* Looking at thermal-engine's needs, without this it is spammy
during sleep, and the denial isn't seen on R, so lets allow it
to maintain the old behavior.
Change-Id: Ie0a66addeb32d34fcfb7b90e146504477ea94c1f
* Looking in `git log`, we can see that this isn't needed
functionallity, and that all attempts to "read" it in any
way can be safely ignored.
Change-Id: I1dd6c57f9cec024371cec8f9074b000531514ba9
The pinner now asks the runtime for these files.
Test: adb shell dumpsys pinner
Bug: 144773394
Change-Id: Ifead4354d29b3ce658b2f5771b778a050b0579b5
Merged-In: I6627afc390f8dcacc197680dcc4917e2ac5bc090
This change replaces the '/system/lib64/libsurfaceflinger.so' pin, as
the file was removed in ag/12524602. The updated pin relies on
go/aog/1552085, as system_service needs read access to SurfaceFlinger.
Bug: 176197656
Test: adb shell dumpsys pinner (coral)
- shows that /system/bin/surfaceflinger is successfully pinned
adb logcat | grep PinnerService (coral)
- no longer shows a file-not-found error in PinnerService
Change-Id: Iae2a96c5fe4b1f5698d21de9970140321d11c460
These overlay values are just the default AOSP ones at the moment. We'll
change them on the system side instead.
Change-Id: I2898dec7c3c39eac604cb7f90224760869f65bbc
qcril will block any further MT SMS if previous one is not ACKed.
For this bug, IMS service is not ready and resulted in qcril stuck in blocking state.
This solution will add 30s timer to reset blocking state if there is no ACK from Telephony.
Bug: 169549852
Test: MT SMS during power off
Change-Id: I6f52170654925143aeb55f8bc0cf4c379717e718
The CarrierSettings app enables/disables carrier apps based on sim
inserted, so use it instead of CarrierConfig.
Change-Id: I163dd615e9d8268c5f94a28ae234a30f74c7e83b
Now that we are building our own vendor image, some necessary
packages aren't being built and some props aren't being set.
Change-Id: I3e91822b336761cdecf3f6ebe416276dc0585785
The GoogleParts app disables the EUICC app when there's no GMS, but it
doesn't happen quick enough. The crash dialog pops up a few times right
after initial boot up. There's no need to alarm the user, so hide it.
Change-Id: Ia06b336b30a8886bae522c6e8a76a1ca15da5edd
This is a squash of the following:
Author: Ethan Chen <intervigil@gmail.com>
Date: Sat Dec 1 13:53:00 2018 -0800
wahoo: Declare eUICC permission
Change-Id: I1b151021ca9fc6cf35141b2ccb337bc83197089e
Author: razorloves <razorloves@gmail.com>
Date: Fri Oct 18 00:06:22 2019 -0500
wahoo: Move eUICC permissions xml to /product
All eUICC items were moved to /product in Q.
Change-Id: I614f86b16f61959c47465863ab1d5d55030209ab
Change-Id: I323dce8b848b44e45ed21002950059e58719113c
Author: Rashed Abdel-Tawab <rashed@linux.com>
Date: Sat Sep 7 11:13:09 2019 -0700
wahoo: Build a disabled vbmeta image
Change-Id: Ie8f1e0929b037b35b5e45c2e31be9253fa0bb097
From: Nolen Johnson <johnsonnolen@gmail.com>
Date: Sun May 9 16:04:34 2021 -0400
wahoo: Simplify AVB flag logic
* AVB's `--flags 3` argument builds a disabled VBMeta with
disabled hashtree, so no need to set both flags individually.
Change-Id: Ibe9ee322a5af58f13e76d53e18dee49451fe8838
Change-Id: Ie7f19e42835f8f1d2fa5be22e1beeb7228ad55a3
Introduce the productpartition to wahoo series devices, however only define the common product partition in this tree.
Later details, such as the inclusion of system_ext partitions for taimen, is included in per-device trees.
Product partition is defined at 3.0GiB with later requirements of Android 13, causing an increase from the previous values.
Lineage build servers export OVERRIDE_TARGET_FLATTEN_APEX=true,
causing the system image inode count to be insufficient.
Change-Id: I171afeb3fcf85199215c54fe068cf04547999285
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
c78a463e87
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
Downloaded the apk from play store and used the following command
to extract the proper public key from the apk:
openssl pkcs7 -inform DER -in CERT.RSA -out CERT.pem -print_certs
Change-Id: I32da280607e931b50822fd1ae08b45af455a9885