Earlier, this used to be set from rmt_storage service with
sys_admin capability. But now, that capability is dropped
off and hence, set it here in init scripts.
Change-Id: Ie8a3895c2b63da35d78fb9e571d74b735c969520
rmt_storage should not be automatically killed by Android during
shutdown since it is needed to actually process the peripheral
shutdown
Change-Id: I58a29fe86955f0abad944727bb4208dad89f495d
Desc: Enabling imsrcsd to run on init.
1. introduce imsrcsd
2. updating ims properties from "sys" to "vendor"
Change-Id: I224512c30cdfc0b832e16f9432b2a15ec6ab7d79
CRs-fixed: 2079498
misc location in vendor belongs to a predefined service and causes
denials due to collisions with that service. Move the logging to
process specific folders within vendor.
CRs-Fixed: 2052618
Change-Id: Ie43dee22d7dea94b87eac73bb5f2dd01f0cb9225
- Audio HAL has to write to boot_adsp sysfs entry to unload image
- Add audio group to boot_adsp sysfs to give write permission
Change-Id: Ia3b40384aa42a0ad94d2e3cc1380ff4dd5a128c0
pd-mapper needs to be able to write the pd error string to the kmsg
buffer. It runs under the system user.
Change-Id: Ic52682f8151d10c4e6ffdc2b3ed4bc2183ebd6f6
Removing redundant creation and assignment of permission for
data/misc/bluetooth folder from init.qcom.rc file.
Change-Id: I941a53d01675b44fa6a5b59bcd2b72f9e6a11ab7
These changes are to create folder to collect logs and
dump from Bluetooth HAL daemon.
CRs-Fixed: 2051034
Change-Id: Ib930a80aab1354ad1463a02febf71eba922e2df8
* No longer used.
* It lives in it's own rc extension now
Change-Id: I0c53cbb1ba2610aac4349b6a0e66e23c75871d27
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
* net_bt_stack is gone, replace it with bluetooth (android/platform_system_core@604208e957)
Change-Id: I62ac0fa2e59a9643fd6a3d4b173dd8c8892037b9
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
* Match the new changes introduced in O
Change-Id: I43c6fa60214ce91d6a149f15416a9f3170abfdd5
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
This will let the wifi hal run as "wifi" user and not need root
permissions to access this path for firmware reloads.
Bug: 33435250
Test: Compiles.
Change-Id: I84a38cea5e0f729147c3191c3485a3738d7838ef
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
Make symbolic link from
/dev/block/platform/soc/${ro.boot.bootdevice} to
/dev/block/bootdevice.
Change-Id: I7b7f4c728656103445e7fb68ccca92402fa36ff5
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for pid=2664 comm="rmt_storage" capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0
Change-Id: Ib02b4aedab479f5ad8aca3a2100b5c489397002a
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for capability=1 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability
Adding
wifi group to access
/data/misc/net/rt_tables
-rw-r--r-- 1 system wifi 130 2016-05-11 09:58 rt_tables
wakelock group to access:
/sys/power/wake_lock
-rw-rw---- 1 radio wakelock 4096 1970-01-19 15:03 wake_lock
radio/inet groups to access
/dev/socket/netmgr/netmgr_connect_socket
srw-rw---- 1 radio inet 0 1970-01-19 15:03 netmgr_connect_socket
Change-Id: I7ed6a98dd85bf7efa8cab0b8a0851217f030ba8b
* When a device with hundreds of apps is booted up, hundreds of
apps will spawn their BOOT_COMPLETED receivers which start
up their background initialization services. Since only one
core is allowed for these processes, the time for all these
services to complete is extremely long.
* To improve this, allow three cores for background processes,
keeping the fourth for idle wakeups. This ends up producing
a better thermal profile for the device as well, since the
small cores are not the aggressor on this SoC.
Change-Id: I98bbf8bf565bd77066ff7726014e6fa5730a4e09