Yes, it's an Android-specific security feature. Look at
system/core/include/private/android_filesystem_config.h

On Sun, Jan 24, 2010 at 8:46 PM, Jun Sun <monkey.j...@gmail.com> wrote:

> This might be a dumb question, but I can't seem to figure it out.
>
> In my donut build tree, I added some additional directories to
> out/target/product/dream-open/system/. Just as I expected, next
> re-make actually included the new directories in the system.img file.
>
> However, during run-time, I found that all the executables I put under
> the new directories have their "x" bit stripped and hence they cannot
> execute any more.
>
> Is this a security feature of Android? Where is this feature
> implemented? I can't find anything in the build log that shows the
> execution bit stripping.
>
> Or is it implemented at run-time? I traced /init.rc and could not find
> anything there either.
>
> I am just confused at this point.
>
> Cheers.
>
> Jun
>
> --
> unsubscribe: 
> android-porting+unsubscr...@googlegroups.com<android-porting%2bunsubscr...@googlegroups.com>
> website: http://groups.google.com/group/android-porting
>

-- 
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting

Reply via email to