History log of /system/core/init/property_service.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
32b9023d086e3e22886dd3271f505ef64cd84bc8 19-Sep-2012 Nick Kralevich <nnk@google.com> init: Don't read local properties if ro.debuggable=0

Bug: 7195965
Change-Id: I29fdad61aa61f2c46d49db227cf7b84d9cc6f25d
/system/core/init/property_service.c
e953e9657c482d83ad487a4b861026a16f6bbb64 15-Aug-2012 Jeonghoon lim <jeonghoon.lim@lge.com> bluetooth: bring up with bluedroid stack

- change permission of "bluetooth." property to AID_BLUETOOTH

Change-Id: Ifcd97f136cfc3372412fe500e4f800d1bbbd065c
/system/core/init/property_service.c
2fec4de5c704afe4dc2a1bb976699a0e363786dd 13-Aug-2012 Kenny Root <kroot@android.com> am 11c783f1: am 9494f297: Merge "Implement SELinux/MAC checks for property service."

* commit '11c783f1ead9f276e8854cb1adaebeed8517e8a1':
Implement SELinux/MAC checks for property service.
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa 13-Aug-2012 Kenny Root <kroot@google.com> resolved conflicts for merge of 4dcd52ab to jb-mr1-dev

Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
63207cd20f2156bec937a85e789f07de0d1afa9d 09-Aug-2012 rpcraig <rpcraig@tycho.ncsc.mil> Implement SELinux/MAC checks for property service.

This is a set of changes to the init property service
implementation to apply a SELinux check over who can
change what properties. Also included control hooks
for the 'ctl' keys.

Change-Id: I5a18809bf5536f6459a36b6bf0d622b9f5061aa0
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/core/init/property_service.c
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 01-May-2012 Stephen Smalley <sds@tycho.nsa.gov> Add support for reloading policy from /data/system.

To support runtime policy management, add support for reloading
policy from /data/system. This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.

Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/init/property_service.c
a8afd723a4bdd68eda34a552a472a6adc0c26369 02-Aug-2012 Ravi Nagarajan <nravi@broadcom.com> Allow AID_BLUETOOTH to update persist.service.bdroid

When devices are provisioned, bd address path is set in ro.bt.bdaddr_path.
On devices where this property is not present, a random bd address is
generated and saved to the property: persist.service.bdroid.bdaddr
This change allows bluetooth process to update this property
bug 6885309

Change-Id: I2e8a2471a0e890da82e6bbec6a2ef67ec8e1f8f4
/system/core/init/property_service.c
8c0350f4eedc85e37655dcfe8b6c5ec14b8c4979 03-Jul-2012 jeonghoon.lim <jeonghoon.lim@lge.com> bluetooth: add property permission for bluetooth

add property permission for bluetooth.

Change-Id: I099f325f533d06c63ad43843dd6477ea81fc9781
/system/core/init/property_service.c
45fa13f370eb5b9215a3467a211f16b3c49f19e9 28-Apr-2012 Romain Guy <romainguy@google.com> Let users with SYSTEM permission set debug. properties

Change-Id: Ieda3f7dd5dca5f6a8fc50b07822e6a875db030ad
/system/core/init/property_service.c
0dbda7e1c5bcebc501b4943cd6483122297e1834 18-Jan-2012 Nick Kralevich <nnk@google.com> Don't read /data/local.prop on user builds

Creating a root owned /data/local.prop is one of the most common
ways to root an Android device. /data/local.prop is only intended
to assist developers on debuggable devices, and is never
intended to be used on production devices.

Change-Id: Ifcfa21c2ee9914b0b54445218b4cf0fea0a98e9c
/system/core/init/property_service.c
8886112d87bcc501e89e4763656a3ebfeb58edf2 19-Dec-2011 Dima Zavin <dima@android.com> init: export all androidboot cmd line values as ro.boot.xx props

Also, clean up how we initialize the ro.xx properties and process
the kernel command line.

Change-Id: Iedda6c90e31340a189171a44b2767480403354f7
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
33901e602484d0b5f6a07746e4660ec3e9ac62f7 19-Nov-2011 Jeff Brown <jeffbrown@google.com> Delete dead code.

Change-Id: Icfb9bcee2c524026ecbeb7e30e943d8ca299a33a
/system/core/init/property_service.c
ebf46586f57e580d0195a06c32103ea393314f01 06-Sep-2011 Dima Zavin <dima@android.com> init: do not load default.prop from ramdisk in charger mode

Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb
Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
5da93589f106646203d6633e2e927aba01fbdb9f 22-Aug-2011 Benoit Goby <benoit@android.com> Allow radio to set sys.usb.config

This allows the ril to put the phone into diagnostic mode

Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
/system/core/init/property_service.c
22bfc4cca03197036c3b49e7c2cf47a0a23fce87 29-Jul-2011 Benoit Goby <benoit@android.com> Allow radio to set net.cdma* properties

Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
/system/core/init/property_service.c
7100f640deabb9e746e41eac54707f1ca531f2db 26-Jul-2011 Benoit Goby <benoit@android.com> Allow radio to set net.lte* properties

Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
/system/core/init/property_service.c
9bb4d411e01c8e6330b5c27c489485592360576b 09-Jul-2011 Chia-chi Yeh <chiachi@android.com> init: update permissions for VPN.

VPN no longer uses system properties to keep network parameters.
Besides, profiles are now stored and encrypted by keystore.

Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/init/property_service.c
d18678f882eed5677c28d03a86a8ab43300acd4e 01-Jul-2011 Mike Lockwood <lockwood@android.com> init: Handle EINTR in handle_property_set_fd()

Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
71ead1835317af5305f9ef87ce06ebdf9cff92e6 01-Apr-2011 Brad Fitzpatrick <bradfitz@android.com> Close the client socket early for ctl.* properties.

Bug: 4199411
Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
/system/core/init/property_service.c
9f1e0e3ae3108086948b74ce58af32df92ff8331 30-Mar-2011 Brad Fitzpatrick <bradfitz@android.com> Close the property socket *after* updating properties.

Also remove some dead code.

Bionic update is in change I3e80cecf

Bug: 4185486
Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
/system/core/init/property_service.c
c5c51033c86353d1a448c72e0e9388906eed7114 09-Mar-2011 Ken Sumrall <ksumrall@android.com> Load the persistent properties after decrypting the /data partition

Fix for bug 3415286. The persistent properties are normally read early
in the boot process after /data is mounted. However, for an encrypted
system, at that point /data is a tmpfs ramdisk. This change adds a new
command to init (load_persist_props) to read the persistent properties,
and adds an action to init.rc to load the persistent properties. This
action is triggered by setting a property in vold, but that's in a
different CL.

Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/init/property_service.c
cf01597121c1c08780966f22e2a62386d0e1a08f 19-Feb-2011 Amol Bhatkar <amolbhatkar@motorola.com> property_service: Give radio permission to set net.qmi*

Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
/system/core/init/property_service.c
58aa5b0ee0ec67d4e0f3b12e27cd58279bef0dee 10-Dec-2010 Mike Lockwood <lockwood@android.com> init: Allow non-root adbd to switch between TCP and USB modes

Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
cfa0d8439384a1aaa53d31fb720c234cabf796ee 03-Oct-2010 Wink Saville <wink@google.com> Allow AID_RADIO to restart the ril-daemon.

This enhances robustness by allowing the Telephony Framework to restart
ril-daemon if it notices some catastrophic failure.

Added setprop ctl.restart.
Added ril-daemon to setprop control_perms and allow users/groups
with the AID_RADIO ID to control it.

Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
/system/core/init/property_service.c
25b15be9120bcdaa0aba622c67ad2c835d9e91ca 14-Jul-2010 Brian Swetland <swetland@google.com> init: use tmpfs/ftruncate for properties backing store instead of ashmem

This removes the need for ashmem for early bringup and avoids an issue
with permissions enforcement.

Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182
Signed-off-by: Brian Swetland <swetland@google.com>
/system/core/init/property_service.c
3294bbbad9494eb4ca534624b96e39f8ed15aaf2 20-Apr-2010 Colin Cross <ccross@android.com> init: Allow services to start before property triggers are up

Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
/system/core/init/property_service.c
ed8a7d84428ec945c48b6b53dc5a3a18fabaf683 20-Apr-2010 Colin Cross <ccross@android.com> init: Move list and log handling to list.h and log.h

Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
/system/core/init/property_service.c
3899e9fc01cf608f19f716749c54cc5c4d17e766 14-Apr-2010 Colin Cross <ccross@android.com> init: Move prototypes for util.c into util.h

Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
/system/core/init/property_service.c
d11beb2b1516144327c3f730f75e6b4bc65f1374 14-Apr-2010 Colin Cross <ccross@android.com> init: Move property_set_fd to property_service.c

Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
/system/core/init/property_service.c
ef4e21520cef69aaa7b488a3f44b2490dc2e3eb5 12-Nov-2009 Oscar Montemayor <oam@google.com> Encrypted File SYstems project. Enabling EFS security properties.
This change enables persist.security.* flags in the device, allowing oly the system to modify them.
Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the
framework as well as from the recovery mode / transition.
/system/core/init/property_service.c
c5e7ef24308f5a993ecfd5ac438d347e786f5e42 03-Sep-2009 Mike Lockwood <lockwood@android.com> init: Add support for enforcing setprop by caller's group.

Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5
Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
3dfe6c66646865a78449a435239145deeaeab3ba 26-Aug-2009 Tammo Spalink <tammo@google.com> Add persistent radio prop perms ; cleanup ws and typos.

Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
/system/core/init/property_service.c
0ab3a93abaac2d44d1db064c91c275f0e38925de 25-Aug-2009 Robert Greenwalt <robdroid@android.com> Allow radio to modify net.ppp* properties for dns

The radio bringup script was changed from operating as root to operating as radio. This is
preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that
ConnectivityService needs to correctly set dns.

bug: 2077628
/system/core/init/property_service.c
88dc657d50cb3289a9011828c497eee996ed958c 19-Jun-2009 Chia-chi Yeh <chiachi@android.com> Add device, property, directory, and file permissions for VPN.
/system/core/init/property_service.c
b3779558dcfbe99f0b9c1ef796e3728edad25672 08-May-2009 Mike Lockwood <lockwood@android.com> init: Fix some broken code that did not cause problems until switching to gcc 4.4

Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
e037fd7e193ecccbb5c0888e49f6d58c224bc11d 13-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@138607
/system/core/init/property_service.c
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
e54eebbf1a908d65ee8cf80bab62821c05666d70 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
35237d135807af84bf9b0e5b8d7f8633e58db6f5 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
/system/core/init/property_service.c
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
/system/core/init/property_service.c