694636142113d91c2b9585ad28e143d4ff001584 |
|
14-Sep-2013 |
Nick Kralevich <nnk@google.com> |
property_service: better validate property names Don't allow unexpected characters in property names. Don't allow double dots in property names. Bug: 10733330 Change-Id: I8d69740d697efb791f2f201f90989576e13bac81
/system/core/init/property_service.c
|
f14eef0c3c456bfe39f7e9d57c8f7ae4ec775972 |
|
12-Feb-2013 |
Greg Hackmann <ghackmann@google.com> |
init: move initial property area allocation into bionic bionic's __system_property_add() now expands the property area as needed by mapping in more pages. Rather than duplicate the mapping code, move it inside bionic and have bionic's __system_property_area_init() set up the first page. Change-Id: If9917d5f775c1a82eb89be55b84635395145ca49 Signed-off-by: Greg Hackmann <ghackmann@google.com>
/system/core/init/property_service.c
|
88ac54a4e8d2a63e4fd9c465e115795ace316776 |
|
29-Jan-2013 |
Colin Cross <ccross@android.com> |
init: verify size of property buffers passed to property_get Verify that the buffer passed as the value parameter to property_get is always big enough. Change-Id: Ie5b6fcd94bb908215cfd55d0c9b07f717ddb70b1
/system/core/init/property_service.c
|
9f5af635010a7ba92edf1fca543f7271cc9d75c8 |
|
24-Jan-2013 |
Colin Cross <ccross@android.com> |
init: move the system property writer implementation Move the system property writer implementation into bionic to keep it next to the reader implementation and allow for better testing. Change-Id: I9026e604109e30546b2849b60cab2e7e5ff00ba5
/system/core/init/property_service.c
|
2deedfe0b1ac86ebd62d19cf7da9e7dcb508ab09 |
|
29-Jan-2013 |
Colin Cross <ccross@android.com> |
init: switch property_get to use __system_property_get Change-Id: I4fc0502a1a5b331087618a4d2e3d90948743d7bd
/system/core/init/property_service.c
|
17775724b89e942b06c67144317697924039ad99 |
|
22-May-2013 |
Matthew Xie <mattx@google.com> |
am 5cb9a02b: am 7e723498: Merge "Add permission for bluetooth app in non-primary users" into jb-mr2-dev * commit '5cb9a02b0322c18b48eb9ce261502c3b830c113c': Add permission for bluetooth app in non-primary users
|
5cb9a02b0322c18b48eb9ce261502c3b830c113c |
|
22-May-2013 |
Matthew Xie <mattx@google.com> |
am 7e723498: Merge "Add permission for bluetooth app in non-primary users" into jb-mr2-dev * commit '7e72349865db83d62f98eec8bca4b170712fe0e0': Add permission for bluetooth app in non-primary users
|
7e72349865db83d62f98eec8bca4b170712fe0e0 |
|
22-May-2013 |
Matthew Xie <mattx@google.com> |
Merge "Add permission for bluetooth app in non-primary users" into jb-mr2-dev
|
40a91a2884333e48aacf266fde53960e03fa1cc4 |
|
20-May-2013 |
Matthew Xie <mattx@google.com> |
Add permission for bluetooth app in non-primary users bug 8954114 Change-Id: Id6a42f5a5beefa22c3cc8eecfb39a2222017a3b4
/system/core/init/property_service.c
|
1e47a7466868ff90f6afa2d20d1b209b7b8fcfae |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 253e91b4: am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '253e91b4ffb631b188fdac0c1624786103471f05': Revert "Add persistent property for SELinux enforcment status."
|
acef650dbc11355f9792923b69d8277a4ce89fab |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 43329bc1: am 8a387870: Revert "Reload policy after setting up the data partition." * commit '43329bc1c99c0f5f3670a8aaab39e54df34819a1': Revert "Reload policy after setting up the data partition."
|
253e91b4ffb631b188fdac0c1624786103471f05 |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 477e35d6: Revert "Add persistent property for SELinux enforcment status." * commit '477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6': Revert "Add persistent property for SELinux enforcment status."
|
43329bc1c99c0f5f3670a8aaab39e54df34819a1 |
|
21-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 8a387870: Revert "Reload policy after setting up the data partition." * commit '8a3878700eb9cd8ecf495cd01f15face5c3879c8': Revert "Reload policy after setting up the data partition."
|
477e35d6d56c7fe9b2305becdf3ed4f590ddfbd6 |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Add persistent property for SELinux enforcment status." This reverts commit b89bdfde422eff751b3f939f10ab57e22af83eaa.
/system/core/init/property_service.c
|
8a3878700eb9cd8ecf495cd01f15face5c3879c8 |
|
17-May-2013 |
repo sync <gcondra@google.com> |
Revert "Reload policy after setting up the data partition." This reverts commit fee250d27a9c03af1ba439047b976d89563b1887.
/system/core/init/property_service.c
|
51ef5882e79d72b03400812a4f37c32a36c80ebc |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
am 55d69a96: am 032be7a4: Merge "Log an error if property pool is exhausted" * commit '55d69a9681061b97d6bdcc0b1b92a7de63d0a07b': Log an error if property pool is exhausted
|
55d69a9681061b97d6bdcc0b1b92a7de63d0a07b |
|
01-May-2013 |
Colin Cross <ccross@android.com> |
am 032be7a4: Merge "Log an error if property pool is exhausted" * commit '032be7a4c5be8c015063084d162d1f394279aa3d': Log an error if property pool is exhausted
|
efbe7fc6cc871e95760b9b01d674a09f7e80eb6a |
|
01-May-2013 |
gcondra@google.com <gcondra@google.com> |
am 63577d92: am fee250d2: Reload policy after setting up the data partition. * commit '63577d9280e7919bfb7221030d211b833e66bb1e': Reload policy after setting up the data partition.
|
fee250d27a9c03af1ba439047b976d89563b1887 |
|
30-Apr-2013 |
repo sync <gcondra@google.com> |
Reload policy after setting up the data partition. This forces a policy reload + fixcon to deal with dynamically delivered policy changing labels on device nodes. It's implemented as a new keyword in init. Bug: 8702843 Change-Id: I803cf1ecf6ff8318ce25dcc5cda4f292adc9738c
/system/core/init/property_service.c
|
fd7ffb1089cf3ce43a33a157ed748641adb7b95b |
|
29-Apr-2013 |
Johan Redestig <johan.redestig@sonymobile.com> |
Log an error if property pool is exhausted Failing to set properties due to an exhausted pool leads to difficult to debug problems. This change adds an error log to make the situation a bit easier to handle. Change-Id: Icc1d97a80882fb23e74428a0195f1d28dba68fa8
/system/core/init/property_service.c
|
ada3291c8d13a9c3896102932abefed155a5b3fe |
|
26-Apr-2013 |
gcondra@google.com <gcondra@google.com> |
am 14ad7861: am 538b5d4e: Merge "Add persistent property for SELinux enforcment status." into jb-mr2-dev * commit '14ad786183455ad9c8298e24946d4da0f24458d7': Add persistent property for SELinux enforcment status.
|
b89bdfde422eff751b3f939f10ab57e22af83eaa |
|
24-Apr-2013 |
repo sync <gcondra@google.com> |
Add persistent property for SELinux enforcment status. Also adds triggers for going between enforcing and permissive status. Bug: 8702843 Change-Id: I841d80999b96acf6b6fd0a5408fb074952d6ae72
/system/core/init/property_service.c
|
ca8e66a8b0f843812014a28d49208f9f6f64ecbc |
|
18-Apr-2013 |
Nick Kralevich <nnk@google.com> |
Make init handle reboots Move the responsibility for rebooting the system from the reboot command to init. Init is in a better position to take actions to bring the system down cleanly, including making sure filesystems are mounted read-only. The only UIDs which can perform an init triggered reboot are root, system, and shell. Modify the reboot command so that it calls into init to perform the reboot. The reboot command no longer requires CAP_SYS_BOOT. Remove the -n reboot option and code which supports it. Anyone needing to do an unclean shutdown can just do a 'echo c > /proc/sysrq-trigger'. Modify adb so that it calls into init to perform a shutdown. Bug: 8646621 Change-Id: I84c0513acb549720cb0e8c9fcbda0050f5c396f5
/system/core/init/property_service.c
|
7ece0a862cf97e85bbe69458a32a2bd165456874 |
|
23-Jan-2013 |
Nick Kralevich <nnk@google.com> |
property_service: make /dev/__properties__ readable Currently, system properties are passed via the environment variable ANDROID_PROPERTY_WORKSPACE and a file descriptor passed from parent to child. This is insecure for setuid executables, as the environment variable can be changed by the caller. Make the /dev/__properties__ file accessible, so an app can get properties directly from the file, rather than relying on environment variables. Preserve the environment variable for compatibility with pre-existing apps. Bug: 8045561 Change-Id: If81e2b705eca43ddd8b491871aceff59c0e00387
/system/core/init/property_service.c
|
2840647b15fe91069aee02ce0e203943346bf294 |
|
22-Jan-2013 |
Nick Kralevich <nnk@google.com> |
Revert "init: make system properties more secure." This reverts commit 51e06618dbd87c4374c56d9193a5e567aa3d02ac. Bug: 8045561
/system/core/init/property_service.c
|
51e06618dbd87c4374c56d9193a5e567aa3d02ac |
|
18-Jan-2013 |
Nick Kralevich <nnk@google.com> |
init: make system properties more secure. Currently, system properties are passed via the environment variable ANDROID_PROPERTY_WORKSPACE and a file descriptor passed from parent to child. This is insecure for setuid executables, as the environment variable can be changed by the caller. Modify system property handling so that we get the properties from a root owned properties file, rather than using an environment variable. Related to bug: 8029617 Change-Id: I18610128e11c4037ed6f4dec6eba20f69fa647eb
/system/core/init/property_service.c
|
6575a1625ac585b46f90c6f036db9231db50c969 |
|
23-Oct-2012 |
Nick Kralevich <nnk@google.com> |
am 8f98c4b5: Merge "Fix dirfd crash issue in property service" * commit '8f98c4b5f011db8637ce1b9361e82d59b13434f4': Fix dirfd crash issue in property service
|
e41bc3155588c2fdc23b512a959e20e896da5180 |
|
23-Oct-2012 |
Yi-wei Zhao <gbjc64@motorola.com> |
Fix dirfd crash issue in property service In "init: harden property service" patch, dirfd() is invoked without checking whether opendir() return successfully. It may fail if load_persistent_properties() is invoked before userdata partition is mounted; then dirfd(NULL) will make init crash. This may happen if "is_charger" is true. Change-Id: I216fb743a3c9fa050f92fcb31b62e766346d84bb Signed-off-by: Yi-wei Zhao <gbjc64@motorola.com>
/system/core/init/property_service.c
|
2a36ae5608e9d655b2bb14ce538f6fbdb910cada |
|
17-Oct-2012 |
Kenny Root <kroot@google.com> |
am 7b88a90d: Merge "Remove HAVE_SELINUX guards" * commit '7b88a90da2a27e347fc16c14fa577f4ae1ef07fd': Remove HAVE_SELINUX guards
|
b5982bf7c65b30be981ecfe1847437b05e32b2bb |
|
17-Oct-2012 |
Kenny Root <kroot@google.com> |
Remove HAVE_SELINUX guards Change-Id: I8272c573b3c5dc663203bafab68fad5e94d89364
/system/core/init/property_service.c
|
474cb0e33aa12f7ba11170ad1a6b564bde244151 |
|
04-Oct-2012 |
Nick Kralevich <nnk@google.com> |
am 33045b3d: am f9c05970: Merge "init: harden property service." * commit '33045b3d7bd965f67e2e0b175976cf9934fb924f': init: harden property service.
|
7ecfe6a94baf9f5d883e32a870e282c5b349a954 |
|
02-Oct-2012 |
Nick Kralevich <nnk@google.com> |
init: harden property service. Don't create temporary files in a well-known location. Rather, use mkstemp(). Don't read persistent property files from insecure files. Change-Id: I81e2aca674a2a7ca54869f088737fb228d3af6d2
/system/core/init/property_service.c
|
32b9023d086e3e22886dd3271f505ef64cd84bc8 |
|
19-Sep-2012 |
Nick Kralevich <nnk@google.com> |
init: Don't read local properties if ro.debuggable=0 Bug: 7195965 Change-Id: I29fdad61aa61f2c46d49db227cf7b84d9cc6f25d
/system/core/init/property_service.c
|
e953e9657c482d83ad487a4b861026a16f6bbb64 |
|
15-Aug-2012 |
Jeonghoon lim <jeonghoon.lim@lge.com> |
bluetooth: bring up with bluedroid stack - change permission of "bluetooth." property to AID_BLUETOOTH Change-Id: Ifcd97f136cfc3372412fe500e4f800d1bbbd065c
/system/core/init/property_service.c
|
2fec4de5c704afe4dc2a1bb976699a0e363786dd |
|
13-Aug-2012 |
Kenny Root <kroot@android.com> |
am 11c783f1: am 9494f297: Merge "Implement SELinux/MAC checks for property service." * commit '11c783f1ead9f276e8854cb1adaebeed8517e8a1': Implement SELinux/MAC checks for property service.
|
605103fb553a8b872aa8dd0aef76ae8b3bfe47fa |
|
13-Aug-2012 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 4dcd52ab to jb-mr1-dev Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
63207cd20f2156bec937a85e789f07de0d1afa9d |
|
09-Aug-2012 |
rpcraig <rpcraig@tycho.ncsc.mil> |
Implement SELinux/MAC checks for property service. This is a set of changes to the init property service implementation to apply a SELinux check over who can change what properties. Also included control hooks for the 'ctl' keys. Change-Id: I5a18809bf5536f6459a36b6bf0d622b9f5061aa0 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/core/init/property_service.c
|
ae6f3d7c05070f7e0e56fe0056c8923c6ee2f473 |
|
01-May-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add support for reloading policy from /data/system. To support runtime policy management, add support for reloading policy from /data/system. This can be triggered by setting the selinux.loadpolicy property to 1, whether from init.rc after mounting /data or from the system_server (e.g. upon invocation of a new device admin API for provisioning policy). ueventd and installd are restarted upon policy reloads to pick up the new policy configurations relevant to their operation. Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/core/init/property_service.c
|
a8afd723a4bdd68eda34a552a472a6adc0c26369 |
|
02-Aug-2012 |
Ravi Nagarajan <nravi@broadcom.com> |
Allow AID_BLUETOOTH to update persist.service.bdroid When devices are provisioned, bd address path is set in ro.bt.bdaddr_path. On devices where this property is not present, a random bd address is generated and saved to the property: persist.service.bdroid.bdaddr This change allows bluetooth process to update this property bug 6885309 Change-Id: I2e8a2471a0e890da82e6bbec6a2ef67ec8e1f8f4
/system/core/init/property_service.c
|
8c0350f4eedc85e37655dcfe8b6c5ec14b8c4979 |
|
03-Jul-2012 |
jeonghoon.lim <jeonghoon.lim@lge.com> |
bluetooth: add property permission for bluetooth add property permission for bluetooth. Change-Id: I099f325f533d06c63ad43843dd6477ea81fc9781
/system/core/init/property_service.c
|
45fa13f370eb5b9215a3467a211f16b3c49f19e9 |
|
28-Apr-2012 |
Romain Guy <romainguy@google.com> |
Let users with SYSTEM permission set debug. properties Change-Id: Ieda3f7dd5dca5f6a8fc50b07822e6a875db030ad
/system/core/init/property_service.c
|
0dbda7e1c5bcebc501b4943cd6483122297e1834 |
|
18-Jan-2012 |
Nick Kralevich <nnk@google.com> |
Don't read /data/local.prop on user builds Creating a root owned /data/local.prop is one of the most common ways to root an Android device. /data/local.prop is only intended to assist developers on debuggable devices, and is never intended to be used on production devices. Change-Id: Ifcfa21c2ee9914b0b54445218b4cf0fea0a98e9c
/system/core/init/property_service.c
|
8886112d87bcc501e89e4763656a3ebfeb58edf2 |
|
19-Dec-2011 |
Dima Zavin <dima@android.com> |
init: export all androidboot cmd line values as ro.boot.xx props Also, clean up how we initialize the ro.xx properties and process the kernel command line. Change-Id: Iedda6c90e31340a189171a44b2767480403354f7 Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
|
33901e602484d0b5f6a07746e4660ec3e9ac62f7 |
|
19-Nov-2011 |
Jeff Brown <jeffbrown@google.com> |
Delete dead code. Change-Id: Icfb9bcee2c524026ecbeb7e30e943d8ca299a33a
/system/core/init/property_service.c
|
ebf46586f57e580d0195a06c32103ea393314f01 |
|
06-Sep-2011 |
Dima Zavin <dima@android.com> |
init: do not load default.prop from ramdisk in charger mode Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb Signed-off-by: Dima Zavin <dima@android.com>
/system/core/init/property_service.c
|
5da93589f106646203d6633e2e927aba01fbdb9f |
|
22-Aug-2011 |
Benoit Goby <benoit@android.com> |
Allow radio to set sys.usb.config This allows the ril to put the phone into diagnostic mode Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
/system/core/init/property_service.c
|
22bfc4cca03197036c3b49e7c2cf47a0a23fce87 |
|
29-Jul-2011 |
Benoit Goby <benoit@android.com> |
Allow radio to set net.cdma* properties Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
/system/core/init/property_service.c
|
7100f640deabb9e746e41eac54707f1ca531f2db |
|
26-Jul-2011 |
Benoit Goby <benoit@android.com> |
Allow radio to set net.lte* properties Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
/system/core/init/property_service.c
|
9bb4d411e01c8e6330b5c27c489485592360576b |
|
09-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
init: update permissions for VPN. VPN no longer uses system properties to keep network parameters. Besides, profiles are now stored and encrypted by keystore. Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
/system/core/init/property_service.c
|
d18678f882eed5677c28d03a86a8ab43300acd4e |
|
01-Jul-2011 |
Mike Lockwood <lockwood@android.com> |
init: Handle EINTR in handle_property_set_fd() Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
71ead1835317af5305f9ef87ce06ebdf9cff92e6 |
|
01-Apr-2011 |
Brad Fitzpatrick <bradfitz@android.com> |
Close the client socket early for ctl.* properties. Bug: 4199411 Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
/system/core/init/property_service.c
|
9f1e0e3ae3108086948b74ce58af32df92ff8331 |
|
30-Mar-2011 |
Brad Fitzpatrick <bradfitz@android.com> |
Close the property socket *after* updating properties. Also remove some dead code. Bionic update is in change I3e80cecf Bug: 4185486 Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
/system/core/init/property_service.c
|
c5c51033c86353d1a448c72e0e9388906eed7114 |
|
09-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Load the persistent properties after decrypting the /data partition Fix for bug 3415286. The persistent properties are normally read early in the boot process after /data is mounted. However, for an encrypted system, at that point /data is a tmpfs ramdisk. This change adds a new command to init (load_persist_props) to read the persistent properties, and adds an action to init.rc to load the persistent properties. This action is triggered by setting a property in vold, but that's in a different CL. Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
/system/core/init/property_service.c
|
cf01597121c1c08780966f22e2a62386d0e1a08f |
|
19-Feb-2011 |
Amol Bhatkar <amolbhatkar@motorola.com> |
property_service: Give radio permission to set net.qmi* Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
/system/core/init/property_service.c
|
58aa5b0ee0ec67d4e0f3b12e27cd58279bef0dee |
|
10-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
init: Allow non-root adbd to switch between TCP and USB modes Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
cfa0d8439384a1aaa53d31fb720c234cabf796ee |
|
03-Oct-2010 |
Wink Saville <wink@google.com> |
Allow AID_RADIO to restart the ril-daemon. This enhances robustness by allowing the Telephony Framework to restart ril-daemon if it notices some catastrophic failure. Added setprop ctl.restart. Added ril-daemon to setprop control_perms and allow users/groups with the AID_RADIO ID to control it. Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
/system/core/init/property_service.c
|
25b15be9120bcdaa0aba622c67ad2c835d9e91ca |
|
14-Jul-2010 |
Brian Swetland <swetland@google.com> |
init: use tmpfs/ftruncate for properties backing store instead of ashmem This removes the need for ashmem for early bringup and avoids an issue with permissions enforcement. Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182 Signed-off-by: Brian Swetland <swetland@google.com>
/system/core/init/property_service.c
|
3294bbbad9494eb4ca534624b96e39f8ed15aaf2 |
|
20-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Allow services to start before property triggers are up Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
/system/core/init/property_service.c
|
ed8a7d84428ec945c48b6b53dc5a3a18fabaf683 |
|
20-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move list and log handling to list.h and log.h Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
/system/core/init/property_service.c
|
3899e9fc01cf608f19f716749c54cc5c4d17e766 |
|
14-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move prototypes for util.c into util.h Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
/system/core/init/property_service.c
|
d11beb2b1516144327c3f730f75e6b4bc65f1374 |
|
14-Apr-2010 |
Colin Cross <ccross@android.com> |
init: Move property_set_fd to property_service.c Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
/system/core/init/property_service.c
|
ef4e21520cef69aaa7b488a3f44b2490dc2e3eb5 |
|
12-Nov-2009 |
Oscar Montemayor <oam@google.com> |
Encrypted File SYstems project. Enabling EFS security properties. This change enables persist.security.* flags in the device, allowing oly the system to modify them. Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the framework as well as from the recovery mode / transition.
/system/core/init/property_service.c
|
c5e7ef24308f5a993ecfd5ac438d347e786f5e42 |
|
03-Sep-2009 |
Mike Lockwood <lockwood@android.com> |
init: Add support for enforcing setprop by caller's group. Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
3dfe6c66646865a78449a435239145deeaeab3ba |
|
26-Aug-2009 |
Tammo Spalink <tammo@google.com> |
Add persistent radio prop perms ; cleanup ws and typos. Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
/system/core/init/property_service.c
|
0ab3a93abaac2d44d1db064c91c275f0e38925de |
|
25-Aug-2009 |
Robert Greenwalt <robdroid@android.com> |
Allow radio to modify net.ppp* properties for dns The radio bringup script was changed from operating as root to operating as radio. This is preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that ConnectivityService needs to correctly set dns. bug: 2077628
/system/core/init/property_service.c
|
88dc657d50cb3289a9011828c497eee996ed958c |
|
19-Jun-2009 |
Chia-chi Yeh <chiachi@android.com> |
Add device, property, directory, and file permissions for VPN.
/system/core/init/property_service.c
|
b3779558dcfbe99f0b9c1ef796e3728edad25672 |
|
08-May-2009 |
Mike Lockwood <lockwood@android.com> |
init: Fix some broken code that did not cause problems until switching to gcc 4.4 Signed-off-by: Mike Lockwood <lockwood@android.com>
/system/core/init/property_service.c
|
e037fd7e193ecccbb5c0888e49f6d58c224bc11d |
|
13-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@138607
/system/core/init/property_service.c
|
dd7bc3319deb2b77c5d07a51b7d6cd7e11b5beb0 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
|
e54eebbf1a908d65ee8cf80bab62821c05666d70 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/system/core/init/property_service.c
|
35237d135807af84bf9b0e5b8d7f8633e58db6f5 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/system/core/init/property_service.c
|
4f6e8d7a00cbeda1e70cc15be9c4af1018bdad53 |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/system/core/init/property_service.c
|