Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit b8fbded7 authored by Rohit Sekhar's avatar Rohit Sekhar
Browse files

FP4: Bump to FP3T.A.107.20220316

parent 3a963c2a
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -160,7 +160,7 @@ CUSTOM_APNS_FILE := $(DEVICE_PATH)/configs/apns-conf-custom.xml
ENABLE_VENDOR_RIL_SERVICE := true

# Security patch level
VENDOR_SECURITY_PATCH := 2021-12-05
VENDOR_SECURITY_PATCH := 2022-03-05

# SEPolicy
include device/qcom/sepolicy_vndr/SEPolicy.mk
+2 −2
Original line number Diff line number Diff line
@@ -25,11 +25,11 @@ PRODUCT_BRAND := Fairphone
PRODUCT_MODEL := FP4
PRODUCT_MANUFACTURER := Fairphone

BUILD_FINGERPRINT := "Fairphone/FP4eea/FP4:11/RKQ1.210503.001/FP3R:user/release-keys"
BUILD_FINGERPRINT := "Fairphone/FP4eea/FP4:11/RKQ1.210503.001/FP3T:user/release-keys"

PRODUCT_BUILD_PROP_OVERRIDES += \
    TARGET_NAME=FP4eea \
    PRODUCT_NAME=FP4eea \
    PRIVATE_BUILD_DESC="qssi-user 11 RKQ1.210503.001 FP3R release-keys"
    PRIVATE_BUILD_DESC="qssi-user 11 RKQ1.210503.001 FP3T release-keys"

PRODUCT_GMS_CLIENTID_BASE := android-alcatel
+4 −1
Original line number Diff line number Diff line
# Unpinned blobs from Fairphone/FP4eea/FP4:11/RKQ1.210503.001/FP3R:user/release-keys
# Unpinned blobs from Fairphone/FP4eea/FP4:11/RKQ1.210503.001/FP3T:user/release-keys

# ACDB
vendor/etc/acdbdata/adsp_avs_config.acdb
@@ -933,6 +933,9 @@ vendor/radio/qcril_database/upgrade/4_version_update_ecc_table.sql
vendor/radio/qcril_database/upgrade/5_version_update_ecc_table.sql
vendor/radio/qcril_database/upgrade/6_version_update_ecc_table.sql
vendor/radio/qcril_database/upgrade/7_version_update_ecc_table.sql
vendor/radio/qcril_database/upgrade/8_version_update_ecc_table.sql
vendor/radio/qcril_database/upgrade/9_version_update_ecc_table.sql
vendor/radio/qcril_database/upgrade/10_version_update_ecc_table.sql
vendor/radio/qcril_database/qcril.db

# SECCOMP policy
+2 −0
Original line number Diff line number Diff line
allow vendor_wcnss_service vendor_wifi_vendor_wpa_socket:dir create_dir_perms;
allow vendor_wcnss_service vendor_wifi_vendor_wpa_socket:sock_file create_file_perms;