Thermal HAL 2.0 has support for a lot of additional
features including temperature protection and others.
Also, Thermal HAL 1.0 is not supported in FCM level 4.
Change-Id: I1f4fd1957a776934cf5a85e214caf01bd73de47c
(cherry picked from commit dd83877166d7e43c6d2e3eb1a0c2fccbeec28f48)
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: donjohanliebert <donjohanliebert@gmail.com>
* This way zram size can be optimized.
Change-Id: Ida4fca8aab88ab5af3dcba166e98cf722bab6614
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: donjohanliebert <donjohanliebert@gmail.com>
* Disabled on many devices with reports to lagginess in long term and random reboot in some instances.
Change-Id: I73985159766da08cd35b0288db29cfafc7db62b0
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: donjohanliebert <donjohanliebert@gmail.com>
* breaks google voice match with pixelpropsutils as
we don't have hotword enrollment support
Change-Id: I213626f9729e5ff47ce7e6c990d605ed669b97e3
Signed-off-by: donjohanliebert <donjohanliebert@gmail.com>
Sm6150-common is still using non-AB update.
non-AB code will be moved to a separated namespace, add
deprecated-ota to sm6150-common namespace list ahead of time to avoid
breakage.
Test: th
Bug: 324360816
Change-Id: I909064be36e8febe80492cf010eb6eac3d6bc33d
These are no longer available as of Android 14 QPR3. The C2 codecs
available by default in the swcodec apex will be used instead.
Change-Id: I8cdf3e700823779a7382c66c3df8410d41209b7c
The health AIDL HAL service provides functionalities of charger,
therefore system charger at /system/bin/charger is deprecated.
On top of that, QTI health AIDL HAL service enables suspend by
default, the equivalent of setting ro.charger.enable_suspend
for legacy charger.
Change-Id: I59c23e7974cea1174b0161f31a535fa3afa1e5c9
Needed to work around a Qualcomm HAL prebuilt.
Bug: 203713560
Bug: 258322017
Bug: 254854421
Test: Forrest
Change-Id: I4eebc60f10fbea6a66127ed3e08441db32536f78
This enables casefolding, which is required for removal of sdcardfs.
Test: Wipe data and boot. lsattr /data/media, check for +F
Bug: 138322712
Change-Id: I020aa6bb9c121e7bda83c07bc9fb37dcfa26702c
* proprietary perfd blobs can finally be nuked without breaking goodix
* we could even map the functions to use libperfmgr powerhints in the future
Change-Id: I124652f3041761966a3e3bd97c757fecc39cc5fb
Starting with Android R launched devices, debugfs cannot be mounted in
production builds. In order to avoid accidental debugfs dependencies
from creeping in during development with userdebug/eng builds, the
build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to
enforce additional debugfs restrictions for userdebug/eng builds. The
same flag will be used to enable sepolicy neveallow statements to
prevent new permissions added for debugfs access.
Test: build, boot
Bug: 184381659
Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e