Commit Graph

515 Commits

Author SHA1 Message Date
Keun-young Park ad999a09ab Merge "rootdir: goldfish: mount debugfs on boot time" 2013-04-05 16:19:20 +00:00
Brian Carlstrom 76c674451c Merge "resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp" into jb-mr2-dev-plus-aosp 2013-04-03 21:05:34 +00:00
Brian Carlstrom d3f0e0ae37 resolved conflicts for merge of 02e8d730 to jb-mr2-dev-plus-aosp
Change-Id: I63d6a2f975a6c0df5c238a2f7592f357441eb767
2013-04-03 14:03:13 -07:00
Geremy Condra c2594f36e7 Give system ownership of selinux load and enforce files.
This is necessary to enable remote updates.

Change-Id: I05fb979c0360eca4cc6e4add48bb42f712a1ba17
2013-04-03 11:58:12 -07:00
jwilson 8637e8186a Add OkHttp to the boot classpath.
Change-Id: I185b803b5b804ff8680ef928ce5163727adbf0bd
2013-04-02 16:23:48 -07:00
Todd Poynor 6b5de1cda2 init.rc: Set owner/perm for interactive governor io_is_busy
Change-Id: I7537d56a23ca787daf92a9d91778056f987097bd
2013-03-25 13:17:13 -07:00
Geremy Condra fb39c0d198 am 4d71493e: am e849970c: Merge "Fix mode on /data/security."
* commit '4d71493e74ed1ea39e554146351cc39e47cb5d02':
  Fix mode on /data/security.
2013-03-22 20:54:52 -07:00
William Roberts bfd71b489b Create a new location for /data policy files
Adding a new location for policy files under
/data, the new location is /data/security. The
new location is used before attempting to use
any other location.
This requires a new directory to be created by
the init script and an update to the location of
the property_contexts file for property service.

Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
2013-03-21 14:26:12 -07:00
Stephen Smalley c0317a7579 Fix mode on /data/security.
Change-Id: Id97d06a1c360c7871361db147f76b8a2eaceca42
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-21 14:25:16 -04:00
William Roberts 46e1bd89b4 Create a new location for /data policy files
Adding a new location for policy files under
/data, the new location is /data/security. The
new location is used before attempting to use
any other location.
This requires a new directory to be created by
the init script and an update to the location of
the property_contexts file for property service.

Change-Id: I955a722ac3e51fa6c1b97201b8bdef3f601cf09d
2013-03-20 19:34:55 -07:00
Jeff Sharkey fb4f7acefb Add symlink to bugreport storage location.
Change-Id: I16f024c24767cfa1f5800d568d39fb098a408127
2013-03-14 14:27:38 -07:00
Young-Ho Cha 7d312208a1 rootdir: goldfish: mount debugfs on boot time
goldfish is ported to linux-3.4 and have capability to run atrace.
But can't run atrace yet because debugfs is not mounted on boot time.

Change-Id: I0ce23bde3b8d1b2a88d4238272123e3ab8cb6970
Signed-off-by: Young-Ho Cha <ganadist@gmail.com>
2013-03-10 19:52:14 +09:00
Keun young Park f5eb803543 move goldfish stuffs to device/generic/goldfish
- each files will be pulled in emulator.mk as PRODUCT_COPY_FILES

Change-Id: I4772e2fd863e6d2663f477c3acd8a90cb95b498a
2013-03-05 11:16:36 -08:00
Glenn Kasten 65e203070c Merge "Add directory for mediaserver" 2013-02-23 01:04:33 +00:00
Glenn Kasten b0f908a957 Add directory for mediaserver
Bug: 8223560
Change-Id: Iccc6d439a848445cac0f5b30d1d663aed3f5344e
2013-02-22 14:54:45 -08:00
Nick Kralevich fe8425b5c5 am c5ce4108: am 1b64957a: Merge "init.rc: allow IPPROTO_ICMP support"
* commit 'c5ce4108facc5a1b94fcf9469a189b2cbdfd5e76':
  init.rc: allow IPPROTO_ICMP support
2013-02-22 09:44:34 -08:00
Nick Kralevich be341cc348 init.rc: allow IPPROTO_ICMP support
Allow userspace programs to create IPPROTO_ICMP sockets.

This socket type allows an unprivileged program to safely
send ICMP_ECHO messages and receive the corresponding
ICMP_ECHOREPLY messages, without relying on raw sockets or
setuid programs.

Please see http://lwn.net/Articles/443051/ for details.

In particular, this allows us to use a version of ping
which doesn't have any capabilities
(https://android-review.googlesource.com/52072).
In addition, this allows us to safely implement an IPv4 ICMP
based version of InetAddress.isReachable()
(https://code.google.com/p/android/issues/detail?id=20106)

Change-Id: I876718151efa8219c4f34f573e35e21256fe2316
2013-02-21 19:28:13 -08:00
Wink Saville 38a260547b Merge "Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip" 2013-01-29 03:10:58 +00:00
Wink Saville c0d399df69 Delete frameworks/base/voip use voip-common from frameworks/opt/net/voip
Add voip-common to BOOTCLASSPATH

Change-Id: Ieaba759a0f69b45c4b8839cbed1fe757cdf190c5
2013-01-28 15:28:20 -08:00
Benoit Goby 31c8095cac Revert "init.usb.rc: set sys.usb.config to none before changing it"
This can cause init to be stucked in a loop in very rare cases where
persist.sys.usb.config is set to "none" (because the "setprop
sys.usb.config none" action is added twice to the action list).
The original issue on encrypted devices has been fixed differently
by change # I350c5aab986f8ca86b95f316398d03012553e581

This reverts commit 80828af3de.

Change-Id: Id0a7af8dd861c8d10b80a13b540c8a339b432007
2013-01-15 17:37:32 -08:00
JP Abgrall a444041547 am ba900f2e: am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files"
* commit 'ba900f2e708f0b654cdaa827804cbb21af4e4fb4':
  init.rc: setup qtaguid group ownership of ctrl and stat files
2013-01-04 18:12:56 -08:00
JP Abgrall ba900f2e70 am fb69c2e2: Merge "init.rc: setup qtaguid group ownership of ctrl and stat files"
* commit 'fb69c2e2577e056bb7a054343a9f6d781cedbf3d':
  init.rc: setup qtaguid group ownership of ctrl and stat files
2013-01-04 18:08:24 -08:00
JP Abgrall 3e54aabc63 init.rc: setup qtaguid group ownership of ctrl and stat files
This will help get rid of android_aid.h in the kernel.
The group of the proc entries will be used in place of the default
values picked up by the xt_qtaguid netfilter module
(AID_NET_BW_STATS, AID_NET_BW_ACCT).
This change has no effect until the matching kernel changes are submitted.

Change-Id: I3c177e7b5caf9c59300eba6bd4a976634b333674
2013-01-04 15:31:20 -08:00
Todd Poynor 2b5b3bb103 rootdir: init.rc: set perms for new interactive governor attrs
/sys/devices/system/cpu/cpufreq/interactive/timer_slack
/sys/devices/system/cpu/cpufreq/interactive/target_loads

Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
2013-01-02 15:05:33 -08:00
Elliott Hughes e2aab2cce8 am 38219ee6: Merge "Track the setsebool change in the emulator init.rc."
* commit '38219ee6116943269b0501a1a0210c76e2ba69c3':
  Track the setsebool change in the emulator init.rc.
2012-12-21 18:15:01 -08:00
Elliott Hughes 334ad0ed49 Track the setsebool change in the emulator init.rc.
setsebool's syntax changed in November. This is the sole
caller in AOSP.

Change-Id: I0da608ee974bc3a9060372ef68a71c52726a44a6
2012-12-21 14:45:27 -08:00
Todd Poynor 191af2f2c3 am 367f1e4b: am 4f247d75: rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
* commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42':
  rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
2012-12-20 15:42:59 -08:00
Todd Poynor 4f247d753a rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
2012-12-19 18:15:03 -08:00
Benoit Goby 9e2182adc2 am 6d3e6099: am a2411eed: Merge "init.usb.rc: set sys.usb.config to none before changing it" into jb-mr1.1-dev
* commit '6d3e6099770c9f78264f573897a8b1923edbee63':
  init.usb.rc: set sys.usb.config to none before changing it
2012-12-06 19:00:23 -08:00
Benoit Goby 80828af3de init.usb.rc: set sys.usb.config to none before changing it
On encrypted devices, persistent properties are loaded after the device
is decrypted. To properly change sys.usb.config to its persistent value,
it must first be set to "none" and then to ${persist.sys.usb.config}.

Bug: 7678835
Change-Id: I4f91245cedc04e3178ce9cee21390f5b657733c9
2012-12-05 18:04:01 -08:00
Kenny Root 92781808ba Switch keystore to binder
Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
2012-11-13 12:19:47 -08:00
Elliott Hughes 066d3f9b3b resolved conflicts for merge of 3e5e9e9e to jb-mr1-dev-plus-aosp
Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
2012-10-22 14:35:12 -07:00
Elliott Hughes f820e85164 Add a directory for tzdata updates.
Bug: 7012465
Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
2012-10-19 18:10:05 -07:00
Zhihai Xu 9f239afc35 second user doesnot pickup input operations from A2DP
bug 7335014

Change-Id: I39e450d254647f0b84a07f38f2f2571711fca075
2012-10-16 17:32:51 -07:00
Todd Poynor 4ef6e4baa9 init.trace.rc: Set perms for power/clock_set_rate events
Bug: 7351763

Change-Id: I1ee3d7c9b55d1b55df6cafb1bf21f9139d964646
2012-10-15 17:16:55 -07:00
Matthew Xie bdec5ead74 Change dev/uhid group id from bluetooth to net_bt_stack
Secondary user need that group id to access the file to support hid
bug 7315419

Change-Id: I9d2d3d5a5114d289dc4d83c697421622db4beae6
2012-10-10 15:18:28 -07:00
Dima Zavin c6f8bd3966 Merge "rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups" into jb-mr1-dev 2012-10-08 11:30:36 -07:00
Dima Zavin ece565cca2 rootdir: init.rc: add drmrpc to surfaceflinger supplemental groups
This is necessary for some HWC hals to be able to communicate with
secure side to grant protected access to hardware owned by the
hwc. This is necessary on some architectures to grant access to
secure buffers to overlay/csc hardware

Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00
Signed-off-by: Dima Zavin <dima@android.com>
2012-10-04 17:02:28 -07:00
Matthew Xie 971153aa4a Create bluetooth stack aid for sharing gid between all bluetooth processes
bug 6925422

Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
2012-10-04 12:38:51 -07:00
Robert Greenwalt d6d478058f Add writable data space for radio.
Storing Premium SMS regex's in /data/misc/sms.
bug:7221402

Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
2012-09-27 08:16:58 -07:00
Dima Zavin 9481266ea3 init.rc: chmod slabinfo to 440 to capture slabinfo in BRs
Bug: 7232205
Change-Id: I0d785302818a37b722e79bf740644ede52c60148
Signed-off-by: Dima Zavin <dima@android.com>
2012-09-25 14:22:04 -07:00
Todd Poynor f1c50bf638 init: import init.trace.rc after h/w-specific rc
Board-specific .rc file mounts debugfs, then fixup perms on tracing
sysfs files for systrace.

Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
2012-09-24 14:26:31 -07:00
Kenny Root 5054417c10 Add /data/app-lib for native library sharing
Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
2012-09-08 22:39:44 -07:00
Jeff Sharkey 58d3980f31 Keep /mnt/secure private to default namespace.
When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE
those mountpoints when vetting is finished.  However, the kernel
doesn't allow MS_MOVE when the source is shared to child namespaces.

To work around this, create a tmpfs at /mnt/secure and mark it as
private (not shared).  Verified that vold can now successfully move
from the staging area.

Bug: 7094858
Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
2012-09-06 14:15:46 -07:00
Mike Lockwood 35ea5e4f23 import init.${ro.hardware}.rc last to allow overriding default USB configuration
Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
2012-08-28 10:25:13 -07:00
Wink Saville f824ad7b35 am 582b1152: am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
* commit '582b11527cd6d968f163fbee73f92d82b679e330':
  Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
2012-08-23 14:11:35 -07:00
Jeff Sharkey 42a1e6c9d8 Merge "Iteration on multi-user external storage." into jb-mr1-dev 2012-08-22 18:17:23 -07:00
Wink Saville 582b11527c am baba9984: Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO"
* commit 'baba99840400f5b835d44b6d91e2190136277988':
  Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
2012-08-22 15:32:17 -07:00
Wink Saville baba998404 Merge "Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO" 2012-08-22 15:00:00 -07:00
Jeff Sharkey bfcd810b79 Iteration on multi-user external storage.
Define /storage as top-level concept, so that we enforce permissions
uniformly.  Moves external storage paths from headers to per-device
environment variables.  Added missing mount flags, and we no longer
have adb-specific external storage.

Bug: 6925012
Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
2012-08-22 14:28:37 -07:00
Jeff Sharkey 61f1359486 Remove sdcard groups from services.
Even with the groups, services no longer have access.

Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
2012-08-20 14:31:47 -07:00
Jeff Sharkey 5dd0f86fbf Migrate sdcard0 to shell-accessible location.
Also remove mount() from adb, since it can come online long before
data partition is ready.  Set EXTERNAL_STORAGE environment variable
to point to owner for backwards compatibility.

Bug: 7005701
Change-Id: I63444f6636624eb7ad89f053daa289663424639e
2012-08-20 13:11:11 -07:00
Jeff Sharkey 2be5338a84 Merge "Multi-user external storage support." into jb-mr1-dev 2012-08-16 14:33:00 -07:00
Scott Anderson edb2d634b3 Merge "ueventd.rc: Add /dev/uhid for bluedroid" into jb-mr1-dev 2012-08-16 12:22:51 -07:00
Jeff Sharkey 885342a0f2 Multi-user external storage support.
Remount rootfs as recursively shared, so that mount changes are
propagated into child namespaces.  Mount external storage for access
from adb.

Clean multi-user dependencies for use in Dalvik.  Also define
external storage paths.

Bug: 6925012
Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
2012-08-15 21:10:07 -07:00
Scott Anderson 3ad289dca6 ueventd.rc: Add /dev/uhid for bluedroid
Change-Id: Ica71265856fce1abc0a0ba9c0b1ca016510c61b7
Signed-off-by: Scott Anderson <saa@android.com>
2012-08-15 15:02:00 -07:00
Keun-young Park 847cb4d125 am 8f19b11a: am c4c731e7: Merge "[MIPS] Enable SD-card functionality to work"
* commit '8f19b11a42423ecd4ac8373041f64cb3001caf78':
  [MIPS] Enable SD-card functionality to work
2012-08-14 18:29:15 -07:00
Keun-young Park 8f19b11a42 am c4c731e7: Merge "[MIPS] Enable SD-card functionality to work"
* commit 'c4c731e78ca1a3527093a35280381616d1cb667d':
  [MIPS] Enable SD-card functionality to work
2012-08-14 18:27:25 -07:00
Keun-young Park c4c731e78c Merge "[MIPS] Enable SD-card functionality to work" 2012-08-14 17:30:07 -07:00
Jean-Baptiste Queru 96539e8153 am ee0d281a: am c95c15b1: Merge "Char device /dev/dri/card0 was not created during startup."
* commit 'ee0d281a3e5fe611bdda23db18fa0e5684ee43ed':
  Char device /dev/dri/card0 was not created during startup.
2012-08-14 08:41:16 -07:00
Jean-Baptiste Queru ee0d281a3e am c95c15b1: Merge "Char device /dev/dri/card0 was not created during startup."
* commit 'c95c15b1923611f48c44c18ad158e57b9d915fdf':
  Char device /dev/dri/card0 was not created during startup.
2012-08-14 08:39:22 -07:00
Jean-Baptiste Queru c95c15b192 Merge "Char device /dev/dri/card0 was not created during startup." 2012-08-14 08:06:44 -07:00
Kenny Root 605103fb55 resolved conflicts for merge of 4dcd52ab to jb-mr1-dev
Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
2012-08-13 10:21:35 -07:00
Kenny Root 4dcd52ab11 am 297f802f: Merge "Add support for reloading policy from /data/system."
* commit '297f802f25d093274c1f5fb890ee8dfacfbf159e':
  Add support for reloading policy from /data/system.
2012-08-13 09:50:00 -07:00
Stephen Smalley ae6f3d7c05 Add support for reloading policy from /data/system.
To support runtime policy management, add support for reloading
policy from /data/system.  This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.

Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2012-08-09 09:59:10 -04:00
Colin Cross b35e36e5a9 init.rc: make last_kmsg readable only by user system and group log
chown /proc/last_kmsg to user system group log during init, and
chmod it to readable only by user and group.

Bug: 6925227
Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
2012-08-03 12:25:25 -07:00
Dima Zavin 35fc46d8e3 am 018227f5: am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android."
* commit '018227f5394c3126f4a858596cb85dee1893b895':
  Modify init.rc and init.goldfish.rc for SE Android.
2012-08-01 09:52:28 -07:00
Dima Zavin 018227f539 am ce76e2d0: Merge "Modify init.rc and init.goldfish.rc for SE Android."
* commit 'ce76e2d00e63339083ea693db33de05cbba5600e':
  Modify init.rc and init.goldfish.rc for SE Android.
2012-08-01 09:49:59 -07:00
Dima Zavin ce76e2d00e Merge "Modify init.rc and init.goldfish.rc for SE Android." 2012-08-01 09:14:42 -07:00
Benoit Goby 0245e15bb7 rootdir: Create /data/misc/adb on boot
Change-Id: I0f8d11391cdcfbaa50f87f637a2962c6663b2767
2012-07-27 14:00:02 -07:00
Benoit Goby 0574d6b077 init.rc: Add socket for adbd
Change-Id: Ic97fd464440ff4a29fc9da7ad15949ac5215ade3
2012-07-26 19:01:16 -07:00
Stephen Smalley 1eee419e7a Modify init.rc and init.goldfish.rc for SE Android.
Set the security context for the init process.
Restore the security contexts of /cache and /data in case they were reset.
Specify the security context for services launched from the rootfs since
we cannot label their executables.
If on the emulator, set a policy boolean and restore the context of
/sys/qemu_trace to allow accesses not normally permitted on a device.

Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2012-07-26 15:37:45 -04:00
Naveen Kalla e8b76a36ba Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
2012-07-26 00:26:13 -07:00
Lukasz Anaczkowski e6f8d45da8 Char device /dev/dri/card0 was not created during startup.
This device is required by libdrm for GPUs like IvyBridge.

Change-Id: I0ac47056a9cec2100f3e6eaa5591571fe6bbc145
Signed-off-by: Lukasz Anaczkowski <lukasz.anaczkowski@intel.com>
Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2012-07-23 16:08:17 -07:00
Wink Saville b3a679386d Add telephony-common and mms-common to BOOTCLASSPATH - DO NOT MERGE
Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
2012-07-17 12:23:40 -07:00
Matthew Xie 4c3ac516ff remove dbus and bluetoothd, create bluedroid data dirs
Change-Id: Ifacd570dbadc075e498a626935e035c76a0d83c4
2012-07-16 22:17:02 -07:00
Jeff Sharkey 5acf1d6625 am 87314036: am 55b763ff: Grant sdcard_r to ril-daemon.
* commit '873140368613af2d1c06e18ac2fd6fe24623b9bb':
  Grant sdcard_r to ril-daemon.
2012-07-13 12:18:34 -07:00
Jeff Sharkey 8731403686 am 55b763ff: Grant sdcard_r to ril-daemon.
* commit '55b763ff7b779d7ee91f245e0887332db8782afe':
  Grant sdcard_r to ril-daemon.
2012-07-13 12:16:44 -07:00
Jeff Sharkey 55b763ff7b Grant sdcard_r to ril-daemon.
Bug: 6793799
Change-Id: Ife23c98c30d7b08479d75798c7075005bf281119
2012-07-13 11:21:40 -07:00
Wink Saville 557ed7a487 Merge commit 'de016eef' into mit
* commit 'de016eef':
  Add telephony-common and mms-common to BOOTCLASSPATH
2012-07-11 17:54:19 -07:00
Wink Saville de016eef33 Add telephony-common and mms-common to BOOTCLASSPATH
Change-Id: Ib113b8147d20fee1ec69d68cf6a7a02d59ff4df6
2012-07-02 15:49:24 -07:00
Jamie Gennis c06be8a15d am 1e96e16f: am 0f3974c3: Merge "Enable tracing on user builds" into jb-dev
* commit '1e96e16f81ce46adf5329b1db4662b53b927d4e2':
  Enable tracing on user builds
2012-06-12 13:05:49 -07:00
Jamie Gennis 0f3974c3d0 Merge "Enable tracing on user builds" into jb-dev 2012-06-11 12:04:27 -07:00
Jamie Gennis 1279013dee Enable tracing on user builds
This change adds init.rc steps to:
 * allow kernel tracing to be enabled via adb
 * allow a limited set of kernel trace events to be enabled via adb
 * allow the kernel trace to be read via adb
 * allow all users to write to the kernel trace from userland

Bug: 6513400
Change-Id: Ic3c189b5697aa5edf88d2f507c932971bed6caff
2012-06-08 14:26:29 -07:00
Bhanu Chetlapalli a7fbf8a673 [MIPS] Enable SD-card functionality to work
Change-Id: I711f533214b9b7bce2ff1000a55d6b8f310f2399
Signed-Off-By: Bhanu Chetlapalli <bhanu@mips.com>
2012-06-07 15:15:52 -07:00
Arve Hjønnevåg 6ba76f0190 Merge "init.rc: Set owner for /sys/power/autosleep" 2012-06-06 16:42:07 -07:00
Dima Zavin 5f2d00b067 rootdir: init.rc: remove audio app/sys groups, merge to fg
With this change, the audio rr/fifo threads will just run in
the fg cgroup.

Also, the RR budget for the apps fg/bg threads has been bumped
to 80%. Ideally, the bg budget would be much smaller but there
are legacy libraries that seem to be very sensitive to this so
for now keep it at this value.

Bug: 6528015
Change-Id: I08f295e7ba195a449b96cd79d954b0529cee8636
Signed-off-by: Dima Zavin <dima@android.com>
2012-06-04 15:11:33 -07:00
Dima Zavin df44b88621 core: init.rc: create apps cgroup for fg tasks, move bg under it
Bug: 6538553
Change-Id: I7c29975aa376bcdda9d6bbd1fd3e04fdb1c1b1fe
Signed-off-by: Dima Zavin <dima@android.com>
2012-06-04 13:02:44 -07:00
Colin Cross 4c48025c48 Increase cpu.rt_runtime_us to 10% for fg and bg groups
GPS on yakju puts SCHED_RR threads in the fg and bg groups, and
is unhappy with 0.1% limits.  Increase the limits to 10%.

Change-Id: I971c9b0a815890d41694b965fdd2b023937a4411
2012-05-16 13:49:30 -07:00
Todd Poynor 50efaf2f7f Merge "init: Set perms for interactive cpufreq governor boostpulse" into jb-dev 2012-05-11 15:54:13 -07:00
Colin Cross 367e7b195b Increase rt_runtime_us to 1000 for foreground and bg_non_interactive
rt_runtime_us=0 can cause deadlocks if a SCHED_FIFO/SCHED_RR thread
is moved into the wrong cgroup.

Change-Id: I4633392fb529039dff6ba5d3a6b672e0de9fc2d9
2012-05-10 13:56:43 -07:00
Todd Poynor 4ff10e63c3 init: Set perms for interactive cpufreq governor boostpulse
Change-Id: Ia4b028f58f9d48bad2525744497f10884d11c5d6
2012-05-03 15:20:48 -07:00
Arve Hjønnevåg 70a163f519 init.rc: Set owner for /sys/power/autosleep
Change-Id: Ia18cce973c71e7561ca84b23e37b0b8e056a7143
2012-05-02 18:00:34 -07:00
Glenn Kasten 7e057eb004 Merge "Increase budget" into jb-dev 2012-05-01 16:18:15 -07:00
Jeff Tinker 94a55df34d Merge "Fix failure to play pinned movies" into jb-dev 2012-05-01 15:11:47 -07:00
Glenn Kasten 59e6eb0999 Increase budget
Change-Id: I6706a408990abf8d420db73280df2818b8827140
2012-05-01 13:36:32 -07:00
Jeff Tinker 65f1fbcad3 Fix failure to play pinned movies
DRM server process needs to be able to access movies on sdcard
to acquire rights.

related-to-bug: 6414503

Change-Id: If90404e32fd437b8fb7d5a6ec8dfb30a499ef733
2012-04-30 22:10:12 -07:00
Todd Poynor 33045a627d init: Set perms for cpufreq interactive governor input boost sysfs
Change-Id: Ie475c95d81635a068db11e7018895024247878b4
2012-04-27 20:28:44 -07:00
Nick Kralevich 25dd43a9a5 Restrict zygote to system user.
CVE-2011-3918: Address denial of service attack against Android's
zygote process. This change enforces that only UID=system can
directly connect to zygote to spawn processes.

Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
2012-04-27 14:18:02 -07:00
Todd Poynor 8d3ea1d1e1 init: set perms for cpufreq interactive governor boost -- DO NOT MERGE
Change-Id: I6509cda358b4a75706afd01a5b5a36eabe492554
Signed-off-by: Todd Poynor <toddpoynor@google.com>
2012-04-25 18:20:31 -07:00
Kenny Root f8bbaba57b Add directory for forward locked apps in ASECs
Forward locked apps on internal storage will be stored in ASEC
containers using ext4. This way permissions can be preserved whether on
internal or external storage.

Change-Id: I942f8f0743c210330a11e2b1d0204df7a5ddb2ae
2012-04-25 14:18:25 -07:00
Glenn Kasten b91bd9f599 Update cgroups
Change-Id: If4488944e8a1c8af7b13847069d03b7ea4a30785
2012-04-23 17:36:34 -07:00
Todd Poynor f35c203558 init.rc: Set perms for cpufreq interactive governor above_hispeed_delay
Change-Id: Ib9c3fb4e43759af590a6e033b8ba04c0023d5f07
2012-04-19 13:17:24 -07:00
Mike Lockwood b47cd10acf Merge "init.rc: Add support for new USB accessory configurations" 2012-04-17 10:40:09 -07:00
Robert Greenwalt 5fa860dea3 Merge "Add MDNS service" 2012-04-12 16:48:11 -07:00
Todd Poynor 6a35bb3529 Merge "init.rc: Set owner and permissions for cpufreq files" 2012-04-11 15:28:57 -07:00
Todd Poynor 0653b97b25 init.rc: Set owner and permissions for cpufreq files
Change-Id: Iaaf8491915567dbe22cab1798081a00fed4fb2e2
2012-04-11 14:50:09 -07:00
Mike Lockwood 4f5d5176a3 init.rc: Add support for new USB accessory configurations
Also moved USB scripts to new file init.usb.rc

Change-Id: I98e099fbd8de3eb3e1e18c9ef69312608033a50c
Signed-off-by: Mike Lockwood <lockwood@google.com>
2012-04-11 12:35:49 -07:00
Jamie Gennis db49739f39 Add tracing initialization to init.rc.
This change adds init.rc steps to allow kernel tracing to support inserting
messages from any userland process.

Change-Id: I01970728d7132a25408fed09a213a015ac05ccaf
2012-04-10 15:52:39 -07:00
Robert Greenwalt 1d91fcf7c0 Add MDNS service
Adds both the new service and another socket for netd.

Change-Id: Ie0271a2c48aa55217ae3fcdcc8e121b86b5a589b
2012-04-06 15:38:21 -07:00
Nick Kralevich c8583c680a Merge "change files in /dev/log/ to 666" 2012-03-29 10:40:00 -07:00
Nick Kralevich 3439cc6145 change files in /dev/log/ to 666
With newer Android kernels, anyone can read from the files in
/dev/log. If you're in the logs group (have the READ_LOGS) permission,
you'll see all entries. If you're not in that group, you'll see
log messages associated with your UID.

Relax the permissions on the files in /dev/log/ to allow an application
to read it's own log messages.

Bug: 5748848
Change-Id: Ie740284e96a69567dc73d738117316f938491777
2012-03-29 09:32:33 -07:00
Marius Renn 71513567dc Multi-Project Commit: Move of filterfw out of system/media (6 of 7)
This is part of the multi-project commit to move the filter-framework
from system/media/mca to frameworks/base/media/mca.

Note that the filter-framework will soon be replaced with a refactored
version currently under API review (also to go under frameworks/base).
This move is done now to unblock the PDK efforts.

Change-Id: I87d034a30bb4b98a85a028cb728e37fb97256039
2012-03-27 10:56:06 -07:00
Nick Kralevich 31fb858654 Merge "drmserver: add group drm" 2012-03-26 13:06:12 -07:00
Benoit Goby 62e5cbaebc Merge "Revert "Reimplement the "adb root" command to more closely match its previous behavior"" 2012-03-26 12:56:49 -07:00
Nick Kralevich 3c9eed88c5 drmserver: add group drm
Make the drm server run as UID=drm, GID=drm. This ensures that
any files created by the drmserver app do not have GID=system.

Bug: 5834297
Change-Id: I3409ad350e9cc82bb0982cdbe470ec1f10b1ca67
2012-03-26 11:30:03 -07:00
Kenny Root 2affe824ba Merge "Put keystore into the drmrpc group" 2012-03-21 17:54:16 -07:00
Mike Lockwood 9865be95cf Merge commit '19155b5'
Do not start sshd by default

Change-Id: I22e6dbb6834321709e9b7c5ae49846d7f9f7c67a
2012-03-21 16:30:54 -07:00
Mike Lockwood a9bb7261b4 Merge commit '9dd2eef'
sshd to init.rc

Change-Id: I8eedc3b47f1260502034067d9006cac827cb1089
2012-03-21 16:28:04 -07:00
Mike Lockwood 19155b5cd3 init.rc: Do not start sshd by default
Change-Id: Ieacd4e8fbfcd91ed2342b7a104a9b1f4114fc6d5
Signed-off-by: Mike Lockwood <lockwood@google.com>
2012-03-21 11:58:05 -07:00
Arve Hjønnevåg 1670f831a5 init.rc: Fix permissions on /sys/power/state and /sys/power/wakeup_count
Change-Id: I06a1a2affebdf64f008eaa61a0851f1e832059c5
2012-03-20 20:34:24 -07:00
Benoit Goby 7941cf87f6 Revert "Reimplement the "adb root" command to more closely match its previous behavior"
This reverts commit 535164e9d9.
2012-03-16 15:30:05 -07:00
Nick Kralevich f3ef1271f2 init.rc: Add documentation
Android developers should never place files in /data/local/tmp.
Files or directories in /data/local/tmp can be minipulated by the
shell user.

Android developers should never create world-writable files
or directories. This is a common source of security vulnerabilities.

Change-Id: I6d2cd620ab49d8ca3f39282f7d2ed682a9ba91c3
2012-03-14 15:36:47 -07:00
Kenny Root ad5b9c7205 Put keystore into the drmrpc group
The keystore service needs to access hardware crypto devices to
fulfill its function on devices with hardware crypto. This role
was assigned to the (now misnamed) drmrpc group.

Change-Id: Ia32f9e96b4372f0974984451680f9a0f6157aa01
2012-03-13 15:51:04 -07:00
Chia-chi Yeh 89c5926f08 am 0b32a75b: am c8d1a0e1: am 5ebced39: init.rc: update the permission of /data/local.
* commit '0b32a75b7c7f25bd9ab325f44626c402fd9b9b23':
  init.rc: update the permission of /data/local.
2012-03-08 14:31:23 -08:00
Chia-chi Yeh c8d1a0e18e am 5ebced39: init.rc: update the permission of /data/local.
* commit '5ebced39093d1223566166b8cc6abfe6729c487d':
  init.rc: update the permission of /data/local.
2012-03-08 14:27:08 -08:00
Chia-chi Yeh 5383476727 am 5ebced39: init.rc: update the permission of /data/local.
* commit '5ebced39093d1223566166b8cc6abfe6729c487d':
  init.rc: update the permission of /data/local.
2012-03-08 14:26:47 -08:00
Chia-chi Yeh 5ebced3909 init.rc: update the permission of /data/local.
Bug: 6131945
Change-Id: I3094a471dcfb02b786f47b6778c8fed3726325ec
2012-03-07 15:13:39 -08:00
Nick Kralevich e7fd911fd4 Restrict zygote to system user.
CVE-2011-3918: Address denial of service attack against Android's
zygote process. This change enforces that only UID=system can
directly connect to zygote to spawn processes.

Change-Id: I89f5f05fa44ba8582920b66854df3e79527ae067
2012-01-27 13:06:53 -08:00
James Dong dae26c6ac4 am 3e9c9ac5: am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1
* commit '3e9c9ac5ee7a36653b90cb86eb6445496b536c16':
  Close a security hole - do not give world readable/writable access to /data/drm
2012-01-11 16:19:37 -08:00
James Dong d95c615219 am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1
* commit '032afc1d52289f486538c9ed53f17b9889ea94df':
  Close a security hole - do not give world readable/writable access to /data/drm
2012-01-11 16:18:16 -08:00
James Dong 3e9c9ac5ee am 032afc1d: Merge "Close a security hole - do not give world readable/writable access to /data/drm" into ics-mr1
* commit '032afc1d52289f486538c9ed53f17b9889ea94df':
  Close a security hole - do not give world readable/writable access to /data/drm
2012-01-11 16:18:11 -08:00
Dima Zavin f90b0e04a6 rootdir: convert all usages of $prop to ${prop}
Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5
Signed-off-by: Dima Zavin <dima@android.com>
2012-01-11 04:36:13 -08:00
Dima Zavin 3e7b7739e3 init: import the hardware specific init file in init.rc
This removes the hardcoding of the file import in init and instead
allows the init.rc file to fully control what is loaded.

Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2
Signed-off-by: Dima Zavin <dima@android.com>
2012-01-11 04:35:58 -08:00
Dima Zavin 683a09352a rootdir: convert all usages of $prop to ${prop}
Change-Id: Ic2472606e869d23c0f499a192cd7bb21ca3cf5b5
Signed-off-by: Dima Zavin <dima@android.com>
2012-01-10 09:37:55 -08:00
James Dong 09cdc0ea12 Close a security hole - do not give world readable/writable access to /data/drm
o related-to-bug: 5834297

Change-Id: I8e459610b4f69999be37364c2359b2bac82d4a2a
2012-01-06 15:20:20 -08:00
Dima Zavin 7634bf87cf init: import the hardware specific init file in init.rc
This removes the hardcoding of the file import in init and instead
allows the init.rc file to fully control what is loaded.

Change-Id: I933e5bbab57f1e8705a370d660f92c6508da94d2
Signed-off-by: Dima Zavin <dima@android.com>
2012-01-05 15:02:00 -08:00
Mike Lockwood 9dd2eef07b add sshd to init.rc
Change-Id: Ide6e8cca58f090e84d85d0298058c523863d1c43
Signed-off-by: Mike Lockwood <lockwood@google.com>
2011-12-29 11:48:04 -05:00
Nick Kralevich 27cca21a5d set mmap_min_addr to 32768
Bug: 5712789
Change-Id: I586a99cd63d8fba06bc2562b1cfce531ee4f554c
2011-12-06 08:31:17 -08:00
Nick Kralevich f9557fba34 Set /proc/sys/kernel/dmesg_restrict to 1
Set dmesg_restrict to 1 to help limit inadvertent information leaks
from the kernel to non-privileged programs.  Root and programs with
CAP_SYSLOG will continue to have access to dmesg output.

See "dmesg_restrict" in Documentation/sysctl/kernel.txt from the
Linux kernel source code.

Bug: 5585365
Change-Id: Iffcf060ea4bd446ab9acf62b8b61d315d4ec4633
2011-11-08 14:46:19 -08:00
Nick Kralevich 1e339a710e Merge "Set kptr_restrict to 2." 2011-11-08 11:39:43 -08:00
Dima Zavin 3c58933aa7 am 4a253908: rootdir: init.rc: write default oom_adj before starting ueventd
* commit '4a2539085062a715b0d345eb50ea48738423c909':
  rootdir: init.rc: write default oom_adj before starting ueventd
2011-11-07 17:32:02 +00:00
Dima Zavin 4a25390850 rootdir: init.rc: write default oom_adj before starting ueventd
Otherwise, ueventd's oom_adj value would have been 0 and it could
easily get killed early during low memory events

Change-Id: I1adbd18c37215b26ae77e70f7b8dbd1e143fc2d4
Signed-off-by: Dima Zavin <dima@android.com>
2011-11-04 12:45:56 -07:00
Nick Kralevich 2e7c833279 Set kptr_restrict to 2.
To make writing kernel exploits harder, set /proc/sys/kernel/kptr_restrict
to "2". This prohibits users from accessing kernel symbols via /proc/kallsyms

Bug: 5555668
Change-Id: Ib31cb6fcb4d212a0b570ce9e73ae31f721ed801b
2011-11-02 09:24:27 -07:00
Mathias Agopian 04a875902e restart surfaceflinger and drmserver when servicemanager dies
Bug: 5450389

Change-Id: Ib4e73836721e25e2a88185167b030ea75e0d74e3
2011-10-31 14:27:47 -07:00
sinikang 8cdd4c335f am aa75df74: [maguro] : add setprop net.tcp.buffersize.hspa
* commit 'aa75df74db5beffd25821ed6c360c36197d7bac1':
  [maguro] : add setprop net.tcp.buffersize.hspa
2011-10-17 17:03:15 -07:00
sinikang aa75df74db [maguro] : add setprop net.tcp.buffersize.hspa
-window size optimized for hspa
-Patchset2 : space removed

Change-Id: Ia4d1043d1a93c929721a4d7cca60ce9ff8bbf67a
Signed-off-by: sinikang <sinikang@samsung.com>
2011-10-17 15:56:02 -07:00
Nick Kralevich d707fb3fb6 enable heap randomization.
Bug: 5250555

Change-Id: I7acb0645402611875c481aec33ece85fced7a336
2011-10-11 15:35:39 -07:00
Wink Saville 4e803c3c18 Merge "Add log group to rild to improve log collection on modem issue" 2011-10-10 12:24:48 -07:00
Jeffrey Tinker f791e17bc9 Merge "Add drmrpc group to mediaserver and drmserver so they can make the drm rpc calls" 2011-10-07 19:40:35 -07:00