This is needed for the microphone characteristic API support.
Test: regression test on the board
Bug: 38184704
Change-Id: Ife559125850277865451f92ea862e7ec47fc9da7
Merged-In: Ife559125850277865451f92ea862e7ec47fc9da7
Signed-off-by: Kevin Rocard <krocard@google.com>
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
* This basic profile will be used until we have proper fw/av
support from CAF
* This change adds the following things:
- 4K video recording for back camera
- 1080P video recording for front camera
- HEVC video encoder
Change-Id: If73c6d5c56fa299a60d6bd58aacdb5b34e410ae2
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
We recently created a new GID that can be granted to critical system
processes, so that the system is usable enough for the user to free
up disk space used by abusive apps.
128MB ought to be enough for anybody.
Test: builds, boots
Bug: 62024591
Change-Id: I412ed9b0a885668ebe4c6c677a3bd0cd7f44080b
Signed-off-by: Alberto97 <albertop2197@gmail.com>
Converted .conf format to .xml using:
https://github.com/luk1337/aeffects-conf2xml
Bug: 37492580
Test: dumped the effectFactory state and check it was unchanged
$ adb shell dumpsys media.audio_flinger | sed '/Clients:/q'
Change-Id: I233a44c2ba0cb4c4d4fb8c3720fc09862ce79827
Merged-In: I233a44c2ba0cb4c4d4fb8c3720fc09862ce79827
Signed-off-by: Kevin Rocard <krocard@google.com>
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
Signed-off-by: therootlord <igor_cestari@hotmail.com>
Change the user and group ownership and permissions of sensors
device node.
Change-Id: I251af01d4f0204c784667fe92b3998c197f75d8e
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
netutils-wrapper only list a single version x.0 in its
requirement. System manifest might provide a list of
netutils-wrapper versions it supports {x, y, z}.0.
Bug: 64447338
Test: m compatibility_matrix.xml system_manifest.xml -j
(checks compatibility at build time)
Change-Id: I2ec919fd5378aed7160c636cb7f2bd138db1473f
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
Start loc_launcher as gps user and set uid/gid of loc_launcher
to gps and enable SETUID and SETGID caps for loc_launcher, so
that we can start loc_launcher as gps user instead of root and
still have capabilities for SETUID and SETGID. Also remove not
required permissions groups for loc_launcher.
Change-Id: Ie9f1506874b3c3148f9170c8d5db9afd1e70025c
CRs-Fixed: 2192881
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:
W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)
AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.
c78a463e87
Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
/data/misc/dhcp
* The creation of /data/misc/wifi and /data/misc/dhcp was moved long ago
to the core init.rc script. Moreover, /data/misc/wifi is deprecated
since wpa_supplicant now relies on /data/vendor/wifi.
Change-Id: Ic0a33af44ffe163d3dd06cebdc1e192dc9bcb11f
Wpa_supplicant's random pool is not necessary on Android. Randomness
is already provided by the entropymixer service which ensures
sufficient entropy is maintained across reboots. Commit b410eb1913
'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with
that entropy before either wpa_supplicant or hostapd are run.
Bug: 34980020
Test: Use wifi and wifi tethering on 8996 targets
Change-Id: Ib5caf362bc939911b357db186a274957d3fbf186