32b9023d086e3e22886dd3271f505ef64cd84bc8 |
|
19-Sep-2012 |
Nick Kralevich <nnk@google.com> |
init: Don't read local properties if ro.debuggable=0 Bug: 7195965 Change-Id: I29fdad61aa61f2c46d49db227cf7b84d9cc6f25d
/system/core/init/property_service.c
|
e953e9657c482d83ad487a4b861026a16f6bbb64 |
|
15-Aug-2012 |
Jeonghoon lim <jeonghoon.lim@lge.com> |
bluetooth: bring up with bluedroid stack - change permission of "bluetooth." property to AID_BLUETOOTH Change-Id: Ifcd97f136cfc3372412fe500e4f800d1bbbd065c
/system/core/init/property_service.c
|
2fec4de5c704afe4dc2a1bb976699a0e363786dd |
|
13-Aug-2012 |
Kenny Root <kroot@android.com> |
am 11c783f1: am 9494f297: Merge "Implement SELinux/MAC checks for property service." * commit '11c783f1ead9f276e8854cb1adaebeed8517e8a1': Implement SELinux/MAC checks for property service.
|
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa |
|
13-Aug-2012 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 4dcd52ab to jb-mr1-dev Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
63207cd20f2156bec937a85e789f07de0d1afa9d |
|
09-Aug-2012 |
rpcraig <rpcraig@tycho.ncsc.mil> |
Implement SELinux/MAC checks for property service. This is a set of changes to the init property service implementation to apply a SELinux check over who can change what properties. Also included control hooks for the 'ctl' keys. Change-Id: I5a18809bf5536f6459a36b6bf0d622b9f5061aa0 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/core/init/property_service.c
|
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 |
|
01-May-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add support for reloading policy from /data/system. To support runtime policy management, add support for reloading policy from /data/system. This can be triggered by setting the selinux.loadpolicy property to 1, whether from init.rc after mounting /data or from the system_server (e.g. upon invocation of a new device admin API for provisioning policy). ueventd and installd are restarted upon policy reloads to pick up the new policy configurations relevant to their operation. Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/init/property_service.c
|
a8afd723a4bdd68eda34a552a472a6adc0c26369 |
|
02-Aug-2012 |
Ravi Nagarajan <nravi@broadcom.com> |
Allow AID_BLUETOOTH to update persist.service.bdroid When devices are provisioned, bd address path is set in ro.bt.bdaddr_path. On devices where this property is not present, a random bd address is generated and saved to the property: persist.service.bdroid.bdaddr This change allows bluetooth process to update this property bug 6885309 Change-Id: I2e8a2471a0e890da82e6bbec6a2ef67ec8e1f8f4
/system/core/init/property_service.c
|
8c0350f4eedc85e37655dcfe8b6c5ec14b8c4979 |
|
03-Jul-2012 |
jeonghoon.lim <jeonghoon.lim@lge.com> |
bluetooth: add property permission for bluetooth add property permission for bluetooth. Change-Id: I099f325f533d06c63ad43843dd6477ea81fc9781
/system/core/init/property_service.c
|
45fa13f370eb5b9215a3467a211f16b3c49f19e9 |
|
28-Apr-2012 |
Romain Guy <romainguy@google.com> |
Let users with SYSTEM permission set debug. properties Change-Id: Ieda3f7dd5dca5f6a8fc50b07822e6a875db030ad
/system/core/init/property_service.c
|
0dbda7e1c5bcebc501b4943cd6483122297e1834 |
|
18-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Don't read /data/local.prop on user builds Creating a root owned /data/local.prop is one of the most common ways to root an Android device. /data/local.prop is only intended to assist developers on debuggable devices, and is never intended to be used on production devices. Change-Id: Ifcfa21c2ee9914b0b54445218b4cf0fea0a98e9c
/system/core/init/property_service.c
|
8886112d87bcc501e89e4763656a3ebfeb58edf2 |
|
19-Dec-2011 |
Dima Zavin <dima@android.com> |
init: export all androidboot cmd line values as ro.boot.xx props Also, clean up how we initialize the ro.xx properties and process the kernel command line. Change-Id: Iedda6c90e31340a189171a44b2767480403354f7 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
|
33901e602484d0b5f6a07746e4660ec3e9ac62f7 |
|
19-Nov-2011 |
Jeff Brown <jeffbrown@google.com> |
Delete dead code. Change-Id: Icfb9bcee2c524026ecbeb7e30e943d8ca299a33a
/system/core/init/property_service.c
|
ebf46586f57e580d0195a06c32103ea393314f01 |
|
06-Sep-2011 |
Dima Zavin <dima@android.com> |
init: do not load default.prop from ramdisk in charger mode Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
|
5da93589f106646203d6633e2e927aba01fbdb9f |
|
22-Aug-2011 |
Benoit Goby <benoit@android.com> |
Allow radio to set sys.usb.config This allows the ril to put the phone into diagnostic mode Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
/system/core/init/property_service.c
|
22bfc4cca03197036c3b49e7c2cf47a0a23fce87 |
|
29-Jul-2011 |
Benoit Goby <benoit@android.com> |
Allow radio to set net.cdma* properties Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
/system/core/init/property_service.c
|
7100f640deabb9e746e41eac54707f1ca531f2db |
|
26-Jul-2011 |
Benoit Goby <benoit@android.com> |
Allow radio to set net.lte* properties Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
/system/core/init/property_service.c
|
9bb4d411e01c8e6330b5c27c489485592360576b |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: update permissions for VPN. VPN no longer uses system properties to keep network parameters. Besides, profiles are now stored and encrypted by keystore. Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/init/property_service.c
|
d18678f882eed5677c28d03a86a8ab43300acd4e |
|
01-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
init: Handle EINTR in handle_property_set_fd() Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
71ead1835317af5305f9ef87ce06ebdf9cff92e6 |
|
01-Apr-2011 |
Brad Fitzpatrick <bradfitz@android.com> |
Close the client socket early for ctl.* properties. Bug: 4199411 Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
/system/core/init/property_service.c
|
9f1e0e3ae3108086948b74ce58af32df92ff8331 |
|
30-Mar-2011 |
Brad Fitzpatrick <bradfitz@android.com> |
Close the property socket *after* updating properties. Also remove some dead code. Bionic update is in change I3e80cecf Bug: 4185486 Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
/system/core/init/property_service.c
|
c5c51033c86353d1a448c72e0e9388906eed7114 |
|
09-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Load the persistent properties after decrypting the /data partition Fix for bug 3415286. The persistent properties are normally read early in the boot process after /data is mounted. However, for an encrypted system, at that point /data is a tmpfs ramdisk. This change adds a new command to init (load_persist_props) to read the persistent properties, and adds an action to init.rc to load the persistent properties. This action is triggered by setting a property in vold, but that's in a different CL. Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/init/property_service.c
|
cf01597121c1c08780966f22e2a62386d0e1a08f |
|
19-Feb-2011 |
Amol Bhatkar <amolbhatkar@motorola.com> |
property_service: Give radio permission to set net.qmi* Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
/system/core/init/property_service.c
|
58aa5b0ee0ec67d4e0f3b12e27cd58279bef0dee |
|
10-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
init: Allow non-root adbd to switch between TCP and USB modes Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
cfa0d8439384a1aaa53d31fb720c234cabf796ee |
|
03-Oct-2010 |
Wink Saville <wink@google.com> |
Allow AID_RADIO to restart the ril-daemon. This enhances robustness by allowing the Telephony Framework to restart ril-daemon if it notices some catastrophic failure. Added setprop ctl.restart. Added ril-daemon to setprop control_perms and allow users/groups with the AID_RADIO ID to control it. Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
/system/core/init/property_service.c
|
25b15be9120bcdaa0aba622c67ad2c835d9e91ca |
|
14-Jul-2010 |
Brian Swetland <swetland@google.com> |
init: use tmpfs/ftruncate for properties backing store instead of ashmem This removes the need for ashmem for early bringup and avoids an issue with permissions enforcement. Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182 Signed-off-by: Brian Swetland <swetland@google.com>
/system/core/init/property_service.c
|
3294bbbad9494eb4ca534624b96e39f8ed15aaf2 |
|
20-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Allow services to start before property triggers are up Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
/system/core/init/property_service.c
|
ed8a7d84428ec945c48b6b53dc5a3a18fabaf683 |
|
20-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move list and log handling to list.h and log.h Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
/system/core/init/property_service.c
|
3899e9fc01cf608f19f716749c54cc5c4d17e766 |
|
14-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move prototypes for util.c into util.h Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
/system/core/init/property_service.c
|
d11beb2b1516144327c3f730f75e6b4bc65f1374 |
|
14-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move property_set_fd to property_service.c Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
/system/core/init/property_service.c
|
ef4e21520cef69aaa7b488a3f44b2490dc2e3eb5 |
|
12-Nov-2009 |
Oscar Montemayor <oam@google.com> |
Encrypted File SYstems project. Enabling EFS security properties. This change enables persist.security.* flags in the device, allowing oly the system to modify them. Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the framework as well as from the recovery mode / transition.
/system/core/init/property_service.c
|
c5e7ef24308f5a993ecfd5ac438d347e786f5e42 |
|
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init: Add support for enforcing setprop by caller's group. Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
3dfe6c66646865a78449a435239145deeaeab3ba |
|
26-Aug-2009 |
Tammo Spalink <tammo@google.com> |
Add persistent radio prop perms ; cleanup ws and typos. Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
/system/core/init/property_service.c
|
0ab3a93abaac2d44d1db064c91c275f0e38925de |
|
25-Aug-2009 |
Robert Greenwalt <robdroid@android.com> |
Allow radio to modify net.ppp* properties for dns The radio bringup script was changed from operating as root to operating as radio. This is preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that ConnectivityService needs to correctly set dns. bug: 2077628
/system/core/init/property_service.c
|
88dc657d50cb3289a9011828c497eee996ed958c |
|
19-Jun-2009 |
Chia-chi Yeh <chiachi@android.com> |
Add device, property, directory, and file permissions for VPN.
/system/core/init/property_service.c
|
b3779558dcfbe99f0b9c1ef796e3728edad25672 |
|
08-May-2009 |
Mike Lockwood <lockwood@android.com> |
init: Fix some broken code that did not cause problems until switching to gcc 4.4 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
e037fd7e193ecccbb5c0888e49f6d58c224bc11d |
|
13-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@138607
/system/core/init/property_service.c
|
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
|
e54eebbf1a908d65ee8cf80bab62821c05666d70 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
|
35237d135807af84bf9b0e5b8d7f8633e58db6f5 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/system/core/init/property_service.c
|
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/system/core/init/property_service.c
|