summaryrefslogtreecommitdiffstats
path: root/rootdir/ueventd.rc
Commit message (Collapse)AuthorAgeFilesLines
* ueventd.rc: Move device-specific entries to /vendor/ueventd.rc.Tri Vo2019-01-061-3/+0
| | | | | | Bug: 110962171 Test: boot sailfish, taimen, blueline Change-Id: If740c2bd85409c9a057cff68f8bfd870cad35b37
* Reland "Remove obsolete ueventd.rc rules."Tri Vo2018-12-141-68/+0
| | | | | | | | | | | | | | | | | | | /dev/* nodes referenced in the removed rules are not present on Pixel devices, i.e. android platform doesn't depend on these nodes. If a device relies on one of these rules, the rule should be added to the device-specific ueventd.rc. v1->v2: Added back usb-specific rules /dev/bus/usb/* 0660 root usb /dev/mtp_usb 0660 root mtp Bug: 110962171 Test: boot walleye Test: init_tests Test: wired headset plays audio Test: USB PTP works between 2 devices Change-Id: Ic2d77806a01c8918b2485fb5f0bd9b670b01d1df
* Merge "Revert "Remove obsolete ueventd.rc rules.""Treehugger Robot2018-12-111-0/+70
|\
| * Revert "Remove obsolete ueventd.rc rules."Andy Hung2018-12-111-0/+70
| | | | | | | | | | | | | | | | | | | | This reverts commit d3b0b2708bf4dfcbda5614ea336a5d040cd7c95d. Reason for revert: Regression in USB audio handling Test: USB audio playback on Crosshatch Bug: 120795549 Change-Id: Ibd05cd9b419f3e7988ce24a45f800d4bfe91ef6a
* | Merge "Remove obsolete ueventd.rc rules."Tri Vo2018-12-071-70/+0
|\|
| * Remove obsolete ueventd.rc rules.Tri Vo2018-12-061-70/+0
| | | | | | | | | | | | | | | | | | | | | | | | /dev/* nodes referenced in the removed rules are not present on Pixel devices, i.e. android platform doesn't depend on these nodes. If a device relies on one of these rules, the rule should be added to the device-specific ueventd.rc. Bug: 110962171 Test: boot walleye Test: init_tests Change-Id: I3262475d4ff22386e8da0436efaf98b208e4fa1c
* | ueventd: allow configuring SO_RCVBUF(FORCE) for the ueventd socketTom Cherry2018-12-061-0/+1
|/ | | | | | | | | | | | | | | | | | | | Some configurations won't allow ueventd to have CAP_NET_ADMIN, so the new default size of 16M is not possible for those. Those configurations also won't need such a large buffer size, so this change allows devices to customize the SO_RCVBUF(FORCE) size for the uevent socket. This is done by adding the line 'uevent_socket_rcvbuf_size <size>' to your device's ueventd.rc file. <size> is specified as a byte count, for example '16M' is 16MiB. The last parsed uevent_socket_rcvbuf_size line is the one that is used. Bug: 120485624 Test: boot sailfish Test: ueventd unit tests Change-Id: If8123b92ca8a9b089ad50318caada2f21bc94707
* Permissions for /dev/uinputSiarhei Vishniakou2018-11-271-1/+1
| | | | | | | | | | | | | | Currently /dev/uinput is owned by system/bluetooth. But that's inconsistent with some of the sepolicies for uhid_device. This also means that the new native tests for inputflinger aren't able to execute properly, because they require the ability to register a new input device via uinput. Bug: none Test: atest inputflinger_test The newly added EventHub_test is still under review Change-Id: I53524738db1a5d3ba962b9bec35ef322ed3028f2
* ueventd: let scripts provide firmware directoriesTom Cherry2018-07-131-0/+2
| | | | | | | | | | | | | Since some vendors will have firmware in mount points in /mnt/vendor/..., we extend the ueventd script language to allow specifying the firmware directories. Also, move the existing 4 directories to ueventd.rc as a primary user of this mechanism. Bug: 111337229 Test: boot sailfish; firmwares load Change-Id: I0854b0b786ad761e40d2332312c637610432fce2
* Allow input system access to /dev/v4l-touchSiarhei Vishniakou2017-12-221-0/+1
| | | | | | | Bug: 62940136 Test: read /dev/v4l-touchX from inputflinger Change-Id: I394686e4167855f50ddd6ff9aebcf3c94f6550b0
* Merge "Adding 'uhid' permission for access to /dev/uhid." am: cecbc9993d am: ↵Siarhei Vishniakou2017-05-121-1/+1
|\ | | | | | | | | | | | | | | 04daed4793 am: d819380f50 Change-Id: If06b07c88276c32cdf5b53e6afcf0563e6538544
| * Adding 'uhid' permission for access to /dev/uhid.Siarhei Vishniakou2017-05-111-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | This CL is in support of another CL c/2048848, topic 'Refactor hid command in /frameworks/base/cmds' in internal master. Adding the permissions for shell here to access uhid_node as part of the new 'uhid' group. Bug: 34052337 Test: Tested on angler, bluetooth mouse works OK. Change-Id: If9e100aa1262d689fb8adc5c0ce93f157c96399e
* | Merge changes Ie5ec609a,I5a2ac369,I690137b5 am: 659b78ed10 am: 01b87aac9cTom Cherry2017-04-131-1/+33
|\| | | | | | | | | | | am: 8d9eee4f2b Change-Id: I5cd7d00f71bfd3970189481f381629cedc358c9b
| * ueventd: move subsystem logic from code to ueventd.rcTom Cherry2017-04-121-1/+33
| | | | | | | | | | | | | | | | Test: Boot bullhead Test: Boot sailfish, observe no boot time regression Test: init unit tests Change-Id: I690137b584fcc2b9cd2dd932a2678f75a56d6737
* | Merge "ueventd: remove /dev/log" am: 120add07ab am: 9ae606d659Tom Cherry2017-04-121-3/+0
|\| | | | | | | | | | | am: 6c2e8b10fe Change-Id: Ic257774710a74e72a97f4187e48587150ee3d613
| * ueventd: remove /dev/logTom Cherry2017-04-111-3/+0
| | | | | | | | | | | | | | | | This was marked deprecated in 2014 and removed in 2015, let's remove the uevent rule now too. Test: see that logging still works on bullhead Change-Id: Idaf3f49a1afe7046eba6c976628b9f1c8b3ec094
* | Add /dev/vndbinder to ueventd.rcMartijn Coenen2017-04-031-0/+1
|/ | | | | | Bug: 36052864 Test: vndservicemanager can access /dev/vndbinder Change-Id: I208ae91e722185f015fe8f0047c54087be6d21a2
* Revert "Only allow system to write to existing input nodes."Michael Wright2017-02-211-1/+1
| | | | | | | This reverts commit 344e929e6d8cc2925e55d7f72262002fcc181f52. Bug: 35301292 Change-Id: Ib6805c986c0aa88d14652de59ad4602b1cce8b56
* Only allow system to write to existing input nodes.Michael Wright2017-02-091-1/+1
| | | | | | | | | | | | | This prevents the shell user from injecting input as if it were coming from an existing input device, which in turn makes it easier for malware / abuse analysis to detect when someone is injecting input via the command line vs a real user using a device. (cherrypick of 95637eb2a332b9a09914b1bf32c10fccfba4a175.) Bug: 30861057 Test: ran getevent, saw correct output, played with device Change-Id: Ib53eea1b7767f25510b5d36fe6109101a9fad8e0
* adb: remove support for legacy f_adb interface.Josh Gao2017-01-111-2/+0
| | | | | | | | | Everything should be using the functionfs interface instead by now. Bug: http://b/34228376 Test: grepping for f_adb, android_adb in source tree Test: m Change-Id: I6bc41049c49a867499832588dac8ed108c636c11
* Add hwbinder dev node permissions.Martijn Coenen2016-09-261-0/+1
| | | | | | | | b/31458381 Test: pass Change-Id: I8ec92a29287b17636c363c55a8565dacab19043d Signed-off-by: Iliyan Malchev <malchev@google.com>
* Remove net_bt_stack group and replace it with bluetoothAjay Panicker2016-09-201-2/+2
| | | | | Bug: 31549206 Change-Id: I667963e5f9fd1a5dc9ad74378b318e3b782e6883
* Merge "ueventd.rc: Document the different rule formats for /dev and /sys nodes"Kevin Cernekee2016-01-261-0/+7
|\
| * ueventd.rc: Document the different rule formats for /dev and /sys nodesKevin Cernekee2015-05-121-0/+7
| | | | | | | | | | | | | | | | | | This was causing some confusion during shark bringup and we weren't able to find docs online, so let's add some hints at the top of the file in case it comes up again. Change-Id: Ica2cd8a0fb28efb99077fdc98673dbbdd6f58ff6 Signed-off-by: Kevin Cernekee <cernekee@google.com>
* | rootdir: add permission for /dev/dvb*Terry Heo2015-05-071-0/+3
|/ | | | | Bug: 20112245 Change-Id: I513c6ed5b65d5bd4edef6cb12d7fc20eb9cad4f1
* am 3802b5d4: Merge "rootdir: add pstore"Mark Salyzyn2015-01-141-0/+1
|\ | | | | | | | | * commit '3802b5d4c5cb14864dcdd8820e9140b81a2d7d78': rootdir: add pstore
| * rootdir: add pstoreMark Salyzyn2015-01-141-0/+1
| | | | | | | | | | | | | | | | | | /dev/pmsg0 used to record the Android log messages, then on reboot /sys/fs/pstore/pmsg-ramoops-0 provides a means to pull and triage user-space activities leading up to a panic. A companion to the pstore console logs. Change-Id: Id92cacb8a30339ae10b8bf9e5d46bb0bd4a284c4
* | rootdir: Make trusty version readable by dumpstateArve Hjønnevåg2014-10-161-0/+1
|/ | | | Change-Id: I761650d286b454f1fe01a585e7cd6ec769bfc527
* ueventd: Ueventd changes the permission of sysfs files for max/minRuchi Kandoi2014-05-011-0/+2
| | | | | | | | | | | | cpufreq The owner and permissions for the sysfs file /sys/devices/system/cpu*/cpufreq/scaling_max/min_freq is changed. This would allow the PowerHAL to change the max/min cpufreq even after the associated CPU's are hotplugged out and back in. Change-Id: Ibe0b4aaf3db555ed48e89a7fcd0c5fd3a18cf233 Signed-off-by: Ruchi Kandoi <kandoiruchi@google.com>
* rootdir: reduce permissions on /dev/rtc0Greg Hackmann2014-03-271-1/+1
| | | | | | | | Remove world-readable, reduce group permissions to readable by system daemons Change-Id: I6c7d7d78b8d8281960659bb8490a01cf7fde28b4 Signed-off-by: Greg Hackmann <ghackmann@google.com>
* rootdir: add permissions for /dev/rtc0Greg Hackmann2013-12-171-0/+1
| | | | | Change-Id: If9d853bdae2399b1e7434f45df375ba1fd6dbe9c Signed-off-by: Greg Hackmann <ghackmann@google.com>
* rootdir: add ueventd.rc rule for adf subsystemGreg Hackmann2013-11-261-0/+3
| | | | | Change-Id: I727d91355229692c11e0e309c0fcac051269eba3 Signed-off-by: Greg Hackmann <ghackmann@google.com>
* Expose /dev/hw_random to group "system".Alex Klyubin2013-10-031-0/+2
| | | | | | | This is needed to let EntropyMixer (runs inside system_server) read from /dev/hw_random. Change-Id: Ifde851004301ffd41b2189151a64a0c5989c630f
* second user doesnot pickup input operations from A2DPZhihai Xu2012-10-161-1/+1
| | | | | | bug 7335014 Change-Id: I39e450d254647f0b84a07f38f2f2571711fca075
* Change dev/uhid group id from bluetooth to net_bt_stackMatthew Xie2012-10-101-1/+1
| | | | | | | Secondary user need that group id to access the file to support hid bug 7315419 Change-Id: I9d2d3d5a5114d289dc4d83c697421622db4beae6
* Merge "ueventd.rc: Add /dev/uhid for bluedroid" into jb-mr1-devScott Anderson2012-08-161-0/+1
|\
| * ueventd.rc: Add /dev/uhid for bluedroidScott Anderson2012-08-151-0/+1
| | | | | | | | | | Change-Id: Ica71265856fce1abc0a0ba9c0b1ca016510c61b7 Signed-off-by: Scott Anderson <saa@android.com>
* | Char device /dev/dri/card0 was not created during startup.Lukasz Anaczkowski2012-07-231-0/+3
|/ | | | | | | | This device is required by libdrm for GPUs like IvyBridge. Change-Id: I0ac47056a9cec2100f3e6eaa5591571fe6bbc145 Signed-off-by: Lukasz Anaczkowski <lukasz.anaczkowski@intel.com> Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
* change files in /dev/log/ to 666Nick Kralevich2012-03-291-2/+3
| | | | | | | | | | | | | With newer Android kernels, anyone can read from the files in /dev/log. If you're in the logs group (have the READ_LOGS) permission, you'll see all entries. If you're not in that group, you'll see log messages associated with your UID. Relax the permissions on the files in /dev/log/ to allow an application to read it's own log messages. Bug: 5748848 Change-Id: Ie740284e96a69567dc73d738117316f938491777
* Update the device permission of /dev/tun.Chia-chi Yeh2011-05-121-1/+1
| | | | Change-Id: Ie8ad60047fc7160997100bd28a0abb439406806a
* ueventd.rc: Give system process permission to enable and disable USB functionsMike Lockwood2011-02-081-1/+1
| | | | | Change-Id: I4af1f3fed857df2be96a640f65cd612577c957c7 Signed-off-by: Mike Lockwood <lockwood@android.com>
* Set USB group for /dev/usb_accessoryMike Lockwood2011-02-081-0/+1
| | | | | Change-Id: I17db8d9bb1bf6336979e9b7bce62306d0d7a79d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
* am af7bdc64: Add separate permission and group for access to MTP USB driverMike Lockwood2011-01-101-1/+1
|\ | | | | | | | | * commit 'af7bdc646088e3112052f4fd35061bb720393287': Add separate permission and group for access to MTP USB driver
| * Add separate permission and group for access to MTP USB driverMike Lockwood2011-01-101-1/+1
| | | | | | | | | | | | | | | | | | Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Ibb546b8726d61e041fc7c273f71929624ad1575b Signed-off-by: Mike Lockwood <lockwood@android.com>
* | rootdir: Fix system emulation startup.David 'Digit' Turner2011-01-061-1/+0
|/ | | | | | | | | | | This fixes the goldfish-specific config scripts used by init and ueventd to properly setup the system under emulation. This fixes a lot of broken-ess introduced by recent permission changes in the system. Note that there are still several problems after this patch is applied, but at least it becomes possible to get an adb connection to the emulated system, Change-Id: I1e8f5828b4d5cbb3a4338878df875dc718276b38
* am 60afdedc: am 146481b9: add rules to set perms for input device sysfs ↵Brian Swetland2010-10-261-0/+5
|\ | | | | | | attributes
| * add rules to set perms for input device sysfs attributesBrian Swetland2010-10-261-0/+5
| | | | | | | | Change-Id: I28ab7f1ac5cc07ade7830e87f5e70c96464bb686
| * DO NOT MERGE resolved conflicts for merge of e95aad61 to krakenMike Lockwood2010-05-171-0/+1
| | | | | | | | | | | | | | this change is already in master Change-Id: Ica43eae28b50d89d50217851aff7e62978abfa27 Signed-off-by: Mike Lockwood <lockwood@android.com>
* | Revert "system/core: add system/audio persmissions for /dev/audio*"Iliyan Malchev2010-07-301-1/+0
| | | | | | | | This reverts commit 7e8b01229dde701bee555ea1cf10986b773d5de0.
* | system/core: add system/audio persmissions for /dev/audio*Iliyan Malchev2010-07-291-0/+1
| | | | | | | | | | Change-Id: If214241f8150f5ff6cce8b9a76c6c8e5bad9c35a Signed-off-by: Iliyan Malchev <malchev@google.com>