Jeff Sharkey
aa4a3228f0
am 9729b415: am 44d6342c: Remove mkdir() side effect, add .nomedia, utils.
...
* commit '9729b41574ca5e5e87c86b203a2096cbdc72cfea':
Remove mkdir() side effect, add .nomedia, utils.
2013-09-20 15:59:37 -07:00
Jeff Sharkey
9729b41574
am 44d6342c: Remove mkdir() side effect, add .nomedia, utils.
...
* commit '44d6342caa0db1f613809e9ba1ea8d9af0183b74':
Remove mkdir() side effect, add .nomedia, utils.
2013-09-20 15:57:58 -07:00
Jeff Sharkey
44d6342caa
Remove mkdir() side effect, add .nomedia, utils.
...
Before this change, FUSE lookup() would have the side effect of
creating the directory on behalf of apps. This resulted in most
directories being created just by Settings trying to measure disk
space. Instead, we're switching to have vold do directory creation
when an app doesn't have enough permissions.
Create fs_mkdirs() utility to create all parent directories in a
path as needed. Allow traversal (+x) into /storage directories.
Fix FUSE derived permissions to be case insensitive. Mark well-known
directories as .nomedia when created.
Bug: 10577808, 10330221
Change-Id: I53114f2e63ffbe6de4ba6a72d94a232523231cad
2013-09-20 14:21:09 -07:00
Nick Kralevich
5660da25b9
am 1998e505: am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."
...
* commit '1998e505a98ad445bead87c2bb047053f1aea648':
Do not change ownership of /sys/fs/selinux/load to system UID.
2013-09-19 08:54:12 -07:00
Nick Kralevich
1998e505a9
am 2e940286: am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."
...
* commit '2e9402863b40fe8bf2ddd8169c62f2419d968ff9':
Do not change ownership of /sys/fs/selinux/load to system UID.
2013-09-19 08:51:49 -07:00
Nick Kralevich
2e9402863b
am 0f507339: Merge "Do not change ownership of /sys/fs/selinux/load to system UID."
...
* commit '0f507339ec474a2f67227466efc9045630f1f1a4':
Do not change ownership of /sys/fs/selinux/load to system UID.
2013-09-19 08:50:21 -07:00
Stephen Smalley
cc13e8ab87
Do not change ownership of /sys/fs/selinux/load to system UID.
...
Policy reload is handled by setting the selinux.reload_policy property
and letting the init process perform the actual loading of policy into
the kernel. Thus, there should be no need for the system UID to directly
write to /sys/fs/selinux/load.
Change-Id: I240c5bb2deaee757a2e1e396e14dea9e5d9286f5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-09-19 11:26:26 -04:00
Nick Kralevich
5d4be69093
am 0e7bd81c: am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev
...
* commit '0e7bd81c938611cfa4ebf44870668300a5bba875':
Initialize /dev/urandom earlier in boot.
2013-09-18 12:53:11 -07:00
Nick Kralevich
0e7bd81c93
am 4f18183b: Merge "Initialize /dev/urandom earlier in boot." into klp-dev
...
* commit '4f18183bd6d3d2ed5d698c176ecc239211bdb82e':
Initialize /dev/urandom earlier in boot.
2013-09-18 12:50:32 -07:00
Nick Kralevich
b410eb1913
Initialize /dev/urandom earlier in boot.
...
It's a security best practice to carry entropy across reboots.
(see "man 4 random"). Currently, entropy saving and mixing occur
in the system_server, via the EntropyMixer code. Unfortunately, the
EntropyMixer code runs fairly late in the boot process, which means
early boot doesn't have high quality entropy. This has caused security
problems in the past.
Load entropy data as soon as we can in the early boot process, so that
we can get /dev/random / /dev/urandom into a "random" state earlier.
Bug: 9983133
Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
2013-09-18 07:53:51 -07:00
Todd Poynor
59e51e792a
init.rc: no longer start healthd in charger mode
...
Being moved to healthd/charger mode in board-specific init.rc.
Change-Id: Ie9fc2e5abc1737fbffec8fb071c73f5fd96e4d17
2013-09-17 14:41:07 -07:00
Rom Lemarchand
8d0a92ddc5
am 342077e7: am 67b00d8b: init.rc: change mem cgroups permissions
...
* commit '342077e78da9411c252232313bc40fb4ce5f6137':
init.rc: change mem cgroups permissions
2013-09-10 17:54:57 -07:00
Rom Lemarchand
342077e78d
am 67b00d8b: init.rc: change mem cgroups permissions
...
* commit '67b00d8b2d96e8133c249bcbc0fb63c49e10e022':
init.rc: change mem cgroups permissions
2013-09-10 17:51:44 -07:00
Rom Lemarchand
67b00d8b2d
init.rc: change mem cgroups permissions
...
Changing mem cgroups permissions to only be accessible by root and system.
Bug: 10210529
Bug: 10210900
Change-Id: Ib4fff6f49b33013b3629d40ae98a5e2464571b2d
2013-09-10 17:41:21 -07:00
Todd Poynor
aacded7019
init.rc: start lmkd
...
Change-Id: Ibebab31e1f41a210821834a1d65f196b39bb6601
2013-08-30 15:32:09 -07:00
Stephen Smalley
6552f6885f
Trigger a policy reload from post-fs-data.
...
Once userdata is available and decrypted, trigger a policy reload to pick
up any policy update files stored under /data/security.
Change-Id: Ic2b3121c3395429b108c40d1d7f5a3124a5896c5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-08-26 10:45:05 -04:00
Colin Cross
a34f1391bd
am 30caffc0: resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp
...
* commit '30caffc025aff450ebb354ee693174cc1732732b':
Handle policy reloads within ueventd rather than restarting it.
2013-08-23 14:42:21 -07:00
Colin Cross
30caffc025
resolved conflicts for merge of a1af5cf6 to klp-dev-plus-aosp
...
Change-Id: I08e9898940f7cdd466469b76760807cc5d5c67e4
2013-08-23 14:39:39 -07:00
Colin Cross
a1af5cf6d1
am d8d99c45: Merge "Handle policy reloads within ueventd rather than restarting it."
...
* commit 'd8d99c45b704399d50ae0a5e4df938d825c70cfa':
Handle policy reloads within ueventd rather than restarting it.
2013-08-23 14:33:46 -07:00
Jeff Brown
46a24db563
Remove input flinger stubs. (DO NOT MERGE)
...
Bug: 10446930
Change-Id: I88b926380dbe1e866c0b87ec95b3489d87c5907b
2013-08-22 18:38:35 -07:00
Todd Poynor
13f4c9fb27
healthd: normal and charger mode startup
...
Command line flag -n tells healthd not to use (or wait for) servicemanager
in charger mode.
Change-Id: I255f9597dff6fc904f5ed20fd02f52c0531d14f8
2013-07-26 23:56:17 +00:00
Colin Cross
5ba57f9a95
Merge "add property to adjust extra_free_kbytes kernel vm tunable"
2013-07-26 23:07:00 +00:00
Stephen Smalley
e2eb69db6d
Handle policy reloads within ueventd rather than restarting it.
...
Restarting ueventd upon policy reloads has reportedly created
stability problems for some users and could cause events to be lost.
Stop restarting ueventd and instead handle policy reloads within ueventd.
Also stops restarting installd upon policy reloads.
Change-Id: Ic7f310d69a7c420e48fbc974000cf4a5b9ab4a3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-07-26 15:39:41 -04:00
Colin Cross
57fdb5cfd2
add property to adjust extra_free_kbytes kernel vm tunable
...
ActivityManager can't directly write to extra_free_kbytes because
/proc/sys rejects all chown and chmod syscalls. Proxy the writes
through init by using the sys.sysctl.extra_free_kbytes property.
Bug: 10024467
Change-Id: I441e00478421254355fcafb252bc878166483d4c
2013-07-25 18:22:30 -07:00
Ying Wang
5748ee972d
Generate init.environ.rc by populating BOOTCLASSPATH
...
- BOOTCLASSPATH now is derived from PRODUCT_BOOT_JARS, which is a product
configuration variable set up by the core build system.
- Moved files from the legacy ALL_PREBUILT to PRODUCT_COPY_FILES in
build/target/product/embedded.mk.
Bug: 9990214
Change-Id: I98bac36c1ca8c779dda572a0a5e0a22b7e4c4a7a
2013-07-24 12:11:47 -07:00
Robert Greenwalt
f498ec8faf
am dafa66af: am 2aa33a3d: Add writable data space for radio.
...
* commit 'dafa66afdd3729e2c65ccb8dced8ca3e137db437':
Add writable data space for radio.
2013-07-19 16:02:06 -07:00
Robert Greenwalt
dafa66afdd
am 2aa33a3d: Add writable data space for radio.
...
* commit '2aa33a3dbd1147558098d9a2948450d363ffe468':
Add writable data space for radio.
2013-07-19 13:42:54 -07:00
Jeff Brown
57fc1ceebc
Split framework jar.
...
Change-Id: I590de05f23669cf625030b479c786423f21c6159
2013-07-17 20:30:12 -07:00
Robert Greenwalt
2aa33a3dbd
Add writable data space for radio.
...
Storing carrier provisioning urls updates in /data/misc/radio.
bug:9623159
Change-Id: I8d62d4638229733dea0f11f1729c4d22ae2295d1
I36697ed341353b7a3dbec5afe20241102e76f6f1
2013-07-16 17:18:46 -07:00
Jeff Brown
3884a9b252
init.rc: Add input flinger.
...
Change-Id: Ibcb1116bdcd9189272db620910b9958c8ffb4552
2013-07-15 15:08:39 -07:00
Rom Lemarchand
4a291b339e
Merge "init.rc: configure memory cgroups"
2013-07-15 21:11:40 +00:00
Nick Kralevich
56adf99267
am 9a4913d4: init.rc: remove "on fs" section
...
* commit '9a4913d422f4c18033333afe8e2e1d699b112d44':
init.rc: remove "on fs" section
2013-07-15 13:28:44 -07:00
Rom Lemarchand
435a52ef07
init.rc: configure memory cgroups
...
Create the memory cgroups folders and configure them
Change-Id: I06c4bb486b204f7e98b0bc6757deec8bd7f6349e
2013-07-15 12:43:47 -07:00
Nick Kralevich
9a4913d422
init.rc: remove "on fs" section
...
This was only ever used by the emulator. Now the emulator
uses an fstab file.
Change-Id: I1a071e567e1f1a379f9c8079cc2dc17660d8455f
2013-07-12 13:48:50 -07:00
Nick Kralevich
e1dbdd6978
am 7d6ddc7d: am 2713be91: am fb1c9cf6: Merge "use ext4 instead of yaffs"
...
* commit '7d6ddc7d395e909d841bb7eadfc12a167076aecf':
use ext4 instead of yaffs
2013-07-12 11:22:00 -07:00
Nick Kralevich
2713be91a8
am fb1c9cf6: Merge "use ext4 instead of yaffs"
...
* commit 'fb1c9cf6fa4efafb3e0c6b0bc93c7f087d926a48':
use ext4 instead of yaffs
2013-07-12 11:18:26 -07:00
Nick Kralevich
f4c1512db8
use ext4 instead of yaffs
...
This is needed to allow the emulator to use ext4 images.
Bug: https://code.google.com/p/android/issues/detail?id=38561
Change-Id: I02fde6382ad67cf7f4f3b695396841f70bb9301d
2013-07-09 18:06:11 -07:00
Colin Cross
fafcabd0dd
Merge "Added net.dns1 prop for emulator, as Android emulator ignores it by default."
2013-07-03 22:35:42 +00:00
Torne (Richard Coles)
317ec9246b
Add webviewchromium to BOOTCLASSPATH.
...
Add /system/framework/webviewchromium.jar to BOOTCLASSPATH. This jar
contains the implementation classes for the new WebView. It has been
processed with jarjar to ensure that it doesn't define any classes
outside of com.android.
Change-Id: If65913638df0088f4dd7d62a087750b90038a7fb
2013-06-06 14:16:44 +01:00
Colin Cross
7195246131
am 5f1a938e: am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"
...
* commit '5f1a938e9c65829c3afebb4d92c8e93caecc3e11':
init.rc: remove duplicated led-related nodes
2013-05-20 18:26:11 -07:00
Colin Cross
5f1a938e9c
am 3d8e8c14: am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"
...
* commit '3d8e8c147b41dbc6a5e4edf6da1610a83623b5b2':
init.rc: remove duplicated led-related nodes
2013-05-20 18:24:21 -07:00
Colin Cross
3d8e8c147b
am 9246f8d6: Merge "init.rc: remove duplicated led-related nodes"
...
* commit '9246f8d6def40a50933a980fac773a909f2138d7':
init.rc: remove duplicated led-related nodes
2013-05-20 18:16:45 -07:00
gcondra@google.com
1e47a74668
am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status."
...
* commit '253e91b4ffb631b188fdac0c1624786103471f05':
Revert "Add persistent property for SELinux enforcment status."
2013-05-20 16:35:35 -07:00
gcondra@google.com
acef650dbc
am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition."
...
* commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1':
Revert "Reload policy after setting up the data partition."
2013-05-20 16:35:34 -07:00
gcondra@google.com
9a8cb3abf8
am b9866649: am 52351300: Revert "Add a version check for SELinux policy on device."
...
* commit 'b9866649e24d7b6eedcaf2e03ffc605a3417537d':
Revert "Add a version check for SELinux policy on device."
2013-05-20 16:35:33 -07:00
gcondra@google.com
253e91b4ff
am 477e35d6: Revert "Add persistent property for SELinux enforcment status."
...
* commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6':
Revert "Add persistent property for SELinux enforcment status."
2013-05-20 15:52:28 -07:00
gcondra@google.com
43329bc1c9
am 8a387870: Revert "Reload policy after setting up the data partition."
...
* commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8':
Revert "Reload policy after setting up the data partition."
2013-05-20 15:52:27 -07:00
gcondra@google.com
b9866649e2
am 52351300: Revert "Add a version check for SELinux policy on device."
...
* commit '52351300d156826bf22c493828571f45a1cea16a':
Revert "Add a version check for SELinux policy on device."
2013-05-20 15:52:26 -07:00
Sungmin Choi
a8d392da91
init.rc: remove duplicated led-related nodes
...
Change-Id: Ibee7ef9137594fc4c30d3ab6ee7bdf3515836c62
2013-05-19 21:56:36 -07:00
repo sync
477e35d6d5
Revert "Add persistent property for SELinux enforcment status."
...
This reverts commit b89bdfde42 .
2013-05-17 12:48:18 -07:00