995c0671748 15-Jan-2010 San Mehat <san@google.com> rootdir: init.rc: Add netd to startup services list

Signed-off-by: San Mehat <san@google.com>
nit.rc
1851d80959bd314af730451ebfb2a5e00bb0a83a 07-Jan-2010 San Mehat <san@google.com> init.rc: Adjust perms on /asec

Signed-off-by: San Mehat <san@google.com>
nit.rc
d0aa32c3d99aeb0e6949ab1c4fae83283a946567 06-Jan-2010 Oscar Montemayor <oam@google.com> Apps on SD project. Small change to support apps on SD file system key storage.
nit.rc
900570e2a833bde0683cce5254d9dc102509cabc 06-Jan-2010 San Mehat <san@google.com> init.rc: Create a small tmpfs on /asec so we can create mountpoints

Signed-off-by: San Mehat <san@google.com>
nit.rc
37c71dd9a7f488563c97fdca88cca701e2962e45 04-Jan-2010 San Mehat <san@google.com> init.rc: Add new /asec mount point

Signed-off-by: San Mehat <san@google.com>
nit.rc
5184fc5c797849ee861dd4068ad57cbbe829c9d6 17-Dec-2009 San Mehat <san@google.com> rootdir: Switch to vold.fstab

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
tc/vold.conf
tc/vold.fstab
37c586e6b11138beab400d1208183d49c12a9ef2 03-Dec-2009 Oscar Montemayor <oam@google.com> Encrypted File Systems Project.

Temporarily creating emulated encrypted directories manually.
Will remove those lines once a true encrypted FS is mounted, and proper
framework chanfes have been made. This is required for the feature to
work with the other changes.
nit.rc
d2633cb70978b42bc8b2c524951a39de197a5edd 24-Nov-2009 Dan Egnor <egnor@google.com> am 7359c16a: Don\'t copy /proc/last_kmsg to /data/dontpanic/last_kmsg -- it gets generated on every boot, so this is a bunch of writing for no particularly good reason.

Merge commit '7359c16a852c23740ef2874aa6b66f629d1473b7' into eclair-mr2-plus-aosp

* commit '7359c16a852c23740ef2874aa6b66f629d1473b7':
Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg --
7359c16a852c23740ef2874aa6b66f629d1473b7 24-Nov-2009 Dan Egnor <egnor@google.com> Don't copy /proc/last_kmsg to /data/dontpanic/last_kmsg --
it gets generated on every boot, so this is a bunch of writing
for no particularly good reason.
nit.rc
6114b2dfb4170e07e075b134a35c20ff3f5292a2 20-Nov-2009 Doug Zongker <dougz@android.com> am eb67fac4: change /cache/recovery group to cache

Merge commit 'eb67fac4723892ac8ae3fae87c05e776c49029c5' into eclair-mr2-plus-aosp

* commit 'eb67fac4723892ac8ae3fae87c05e776c49029c5':
change /cache/recovery group to cache
eb67fac4723892ac8ae3fae87c05e776c49029c5 20-Nov-2009 Doug Zongker <dougz@android.com> change /cache/recovery group to cache

To unbundle system update, we need users other than system to be able
to write the /cache/recovery directory.
nit.rc
879f398a44f8cbb73dec71d8c21931f8a5c46073 03-Nov-2009 Jean-Michel Trivi <jmtrivi@google.com> am 5a8cf57e: am 5e7db233: Make the RIL daemon part of the audio group so it can load region-specific acoustic parameters.

Merge commit '5a8cf57eb7aa70f1647b28315a2419c4a6d36828' into eclair-mr2-plus-aosp

* commit '5a8cf57eb7aa70f1647b28315a2419c4a6d36828':
Make the RIL daemon part of the audio group so it can load region-specific
5e7db233004a0869125d0f2d64a9e747faf252da 03-Nov-2009 Jean-Michel Trivi <jmtrivi@google.com> Make the RIL daemon part of the audio group so it can load region-specific
acoustic parameters.
nit.rc
dd7105a7a11553260be0ea71985ff026aad2cf21 13-Oct-2009 San Mehat <san@google.com> am aaad7ab4: am fd110c7f: Merge change I831d8e1e into eclair

Merge commit 'aaad7ab4ae9e6913481fe4348b040e5d3e2aaec1' into eclair-mr2-plus-aosp

* commit 'aaad7ab4ae9e6913481fe4348b040e5d3e2aaec1':
rootdir: init.rc: Adjust background dirty writeout policy
831d8e1e3a08520369561087112ebf898e31704c 13-Oct-2009 San Mehat <san@google.com> rootdir: init.rc: Adjust background dirty writeout policy

Signed-off-by: San Mehat <san@google.com>
nit.rc
46c9658f4f29cf06e8d84cafdfcda3eba7f37741 10-Oct-2009 Dan Bornstein <danfuzz@android.com> am 1dec5032: Force the mediaserver process to restart whenever the zygote or system server do.

Merge commit '1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d' into eclair-plus-aosp

* commit '1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d':
Force the mediaserver process to restart whenever the zygote or system
1dec5032cfadc1a3d7687ce5b6cd322e4151ce9d 09-Oct-2009 Dan Bornstein <danfuzz@android.com> Force the mediaserver process to restart whenever the zygote or system
server do.

Change-Id: I16ce4ae656473055e7e244ccd4af7055959e3c1c
nit.rc
19257e7c00afaed6ba9fa0b3557e8bd5de094fad 09-Oct-2009 Rebecca Schultz Zavin <rebecca@android.com> am ea935c1d: Merge change I7b04795c into eclair

Merge commit 'ea935c1d9771fa2cc00583720586c209463f2791' into eclair-plus-aosp

* commit 'ea935c1d9771fa2cc00583720586c209463f2791':
Make vmallocinfo readable by group log so we can put it in bugreports
14d898e0141287cd9d8991bea5b63650bb8f5145 09-Oct-2009 Rebecca Schultz Zavin <rebecca@android.com> Make vmallocinfo readable by group log so we can put it in bugreports

Change-Id: I7b04795c029c51108132e7a9eaf46b97de06de6f
Signed-off-by: Rebecca Schultz Zavin <rebecca@android.com>
nit.rc
64e5c1d5d2c59271a0244816465ecaa419db7e0f 07-Oct-2009 Brian Swetland <swetland@google.com> am aa7d9710: init.rc: don\'t mount debugfs

Merge commit 'aa7d97106abf8c390e1aed71f7c175fb77fead38' into eclair-plus-aosp

* commit 'aa7d97106abf8c390e1aed71f7c175fb77fead38':
init.rc: don't mount debugfs
aa7d97106abf8c390e1aed71f7c175fb77fead38 07-Oct-2009 Brian Swetland <swetland@google.com> init.rc: don't mount debugfs

We'll do this in the product-specific init files.
nit.rc
b0cc66698fde10592638fee13a8db75b2df1ecf5 07-Oct-2009 San Mehat <san@google.com> am 529520e8: Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support"

Merge commit '529520e8240e6865aca77ae9abf78dacbaa72e2c' into eclair-plus-aosp

* commit '529520e8240e6865aca77ae9abf78dacbaa72e2c':
Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support"
529520e8240e6865aca77ae9abf78dacbaa72e2c 06-Oct-2009 San Mehat <san@google.com> Revert "rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support"

This reverts commit 35ad5f41c39c5f3af7a8f00185a13366f4901e69.
nit.rc
6b4e9ebc4cab1dab3b8769a27868addd202a29b5 23-Sep-2009 David 'Digit' Turner <digit@google.com> am a0c98ef0: Ensure -user builds can run the dex preopt pass in the emulator.

Merge commit 'a0c98ef01a4c5a859fdde35fed7977b1eb919007' into eclair-plus-aosp

* commit 'a0c98ef01a4c5a859fdde35fed7977b1eb919007':
Ensure -user builds can run the dex preopt pass in the emulator.
a0c98ef01a4c5a859fdde35fed7977b1eb919007 23-Sep-2009 David 'Digit' Turner <digit@google.com> Ensure -user builds can run the dex preopt pass in the emulator.

This is done by ensuring that /init.goldfish.rc and /system/etc/init.goldfish.sh
are part of the system image, even if it lacks other emulator related bits.
ndroid.mk
eed96af19d81803d982c8cb91e2a120c8035e980 21-Sep-2009 Chia-chi Yeh <chiachi@android.com> am 9b4f1ff2: init.rc: specify keystore directory and fix permissions.

Merge commit '9b4f1ff210c449920890581b191da3568c10fbd1' into eclair-plus-aosp

* commit '9b4f1ff210c449920890581b191da3568c10fbd1':
init.rc: specify keystore directory and fix permissions.
9b4f1ff210c449920890581b191da3568c10fbd1 18-Sep-2009 Chia-chi Yeh <chiachi@android.com> init.rc: specify keystore directory and fix permissions.
nit.rc
dea31b41331b87bf825e796c6a1bec6a39bfbb04 20-Sep-2009 Jaikumar Ganesh <jaikumar@google.com> am 1320687b: Remove logwrapper for Bluetoothd.

Merge commit '1320687bdb6df2de1c27fb03c827b69384d26f87' into eclair-plus-aosp

* commit '1320687bdb6df2de1c27fb03c827b69384d26f87':
Remove logwrapper for Bluetoothd.
1320687bdb6df2de1c27fb03c827b69384d26f87 19-Sep-2009 Jaikumar Ganesh <jaikumar@google.com> Remove logwrapper for Bluetoothd.

Change-Id: I6d16bc0dbdf9f3aff2080f8c7968ff3cb592811e
nit.rc
656944243786dc4e7569f4ae22b5943aeba9e919 19-Sep-2009 Brian Swetland <swetland@google.com> am bb6f68c6: init.rc: mount debugfs for debugging

Merge commit 'bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4' into eclair-plus-aosp

* commit 'bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4':
init.rc: mount debugfs for debugging
bb6f68c63d79bf58bd53f463de1bd23d49e5b8a4 19-Sep-2009 Brian Swetland <swetland@google.com> init.rc: mount debugfs for debugging

- put it at /sys/kernel/debug so Arve will be happy
- symlink /d to /sys/kernel/debug so Brian will be happy.
nit.rc
da17dee0332375abfc1da6d74de851f906c0357b 17-Sep-2009 repo sync <san@google.com> resolved conflicts for merge of 35ad5f41 to eclair-plus-aosp
b183eb18917a099a1a9238003a5bd9c8fa9b1c10 16-Sep-2009 San Mehat <san@google.com> am 7baff71b: rootdir: init.rc: tweak cfs scheduler - disable child_runs_first

Merge commit '7baff71b0d8fe320df9143b2fa59db0af1b7aa96' into eclair-plus-aosp

* commit '7baff71b0d8fe320df9143b2fa59db0af1b7aa96':
rootdir: init.rc: tweak cfs scheduler - disable child_runs_first
35ad5f41c39c5f3af7a8f00185a13366f4901e69 16-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: *LATENCY EXPERIMENT* - Disable cgroups in favor of new scheduler policy support

Signed-off-by: San Mehat <san@google.com>
nit.rc
7baff71b0d8fe320df9143b2fa59db0af1b7aa96 16-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: tweak cfs scheduler - disable child_runs_first

Signed-off-by: San Mehat <san@google.com>
nit.rc
6088a9ad876314b14d24fc75cb9321f7b34bb5e7 11-Sep-2009 Mike Lockwood <lockwood@android.com> am 25f1a5aa: init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root

Merge commit '25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940' into eclair-plus-aosp

* commit '25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940':
init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root
25f1a5aaffd1ef6e87d53d4fd3c14ea1b6c5b940 11-Sep-2009 Mike Lockwood <lockwood@android.com> init.rc: Adjust permissions on /data/dontpanic/ so dumpstate will not need root

Change-Id: Iff83310f9411c39e1833b3d710b029b12f702993
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
3ebc52eb710c75a1ef51dca7c767701bab74a9ee 10-Sep-2009 David 'Digit' Turner <digit@google.com> am 2f21659d: Merge change 24213 into eclair

Merge commit '2f21659d4565afd65da1be07c28317a3cb4287a1' into eclair-plus-aosp

* commit '2f21659d4565afd65da1be07c28317a3cb4287a1':
Fix a bug that prevented the "generic" product builds from working in the emulator.
2f21659d4565afd65da1be07c28317a3cb4287a1 10-Sep-2009 Android (Google) Code Review <android-gerrit@google.com> Merge change 24213 into eclair

* changes:
Fix a bug that prevented the "generic" product builds from working in the emulator.
aae43f9e7582a403b8c4f20d59e26c36bbde5219 09-Sep-2009 Mike Lockwood <lockwood@android.com> am 9332482e: init.rc: Make /data/dontpanic files readable only by the system process.

Merge commit '9332482ed2945174d94615f0720f88702cb92667' into eclair-plus-aosp

* commit '9332482ed2945174d94615f0720f88702cb92667':
init.rc: Make /data/dontpanic files readable only by the system process.
9332482ed2945174d94615f0720f88702cb92667 09-Sep-2009 Mike Lockwood <lockwood@android.com> init.rc: Make /data/dontpanic files readable only by the system process.

Change-Id: If87470b7bcbb1c0774d10296ac82605db3dd9bf0
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
ca8177d81443bb93b522c1ab7ff11c0bbc2e0014 09-Sep-2009 David 'Digit' Turner <digit@google.com> Fix a bug that prevented the "generic" product builds from working in the emulator.

This also ensures that emulator-specific files /init.goldfish.rc and
/system/etc/init.goldfish.sh are never part of -user builds, which
correspond to production devices.
ndroid.mk
f914c821e15c815cca65fd837d9ee45170bced3d 06-Sep-2009 San Mehat <san@google.com> am 82a6014d: rootdir: init.rc: Allow all processes access to /data/dontpanic

Merge commit '82a6014d90c94a2032e014901917e1d503475d5e' into eclair-plus-aosp

* commit '82a6014d90c94a2032e014901917e1d503475d5e':
rootdir: init.rc: Allow all processes access to /data/dontpanic
82a6014d90c94a2032e014901917e1d503475d5e 06-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: Allow all processes access to /data/dontpanic

***STOPSHIP***

Signed-off-by: San Mehat <san@google.com>
nit.rc
410776e1cf896f152272e71900d2d022846f756f 03-Sep-2009 Mike Lockwood <lockwood@android.com> am e991decf: Merge changes 23694,23695,23696 into eclair

Merge commit 'e991decf340e24203ed63f87d9313598cd09a46c' into eclair-plus-aosp

* commit 'e991decf340e24203ed63f87d9313598cd09a46c':
init.rc: Add dumpstate service
init: Add support for enforcing setprop by caller's group.
adb: "adb bugreport" now runs dumpstate via init rather than execing it in the shell.
abe3a9c30595846b7e3d705dd4b0aca37fb2f748 03-Sep-2009 Mike Lockwood <lockwood@android.com> init.rc: Add dumpstate service

Change-Id: Iaf7094dd4693c47566c1acf860b750b762af840c
Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
991e9189a4897fd29bb7a5e4e2fb0b6e0d541e09 02-Sep-2009 San Mehat <san@google.com> am 020f35f2: rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data.

Merge commit '020f35f274594f55eec956fdcfec90ad3d7a5c65' into eclair-plus-aosp

* commit '020f35f274594f55eec956fdcfec90ad3d7a5c65':
rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data.
020f35f274594f55eec956fdcfec90ad3d7a5c65 02-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: Allow all processes access to apanic/ramconsole crash data.

This is a temporary measure until bugreports are taken as root.

*****STOPSHIP*****
Signed-off-by: San Mehat <san@google.com>
nit.rc
c6a81332c91e55bedc378534163bb8cab444d3a5 02-Sep-2009 San Mehat <san@google.com> am f26d6cea: rootdir: init.rc: Clean up dump collection

Merge commit 'f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa' into eclair-plus-aosp

* commit 'f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa':
rootdir: init.rc: Clean up dump collection
f26d6cea4cda7b959491f26ab5f67b8ca99ea7fa 01-Sep-2009 San Mehat <san@google.com> rootdir: init.rc: Clean up dump collection

Signed-off-by: San Mehat <san@google.com>
nit.rc
8c92ba1921fc8dc3fc7cc39ef854e9ee70fafc67 01-Sep-2009 Jean-Baptiste Queru <jbq@google.com> merge from open-source master
2dfe490f439e126119055e1888703cc3745f5389 31-Aug-2009 San Mehat <san@google.com> system: vold: Ensure a default vold.conf exists for generic target

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
tc/vold.conf
15681df3563dbea684b7cd27c85af5bde7cd153e 28-Nov-2008 Simon Braunschmidt <simon.braunschmidt@gmail.com> BUGFIX - ro.kernel.android.{qemud | ril} and ro.android.noril

This fixes both a typo and the fact that sh seems not to have
test or [.
(see also sh/builtins.def: ##testcmd commented out)

The handling of these properties was broken, having the effect
that the Modem in ... internal/telephony/test/Simulated*.java
was never run, even if it would have been the users/developers
intention.

See also issue #1380
http://code.google.com/p/android/issues/detail?id=1380

Signed-off-by: Simon.Braunschmidt@gmail.com>
tc/init.goldfish.sh
21541872c3cdc93e60e18ba496715f8307f990b2 27-Aug-2009 San Mehat <san@google.com> rootdir: init.rc: Copy kernel crash dumps to /data and free kernel resources

Signed-off-by: San Mehat <san@google.com>
nit.rc
7acf3386cca6dcfc22cfe45113cc5839502ad811 26-Aug-2009 Hiroshi Takekawa <sian@big.or.jp> init.rc: Fixes typo: sytem -> system.
nit.rc
6bc6794f97aa4368237f23c3d3f7cafd6a796bf3 07-Aug-2009 San Mehat <san@google.com> am ee40fc4e: rootdir: init.rc: Bump up background cpu shares to 5.0%

Merge commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5'

* commit 'ee40fc4e64e1656a16603778bee895ea389ec7d5':
rootdir: init.rc: Bump up background cpu shares to 5.0%
ee40fc4e64e1656a16603778bee895ea389ec7d5 06-Aug-2009 San Mehat <san@google.com> rootdir: init.rc: Bump up background cpu shares to 5.0%

Signed-off-by: San Mehat <san@google.com>
nit.rc
630f5f049b53c8586cca5a1acb928f83332baef5 24-Jul-2009 Jaikumar Ganesh <jaikumar@google.com> Add Bluetooth PBAP service.
nit.rc
d39e972831d45d4f8f8effd11691fd2c52d235c6 24-Jul-2009 Doug Zongker <dougz@android.com> am d52f54c4: install recovery image using patch mechanism

Merge commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f'

* commit 'd52f54c4552d2f35b3c2c2ac60350ac83760222f':
install recovery image using patch mechanism
d52f54c4552d2f35b3c2c2ac60350ac83760222f 24-Jul-2009 Doug Zongker <dougz@android.com> install recovery image using patch mechanism

With the corresponding change in build/tools, the recovery image is
installed via a shell script that is emitted by the OTA builder.
nit.rc
b44aeb7b6ad8799c31d87a6304d20f41387081a7 15-Jul-2009 Nick Pelly <npelly@google.com> Add OPUSH to register obex server.
nit.rc
eced01b171d8b1c0c3183b3b54c6e229f94a5d4e 13-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> am 160d4b05: Merge change 6738 into donut

Merge commit '160d4b0509e4566930ef9af4f2b9d63b33aebee5'

* commit '160d4b0509e4566930ef9af4f2b9d63b33aebee5':
rootdir: Remove ip-up-vpn script, which is replaced by an executable.
160d4b0509e4566930ef9af4f2b9d63b33aebee5 13-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> Merge change 6738 into donut

* changes:
rootdir: Remove ip-up-vpn script, which is replaced by an executable.
1219448dc7c2012edaf8fbb6b03c11d8dc419f89 09-Jul-2009 Chia-chi Yeh <chiachi@android.com> rootdir: Remove ip-up-vpn script, which is replaced by an executable.
ndroid.mk
tc/ppp/ip-up-vpn
3338e5511402c395d0f771e16f92a7a95c0cab82 09-Jul-2009 Mike Lockwood <lockwood@android.com> am 48d116ed: init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf

Merge commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67'

* commit '48d116edf9c785ed284626cbe0bbf5c958cf5e67':
init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf
48d116edf9c785ed284626cbe0bbf5c958cf5e67 09-Jul-2009 Mike Lockwood <lockwood@android.com> init.rc: Fix commands for allowing the system_server to access wpa_supplicant.conf

The touch command does not exist, and the chown commands are unnecessary because
the system_server is in the WIFI group.

Signed-off-by: Mike Lockwood <lockwood@android.com>
nit.rc
3bbaec5a7b7aea8a4e1bb5bde3e0b1d2bbc461c1 06-Jul-2009 Amith Yamasani <yamasani@google.com> am eefef323: Set the permissions of wifi supplicant file so that system can access it.

Merge commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa'

* commit 'eefef3234ae1e3b0f2db71415f134c7ec49899fa':
Set the permissions of wifi supplicant file so that system can access it.
91217ca5cbbf3ca2a96d596713e79f072da2c491 02-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> am 5c49135b: Merge change 5852 into donut

Merge commit '5c49135b032235f82560d5e55b0e4c547506516b'

* commit '5c49135b032235f82560d5e55b0e4c547506516b':
rootdir: Modify init.rc to run mtpd/racoon as a non-root user.
eefef3234ae1e3b0f2db71415f134c7ec49899fa 02-Jul-2009 Amith Yamasani <yamasani@google.com> Set the permissions of wifi supplicant file so that system can access it.

Create the required directories and set the correct owner and permissions.
nit.rc
51afbf583819f3bdfc96f3c66c9c3444803e792a 01-Jul-2009 Chia-chi Yeh <chiachi@android.com> rootdir: Modify init.rc to run mtpd/racoon as a non-root user.

Note that this change requires a new prebuilt kernel for AID_NET_ADMIN.
nit.rc
acc9a25ef745fce040e2e4e7adfa3d9e200aee99 30-Jun-2009 San Mehat <san@google.com> am 4322f2d7: init: Enable sched_yield() compatability mode on boot.

Merge commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029'

* commit '4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029':
init: Enable sched_yield() compatability mode on boot.
fff1092b7111e2087e68c6b26061f5a038b5160b 30-Jun-2009 Chia-chi Yeh <chiachi@android.com> am 3860b6e6: rootdir: Obsolete ppp/peers/common and racoon/racoon.conf.

Merge commit '3860b6e67c72afceddf316c0a3282f53496de8af'

* commit '3860b6e67c72afceddf316c0a3282f53496de8af':
rootdir: Obsolete ppp/peers/common and racoon/racoon.conf.
24f3a2fe8f4b63497654a774af11615cd70b4c2b 30-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am bbdab64d: Merge change 4592 into donut

Merge commit 'bbdab64ddd5341bb7f7c923bc86f43bdbc7d89dc'

* commit 'bbdab64ddd5341bb7f7c923bc86f43bdbc7d89dc':
rootdir: Remove gprs/pppd related scripts.
4322f2d74f625a0e8275ea1d2fa0d78bfc5c3029 29-Jun-2009 San Mehat <san@google.com> init: Enable sched_yield() compatability mode on boot.

In CFS, the (somewhat undefined) behavior of sched_yield() changed.

See: http://kerneltrap.org/Linux/CFS_and_sched_yield

This change enables 'compat' mode for sched_yield()

Signed-off-by: San Mehat <san@google.com>
nit.rc
3860b6e67c72afceddf316c0a3282f53496de8af 27-Jun-2009 Chia-chi Yeh <chiachi@android.com> rootdir: Obsolete ppp/peers/common and racoon/racoon.conf.
ndroid.mk
tc/ppp/peers/common
tc/racoon/racoon.conf
bbdab64ddd5341bb7f7c923bc86f43bdbc7d89dc 27-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> Merge change 4592 into donut

* changes:
rootdir: Remove gprs/pppd related scripts.
a65044fad8d668fad71769555486254eee7b8dc3 26-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am a1140ad4: Merge change 5455 into donut

Merge commit 'a1140ad45dc90e6f51944a12d0a690e757c9bd0b'

* commit 'a1140ad45dc90e6f51944a12d0a690e757c9bd0b':
Add new PPP IPCP script for VPN.
34ccf656e23038ca89dcacf29045c3e1a50639a0 26-Jun-2009 Hung-ying Tyan <tyanh@google.com> Add new PPP IPCP script for VPN.
tc/ppp/ip-up-vpn
abd54c1b78983ce425250dba137e203b7020637e 18-Jun-2009 Chia-chi Yeh <chiachi@android.com> rootdir: Remove gprs/pppd related scripts.

vpn related scripts will be updated in the next change.
ndroid.mk
tc/init.gprs-pppd
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
f1d63f3751ca787b2ebe76b6680342aa1ff3ca49 18-Jun-2009 San Mehat <san@google.com> am bfa2f8e9: init: Bump up the max cpu bandwidth shares ratio for background.

Merge commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34'

* commit 'bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34':
init: Bump up the max cpu bandwidth shares ratio for background.
bfa2f8e9b506a4b710ebcefa7c1e324609b8ca34 17-Jun-2009 San Mehat <san@google.com> init: Bump up the max cpu bandwidth shares ratio for background.

New ratio is 1024/16 (1.5625% for background when cpu is under load)

Signed-off-by: San Mehat <san@google.com>
nit.rc
6df2e9fc2e04fc1e908935190837675d6f7599a6 15-Jun-2009 Mike Chan <mike@android.com> am d709b582: remove 3G timeout values from init.rc, this should be device specific

Merge commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56'

* commit 'd709b582604e7f9d53b97f9ae13c5e12b2466c56':
remove 3G timeout values from init.rc, this should be device specific
d709b582604e7f9d53b97f9ae13c5e12b2466c56 12-Jun-2009 Mike Chan <mike@android.com> remove 3G timeout values from init.rc, this should be device specific

Signed-off-by: Mike Chan <mike@android.com>
nit.rc
9862028d79f8cd29dc69d87f3f5dbd393476bafc 12-Jun-2009 Chung-yih Wang <cywang@google.com> am 0bd9a9f5: Add the ipcp scripts for pppd and racoon configuration for ipsec-tools.

Merge commit '0bd9a9f5bcaefda8d7d37c9383b004b516009b85'

* commit '0bd9a9f5bcaefda8d7d37c9383b004b516009b85':
Add the ipcp scripts for pppd and racoon configuration for ipsec-tools.
0bd9a9f5bcaefda8d7d37c9383b004b516009b85 12-Jun-2009 Chung-yih Wang <cywang@google.com> Add the ipcp scripts for pppd and racoon configuration for ipsec-tools.

1. add ip-up/ip-down script
2. add /etc/ppp/peers/common
3. add /etc/racoon/racoon.conf
ndroid.mk
tc/ppp/ip-down
tc/ppp/ip-up
tc/ppp/peers/common
tc/racoon/racoon.conf
6f5fb6fda101cac4208e4caecee0f70680e2d996 10-Jun-2009 San Mehat <san@google.com> am 3d6f16e5: init.rc: Set default cpu shares for background scheduler group to < 1%

Merge commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919'

* commit '3d6f16e5edc9834b13a0bcc8a33c98e25518d919':
init.rc: Set default cpu shares for background scheduler group to < 1%
3d6f16e5edc9834b13a0bcc8a33c98e25518d919 10-Jun-2009 San Mehat <san@google.com> init.rc: Set default cpu shares for background scheduler group to < 1%

Signed-off-by: San Mehat <san@google.com>
nit.rc
1d36696821cd81ed7b668bb9d2b0b8a43540ccd2 06-May-2009 Jaikumar Ganesh <jaikumar@google.com> Bluez4 changes

Rename hcid to bluetoothd and change permissions.
nit.rc
720f08f3ffb27084f2a9c98d661dae53d7191ebf 09-Jun-2009 Dmitry Shmidt <dimitrysh@google.com> Add /config mounting point

Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
nit.rc
1f75d709c10f49d2e2390b888e766bcfd17da860 01-Jun-2009 Chung-yih Wang <cywang@google.com> Add VPN and Keystore services and data directories.

-- changed the default mode to 0770 for keystore with the new user 'keystore'.
-- add the keystore service providing the basic key lookup/install/remove, but
only keystore user can access the key content.
nit.rc
17df71e0b277372de1d915c168c07c8877e82395 06-Jun-2009 Christopher Tate <ctate@google.com> Add an OOM adjustment category for apps undergoing backup

In this initial commit, apps undergoing backup are treated equivalently
to apps hosting services: more important than anything other than the
foreground app.
nit.rc
653164b6a0febe3c6b8dcdf0c5367ad0fefc313f 26-May-2009 David 'Digit' Turner <digit@google.com> Modify init.goldfish.sh to launch the 'qemu-props' program when the emulator boots up.
Its purpose is to receive a list of system property (name,value) pairs and set them on launch.
tc/init.goldfish.sh
8b2cf9f04b924f299d2d250ae4d6826627847842 21-May-2009 Mathias Agopian <mathias@google.com> add bootanimation service to init.rc
nit.rc
269946c09faaff88403289bcfa2519e994f75c21 06-May-2009 San Mehat <san@google.com> init.rc: Add Nexus to services (disabled for now)

Signed-off-by: San Mehat <san@google.com>
nit.rc
4933098e22747a9066b5352273c38856b0203931 21-Apr-2009 San Mehat <san@google.com> cgroups: Initialize cgroups at startup.

Signed-off-by: San Mehat <san@google.com>
nit.rc
01161168aa87ea9f1513d2b7b1232521c84e1ea4 26-Mar-2009 Nick Pelly <> Automated import from //branches/donutburger/...@142809,142809
nit.rc
f614d64d4b4dfcd20c77ac3ccf2d9c9090a49303 19-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@140373
tc/init.goldfish.rc
nit.rc
e037fd7e193ecccbb5c0888e49f6d58c224bc11d 13-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@138607
nit.rc
2015549667fb77706a9879e974a3875ebccd8198 11-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@137873
nit.rc
e4749f30e5bd8cec727a6d7504b10fc80426316a 09-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@137197
nit.rc
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
ndroid.mk
tc/dbus.conf
tc/hosts
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/init.gprs-pppd
tc/init.testmenu
tc/mountd.conf
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
nit.rc
e54eebbf1a908d65ee8cf80bab62821c05666d70 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
ndroid.mk
tc/dbus.conf
tc/hosts
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/init.gprs-pppd
tc/init.testmenu
tc/mountd.conf
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
nit.rc
13f797da7f190e9ea52f2f3d235210b8a4963b21 11-Feb-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@130745
ndroid.mk
35237d135807af84bf9b0e5b8d7f8633e58db6f5 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
ndroid.mk
tc/dbus.conf
tc/hcid.conf
tc/init.goldfish.rc
tc/mountd.conf
nit.rc
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
ndroid.mk
tc/dbus.conf
tc/hcid.conf
tc/hosts
tc/init.goldfish.rc
tc/init.goldfish.sh
tc/init.gprs-pppd
tc/init.testmenu
tc/mountd.conf
tc/ppp/chap-secrets
tc/ppp/ip-down
tc/ppp/ip-up
nit.rc