History log of /system/core/init/property_service.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
ebf46586f57e580d0195a06c32103ea393314f01 06-Sep-2011 Dima Zavin <dima@android.com> init: do not load default.prop from ramdisk in charger mode

Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
5da93589f106646203d6633e2e927aba01fbdb9f 22-Aug-2011 Benoit Goby <benoit@android.com> Allow radio to set sys.usb.config

This allows the ril to put the phone into diagnostic mode

Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
/system/core/init/property_service.c
22bfc4cca03197036c3b49e7c2cf47a0a23fce87 29-Jul-2011 Benoit Goby <benoit@android.com> Allow radio to set net.cdma* properties

Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
/system/core/init/property_service.c
7100f640deabb9e746e41eac54707f1ca531f2db 26-Jul-2011 Benoit Goby <benoit@android.com> Allow radio to set net.lte* properties

Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
/system/core/init/property_service.c
9bb4d411e01c8e6330b5c27c489485592360576b 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: update permissions for VPN.

VPN no longer uses system properties to keep network parameters.
Besides, profiles are now stored and encrypted by keystore.

Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/init/property_service.c
d18678f882eed5677c28d03a86a8ab43300acd4e 01-Jul-2011 Mike Lockwood <lockwood@android.com> init: Handle EINTR in handle_property_set_fd()

Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
71ead1835317af5305f9ef87ce06ebdf9cff92e6 01-Apr-2011 Brad Fitzpatrick <bradfitz@android.com> Close the client socket early for ctl.* properties.

Bug: 4199411
Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
/system/core/init/property_service.c
9f1e0e3ae3108086948b74ce58af32df92ff8331 30-Mar-2011 Brad Fitzpatrick <bradfitz@android.com> Close the property socket *after* updating properties.

Also remove some dead code.

Bionic update is in change I3e80cecf

Bug: 4185486
Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
/system/core/init/property_service.c
c5c51033c86353d1a448c72e0e9388906eed7114 09-Mar-2011 Ken Sumrall <ksumrall@android.com> Load the persistent properties after decrypting the /data partition

Fix for bug 3415286. The persistent properties are normally read early
in the boot process after /data is mounted. However, for an encrypted
system, at that point /data is a tmpfs ramdisk. This change adds a new
command to init (load_persist_props) to read the persistent properties,
and adds an action to init.rc to load the persistent properties. This
action is triggered by setting a property in vold, but that's in a
different CL.

Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/init/property_service.c
cf01597121c1c08780966f22e2a62386d0e1a08f 19-Feb-2011 Amol Bhatkar <amolbhatkar@motorola.com> property_service: Give radio permission to set net.qmi*

Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
/system/core/init/property_service.c
58aa5b0ee0ec67d4e0f3b12e27cd58279bef0dee 10-Dec-2010 Mike Lockwood <lockwood@android.com> init: Allow non-root adbd to switch between TCP and USB modes

Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
cfa0d8439384a1aaa53d31fb720c234cabf796ee 03-Oct-2010 Wink Saville <wink@google.com> Allow AID_RADIO to restart the ril-daemon.

This enhances robustness by allowing the Telephony Framework to restart
ril-daemon if it notices some catastrophic failure.

Added setprop ctl.restart.
Added ril-daemon to setprop control_perms and allow users/groups
with the AID_RADIO ID to control it.

Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
/system/core/init/property_service.c
25b15be9120bcdaa0aba622c67ad2c835d9e91ca 14-Jul-2010 Brian Swetland <swetland@google.com> init: use tmpfs/ftruncate for properties backing store instead of ashmem

This removes the need for ashmem for early bringup and avoids an issue
with permissions enforcement.

Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182
Signed-off-by: Brian Swetland <swetland@google.com>
/system/core/init/property_service.c
3294bbbad9494eb4ca534624b96e39f8ed15aaf2 20-Apr-2010 Colin Cross <ccross@android.com> init: Allow services to start before property triggers are up

Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
/system/core/init/property_service.c
ed8a7d84428ec945c48b6b53dc5a3a18fabaf683 20-Apr-2010 Colin Cross <ccross@android.com> init: Move list and log handling to list.h and log.h

Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
/system/core/init/property_service.c
3899e9fc01cf608f19f716749c54cc5c4d17e766 14-Apr-2010 Colin Cross <ccross@android.com> init: Move prototypes for util.c into util.h

Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
/system/core/init/property_service.c
d11beb2b1516144327c3f730f75e6b4bc65f1374 14-Apr-2010 Colin Cross <ccross@android.com> init: Move property_set_fd to property_service.c

Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
/system/core/init/property_service.c
ef4e21520cef69aaa7b488a3f44b2490dc2e3eb5 12-Nov-2009 Oscar Montemayor <oam@google.com> Encrypted File SYstems project. Enabling EFS security properties.
This change enables persist.security.* flags in the device, allowing oly the system to modify them.
Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the
framework as well as from the recovery mode / transition.
/system/core/init/property_service.c
c5e7ef24308f5a993ecfd5ac438d347e786f5e42 03-Sep-2009 Mike Lockwood <lockwood@android.com> init: Add support for enforcing setprop by caller's group.

Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
3dfe6c66646865a78449a435239145deeaeab3ba 26-Aug-2009 Tammo Spalink <tammo@google.com> Add persistent radio prop perms ; cleanup ws and typos.

Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
/system/core/init/property_service.c
0ab3a93abaac2d44d1db064c91c275f0e38925de 25-Aug-2009 Robert Greenwalt <robdroid@android.com> Allow radio to modify net.ppp* properties for dns

The radio bringup script was changed from operating as root to operating as radio. This is
preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that
ConnectivityService needs to correctly set dns.

bug: 2077628
/system/core/init/property_service.c
88dc657d50cb3289a9011828c497eee996ed958c 19-Jun-2009 Chia-chi Yeh <chiachi@android.com> Add device, property, directory, and file permissions for VPN.
/system/core/init/property_service.c
b3779558dcfbe99f0b9c1ef796e3728edad25672 08-May-2009 Mike Lockwood <lockwood@android.com> init: Fix some broken code that did not cause problems until switching to gcc 4.4

Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
e037fd7e193ecccbb5c0888e49f6d58c224bc11d 13-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@138607
/system/core/init/property_service.c
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
e54eebbf1a908d65ee8cf80bab62821c05666d70 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
35237d135807af84bf9b0e5b8d7f8633e58db6f5 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
/system/core/init/property_service.c
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
/system/core/init/property_service.c