{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":799363968,"defaultBranch":"udc","name":"system_core","ownerLogin":"Evolution-X","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2024-05-11T23:02:19.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/165590896?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1719066837.0","currentOid":""},"activityList":{"items":[{"before":"832eff0b5063ebdbdad6edc4aa455c9ca6bee3e5","after":"4c3a59b48058f2fc93f85beb015b91183d0a8a7f","ref":"refs/heads/udc","pushedAt":"2024-09-23T01:32:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"init: Spoof additional props\n\nChange-Id: I3a22f2a923628c54462ed878f2c98a228d355f60\nSigned-off-by: Alvin Francis ","shortMessageHtmlLink":"init: Spoof additional props"}},{"before":"4e799725c4bf8aae8e383b8af21a22a5cc67af82","after":"832eff0b5063ebdbdad6edc4aa455c9ca6bee3e5","ref":"refs/heads/udc","pushedAt":"2024-09-10T12:18:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"init: Spoof additional props\n\nChange-Id: I3a22f2a923628c54462ed878f2c98a228d355f60\nSigned-off-by: Alvin Francis ","shortMessageHtmlLink":"init: Spoof additional props"}},{"before":"8edee0d36e1595e8b7db865f06a582c2334f9a25","after":"4e799725c4bf8aae8e383b8af21a22a5cc67af82","ref":"refs/heads/udc","pushedAt":"2024-09-10T05:21:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]\n\nDevices that shipped on API 33 or higher need to set\nro.product.first_api_level to 32 in order to pass integrity.\n\nSet SPOOF_FIRST_API_LEVEL_32 := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]"}},{"before":"5bde5713f55ba3923a6b5db9ed1942546e5fc5eb","after":"8edee0d36e1595e8b7db865f06a582c2334f9a25","ref":"refs/heads/udc","pushedAt":"2024-09-10T03:52:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"init: Spoof additional props\n\nChange-Id: I3a22f2a923628c54462ed878f2c98a228d355f60\nSigned-off-by: Alvin Francis \nSigned-off-by: mukesh22584 ","shortMessageHtmlLink":"init: Spoof additional props"}},{"before":"4e799725c4bf8aae8e383b8af21a22a5cc67af82","after":"5bde5713f55ba3923a6b5db9ed1942546e5fc5eb","ref":"refs/heads/udc","pushedAt":"2024-09-09T18:30:36.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"Spoof encrytion prop as encrypted\n\n* reference: https://github.com/RisingOS-staging/android_vendor_rising/commit/deae9373dcd0d93f09548ee5ef53a517e7cad2f4\n\nSigned-off-by: minaripenguin \nSigned-off-by: mukesh22584 ","shortMessageHtmlLink":"Spoof encrytion prop as encrypted"}},{"before":"de08e902fc4962adff3ecbbb1bbbf0007d765217","after":"4e799725c4bf8aae8e383b8af21a22a5cc67af82","ref":"refs/heads/udc","pushedAt":"2024-09-01T13:08:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]\n\nDevices that shipped on API 33 or higher need to set\nro.product.first_api_level to 32 in order to pass integrity.\n\nSet SPOOF_FIRST_API_LEVEL_32 := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]"}},{"before":"2a9537df16a94cd58ddca53a17ffbabb5f306f7b","after":"de08e902fc4962adff3ecbbb1bbbf0007d765217","ref":"refs/heads/udc","pushedAt":"2024-08-11T12:11:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]\n\nDevices that shipped on API 33 or higher need to set\nro.product.first_api_level to 32 in order to pass integrity.\n\nSet SPOOF_FIRST_API_LEVEL_32 := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]"}},{"before":"c4bb2b40ba4f13797af5de2a8af90047afa3cccd","after":"2a9537df16a94cd58ddca53a17ffbabb5f306f7b","ref":"refs/heads/udc","pushedAt":"2024-07-20T01:19:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]\n\nDevices that shipped on API 33 or higher need to set\nro.product.first_api_level to 32 in order to pass integrity.\n\nSet SPOOF_FIRST_API_LEVEL_32 := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditionally spoof ro.product.first_api_level to 32 [2/2]"}},{"before":"0544896a64c4c68826ee0e43f669ced59d30f50d","after":"c4bb2b40ba4f13797af5de2a8af90047afa3cccd","ref":"refs/heads/udc","pushedAt":"2024-07-19T21:43:25.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"init: Conditonally set first api level to 32 [2/2]\n\nDevices that shipped on API 33 or higher need to set\nro.product.first_api_level to 32 in order to pass integrity.\n\nSet SPOOF_FIRST_API_LEVEL_32 := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditonally set first api level to 32 [2/2]"}},{"before":"7b1c32519f592a51d26bf49a471e5a1808812014","after":"0544896a64c4c68826ee0e43f669ced59d30f50d","ref":"refs/heads/udc","pushedAt":"2024-07-19T19:13:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"init: Conditonally set first api level to 32 [2/2]\n\nSet SPOOF_FIRST_API_LEVEL := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditonally set first api level to 32 [2/2]"}},{"before":"651486be031c7447cd2fa458321f4fb9a8edca98","after":"7b1c32519f592a51d26bf49a471e5a1808812014","ref":"refs/heads/udc","pushedAt":"2024-07-19T19:00:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"init: Conditonally set first api level to 32 [1/2]\n\nSet SPOOF_FIRST_API_LEVEL := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditonally set first api level to 32 [1/2]"}},{"before":"5eb3de979840252ab61bece716983112b257b157","after":"651486be031c7447cd2fa458321f4fb9a8edca98","ref":"refs/heads/udc","pushedAt":"2024-07-19T17:58:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"libfs_avb: Disable dm-verity when AVB is permissive\n\nWhen the bootloader is unlocked (i.e. AVB is permissive), enforcing\ndm-verity on system partitions is meaningless because the bootloader\ndoesn't enforce verification on the root of the high-level verified boot\nchain: the kernel. As a result, mounting system partitions with\ndm-verity (hashtree verification) is futile when the code performing\nverification has not been verified in the first place; users can also\ndisable dm-verity manually by flashing vbmeta with `fastboot flash\n--disable-verity vbmeta vbmeta.img`.\n\nFor user and developer convenience, disable dm-verity automatically when\nthe bootloader is unlocked by checking for permissive AVB. This makes it\npossible to ship enforcing vbmeta images for security-conscious users to\nlock their bootloader and reap the benefits of verified boot, while\nstill allowing users with unlocked bootloaders to modify system\npartitions.\n\nSigned-off-by: Pranav Vashi \nChange-Id: I8c27047a3f75a466eb10a761bc7600b11dbe7653\n\nFormer-commit-id: 0076631075198c5bc92f7e7cdd5a7d962a0e5c6e\nFormer-commit-id: a0b05f3f79da1742677fea22f793ec9f69dc7a0d\nFormer-commit-id: 7223ac3fa93e86b94f4fa681748ca77e24ce722d","shortMessageHtmlLink":"libfs_avb: Disable dm-verity when AVB is permissive"}},{"before":"651486be031c7447cd2fa458321f4fb9a8edca98","after":"5eb3de979840252ab61bece716983112b257b157","ref":"refs/heads/udc","pushedAt":"2024-07-19T17:57:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"init: Conditonally set first api level to 32\n\nSet SPOOF_FIRST_API_LEVEL := true in BoardConfig*.mk to enable.\n\nSigned-off-by: AnierinB ","shortMessageHtmlLink":"init: Conditonally set first api level to 32"}},{"before":"716bade6697cbfd9458b48fdb0e93b8104263843","after":"651486be031c7447cd2fa458321f4fb9a8edca98","ref":"refs/heads/udc","pushedAt":"2024-07-02T03:50:45.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"libfs_avb: Disable dm-verity when AVB is permissive\n\nWhen the bootloader is unlocked (i.e. AVB is permissive), enforcing\ndm-verity on system partitions is meaningless because the bootloader\ndoesn't enforce verification on the root of the high-level verified boot\nchain: the kernel. As a result, mounting system partitions with\ndm-verity (hashtree verification) is futile when the code performing\nverification has not been verified in the first place; users can also\ndisable dm-verity manually by flashing vbmeta with `fastboot flash\n--disable-verity vbmeta vbmeta.img`.\n\nFor user and developer convenience, disable dm-verity automatically when\nthe bootloader is unlocked by checking for permissive AVB. This makes it\npossible to ship enforcing vbmeta images for security-conscious users to\nlock their bootloader and reap the benefits of verified boot, while\nstill allowing users with unlocked bootloaders to modify system\npartitions.\n\nSigned-off-by: Pranav Vashi \nChange-Id: I8c27047a3f75a466eb10a761bc7600b11dbe7653\n\nFormer-commit-id: 0076631075198c5bc92f7e7cdd5a7d962a0e5c6e\nFormer-commit-id: a0b05f3f79da1742677fea22f793ec9f69dc7a0d\nFormer-commit-id: 7223ac3fa93e86b94f4fa681748ca77e24ce722d","shortMessageHtmlLink":"libfs_avb: Disable dm-verity when AVB is permissive"}},{"before":"df36259a3126e951dbacd1cac1f41a88c4f53dd2","after":"716bade6697cbfd9458b48fdb0e93b8104263843","ref":"refs/heads/udc","pushedAt":"2024-07-02T00:38:25.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"libfs_avb: Disable dm-verity when AVB is permissive\n\nWhen the bootloader is unlocked (i.e. AVB is permissive), enforcing\ndm-verity on system partitions is meaningless because the bootloader\ndoesn't enforce verification on the root of the high-level verified boot\nchain: the kernel. As a result, mounting system partitions with\ndm-verity (hashtree verification) is futile when the code performing\nverification has not been verified in the first place; users can also\ndisable dm-verity manually by flashing vbmeta with `fastboot flash\n--disable-verity vbmeta vbmeta.img`.\n\nFor user and developer convenience, disable dm-verity automatically when\nthe bootloader is unlocked by checking for permissive AVB. This makes it\npossible to ship enforcing vbmeta images for security-conscious users to\nlock their bootloader and reap the benefits of verified boot, while\nstill allowing users with unlocked bootloaders to modify system\npartitions.\n\nSigned-off-by: Pranav Vashi \nChange-Id: I8c27047a3f75a466eb10a761bc7600b11dbe7653\n\nFormer-commit-id: 0076631075198c5bc92f7e7cdd5a7d962a0e5c6e\nFormer-commit-id: a0b05f3f79da1742677fea22f793ec9f69dc7a0d\nFormer-commit-id: 7223ac3fa93e86b94f4fa681748ca77e24ce722d","shortMessageHtmlLink":"libfs_avb: Disable dm-verity when AVB is permissive"}},{"before":"8c3b22218d33f0db354b361d80026bafa64c58b3","after":"df36259a3126e951dbacd1cac1f41a88c4f53dd2","ref":"refs/heads/udc","pushedAt":"2024-06-30T04:47:41.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"libfs_avb: Disable dm-verity when AVB is permissive\n\nWhen the bootloader is unlocked (i.e. AVB is permissive), enforcing\ndm-verity on system partitions is meaningless because the bootloader\ndoesn't enforce verification on the root of the high-level verified boot\nchain: the kernel. As a result, mounting system partitions with\ndm-verity (hashtree verification) is futile when the code performing\nverification has not been verified in the first place; users can also\ndisable dm-verity manually by flashing vbmeta with `fastboot flash\n--disable-verity vbmeta vbmeta.img`.\n\nFor user and developer convenience, disable dm-verity automatically when\nthe bootloader is unlocked by checking for permissive AVB. This makes it\npossible to ship enforcing vbmeta images for security-conscious users to\nlock their bootloader and reap the benefits of verified boot, while\nstill allowing users with unlocked bootloaders to modify system\npartitions.\n\nSigned-off-by: Pranav Vashi \nChange-Id: I8c27047a3f75a466eb10a761bc7600b11dbe7653\n\nFormer-commit-id: 0076631075198c5bc92f7e7cdd5a7d962a0e5c6e\nFormer-commit-id: a0b05f3f79da1742677fea22f793ec9f69dc7a0d\nFormer-commit-id: 7223ac3fa93e86b94f4fa681748ca77e24ce722d","shortMessageHtmlLink":"libfs_avb: Disable dm-verity when AVB is permissive"}},{"before":"d135e264291b6deffad75dcd617ff0e7da9e49eb","after":"8c3b22218d33f0db354b361d80026bafa64c58b3","ref":"refs/heads/udc","pushedAt":"2024-06-22T14:34:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"libfs_avb: Disable dm-verity when AVB is permissive\n\nWhen the bootloader is unlocked (i.e. AVB is permissive), enforcing\ndm-verity on system partitions is meaningless because the bootloader\ndoesn't enforce verification on the root of the high-level verified boot\nchain: the kernel. As a result, mounting system partitions with\ndm-verity (hashtree verification) is futile when the code performing\nverification has not been verified in the first place; users can also\ndisable dm-verity manually by flashing vbmeta with `fastboot flash\n--disable-verity vbmeta vbmeta.img`.\n\nFor user and developer convenience, disable dm-verity automatically when\nthe bootloader is unlocked by checking for permissive AVB. This makes it\npossible to ship enforcing vbmeta images for security-conscious users to\nlock their bootloader and reap the benefits of verified boot, while\nstill allowing users with unlocked bootloaders to modify system\npartitions.\n\nSigned-off-by: Pranav Vashi \nChange-Id: I8c27047a3f75a466eb10a761bc7600b11dbe7653\n\nFormer-commit-id: 0076631075198c5bc92f7e7cdd5a7d962a0e5c6e\nFormer-commit-id: a0b05f3f79da1742677fea22f793ec9f69dc7a0d\nFormer-commit-id: 7223ac3fa93e86b94f4fa681748ca77e24ce722d","shortMessageHtmlLink":"libfs_avb: Disable dm-verity when AVB is permissive"}},{"before":null,"after":"2557334e75e3c8af5a4f17a7276e5a7a0f160c48","ref":"refs/heads/udc-bak","pushedAt":"2024-06-22T14:33:57.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"Revert \"init: remove session keyring workaround for old kernels\"\n\nReason for revert: Still needed for <4.14 devices.\n\nThis reverts commit 5d7c35ce205f1b4afadd6a1725c0b5e03962a97c.\n\nChange-Id: I695f04514f4334c77636120d94990b0b6eaa11a3","shortMessageHtmlLink":"Revert \"init: remove session keyring workaround for old kernels\""}},{"before":"88240179efea1d8a371cc34eb8ebc92862ed1443","after":"d135e264291b6deffad75dcd617ff0e7da9e49eb","ref":"refs/heads/udc","pushedAt":"2024-05-26T20:58:49.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"joeyhuab","name":"Joey","path":"/joeyhuab","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6667815?s=80&v=4"},"commit":{"message":"libfs_avb: Disable dm-verity when AVB is permissive\n\nWhen the bootloader is unlocked (i.e. AVB is permissive), enforcing\ndm-verity on system partitions is meaningless because the bootloader\ndoesn't enforce verification on the root of the high-level verified boot\nchain: the kernel. As a result, mounting system partitions with\ndm-verity (hashtree verification) is futile when the code performing\nverification has not been verified in the first place; users can also\ndisable dm-verity manually by flashing vbmeta with `fastboot flash\n--disable-verity vbmeta vbmeta.img`.\n\nFor user and developer convenience, disable dm-verity automatically when\nthe bootloader is unlocked by checking for permissive AVB. This makes it\npossible to ship enforcing vbmeta images for security-conscious users to\nlock their bootloader and reap the benefits of verified boot, while\nstill allowing users with unlocked bootloaders to modify system\npartitions.\n\nSigned-off-by: Pranav Vashi \nChange-Id: I8c27047a3f75a466eb10a761bc7600b11dbe7653\n\nFormer-commit-id: 0076631075198c5bc92f7e7cdd5a7d962a0e5c6e\nFormer-commit-id: a0b05f3f79da1742677fea22f793ec9f69dc7a0d\nFormer-commit-id: 7223ac3fa93e86b94f4fa681748ca77e24ce722d","shortMessageHtmlLink":"libfs_avb: Disable dm-verity when AVB is permissive"}},{"before":"6a7e4a76b69544e574aa934bc5290a3b61ed89ec","after":null,"ref":"refs/heads/lineage-21.0","pushedAt":"2024-05-11T23:06:19.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"}},{"before":null,"after":"88240179efea1d8a371cc34eb8ebc92862ed1443","ref":"refs/heads/udc","pushedAt":"2024-05-11T23:05:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AnierinBliss","name":"Anierin Bliss","path":"/AnierinBliss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/29746164?s=80&v=4"},"commit":{"message":"camera: Add L-compatible camera feature enums\n\n * These QC-specific features have been renumbered in M, so add\n a compilation flag to permit using the old versions in case we\n can't rebuild the driver.\n\nChange-Id: I3f5a545fde8b27684b1b8ea490c09bb66e3b4cd9\n\nFormer-commit-id: 6dbacd5ad52820c42a6b9ac38716e29c0055c0f8\nFormer-commit-id: 7ca76cc318f9f2e1d9037c16f4ecaa3ac68453fb\nFormer-commit-id: 4daabc240774a917cdf57e9aec7fd50032021fd3\nChange-Id: I2cb4c50e6e6b7430ac0854fba861b0b63230ca0e","shortMessageHtmlLink":"camera: Add L-compatible camera feature enums"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yM1QwMTozMjoxNy4wMDAwMDBazwAAAAS9dYtW","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yM1QwMTozMjoxNy4wMDAwMDBazwAAAAS9dYtW","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNS0xMVQyMzowNTowOS4wMDAwMDBazwAAAARHb3r2"}},"title":"Activity ยท Evolution-X/system_core"}