| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
/sys/devices/system/cpu/cpufreq/interactive/timer_slack
/sys/devices/system/cpu/cpufreq/interactive/target_loads
Change-Id: Ia5d5c3d615ad64bab3a1317e5de2ac9a6d61679e
|
|\
| |
| |
| |
| | |
* commit '38219ee6116943269b0501a1a0210c76e2ba69c3':
Track the setsebool change in the emulator init.rc.
|
| |
| |
| |
| |
| |
| |
| | |
setsebool's syntax changed in November. This is the sole
caller in AOSP.
Change-Id: I0da608ee974bc3a9060372ef68a71c52726a44a6
|
|\ \
| | |
| | |
| | |
| | |
| | |
| | | |
boostpulse_duration
* commit '367f1e4b0aaaf7f725e686b5b40845cbb5c07a42':
rootdir: init.rc: set perms for cpufreq governor boostpulse_duration
|
| | |
| | |
| | |
| | | |
Change-Id: I09b9a1ed548e4ffe1232f583e8ff5f026760f616
|
|\ \ \
| |/ /
| | /
| |/
|/|
| |
| | |
before changing it" into jb-mr1.1-dev
* commit '6d3e6099770c9f78264f573897a8b1923edbee63':
init.usb.rc: set sys.usb.config to none before changing it
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
On encrypted devices, persistent properties are loaded after the device
is decrypted. To properly change sys.usb.config to its persistent value,
it must first be set to "none" and then to ${persist.sys.usb.config}.
Bug: 7678835
Change-Id: I4f91245cedc04e3178ce9cee21390f5b657733c9
|
| |
| |
| |
| | |
Change-Id: I1607bc1f14af5115cefd6727be3815cdcce670a8
|
|\ \
| |/
|/|
| | |
Change-Id: I621d0e984a266478b4297a25afd164c1275e30f9
|
| |
| |
| |
| |
| | |
Bug: 7012465
Change-Id: I7e2c9965a4bcad125ca4fb788b842bd114b5619c
|
| |
| |
| |
| |
| |
| | |
bug 7335014
Change-Id: I39e450d254647f0b84a07f38f2f2571711fca075
|
| |
| |
| |
| |
| |
| | |
Bug: 7351763
Change-Id: I1ee3d7c9b55d1b55df6cafb1bf21f9139d964646
|
| |
| |
| |
| |
| |
| |
| | |
Secondary user need that group id to access the file to support hid
bug 7315419
Change-Id: I9d2d3d5a5114d289dc4d83c697421622db4beae6
|
|\ \
| | |
| | |
| | | |
into jb-mr1-dev
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This is necessary for some HWC hals to be able to communicate with
secure side to grant protected access to hardware owned by the
hwc. This is necessary on some architectures to grant access to
secure buffers to overlay/csc hardware
Change-Id: I4e4becba5b4a80310ce8932edea5d0d046fa9b00
Signed-off-by: Dima Zavin <dima@android.com>
|
|/ /
| |
| |
| |
| |
| | |
bug 6925422
Change-Id: I8d371f8307dd6bea3909a56643819413ea829a98
|
| |
| |
| |
| |
| |
| |
| | |
Storing Premium SMS regex's in /data/misc/sms.
bug:7221402
Change-Id: Ica8ba7be8aa5321f3e6ed820a0dddc01f77d2cfb
|
| |
| |
| |
| |
| |
| | |
Bug: 7232205
Change-Id: I0d785302818a37b722e79bf740644ede52c60148
Signed-off-by: Dima Zavin <dima@android.com>
|
| |
| |
| |
| |
| |
| |
| | |
Board-specific .rc file mounts debugfs, then fixup perms on tracing
sysfs files for systrace.
Change-Id: Ifbedb4ecdb543cd6c48df00b1a34415349951b6f
|
| |
| |
| |
| | |
Change-Id: I7419676d987178fd2422c50d74f966e27af9f62e
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
When vold mounts things in /mnt/secure/staging, it expects to MS_MOVE
those mountpoints when vetting is finished. However, the kernel
doesn't allow MS_MOVE when the source is shared to child namespaces.
To work around this, create a tmpfs at /mnt/secure and mark it as
private (not shared). Verified that vold can now successfully move
from the staging area.
Bug: 7094858
Change-Id: I5e05b1005c63efa277935c9bbd18cbf3ffdd47a3
|
| |
| |
| |
| | |
Change-Id: I2194466fb7cf7ff5313d146601155ebe6043fd42
|
|\ \
| |/
| |
| |
| |
| |
| | |
HSUPA and EVDO"
* commit '582b11527cd6d968f163fbee73f92d82b679e330':
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
| |\
| | |
| | |
| | |
| | | |
* commit 'baba99840400f5b835d44b6d91e2190136277988':
Define TCP buffer sizes for HSPAP, HSDPA, HSUPA and EVDO
|
| | |\ |
|
| | | |
| | | |
| | | |
| | | | |
Change-Id: I0fbd76aca69059917d363b2dcbfc843bbf4386f8
|
|\ \ \ \ |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Define /storage as top-level concept, so that we enforce permissions
uniformly. Moves external storage paths from headers to per-device
environment variables. Added missing mount flags, and we no longer
have adb-specific external storage.
Bug: 6925012
Change-Id: Ic7ca953be2f552d3f0ec9e69f89fef751daa1b29
|
|/ / / /
| | | |
| | | |
| | | |
| | | |
| | | | |
Even with the groups, services no longer have access.
Change-Id: I2b4871b276ffd309c08c404b1211b33406dbebd5
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Also remove mount() from adb, since it can come online long before
data partition is ready. Set EXTERNAL_STORAGE environment variable
to point to owner for backwards compatibility.
Bug: 7005701
Change-Id: I63444f6636624eb7ad89f053daa289663424639e
|
|\ \ \ \ |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Remount rootfs as recursively shared, so that mount changes are
propagated into child namespaces. Mount external storage for access
from adb.
Clean multi-user dependencies for use in Dalvik. Also define
external storage paths.
Bug: 6925012
Change-Id: I375de581a63f4f36667894c56a34a9dd45361e8f
|
|\ \ \ \ \ |
|
| |/ / / /
| | | | |
| | | | |
| | | | |
| | | | | |
Change-Id: Ica71265856fce1abc0a0ba9c0b1ca016510c61b7
Signed-off-by: Scott Anderson <saa@android.com>
|
|\ \ \ \ \
| | |/ / /
| |/| | |
| | | | |
| | | | | |
* commit '8f19b11a42423ecd4ac8373041f64cb3001caf78':
[MIPS] Enable SD-card functionality to work
|
| |\ \ \ \
| | | |/ /
| | |/| |
| | | | |
| | | | | |
* commit 'c4c731e78ca1a3527093a35280381616d1cb667d':
[MIPS] Enable SD-card functionality to work
|
| | |\ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Change-Id: I711f533214b9b7bce2ff1000a55d6b8f310f2399
Signed-Off-By: Bhanu Chetlapalli <bhanu@mips.com>
|
|\ \ \ \ \ \
| |/ / / / /
| | | | / /
| |_|_|/ /
|/| | | |
| | | | |
| | | | | |
during startup."
* commit 'ee0d281a3e5fe611bdda23db18fa0e5684ee43ed':
Char device /dev/dri/card0 was not created during startup.
|
| |\ \ \ \
| | |/ / /
| | | | |
| | | | |
| | | | | |
* commit 'c95c15b1923611f48c44c18ad158e57b9d915fdf':
Char device /dev/dri/card0 was not created during startup.
|
| | |\ \ \ |
|
| | | | |/
| | | |/|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This device is required by libdrm for GPUs like IvyBridge.
Change-Id: I0ac47056a9cec2100f3e6eaa5591571fe6bbc145
Signed-off-by: Lukasz Anaczkowski <lukasz.anaczkowski@intel.com>
Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
|
|\ \ \ \ \
| |/ / / /
| | | | |
| | | | | |
Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
| |\ \ \ \
| | |/ / /
| | | | |
| | | | |
| | | | | |
* commit '297f802f25d093274c1f5fb890ee8dfacfbf159e':
Add support for reloading policy from /data/system.
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
To support runtime policy management, add support for reloading
policy from /data/system. This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.
Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
chown /proc/last_kmsg to user system group log during init, and
chmod it to readable only by user and group.
Bug: 6925227
Change-Id: I645b6a2d4fecc01a2bd4b7fa7ed6aae3ef638cb9
|
|\ \ \ \ \
| |/ / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Android."
* commit '018227f5394c3126f4a858596cb85dee1893b895':
Modify init.rc and init.goldfish.rc for SE Android.
|
| |\ \ \ \
| | |/ / /
| | | | |
| | | | |
| | | | | |
* commit 'ce76e2d00e63339083ea693db33de05cbba5600e':
Modify init.rc and init.goldfish.rc for SE Android.
|
| | |\ \ \
| | | |/ /
| | |/| | |
|
| | | |/
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Set the security context for the init process.
Restore the security contexts of /cache and /data in case they were reset.
Specify the security context for services launched from the rootfs since
we cannot label their executables.
If on the emulator, set a policy boolean and restore the context of
/sys/qemu_trace to allow accesses not normally permitted on a device.
Change-Id: I166ffc267e8e0543732e7118eb0fd4b031efac3b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
|