Age | Commit message (Collapse) | Author |
|
avc: denied { dac_override } for capability=1 scontext=u:r:nanoapp_cmd:s0 tc
ontext=u:r:nanoapp_cmd:s0 tclass=capability permissive=0
nanoapp_cmd: Failed to open /dev/nanohub: err=13 [Permission denied]
nanoapp_cmd runs as root:system, so needs group write access
Bug: 63404254
Test: boot and check permissions on /dev/nanohub are crw-rw---- and
that uninstall succeeds
Signed-off-by: Ben Fennema <fennema@google.com>
Change-Id: I1d18e6c3908679e083056899413d464921b33fb8
|
|
Change-Id: Ib1b9116109599288414e181a3a197f1a315d1209
Signed-off-by: Ben Fennema <fennema@google.com>
|
|
Add /dev/nanohub to sepolicy/file_contexts and ueventd.bullhead.rc
Change-Id: I3416b36a94544308b5b45a0762a4687d4156dd86
Signed-off-by: Ben Fennema <fennema@google.com>
|
|
Allow system permission for RPS sysfs nodes, so that WLAN user space
daemon can enable RPS(Receive packet steering) feature.
Bug: 23556386
Signed-off-by: Kumar Anand <kanand@codeaurora.org>
|
|
add spi-contexthub.h as kernel-headers
Change-Id: I54853795366766e608d929092d630753ade7a720
|
|
Bug: 21399322
Change-Id: I34c9aab2b1d2ebea295958f2a1bc13e93e63b5e4
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
Change-Id: Id64b41a4e7808bd92aaa34b3fa446e76a6613b0d
|
|
Change-Id: I9cb93bf4eb4079b118fc13c173cb721227843644
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
Change-Id: I1517312525b6f8ae5668044e0102507bba409187
|
|
Change-Id: Id52e322706a87cca65f499e690eaaae8e59d4732
|
|
Change-Id: I327af97274aad4692d9f07407d43ed2b0dc0c3d6
|
|
Change-Id: I759351a233f6e5613691d42558a1e18b190eec70
|
|
Change-Id: Ic5965926535e989eb1cac2ca056c6450f557c030
|
|
- Add /persistent to fstab
This is required so the recovery kernel can wipe the
partition in case the feature is disabled by
Settings > Developer options > Enable OEM unlock.
- Add frp location in ro.frp.pst
Add the frp partition as:
ro.frp.pst=/dev/block/platform/msm_sdcc.1/by-name/persistent
- Change ownership to system.
Change-Id: I12a9b05eff987ce0de989c774c8d6fd7987e2e4d
|
|
- Add qseecomd service
- Add mode and owner of qseecom
Change-Id: Ic13a0fa3b4b29fe7385a72f4804db05757c71a26
|
|
- Enable daemons listed below
rmt_storage, bridgemgrd, qmuxd, netmgrd, per_mgr
- Execute IRSC utility
- Add sepolicy TE files and context for daemons
Change-Id: Id811e8c266876e9d1b018844b05491b7a8a0a2d4
|
|
Change-Id: I601510531827b91d517743d5cc766519445a1d32
|