The reason these files are moved to /vendor/etc/init/hw and
not /vendor/etc/init is because 'init' scans the /vendor/etc/init folder
for vendor service .rc fragments to import. That would either result
in duplicate imports or out-of-order imports of these hardware
specific .rc files and that *may* have unintended consequences.
In order to preserve the current import order for MTP, we move all
hardware specific .rc files to /vendor/etc/init/hw which is not
autoscanned by init BUT leave the init.${ro.hardware}.rc (i.e.
init.qcom.rc in this case) in root for 'init' to find.
Change-Id: I14531da05e2a3a256f734f8de96e1f1969c753f9
As per Android-O architecture, move vendor specific file into
/data/vendor path instead of /data/misc. To address this
create the wifi directory into /data/vendor path.
CRs-Fixed: 2047794
Change-Id: I6835fb70e1777e23d0b30aa9e08de9a746638c50
Modify permissions for /data/vendor/misc to 01771
from 0770 in order to enable audio module
to access the directory.
CRs-Fixed: 2074932
Change-Id: Ibc832cd0ec7c04a99b3fa1e9a554f919e11a149a
Runtime files and sockets used by location modules
are moved to vendor partiion from /data/misc/location
to /data/vendor/location.
CRs-fixed: 2046657
Change-Id: I76da150d7a897bf94b950217587e40c82f2f02c6
-dpmQmiMgr permissions are updated with radio group
to communicate with QMUXD socket.
CRs-Fixed: 2183993
Change-Id: I37195ffc6602d009ac4cace6c742484e70a768ec
- Added user and group tag for dpmQmiMgr
- Start the daemon with system privilege.
CRs-Fixed: 2080471
Change-Id: Id3a4a9f849d336e103c3c6897daf34465230b83a
-dpmwrapper and tcm unix domain sockets are created
from init.qcom.rc to enable socket communication in
system region.
CRs-Fixed: 2076621
Change-Id: I06dfe50f0547d6b9dc489dba5fbd9cf62c1b66b0
Earlier, this used to be set from rmt_storage service with
sys_admin capability. But now, that capability is dropped
off and hence, set it here in init scripts.
Change-Id: Ie8a3895c2b63da35d78fb9e571d74b735c969520
rmt_storage should not be automatically killed by Android during
shutdown since it is needed to actually process the peripheral
shutdown
Change-Id: I58a29fe86955f0abad944727bb4208dad89f495d
misc location in vendor belongs to a predefined service and causes
denials due to collisions with that service. Move the logging to
process specific folders within vendor.
CRs-Fixed: 2052618
Change-Id: Ie43dee22d7dea94b87eac73bb5f2dd01f0cb9225
- Audio HAL has to write to boot_adsp sysfs entry to unload image
- Add audio group to boot_adsp sysfs to give write permission
Change-Id: Ia3b40384aa42a0ad94d2e3cc1380ff4dd5a128c0
pd-mapper needs to be able to write the pd error string to the kmsg
buffer. It runs under the system user.
Change-Id: Ic52682f8151d10c4e6ffdc2b3ed4bc2183ebd6f6
Removing redundant creation and assignment of permission for
data/misc/bluetooth folder from init.qcom.rc file.
Change-Id: I941a53d01675b44fa6a5b59bcd2b72f9e6a11ab7
These changes are to create folder to collect logs and
dump from Bluetooth HAL daemon.
CRs-Fixed: 2051034
Change-Id: Ib930a80aab1354ad1463a02febf71eba922e2df8
* No longer used.
* It lives in it's own rc extension now
Change-Id: I0c53cbb1ba2610aac4349b6a0e66e23c75871d27
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
* Match the new changes introduced in O
Change-Id: I43c6fa60214ce91d6a149f15416a9f3170abfdd5
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
This will let the wifi hal run as "wifi" user and not need root
permissions to access this path for firmware reloads.
Bug: 33435250
Test: Compiles.
Change-Id: I84a38cea5e0f729147c3191c3485a3738d7838ef
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for pid=2664 comm="rmt_storage" capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0
Change-Id: Ib02b4aedab479f5ad8aca3a2100b5c489397002a
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for capability=1 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability
Adding
wifi group to access
/data/misc/net/rt_tables
-rw-r--r-- 1 system wifi 130 2016-05-11 09:58 rt_tables
wakelock group to access:
/sys/power/wake_lock
-rw-rw---- 1 radio wakelock 4096 1970-01-19 15:03 wake_lock
radio/inet groups to access
/dev/socket/netmgr/netmgr_connect_socket
srw-rw---- 1 radio inet 0 1970-01-19 15:03 netmgr_connect_socket
Change-Id: I7ed6a98dd85bf7efa8cab0b8a0851217f030ba8b