misc location in vendor belongs to a predefined service and causes
denials due to collisions with that service. Move the logging to
process specific folders within vendor.
CRs-Fixed: 2052618
Change-Id: Ie43dee22d7dea94b87eac73bb5f2dd01f0cb9225
- Audio HAL has to write to boot_adsp sysfs entry to unload image
- Add audio group to boot_adsp sysfs to give write permission
Change-Id: Ia3b40384aa42a0ad94d2e3cc1380ff4dd5a128c0
pd-mapper needs to be able to write the pd error string to the kmsg
buffer. It runs under the system user.
Change-Id: Ic52682f8151d10c4e6ffdc2b3ed4bc2183ebd6f6
Removing redundant creation and assignment of permission for
data/misc/bluetooth folder from init.qcom.rc file.
Change-Id: I941a53d01675b44fa6a5b59bcd2b72f9e6a11ab7
These changes are to create folder to collect logs and
dump from Bluetooth HAL daemon.
CRs-Fixed: 2051034
Change-Id: Ib930a80aab1354ad1463a02febf71eba922e2df8
* No longer used.
* It lives in it's own rc extension now
Change-Id: I0c53cbb1ba2610aac4349b6a0e66e23c75871d27
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
* Match the new changes introduced in O
Change-Id: I43c6fa60214ce91d6a149f15416a9f3170abfdd5
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
This will let the wifi hal run as "wifi" user and not need root
permissions to access this path for firmware reloads.
Bug: 33435250
Test: Compiles.
Change-Id: I84a38cea5e0f729147c3191c3485a3738d7838ef
Signed-off-by: Darshan Manjrekar <darshanmanjrekar1205@gmail.com>
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for pid=2664 comm="rmt_storage" capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0
Change-Id: Ib02b4aedab479f5ad8aca3a2100b5c489397002a
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for capability=1 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability
Adding
wifi group to access
/data/misc/net/rt_tables
-rw-r--r-- 1 system wifi 130 2016-05-11 09:58 rt_tables
wakelock group to access:
/sys/power/wake_lock
-rw-rw---- 1 radio wakelock 4096 1970-01-19 15:03 wake_lock
radio/inet groups to access
/dev/socket/netmgr/netmgr_connect_socket
srw-rw---- 1 radio inet 0 1970-01-19 15:03 netmgr_connect_socket
Change-Id: I7ed6a98dd85bf7efa8cab0b8a0851217f030ba8b
Sound trigger HAL needs to write to the WDSP sysfs
node to load WDSP image. Update ownership from root
to media:audio for this node.
Change-Id: Iefe889ffd21bba154875f71cf55f4a571d88f9fb
Some of the directories under persist need to be accessed by
daemons which are running with root access. Currently only
system is allowed to access or create files under /persist.
Change the permission for persist to allow root to access and
create files.
CRs-Fixed: 1018233
Change-Id: Icbdbf5ddc329ff9627f6bcf79445b98aae942956
On first boot all services which belonging to main class
will get killed to perform encryption. Later on these services
will get restarted. Since cnss_diag is defined as one shot,
need to start service back at the time vold.decrypt property
is set.
Change-Id: Ib673398b892f6301b69cf4cff6e8cf17ada4620c
CRs-Fixed: 1041549