summaryrefslogtreecommitdiffstats
path: root/init/property_service.c
Commit message (Collapse)AuthorAgeFilesLines
* am 8f98c4b5: Merge "Fix dirfd crash issue in property service"Nick Kralevich2012-10-231-1/+2
|\ | | | | | | | | * commit '8f98c4b5f011db8637ce1b9361e82d59b13434f4': Fix dirfd crash issue in property service
| * Fix dirfd crash issue in property serviceYi-wei Zhao2012-10-231-1/+2
| | | | | | | | | | | | | | | | | | | | | | In "init: harden property service" patch, dirfd() is invoked without checking whether opendir() return successfully. It may fail if load_persistent_properties() is invoked before userdata partition is mounted; then dirfd(NULL) will make init crash. This may happen if "is_charger" is true. Change-Id: I216fb743a3c9fa050f92fcb31b62e766346d84bb Signed-off-by: Yi-wei Zhao <gbjc64@motorola.com>
* | am 7b88a90d: Merge "Remove HAVE_SELINUX guards"Kenny Root2012-10-171-18/+0
|\ \ | |/ | | | | | | * commit '7b88a90da2a27e347fc16c14fa577f4ae1ef07fd': Remove HAVE_SELINUX guards
| * Remove HAVE_SELINUX guardsKenny Root2012-10-161-18/+0
| | | | | | | | Change-Id: I8272c573b3c5dc663203bafab68fad5e94d89364
* | am 33045b3d: am f9c05970: Merge "init: harden property service."Nick Kralevich2012-10-041-23/+43
|\ \ | |/ | | | | | | * commit '33045b3d7bd965f67e2e0b175976cf9934fb924f': init: harden property service.
| * init: harden property service.Nick Kralevich2012-10-041-23/+43
| | | | | | | | | | | | | | | | | | Don't create temporary files in a well-known location. Rather, use mkstemp(). Don't read persistent property files from insecure files. Change-Id: I81e2aca674a2a7ca54869f088737fb228d3af6d2
* | init: Don't read local properties if ro.debuggable=0Nick Kralevich2012-09-191-6/+12
| | | | | | | | | | Bug: 7195965 Change-Id: I29fdad61aa61f2c46d49db227cf7b84d9cc6f25d
* | bluetooth: bring up with bluedroid stackJeonghoon lim2012-08-151-1/+1
| | | | | | | | | | | | - change permission of "bluetooth." property to AID_BLUETOOTH Change-Id: Ifcd97f136cfc3372412fe500e4f800d1bbbd065c
* | am 11c783f1: am 9494f297: Merge "Implement SELinux/MAC checks for property ↵Kenny Root2012-08-131-11/+79
|\ \ | |/ | | | | | | | | | | service." * commit '11c783f1ead9f276e8854cb1adaebeed8517e8a1': Implement SELinux/MAC checks for property service.
| * Implement SELinux/MAC checks for property service.rpcraig2012-08-091-11/+79
| | | | | | | | | | | | | | | | | | | | This is a set of changes to the init property service implementation to apply a SELinux check over who can change what properties. Also included control hooks for the 'ctl' keys. Change-Id: I5a18809bf5536f6459a36b6bf0d622b9f5061aa0 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
* | resolved conflicts for merge of 4dcd52ab to jb-mr1-devKenny Root2012-08-131-0/+6
|\ \ | |/ | | | | Change-Id: Ibd0c03a7883a2e31adab18543c016776b7b36866
| * Add support for reloading policy from /data/system.Stephen Smalley2012-08-091-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | To support runtime policy management, add support for reloading policy from /data/system. This can be triggered by setting the selinux.loadpolicy property to 1, whether from init.rc after mounting /data or from the system_server (e.g. upon invocation of a new device admin API for provisioning policy). ueventd and installd are restarted upon policy reloads to pick up the new policy configurations relevant to their operation. Change-Id: I97479aecef8cec23b32f60e09cc778cc5520b691 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* | Allow AID_BLUETOOTH to update persist.service.bdroidRavi Nagarajan2012-08-061-0/+1
| | | | | | | | | | | | | | | | | | | | When devices are provisioned, bd address path is set in ro.bt.bdaddr_path. On devices where this property is not present, a random bd address is generated and saved to the property: persist.service.bdroid.bdaddr This change allows bluetooth process to update this property bug 6885309 Change-Id: I2e8a2471a0e890da82e6bbec6a2ef67ec8e1f8f4
* | bluetooth: add property permission for bluetoothjeonghoon.lim2012-07-161-0/+1
|/ | | | | | add property permission for bluetooth. Change-Id: I099f325f533d06c63ad43843dd6477ea81fc9781
* Let users with SYSTEM permission set debug. propertiesRomain Guy2012-04-271-0/+1
| | | | Change-Id: Ieda3f7dd5dca5f6a8fc50b07822e6a875db030ad
* Don't read /data/local.prop on user buildsNick Kralevich2012-01-181-0/+4
| | | | | | | | | Creating a root owned /data/local.prop is one of the most common ways to root an Android device. /data/local.prop is only intended to assist developers on debuggable devices, and is never intended to be used on production devices. Change-Id: Ifcfa21c2ee9914b0b54445218b4cf0fea0a98e9c
* init: export all androidboot cmd line values as ro.boot.xx propsDima Zavin2012-01-051-3/+6
| | | | | | | | Also, clean up how we initialize the ro.xx properties and process the kernel command line. Change-Id: Iedda6c90e31340a189171a44b2767480403354f7 Signed-off-by: Dima Zavin <dima@android.com>
* Delete dead code.Jeff Brown2011-11-181-15/+0
| | | | Change-Id: Icfb9bcee2c524026ecbeb7e30e943d8ca299a33a
* init: do not load default.prop from ramdisk in charger modeDima Zavin2011-09-061-2/+3
| | | | | Change-Id: Ic471b891829d7f857674b925c9948954972d9ecb Signed-off-by: Dima Zavin <dima@android.com>
* Allow radio to set sys.usb.configBenoit Goby2011-08-221-0/+1
| | | | | | This allows the ril to put the phone into diagnostic mode Change-Id: Iafc8164991550e7ab0ffda8b8da1d58e34a4225b
* Allow radio to set net.cdma* propertiesBenoit Goby2011-07-281-0/+1
| | | | Change-Id: I656abde9d06175eb158e84de4d08ede42620b46a
* Allow radio to set net.lte* propertiesBenoit Goby2011-07-251-0/+1
| | | | Change-Id: I4b7a280ba4c773673b28db8cfbbffcb360ee717f
* init: update permissions for VPN.Chia-chi Yeh2011-07-081-2/+0
| | | | | | | VPN no longer uses system properties to keep network parameters. Besides, profiles are now stored and encrypted by keystore. Change-Id: I7575f04f350b7d8d5ba7008eb874a72180d057e8
* init: Handle EINTR in handle_property_set_fd()Mike Lockwood2011-07-011-3/+3
| | | | | Change-Id: I5a6f1791eaf11e98b1d81697112d78c99822fba5 Signed-off-by: Mike Lockwood <lockwood@android.com>
* Close the client socket early for ctl.* properties.Brad Fitzpatrick2011-04-011-5/+9
| | | | | Bug: 4199411 Change-Id: I3bf335e16e0df8405c538989a8f4f6db7795fa36
* Close the property socket *after* updating properties.Brad Fitzpatrick2011-03-301-10/+6
| | | | | | | | | Also remove some dead code. Bionic update is in change I3e80cecf Bug: 4185486 Change-Id: I28e06197ff7a452c70b89b9fc5e2bcf0d9d54bbe
* Load the persistent properties after decrypting the /data partitionKen Sumrall2011-03-101-0/+12
| | | | | | | | | | | | Fix for bug 3415286. The persistent properties are normally read early in the boot process after /data is mounted. However, for an encrypted system, at that point /data is a tmpfs ramdisk. This change adds a new command to init (load_persist_props) to read the persistent properties, and adds an action to init.rc to load the persistent properties. This action is triggered by setting a property in vold, but that's in a different CL. Change-Id: I74b3057974ee6029c29d956b76fef5566700d471
* property_service: Give radio permission to set net.qmi*Amol Bhatkar2011-03-021-0/+1
| | | | Change-Id: I771ef22859799b863ab79de9d3248ef610af4dd8
* init: Allow non-root adbd to switch between TCP and USB modesMike Lockwood2010-12-101-0/+1
| | | | | Change-Id: I9e93ceefadfaa2a4f8ec25cfa05fa4821fd98093 Signed-off-by: Mike Lockwood <lockwood@android.com>
* Allow AID_RADIO to restart the ril-daemon.Wink Saville2010-10-031-2/+3
| | | | | | | | | | | This enhances robustness by allowing the Telephony Framework to restart ril-daemon if it notices some catastrophic failure. Added setprop ctl.restart. Added ril-daemon to setprop control_perms and allow users/groups with the AID_RADIO ID to control it. Change-Id: I195abdd754a731ce0b77e8f71ab47fde8c3e7977
* init: use tmpfs/ftruncate for properties backing store instead of ashmemBrian Swetland2010-07-131-6/+15
| | | | | | | | This removes the need for ashmem for early bringup and avoids an issue with permissions enforcement. Change-Id: I405b080660934d73048c79d614b6b2ebc43ab182 Signed-off-by: Brian Swetland <swetland@google.com>
* init: Allow services to start before property triggers are upColin Cross2010-04-211-1/+7
| | | | Change-Id: I4f87657123bea88b7b5c537781868908d8d66b01
* init: Move list and log handling to list.h and log.hColin Cross2010-04-211-0/+1
| | | | Change-Id: I298f575c590d0f28b7ad78747f3ebdbba56b7a27
* init: Move prototypes for util.c into util.hColin Cross2010-04-131-0/+1
| | | | Change-Id: I46a91849ce5297eb2597dd6134412f817564ec24
* init: Move property_set_fd to property_service.cColin Cross2010-04-131-7/+14
| | | | Change-Id: Ic7a19073eae8f353d48cabee80fa9722b35a82b5
* Encrypted File SYstems project. Enabling EFS security properties.Oscar Montemayor2009-11-121-0/+1
| | | | | | This change enables persist.security.* flags in the device, allowing oly the system to modify them. Change is necessary to allow for further progress in the project, as this is an ideal location for access both from the framework as well as from the recovery mode / transition.
* init: Add support for enforcing setprop by caller's group.Mike Lockwood2009-09-031-31/+37
| | | | | Change-Id: Ic96e139c4c596882adb38b8863ac6157e0ac17b5 Signed-off-by: Mike Lockwood <lockwood@android.com>
* Add persistent radio prop perms ; cleanup ws and typos.Tammo Spalink2009-08-311-28/+29
| | | | Change-Id: I7d6b51bbb8a9658179bd01c4ff3b5356ec8b4b6c
* Allow radio to modify net.ppp* properties for dnsRobert Greenwalt2009-08-251-0/+1
| | | | | | | | The radio bringup script was changed from operating as root to operating as radio. This is preventing it from adding the "net.ppp0.dns0" and "net.ppp0.dns1" properties that ConnectivityService needs to correctly set dns. bug: 2077628
* Add device, property, directory, and file permissions for VPN.Chia-chi Yeh2009-06-191-0/+2
|
* init: Fix some broken code that did not cause problems until switching to ↵Mike Lockwood2009-05-081-4/+3
| | | | | | gcc 4.4 Signed-off-by: Mike Lockwood <lockwood@android.com>
* auto import from //branches/cupcake_rel/...@138607The Android Open Source Project2009-03-131-0/+1
|
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-031-0/+502
|
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-031-502/+0
|
* Code drop from //branches/cupcake/...@124589The Android Open Source Project2008-12-171-1/+1
|
* Initial ContributionThe Android Open Source Project2008-10-211-0/+502