Loading services/core/java/com/android/server/pm/Settings.java +2 −7 Original line number Diff line number Diff line Loading @@ -3194,12 +3194,7 @@ public final class Settings implements Watchable, Snappable, ResilientAtomicFile } else if (tagName.equals("verifier")) { final String deviceIdentity = parser.getAttributeValue(null, "device"); try { mVerifierDeviceIdentity = VerifierDeviceIdentity.parse(deviceIdentity); } catch (IllegalArgumentException e) { Slog.w(PackageManagerService.TAG, "Discard invalid verifier device id: " + e.getMessage()); } } else if (TAG_READ_EXTERNAL_STORAGE.equals(tagName)) { // No longer used. } else if (tagName.equals("keyset-settings")) { Loading Loading @@ -3228,7 +3223,7 @@ public final class Settings implements Watchable, Snappable, ResilientAtomicFile } str.close(); } catch (IOException | XmlPullParserException e) { } catch (IOException | XmlPullParserException | IllegalArgumentException e) { // Remove corrupted file and retry. atomicFile.failRead(str, e); Loading Loading
services/core/java/com/android/server/pm/Settings.java +2 −7 Original line number Diff line number Diff line Loading @@ -3194,12 +3194,7 @@ public final class Settings implements Watchable, Snappable, ResilientAtomicFile } else if (tagName.equals("verifier")) { final String deviceIdentity = parser.getAttributeValue(null, "device"); try { mVerifierDeviceIdentity = VerifierDeviceIdentity.parse(deviceIdentity); } catch (IllegalArgumentException e) { Slog.w(PackageManagerService.TAG, "Discard invalid verifier device id: " + e.getMessage()); } } else if (TAG_READ_EXTERNAL_STORAGE.equals(tagName)) { // No longer used. } else if (tagName.equals("keyset-settings")) { Loading Loading @@ -3228,7 +3223,7 @@ public final class Settings implements Watchable, Snappable, ResilientAtomicFile } str.close(); } catch (IOException | XmlPullParserException e) { } catch (IOException | XmlPullParserException | IllegalArgumentException e) { // Remove corrupted file and retry. atomicFile.failRead(str, e); Loading