| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| |
| |
| | |
* commit '8f98c4b5f011db8637ce1b9361e82d59b13434f4':
Fix dirfd crash issue in property service
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
In "init: harden property service" patch, dirfd() is invoked
without checking whether opendir() return successfully. It may
fail if load_persistent_properties() is invoked before userdata
partition is mounted; then dirfd(NULL) will make init crash.
This may happen if "is_charger" is true.
Change-Id: I216fb743a3c9fa050f92fcb31b62e766346d84bb
Signed-off-by: Yi-wei Zhao <gbjc64@motorola.com>
|
|\ \
| |/
| |
| |
| | |
* commit '7b88a90da2a27e347fc16c14fa577f4ae1ef07fd':
Remove HAVE_SELINUX guards
|
| |
| |
| |
| | |
Change-Id: I8272c573b3c5dc663203bafab68fad5e94d89364
|
|\ \
| |/
| |
| |
| | |
* commit '33045b3d7bd965f67e2e0b175976cf9934fb924f':
init: harden property service.
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Don't create temporary files in a well-known location. Rather,
use mkstemp().
Don't read persistent property files from insecure files.
Change-Id: I81e2aca674a2a7ca54869f088737fb228d3af6d2
|
| |
| |
| |
| |
| | |
Bug: 7195965
Change-Id: I29fdad61aa61f2c46d49db227cf7b84d9cc6f25d
|
| |
| |
| |
| |
| |
| | |
- change permission of "bluetooth." property to AID_BLUETOOTH
Change-Id: Ifcd97f136cfc3372412fe500e4f800d1bbbd065c
|
|\ \
| |/
| |
| |
| |
| |
| | |
service."
* commit '11c783f1ead9f276e8854cb1adaebeed8517e8a1':
Implement SELinux/MAC checks for property service.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This is a set of changes to the init property service
implementation to apply a SELinux check over who can
change what properties. Also included control hooks
for the 'ctl' keys.
Change-Id: I5a18809bf5536f6459a36b6bf0d622b9f5061aa0
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
|
|\ \
| |/
| |
| | |
Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
To support runtime policy management, add support for reloading
policy from /data/system. This can be triggered by setting the
selinux.loadpolicy property to 1, whether from init.rc after
mounting /data or from the system_server (e.g. upon invocation of
a new device admin API for provisioning policy). ueventd and
installd are restarted upon policy reloads to pick up the new
policy configurations relevant to their operation.
Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
When devices are provisioned, bd address path is set in ro.bt.bdaddr_path.
On devices where this property is not present, a random bd address is
generated and saved to the property: persist.service.bdroid.bdaddr
This change allows bluetooth process to update this property
bug 6885309
Change-Id: I2e8a2471a0e890da82e6bbec6a2ef67ec8e1f8f4
|
|/
|
|
|
|
| |
add property permission for bluetooth.
Change-Id: I099f325f533d06c63ad43843dd6477ea81fc9781
|
|
|
|
| |
Change-Id: Ieda3f7dd5dca5f6a8fc50b07822e6a875db030ad
|
|
|
|
|
|
|
|
|
| |
Creating a root owned /data/local.prop is one of the most common
ways to root an Android device. /data/local.prop is only intended
to assist developers on debuggable devices, and is never
intended to be used on production devices.
Change-Id: Ifcfa21c2ee9914b0b54445218b4cf0fea0a98e9c
|
|
|
|
|
|
|
|
| |
Also, clean up how we initialize the ro.xx properties and process
the kernel command line.
Change-Id: Iedda6c90e31340a189171a44b2767480403354f7
Signed-off-by: Dima Zavin <dima@android.com>
|
|
|
|
| |
Change-Id: Icfb9bcee2c524026ecbeb7e30e943d8ca299a33a
|
|
|
|
|
| |
Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb
Signed-off-by: Dima Zavin <dima@android.com>
|
|
|
|
|
|
| |
This allows the ril to put the phone into diagnostic mode
Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
|
|
|
|
| |
Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
|
|
|
|
| |
Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
|
|
|
|
|
|
|
| |
VPN no longer uses system properties to keep network parameters.
Besides, profiles are now stored and encrypted by keystore.
Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
|
|
|
|
|
| |
Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5
Signed-off-by: Mike Lockwood <lockwood@android.com>
|
|
|
|
|
| |
Bug: 4199411
Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
|
|
|
|
|
|
|
|
|
| |
Also remove some dead code.
Bionic update is in change I3e80cecf
Bug: 4185486
Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix for bug 3415286. The persistent properties are normally read early
in the boot process after /data is mounted. However, for an encrypted
system, at that point /data is a tmpfs ramdisk. This change adds a new
command to init (load_persist_props) to read the persistent properties,
and adds an action to init.rc to load the persistent properties. This
action is triggered by setting a property in vold, but that's in a
different CL.
Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
|
|
|
|
| |
Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
|
|
|
|
|
| |
Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093
Signed-off-by: Mike Lockwood <lockwood@android.com>
|
|
|
|
|
|
|
|
|
|
|
| |
This enhances robustness by allowing the Telephony Framework to restart
ril-daemon if it notices some catastrophic failure.
Added setprop ctl.restart.
Added ril-daemon to setprop control_perms and allow users/groups
with the AID_RADIO ID to control it.
Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
|
|
|
|
|
|
|
|
| |
This removes the need for ashmem for early bringup and avoids an issue
with permissions enforcement.
Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182
Signed-off-by: Brian Swetland <swetland@google.com>
|
|
|
|
| |
Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
|
|
|
|
| |
Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
|
|
|
|
| |
Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
|
|
|
|
| |
Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
|
|
|
|
|
|
| |
This change enables persist.security.* flags in the device, allowing oly the system to modify them.
Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the
framework as well as from the recovery mode / transition.
|
|
|
|
|
| |
Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5
Signed-off-by: Mike Lockwood <lockwood@android.com>
|
|
|
|
| |
Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
|
|
|
|
|
|
|
|
| |
The radio bringup script was changed from operating as root to operating as radio. This is
preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that
ConnectivityService needs to correctly set dns.
bug: 2077628
|
| |
|
|
|
|
|
|
| |
gcc 4.4
Signed-off-by: Mike Lockwood <lockwood@android.com>
|
| |
|
| |
|
| |
|
| |
|
|
|