From 7672efc8da52d00aae221d3d2116882e76c3ed75 Mon Sep 17 00:00:00 2001 From: Wang Han <416810799@qq.com> Date: Sat, 18 Aug 2018 19:58:13 +0800 Subject: [PATCH] sanders: ueventd: Don't modify permissions of /dev/hw_random This addresses an underlying problem since /dev/hw_random is used. The issue is that EntropyMixer, which runs in system_server, needs to read from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer can never accress this node, resulting in warnings like this: W EntropyMixer: Failed to add HW RNG output to entropy pool W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied) AOSP ueventd handles this well, so just remove this line to get things back to stage. This issue was never exposed because Google derps the logging here, which is already fixed on Pie. https://android.googlesource.com/platform/frameworks/base/+/c78a463e875d91eae2cf256042fd99d130217c38 Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581 --- rootdir/etc/ueventd.qcom.rc | 1 - 1 file changed, 1 deletion(-) diff --git a/rootdir/etc/ueventd.qcom.rc b/rootdir/etc/ueventd.qcom.rc index 4f55761..f13f433 100644 --- a/rootdir/etc/ueventd.qcom.rc +++ b/rootdir/etc/ueventd.qcom.rc @@ -153,7 +153,6 @@ /dev/msm_vidc_dec_sec 0660 system camera /dev/msm_vidc_enc 0660 system camera /dev/msm_rotator 0660 system system -/dev/hw_random 0600 root root /dev/sdsprpc-smd 0660 system system #permissions for audio