Runtime files and sockets used by location modules
are moved to vendor partiion from /data/misc/location
to /data/vendor/location.
CRs-fixed: 2046657
Change-Id: I76da150d7a897bf94b950217587e40c82f2f02c6
-dpmQmiMgr permissions are updated with radio group
to communicate with QMUXD socket.
CRs-Fixed: 2183993
Change-Id: I37195ffc6602d009ac4cace6c742484e70a768ec
- Added user and group tag for dpmQmiMgr
- Start the daemon with system privilege.
CRs-Fixed: 2080471
Change-Id: Id3a4a9f849d336e103c3c6897daf34465230b83a
-dpmwrapper and tcm unix domain sockets are created
from init.qcom.rc to enable socket communication in
system region.
CRs-Fixed: 2076621
Change-Id: I06dfe50f0547d6b9dc489dba5fbd9cf62c1b66b0
Earlier, this used to be set from rmt_storage service with
sys_admin capability. But now, that capability is dropped
off and hence, set it here in init scripts.
Change-Id: Ie8a3895c2b63da35d78fb9e571d74b735c969520
rmt_storage should not be automatically killed by Android during
shutdown since it is needed to actually process the peripheral
shutdown
Change-Id: I58a29fe86955f0abad944727bb4208dad89f495d
Desc: Enabling imsrcsd to run on init.
1. introduce imsrcsd
2. updating ims properties from "sys" to "vendor"
Change-Id: I224512c30cdfc0b832e16f9432b2a15ec6ab7d79
CRs-fixed: 2079498
misc location in vendor belongs to a predefined service and causes
denials due to collisions with that service. Move the logging to
process specific folders within vendor.
CRs-Fixed: 2052618
Change-Id: Ie43dee22d7dea94b87eac73bb5f2dd01f0cb9225
- Audio HAL has to write to boot_adsp sysfs entry to unload image
- Add audio group to boot_adsp sysfs to give write permission
Change-Id: Ia3b40384aa42a0ad94d2e3cc1380ff4dd5a128c0
pd-mapper needs to be able to write the pd error string to the kmsg
buffer. It runs under the system user.
Change-Id: Ic52682f8151d10c4e6ffdc2b3ed4bc2183ebd6f6
Removing redundant creation and assignment of permission for
data/misc/bluetooth folder from init.qcom.rc file.
Change-Id: I941a53d01675b44fa6a5b59bcd2b72f9e6a11ab7
These changes are to create folder to collect logs and
dump from Bluetooth HAL daemon.
CRs-Fixed: 2051034
Change-Id: Ib930a80aab1354ad1463a02febf71eba922e2df8
* No longer used.
* It lives in it's own rc extension now
Change-Id: I0c53cbb1ba2610aac4349b6a0e66e23c75871d27
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
* net_bt_stack is gone, replace it with bluetooth (android/platform_system_core@604208e957)
Change-Id: I62ac0fa2e59a9643fd6a3d4b173dd8c8892037b9
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
* Match the new changes introduced in O
Change-Id: I43c6fa60214ce91d6a149f15416a9f3170abfdd5
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
This will let the wifi hal run as "wifi" user and not need root
permissions to access this path for firmware reloads.
Bug: 33435250
Test: Compiles.
Change-Id: I84a38cea5e0f729147c3191c3485a3738d7838ef
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
Make symbolic link from
/dev/block/platform/soc/${ro.boot.bootdevice} to
/dev/block/bootdevice.
Change-Id: I7b7f4c728656103445e7fb68ccca92402fa36ff5
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for pid=2664 comm="rmt_storage" capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0
Change-Id: Ib02b4aedab479f5ad8aca3a2100b5c489397002a
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for capability=1 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability
Adding
wifi group to access
/data/misc/net/rt_tables
-rw-r--r-- 1 system wifi 130 2016-05-11 09:58 rt_tables
wakelock group to access:
/sys/power/wake_lock
-rw-rw---- 1 radio wakelock 4096 1970-01-19 15:03 wake_lock
radio/inet groups to access
/dev/socket/netmgr/netmgr_connect_socket
srw-rw---- 1 radio inet 0 1970-01-19 15:03 netmgr_connect_socket
Change-Id: I7ed6a98dd85bf7efa8cab0b8a0851217f030ba8b
* When a device with hundreds of apps is booted up, hundreds of
apps will spawn their BOOT_COMPLETED receivers which start
up their background initialization services. Since only one
core is allowed for these processes, the time for all these
services to complete is extremely long.
* To improve this, allow three cores for background processes,
keeping the fourth for idle wakeups. This ends up producing
a better thermal profile for the device as well, since the
small cores are not the aggressor on this SoC.
Change-Id: I98bbf8bf565bd77066ff7726014e6fa5730a4e09
Sound trigger HAL needs to write to the WDSP sysfs
node to load WDSP image. Update ownership from root
to media:audio for this node.
Change-Id: Iefe889ffd21bba154875f71cf55f4a571d88f9fb
Some of the directories under persist need to be accessed by
daemons which are running with root access. Currently only
system is allowed to access or create files under /persist.
Change the permission for persist to allow root to access and
create files.
CRs-Fixed: 1018233
Change-Id: Icbdbf5ddc329ff9627f6bcf79445b98aae942956
On first boot all services which belonging to main class
will get killed to perform encryption. Later on these services
will get restarted. Since cnss_diag is defined as one shot,
need to start service back at the time vold.decrypt property
is set.
Change-Id: Ib673398b892f6301b69cf4cff6e8cf17ada4620c
CRs-Fixed: 1041549
Stop cnss-daemon when device shutdown. This is required by
peripheral manager as cnss-daemon vote for modem when service is
started. It needs to release vote when device shutdown.
Change-Id: I48c8bcab673280ab5f725ffdb4625994f2078b8f
CRs-Fixed: 1051868
Start cnss-daemon with system level permission. Add
required group as part of init script for cnss-daemon
service.
Change-Id: Icc685e9c2734ff0552d5912eb18471456774fcc8
CRs-Fixed: 1024366
Instead of using the BT state, trigger control operations from the
actual FM service state
Change-Id: Ib8edd47e8dd2ac7393ca3f0c8b903148bea743d6
Signed-off-by: PrateekChaubey <prateekchaubey123@gmail.com>
Signed-off-by: karthick111 <karthickrko61@gmail.com>
To allow netmgrd to acquire wakelocks correctly
we need to ensure that it belongs to system group
Bug: 24546055
Change-Id: I00b9effa7351f1cd8ef9fc062de12b5276254801