Android 14.0.0 release 20
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZZXyBQAKCRDorT+BmrEO
# eAvqAKCQEBK7YcuKGulZhDtox4EMWVzcSQCfYMYllTDWhXK1MfXCrAcRqvgedlc=
# =pmkj
# -----END PGP SIGNATURE-----
# gpg: Signature made Thu Jan 4 01:47:17 2024 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2228 signatures in the past
# 2 years. Encrypted 4 messages in the past 24 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By Hungyen Weng
# Via Android Build Coastguard Worker
* tag 'android-14.0.0_r20':
config: Use carrier config in ROM by default
Change-Id: I70f50993a7d4821f976f45ee7df688c54cfa6d31
Android 14.0.0 Release 17 (UQ1A.231205.015)
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZXDPIgAKCRDorT+BmrEO
# eKW+AKCSKOvswyMxQEPeAGlxB0qYhYPLagCeKng8NIvA1PoQ+GiKvm4qGPNnqyg=
# =Zxbc
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Dec 6 21:44:34 2023 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2194 signatures in the past
# 2 years. Encrypted 4 messages in the past 23 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By Samuel Gosselin (2) and others
# Via Automerger Merge Worker (71) and others
* tag 'android-14.0.0_r17':
Grant the MDS access to the IPowerStats hal service.
gs201: ufs_firmware_update: add scsi directory permission
Revert^2 "Introduce CameraServices seinfo tag for PixelCameraServices"
Revert "Introduce CameraServices seinfo tag for PixelCameraServices"
Introduce CameraServices seinfo tag for PixelCameraServices
Revert "Revert "Create telephony.ril.silent_reset system_ext pro..."
Revert "Allow bthal to access vendor bluetooth folder"
Allow bthal to access vendor bluetooth folder
Revert "Create telephony.ril.silent_reset system_ext property fo..."
Create telephony.ril.silent_reset system_ext property for RILD restart
genfs_contexts: add raw s2mpg12mfd and s2mpg13mfd node.
genfs_contexts: add raw s2mpg12mfd and s2mpg13mfd node.
Add chre channel sepolicy entries
remove fixed selinux bug from bug map.
[TSV2] Remove tcpdump sepolicy from gs201 and move sepolicy to gs-common
Remove obsolete entries
Conflicts:
sepolicy/whitechapel_pro/keys.conf
Change-Id: If62362077dd47387f5d5dc070375b54b0f74ee8a
Android 14.0.0 Release 17 (UQ1A.231205.015)
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZXDPIgAKCRDorT+BmrEO
# eCoeAKCMl4tu2uBiBg4bJRWlUY4yWJP62ACffzqUwXKRgfOiCdUcO/rAck5EXDk=
# =0jpY
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Dec 6 21:44:34 2023 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2194 signatures in the past
# 2 years. Encrypted 4 messages in the past 23 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By qinyiyan (3) and others
# Via Automerger Merge Worker (142) and Android Build Coastguard Worker (61)
* tag 'android-14.0.0_r17': (51 commits)
Run fsck to resolve possible data corruption
Revert "gs201: Enable SkiaVk as RenderEngine backend"
usb.rc: Advertise 360p and 480p support through UVC
Usb.cpp: Fix typos when unable to disable USB data
[SELinux] Add gyotaku_app doamin to Pixel 2022.
UsbGadget: Update SDP enum timeout when gadget is pulled up
usb: Modify sdp enumeration timeout value in charger mode
init.gs201.rc: Disable util-awareness
Disable variable refresh rate when typing on gs201
gs201: ffu: add lifeC and activated date as condition
wifi: Update p2p overlay config
gs201: update media_codecs_performance_c2.xml based on UQ1A.230911.001
gs201: tweak memory management
Grant default permissions to PCS for camera connectivity
Revert "Enable small dirty detection for variable refresh rate"
Enable small dirty detection for variable refresh rate
Support variable refresh rate when typing on gs201
Set USF SoC from board makefile.
Enable dimming in gamma space in screenshots for adaptive mode
suspend: enable adaptive suspend
...
Conflicts:
BoardConfig-common.mk
device.mk
Change-Id: Ib822c3f6b53087a800eb32a537cd764c1abf0e63
Android 14.0.0 release 14
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZUmd6wAKCRDorT+BmrEO
# eOY5AJ9bnJM1agZfCbQJIodkjxyuLLgwPwCfRHjtKbZq9zXf4y1sivqyrNE/png=
# =FgnN
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Nov 7 04:16:11 2023 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2046 signatures in the past
# 2 years. Encrypted 4 messages in the past 22 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By Paul Lawrence
# Via Android Build Coastguard Worker
* tag 'android-14.0.0_r14':
Run fsck to resolve possible data corruption
Run fsck to resolve possible data corruption
Change-Id: I47b25d94a257bee552401c3d11f6a5123b93740e
Pixel 5.10 kernel doesn't compile with r487747c and we don't want to
bother fixing all the new errors in kernel source and modules.
Change-Id: I4495c751e0fd7707fe5068416a04eed96948b954
Squashed with:
Author: Nolen Johnson <johnsonnolen@gmail.com>
Date: Sun May 9 16:04:34 2021 -0400
Simplify AVB flag logic
* AVB's `--flags 3` argument builds a disabled VBMeta with
disabled hashtree, so no need to set both flags individually.
Change-Id: Ibe9ee322a5af58f13e76d53e18dee49451fe8838
Change-Id: Ie8f1e0929b037b35b5e45c2e31be9253fa0bb097
Virtual AB compression prevents GApps from being installed to
cheetah/panther.
This reverts commit 2bfa6d3ba01856d99c6ffdb64627c6e9391c4a41.
Change-Id: I119b8e042e4cdeec27a19ab5dd4f0666cc115ae1
Certificates extracted from stock vendor_mac_permissions.xml using
adevtool: https://github.com/kdrag0n/adevtool
Change-Id: Iaf59f1548905d16fe7ad231c039ba43941c15710
* In Android 12, Android System Intelligence (com.google.android.as) uses
some of the Private Compute Service (com.google.android.as.oss) services.
The absence of these Allowlists will cause Android System Intelligence
to fail to connect to the network and cause collapse.
* We don't need to extract google.xml to fix it, just extract the AiAi part
Change-Id: I446ae5d243cff134901094f82c90a0bbf3bb4381
The GoogleParts app disables the EUICC app when there's no GMS, but it
doesn't happen quick enough. The crash dialog pops up a few times right
after initial boot up. There's no need to alarm the user, so hide it.
Change-Id: Ia06b336b30a8886bae522c6e8a76a1ca15da5edd
* This avoids EuiccGoogle / GoogleCarrierServices crashing, taking the
whole telephony stack with them when no GMS or GSF is installed.
* Compared to change 274251, this approach is no-op when GAPPS add-on is
flashed before the first boot, and thus should not cause issues with
eSIM when GAPPS is flashed.
* With microG, this also works after installing the microG GMS & GSF
packages and rebooting, although manual activation of the eSIM is
needed via Settings - Network.
* The only downside is that users will still see one or two crashes
during the first boot because our application only starts after the
device is booted.
Change-Id: I4a11c93e855978abbf8d84fdbe4ffc8b2aedc27c
Trigger fsck on mount of /data if the value of ro.preventative_fsck is
not equal to the contents of /metadata/vold/preventative_fsck, then set
the file to the property to prevent future runs
See b/305658663 for context
Bug: 305658663
Test: Make sure fsck run after first boot and not after second
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e4a81c0e8f9f8d89f0e42e8fd7ec40cec6b887ed)
Merged-In: I1263d2d55fe22d994ae8c8654b1e75ad9e4ddafe
Change-Id: I1263d2d55fe22d994ae8c8654b1e75ad9e4ddafe
Trigger fsck on mount of /data if the value of ro.preventative_fsck is
not equal to the contents of /metadata/vold/preventative_fsck, then set
the file to the property to prevent future runs
See b/305658663 for context
Bug: 305658663
Test: Make sure fsck run after first boot and not after second
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:e4a81c0e8f9f8d89f0e42e8fd7ec40cec6b887ed)
Merged-In: I1263d2d55fe22d994ae8c8654b1e75ad9e4ddafe
Change-Id: I1263d2d55fe22d994ae8c8654b1e75ad9e4ddafe
Trigger fsck on mount of /data if the value of ro.preventative_fsck is
not equal to the contents of /metadata/vold/preventative_fsck, then set
the file to the property to prevent future runs
See b/305658663 for context
Bug: 305658663
Test: Make sure fsck run after first boot and not after second
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:48bae782fc3b798b8ea57335ec6c02431af5e1a8)
Merged-In: I1263d2d55fe22d994ae8c8654b1e75ad9e4ddafe
Change-Id: I1263d2d55fe22d994ae8c8654b1e75ad9e4ddafe
This feature is provided by the ConnectivityThermalPowerManager app that
we extract as a proprietary blob, so we can expose it.
Change-Id: I407e9e2235531fbca0b2c0e48b68105b1e77ad1f
Commit 49895bb361e74ffe92a3c0b76f988c8e4697b5c1 in device/google/gs101
failed to remove these overlays. Since this tree was created from
device/google/gs101, this results in the following issue on pantah:
* Pull down status bar
* Try to adjust brightness, network settings open instead
This is caused by the 171px offset that causes the status bar
to overlap the brightness slider.
Test: Reliably adjust brightness, confirm with "Show layout bounds"
from developer settings.
Change-Id: I1b97a28c257cb5b0faba830f29e9058d2dbe50fa