├── .clang-format
├── .gitignore
├── Android.bp
├── AndroidProducts.mk
├── BoardConfig-common.mk
├── BoardConfigLineage.mk
├── METADATA
├── PREUPLOAD.cfg
├── WCNSS_qcom_cfg.ini
├── acdbdata
├── OEM
│ ├── sdm845-tavil-b1-snd-card
│ │ ├── Bluetooth_cal.acdb
│ │ ├── Codec_cal.acdb
│ │ ├── General_cal.acdb
│ │ ├── Global_cal.acdb
│ │ ├── Handset_cal.acdb
│ │ ├── Hdmi_cal.acdb
│ │ ├── Headset_cal.acdb
│ │ ├── Speaker_cal.acdb
│ │ ├── adsp_avs_config.acdb
│ │ └── workspaceFile.qwsp
│ ├── sdm845-tavil-c1-snd-card
│ │ ├── Bluetooth_cal.acdb
│ │ ├── Codec_cal.acdb
│ │ ├── General_cal.acdb
│ │ ├── Global_cal.acdb
│ │ ├── Handset_cal.acdb
│ │ ├── Hdmi_cal.acdb
│ │ ├── Headset_cal.acdb
│ │ ├── Speaker_cal.acdb
│ │ ├── adsp_avs_config.acdb
│ │ └── workspaceFile.qwsp
│ └── sdm845-tavil-snd-card
│ │ ├── Bluetooth_cal.acdb
│ │ ├── Codec_cal.acdb
│ │ ├── General_cal.acdb
│ │ ├── Global_cal.acdb
│ │ ├── Handset_cal.acdb
│ │ ├── Hdmi_cal.acdb
│ │ ├── Headset_cal.acdb
│ │ ├── Speaker_cal.acdb
│ │ └── workspaceFile.qwsp
└── adsp_avs_config.acdb
├── allowlist_com.google.android.as.xml
├── aosp_blueline.mk
├── aosp_blueline_hwasan.mk
├── aosp_crosshatch.mk
├── aosp_crosshatch_hwasan.mk
├── audio
├── 100_Blueline_Stereo_Protect.h
├── 20180301_Crosshatch_Voice_24bit.exported_tuning
├── 20180301_Crosshatch_Voice_24bit.h
├── 20180301_Crosshatch_Voice_24bit_rx.bin
├── 20180301_Crosshatch_Voice_24bit_tx.bin
├── 20180307_Blueline_Voice_24bit.exported_tuning
├── 20180307_Blueline_Voice_24bit.h
├── 20180307_Blueline_Voice_24bit_rx.bin
├── 20180307_Blueline_Voice_24bit_tx.bin
├── 20180312_Blueline_Multimedia_24bit_MediumVibration.exported_tuning
├── 20180312_Blueline_Multimedia_24bit_MediumVibration.h
├── 20180312_Blueline_Multimedia_24bit_MediumVibration_rx.bin
├── 20180312_Blueline_Multimedia_24bit_MediumVibration_tx.bin
├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration.exported_tuning
├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration.h
├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration_rx.bin
├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration_tx.bin
├── 20180405_Blueline_24bit.exported_tuning
├── 20180405_Blueline_24bit_ReducedVibration.h
├── 20180405_Blueline_24bit_ReducedVibration_rx.bin
├── 20180405_Blueline_24bit_ReducedVibration_tx.bin
├── 20180509_100_Blueline_Stereo_Protect.h
├── 20180509_Crosshatch_Protect_24bit.h
├── 510_Crosshatch_Baseline.h
├── 800_Blueline_Baseline.h
├── B1-Build325-Squeeze-Final.h
├── C1-Build325-Squeeze-Final.h
├── Crosshatch_05092018_Protect_24bit.h
├── README
├── Test1_Crosshatch_5_10_2018_onsite_final_remove_actisonic.h
├── Test1_Crosshatch_5_10_2018_onsite_final_remove_actisonic.tuning
├── convert_config_string.py
├── crus_sp_config_b1_rx.bin
├── crus_sp_config_b1_tx.bin
├── crus_sp_config_c1_rx.bin
├── crus_sp_config_c1_tx.bin
└── generate_bin.sh
├── audio_effects.xml
├── audio_platform_info_tavil_b1.xml
├── audio_platform_info_tavil_c1.xml
├── audio_policy_configuration.xml
├── audio_policy_configuration_a2dp_offload_disabled.xml
├── audio_policy_configuration_bluetooth_legacy_hal.xml
├── audio_policy_volumes_b1.xml
├── audio_policy_volumes_c1.xml
├── blueline
├── AndroidBoard.mk
├── BoardConfig.mk
├── BoardConfigLineage.mk
├── device-lineage.mk
├── extract-files.py
├── init.blueline.rc
├── overlay
│ └── frameworks
│ │ └── base
│ │ ├── core
│ │ └── res
│ │ │ └── res
│ │ │ ├── values-mcc310-mnc004
│ │ │ └── config.xml
│ │ │ ├── values-mcc311-mnc480
│ │ │ └── config.xml
│ │ │ ├── values
│ │ │ ├── config.xml
│ │ │ └── dimens.xml
│ │ │ └── xml
│ │ │ └── power_profile.xml
│ │ └── packages
│ │ └── SystemUI
│ │ └── res
│ │ ├── drawable
│ │ └── rounded.xml
│ │ └── values
│ │ ├── config.xml
│ │ └── dimens.xml
├── overlay_packages
│ ├── SettingsOverlayG013A
│ │ ├── Android.bp
│ │ ├── AndroidManifest.xml
│ │ └── res
│ │ │ └── drawable
│ │ │ └── regulatory_info.png
│ └── SettingsOverlayG013B
│ │ ├── Android.bp
│ │ ├── AndroidManifest.xml
│ │ └── res
│ │ └── drawable
│ │ └── regulatory_info.png
├── proprietary-files-carriersettings.txt
├── proprietary-files-radio.txt
├── proprietary-files-vendor.txt
├── proprietary-files.txt
├── proprietary-firmware.txt
└── setup-makefiles.py
├── bluetooth_hearing_aid_audio_policy_configuration.xml
├── board-info.txt
├── compatibility_matrix.xml
├── component-overrides.xml
├── config.fs
├── crosshatch
├── AndroidBoard.mk
├── BoardConfig.mk
├── BoardConfigLineage.mk
├── device-lineage.mk
├── extract-files.py
├── init.crosshatch.rc
├── overlay-lineage
│ └── frameworks
│ │ └── base
│ │ └── packages
│ │ └── overlays
│ │ └── NoCutoutOverlay
│ │ └── res
│ │ └── values
│ │ └── config.xml
├── overlay
│ └── frameworks
│ │ └── base
│ │ ├── core
│ │ └── res
│ │ │ └── res
│ │ │ ├── values-mcc310-mnc004
│ │ │ └── config.xml
│ │ │ ├── values-mcc311-mnc480
│ │ │ └── config.xml
│ │ │ ├── values
│ │ │ ├── config.xml
│ │ │ └── dimens.xml
│ │ │ └── xml
│ │ │ └── power_profile.xml
│ │ └── packages
│ │ └── SystemUI
│ │ └── res
│ │ ├── drawable
│ │ └── rounded.xml
│ │ ├── values-ldrtl
│ │ └── dimens.xml
│ │ └── values
│ │ ├── config.xml
│ │ └── dimens.xml
├── overlay_packages
│ ├── SettingsOverlayG013C
│ │ ├── Android.bp
│ │ ├── AndroidManifest.xml
│ │ └── res
│ │ │ └── drawable
│ │ │ └── regulatory_info.png
│ └── SettingsOverlayG013D
│ │ ├── Android.bp
│ │ ├── AndroidManifest.xml
│ │ └── res
│ │ └── drawable
│ │ └── regulatory_info.png
├── proprietary-files-carriersettings.txt
├── proprietary-files-radio.txt
├── proprietary-files-vendor.txt
├── proprietary-files.txt
├── proprietary-firmware.txt
└── setup-makefiles.py
├── default-permissions.xml
├── default_volume_tables.xml
├── device-blueline.mk
├── device-common.mk
├── device-crosshatch.mk
├── device-lineage.mk
├── device.mk
├── device_framework_matrix.xml
├── dumpstate
├── Android.bp
├── DumpstateDevice.cpp
├── DumpstateDevice.h
├── android.hardware.dumpstate@1.1-service.crosshatch.rc
└── service.cpp
├── extract-files.py
├── factory-images_blueline
└── generate-factory-images-package.sh
├── factory-images_crosshatch
└── generate-factory-images-package.sh
├── felica
├── loaderservice_updater_1.lss
└── loaderservice_updater_2.lss
├── fstab.hardware
├── fstab.mainline.hardware
├── fstab.persist
├── fuzzy_fastboot
├── .gitignore
├── checksum_parser.py
├── config.xml
├── test.sh
└── validator.py
├── gps.conf
├── graphite_ipc_platform_info.xml
├── health
├── Android.bp
├── BatteryRechargingControl.cpp
├── BatteryRechargingControl.h
└── Health.cpp
├── init.edge_sense.sh
├── init.fingerprint.sh
├── init.firstboot.sh
├── init.hardware.diag.rc.user
├── init.hardware.diag.rc.userdebug
├── init.hardware.mpssrfs.rc.user
├── init.hardware.mpssrfs.rc.userdebug
├── init.hardware.rc
├── init.hardware.usb.rc
├── init.hardware.wlc.rc.userdebug
├── init.hardware.xr.rc
├── init.insmod.blueline.cfg
├── init.insmod.crosshatch.cfg
├── init.insmod.sh
├── init.logging.rc
├── init.power.rc
├── init.qcom.devstart.sh
├── init.qcom.ipastart.sh
├── init.radio.sh
├── init.ramoops.sh
├── init.recovery.hardware.device.rc
├── init.recovery.hardware.rc
├── keymaster
├── Android.bp
└── wait_for_strongbox.cpp
├── lineage.dependencies
├── lineage_blueline.mk
├── lineage_crosshatch.mk
├── lineage_manifest.xml
├── lowi.conf
├── manifest.xml
├── media_codecs.xml
├── media_codecs_performance.xml
├── media_profiles_V1_0.xml
├── mixer_paths_tavil_b1.xml
├── mixer_paths_tavil_c1.xml
├── nfc
├── com.google.hardware.pixel.japan.xml
├── libese-nxp.conf
├── libnfc-nci.conf
├── libnfc-nxp.blueline.conf
├── libnfc-nxp.blueline.ese.conf
├── libnfc-nxp.blueline.uicc.conf
├── libnfc-nxp.crosshatch.conf
├── libnfc-nxp.crosshatch.ese.conf
├── libnfc-nxp.crosshatch.uicc.conf
├── manifest_se_SIM1.xml
└── manifest_se_eSE1.xml
├── overlay-lineage
├── frameworks
│ └── base
│ │ ├── core
│ │ └── res
│ │ │ └── res
│ │ │ └── values
│ │ │ ├── arrays.xml
│ │ │ └── config.xml
│ │ └── packages
│ │ ├── SettingsProvider
│ │ └── res
│ │ │ └── values
│ │ │ └── defaults.xml
│ │ └── SystemUI
│ │ └── res
│ │ └── values
│ │ └── config.xml
├── lineage-sdk
│ └── lineage
│ │ └── res
│ │ └── res
│ │ └── values
│ │ └── config.xml
└── packages
│ ├── apps
│ ├── Dialer
│ │ └── java
│ │ │ └── com
│ │ │ └── android
│ │ │ └── dialer
│ │ │ └── callrecord
│ │ │ └── res
│ │ │ └── values
│ │ │ └── config.xml
│ ├── Settings
│ │ └── res
│ │ │ └── values
│ │ │ └── lineage_config.xml
│ └── SimpleDeviceConfig
│ │ └── res
│ │ └── values
│ │ └── config.xml
│ └── services
│ └── Telephony
│ └── res
│ └── values
│ └── config.xml
├── overlay
├── frameworks
│ └── base
│ │ ├── core
│ │ └── res
│ │ │ └── res
│ │ │ ├── values-mcc440-mnc20
│ │ │ └── config.xml
│ │ │ └── values
│ │ │ ├── config.xml
│ │ │ ├── strings.xml
│ │ │ └── symbols.xml
│ │ └── packages
│ │ ├── SettingsLib
│ │ └── res
│ │ │ └── values-mcc440-mnc20
│ │ │ └── config.xml
│ │ └── SystemUI
│ │ └── res
│ │ └── values
│ │ └── config.xml
└── packages
│ ├── apps
│ ├── Nfc
│ │ └── res
│ │ │ └── values
│ │ │ └── config.xml
│ └── Settings
│ │ └── res
│ │ ├── values-mcc262-mnc01
│ │ └── strings.xml
│ │ └── values
│ │ ├── bools.xml
│ │ └── config.xml
│ └── services
│ ├── Telecom
│ └── res
│ │ └── values
│ │ └── config.xml
│ └── Telephony
│ └── res
│ └── values
│ └── config.xml
├── p2p_supplicant_overlay.conf
├── parts
├── Android.bp
├── AndroidManifest.xml
├── proguard.flags
└── src
│ └── org
│ └── lineageos
│ └── settings
│ ├── BootCompletedReceiver.java
│ └── EuiccDisabler.java
├── permissions
└── com.google.hardware.camera.easel_2018.xml
├── powerhint.json
├── powerstats
├── Android.bp
├── android.hardware.power.stats@1.0-service.pixel.rc
└── service.cpp
├── product.prop
├── qti_whitelist.xml
├── recovery.wipe
├── rro_overlays
├── ConnectivityOverlay
│ ├── Android.bp
│ ├── AndroidManifest.xml
│ └── res
│ │ └── values
│ │ └── config.xml
└── WifiOverlay
│ ├── Android.bp
│ ├── AndroidManifest.xml
│ ├── OWNERS
│ └── res
│ └── values
│ └── config.xml
├── sdm845
├── kernel-headers
│ ├── asm-generic
│ │ └── ioctls.h
│ ├── drm
│ │ ├── msm_drm.h
│ │ ├── msm_drm_pp.h
│ │ └── sde_drm.h
│ ├── linux
│ │ ├── avtimer.h
│ │ ├── esoc_ctrl.h
│ │ ├── ion.h
│ │ ├── ipa_qmi_service_v01.h
│ │ ├── mdss_rotator.h
│ │ ├── mfd
│ │ │ ├── msm-adie-codec.h
│ │ │ └── wcd9xxx
│ │ │ │ ├── wcd9320_registers.h
│ │ │ │ └── wcd9xxx_registers.h
│ │ ├── msm-core-interface.h
│ │ ├── msm_adsp.h
│ │ ├── msm_audio.h
│ │ ├── msm_audio_aac.h
│ │ ├── msm_audio_ac3.h
│ │ ├── msm_audio_alac.h
│ │ ├── msm_audio_amrnb.h
│ │ ├── msm_audio_amrwb.h
│ │ ├── msm_audio_amrwbplus.h
│ │ ├── msm_audio_ape.h
│ │ ├── msm_audio_calibration.h
│ │ ├── msm_audio_mvs.h
│ │ ├── msm_audio_qcp.h
│ │ ├── msm_audio_sbc.h
│ │ ├── msm_audio_voicememo.h
│ │ ├── msm_audio_wma.h
│ │ ├── msm_audio_wmapro.h
│ │ ├── msm_dsps.h
│ │ ├── msm_ion.h
│ │ ├── msm_ipa.h
│ │ ├── msm_kgsl.h
│ │ ├── msm_mdp.h
│ │ ├── msm_mdp_ext.h
│ │ ├── msm_pft.h
│ │ ├── msm_rmnet.h
│ │ ├── msm_rotator.h
│ │ ├── msm_thermal_ioctl.h
│ │ ├── msm_vidc_dec.h
│ │ ├── msm_vidc_enc.h
│ │ ├── qseecom.h
│ │ ├── rmnet_data.h
│ │ ├── rmnet_ipa_fd_ioctl.h
│ │ ├── sockev.h
│ │ ├── sockios.h
│ │ ├── spcom.h
│ │ ├── v4l2-controls.h
│ │ ├── videodev2.h
│ │ └── wcd-spi-ac-params.h
│ ├── media
│ │ ├── cam_cpas.h
│ │ ├── cam_defs.h
│ │ ├── cam_fd.h
│ │ ├── cam_icp.h
│ │ ├── cam_isp.h
│ │ ├── cam_isp_ife.h
│ │ ├── cam_isp_vfe.h
│ │ ├── cam_jpeg.h
│ │ ├── cam_lrme.h
│ │ ├── cam_req_mgr.h
│ │ ├── cam_sensor.h
│ │ ├── cam_sync.h
│ │ ├── msm_cam_sensor.h
│ │ ├── msm_camera.h
│ │ ├── msm_camsensor_sdk.h
│ │ ├── msm_fd.h
│ │ ├── msm_gemini.h
│ │ ├── msm_gestures.h
│ │ ├── msm_isp.h
│ │ ├── msm_jpeg.h
│ │ ├── msm_jpeg_dma.h
│ │ ├── msm_media_info.h
│ │ ├── msm_mercury.h
│ │ ├── msm_sde_rotator.h
│ │ ├── msm_vidc.h
│ │ ├── msm_vpu.h
│ │ ├── msmb_camera.h
│ │ ├── msmb_generic_buf_mgr.h
│ │ ├── msmb_isp.h
│ │ ├── msmb_ispif.h
│ │ └── msmb_pproc.h
│ ├── scsi
│ │ └── ufs
│ │ │ ├── ioctl.h
│ │ │ └── ufs.h
│ ├── sound
│ │ ├── asound.h
│ │ ├── audio_effects.h
│ │ ├── compress_offload.h
│ │ ├── compress_params.h
│ │ ├── devdep_params.h
│ │ ├── lsm_params.h
│ │ ├── msmcal-hwdep.h
│ │ ├── voice_params.h
│ │ ├── voice_svc.h
│ │ └── wcd-dsp-glink.h
│ └── video
│ │ └── msm_hdmi_modes.h
└── original-kernel-headers
│ ├── asm-generic
│ └── ioctls.h
│ ├── drm
│ ├── msm_drm.h
│ ├── msm_drm_pp.h
│ └── sde_drm.h
│ ├── linux
│ ├── avtimer.h
│ ├── esoc_ctrl.h
│ ├── ion.h
│ ├── ipa_qmi_service_v01.h
│ ├── mdss_rotator.h
│ ├── mfd
│ │ ├── msm-adie-codec.h
│ │ └── wcd9xxx
│ │ │ ├── wcd9320_registers.h
│ │ │ └── wcd9xxx_registers.h
│ ├── msm-core-interface.h
│ ├── msm_adsp.h
│ ├── msm_audio.h
│ ├── msm_audio_aac.h
│ ├── msm_audio_ac3.h
│ ├── msm_audio_alac.h
│ ├── msm_audio_amrnb.h
│ ├── msm_audio_amrwb.h
│ ├── msm_audio_amrwbplus.h
│ ├── msm_audio_ape.h
│ ├── msm_audio_calibration.h
│ ├── msm_audio_mvs.h
│ ├── msm_audio_qcp.h
│ ├── msm_audio_sbc.h
│ ├── msm_audio_voicememo.h
│ ├── msm_audio_wma.h
│ ├── msm_audio_wmapro.h
│ ├── msm_dsps.h
│ ├── msm_ion.h
│ ├── msm_ipa.h
│ ├── msm_kgsl.h
│ ├── msm_mdp.h
│ ├── msm_mdp_ext.h
│ ├── msm_pft.h
│ ├── msm_rmnet.h
│ ├── msm_rotator.h
│ ├── msm_thermal_ioctl.h
│ ├── msm_vidc_dec.h
│ ├── msm_vidc_enc.h
│ ├── qseecom.h
│ ├── rmnet_data.h
│ ├── rmnet_ipa_fd_ioctl.h
│ ├── sockev.h
│ ├── sockios.h
│ ├── spcom.h
│ ├── v4l2-controls.h
│ ├── videodev2.h
│ └── wcd-spi-ac-params.h
│ ├── media
│ ├── cam_cpas.h
│ ├── cam_defs.h
│ ├── cam_fd.h
│ ├── cam_icp.h
│ ├── cam_isp.h
│ ├── cam_isp_ife.h
│ ├── cam_isp_vfe.h
│ ├── cam_jpeg.h
│ ├── cam_lrme.h
│ ├── cam_req_mgr.h
│ ├── cam_sensor.h
│ ├── cam_sync.h
│ ├── msm_cam_sensor.h
│ ├── msm_camera.h
│ ├── msm_camsensor_sdk.h
│ ├── msm_fd.h
│ ├── msm_gemini.h
│ ├── msm_gestures.h
│ ├── msm_isp.h
│ ├── msm_jpeg.h
│ ├── msm_jpeg_dma.h
│ ├── msm_media_info.h
│ ├── msm_mercury.h
│ ├── msm_sde_rotator.h
│ ├── msm_vidc.h
│ ├── msm_vpu.h
│ ├── msmb_camera.h
│ ├── msmb_generic_buf_mgr.h
│ ├── msmb_isp.h
│ ├── msmb_ispif.h
│ └── msmb_pproc.h
│ ├── scsi
│ └── ufs
│ │ ├── ioctl.h
│ │ └── ufs.h
│ ├── sound
│ ├── asound.h
│ ├── audio_effects.h
│ ├── compress_offload.h
│ ├── compress_params.h
│ ├── devdep_params.h
│ ├── lsm_params.h
│ ├── msmcal-hwdep.h
│ ├── voice_params.h
│ ├── voice_svc.h
│ └── wcd-dsp-glink.h
│ └── video
│ └── msm_hdmi_modes.h
├── sec_config
├── self-extractors
├── PART1
├── PART2
├── PART3
├── PROLOGUE
├── extract-lists.txt
├── google_devices
│ ├── COPYRIGHT
│ ├── LICENSE
│ └── staging
│ │ ├── Android.mk.template
│ │ ├── BoardConfigPartial.mk
│ │ └── device-partial.mk
├── qcom
│ ├── COPYRIGHT
│ ├── LICENSE
│ └── staging
│ │ ├── Android.bp.txt
│ │ ├── Android.mk.template
│ │ ├── BoardConfigPartial.mk
│ │ └── device-partial.mk
└── root
│ ├── android-info.txt
│ └── proprietary
│ ├── BoardConfigVendor.mk
│ └── device-vendor.mk
├── self-extractors_blueline
├── PART1
├── PART2
├── PART3
├── PROLOGUE
├── extract-lists.txt
├── google_devices
│ ├── COPYRIGHT
│ ├── LICENSE
│ └── staging
│ │ ├── Android.mk.template
│ │ ├── BoardConfigPartial.mk
│ │ └── device-partial.mk
├── qcom
│ ├── COPYRIGHT
│ ├── LICENSE
│ └── staging
│ │ ├── Android.bp.txt
│ │ ├── Android.mk.template
│ │ ├── BoardConfigPartial.mk
│ │ └── device-partial.mk
└── root
│ ├── android-info.txt
│ └── proprietary
│ ├── BoardConfigVendor.mk
│ └── device-vendor.mk
├── sensors
└── hals.conf
├── sepolicy-lineage
├── dynamic
│ └── hal_lineage_livedisplay_qti.te
└── vendor
│ ├── file_contexts
│ └── hal_lineage_livedisplay.te
├── sepolicy
├── OWNERS
├── PREUPLOAD.cfg
├── crosshatch-sepolicy.mk
├── private
│ ├── certs
│ │ └── wfcactivation.x509.pem
│ ├── dataservice_app.te
│ ├── genfs_contexts
│ ├── keys.conf
│ ├── mac_permissions.xml
│ ├── priv_app.te
│ ├── radio.te
│ ├── recovery.te
│ ├── seapp_contexts
│ ├── service.te
│ ├── service_contexts
│ ├── sprint_hidden_menu.te
│ ├── system_server.te
│ ├── toolbox.te
│ ├── uscc_omadm.te
│ ├── vzw_omadm_connmo.te
│ ├── vzw_omadm_dcmo.te
│ ├── vzw_omadm_diagmon.te
│ ├── vzw_omadm_trigger.te
│ └── wfc_activation_app.te
├── public
│ ├── charger.te
│ ├── dataservice_app.te
│ ├── file.te
│ └── te_macros
├── system_ext
│ └── private
│ │ └── platform_app.te
├── tracking_denials
│ ├── dumpstate.te
│ ├── hal_drm_widevine.te
│ ├── hal_dumpstate_impl.te
│ ├── hal_health_default.te
│ ├── hal_wlc.te
│ ├── incidentd.te
│ ├── kernel.te
│ └── surfaceflinger.te
└── vendor
│ ├── google
│ ├── bug_map
│ ├── cbrs_setup.te
│ ├── certs
│ │ ├── app.x509.pem
│ │ ├── com_google_mds.x509.pem
│ │ ├── easel.x509.pem
│ │ ├── pulse-release.x509.pem
│ │ ├── tango.x509.pem
│ │ ├── tango_release.x509.pem
│ │ └── tango_userdev.x509.pem
│ ├── citadeld.te
│ ├── device.te
│ ├── fastbootd.te
│ ├── file.te
│ ├── file_contexts
│ ├── fsck.te
│ ├── genfs_contexts
│ ├── google_camera_app.te
│ ├── grilservice_app.te
│ ├── hal_confirmationui.te
│ ├── hal_contexthub.te
│ ├── hal_fingerprint.te
│ ├── hal_health_default.te
│ ├── hal_health_storage_default.te
│ ├── hal_keymaster_citadel.te
│ ├── hal_radioext_default.te
│ ├── hal_usb_gadget_impl.te
│ ├── hal_wifi_ext.te
│ ├── hwservice.te
│ ├── hwservice_contexts
│ ├── init-devstart-sh.te
│ ├── init-fingerprint.te
│ ├── init-firstboot.te
│ ├── keys.conf
│ ├── mac_permissions.xml
│ ├── mediacodec.te
│ ├── mediaswcodec.te
│ ├── modem_diagnostics.te
│ ├── modem_svc.te
│ ├── property.te
│ ├── property_contexts
│ ├── ramoops.te
│ ├── seapp_contexts
│ ├── service.te
│ ├── service_contexts
│ ├── shell.te
│ └── vendor_init.te
│ ├── qcom
│ ├── common
│ │ ├── adsprpcd.te
│ │ ├── app.te
│ │ ├── attributes
│ │ ├── audioserver.te
│ │ ├── bluetooth.te
│ │ ├── bootanim.te
│ │ ├── cameraserver.te
│ │ ├── cdsprpcd.te
│ │ ├── chre.te
│ │ ├── cnd.te
│ │ ├── con_monitor.te
│ │ ├── dataservice_app.te
│ │ ├── device.te
│ │ ├── domain.te
│ │ ├── dumpstate.te
│ │ ├── easel.te
│ │ ├── easelservice_app.te
│ │ ├── file.te
│ │ ├── file_contexts
│ │ ├── fsck.te
│ │ ├── ftmd.te
│ │ ├── genfs_contexts
│ │ ├── hal_audio_default.te
│ │ ├── hal_bluetooth_default.te
│ │ ├── hal_bootctl.te
│ │ ├── hal_camera.te
│ │ ├── hal_camera_default.te
│ │ ├── hal_cas_default.te
│ │ ├── hal_drm_default.te
│ │ ├── hal_drm_widevine.te
│ │ ├── hal_dumpstate_impl.te
│ │ ├── hal_fingerprint.te
│ │ ├── hal_gatekeeper.te
│ │ ├── hal_gatekeeper_qti.te
│ │ ├── hal_gnss_qti.te
│ │ ├── hal_graphics_allocator_default.te
│ │ ├── hal_graphics_composer_default.te
│ │ ├── hal_health_default.te
│ │ ├── hal_imsrtp.te
│ │ ├── hal_keymaster_qti.te
│ │ ├── hal_light.te
│ │ ├── hal_light_default.te
│ │ ├── hal_lineage_health_default.te
│ │ ├── hal_memtrack_default.te
│ │ ├── hal_neuralnetworks_paintbox.te
│ │ ├── hal_nfc_default.te
│ │ ├── hal_power_default.te
│ │ ├── hal_power_stats_default.te
│ │ ├── hal_rcsservice.te
│ │ ├── hal_secure_element_default.te
│ │ ├── hal_sensors_default.te
│ │ ├── hal_telephony.te
│ │ ├── hal_tetheroffload_default.te
│ │ ├── hal_tui_comm.te
│ │ ├── hal_usb_impl.te
│ │ ├── hal_vibrator_default.te
│ │ ├── hal_wifi_default.te
│ │ ├── hal_wifi_ext.te
│ │ ├── hal_wifi_hostapd.te
│ │ ├── hal_wifi_supplicant_default.te
│ │ ├── hal_wlc.te
│ │ ├── hardware_info_app.te
│ │ ├── healthd.te
│ │ ├── hwservice.te
│ │ ├── hwservice_contexts
│ │ ├── ims.te
│ │ ├── init-devstart-sh.te
│ │ ├── init-insmod-sh.te
│ │ ├── init-ipastart-sh.te
│ │ ├── init.te
│ │ ├── init_radio.te
│ │ ├── ioctl_defines
│ │ ├── ioctl_macros
│ │ ├── irqbalance.te
│ │ ├── irsc_util.te
│ │ ├── kernel.te
│ │ ├── location.te
│ │ ├── logger_app.te
│ │ ├── mediacodec.te
│ │ ├── mediaextractor.te
│ │ ├── mediaserver.te
│ │ ├── mediatranscoding.te
│ │ ├── mm-pp-daemon.te
│ │ ├── netmgrd.te
│ │ ├── netutils_wrapper.te
│ │ ├── omadm.te
│ │ ├── pd_services.te
│ │ ├── per_mgr.te
│ │ ├── per_proxy.te
│ │ ├── platform_app.te
│ │ ├── port-bridge.te
│ │ ├── property.te
│ │ ├── property_contexts
│ │ ├── qlogd.te
│ │ ├── qtelephony.te
│ │ ├── qti.te
│ │ ├── qtidataservices_app.te
│ │ ├── radio.te
│ │ ├── ramdump_app.te
│ │ ├── rfs_access.te
│ │ ├── ril_config_service.te
│ │ ├── rild.te
│ │ ├── rmt_storage.te
│ │ ├── seapp_contexts
│ │ ├── secure_ui_service_app.te
│ │ ├── sensors.te
│ │ ├── service.te
│ │ ├── service_contexts
│ │ ├── shell.te
│ │ ├── ssr_detector.te
│ │ ├── ssr_diag.te
│ │ ├── ssr_setup.te
│ │ ├── subsystem_ramdump.te
│ │ ├── surfaceflinger.te
│ │ ├── system_app.te
│ │ ├── system_server.te
│ │ ├── tango_core.te
│ │ ├── tcpdump_logger.te
│ │ ├── tee.te
│ │ ├── thermal-engine.te
│ │ ├── time_daemon.te
│ │ ├── timeservice_app.te
│ │ ├── ueventd.te
│ │ ├── update_engine_common.te
│ │ ├── vendor_init.te
│ │ ├── vndservice.te
│ │ ├── vndservice_contexts
│ │ ├── vold.te
│ │ ├── wcnss_service.te
│ │ ├── wifi_sniffer.te
│ │ └── zygote.te
│ ├── compat
│ │ └── file_contexts
│ └── sdm845
│ │ ├── file_contexts
│ │ ├── genfs_contexts
│ │ ├── hal_neuralnetworks.te
│ │ └── update_engine_common.te
│ └── verizon
│ ├── keys.conf
│ ├── mac_permissions.xml
│ ├── obdm_app.te
│ ├── seapp_contexts
│ └── verizon.x509.pem
├── setup-makefiles.py
├── sound_trigger_mixer_paths_wcd9340.xml
├── sound_trigger_platform_info.xml
├── teeui
└── tests
│ ├── blueline
│ ├── Android.bp
│ ├── TEST_MAPPING
│ └── test_main.cpp
│ └── crosshatch
│ ├── Android.bp
│ ├── TEST_MAPPING
│ └── test_main.cpp
├── thermal-engine-blueline-novr-evt.conf
├── thermal-engine-blueline-novr-prod.conf
├── thermal-engine-blueline-vr-evt.conf
├── thermal-engine-blueline-vr-prod.conf
├── thermal-engine-crosshatch-novr-evt.conf
├── thermal-engine-crosshatch-novr-prod.conf
├── thermal-engine-crosshatch-vr-evt.conf
├── thermal-engine-crosshatch-vr-prod.conf
├── thermal_info_config_blueline.json
├── thermal_info_config_blueline_evt.json
├── thermal_info_config_crosshatch.json
├── thermal_info_config_crosshatch_evt.json
├── ueventd.hardware.rc
├── uinput-fpc.idc
├── uinput-fpc.kl
├── usb
├── .clang-format
├── gadget
│ ├── Android.bp
│ ├── UsbGadget.cpp
│ ├── UsbGadget.h
│ ├── android.hardware.usb.gadget-service.crosshatch.rc
│ ├── android.hardware.usb.gadget@1.1-service.crosshatch.xml
│ └── service_gadget.cpp
└── usb
│ ├── Android.bp
│ ├── Usb.cpp
│ ├── Usb.h
│ ├── android.hardware.usb-service.crosshatch.rc
│ ├── android.hardware.usb-service.crosshatch.xml
│ └── service.cpp
├── utils.mk
├── vendor.prop
├── vf
├── OWNERS
├── aosp_crosshatch_vf.mk
├── framework_item_list.txt
├── framework_misc_info_keys.txt
└── vendor_item_list.txt
├── vibrator
├── Android.bp
├── OWNERS
├── Vibrator.cpp
├── Vibrator.h
├── android.hardware.vibrator-service.crosshatch.rc
├── android.hardware.vibrator-service.crosshatch.xml
├── cs40l20
│ ├── cs40l20.bin
│ ├── cs40l20.wmfw
│ └── wav_wavetable
│ │ ├── 09_POP(SNAP)_0503.json
│ │ ├── 09_POP(SNAP)_0503.wav
│ │ ├── 10_THUD_0503.json
│ │ ├── 10_THUD_0503.wav
│ │ ├── 11_The_big_adventure.json
│ │ ├── 12_Copycat.json
│ │ ├── 13_Crackle.json
│ │ ├── 14_Flutterby.json
│ │ ├── 15_Hotline.json
│ │ ├── 16_Leaps_and_bounds.json
│ │ ├── 17_Lollipop.json
│ │ ├── 18_Lost_and_found.json
│ │ ├── 19_Mash_up.json
│ │ ├── 20_Monkey_around.json
│ │ ├── 21_Schools_out.json
│ │ ├── 22_Zen_too.json
│ │ ├── 23_Extra1_100x8.json
│ │ ├── README
│ │ ├── [#1] 00 (23%).json
│ │ ├── [#1] 00 (23%).wav
│ │ ├── [#2] 00 (39%).json
│ │ ├── [#2] 00 (39%).wav
│ │ ├── [#3] 00 (55%).json
│ │ ├── [#3] 00 (55%).wav
│ │ ├── [#4] 00 (75%).json
│ │ ├── [#4] 00 (75%).wav
│ │ ├── [#5] 11-2 (-3).json
│ │ ├── [#5] 11-2 (-3).wav
│ │ ├── [#6] Double (L) = #1 + #2.json
│ │ ├── [#6] Double (L) = #1 + #2.wav
│ │ ├── [#7] Double (M) = #2 + #3.json
│ │ ├── [#7] Double (M) = #2 + #3.wav
│ │ ├── [#8] Double (H) = #3 + #4.json
│ │ ├── [#8] Double (H) = #3 + #4.wav
│ │ └── continuous_sine_f0.json
├── drv2624
│ └── drv2624.bin
└── service.cpp
├── voice_processing
├── Android.bp
└── voice_processing_descriptors.c
├── wifi_concurrency_cfg.txt
├── wpa_supplicant_overlay.conf
└── wpa_supplicant_wcn.conf
/.clang-format:
--------------------------------------------------------------------------------
1 | BasedOnStyle: Google
2 | AccessModifierOffset: -2
3 | AllowShortFunctionsOnASingleLine: Inline
4 | ColumnLimit: 99
5 | CommentPragmas: NOLINT:.*
6 | DerivePointerAlignment: false
7 | IndentWidth: 4
8 | PointerAlignment: Right
9 | TabWidth: 4
10 | UseTab: Never
11 | PenaltyExcessCharacter: 32
12 | AllowShortIfStatementsOnASingleLine: false
13 | SpacesBeforeTrailingComments: 2
14 |
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | edk2
2 |
--------------------------------------------------------------------------------
/METADATA:
--------------------------------------------------------------------------------
1 | third_party {
2 | license_note: "would be NOTICE save for sdm845/original-kernel-headers/"
3 | license_type: RESTRICTED
4 | }
5 |
--------------------------------------------------------------------------------
/PREUPLOAD.cfg:
--------------------------------------------------------------------------------
1 | [Builtin Hooks]
2 | clang_format = true
3 |
4 | [Builtin Hooks Options]
5 | clang_format = --commit ${PREUPLOAD_COMMIT} --style file --extensions c,h,cc,cpp
6 |
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Bluetooth_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Bluetooth_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Codec_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Codec_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/General_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/General_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Global_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Global_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Handset_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Handset_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Hdmi_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Hdmi_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Headset_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Headset_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/Speaker_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Speaker_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-b1-snd-card/adsp_avs_config.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/adsp_avs_config.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Bluetooth_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Bluetooth_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Codec_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Codec_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/General_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/General_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Global_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Global_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Handset_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Handset_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Hdmi_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Hdmi_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Headset_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Headset_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/Speaker_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Speaker_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-c1-snd-card/adsp_avs_config.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/adsp_avs_config.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Bluetooth_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Bluetooth_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Codec_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Codec_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/General_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/General_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Global_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Global_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Handset_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Handset_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Hdmi_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Hdmi_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Headset_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Headset_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/OEM/sdm845-tavil-snd-card/Speaker_cal.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Speaker_cal.acdb
--------------------------------------------------------------------------------
/acdbdata/adsp_avs_config.acdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/adsp_avs_config.acdb
--------------------------------------------------------------------------------
/aosp_blueline_hwasan.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright 2019 The Android Open Source Project
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the "License");
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an "AS IS" BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 | #
16 |
17 | $(call inherit-product, device/google/crosshatch/aosp_blueline.mk)
18 | PRODUCT_NAME := aosp_blueline_hwasan
19 |
20 | # Add "hwaddress" as a global sanitizer if it's missing.
21 | ifeq ($(filter hwaddress,$(SANITIZE_TARGET)),)
22 | SANITIZE_TARGET := $(strip $(SANITIZE_TARGET) hwaddress)
23 | endif
24 |
--------------------------------------------------------------------------------
/aosp_crosshatch_hwasan.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright 2019 The Android Open Source Project
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the "License");
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an "AS IS" BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 | #
16 |
17 | $(call inherit-product, device/google/crosshatch/aosp_crosshatch.mk)
18 | PRODUCT_NAME := aosp_crosshatch_hwasan
19 |
20 | # Add "hwaddress" as a global sanitizer if it's missing.
21 | ifeq ($(filter hwaddress,$(SANITIZE_TARGET)),)
22 | SANITIZE_TARGET := $(strip $(SANITIZE_TARGET) hwaddress)
23 | endif
24 |
--------------------------------------------------------------------------------
/audio/20180301_Crosshatch_Voice_24bit.exported_tuning:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180301_Crosshatch_Voice_24bit.exported_tuning
--------------------------------------------------------------------------------
/audio/20180301_Crosshatch_Voice_24bit_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180301_Crosshatch_Voice_24bit_rx.bin
--------------------------------------------------------------------------------
/audio/20180301_Crosshatch_Voice_24bit_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180301_Crosshatch_Voice_24bit_tx.bin
--------------------------------------------------------------------------------
/audio/20180307_Blueline_Voice_24bit.exported_tuning:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180307_Blueline_Voice_24bit.exported_tuning
--------------------------------------------------------------------------------
/audio/20180307_Blueline_Voice_24bit_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180307_Blueline_Voice_24bit_rx.bin
--------------------------------------------------------------------------------
/audio/20180307_Blueline_Voice_24bit_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180307_Blueline_Voice_24bit_tx.bin
--------------------------------------------------------------------------------
/audio/20180312_Blueline_Multimedia_24bit_MediumVibration.exported_tuning:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Blueline_Multimedia_24bit_MediumVibration.exported_tuning
--------------------------------------------------------------------------------
/audio/20180312_Blueline_Multimedia_24bit_MediumVibration_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Blueline_Multimedia_24bit_MediumVibration_rx.bin
--------------------------------------------------------------------------------
/audio/20180312_Blueline_Multimedia_24bit_MediumVibration_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Blueline_Multimedia_24bit_MediumVibration_tx.bin
--------------------------------------------------------------------------------
/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration.exported_tuning:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration.exported_tuning
--------------------------------------------------------------------------------
/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_rx.bin
--------------------------------------------------------------------------------
/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_tx.bin
--------------------------------------------------------------------------------
/audio/20180405_Blueline_24bit.exported_tuning:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180405_Blueline_24bit.exported_tuning
--------------------------------------------------------------------------------
/audio/20180405_Blueline_24bit_ReducedVibration_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180405_Blueline_24bit_ReducedVibration_rx.bin
--------------------------------------------------------------------------------
/audio/20180405_Blueline_24bit_ReducedVibration_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180405_Blueline_24bit_ReducedVibration_tx.bin
--------------------------------------------------------------------------------
/audio/README:
--------------------------------------------------------------------------------
1 | Example usage:
2 |
3 | $ python3.5 convert_config_string.py txt 510_Crosshatch_Baseline.h crus_sp_config_c1_rx.bin crus_sp_config_c1_tx.bin
4 | CSPL config string conversion used for android system
5 | python version: sys.version_info(major=3, minor=5, micro=3, releaselevel='final', serial=0)
6 | Current Os name: posix
7 | 24 bit detected
8 | wrote file: crus_sp_config_c1_rx.bin
9 | wrote file: crus_sp_config_c1_tx.bin
10 |
11 |
--------------------------------------------------------------------------------
/audio/crus_sp_config_b1_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_b1_rx.bin
--------------------------------------------------------------------------------
/audio/crus_sp_config_b1_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_b1_tx.bin
--------------------------------------------------------------------------------
/audio/crus_sp_config_c1_rx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_c1_rx.bin
--------------------------------------------------------------------------------
/audio/crus_sp_config_c1_tx.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_c1_tx.bin
--------------------------------------------------------------------------------
/audio/generate_bin.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 |
3 | # B1
4 | python3.5 convert_config_string.py txt 20180509_100_Blueline_Stereo_Protect.h crus_sp_config_b1_rx.bin crus_sp_config_b1_tx.bin
5 |
6 | # C1
7 | python3.5 convert_config_string.py txt 20180509_Crosshatch_Protect_24bit.h crus_sp_config_c1_rx.bin crus_sp_config_c1_tx.bin
8 |
--------------------------------------------------------------------------------
/blueline/AndroidBoard.mk:
--------------------------------------------------------------------------------
1 | ../crosshatch/AndroidBoard.mk
--------------------------------------------------------------------------------
/blueline/BoardConfig.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2016 The Android Open-Source Project
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the "License");
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an "AS IS" BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 | #
16 |
17 | ifdef PHONE_CAR_BOARD_PRODUCT
18 | include device/google_car/$(PHONE_CAR_BOARD_PRODUCT)/BoardConfig.mk
19 | else
20 | TARGET_BOOTLOADER_BOARD_NAME := blueline
21 | TARGET_SCREEN_DENSITY := 440
22 | TARGET_RECOVERY_UI_MARGIN_HEIGHT := 20
23 |
24 | include device/google/crosshatch/BoardConfig-common.mk
25 | endif
26 |
27 | include device/google/crosshatch/blueline/BoardConfigLineage.mk
28 |
--------------------------------------------------------------------------------
/blueline/BoardConfigLineage.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018-2021 The LineageOS Project
3 | #
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | include device/google/crosshatch/BoardConfigLineage.mk
8 |
9 | include vendor/google/blueline/BoardConfigVendor.mk
10 |
--------------------------------------------------------------------------------
/blueline/device-lineage.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018-2021 The LineageOS Project
3 | #
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | $(call inherit-product, device/google/crosshatch/device-lineage.mk)
8 |
--------------------------------------------------------------------------------
/blueline/overlay/frameworks/base/core/res/res/values/dimens.xml:
--------------------------------------------------------------------------------
1 |
2 |
18 |
19 |
20 |
21 | 28px
22 |
23 |
--------------------------------------------------------------------------------
/blueline/overlay/frameworks/base/packages/SystemUI/res/drawable/rounded.xml:
--------------------------------------------------------------------------------
1 |
14 |
19 |
20 |
23 |
24 |
25 |
--------------------------------------------------------------------------------
/blueline/overlay_packages/SettingsOverlayG013A/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | runtime_resource_overlay {
6 | name: "SettingsOverlayG013A",
7 | product_specific: true,
8 | }
9 |
--------------------------------------------------------------------------------
/blueline/overlay_packages/SettingsOverlayG013A/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
4 |
5 |
9 |
--------------------------------------------------------------------------------
/blueline/overlay_packages/SettingsOverlayG013A/res/drawable/regulatory_info.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/blueline/overlay_packages/SettingsOverlayG013A/res/drawable/regulatory_info.png
--------------------------------------------------------------------------------
/blueline/overlay_packages/SettingsOverlayG013B/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | runtime_resource_overlay {
6 | name: "SettingsOverlayG013B",
7 | product_specific: true,
8 | }
9 |
--------------------------------------------------------------------------------
/blueline/overlay_packages/SettingsOverlayG013B/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
4 |
5 |
9 |
--------------------------------------------------------------------------------
/blueline/overlay_packages/SettingsOverlayG013B/res/drawable/regulatory_info.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/blueline/overlay_packages/SettingsOverlayG013B/res/drawable/regulatory_info.png
--------------------------------------------------------------------------------
/blueline/proprietary-firmware.txt:
--------------------------------------------------------------------------------
1 | # All firmware images are extracted from Google factory images for each new ASB
2 |
3 | abl.img;AB
4 | aop.img;AB
5 | cmnlib.img;AB
6 | cmnlib64.img;AB
7 | devcfg.img;AB
8 | hyp.img;AB
9 | keymaster.img;AB
10 | modem.img;AB
11 | qupfw.img;AB
12 | tz.img;AB
13 | xbl.img;AB
14 | xbl_config.img;AB
15 |
--------------------------------------------------------------------------------
/blueline/setup-makefiles.py:
--------------------------------------------------------------------------------
1 | #!./extract-files.py --regenerate_makefiles
2 |
--------------------------------------------------------------------------------
/bluetooth_hearing_aid_audio_policy_configuration.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
19 |
20 |
21 |
--------------------------------------------------------------------------------
/board-info.txt:
--------------------------------------------------------------------------------
1 | require board=crosshatch|blueline
2 |
--------------------------------------------------------------------------------
/component-overrides.xml:
--------------------------------------------------------------------------------
1 |
2 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
--------------------------------------------------------------------------------
/crosshatch/BoardConfig.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2016 The Android Open-Source Project
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the "License");
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an "AS IS" BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 | #
16 |
17 | ifdef PHONE_CAR_BOARD_PRODUCT
18 | include device/google_car/$(PHONE_CAR_BOARD_PRODUCT)/BoardConfig.mk
19 | else
20 | TARGET_BOOTLOADER_BOARD_NAME := crosshatch
21 | TARGET_SCREEN_DENSITY := 560
22 | TARGET_RECOVERY_UI_MARGIN_HEIGHT := 165
23 |
24 | include device/google/crosshatch/BoardConfig-common.mk
25 | endif
26 |
27 | include device/google/crosshatch/crosshatch/BoardConfigLineage.mk
28 |
--------------------------------------------------------------------------------
/crosshatch/BoardConfigLineage.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018-2021 The LineageOS Project
3 | #
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | include device/google/crosshatch/BoardConfigLineage.mk
8 |
9 | include vendor/google/crosshatch/BoardConfigVendor.mk
10 |
--------------------------------------------------------------------------------
/crosshatch/device-lineage.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018-2021 The LineageOS Project
3 | #
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | # Overlays
8 | DEVICE_PACKAGE_OVERLAYS += device/google/crosshatch/crosshatch/overlay-lineage
9 |
10 | PRODUCT_ENFORCE_RRO_EXCLUDED_OVERLAYS += \
11 | device/google/crosshatch/crosshatch/overlay-lineage/frameworks/base/packages/overlays/NoCutoutOverlay
12 |
13 | $(call inherit-product, device/google/crosshatch/device-lineage.mk)
14 |
--------------------------------------------------------------------------------
/crosshatch/overlay/frameworks/base/core/res/res/values/dimens.xml:
--------------------------------------------------------------------------------
1 |
2 |
18 |
19 |
20 |
21 | 28px
22 |
23 |
--------------------------------------------------------------------------------
/crosshatch/overlay/frameworks/base/packages/SystemUI/res/drawable/rounded.xml:
--------------------------------------------------------------------------------
1 |
14 |
19 |
20 |
23 |
24 |
25 |
--------------------------------------------------------------------------------
/crosshatch/overlay/frameworks/base/packages/SystemUI/res/values-ldrtl/dimens.xml:
--------------------------------------------------------------------------------
1 |
2 |
19 |
20 |
21 | 8dp
22 | 20dp
23 |
24 |
--------------------------------------------------------------------------------
/crosshatch/overlay_packages/SettingsOverlayG013C/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | runtime_resource_overlay {
6 | name: "SettingsOverlayG013C",
7 | product_specific: true,
8 | }
9 |
--------------------------------------------------------------------------------
/crosshatch/overlay_packages/SettingsOverlayG013C/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
4 |
5 |
9 |
--------------------------------------------------------------------------------
/crosshatch/overlay_packages/SettingsOverlayG013C/res/drawable/regulatory_info.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/crosshatch/overlay_packages/SettingsOverlayG013C/res/drawable/regulatory_info.png
--------------------------------------------------------------------------------
/crosshatch/overlay_packages/SettingsOverlayG013D/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | runtime_resource_overlay {
6 | name: "SettingsOverlayG013D",
7 | product_specific: true,
8 | }
9 |
--------------------------------------------------------------------------------
/crosshatch/overlay_packages/SettingsOverlayG013D/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
4 |
5 |
9 |
--------------------------------------------------------------------------------
/crosshatch/overlay_packages/SettingsOverlayG013D/res/drawable/regulatory_info.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/crosshatch/overlay_packages/SettingsOverlayG013D/res/drawable/regulatory_info.png
--------------------------------------------------------------------------------
/crosshatch/proprietary-firmware.txt:
--------------------------------------------------------------------------------
1 | # All firmware images are extracted from Google factory images for each new ASB
2 |
3 | abl.img;AB
4 | aop.img;AB
5 | cmnlib.img;AB
6 | cmnlib64.img;AB
7 | devcfg.img;AB
8 | hyp.img;AB
9 | keymaster.img;AB
10 | modem.img;AB
11 | qupfw.img;AB
12 | tz.img;AB
13 | xbl.img;AB
14 | xbl_config.img;AB
15 |
--------------------------------------------------------------------------------
/crosshatch/setup-makefiles.py:
--------------------------------------------------------------------------------
1 | #!./extract-files.py --regenerate_makefiles
2 |
--------------------------------------------------------------------------------
/dumpstate/android.hardware.dumpstate@1.1-service.crosshatch.rc:
--------------------------------------------------------------------------------
1 | service vendor.dumpstate-1-1 /vendor/bin/hw/android.hardware.dumpstate@1.1-service.crosshatch
2 | class hal
3 | user system
4 | group system vendor_rfs
5 | interface android.hardware.dumpstate@1.0::IDumpstateDevice default
6 | interface android.hardware.dumpstate@1.1::IDumpstateDevice default
7 | oneshot
8 | disabled
9 |
10 | on boot
11 | chmod 0444 /sys/kernel/debug/tzdbg/qsee_log
12 |
--------------------------------------------------------------------------------
/extract-files.py:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | #
3 | # SPDX-FileCopyrightText: 2024 The LineageOS Project
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | set -e
8 |
9 | MY_DIR="$(cd "$(dirname "${0}")"; pwd -P)"
10 |
11 | pushd "${MY_DIR}/crosshatch"
12 | ./extract-files.py $@
13 | popd
14 |
--------------------------------------------------------------------------------
/factory-images_blueline/generate-factory-images-package.sh:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | # Copyright 2018 The Android Open Source Project
4 | #
5 | # Licensed under the Apache License, Version 2.0 (the "License");
6 | # you may not use this file except in compliance with the License.
7 | # You may obtain a copy of the License at
8 | #
9 | # http://www.apache.org/licenses/LICENSE-2.0
10 | #
11 | # Unless required by applicable law or agreed to in writing, software
12 | # distributed under the License is distributed on an "AS IS" BASIS,
13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 | # See the License for the specific language governing permissions and
15 | # limitations under the License.
16 |
17 | source ../../../common/clear-factory-images-variables.sh
18 | BUILD=4779185
19 | DEVICE=blueline
20 | PRODUCT=blueline
21 | VERSION=ppr1.180514.001
22 | SRCPREFIX=signed-
23 | BOOTLOADER=b1c1-0.1-4772579
24 | RADIO=g845-00008-180429-B-4752067
25 | source ../../../common/generate-factory-images-common.sh
26 |
--------------------------------------------------------------------------------
/factory-images_crosshatch/generate-factory-images-package.sh:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | # Copyright 2018 The Android Open Source Project
4 | #
5 | # Licensed under the Apache License, Version 2.0 (the "License");
6 | # you may not use this file except in compliance with the License.
7 | # You may obtain a copy of the License at
8 | #
9 | # http://www.apache.org/licenses/LICENSE-2.0
10 | #
11 | # Unless required by applicable law or agreed to in writing, software
12 | # distributed under the License is distributed on an "AS IS" BASIS,
13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 | # See the License for the specific language governing permissions and
15 | # limitations under the License.
16 |
17 | source ../../../common/clear-factory-images-variables.sh
18 | BUILD=4779185
19 | DEVICE=crosshatch
20 | PRODUCT=crosshatch
21 | VERSION=ppr1.180514.001
22 | SRCPREFIX=signed-
23 | BOOTLOADER=b1c1-0.1-4772579
24 | RADIO=g845-00008-180429-B-4752067
25 | source ../../../common/generate-factory-images-common.sh
26 |
--------------------------------------------------------------------------------
/fstab.persist:
--------------------------------------------------------------------------------
1 | # Keep persist in an fstab file, since we need to run fsck on it after abnormal shutdown.
2 |
3 | #
4 | /dev/block/platform/soc/1d84000.ufshc/by-name/persist /mnt/vendor/persist ext4 nosuid,nodev,noatime,barrier=1 wait
5 |
--------------------------------------------------------------------------------
/fuzzy_fastboot/.gitignore:
--------------------------------------------------------------------------------
1 | *.img
2 |
--------------------------------------------------------------------------------
/init.firstboot.sh:
--------------------------------------------------------------------------------
1 | #!/vendor/bin/sh
2 |
3 | # Init starts this script in the factory, to trigger shutdown after
4 | # setupwizard has started, and USB is removed.
5 |
6 | # wait for system to settle down after sys.boot_complete
7 | sleep 5
8 |
9 | # Wait for USB to be removed, debounce it three times in case it's enumerating still.
10 | disconnect_count=0
11 | while [ disconnect_count -le 3 ]; do
12 | type=`cat /sys/class/power_supply/usb/typec_mode`
13 | if [ "x$type" == "xNothing attached" ]; then
14 | (( disconnect_count++ ))
15 | echo disconnect count is $disconnect_count
16 | else
17 | # Restart the debounce count
18 | disconnect_count=0
19 | fi
20 | sleep 1
21 | done
22 |
23 | # Shutdown
24 | setprop sys.powerctl reboot,packout
25 |
--------------------------------------------------------------------------------
/init.hardware.mpssrfs.rc.user:
--------------------------------------------------------------------------------
1 | on post-fs-data
2 | # Modem Remote FS
3 | mkdir /data/vendor/rfs 0770 vendor_rfs system
4 | mkdir /data/vendor/rfs/mpss 0770 vendor_rfs system
5 | mkdir /data/vendor/tombstones/rfs 0770 vendor_rfs system
6 |
--------------------------------------------------------------------------------
/init.hardware.mpssrfs.rc.userdebug:
--------------------------------------------------------------------------------
1 | on post-fs-data
2 | # Modem Remote FS
3 | mkdir /data/vendor/rfs 0770 vendor_rfs system
4 | mkdir /data/vendor/rfs/mpss 0770 vendor_rfs system
5 | mkdir /data/vendor/tombstones/rfs 0770 vendor_rfs system
6 | write /data/vendor/rfs/mpss/mcfg_nv_list_flag "1"
7 | chown vendor_rfs vendor_rfs /data/vendor/rfs/mpss/mcfg_nv_list_flag
8 | chmod 0700 /data/vendor/rfs/mpss/mcfg_nv_list_flag
9 |
10 | on property:vendor.sys.modem.diag.efsdump=true
11 | chmod 0660 /data/vendor/rfs/mpss/modem_efs
12 |
--------------------------------------------------------------------------------
/init.hardware.wlc.rc.userdebug:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018 The Android Open-Source Project
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the "License");
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an "AS IS" BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 | #
16 |
17 | on property:sys.boot_completed=1 && property:persist.vendor.limit.wlc.current=1
18 | write /sys/class/power_supply/dc/current_max 75000
19 |
20 | on property:sys.boot_completed=1 && property:persist.vendor.limit.wlc.current=0
21 | write /sys/class/power_supply/dc/current_max 1100000
22 |
23 | on property:vendor.disable.wlc=1
24 | write /sys/class/power_supply/wireless/online 0
25 |
--------------------------------------------------------------------------------
/init.insmod.blueline.cfg:
--------------------------------------------------------------------------------
1 | #############################################
2 | # init.insmod.cfg #
3 | # This file contains kernel modules to load #
4 | # at init time by init.insmod.sh script #
5 | #############################################
6 |
7 | # WiFi Driver module
8 | insmod /vendor/lib/modules/wlan.ko
9 |
10 | # Audio modules
11 | insmod /vendor/lib/modules/pinctrl-wcd.ko
12 | insmod /vendor/lib/modules/wcd-core.ko
13 | insmod /vendor/lib/modules/wcd-dsp-glink.ko
14 | insmod /vendor/lib/modules/snd-soc-wcd9xxx.ko
15 | insmod /vendor/lib/modules/snd-soc-wcd934x.ko
16 | insmod /vendor/lib/modules/snd-soc-wcd-spi.ko
17 | insmod /vendor/lib/modules/snd-soc-cs35l36.ko
18 | insmod /vendor/lib/modules/snd-soc-sdm845.ko
19 |
20 | # Touch
21 | insmod /vendor/lib/modules/videobuf2-memops.ko
22 | insmod /vendor/lib/modules/videobuf2-vmalloc.ko
23 | insmod /vendor/lib/modules/heatmap.ko
24 | insmod /vendor/lib/modules/ftm5.ko
25 |
--------------------------------------------------------------------------------
/init.insmod.crosshatch.cfg:
--------------------------------------------------------------------------------
1 | #############################################
2 | # init.insmod.cfg #
3 | # This file contains kernel modules to load #
4 | # at init time by init.insmod.sh script #
5 | #############################################
6 |
7 | # WiFi Driver module
8 | insmod /vendor/lib/modules/wlan.ko
9 |
10 | # Audio modules
11 | insmod /vendor/lib/modules/pinctrl-wcd.ko
12 | insmod /vendor/lib/modules/wcd-core.ko
13 | insmod /vendor/lib/modules/wcd-dsp-glink.ko
14 | insmod /vendor/lib/modules/snd-soc-wcd9xxx.ko
15 | insmod /vendor/lib/modules/snd-soc-wcd934x.ko
16 | insmod /vendor/lib/modules/snd-soc-wcd-spi.ko
17 | insmod /vendor/lib/modules/snd-soc-cs35l36.ko
18 | insmod /vendor/lib/modules/snd-soc-sdm845.ko
19 |
20 | # Touch
21 | insmod /vendor/lib/modules/videobuf2-memops.ko
22 | insmod /vendor/lib/modules/videobuf2-vmalloc.ko
23 | insmod /vendor/lib/modules/heatmap.ko
24 | insmod /vendor/lib/modules/sec_touch.ko
25 |
--------------------------------------------------------------------------------
/init.insmod.sh:
--------------------------------------------------------------------------------
1 | #! /vendor/bin/sh
2 |
3 | #########################################
4 | ### init.insmod.cfg format: ###
5 | ### --------------------------------- ###
6 | ### [insmod|setprop] [path|prop name] ###
7 | ### ... ###
8 | #########################################
9 |
10 | cfg_file="/vendor/etc/init.insmod.cfg"
11 |
12 | if [ -f $cfg_file ]; then
13 | while IFS=" " read -r action name
14 | do
15 | case $action in
16 | "insmod") insmod $name ;;
17 | "setprop") setprop $name 1 ;;
18 | esac
19 | done < $cfg_file
20 | fi
21 |
22 | # set property even if there is no insmod config
23 | # as property value "1" is expected in early-boot trigger
24 | setprop vendor.all.modules.ready 1
25 |
--------------------------------------------------------------------------------
/init.logging.rc:
--------------------------------------------------------------------------------
1 | on post-fs-data
2 | mkdir /data/vendor/modem_dump 0777 system system
3 | mkdir /data/vendor/radio/diag_logs/logs 0777 system system
4 | mkdir /data/vendor/radio/extended_logs 0770 system radio
5 |
--------------------------------------------------------------------------------
/init.qcom.devstart.sh:
--------------------------------------------------------------------------------
1 | #! /vendor/bin/sh
2 |
3 | # Initialize Edge Sense.
4 | /vendor/bin/init.edge_sense.sh
5 |
6 | echo 1 > /sys/kernel/boot_slpi/boot
7 | setprop vendor.qcom.devup 1
8 | log SLPI boot started.
9 |
10 | version=`grep -ao "OEM_IMAGE_VERSION_STRING[ -~]*" \
11 | /vendor/firmware/slpi.b04 | \
12 | sed -e s/OEM_IMAGE_VERSION_STRING=SLPI.version.// -e s/\(.*\).//`
13 | setprop vendor.sys.slpi.firmware.version "$version"
14 |
--------------------------------------------------------------------------------
/init.qcom.ipastart.sh:
--------------------------------------------------------------------------------
1 | #! /vendor/bin/sh
2 |
3 | echo 1 > /dev/ipa
4 |
--------------------------------------------------------------------------------
/init.ramoops.sh:
--------------------------------------------------------------------------------
1 | #!/vendor/bin/sh
2 |
3 | # Decrypt the keys and write them to the kernel
4 | ramoops -D
5 |
6 | if [ $? -eq 0 ]; then
7 | # Pivot (and decrypt)
8 | echo 1 > /sys/devices/virtual/ramoops/pstore/use_alt
9 | else
10 | setprop vendor.ramoops.decryption.error $?
11 | fi
12 |
13 | # Trigger remount of pstore regardless of decryption state
14 | setprop vendor.ramoops.decrypted true
15 |
16 | # Generate keys (if none exist), and load the keys to carveout
17 | ramoops -g -l -c
18 |
19 |
--------------------------------------------------------------------------------
/init.recovery.hardware.device.rc:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2017 The Android Open-Source Project
3 | #
4 | # Licensed under the Apache License, Version 2.0 (the "License");
5 | # you may not use this file except in compliance with the License.
6 | # You may obtain a copy of the License at
7 | #
8 | # http://www.apache.org/licenses/LICENSE-2.0
9 | #
10 | # Unless required by applicable law or agreed to in writing, software
11 | # distributed under the License is distributed on an "AS IS" BASIS,
12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | # See the License for the specific language governing permissions and
14 | # limitations under the License.
15 | #
16 |
17 | import /init.recovery.${ro.boot.hardware.platform}.rc
--------------------------------------------------------------------------------
/init.recovery.hardware.rc:
--------------------------------------------------------------------------------
1 | on fs
2 | wait /dev/block/platform/soc/${ro.boot.bootdevice}
3 | symlink /dev/block/platform/soc/${ro.boot.bootdevice} /dev/block/bootdevice
4 |
5 | on init
6 | setprop sys.usb.configfs 1
7 | # Don't lose recovery logs- keep warm reset for coming out of recovery.
8 | write /sys/module/msm_poweroff/parameters/warm_reset 1
9 | # Enable thermal mitigation
10 | write /sys/devices/virtual/thermal/tz-by-name/backup-charge/mode enabled
11 |
--------------------------------------------------------------------------------
/lineage.dependencies:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "repository": "android_device_google_gs-common",
4 | "target_path": "device/google/gs-common"
5 | },
6 | {
7 | "repository": "android_kernel_google_msm-4.9",
8 | "target_path": "kernel/google/msm-4.9"
9 | },
10 | {
11 | "repository": "android_packages_apps_ElmyraService",
12 | "target_path": "packages/apps/ElmyraService"
13 | }
14 | ]
15 |
--------------------------------------------------------------------------------
/lineage_blueline.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018-2021 The LineageOS Project
3 | #
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | # Inherit some common Lineage stuff.
8 | $(call inherit-product, vendor/lineage/config/common_full_phone.mk)
9 |
10 | # Inherit device configuration
11 | $(call inherit-product, device/google/crosshatch/aosp_blueline.mk)
12 |
13 | include device/google/crosshatch/blueline/device-lineage.mk
14 |
15 | # Device identifier. This must come after all inclusions
16 | PRODUCT_BRAND := google
17 | PRODUCT_MODEL := Pixel 3
18 | PRODUCT_NAME := lineage_blueline
19 |
20 | # Boot animation
21 | TARGET_SCREEN_HEIGHT := 2160
22 | TARGET_SCREEN_WIDTH := 1080
23 |
24 | PRODUCT_BUILD_PROP_OVERRIDES += \
25 | BuildDesc="blueline-user 12 SP1A.210812.016.C2 8618562 release-keys" \
26 | BuildFingerprint=google/blueline/blueline:12/SP1A.210812.016.C2/8618562:user/release-keys \
27 | DeviceProduct=blueline
28 |
29 | $(call inherit-product, vendor/google/blueline/blueline-vendor.mk)
30 |
--------------------------------------------------------------------------------
/lineage_crosshatch.mk:
--------------------------------------------------------------------------------
1 | #
2 | # Copyright (C) 2018-2021 The LineageOS Project
3 | #
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | # Inherit some common Lineage stuff.
8 | $(call inherit-product, vendor/lineage/config/common_full_phone.mk)
9 |
10 | # Inherit device configuration
11 | $(call inherit-product, device/google/crosshatch/aosp_crosshatch.mk)
12 |
13 | include device/google/crosshatch/crosshatch/device-lineage.mk
14 |
15 | # Device identifier. This must come after all inclusions
16 | PRODUCT_BRAND := google
17 | PRODUCT_MODEL := Pixel 3 XL
18 | PRODUCT_NAME := lineage_crosshatch
19 |
20 | # Boot animation
21 | TARGET_SCREEN_HEIGHT := 2960
22 | TARGET_SCREEN_WIDTH := 1440
23 |
24 | PRODUCT_BUILD_PROP_OVERRIDES += \
25 | BuildDesc="crosshatch-user 12 SP1A.210812.016.C2 8618562 release-keys" \
26 | BuildFingerprint=google/crosshatch/crosshatch:12/SP1A.210812.016.C2/8618562:user/release-keys \
27 | DeviceProduct=crosshatch
28 |
29 | $(call inherit-product, vendor/google/crosshatch/crosshatch-vendor.mk)
30 |
--------------------------------------------------------------------------------
/lineage_manifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | vendor.lineage.livedisplay
4 | hwbinder
5 | 2.0
6 |
7 | IPictureAdjustment
8 | default
9 |
10 |
11 |
12 |
--------------------------------------------------------------------------------
/media_codecs.xml:
--------------------------------------------------------------------------------
1 |
2 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
--------------------------------------------------------------------------------
/mixer_paths_tavil_c1.xml:
--------------------------------------------------------------------------------
1 | mixer_paths_tavil_b1.xml
--------------------------------------------------------------------------------
/nfc/com.google.hardware.pixel.japan.xml:
--------------------------------------------------------------------------------
1 |
2 |
16 |
19 |
20 |
21 |
22 |
--------------------------------------------------------------------------------
/nfc/manifest_se_SIM1.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | android.hardware.secure_element
4 | hwbinder
5 | 1.2
6 |
7 | ISecureElement
8 | SIM1
9 |
10 |
11 |
12 |
--------------------------------------------------------------------------------
/nfc/manifest_se_eSE1.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | android.hardware.secure_element
4 | hwbinder
5 | @1.2::ISecureElement/SIM1
6 | @1.1::ISecureElement/eSE1
7 |
8 |
9 | vendor.nxp.nxpese
10 | hwbinder
11 | 1.0
12 |
13 | INxpEse
14 | default
15 |
16 |
17 |
18 |
--------------------------------------------------------------------------------
/overlay-lineage/frameworks/base/packages/SettingsProvider/res/values/defaults.xml:
--------------------------------------------------------------------------------
1 |
2 |
19 |
20 |
21 | 82
22 |
23 | true
24 |
25 |
--------------------------------------------------------------------------------
/overlay-lineage/packages/apps/Dialer/java/com/android/dialer/callrecord/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
17 |
18 | true
19 | 4
20 |
21 |
--------------------------------------------------------------------------------
/overlay-lineage/packages/apps/Settings/res/values/lineage_config.xml:
--------------------------------------------------------------------------------
1 |
2 |
17 |
18 |
19 | true
20 |
21 |
--------------------------------------------------------------------------------
/overlay-lineage/packages/services/Telephony/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
16 |
17 |
19 |
20 |
21 | com.google.android.carrier
22 |
23 |
--------------------------------------------------------------------------------
/overlay/frameworks/base/core/res/res/values/symbols.xml:
--------------------------------------------------------------------------------
1 |
2 |
18 |
19 |
20 |
21 |
--------------------------------------------------------------------------------
/overlay/packages/apps/Settings/res/values-mcc262-mnc01/strings.xml:
--------------------------------------------------------------------------------
1 |
2 |
19 |
20 |
21 | WLAN Call
22 |
23 |
--------------------------------------------------------------------------------
/overlay/packages/apps/Settings/res/values/bools.xml:
--------------------------------------------------------------------------------
1 |
2 |
16 |
17 |
18 |
19 | false
20 |
21 |
--------------------------------------------------------------------------------
/overlay/packages/services/Telecom/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
16 |
17 |
19 |
20 |
21 | false
22 |
23 |
--------------------------------------------------------------------------------
/p2p_supplicant_overlay.conf:
--------------------------------------------------------------------------------
1 | disable_scan_offload=1
2 | p2p_go_vht=1
3 |
--------------------------------------------------------------------------------
/parts/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // Copyright (C) 2021 The LineageOS Project
3 | //
4 | // SPDX-License-Identifier: Apache-2.0
5 | //
6 |
7 | android_app {
8 | name: "GoogleParts",
9 |
10 | srcs: ["src/**/*.java"],
11 | certificate: "platform",
12 | platform_apis: true,
13 | privileged: true,
14 | system_ext_specific: true,
15 |
16 | static_libs: [
17 | "org.lineageos.settings.resources",
18 | ],
19 |
20 | optimize: {
21 | proguard_flags_files: ["proguard.flags"],
22 | },
23 | }
24 |
--------------------------------------------------------------------------------
/parts/proguard.flags:
--------------------------------------------------------------------------------
1 | -keep class org.lineageos.settings.* {
2 | *;
3 | }
4 |
--------------------------------------------------------------------------------
/permissions/com.google.hardware.camera.easel_2018.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
9 |
--------------------------------------------------------------------------------
/powerstats/android.hardware.power.stats@1.0-service.pixel.rc:
--------------------------------------------------------------------------------
1 | service vendor.power.stats-hal-1-0 /vendor/bin/hw/android.hardware.power.stats@1.0-service.pixel
2 | class hal
3 | user system
4 | group system
5 |
--------------------------------------------------------------------------------
/recovery.wipe:
--------------------------------------------------------------------------------
1 | # All the partitions to be wiped (in order) under recovery.
2 | /dev/block/bootdevice/by-name/system_a
3 | /dev/block/bootdevice/by-name/system_b
4 | /dev/block/bootdevice/by-name/product_a
5 | /dev/block/bootdevice/by-name/product_b
6 | /dev/block/bootdevice/by-name/vendor_a
7 | /dev/block/bootdevice/by-name/vendor_b
8 | /dev/block/bootdevice/by-name/userdata
9 | # Wipe the boot partitions last so that all partitions will be wiped
10 | # correctly even if the wiping process gets interrupted by a force boot.
11 | /dev/block/bootdevice/by-name/boot_a
12 | /dev/block/bootdevice/by-name/boot_b
13 |
--------------------------------------------------------------------------------
/rro_overlays/ConnectivityOverlay/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | runtime_resource_overlay {
6 | name: "ConnectivityOverlay",
7 | sdk_version: "current",
8 | product_specific: true
9 | }
10 |
--------------------------------------------------------------------------------
/rro_overlays/WifiOverlay/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | runtime_resource_overlay {
6 | name: "WifiOverlay",
7 | theme: "WifiOverlay",
8 | sdk_version: "current",
9 | product_specific: true
10 | }
11 |
--------------------------------------------------------------------------------
/rro_overlays/WifiOverlay/OWNERS:
--------------------------------------------------------------------------------
1 | # People who can approve changes for submission
2 | etancohen@google.com
3 | arabawy@google.com
4 | kumachang@google.com
5 | satk@google.com
6 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/avtimer.h:
--------------------------------------------------------------------------------
1 | #ifndef _AVTIMER_H
2 | #define _AVTIMER_H
3 |
4 | #include
5 |
6 | #define MAJOR_NUM 100
7 |
8 | #define IOCTL_GET_AVTIMER_TICK _IOR(MAJOR_NUM, 0, uint64_t)
9 |
10 | #endif
11 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm-core-interface.h:
--------------------------------------------------------------------------------
1 | #ifndef __MSM_CORE_LIB_H__
2 | #define __MSM_CORE_LIB_H__
3 |
4 | #include
5 |
6 | #define TEMP_DATA_POINTS 13
7 | #define MAX_NUM_FREQ 200
8 |
9 | enum msm_core_ioctl_params {
10 | MSM_CORE_LEAKAGE,
11 | MSM_CORE_VOLTAGE,
12 | };
13 |
14 | #define MSM_CORE_MAGIC 0x9D
15 |
16 | struct sched_params {
17 | uint32_t cpumask;
18 | uint32_t cluster;
19 | uint32_t power[TEMP_DATA_POINTS][MAX_NUM_FREQ];
20 | uint32_t voltage[MAX_NUM_FREQ];
21 | uint32_t freq[MAX_NUM_FREQ];
22 | };
23 |
24 |
25 | #define EA_LEAKAGE _IOWR(MSM_CORE_MAGIC, MSM_CORE_LEAKAGE,\
26 | struct sched_params)
27 | #define EA_VOLT _IOWR(MSM_CORE_MAGIC, MSM_CORE_VOLTAGE,\
28 | struct sched_params)
29 | #endif
30 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_audio_alac.h:
--------------------------------------------------------------------------------
1 | #ifndef _MSM_AUDIO_ALAC_H
2 | #define _MSM_AUDIO_ALAC_H
3 |
4 | #define AUDIO_GET_ALAC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \
5 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), struct msm_audio_alac_config)
6 | #define AUDIO_SET_ALAC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \
7 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), struct msm_audio_alac_config)
8 |
9 | struct msm_audio_alac_config {
10 | uint32_t frameLength;
11 | uint8_t compatVersion;
12 | uint8_t bitDepth;
13 | uint8_t pb; /* currently unused */
14 | uint8_t mb; /* currently unused */
15 | uint8_t kb; /* currently unused */
16 | uint8_t channelCount;
17 | uint16_t maxRun; /* currently unused */
18 | uint32_t maxSize;
19 | uint32_t averageBitRate;
20 | uint32_t sampleRate;
21 | uint32_t channelLayout;
22 | };
23 |
24 | #endif /* _MSM_AUDIO_ALAC_H */
25 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_audio_amrwb.h:
--------------------------------------------------------------------------------
1 | #ifndef _MSM_AUDIO_AMRWB_H
2 | #define _MSM_AUDIO_AMRWB_H
3 |
4 | #include
5 |
6 | #define AUDIO_GET_AMRWB_ENC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \
7 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), \
8 | struct msm_audio_amrwb_enc_config)
9 | #define AUDIO_SET_AMRWB_ENC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \
10 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), \
11 | struct msm_audio_amrwb_enc_config)
12 |
13 | struct msm_audio_amrwb_enc_config {
14 | uint32_t band_mode;
15 | uint32_t dtx_enable;
16 | uint32_t frame_format;
17 | };
18 | #endif /* _MSM_AUDIO_AMRWB_H */
19 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_audio_amrwbplus.h:
--------------------------------------------------------------------------------
1 | #ifndef _MSM_AUDIO_AMR_WB_PLUS_H
2 | #define _MSM_AUDIO_AMR_WB_PLUS_H
3 |
4 | #define AUDIO_GET_AMRWBPLUS_CONFIG_V2 _IOR(AUDIO_IOCTL_MAGIC, \
5 | (AUDIO_MAX_COMMON_IOCTL_NUM+2), struct msm_audio_amrwbplus_config_v2)
6 | #define AUDIO_SET_AMRWBPLUS_CONFIG_V2 _IOW(AUDIO_IOCTL_MAGIC, \
7 | (AUDIO_MAX_COMMON_IOCTL_NUM+3), struct msm_audio_amrwbplus_config_v2)
8 |
9 | struct msm_audio_amrwbplus_config_v2 {
10 | unsigned int size_bytes;
11 | unsigned int version;
12 | unsigned int num_channels;
13 | unsigned int amr_band_mode;
14 | unsigned int amr_dtx_mode;
15 | unsigned int amr_frame_fmt;
16 | unsigned int amr_lsf_idx;
17 | };
18 | #endif /* _MSM_AUDIO_AMR_WB_PLUS_H */
19 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_audio_ape.h:
--------------------------------------------------------------------------------
1 | /* The following structure has been taken
2 | * from Monkey's Audio SDK with permission
3 | */
4 |
5 | #ifndef _MSM_AUDIO_APE_H
6 | #define _MSM_AUDIO_APE_H
7 |
8 | #define AUDIO_GET_APE_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \
9 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), struct msm_audio_ape_config)
10 | #define AUDIO_SET_APE_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \
11 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), struct msm_audio_ape_config)
12 |
13 | struct msm_audio_ape_config {
14 | uint16_t compatibleVersion;
15 | uint16_t compressionLevel;
16 | uint32_t formatFlags;
17 | uint32_t blocksPerFrame;
18 | uint32_t finalFrameBlocks;
19 | uint32_t totalFrames;
20 | uint16_t bitsPerSample;
21 | uint16_t numChannels;
22 | uint32_t sampleRate;
23 | uint32_t seekTablePresent;
24 | };
25 |
26 | #endif /* _MSM_AUDIO_APE_H */
27 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_audio_qcp.h:
--------------------------------------------------------------------------------
1 | #ifndef _MSM_AUDIO_QCP_H
2 | #define _MSM_AUDIO_QCP_H
3 |
4 | #include
5 |
6 | #define AUDIO_SET_QCELP_ENC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \
7 | 0, struct msm_audio_qcelp_enc_config)
8 |
9 | #define AUDIO_GET_QCELP_ENC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \
10 | 1, struct msm_audio_qcelp_enc_config)
11 |
12 | #define AUDIO_SET_EVRC_ENC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \
13 | 2, struct msm_audio_evrc_enc_config)
14 |
15 | #define AUDIO_GET_EVRC_ENC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \
16 | 3, struct msm_audio_evrc_enc_config)
17 |
18 | #define CDMA_RATE_BLANK 0x00
19 | #define CDMA_RATE_EIGHTH 0x01
20 | #define CDMA_RATE_QUARTER 0x02
21 | #define CDMA_RATE_HALF 0x03
22 | #define CDMA_RATE_FULL 0x04
23 | #define CDMA_RATE_ERASURE 0x05
24 |
25 | struct msm_audio_qcelp_enc_config {
26 | uint32_t cdma_rate;
27 | uint32_t min_bit_rate;
28 | uint32_t max_bit_rate;
29 | };
30 |
31 | struct msm_audio_evrc_enc_config {
32 | uint32_t cdma_rate;
33 | uint32_t min_bit_rate;
34 | uint32_t max_bit_rate;
35 | };
36 |
37 | #endif /* _MSM_AUDIO_QCP_H */
38 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_audio_wmapro.h:
--------------------------------------------------------------------------------
1 | #ifndef _MSM_AUDIO_WMAPRO_H
2 | #define _MSM_AUDIO_WMAPRO_H
3 |
4 | #define AUDIO_GET_WMAPRO_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \
5 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), struct msm_audio_wmapro_config)
6 | #define AUDIO_SET_WMAPRO_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \
7 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), struct msm_audio_wmapro_config)
8 |
9 | struct msm_audio_wmapro_config {
10 | unsigned short armdatareqthr;
11 | uint8_t validbitspersample;
12 | uint8_t numchannels;
13 | unsigned short formattag;
14 | uint32_t samplingrate;
15 | uint32_t avgbytespersecond;
16 | unsigned short asfpacketlength;
17 | uint32_t channelmask;
18 | unsigned short encodeopt;
19 | unsigned short advancedencodeopt;
20 | uint32_t advancedencodeopt2;
21 | };
22 | #endif /* _MSM_AUDIO_WMAPRO_H */
23 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/msm_dsps.h:
--------------------------------------------------------------------------------
1 | #ifndef _DSPS_H_
2 | #define _DSPS_H_
3 |
4 | #include
5 |
6 | #define DSPS_IOCTL_MAGIC 'd'
7 |
8 | #define DSPS_IOCTL_ON _IO(DSPS_IOCTL_MAGIC, 1)
9 | #define DSPS_IOCTL_OFF _IO(DSPS_IOCTL_MAGIC, 2)
10 |
11 | #define DSPS_IOCTL_READ_SLOW_TIMER _IOR(DSPS_IOCTL_MAGIC, 3, unsigned int*)
12 | #define DSPS_IOCTL_READ_FAST_TIMER _IOR(DSPS_IOCTL_MAGIC, 4, unsigned int*)
13 |
14 | #define DSPS_IOCTL_RESET _IO(DSPS_IOCTL_MAGIC, 5)
15 |
16 | #endif /* _DSPS_H_ */
17 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/linux/sockev.h:
--------------------------------------------------------------------------------
1 | #ifndef _SOCKEV_H_
2 | #define _SOCKEV_H_
3 |
4 | #include
5 | #include
6 | #include
7 |
8 | enum sknetlink_groups {
9 | SKNLGRP_UNICAST,
10 | SKNLGRP_SOCKEV,
11 | __SKNLGRP_MAX
12 | };
13 |
14 | #define SOCKEV_STR_MAX 32
15 |
16 | /********************************************************************
17 | * Socket operation messages
18 | ****/
19 |
20 | struct sknlsockevmsg {
21 | __u8 event[SOCKEV_STR_MAX];
22 | __u32 pid; /* (struct task_struct*)->pid */
23 | __u16 skfamily; /* (struct socket*)->sk->sk_family */
24 | __u8 skstate; /* (struct socket*)->sk->sk_state */
25 | __u8 skprotocol; /* (struct socket*)->sk->sk_protocol */
26 | __u16 sktype; /* (struct socket*)->sk->sk_type */
27 | __u64 skflags; /* (struct socket*)->sk->sk_flags */
28 | };
29 |
30 | #endif /* _SOCKEV_H_ */
31 |
32 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/media/cam_cpas.h:
--------------------------------------------------------------------------------
1 | #ifndef __UAPI_CAM_CPAS_H__
2 | #define __UAPI_CAM_CPAS_H__
3 |
4 | #include "cam_defs.h"
5 |
6 | #define CAM_FAMILY_CAMERA_SS 1
7 | #define CAM_FAMILY_CPAS_SS 2
8 |
9 | /**
10 | * struct cam_cpas_query_cap - CPAS query device capability payload
11 | *
12 | * @camera_family : Camera family type
13 | * @reserved : Reserved field for alignment
14 | * @camera_version : Camera platform version
15 | * @cpas_version : Camera CPAS version within camera platform
16 | *
17 | */
18 | struct cam_cpas_query_cap {
19 | uint32_t camera_family;
20 | uint32_t reserved;
21 | struct cam_hw_version camera_version;
22 | struct cam_hw_version cpas_version;
23 | };
24 |
25 | #endif /* __UAPI_CAM_CPAS_H__ */
26 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/media/msm_jpeg_dma.h:
--------------------------------------------------------------------------------
1 | /* Copyright (c) 2015-2016, 2018, The Linux Foundation. All rights reserved.
2 | *
3 | * This program is free software; you can redistribute it and/or modify
4 | * it under the terms of the GNU General Public License version 2 and
5 | * only version 2 as published by the Free Software Foundation.
6 | *
7 | * This program is distributed in the hope that it will be useful,
8 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 | * GNU General Public License for more details.
11 | */
12 |
13 | #ifndef __UAPI_MSM_JPEG_DMA__
14 | #define __UAPI_MSM_JPEG_DMA__
15 |
16 | #include
17 |
18 | /* msm jpeg dma control ID's */
19 | #define V4L2_CID_JPEG_DMA_SPEED (V4L2_CID_PRIVATE_BASE)
20 | #define V4L2_CID_JPEG_DMA_MAX_DOWN_SCALE (V4L2_CID_PRIVATE_BASE + 1)
21 |
22 | /* msm_jpeg_dma_buf */
23 | struct msm_jpeg_dma_buff {
24 | int32_t fd;
25 | uint32_t offset;
26 | };
27 |
28 | #endif /* __UAPI_MSM_JPEG_DMA__ */
29 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/sound/msmcal-hwdep.h:
--------------------------------------------------------------------------------
1 | #ifndef _CALIB_HWDEP_H
2 | #define _CALIB_HWDEP_H
3 |
4 | #define WCD9XXX_CODEC_HWDEP_NODE 1000
5 | enum wcd_cal_type {
6 | WCD9XXX_MIN_CAL,
7 | WCD9XXX_ANC_CAL = WCD9XXX_MIN_CAL,
8 | WCD9XXX_MAD_CAL,
9 | WCD9XXX_MBHC_CAL,
10 | WCD9XXX_VBAT_CAL,
11 | WCD9XXX_MAX_CAL,
12 | };
13 |
14 | struct wcdcal_ioctl_buffer {
15 | __u32 size;
16 | __u8 *buffer;
17 | enum wcd_cal_type cal_type;
18 | };
19 |
20 | #define SNDRV_CTL_IOCTL_HWDEP_CAL_TYPE \
21 | _IOW('U', 0x1, struct wcdcal_ioctl_buffer)
22 |
23 | #endif /*_CALIB_HWDEP_H*/
24 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/sound/voice_params.h:
--------------------------------------------------------------------------------
1 | #ifndef __VOICE_PARAMS_H__
2 | #define __VOICE_PARAMS_H__
3 |
4 | #include
5 | #include
6 |
7 | enum voice_lch_mode {
8 | VOICE_LCH_START = 1,
9 | VOICE_LCH_STOP
10 | };
11 |
12 | #define SNDRV_VOICE_IOCTL_LCH _IOW('U', 0x00, enum voice_lch_mode)
13 |
14 | #endif
15 |
--------------------------------------------------------------------------------
/sdm845/original-kernel-headers/sound/voice_svc.h:
--------------------------------------------------------------------------------
1 | #ifndef __VOICE_SVC_H__
2 | #define __VOICE_SVC_H__
3 |
4 | #include
5 | #include
6 |
7 | #define VOICE_SVC_DRIVER_NAME "voice_svc"
8 |
9 | #define VOICE_SVC_MVM_STR "MVM"
10 | #define VOICE_SVC_CVS_STR "CVS"
11 | #define MAX_APR_SERVICE_NAME_LEN 64
12 |
13 | #define MSG_REGISTER 0x1
14 | #define MSG_REQUEST 0x2
15 | #define MSG_RESPONSE 0x3
16 |
17 | struct voice_svc_write_msg {
18 | __u32 msg_type;
19 | __u8 payload[0];
20 | };
21 |
22 | struct voice_svc_register {
23 | char svc_name[MAX_APR_SERVICE_NAME_LEN];
24 | __u32 src_port;
25 | __u8 reg_flag;
26 | };
27 |
28 | struct voice_svc_cmd_response {
29 | __u32 src_port;
30 | __u32 dest_port;
31 | __u32 token;
32 | __u32 opcode;
33 | __u32 payload_size;
34 | __u8 payload[0];
35 | };
36 |
37 | struct voice_svc_cmd_request {
38 | char svc_name[MAX_APR_SERVICE_NAME_LEN];
39 | __u32 src_port;
40 | __u32 dest_port;
41 | __u32 token;
42 | __u32 opcode;
43 | __u32 payload_size;
44 | __u8 payload[0];
45 | };
46 |
47 | #endif
48 |
--------------------------------------------------------------------------------
/self-extractors/PART1:
--------------------------------------------------------------------------------
1 | #
2 | # Usage is subject to the enclosed license agreement
3 |
4 | echo
5 | echo The license for this software will now be displayed.
6 | echo You must agree to this license before using this software.
7 | echo
8 | echo -n Press Enter to view the license
9 | read dummy
10 | echo
11 |
12 | more << __EOF__
13 |
--------------------------------------------------------------------------------
/self-extractors/PART2:
--------------------------------------------------------------------------------
1 | __EOF__
2 |
3 | if test $? != 0
4 | then
5 | echo ERROR: Couldn\'t display license file 1>&2
6 | exit 1
7 | fi
8 |
9 | echo
10 |
11 | echo -n Type \"I ACCEPT\" if you agree to the terms of the license:\
12 | read typed
13 |
14 | if test "$typed" != I\ ACCEPT
15 | then
16 | echo
17 | echo You didn\'t accept the license. Extraction aborted.
18 | exit 2
19 | fi
20 |
21 | echo
22 |
23 |
--------------------------------------------------------------------------------
/self-extractors/PART3:
--------------------------------------------------------------------------------
1 |
2 | if test $? != 0
3 | then
4 | echo
5 | echo ERROR: Couldn\'t extract files. 1>&2
6 | exit 3
7 | else
8 | echo
9 | echo Files extracted successfully.
10 | fi
11 | exit 0
12 |
13 |
--------------------------------------------------------------------------------
/self-extractors/PROLOGUE:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | #
3 |
--------------------------------------------------------------------------------
/self-extractors/google_devices/COPYRIGHT:
--------------------------------------------------------------------------------
1 | # (C) Google Inc.
2 |
--------------------------------------------------------------------------------
/self-extractors/google_devices/staging/BoardConfigPartial.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | BOARD_PREBUILT_VENDORIMAGE := vendor/google_devices/crosshatch/proprietary/vendor.img
16 |
17 | -include vendor/google/tools/android-info.mk
18 | ifdef USE_ANDROID_INFO
19 | TARGET_BOARD_INFO_FILE := vendor/google_devices/crosshatch/android-info.txt
20 | endif
21 |
22 | AB_OTA_PARTITIONS += \
23 | vendor
24 |
--------------------------------------------------------------------------------
/self-extractors/google_devices/staging/device-partial.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
--------------------------------------------------------------------------------
/self-extractors/qcom/COPYRIGHT:
--------------------------------------------------------------------------------
1 | # (C) Qualcomm Technologies, Inc.
2 |
--------------------------------------------------------------------------------
/self-extractors/qcom/staging/BoardConfigPartial.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | VENDOR_BLOBS_LICENSE := vendor/qcom/crosshatch/LICENSE
16 |
--------------------------------------------------------------------------------
/self-extractors/root/android-info.txt:
--------------------------------------------------------------------------------
1 | require board=crosshatch|blueline
2 | require partition-exists=product
3 |
4 | require version-bootloader=b1c1-0.2-6085603
5 |
6 |
7 | require version-baseband=g845-00096-200114-B-6134206
8 |
--------------------------------------------------------------------------------
/self-extractors/root/proprietary/BoardConfigVendor.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | ifneq ($(filter blueline,$(TARGET_DEVICE)),)
16 | -include vendor/google_devices/blueline/BoardConfigPartial.mk
17 | -include vendor/qcom/blueline/BoardConfigPartial.mk
18 | else
19 | -include vendor/google_devices/crosshatch/BoardConfigPartial.mk
20 | -include vendor/qcom/crosshatch/BoardConfigPartial.mk
21 | endif
22 |
--------------------------------------------------------------------------------
/self-extractors/root/proprietary/device-vendor.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | $(call inherit-product-if-exists, vendor/google_devices/crosshatch/device-partial.mk)
16 | $(call inherit-product-if-exists, vendor/qcom/crosshatch/device-partial.mk)
17 |
--------------------------------------------------------------------------------
/self-extractors_blueline/PART1:
--------------------------------------------------------------------------------
1 | #
2 | # Usage is subject to the enclosed license agreement
3 |
4 | echo
5 | echo The license for this software will now be displayed.
6 | echo You must agree to this license before using this software.
7 | echo
8 | echo -n Press Enter to view the license
9 | read dummy
10 | echo
11 |
12 | more << __EOF__
13 |
--------------------------------------------------------------------------------
/self-extractors_blueline/PART2:
--------------------------------------------------------------------------------
1 | __EOF__
2 |
3 | if test $? != 0
4 | then
5 | echo ERROR: Couldn\'t display license file 1>&2
6 | exit 1
7 | fi
8 |
9 | echo
10 |
11 | echo -n Type \"I ACCEPT\" if you agree to the terms of the license:\
12 | read typed
13 |
14 | if test "$typed" != I\ ACCEPT
15 | then
16 | echo
17 | echo You didn\'t accept the license. Extraction aborted.
18 | exit 2
19 | fi
20 |
21 | echo
22 |
23 |
--------------------------------------------------------------------------------
/self-extractors_blueline/PART3:
--------------------------------------------------------------------------------
1 |
2 | if test $? != 0
3 | then
4 | echo
5 | echo ERROR: Couldn\'t extract files. 1>&2
6 | exit 3
7 | else
8 | echo
9 | echo Files extracted successfully.
10 | fi
11 | exit 0
12 |
13 |
--------------------------------------------------------------------------------
/self-extractors_blueline/PROLOGUE:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | #
3 |
--------------------------------------------------------------------------------
/self-extractors_blueline/google_devices/COPYRIGHT:
--------------------------------------------------------------------------------
1 | # (C) Google Inc.
2 |
--------------------------------------------------------------------------------
/self-extractors_blueline/google_devices/staging/BoardConfigPartial.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | BOARD_PREBUILT_VENDORIMAGE := vendor/google_devices/blueline/proprietary/vendor.img
16 |
17 | -include vendor/google/tools/android-info.mk
18 | ifdef USE_ANDROID_INFO
19 | TARGET_BOARD_INFO_FILE := vendor/google_devices/blueline/android-info.txt
20 | endif
21 |
22 | AB_OTA_PARTITIONS += \
23 | vendor
24 |
--------------------------------------------------------------------------------
/self-extractors_blueline/google_devices/staging/device-partial.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
--------------------------------------------------------------------------------
/self-extractors_blueline/qcom/COPYRIGHT:
--------------------------------------------------------------------------------
1 | # (C) Qualcomm Technologies, Inc.
2 |
--------------------------------------------------------------------------------
/self-extractors_blueline/qcom/staging/BoardConfigPartial.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | VENDOR_BLOBS_LICENSE := vendor/qcom/blueline/LICENSE
16 |
--------------------------------------------------------------------------------
/self-extractors_blueline/root/android-info.txt:
--------------------------------------------------------------------------------
1 | require board=crosshatch|blueline
2 | require partition-exists=product
3 |
4 | require version-bootloader=b1c1-0.1-4768668
5 |
6 |
7 | require version-baseband=g845-00008-180429-B-4752067
8 |
--------------------------------------------------------------------------------
/self-extractors_blueline/root/proprietary/BoardConfigVendor.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | ifneq ($(filter blueline,$(TARGET_DEVICE)),)
16 | -include vendor/google_devices/blueline/BoardConfigPartial.mk
17 | -include vendor/qcom/blueline/BoardConfigPartial.mk
18 | else
19 | -include vendor/google_devices/crosshatch/BoardConfigPartial.mk
20 | -include vendor/qcom/crosshatch/BoardConfigPartial.mk
21 | endif
22 |
--------------------------------------------------------------------------------
/self-extractors_blueline/root/proprietary/device-vendor.mk:
--------------------------------------------------------------------------------
1 | # Copyright 2018 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | $(call inherit-product-if-exists, vendor/google_devices/blueline/device-partial.mk)
16 | $(call inherit-product-if-exists, vendor/qcom/blueline/device-partial.mk)
17 |
--------------------------------------------------------------------------------
/sensors/hals.conf:
--------------------------------------------------------------------------------
1 | sensors.ssc.so
2 |
--------------------------------------------------------------------------------
/sepolicy-lineage/dynamic/hal_lineage_livedisplay_qti.te:
--------------------------------------------------------------------------------
1 | # Do not use add_service() as hal_graphics_composer_default may be the provider as well
2 | allow hal_lineage_livedisplay_qti qdisplay_service:service_manager find;
3 |
4 | binder_call(hal_lineage_livedisplay_qti, hal_graphics_composer_default)
5 |
6 | # Allow LiveDisplay to access vendor display property
7 | get_prop(hal_lineage_livedisplay_qti, vendor_display_prop)
8 |
--------------------------------------------------------------------------------
/sepolicy-lineage/vendor/file_contexts:
--------------------------------------------------------------------------------
1 | # LiveDisplay HAL
2 | /(vendor|system/vendor)/bin/hw/vendor\.lineage\.livedisplay@2\.0-service-sdm u:object_r:hal_lineage_livedisplay_qti_exec:s0
3 |
--------------------------------------------------------------------------------
/sepolicy-lineage/vendor/hal_lineage_livedisplay.te:
--------------------------------------------------------------------------------
1 | type hal_lineage_livedisplay_qti, domain;
2 | hal_server_domain(hal_lineage_livedisplay_qti, hal_lineage_livedisplay)
3 |
4 | type hal_lineage_livedisplay_qti_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_lineage_livedisplay_qti)
6 |
7 | # Allow LiveDisplay HAL's default implementation to use vendor-binder service
8 | vndbinder_use(hal_lineage_livedisplay_qti)
9 |
10 | # Allow LiveDisplay to store files under /data/vendor/display and access them
11 | allow hal_lineage_livedisplay_qti display_vendor_data_file:dir rw_dir_perms;
12 | allow hal_lineage_livedisplay_qti display_vendor_data_file:file create_file_perms;
13 |
--------------------------------------------------------------------------------
/sepolicy/OWNERS:
--------------------------------------------------------------------------------
1 | include platform/system/sepolicy:/OWNERS
2 |
3 | rurumihong@google.com
4 |
--------------------------------------------------------------------------------
/sepolicy/PREUPLOAD.cfg:
--------------------------------------------------------------------------------
1 | [Hook Scripts]
2 | aosp_hook = ${REPO_ROOT}/frameworks/base/tools/aosp/aosp_sha.sh ${PREUPLOAD_COMMIT} "."
3 |
4 |
--------------------------------------------------------------------------------
/sepolicy/private/dataservice_app.te:
--------------------------------------------------------------------------------
1 | typeattribute dataservice_app coredomain;
2 | app_domain(dataservice_app)
3 | net_domain(dataservice_app)
4 |
5 | add_service(dataservice_app, cne_service)
6 | allow dataservice_app {
7 | app_api_service
8 | audioserver_service
9 | radio_service
10 | }:service_manager find;
11 |
12 | allow dataservice_app radio_data_file:dir create_dir_perms;
13 | allow dataservice_app radio_data_file:{ file lnk_file } create_file_perms;
14 |
15 | hwbinder_use(dataservice_app)
16 |
--------------------------------------------------------------------------------
/sepolicy/private/genfs_contexts:
--------------------------------------------------------------------------------
1 | genfscon debugfs /ion/heaps/system u:object_r:debugfs_system_ion_heap:s0
2 |
--------------------------------------------------------------------------------
/sepolicy/private/keys.conf:
--------------------------------------------------------------------------------
1 | [@WFCACTIVATION]
2 | ALL : device/google/crosshatch/sepolicy/private/certs/wfcactivation.x509.pem
3 |
--------------------------------------------------------------------------------
/sepolicy/private/priv_app.te:
--------------------------------------------------------------------------------
1 | dontaudit priv_app sysfs:file read;
2 | dontaudit priv_app zygote:dir search;
3 | dontaudit priv_app mnt_vendor_file:dir search;
4 |
--------------------------------------------------------------------------------
/sepolicy/private/radio.te:
--------------------------------------------------------------------------------
1 | add_service(radio, qchook_service)
2 | add_service(radio, uce_service)
3 |
--------------------------------------------------------------------------------
/sepolicy/private/recovery.te:
--------------------------------------------------------------------------------
1 | recovery_only(`
2 | allow recovery citadel_device:chr_file rw_file_perms;
3 | ')
4 |
--------------------------------------------------------------------------------
/sepolicy/private/service.te:
--------------------------------------------------------------------------------
1 | type cne_service, service_manager_type;
2 | type qchook_service, service_manager_type;
3 |
--------------------------------------------------------------------------------
/sepolicy/private/service_contexts:
--------------------------------------------------------------------------------
1 | qti.ims.ext u:object_r:radio_service:s0
2 | cneservice u:object_r:cne_service:s0
3 | qchook u:object_r:qchook_service:s0
4 |
--------------------------------------------------------------------------------
/sepolicy/private/sprint_hidden_menu.te:
--------------------------------------------------------------------------------
1 | type sprint_hidden_menu, domain, coredomain;
2 |
3 | app_domain(sprint_hidden_menu)
4 | net_domain(sprint_hidden_menu)
5 |
6 | # Services
7 | allow sprint_hidden_menu app_api_service:service_manager find;
8 | allow sprint_hidden_menu qchook_service:service_manager find;
9 | allow sprint_hidden_menu radio_service:service_manager find;
10 |
--------------------------------------------------------------------------------
/sepolicy/private/system_server.te:
--------------------------------------------------------------------------------
1 | # b/139283562: Read /sys/kernel/debug/ion/heaps/system.
2 | allow system_server debugfs_system_ion_heap:file r_file_perms;
3 |
4 | # b/129561352: Access to cpufreq interface for battery saver experiments.
5 | allow system_server sysfs_devices_system_cpu:file w_file_perms;
6 |
--------------------------------------------------------------------------------
/sepolicy/private/toolbox.te:
--------------------------------------------------------------------------------
1 | # b/192320719
2 | dontaudit toolbox virtualizationservice_data_file:dir getattr;
3 | # b/193366323
4 | dontaudit toolbox toolbox:capability dac_override;
5 | dontaudit toolbox toolbox:capability dac_read_search;
6 | dontaudit toolbox toolbox:capability fowner;
7 |
--------------------------------------------------------------------------------
/sepolicy/private/uscc_omadm.te:
--------------------------------------------------------------------------------
1 | type uscc_omadm, domain, coredomain;
2 |
3 | app_domain(uscc_omadm)
4 | net_domain(uscc_omadm)
5 |
6 | # Services
7 | allow uscc_omadm app_api_service:service_manager find;
8 | allow uscc_omadm qchook_service:service_manager find;
9 | allow uscc_omadm radio_service:service_manager find;
--------------------------------------------------------------------------------
/sepolicy/private/vzw_omadm_connmo.te:
--------------------------------------------------------------------------------
1 | type vzw_omadm_connmo, domain, coredomain;
2 |
3 | app_domain(vzw_omadm_connmo)
4 | net_domain(vzw_omadm_connmo)
5 |
6 | # Services
7 | allow vzw_omadm_connmo app_api_service:service_manager find;
8 | allow vzw_omadm_connmo qchook_service:service_manager find;
9 | allow vzw_omadm_connmo radio_service:service_manager find;
--------------------------------------------------------------------------------
/sepolicy/private/vzw_omadm_dcmo.te:
--------------------------------------------------------------------------------
1 | type vzw_omadm_dcmo, domain, coredomain;
2 |
3 | app_domain(vzw_omadm_dcmo)
4 | net_domain(vzw_omadm_dcmo)
5 |
6 | # Services
7 | allow vzw_omadm_dcmo app_api_service:service_manager find;
8 | allow vzw_omadm_dcmo qchook_service:service_manager find;
9 | allow vzw_omadm_dcmo radio_service:service_manager find;
--------------------------------------------------------------------------------
/sepolicy/private/vzw_omadm_diagmon.te:
--------------------------------------------------------------------------------
1 | type vzw_omadm_diagmon, domain, coredomain;
2 |
3 | app_domain(vzw_omadm_diagmon)
4 | net_domain(vzw_omadm_diagmon)
5 |
6 | # Services
7 | allow vzw_omadm_diagmon app_api_service:service_manager find;
8 | allow vzw_omadm_diagmon qchook_service:service_manager find;
9 | allow vzw_omadm_diagmon radio_service:service_manager find;
--------------------------------------------------------------------------------
/sepolicy/private/vzw_omadm_trigger.te:
--------------------------------------------------------------------------------
1 | type vzw_omadm_trigger, domain, coredomain;
2 |
3 | app_domain(vzw_omadm_trigger)
4 | net_domain(vzw_omadm_trigger)
5 |
6 | # Services
7 | allow vzw_omadm_trigger app_api_service:service_manager find;
8 | allow vzw_omadm_trigger qchook_service:service_manager find;
9 | allow vzw_omadm_trigger radio_service:service_manager find;
--------------------------------------------------------------------------------
/sepolicy/private/wfc_activation_app.te:
--------------------------------------------------------------------------------
1 | type wfc_activation_app, domain, coredomain;
2 |
3 | app_domain(wfc_activation_app)
4 | net_domain(wfc_activation_app)
5 |
6 | # Services
7 | allow wfc_activation_app app_api_service:service_manager find;
8 | allow wfc_activation_app qchook_service:service_manager find;
9 | allow wfc_activation_app radio_service:service_manager find;
10 |
--------------------------------------------------------------------------------
/sepolicy/public/charger.te:
--------------------------------------------------------------------------------
1 | allow charger self:capability2 wake_alarm;
2 |
--------------------------------------------------------------------------------
/sepolicy/public/dataservice_app.te:
--------------------------------------------------------------------------------
1 | type dataservice_app, domain;
--------------------------------------------------------------------------------
/sepolicy/public/file.te:
--------------------------------------------------------------------------------
1 | type debugfs_system_ion_heap, fs_type, debugfs_type;
2 |
--------------------------------------------------------------------------------
/sepolicy/public/te_macros:
--------------------------------------------------------------------------------
1 | ###########################################
2 | # dump_hal(hal_type)
3 | # Ability to dump the hal debug info
4 | #
5 | define(`dump_hal', `
6 | hal_client_domain(dumpstate, $1);
7 | allow $1_server dumpstate:fifo_file write;
8 | allow $1_server dumpstate:fd use;
9 | ')
10 |
--------------------------------------------------------------------------------
/sepolicy/system_ext/private/platform_app.te:
--------------------------------------------------------------------------------
1 | # allow systemui to set boot animation colors
2 | set_prop(platform_app, bootanim_system_prop);
3 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/dumpstate.te:
--------------------------------------------------------------------------------
1 | # b/187006097
2 | dontaudit dumpstate incident:process signal;
3 | dontaudit dumpstate incident:process sigkill;
4 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/hal_drm_widevine.te:
--------------------------------------------------------------------------------
1 | # b/178757856
2 | dontaudit hal_drm_widevine firmware_file:dir search ;
3 | dontaudit hal_drm_widevine firmware_file:dir search ;
4 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/hal_dumpstate_impl.te:
--------------------------------------------------------------------------------
1 | # b/178757526
2 | dontaudit hal_dumpstate_impl citadel_updater_exec:file execute_no_trans ;
3 | dontaudit hal_dumpstate_impl citadel_updater_exec:file execute_no_trans ;
4 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/hal_health_default.te:
--------------------------------------------------------------------------------
1 | # b/187005897
2 | dontaudit hal_health_default unlabeled:file write;
3 | dontaudit hal_health_default unlabeled:file read;
4 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/hal_wlc.te:
--------------------------------------------------------------------------------
1 | # b/190690354
2 | dontaudit hal_wlc sysfs_msm_subsys:dir search;
3 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/incidentd.te:
--------------------------------------------------------------------------------
1 | # b/187006058
2 | dontaudit incidentd apex_info_file:file getattr;
3 | dontaudit incidentd sysfs_msm_subsys:dir search;
4 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/kernel.te:
--------------------------------------------------------------------------------
1 | # b/174527233
2 | dontaudit kernel sepolicy_file:file getattr;
3 | dontaudit kernel system_bootstrap_lib_file:file getattr;
4 | dontaudit kernel system_bootstrap_lib_file:dir getattr;
5 |
--------------------------------------------------------------------------------
/sepolicy/tracking_denials/surfaceflinger.te:
--------------------------------------------------------------------------------
1 | # b/178757650
2 | dontaudit surfaceflinger hal_graphics_composer_default:dir search ;
3 | dontaudit surfaceflinger hal_graphics_composer_default:dir search ;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/cbrs_setup.te:
--------------------------------------------------------------------------------
1 | # GoogleCBRS app
2 | type cbrs_setup_app, domain;
3 |
4 | userdebug_or_eng(`
5 | app_domain(cbrs_setup_app)
6 | net_domain(cbrs_setup_app)
7 |
8 | allow cbrs_setup_app app_api_service:service_manager find;
9 | allow cbrs_setup_app cameraserver_service:service_manager find;
10 | allow cbrs_setup_app radio_service:service_manager find;
11 | allow cbrs_setup_app surfaceflinger_service:service_manager find;
12 | set_prop(cbrs_setup_app, radio_prop)
13 | set_prop(cbrs_setup_app, vendor_radio_prop)
14 | ')
15 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/certs/pulse-release.x509.pem:
--------------------------------------------------------------------------------
1 | -----BEGIN CERTIFICATE-----
2 | MIICUjCCAbsCBEk0mH4wDQYJKoZIhvcNAQEEBQAwcDELMAkGA1UEBhMCVVMxCzAJ
3 | BgNVBAgTAkNBMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MRQwEgYDVQQKEwtHb29n
4 | bGUsIEluYzEUMBIGA1UECxMLR29vZ2xlLCBJbmMxEDAOBgNVBAMTB1Vua25vd24w
5 | HhcNMDgxMjAyMDIwNzU4WhcNMzYwNDE5MDIwNzU4WjBwMQswCQYDVQQGEwJVUzEL
6 | MAkGA1UECBMCQ0ExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBgNVBAoTC0dv
7 | b2dsZSwgSW5jMRQwEgYDVQQLEwtHb29nbGUsIEluYzEQMA4GA1UEAxMHVW5rbm93
8 | bjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAn0gDGZD5sUcmOE4EU9GPjAu/
9 | jcd7JQSksSB8TGxEurwArcZhD6a2qy2oDjPy7vFrJqP2uFua+sqQn/u+s/TJT36B
10 | IqeY4OunXO090in6c2X0FRZBWqnBYX3Vg84Zuuigu9iF/BeptL0mQIBRIarbk3fe
11 | tAATOBQYiC7FIoL8WA0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQBAhmae1jHaQ4Td
12 | 0GHSJuBzuYzEuZ34teS+njy+l1Aeg98cb6lZwM5gXE/SrG0chM7eIEdsurGb6PIg
13 | Ov93F61lLY/MiQcI0SFtqERXWSZJ4OnTxLtM9Y2hnbHU/EG8uVhPZOZfQQ0FKf1b
14 | aIOMFB0Km9HbEZHLKg33kOoMsS2zpA==
15 | -----END CERTIFICATE-----
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/citadeld.te:
--------------------------------------------------------------------------------
1 | allow citadeld debugfs_ipc:dir search;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/device.te:
--------------------------------------------------------------------------------
1 | type ramoops_device, dev_type;
2 | type maxfg_device, dev_type;
3 |
4 | # Mark system_block_devices as super partition block devices for retrofit
5 | # dynamic partitions.
6 | typeattribute system_block_device super_block_device_type;
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/fastbootd.te:
--------------------------------------------------------------------------------
1 | recovery_only(`
2 | allow fastbootd ab_block_device:blk_file { w_file_perms ioctl };
3 | allow fastbootd system_block_device:blk_file r_file_perms;
4 |
5 | allow fastbootd boot_block_device:blk_file ioctl;
6 |
7 | allow fastbootd devinfo_block_device:blk_file r_file_perms;
8 | allow fastbootd sysfs_leds:file w_file_perms;
9 | allow fastbootd citadel_device:chr_file rw_file_perms;
10 | userdebug_or_eng(`
11 | allow fastbootd firmware_file:dir { remove_name rmdir search write };
12 | allow fastbootd firmware_file:{ file lnk_file } unlink;
13 | ')
14 | ')
15 |
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/file.te:
--------------------------------------------------------------------------------
1 | type sysfs_pstore, sysfs_type, fs_type;
2 | type ramoops_vendor_data_file, file_type, data_file_type, mlstrustedobject;
3 | type proc_touch, proc_type, fs_type;
4 | type sysfs_display, sysfs_type, fs_type;
5 | type sysfs_pixelstats, sysfs_type, fs_type;
6 | type persist_battery_file, file_type;
7 | type sysfs_chargelevel, sysfs_type, fs_type;
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/fsck.te:
--------------------------------------------------------------------------------
1 | allow fsck persist_block_device:blk_file rw_file_perms;
2 |
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/grilservice_app.te:
--------------------------------------------------------------------------------
1 | type grilservice_app, domain;
2 |
3 | app_domain(grilservice_app)
4 |
5 | allow grilservice_app hal_radioext_hwservice:hwservice_manager find;
6 | allow grilservice_app hal_wifi_ext_hwservice:hwservice_manager find;
7 | allow grilservice_app hal_wifi_ext_service:service_manager find;
8 | allow grilservice_app app_api_service:service_manager find;
9 | allow grilservice_app hal_bluetooth_sar_hwservice:hwservice_manager find;
10 |
11 | binder_call(grilservice_app, hal_radioext_default)
12 | binder_call(grilservice_app, hal_wifi_ext)
13 |
14 | # this denial on grilservice_app since this AudioMetric functionality is not used in legacy device.
15 | dontaudit grilservice_app hal_audiometricext_hwservice:hwservice_manager find;
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_confirmationui.te:
--------------------------------------------------------------------------------
1 | binder_call(hal_confirmationui_server, hal_tui_comm)
2 | binder_call(hal_confirmationui_server, citadeld)
3 | allow hal_confirmationui_server citadeld_service:service_manager find;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_contexthub.te:
--------------------------------------------------------------------------------
1 | # Allow context hub HAL to communicate with daemon via socket
2 | allow hal_contexthub_default chre:unix_stream_socket connectto;
3 | allow hal_contexthub_default chre_socket:sock_file write;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_fingerprint.te:
--------------------------------------------------------------------------------
1 | get_prop(hal_fingerprint_default, hwservicemanager_prop)
2 | allow hal_fingerprint_default fwk_stats_hwservice:hwservice_manager find;
3 | binder_call(hal_fingerprint_default, statsd)
4 |
5 | allow hal_fingerprint input_device:dir r_dir_perms;
6 | allow hal_fingerprint input_device:chr_file r_file_perms;
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_health_storage_default.te:
--------------------------------------------------------------------------------
1 | # Write to /sys/devices/platform/soc/1d84000.ufshc/manual_gc
2 | allow hal_health_storage_default sysfs:dir r_dir_perms;
3 | allow hal_health_storage_default sysfs_scsi_devices_0000:file rw_file_perms;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_keymaster_citadel.te:
--------------------------------------------------------------------------------
1 | get_prop(hal_keymaster_citadel, vendor_tee_listener_prop)
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_usb_gadget_impl.te:
--------------------------------------------------------------------------------
1 | type hal_usb_gadget_impl, domain;
2 | hal_server_domain(hal_usb_gadget_impl, hal_usb)
3 | hal_server_domain(hal_usb_gadget_impl, hal_usb_gadget)
4 |
5 | type hal_usb_gadget_impl_exec, vendor_file_type, exec_type, file_type;
6 | init_daemon_domain(hal_usb_gadget_impl)
7 |
8 | allow hal_usb_gadget_impl configfs:dir { create rmdir };
9 | allow hal_usb_gadget_impl functionfs:dir { watch watch_reads };
10 | set_prop(hal_usb_gadget_impl, vendor_usb_prop)
11 |
12 | allow hal_usb_gadget_impl sysfs_batteryinfo:dir r_dir_perms;
13 | allow hal_usb_gadget_impl sysfs_batteryinfo:file rw_file_perms;
14 | allow hal_usb_gadget_impl sysfs_extcon:dir search;
15 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hal_wifi_ext.te:
--------------------------------------------------------------------------------
1 | type hal_wifi_ext, domain;
2 | hal_server_domain(hal_wifi_ext, hal_wifi)
3 |
4 | type hal_wifi_ext_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_wifi_ext)
6 |
7 | # Allow to start the IWifi:wifi_ext service
8 | add_hwservice(hal_wifi_ext, hal_wifi_ext_hwservice);
9 | add_service(hal_wifi_ext, hal_wifi_ext_service)
10 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hwservice.te:
--------------------------------------------------------------------------------
1 | type hal_wifi_ext_hwservice, hwservice_manager_type, vendor_hwservice_type;
2 | type hal_bluetooth_sar_hwservice, hwservice_manager_type, vendor_hwservice_type;
3 | type hal_audiometricext_hwservice, hwservice_manager_type;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/hwservice_contexts:
--------------------------------------------------------------------------------
1 | vendor.google.wifi_ext::IWifiExt u:object_r:hal_wifi_ext_hwservice:s0
2 |
3 | # BT HAL HWSERVICE
4 | hardware.google.bluetooth.sar::IBluetoothSar u:object_r:hal_bluetooth_sar_hwservice:s0
5 | vendor.google.audiometricext::IAudioMetricExt u:object_r:hal_audiometricext_hwservice:s0
6 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/init-devstart-sh.te:
--------------------------------------------------------------------------------
1 | # ramoops
2 | dontaudit init-qcom-devstart-sh sysfs_pstore:file { getattr };
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/init-fingerprint.te:
--------------------------------------------------------------------------------
1 | type init-fingerprint, domain;
2 | type init-fingerprint_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(init-fingerprint)
5 |
6 | allow init-fingerprint vendor_shell_exec:file rx_file_perms;
7 | allow init-fingerprint vendor_toolbox_exec:file rx_file_perms;
8 |
9 | set_prop(init-fingerprint, vendor_fingerprint_prop)
10 | set_prop(init-fingerprint, ctl_start_prop)
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/init-firstboot.te:
--------------------------------------------------------------------------------
1 | type init-firstboot, domain;
2 | type init-firstboot_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(init-firstboot)
5 |
6 | allow init-firstboot vendor_shell_exec:file rx_file_perms;
7 | allow init-firstboot vendor_toolbox_exec:file rx_file_perms;
8 |
9 | # Read USB connection state
10 | allow init-firstboot sysfs_msm_subsys:dir search;
11 | r_dir_file(init-firstboot, sysfs_batteryinfo)
12 |
13 | # Set property to trigger a shutdown
14 | set_prop(init-firstboot, powerctl_prop)
15 |
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/keys.conf:
--------------------------------------------------------------------------------
1 | [@TANGO]
2 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/tango_release.x509.pem
3 |
4 | # Release builds of Android should not trust development builds of Tango.
5 | # Unfortnately the infrastructure requires a certificate for each build variant,
6 | # so switch to a bogus, unused cert for user builds.
7 | [@TANGO_DEV]
8 | ENG : device/google/crosshatch/sepolicy/vendor/google/certs/tango.x509.pem
9 | USERDEBUG : device/google/crosshatch/sepolicy/vendor/google/certs/tango.x509.pem
10 | USER : device/google/crosshatch/sepolicy/vendor/google/certs/tango_userdev.x509.pem
11 |
12 | [@GOOGLE]
13 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/app.x509.pem
14 |
15 | [@GOOGLEPULSE]
16 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/pulse-release.x509.pem
17 |
18 | [@EASEL]
19 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/easel.x509.pem
20 |
21 | [@MDS]
22 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/com_google_mds.x509.pem
23 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/mediacodec.te:
--------------------------------------------------------------------------------
1 | allow mediacodec self:binder call;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/mediaswcodec.te:
--------------------------------------------------------------------------------
1 | allow mediaswcodec gpu_device:chr_file { ioctl open read write };
2 |
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/modem_diagnostics.te:
--------------------------------------------------------------------------------
1 | # ModemDiagnosticSystem app
2 | type modem_diagnostic_app, domain;
3 |
4 | app_domain(modem_diagnostic_app)
5 | net_domain(modem_diagnostic_app)
6 |
7 | allow modem_diagnostic_app app_api_service:service_manager find;
8 | allow modem_diagnostic_app surfaceflinger_service:service_manager find;
9 | allow modem_diagnostic_app radio_service:service_manager find;
10 |
11 | userdebug_or_eng(`
12 | allow modem_diagnostic_app diag_device:chr_file rw_file_perms;
13 |
14 | allow modem_diagnostic_app sysfs_esim:file r_file_perms;
15 |
16 | allow modem_diagnostic_app ssr_log_file:dir r_dir_perms;
17 | allow modem_diagnostic_app ssr_log_file:file r_file_perms;
18 |
19 | unix_socket_connect(modem_diagnostic_app, diag, qlogd);
20 |
21 | set_prop(modem_diagnostic_app, vendor_modem_diag_prop)
22 | set_prop(modem_diagnostic_app, radio_control_prop)
23 |
24 | allow modem_diagnostic_app sysfs_batteryinfo:file r_file_perms;
25 | allow modem_diagnostic_app sysfs_batteryinfo:dir search;
26 | ')
27 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/modem_svc.te:
--------------------------------------------------------------------------------
1 | type modem_svc, domain;
2 | type modem_svc_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(modem_svc)
5 |
6 | allow modem_svc self:capability net_bind_service;
7 | allow modem_svc self:socket create_socket_perms;
8 | allowxperm modem_svc self:socket ioctl msm_sock_ipc_ioctls;
9 |
10 | # For property service
11 | set_prop(modem_svc, vendor_modem_diag_prop)
12 | set_prop(modem_svc, vendor_modem_prop)
13 | get_prop(modem_svc, vendor_build_type_prop)
14 | get_prop(modem_svc, radio_control_prop)
15 |
16 | # For bugreport collection
17 | allow modem_svc hal_dumpstate_impl:fd use;
18 | allow modem_svc dumpstate:fd use;
19 | allow modem_svc shell_data_file:file write;
20 |
21 | dontaudit modem_svc kernel:system module_request;
22 | dontaudit modem_svc sysfs_msm_subsys:dir search;
23 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/property.te:
--------------------------------------------------------------------------------
1 | vendor_internal_prop(vendor_build_type_prop)
2 | vendor_internal_prop(vendor_modem_prop)
3 | vendor_internal_prop(vendor_ramoops_prop)
4 | vendor_internal_prop(vendor_shutdown_prop)
5 |
6 | # fingerprint
7 | vendor_internal_prop(vendor_fingerprint_prop)
8 |
9 | # hal_health
10 | vendor_internal_prop(vendor_battery_defender_prop)
11 |
12 | # Logger
13 | vendor_internal_prop(vendor_logger_prop)
14 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/ramoops.te:
--------------------------------------------------------------------------------
1 | type ramoops, domain;
2 | type ramoops_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(ramoops);
5 |
6 | # kmod=crypto-gcm(aes)
7 | dontaudit ramoops kernel:system module_request;
8 |
9 | allow ramoops ramoops_exec:file rx_file_perms;
10 | allow ramoops vendor_shell_exec:file rx_file_perms;
11 | allow ramoops vendor_toolbox_exec:file rx_file_perms;
12 |
13 | set_prop(ramoops, vendor_ramoops_prop);
14 |
15 | allow ramoops sysfs_pstore:file rw_file_perms;
16 | allow ramoops ramoops_device:chr_file rw_file_perms;
17 | allow ramoops ramoops_vendor_data_file:file create_file_perms;
18 | allow ramoops ramoops_vendor_data_file:dir rw_dir_perms;
19 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/seapp_contexts:
--------------------------------------------------------------------------------
1 | # Domain for grilservice
2 | user=_app isPrivApp=true name=com.google.android.grilservice domain=grilservice_app levelFrom=all
3 |
4 | # Domain for GoogleCBRS app
5 | user=_app seinfo=platform name=com.google.googlecbrs domain=cbrs_setup_app type=app_data_file levelFrom=user
6 |
7 | # Domain for modem diagnostic system
8 | user=_app seinfo=mds name=com.google.mds domain=modem_diagnostic_app type=app_data_file levelFrom=user
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/service.te:
--------------------------------------------------------------------------------
1 | type hal_wifi_ext_service, service_manager_type, hal_service_type;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/service_contexts:
--------------------------------------------------------------------------------
1 | vendor.google.wifi_ext.IWifiExt/default u:object_r:hal_wifi_ext_service:s0
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/shell.te:
--------------------------------------------------------------------------------
1 | dontaudit shell sysfs_wlc:dir search;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/google/vendor_init.te:
--------------------------------------------------------------------------------
1 | # ro.vendor.build.type
2 | set_prop(vendor_init, vendor_build_type_prop)
3 |
4 | # To allow setting audio.camerasound.force based on
5 | # ro.boot.hardware.radio.subtype at boot
6 | get_prop(vendor_init, vendor_radio_sku_prop)
7 |
8 | # Allow vendor_init to set property of logpersistd_logging_prop
9 | userdebug_or_eng(`
10 | set_prop(vendor_init, logpersistd_logging_prop)
11 | ')
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/adsprpcd.te:
--------------------------------------------------------------------------------
1 | type adsprpcd, domain;
2 | type adsprpcd_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(adsprpcd)
5 |
6 | allow adsprpcd ion_device:chr_file r_file_perms;
7 | allow adsprpcd qdsp_device:chr_file r_file_perms;
8 |
9 | allow adsprpcd system_file:dir r_dir_perms;
10 |
11 | r_dir_file(adsprpcd, adsprpcd_file)
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/app.te:
--------------------------------------------------------------------------------
1 | # For the camera app
2 | get_prop(appdomain, vendor_camera_prop)
3 |
4 | get_prop(appdomain, vendor_display_prop)
5 |
6 | dontaudit appdomain sysfs_msm_subsys:dir search;
7 | dontaudit appdomain sysfs_msm_subsys:file r_file_perms;
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/attributes:
--------------------------------------------------------------------------------
1 | # All types in /mnt/vendor/persist
2 | attribute vendor_persist_type;
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/audioserver.te:
--------------------------------------------------------------------------------
1 | binder_call(audioserver, bootanim)
2 |
3 | allow audioserver sysfs_soc:file r_file_perms;
4 | allow audioserver sysfs_soc:dir search;
5 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/bluetooth.te:
--------------------------------------------------------------------------------
1 | typeattribute bluetooth system_writes_vendor_properties_violators;
2 | set_prop(bluetooth, vendor_bluetooth_prop)
3 |
4 | # Allow access to net_admin ioctls
5 | allowxperm bluetooth self:udp_socket ioctl priv_sock_ioctls;
6 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/bootanim.te:
--------------------------------------------------------------------------------
1 | allow bootanim hwservicemanager:binder call;
2 |
3 | # TODO(b/62954877). On Android Wear, bootanim reads the time
4 | # during boot to display. It currently gets that time from a file
5 | # in /data/system. This should be moved. In the meantime, suppress
6 | # this denial on phones since this functionality is not used.
7 | dontaudit bootanim system_data_file:dir read;
8 |
9 | # TODO(b/37205419): Remove upon resolution
10 | dontaudit bootanim kernel:system module_request;
11 |
12 | get_prop(bootanim, vendor_display_prop)
13 |
14 | dontaudit bootanim sysfs_msm_subsys:dir search;
15 | dontaudit bootanim sysfs_msm_subsys:file r_file_perms;
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/cameraserver.te:
--------------------------------------------------------------------------------
1 | allow cameraserver gpu_device:chr_file rw_file_perms;
2 |
3 | typeattribute cameraserver system_writes_vendor_properties_violators;
4 | get_prop(cameraserver, vendor_camera_prop)
5 |
6 | allow cameraserver sysfs_camera:file r_file_perms;
7 | allow cameraserver sysfs_camera:dir search;
8 |
9 | allow cameraserver system_server:unix_stream_socket { read write };
10 |
11 | binder_call(cameraserver, mediacodec)
12 |
13 | dontaudit cameraserver vendor_display_prop:file r_file_perms;
14 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/cdsprpcd.te:
--------------------------------------------------------------------------------
1 | # cdsprpcd daemon
2 | type cdsprpcd, domain;
3 | type cdsprpcd_exec, exec_type, vendor_file_type, file_type;
4 |
5 | # Started by init
6 | init_daemon_domain(cdsprpcd)
7 |
8 | # For reading dir/files on /dsp
9 | r_dir_file(cdsprpcd, adsprpcd_file)
10 |
11 | allow cdsprpcd qdsp_device:chr_file r_file_perms;
12 | allow cdsprpcd ion_device:chr_file r_file_perms;
13 |
14 | r_dir_file(cdsprpcd, sysfs_devfreq)
15 | allow cdsprpcd sysfs_devfreq_l3cdsp:dir r_dir_perms;
16 | allow cdsprpcd sysfs_devfreq_l3cdsp:file rw_file_perms;
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/chre.te:
--------------------------------------------------------------------------------
1 | # This daemon loads the Context Hub Runtime Environment (CHRE) dynamic modules
2 | # onto the SLPI using FastRPC, and exposes a sockets interface for clients on
3 | # the applications processor to interact CHRE
4 | type chre, domain;
5 | type chre_exec, exec_type, vendor_file_type, file_type;
6 |
7 | init_daemon_domain(chre)
8 |
9 | allow chre system_file:dir read;
10 |
11 | allow chre ion_device:chr_file r_file_perms;
12 | allow chre qdsp_device:chr_file r_file_perms;
13 | allow chre dsp_device:chr_file r_file_perms;
14 |
15 | r_dir_file(chre, adsprpcd_file)
16 |
17 | # Allow CHRE to obtain wakelock
18 | wakelock_use(chre)
19 |
20 | # To communicate with ST HAL
21 | hal_client_domain(chre, hal_audio)
22 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/con_monitor.te:
--------------------------------------------------------------------------------
1 | # ConnectivityMonitor app
2 | type con_monitor_app, domain, coredomain;
3 |
4 | app_domain(con_monitor_app)
5 |
6 | set_prop(con_monitor_app, radio_prop)
7 | userdebug_or_eng(`set_prop(con_monitor_app, dumpstate_options_prop)')
8 | allow con_monitor_app app_api_service:service_manager find;
9 | allow con_monitor_app radio_vendor_data_file:dir rw_dir_perms;
10 | allow con_monitor_app radio_vendor_data_file:file create_file_perms;
11 | allow con_monitor_app radio_service:service_manager find;
12 | allow con_monitor_app audioserver_service:service_manager find;
13 | hal_client_domain(con_monitor_app, hal_power_stats);
14 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/dataservice_app.te:
--------------------------------------------------------------------------------
1 | get_prop(dataservice_app, cnd_prop)
2 |
3 | r_dir_file(dataservice_app, sysfs_msm_subsys)
4 |
5 | allow dataservice_app hal_imsrcsd_hwservice:hwservice_manager find;
6 |
7 | binder_call(dataservice_app, cnd)
8 |
9 | # imsrcsd to bind with UceShimService.apk
10 | binder_call(dataservice_app, hal_rcsservice)
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/device.te:
--------------------------------------------------------------------------------
1 | type ab_block_device, dev_type;
2 | type at_device, dev_type;
3 | type avtimer_device, dev_type;
4 | type devinfo_block_device, dev_type;
5 | type diag_device, dev_type, mlstrustedobject;
6 | type dsp_device, dev_type;
7 | type easel_device, dev_type, mlstrustedobject;
8 | type gpt_block_device, dev_type;
9 | type ipa_dev, dev_type;
10 | type modem_block_device, dev_type;
11 | type persist_block_device, dev_type;
12 | type qsee_ipc_irq_spss_device, dev_type;
13 | type qdsp_device, dev_type, mlstrustedobject;
14 | type ramdump_device, dev_type;
15 | type rmnet_device, dev_type;
16 | type seemplog_device, dev_type;
17 | type sg_device, dev_type;
18 | type smd_device, dev_type;
19 | type spcom_device, dev_type;
20 | type ssd_block_device, dev_type;
21 | type ssr_device, dev_type;
22 | type wlan_device, dev_type;
23 | type xbl_block_device, dev_type;
24 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/domain.te:
--------------------------------------------------------------------------------
1 | # In order for /sys/kernel/debug/kgsl/proc//mem
2 | # to be created for memory tracking, the domain of
3 | # the tracked process must have permission to search
4 | # in /sys/kernel/debug/kgsl
5 | allow domain debugfs_kgsl:dir search;
6 |
7 | allow domain debugfs_ion:dir search;
8 |
9 | get_prop(domain, public_vendor_default_prop)
10 | get_prop(domain, vendor_radio_prop)
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/dumpstate.te:
--------------------------------------------------------------------------------
1 | dump_hal(hal_telephony)
2 | dump_hal(hal_thermal)
3 | dump_hal(hal_power)
4 | dump_hal(hal_power_stats)
5 |
6 | userdebug_or_eng(`
7 | allow dumpstate debugfs_dma_bufinfo:file r_file_perms;
8 | allow dumpstate proc_modules:file r_file_perms;
9 | allow dumpstate proc_stat:file r_file_perms;
10 | allow dumpstate persist_file:dir r_dir_perms;
11 | allow dumpstate sysfs_leds:dir search;
12 | allow dumpstate system_block_device:blk_file r_file_perms;
13 | allow dumpstate media_rw_data_file:file append;
14 |
15 | dontaudit dumpstate self:netlink_xfrm_socket create_socket_perms_no_ioctl;
16 |
17 | binder_call(dumpstate, per_mgr)
18 | ')
19 |
20 | # For collecting bugreports.
21 | allow dumpstate sysfs_scsi_devices_0000:file r_file_perms;
22 | allow dumpstate sysfs_scsi_devices_other:file r_file_perms;
23 |
24 | dontaudit dumpstate debugfs_dma_bufinfo:file r_file_perms;
25 | dontaudit dumpstate kernel:system module_request;
26 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/easel.te:
--------------------------------------------------------------------------------
1 | # easel service
2 | type easel, domain;
3 | type easel_exec, exec_type, vendor_file_type, file_type;
4 |
5 | init_daemon_domain(easel)
6 |
7 | hwbinder_use(easel)
8 | add_hwservice(easel, hal_paintbox_hwservice)
9 | get_prop(easel, hwservicemanager_prop)
10 |
11 | # access easel dev nodes
12 | allow easel easel_device:chr_file rw_file_perms;
13 | allow easel sysfs_easel:file rw_file_perms;
14 | allow easel sysfs_easel:dir r_dir_perms;
15 |
16 | # access easel thermal sysfs
17 | allow easel sysfs_thermal:dir r_dir_perms;
18 | allow easel sysfs_thermal:file r_file_perms;
19 | allow easel sysfs_thermal:lnk_file r_file_perms;
20 |
21 | # access "/proc/stat"
22 | allow easel proc_stat:file r_file_perms;
23 |
24 | allow easel google_camera_app:binder call;
25 | allow easel hal_camera_default:binder call;
26 | allow easel hal_neuralnetworks_paintbox:binder call;
27 |
28 | allow easel hal_graphics_allocator_default:fd use;
29 | allow easel ion_device:chr_file r_file_perms;
30 |
31 | # access to keychain for kernel based authentication
32 | allow easel kernel:key search;
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/easelservice_app.te:
--------------------------------------------------------------------------------
1 | type easelservice_app, domain;
2 |
3 | app_domain(easelservice_app)
4 |
5 | allow easelservice_app app_api_service:service_manager find;
6 | allow easelservice_app surfaceflinger_service:service_manager find;
7 | # Access to mnh_sm driver
8 | allow easelservice_app easel_device:chr_file { read write ioctl open };
9 | # Access to libeaselmanager_client.so
10 | allow easelservice_app hal_paintbox_hwservice:hwservice_manager find;
11 | binder_call(easelservice_app, easel)
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/fsck.te:
--------------------------------------------------------------------------------
1 | allow fsck proc_version:file r_file_perms;
2 | allow fsck sysfs_dm:dir search;
3 | allow fsck sysfs_dm:file r_file_perms;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ftmd.te:
--------------------------------------------------------------------------------
1 | type ftmd, domain;
2 | type ftmd_exec, exec_type, vendor_file_type, file_type;
3 |
4 | userdebug_or_eng(`
5 | # make transition from init to its domain
6 | init_daemon_domain(ftmd)
7 | ')
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_audio_default.te:
--------------------------------------------------------------------------------
1 | r_dir_file(hal_audio_default, sysfs_soc)
2 |
3 | hal_client_domain(hal_audio_default, hal_power)
4 |
5 | userdebug_or_eng(`
6 | allow hal_audio diag_device:chr_file rw_file_perms;
7 | ')
8 |
9 | # read-only permission to obtain the calibration data
10 | r_dir_file(hal_audio_default, persist_audio_file);
11 | allow hal_audio_default mnt_vendor_file:dir search;
12 | allow hal_audio_default persist_file:dir search;
13 |
14 | allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms;
15 | allow hal_audio_default audio_vendor_data_file:file create_file_perms;
16 |
17 | # For interfacing with PowerHAL
18 | hal_client_domain(hal_audio_default, hal_power)
19 |
20 | # Allow hal to take wakelock
21 | wakelock_use(hal_audio_default)
22 |
23 | # read-only permission to obtain the soc data
24 | get_prop(hal_audio_default, vendor_bluetooth_prop)
25 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_bluetooth_default.te:
--------------------------------------------------------------------------------
1 | allow hal_bluetooth_default bt_device:chr_file rw_file_perms;
2 |
3 | # talk to system_server to set priority
4 | allow hal_bluetooth fwk_scheduler_hwservice:hwservice_manager find;
5 | allow hal_bluetooth system_server:binder call;
6 |
7 | set_prop(hal_bluetooth_default, vendor_bluetooth_prop)
8 |
9 | userdebug_or_eng(`
10 | allow hal_bluetooth_default diag_device:chr_file rw_file_perms;
11 | allow hal_bluetooth_default ramdump_vendor_data_file:dir rw_dir_perms;
12 | allow hal_bluetooth_default ramdump_vendor_data_file:file { create rw_file_perms };
13 | allow hal_bluetooth_default sysfs_timestamp_switch:file r_file_perms;
14 | r_dir_file(hal_bluetooth_default, debugfs_ipc)
15 | r_dir_file(hal_bluetooth_default, sysfs_diag)
16 | set_prop(hal_bluetooth_default, vendor_ssr_prop)
17 | ')
18 |
19 | dontaudit hal_bluetooth_default diag_device:chr_file rw_file_perms;
20 | dontaudit hal_bluetooth_default kernel:system module_request;
21 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_cas_default.te:
--------------------------------------------------------------------------------
1 | # Allow CAS HAL to use vendor-binder service
2 | vndbinder_use(hal_cas_default);
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_drm_default.te:
--------------------------------------------------------------------------------
1 | allow hal_drm_default vndbinder_device:chr_file rw_file_perms;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_drm_widevine.te:
--------------------------------------------------------------------------------
1 | type hal_drm_widevine, domain;
2 | type hal_drm_widevine_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(hal_drm_widevine)
5 |
6 | hal_server_domain(hal_drm_widevine, hal_drm)
7 |
8 | vndbinder_use(hal_drm_widevine);
9 |
10 | allow hal_drm mediacodec:fd use;
11 | allow hal_drm { appdomain -isolated_app_all }:fd use;
12 |
13 | allow hal_drm_widevine hal_allocator_server:fd use;
14 |
15 | allow hal_drm_widevine mediadrm_vendor_data_file:dir create_dir_perms;
16 | allow hal_drm_widevine mediadrm_vendor_data_file:file create_file_perms;
17 | allow hal_drm_widevine hal_display_config_hwservice:hwservice_manager find;
18 | binder_call(hal_drm_widevine, hal_graphics_composer_default)
19 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_fingerprint.te:
--------------------------------------------------------------------------------
1 | allow hal_fingerprint sysfs_fingerprint:dir r_dir_perms;
2 | allow hal_fingerprint sysfs_fingerprint:file rw_file_perms;
3 | allow hal_fingerprint sysfs_msm_subsys:dir search;
4 | allow hal_fingerprint sysfs_msm_subsys:file r_file_perms;
5 | allow hal_fingerprint sysfs_camera:dir search;
6 | allow hal_fingerprint sysfs_camera:file r_file_perms;
7 | allow hal_fingerprint sysfs_leds:dir search;
8 | allow { hal_fingerprint -coredomain } sysfs_leds:file r_file_perms;
9 | allow hal_fingerprint sysfs_pinctrl:dir search;
10 | allow hal_fingerprint sysfs_pinctrl:file r_file_perms;
11 |
12 | allow hal_fingerprint tee_device:file rw_file_perms;
13 | allow { hal_fingerprint -coredomain } tee_device:chr_file rw_file_perms;
14 | allow hal_fingerprint uhid_device:chr_file rw_file_perms;
15 |
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_gatekeeper.te:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/sepolicy/vendor/qcom/common/hal_gatekeeper.te
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_gatekeeper_qti.te:
--------------------------------------------------------------------------------
1 | type hal_gatekeeper_qti, domain;
2 | hal_server_domain(hal_gatekeeper_qti, hal_gatekeeper)
3 |
4 | type hal_gatekeeper_qti_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_gatekeeper_qti)
6 |
7 | get_prop(hal_gatekeeper_qti, vendor_tee_listener_prop)
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_graphics_allocator_default.te:
--------------------------------------------------------------------------------
1 | dontaudit hal_graphics_allocator_default vendor_display_prop:file r_file_perms;
2 |
3 | dontaudit hal_graphics_allocator_default sysfs_msm_subsys:dir search;
4 | dontaudit hal_graphics_allocator_default sysfs_msm_subsys:file r_file_perms;
5 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_health_default.te:
--------------------------------------------------------------------------------
1 | r_dir_file(hal_health_default, sysfs_usb_c)
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_keymaster_qti.te:
--------------------------------------------------------------------------------
1 | type hal_keymaster_qti, domain;
2 | hal_server_domain(hal_keymaster_qti, hal_keymaster)
3 |
4 | type hal_keymaster_qti_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_keymaster_qti)
6 |
7 | get_prop(hal_keymaster_qti, vendor_tee_listener_prop)
8 | get_prop(hal_keymaster_qti, vendor_security_patch_level_prop)
9 |
10 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_light.te:
--------------------------------------------------------------------------------
1 | allow hal_light sysfs_graphics:dir search;
2 | allow hal_light sysfs_graphics:file rw_file_perms;
3 | allow hal_light sysfs_lights:dir search;
4 | allow hal_light sysfs_lights:file rw_file_perms;
5 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_light_default.te:
--------------------------------------------------------------------------------
1 | allow hal_light_default sysfs_msm_subsys:dir search;
2 |
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_lineage_health_default.te:
--------------------------------------------------------------------------------
1 | allow hal_lineage_health_default sysfs_msm_subsys:dir search;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_memtrack_default.te:
--------------------------------------------------------------------------------
1 | allow hal_memtrack_default sysfs_kgsl_proc:file r_file_perms;
2 | allow hal_memtrack_default sysfs_kgsl_proc:dir search;
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_neuralnetworks_paintbox.te:
--------------------------------------------------------------------------------
1 | type hal_neuralnetworks_paintbox, domain;
2 | hal_server_domain(hal_neuralnetworks_paintbox, hal_neuralnetworks)
3 |
4 | type hal_neuralnetworks_paintbox_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_neuralnetworks_paintbox)
6 |
7 | allow hal_neuralnetworks_paintbox hal_paintbox_hwservice:hwservice_manager find;
8 |
9 | allow hal_neuralnetworks_paintbox proc_stat:file r_file_perms;
10 | allow hal_neuralnetworks_paintbox easel_device:chr_file rw_file_perms;
11 |
12 | binder_call(hal_neuralnetworks_paintbox, easel)
13 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_nfc_default.te:
--------------------------------------------------------------------------------
1 | # Data file accesses.
2 | allow hal_nfc_default nfc_vendor_data_file:dir create_dir_perms;
3 | allow hal_nfc_default nfc_vendor_data_file:file create_file_perms;
4 |
5 | allow hal_nfc_default hal_secure_element_default:binder call;
6 |
7 | allow hal_nfc_default nxpese_hwservice:hwservice_manager find;
8 | add_hwservice(hal_nfc_default, nxpnfc_hwservice)
9 | get_prop(hal_nfc_default, vendor_nfc_prop)
10 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_power_default.te:
--------------------------------------------------------------------------------
1 | allow hal_power_default sysfs_graphics:dir search;
2 | allow hal_power_default sysfs_graphics:file r_file_perms;
3 |
4 | # To do powerhint on nodes defined in powerhint.json
5 | allow hal_power_default sysfs_msm_subsys:dir search;
6 | allow hal_power_default sysfs_msm_subsys:file rw_file_perms;
7 | allow hal_power_default cgroup:dir search;
8 | allow hal_power_default cgroup:file rw_file_perms;
9 | allow hal_power_default debugfs_sched_features:file rw_file_perms;
10 | allow hal_power_default proc_sysctl_schedboost:file rw_file_perms;
11 |
12 | # Allow power hal to talk to mm-pp-daemon to control display lpm
13 | allow hal_power_default mm-pp-daemon:unix_stream_socket connectto;
14 | allow hal_power_default pps_socket:sock_file write;
15 |
16 | # interact with thermal_config
17 | set_prop(hal_power_default, vendor_thermal_prop)
18 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_power_stats_default.te:
--------------------------------------------------------------------------------
1 | # Allow power.stats hal to read from the following
2 | r_dir_file(hal_power_stats, sysfs_rpm)
3 | r_dir_file(hal_power_stats, sysfs_system_sleep_stats)
4 | r_dir_file(hal_power_stats, debugfs_wlan)
5 | r_dir_file(hal_power_stats, sysfs_easel)
6 | get_prop(hal_power_stats_default, wifi_hal_prop) # Needed to detect wifi on/off
7 |
8 | binder_call(hal_power_stats, citadeld)
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_secure_element_default.te:
--------------------------------------------------------------------------------
1 | hal_client_domain(hal_secure_element_default, hal_nfc)
2 |
3 | get_prop(hal_secure_element, vendor_secure_element_prop)
4 | allow hal_secure_element_default nxpnfc_hwservice:hwservice_manager find;
5 | add_hwservice(hal_secure_element_default, nxpese_hwservice)
6 |
7 | allow hal_secure_element_default secure_element_vendor_data_file:dir create_dir_perms;
8 | allow hal_secure_element_default secure_element_vendor_data_file:file create_file_perms;
9 |
10 | allow hal_secure_element_default sysfs_devicetree_ese:file r_file_perms;
11 | allow hal_secure_element_default debugfs_ipc:dir search;
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_telephony.te:
--------------------------------------------------------------------------------
1 | set_prop(hal_telephony_server, vendor_radio_prop)
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_tetheroffload_default.te:
--------------------------------------------------------------------------------
1 | # associate netdomain to use for accessing internet sockets
2 | net_domain(hal_tetheroffload_default)
3 |
4 | userdebug_or_eng(`
5 | # Allow using the logging file between ipacm and ipacm-diag
6 | unix_socket_send(hal_tetheroffload_default, ipacm, hal_tetheroffload_default)
7 | ')
8 | # Allow operations with /dev/ipa, /dev/wwan_ioctl and /dev/ipaNatTable
9 | allow hal_tetheroffload_default ipa_dev:chr_file rw_file_perms;
10 |
11 | # Allow receiving NETLINK messages
12 | allow hal_tetheroffload_default self:{
13 | netlink_socket
14 | netlink_generic_socket
15 | } create_socket_perms_no_ioctl;
16 |
17 | # Allow creating and modifying the PID file
18 | allow hal_tetheroffload_default ipa_vendor_data_file:dir w_dir_perms;
19 | allow hal_tetheroffload_default ipa_vendor_data_file:file create_file_perms;
20 |
21 | # Register to hwbinder service
22 | hwbinder_use(hal_tetheroffload_default)
23 | get_prop(hal_tetheroffload_default, hwservicemanager_prop)
24 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_tui_comm.te:
--------------------------------------------------------------------------------
1 | type hal_tui_comm, domain;
2 | type hal_tui_comm_exec, file_type, vendor_file_type, exec_type;
3 |
4 | init_daemon_domain(hal_tui_comm);
5 |
6 | get_prop(hal_tui_comm, hwservicemanager_prop)
7 |
8 | add_hwservice(hal_tui_comm, hal_tui_comm_hwservice)
9 | hwbinder_use(hal_tui_comm)
10 |
11 | binder_call(hal_tui_comm, secure_ui_service_app)
12 | binder_call(hal_tui_comm, hal_confirmationui_default)
13 | binder_call(hal_tui_comm, tee)
14 |
15 | allow hal_tui_comm hal_graphics_allocator_default:fd use;
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_usb_impl.te:
--------------------------------------------------------------------------------
1 | type hal_usb_impl, domain;
2 | hal_server_domain(hal_usb_impl, hal_usb)
3 | hal_server_domain(hal_usb_impl, hal_usb_gadget)
4 |
5 | type hal_usb_impl_exec, exec_type, vendor_file_type, file_type;
6 | init_daemon_domain(hal_usb_impl)
7 |
8 | allow hal_usb_impl sysfs_msm_subsys:dir search;
9 | allow hal_usb_impl sysfs_msm_subsys:file r_file_perms;
10 | r_dir_file(hal_usb_impl, sysfs_usb_c)
11 | allow hal_usb_impl sysfs_usb_c:file w_file_perms;
12 | allow hal_usb_impl sysfs_usb_device:dir r_dir_perms;
13 | allow hal_usb_impl sysfs_usb_device:file rw_file_perms;
14 | allow hal_usb_impl configfs:file create_file_perms;
15 |
16 | set_prop(hal_usb_impl, vendor_usb_config_prop)
17 | get_prop(hal_usb_impl, vendor_usb_prop)
18 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_vibrator_default.te:
--------------------------------------------------------------------------------
1 | r_dir_file(hal_vibrator_default, sysfs_leds)
2 | allow hal_vibrator_default sysfs_leds:file w_file_perms;
3 | allow hal_vibrator_default sysfs_msm_subsys:file rw_file_perms;
4 | allow hal_vibrator_default sysfs_msm_subsys:dir search;
5 |
6 | # read-only permission to obtain the calibration data
7 | r_dir_file(hal_vibrator_default, persist_haptics_file)
8 | allow hal_vibrator_default mnt_vendor_file:dir search;
9 | allow hal_vibrator_default persist_file:dir search;
10 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_wifi_default.te:
--------------------------------------------------------------------------------
1 | # Allow wifi hal access to LOWI
2 | allow hal_wifi_default location:unix_stream_socket connectto;
3 |
4 | # write to files owned by location daemon
5 | allow hal_wifi_default location_socket:dir search;
6 | allow hal_wifi_default location_socket:sock_file write;
7 | allow hal_wifi_default location_data_file:{ file fifo_file } create_file_perms;
8 |
9 | allow hal_wifi_default wlan_device:chr_file w_file_perms;
10 |
11 | # Allow wifi hal to read debug info from the driver.
12 | r_dir_file(hal_wifi_default, proc_wifi_dbg)
13 |
14 | # Write wlan driver/fw version into property
15 | set_prop(hal_wifi_default, vendor_wifi_version)
16 |
17 | dontaudit hal_wifi_default kernel:system module_request;
18 | dontaudit hal_wifi_default self:capability sys_module;
19 |
20 | userdebug_or_eng(`
21 | # debugfs entries are only needed in user-debug or eng builds
22 |
23 | # Allow wifi hal to access wlan debugfs files and directories
24 | allow hal_wifi_default debugfs_wlan:dir r_dir_perms;
25 | ')
26 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_wifi_ext.te:
--------------------------------------------------------------------------------
1 | # Allow wifi hal access to LOWI
2 | allow hal_wifi_ext location:unix_stream_socket connectto;
3 |
4 | # write to files owned by location daemon
5 | allow hal_wifi_ext location_socket:dir search;
6 | allow hal_wifi_ext location_socket:sock_file write;
7 | allow hal_wifi_ext location_data_file:{ file fifo_file } create_file_perms;
8 |
9 | allow hal_wifi_ext wlan_device:chr_file rw_file_perms;
10 |
11 | # Allow wifi hal to read debug info from the driver.
12 | r_dir_file(hal_wifi_ext, proc_wifi_dbg)
13 |
14 | # Write wlan driver/fw version into property
15 | set_prop(hal_wifi_ext, vendor_wifi_version)
16 |
17 | # Allow wifi_ext to report callbacks to gril-service app
18 | allow hal_wifi_ext grilservice_app:binder call;
19 |
20 | dontaudit hal_wifi_ext kernel:system module_request;
21 | dontaudit hal_wifi_ext self:capability sys_module;
22 |
23 | userdebug_or_eng(`
24 | # debugfs entries are only needed in user-debug or eng builds
25 |
26 | # Allow wifi hal to access wlan debugfs files and directories
27 | allow hal_wifi_ext debugfs_wlan:dir r_dir_perms;
28 | ')
29 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_wifi_hostapd.te:
--------------------------------------------------------------------------------
1 | userdebug_or_eng(`
2 | allow hal_wifi_hostapd wifi_vendor_log_data_file:dir search;
3 | ')
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_wifi_supplicant_default.te:
--------------------------------------------------------------------------------
1 | allow hal_wifi_supplicant_default self:socket create_socket_perms;
2 | # ioctlcmd=c304, c302
3 | allowxperm hal_wifi_supplicant_default self:socket ioctl msm_sock_ipc_ioctls;
4 |
5 | allow hal_wifi_supplicant_default cnd:unix_dgram_socket sendto;
6 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/hal_wlc.te:
--------------------------------------------------------------------------------
1 | type hal_wlc, domain;
2 | type hal_wlc_exec, exec_type, vendor_file_type, file_type;
3 |
4 | hwbinder_use(hal_wlc)
5 | add_hwservice(hal_wlc, hal_wlc_hwservice)
6 | get_prop(hal_wlc, hwservicemanager_prop)
7 |
8 | init_daemon_domain(hal_wlc)
9 |
10 | # Allow access to /sys/class/power_supply/wireless
11 | r_dir_file(hal_wlc, sysfs_batteryinfo)
12 |
13 | # Allow access to /sys/devices/platform/soc/a88000.i2c/i2c-0/0-0061
14 | r_dir_file(hal_wlc, sysfs_wlc)
15 | allow hal_wlc sysfs_wlc:file rw_file_perms;
16 |
17 | allow hal_wlc self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
18 |
19 | binder_call(hal_wlc, platform_app)
20 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/healthd.te:
--------------------------------------------------------------------------------
1 | allow healthd self:global_capability2_class_set wake_alarm;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/init-insmod-sh.te:
--------------------------------------------------------------------------------
1 | type init-insmod-sh, domain;
2 | type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(init-insmod-sh)
5 |
6 | allow init-insmod-sh vendor_shell_exec:file rx_file_perms;
7 | allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms;
8 |
9 | # Set the vendor.all.modules.ready property
10 | set_prop(init-insmod-sh, vendor_device_prop)
11 |
12 | # Allow insmod
13 | allow init-insmod-sh self:capability sys_module;
14 | allow init-insmod-sh system_file:system module_load;
15 |
16 | allow init-insmod-sh vendor_file:system module_load;
17 |
18 | allow init-insmod-sh kernel:key search;
19 |
20 | # Caused by insmod wlan.ko.
21 | dontaudit init-insmod-sh debugfs_wlan:dir search;
22 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/init-ipastart-sh.te:
--------------------------------------------------------------------------------
1 | type init-qcom-ipastart-sh, domain;
2 | type init-qcom-ipastart-sh_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(init-qcom-ipastart-sh)
5 |
6 | allow init-qcom-ipastart-sh vendor_shell_exec:file rx_file_perms;
7 | allow init-qcom-ipastart-sh vendor_toolbox_exec:file rx_file_perms;
8 |
9 | # Set /dev/ipa to 1
10 | allow init-qcom-ipastart-sh ipa_dev:chr_file w_file_perms;
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/init.te:
--------------------------------------------------------------------------------
1 | allow init configfs:lnk_file create;
2 |
3 | allow init configfs:file w_file_perms;
4 | allow init debugfs_clk:file w_file_perms;
5 |
6 | allow init tty_device:chr_file rw_file_perms;
7 |
8 | allow init mnt_vendor_file:dir mounton;
9 |
10 | allow init ab_block_device:lnk_file relabelto;
11 | allow init boot_block_device:lnk_file relabelto;
12 |
13 | dontaudit init kernel:system module_request;
14 |
15 | # b/70518189 vDSO experiments
16 | allow init sysfs_vdso:file w_file_perms;
17 |
18 | allow init sysfs_poweroff:file w_file_perms;
19 | # b/72993533 Thermal mitigation in recovery mode
20 | allow init sysfs_thermal:file w_file_perms;
21 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/init_radio.te:
--------------------------------------------------------------------------------
1 | # /vendor/bin/init.radio.sh
2 | type init_radio, domain;
3 | type init_radio_exec, exec_type, vendor_file_type, file_type;
4 |
5 | init_daemon_domain(init_radio)
6 |
7 | allow init_radio vendor_shell_exec:file rx_file_perms;
8 | allow init_radio vendor_toolbox_exec:file rx_file_perms;
9 |
10 | allow init_radio radio_vendor_data_file:dir create_dir_perms;
11 | allow init_radio radio_vendor_data_file:file create_file_perms;
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ioctl_defines:
--------------------------------------------------------------------------------
1 | # socket ioctls
2 | define(`RMNET_IOCTL_EXTENDED', `0x000089FD')
3 |
4 | # socket ioctls defined in the kernel in include/uapi/linux/msm_ipc.h
5 | define(`IPC_ROUTER_IOCTL_GET_VERSION', `0x0000c300')
6 | define(`IPC_ROUTER_IOCTL_GET_MTU', `0x0000c301')
7 | define(`IPC_ROUTER_IOCTL_LOOKUP_SERVER', `0x0000c302')
8 | define(`IPC_ROUTER_IOCTL_GET_CURR_PKT_SIZE', `0x0000c303')
9 | define(`IPC_ROUTER_IOCTL_BIND_CONTROL_PORT', `0x0000c304')
10 | define(`IPC_ROUTER_IOCTL_CONFIG_SEC_RULES', `0x0000c305')
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ioctl_macros:
--------------------------------------------------------------------------------
1 | define(`msm_sock_ipc_ioctls', `{
2 | IPC_ROUTER_IOCTL_GET_VERSION
3 | IPC_ROUTER_IOCTL_GET_MTU
4 | IPC_ROUTER_IOCTL_LOOKUP_SERVER
5 | IPC_ROUTER_IOCTL_GET_CURR_PKT_SIZE
6 | IPC_ROUTER_IOCTL_BIND_CONTROL_PORT
7 | IPC_ROUTER_IOCTL_CONFIG_SEC_RULES
8 | }')
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/irqbalance.te:
--------------------------------------------------------------------------------
1 | type irqbalance, domain;
2 | type irqbalance_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(irqbalance);
5 |
6 | allow irqbalance sysfs_devices_system_cpu:file rw_file_perms;
7 | allow irqbalance proc_irq:dir r_dir_perms;
8 | allow irqbalance proc_irq:file rw_file_perms;
9 | allow irqbalance sysfs_irq:file r_file_perms;
10 |
11 | allow irqbalance proc_stat:file r_file_perms;
12 | allow irqbalance proc_interrupts:file r_file_perms;
13 |
14 | r_dir_file(irqbalance, proc)
15 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/irsc_util.te:
--------------------------------------------------------------------------------
1 | type irsc_util, domain;
2 | type irsc_util_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(irsc_util)
5 |
6 | allow irsc_util self:socket create_socket_perms;
7 | allowxperm irsc_util self:socket ioctl msm_sock_ipc_ioctls;
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/kernel.te:
--------------------------------------------------------------------------------
1 | # for diag over socket
2 | allow kernel self:socket create;
3 |
4 | allow kernel debugfs_wlan:dir search;
5 |
6 | dontaudit kernel kernel:system module_request;
7 |
8 | # Read FDs from /vendor/firmware
9 | allow kernel vendor_file:file r_file_perms;
10 |
11 | allow kernel debugfs_ipc:dir search;
12 | allow kernel persist_file:dir search;
13 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/mediacodec.te:
--------------------------------------------------------------------------------
1 | allow mediacodec sysfs_soc:file r_file_perms;
2 | allow mediacodec sysfs_soc:dir search;
3 |
4 | allow mediacodec system_file:dir r_dir_perms;
5 |
6 | userdebug_or_eng(`
7 | allow mediacodec dumpstate:fd use;
8 | ')
9 |
10 | dontaudit mediacodec vendor_display_prop:file r_file_perms;
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/mediaextractor.te:
--------------------------------------------------------------------------------
1 | userdebug_or_eng(`
2 | allow mediaextractor dumpstate:fifo_file append;
3 | ')
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/mediaserver.te:
--------------------------------------------------------------------------------
1 | dontaudit mediaserver vendor_display_prop:file r_file_perms;
2 | dontaudit mediaserver sysfs_msm_subsys:dir search;
3 | dontaudit mediaserver sysfs_msm_subsys:file r_file_perms;
4 |
5 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/mediatranscoding.te:
--------------------------------------------------------------------------------
1 | get_prop(domain, vendor_display_prop)
2 |
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/netutils_wrapper.te:
--------------------------------------------------------------------------------
1 | # For netutils to be able to write their stdout stderr to the pipes opened by netmgrd
2 | allow netutils_wrapper netmgrd:fd use;
3 | allow netutils_wrapper netmgrd:fifo_file { getattr ioctl read write append };
4 | allowxperm netutils_wrapper netmgrd:fifo_file ioctl { TCGETS };
5 |
6 | userdebug_or_eng(`
7 | allow netutils_wrapper diag_device:chr_file rw_file_perms;
8 | ')
9 |
10 | dontaudit netutils_wrapper netmgrd:unix_stream_socket { read write };
11 | dontaudit netutils_wrapper netmgrd:socket { read write };
12 | dontaudit netutils_wrapper netmgrd:netlink_socket { getattr read write append };
13 | dontaudit netutils_wrapper kernel:system module_request;
14 | dontaudit netutils_wrapper self:capability sys_module;
15 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/omadm.te:
--------------------------------------------------------------------------------
1 | # OMADM app
2 | type omadm_app, domain;
3 |
4 | app_domain(omadm_app)
5 | net_domain(omadm_app)
6 |
7 | allow omadm_app app_api_service:service_manager find;
8 | allow omadm_app radio_vendor_data_file:dir rw_dir_perms;
9 | allow omadm_app radio_vendor_data_file:file create_file_perms;
10 | allow omadm_app radio_service:service_manager find;
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/pd_services.te:
--------------------------------------------------------------------------------
1 | type pd_mapper, domain;
2 |
3 | type pd_mapper_exec, exec_type, vendor_file_type, file_type;
4 | init_daemon_domain(pd_mapper);
5 |
6 | allow pd_mapper self:capability { setgid setpcap setuid net_bind_service };
7 |
8 | allow pd_mapper firmware_file:dir r_dir_perms;
9 | allow pd_mapper firmware_file:file r_file_perms;
10 |
11 | allow pd_mapper self:socket create_socket_perms;
12 | allowxperm pd_mapper self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT;
13 |
14 | r_dir_file(pd_mapper, sysfs_msm_subsys)
15 | userdebug_or_eng(`set_prop(pd_mapper, vendor_ssr_prop)')
16 |
17 | dontaudit pd_mapper kernel:system module_request;
18 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/per_mgr.te:
--------------------------------------------------------------------------------
1 | # Policy for pm-service and pm-proxy
2 | type per_mgr, domain;
3 | type per_mgr_exec, exec_type, vendor_file_type, file_type;
4 |
5 | init_daemon_domain(per_mgr);
6 |
7 | add_service(per_mgr, per_mgr_service)
8 |
9 | vndbinder_use(per_mgr)
10 | binder_call(per_mgr, hal_gnss)
11 | binder_call(per_mgr, per_proxy)
12 | binder_call(per_mgr, wcnss_service)
13 | binder_call(per_mgr, rild)
14 |
15 | allow per_mgr self:capability net_bind_service;
16 |
17 | allow per_mgr self:socket create_socket_perms;
18 | allowxperm per_mgr self:socket ioctl msm_sock_ipc_ioctls;
19 | allow per_mgr ssr_device:chr_file { open read };
20 |
21 | r_dir_file(per_mgr, sysfs_msm_subsys)
22 | r_dir_file(per_mgr, sysfs)
23 |
24 | set_prop(per_mgr, per_mgr_state_prop)
25 |
26 | dontaudit per_mgr kernel:system module_request;
27 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/per_proxy.te:
--------------------------------------------------------------------------------
1 | # Policy for /system/bin/pm-proxy
2 | type per_proxy, domain;
3 | type per_proxy_exec, exec_type, vendor_file_type, file_type;
4 |
5 | init_daemon_domain(per_proxy)
6 |
7 | allow per_proxy per_mgr_service:service_manager find;
8 | r_dir_file(per_proxy, sysfs_type)
9 |
10 | vndbinder_use(per_proxy)
11 | binder_call(per_proxy, per_mgr)
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/platform_app.te:
--------------------------------------------------------------------------------
1 | # To read /persist/sensors/elmyra.
2 | allow platform_app persist_file:dir search;
3 | allow platform_app persist_sensors_file:dir search;
4 | allow platform_app persist_sensors_file:file r_file_perms;
5 | # To find and bind hal_wlc
6 | allow platform_app hal_wlc_hwservice:hwservice_manager find;
7 | allow platform_app hal_wlc:binder call;
8 | allow platform_app hal_wlc:binder { call transfer };
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/port-bridge.te:
--------------------------------------------------------------------------------
1 | type port-bridge, domain;
2 | type port-bridge_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(port-bridge)
5 |
6 | r_dir_file(port-bridge, sysfs_msm_subsys)
7 |
8 | allow port-bridge sysfs_soc:dir search;
9 | allow port-bridge sysfs_soc:file r_file_perms;
10 |
11 | allow port-bridge at_device:chr_file rw_file_perms;
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/qlogd.te:
--------------------------------------------------------------------------------
1 | type qlogd, domain, mlstrustedsubject;
2 | type qlogd_exec, exec_type, vendor_file_type, file_type;
3 |
4 | # make transition from init to its domain
5 | init_daemon_domain(qlogd)
6 |
7 | allow qlogd diag_device:chr_file rw_file_perms;
8 | allow qlogd qlogd_exec:file rx_file_perms;
9 |
10 | allow qlogd radio_vendor_data_file:file create_file_perms;
11 | allow qlogd radio_vendor_data_file:dir create_dir_perms;
12 |
13 | set_prop(qlogd, vendor_modem_diag_prop)
14 |
15 | allow qlogd self:socket create_socket_perms;
16 | allowxperm qlogd self:socket ioctl msm_sock_ipc_ioctls;
17 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/qti.te:
--------------------------------------------------------------------------------
1 | type qti, domain;
2 | type qti_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(qti)
5 | net_domain(qti)
6 |
7 | allow qti sysfs_soc:dir search;
8 | allow qti sysfs_soc:file r_file_perms;
9 |
10 | allow qti smd_device:chr_file { read write };
11 | allow qti rmnet_device:chr_file rw_file_perms;
12 |
13 | allow qti self:socket create_socket_perms;
14 | allowxperm qti self:socket ioctl msm_sock_ipc_ioctls;
15 |
16 | r_dir_file(qti, sysfs_msm_subsys)
17 |
18 | dontaudit qti kernel:system module_request;
19 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/qtidataservices_app.te:
--------------------------------------------------------------------------------
1 | type qtidataservices_app, domain;
2 | app_domain(qtidataservices_app)
3 | net_domain(qtidataservices_app)
4 |
5 | hwbinder_use(qtidataservices_app)
6 |
7 | allow qtidataservices_app hal_datafactory_hwservice:hwservice_manager find;
8 | allow qtidataservices_app location_service:service_manager find;
9 | allow qtidataservices_app radio_service:service_manager find;
10 | allow qtidataservices_app registry_service:service_manager find;
11 | allow qtidataservices_app thermal_service:service_manager find;
12 | allow qtidataservices_app wifi_service:service_manager find;
13 |
14 | binder_call(qtidataservices_app, cnd)
15 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/radio.te:
--------------------------------------------------------------------------------
1 | typeattribute radio system_writes_vendor_properties_violators;
2 |
3 | get_prop(radio, ims_prop)
4 | get_prop(radio, vendor_radio_prop)
5 |
6 | allow radio qmuxd_socket:dir search;
7 | allow radio qmuxd_socket:sock_file write;
8 |
9 | allow radio vendor_file:lnk_file r_file_perms;
10 | allow radio vendor_framework_file:file r_file_perms;
11 | allow radio vendor_framework_file:dir search;
12 |
13 | hwbinder_use(radio)
14 | allow radio hal_imsrtp_hwservice:hwservice_manager find;
15 |
16 | add_service(radio, radio_service)
17 | allow radio {
18 | mediaextractor_service
19 | }:service_manager find;
20 |
21 | r_dir_file(radio, sysfs_msm_subsys)
22 |
23 | # IMS needs permission to use avtimer
24 | allow radio avtimer_device:chr_file r_file_perms;
25 |
26 | binder_call(radio, hal_imsrtp)
27 | binder_call(radio, hal_rcsservice)
28 | allow radio hal_imsrcsd_hwservice:hwservice_manager find;
29 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ramdump_app.te:
--------------------------------------------------------------------------------
1 | type ramdump_app, domain;
2 |
3 | userdebug_or_eng(`
4 | app_domain(ramdump_app)
5 |
6 | allow ramdump_app app_api_service:service_manager find;
7 | allow ramdump_app surfaceflinger_service:service_manager find;
8 |
9 | allow ramdump_app ramdump_vendor_data_file:file create_file_perms;
10 | allow ramdump_app ramdump_vendor_data_file:dir create_dir_perms;
11 | allow ramdump_app wifidump_vendor_data_file:file r_file_perms;
12 |
13 | set_prop(ramdump_app, vendor_ramdump_prop);
14 | get_prop(system_app, vendor_ssr_prop)
15 | get_prop(ramdump_app, system_boot_reason_prop)
16 |
17 | # To access ramdumpfs.
18 | allow ramdump_app mnt_vendor_file:dir search;
19 | allow ramdump_app ramdump_vendor_mnt_file:dir create_dir_perms;
20 | allow ramdump_app ramdump_vendor_mnt_file:file create_file_perms;
21 | ')
22 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ril_config_service.te:
--------------------------------------------------------------------------------
1 | type ril_config_service_app, domain;
2 | app_domain(ril_config_service_app)
3 |
4 | set_prop(ril_config_service_app, vendor_radio_prop)
5 | allow ril_config_service_app app_api_service:service_manager find;
6 | allow ril_config_service_app radio_vendor_data_file:dir rw_dir_perms;
7 | allow ril_config_service_app radio_vendor_data_file:file create_file_perms;
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/rild.te:
--------------------------------------------------------------------------------
1 | binder_call(rild, per_mgr)
2 |
3 | vndbinder_use(rild)
4 |
5 | allow rild qmuxd_socket:dir w_dir_perms;
6 | allow rild qmuxd_socket:sock_file create_file_perms;
7 |
8 | allow rild netmgrd_socket:dir search;
9 | unix_socket_connect(rild, netmgrd, netmgrd)
10 |
11 | allow rild vendor_file:file { execute_no_trans lock ioctl };
12 |
13 | allow rild per_mgr_service:service_manager find;
14 |
15 | userdebug_or_eng(`
16 | allow rild diag_device:chr_file rw_file_perms;
17 | ')
18 |
19 | add_hwservice(rild, hal_iwlan_hwservice)
20 | add_hwservice(rild, hal_dataconnection_hwservice)
21 |
22 | allow rild self:socket ioctl;
23 | allowxperm rild self:socket ioctl msm_sock_ipc_ioctls;
24 | allow rild time_daemon:unix_stream_socket connectto;
25 |
26 | allow rild radio_vendor_data_file:dir rw_dir_perms;
27 | allow rild radio_vendor_data_file:file create_file_perms;
28 |
29 | get_prop(rild, vendor_dataqdp_prop)
30 | get_prop(rild, sota_prop)
31 | set_prop(rild, vendor_radio_prop)
32 | set_prop(rild, vendor_xlat_prop)
33 |
34 | hal_server_domain(rild, hal_secure_element)
35 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/secure_ui_service_app.te:
--------------------------------------------------------------------------------
1 | type secure_ui_service_app, domain;
2 | app_domain(secure_ui_service_app);
3 |
4 | binder_use(secure_ui_service_app);
5 | hwbinder_use(secure_ui_service_app);
6 | binder_call(secure_ui_service_app, hal_tui_comm);
7 | binder_call(secure_ui_service_app, surfaceflinger);
8 | binder_call(secure_ui_service_app, system_server);
9 |
10 | allow secure_ui_service_app hal_tui_comm_hwservice:hwservice_manager find;
11 |
12 | allow secure_ui_service_app app_api_service:service_manager find;
13 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/service.te:
--------------------------------------------------------------------------------
1 | type hal_telephony_service, service_manager_type, hal_service_type, protected_service;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/service_contexts:
--------------------------------------------------------------------------------
1 | com.fingerprints.extension.IFingerprintNavigation u:object_r:fingerprint_service:s0
2 | vendor.qti.hardware.radio.ims.IImsRadio/default u:object_r:hal_telephony_service:s0
3 | vendor.qti.hardware.radio.ims.IImsRadio/imsradio0 u:object_r:hal_telephony_service:s0
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/shell.te:
--------------------------------------------------------------------------------
1 | # To allow non-root to find power_supply management info
2 | allow shell sysfs_msm_subsys:dir search;
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ssr_detector.te:
--------------------------------------------------------------------------------
1 | # SSRestartDetector app
2 | type ssr_detector_app, domain;
3 |
4 | app_domain(ssr_detector_app)
5 |
6 | userdebug_or_eng(`
7 | allow ssr_detector_app ramdump_vendor_data_file:dir r_dir_perms;
8 | allow ssr_detector_app ramdump_vendor_data_file:file r_file_perms;
9 | get_prop(ssr_detector_app, vendor_ssr_prop)
10 | ')
11 | get_prop(ssr_detector_app, vendor_wifi_version)
12 | get_prop(ssr_detector_app, public_vendor_system_prop)
13 |
14 | allow ssr_detector_app app_api_service:service_manager find;
15 | allow ssr_detector_app radio_service:service_manager find;
16 |
17 | # ssr_detector app's data type is system_app_data_file.
18 | allow ssr_detector_app system_app_data_file:dir create_dir_perms;
19 | allow ssr_detector_app system_app_data_file:{ file lnk_file } create_file_perms;
20 |
21 | allow ssr_detector_app sysfs:lnk_file r_file_perms;
22 |
23 | r_dir_file(ssr_detector_app, sysfs_msm_subsys)
24 |
25 | allow ssr_detector_app cgroup:file w_file_perms;
26 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ssr_diag.te:
--------------------------------------------------------------------------------
1 | type ssr_diag, domain;
2 | type ssr_diag_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(ssr_diag);
5 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ssr_setup.te:
--------------------------------------------------------------------------------
1 | type ssr_setup, domain;
2 | type ssr_setup_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(ssr_setup);
5 |
6 | allow ssr_setup sysfs_msm_subsys:dir r_dir_perms;
7 | allow ssr_setup sysfs_msm_subsys:file rw_file_perms;
8 | allow ssr_setup sysfs_msm_subsys:lnk_file read;
9 |
10 | get_prop(ssr_setup, vendor_ssr_prop)
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/surfaceflinger.te:
--------------------------------------------------------------------------------
1 | dontaudit surfaceflinger vendor_file:file read;
2 | dontaudit surfaceflinger kernel:system module_request;
3 | dontaudit surfaceflinger vendor_default_prop:file read;
4 | userdebug_or_eng(`get_prop(surfaceflinger, vendor_display_prop)')
5 | allow surfaceflinger debugfs_ion:dir search;
6 |
7 | dontaudit surfaceflinger sysfs_msm_subsys:dir search;
8 | dontaudit surfaceflinger sysfs_msm_subsys:file r_file_perms;
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/system_app.te:
--------------------------------------------------------------------------------
1 | typeattribute system_app system_writes_vendor_properties_violators;
2 |
3 | userdebug_or_eng(`
4 | allow system_app diag_device:chr_file rw_file_perms;
5 | ')
6 | set_prop(system_app, vendor_bluetooth_prop)
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/system_server.te:
--------------------------------------------------------------------------------
1 | allow system_server self:socket ioctl;
2 | allowxperm system_server self:socket ioctl msm_sock_ipc_ioctls;
3 |
4 | binder_call(system_server, hal_camera_default)
5 | binder_call(system_server, mm-pp-daemon)
6 |
7 | allow system_server persist_file:dir search;
8 | allow system_server persist_sensors_file:dir search;
9 | allow system_server persist_sensors_file:file r_file_perms;
10 | allow system_server wlan_device:chr_file rw_file_perms;
11 |
12 | dontaudit system_server self:capability sys_module;
13 |
14 | dontaudit system_server vendor_display_prop:file r_file_perms;
15 |
16 | dontaudit system_server sysfs_msm_subsys:dir search;
17 | dontaudit system_server sysfs_msm_subsys:file r_file_perms;
18 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/tango_core.te:
--------------------------------------------------------------------------------
1 | type tango_core, domain;
2 |
3 | app_domain(tango_core)
4 |
5 | allow tango_core persist_file:dir search;
6 | allow tango_core persist_sensors_file:dir search;
7 | allow tango_core persist_sensors_file:file { getattr open read };
8 | allow tango_core qdsp_device:chr_file { ioctl open read };
9 | allow tango_core vendor_file:file { getattr open read };
10 |
11 | allow tango_core app_api_service:service_manager find;
12 | allow tango_core surfaceflinger_service:service_manager find;
13 | allow tango_core cameraserver_service:service_manager find;
14 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/tcpdump_logger.te:
--------------------------------------------------------------------------------
1 | type tcpdump_logger, domain;
2 | type tcpdump_logger_exec, exec_type, vendor_file_type, file_type;
3 |
4 | userdebug_or_eng(`
5 | # make transition from init to its domain
6 | init_daemon_domain(tcpdump_logger)
7 |
8 | allow tcpdump_logger self:capability {net_raw};
9 | allow tcpdump_logger self:packet_socket { create setopt getopt ioctl read write };
10 | allowxperm tcpdump_logger self:packet_socket ioctl 0x8933;
11 | allow tcpdump_logger tcpdump_exec:file rx_file_perms;
12 | allow tcpdump_logger tcpdump_vendor_data_file:dir create_dir_perms;
13 | allow tcpdump_logger tcpdump_vendor_data_file:file create_file_perms;
14 | allow tcpdump_logger radio_vendor_data_file:file create_file_perms;
15 | allow tcpdump_logger radio_vendor_data_file:dir create_dir_perms;
16 | allow tcpdump_logger cnss_vendor_data_file:file create_file_perms;
17 | allow tcpdump_logger cnss_vendor_data_file:dir create_dir_perms;
18 |
19 | set_prop(tcpdump_logger, vendor_tcpdump_log_prop)
20 | ')
21 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/timeservice_app.te:
--------------------------------------------------------------------------------
1 | type timeservice_app, domain;
2 | app_domain(timeservice_app);
3 |
4 | allow timeservice_app app_api_service:service_manager find;
5 | allow timeservice_app app_data_file:dir { search getattr };
6 | allow timeservice_app time_daemon:unix_stream_socket connectto;
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/ueventd.te:
--------------------------------------------------------------------------------
1 | allow ueventd sysfs_thermal:file w_file_perms;
2 | allow ueventd sysfs_leds:file w_file_perms;
3 | allow ueventd sysfs_camera:file w_file_perms;
4 | allow ueventd sysfs_easel:file w_file_perms;
5 | allow ueventd sysfs_fingerprint:file w_file_perms;
6 | allow ueventd sysfs_graphics:file w_file_perms;
7 | allow ueventd sysfs_laser:file w_file_perms;
8 | allow ueventd sysfs_rmtfs:file w_file_perms;
9 | allow ueventd sysfs_scsi_devices_0000:file write;
10 | allow ueventd sysfs_soc:file w_file_perms;
11 | allow ueventd sysfs_net:file w_file_perms;
12 | allow ueventd sysfs_msm_subsys:file w_file_perms;
13 | allow ueventd sysfs_bluetooth_writable:file w_file_perms;
14 | allow ueventd sysfs_usb_c:file w_file_perms;
15 | allow ueventd firmware_file:lnk_file read;
16 | allow ueventd firmware_file:dir search;
17 | allow ueventd firmware_file:file r_file_perms;
18 | allow ueventd tmpfs:blk_file getattr;
19 | allow ueventd persist_file:dir search;
20 | allow ueventd persist_file:file r_file_perms;
21 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/update_engine_common.te:
--------------------------------------------------------------------------------
1 | # Allow update_engine and update_engine_sideload (recovery) read/write on the
2 | # device-specific partitions it should update.
3 | allow update_engine_common postinstall_mnt_dir:dir r_dir_perms;
4 | allow update_engine_common tmpfs:lnk_file r_file_perms;
5 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/vndservice.te:
--------------------------------------------------------------------------------
1 | type qdisplay_service, vndservice_manager_type;
2 | type per_mgr_service, vndservice_manager_type;
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/vndservice_contexts:
--------------------------------------------------------------------------------
1 | display.qservice u:object_r:qdisplay_service:s0
2 | vendor.qcom.PeripheralManager u:object_r:per_mgr_service:s0
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/vold.te:
--------------------------------------------------------------------------------
1 | get_prop(vold, vendor_tee_listener_prop)
2 |
3 | allow vold sysfs_scsi_devices_0000:file w_file_perms;
4 | allow vold sysfs_scsi_devices_other:file w_file_perms;
5 | allow vold sysfs_devices_block:file write;
6 |
7 | # allow vold to trim /mnt/vendor/persist by sending ioctl FITRIM
8 | allow vold persist_file:dir { ioctl open read };
9 |
10 | # generated by proc scan, unnecessary
11 | dontaudit vold proc_irq:dir read;
12 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/wifi_sniffer.te:
--------------------------------------------------------------------------------
1 | type wifi_sniffer, domain;
2 | type wifi_sniffer_exec, exec_type, vendor_file_type, file_type;
3 |
4 | userdebug_or_eng(`
5 | # make transition from init to its domain
6 | init_daemon_domain(wifi_sniffer)
7 | net_domain(wifi_sniffer)
8 |
9 | # configurate con mode
10 | allow wifi_sniffer self:capability { net_admin net_raw };
11 | allow wifi_sniffer sysfs_wifi_conmode:file rw_file_perms;
12 |
13 | # interface up
14 | allowxperm wifi_sniffer self:udp_socket ioctl SIOCSIFFLAGS;
15 | allow wifi_sniffer self:netlink_generic_socket create_socket_perms_no_ioctl;
16 |
17 | get_prop(wifi_sniffer, vendor_wifi_sniffer_prop)
18 |
19 | dontaudit wifi_sniffer debugfs_wlan:dir search;
20 | ')
21 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/common/zygote.te:
--------------------------------------------------------------------------------
1 | # Allow the Zygote to read vendor graphics device properties
2 | get_prop(zygote, vendor_display_prop)
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/compat/file_contexts:
--------------------------------------------------------------------------------
1 | # Keep them for independent system update (b/120578809)
2 | /firmware u:object_r:rootfs:s0
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/sdm845/genfs_contexts:
--------------------------------------------------------------------------------
1 | genfscon sysfs /devices/platform/soc/soc:qcom,l3-cdsp/devfreq u:object_r:sysfs_devfreq:s0
2 | genfscon sysfs /devices/platform/soc/soc:qcom,l3-cdsp/devfreq/soc:qcom,l3-cdsp/userspace u:object_r:sysfs_devfreq_l3cdsp:s0
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/sdm845/hal_neuralnetworks.te:
--------------------------------------------------------------------------------
1 | type hal_neuralnetworks_default, domain;
2 | hal_server_domain(hal_neuralnetworks_default, hal_neuralnetworks)
3 |
4 | type hal_neuralnetworks_default_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_neuralnetworks_default)
6 |
7 | allow hal_neuralnetworks_default fwk_sensor_hwservice:hwservice_manager find;
8 | allow hal_neuralnetworks_default qdsp_device:chr_file r_file_perms;
9 | allow hal_neuralnetworks_default ion_device:chr_file r_file_perms;
10 |
11 | allow hal_neuralnetworks_default app_data_file:file { read getattr };
12 | allow hal_neuralnetworks_default shell_data_file:file { read getattr };
13 | allow hal_neuralnetworks_default hal_neuralnetworks_data_file:dir create_dir_perms;
14 | allow hal_neuralnetworks_default hal_neuralnetworks_data_file:{ file fifo_file } create_file_perms;
15 | allow hal_neuralnetworks_default gpu_device:chr_file rw_file_perms;
16 |
17 | r_dir_file(hal_neuralnetworks_default, sysfs_soc)
18 | r_dir_file(hal_neuralnetworks_default, adsprpcd_file)
19 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qcom/sdm845/update_engine_common.te:
--------------------------------------------------------------------------------
1 | # Allow update_engine and update_engine_sideload (recovery) read/write on the
2 | # device-specific partitions it should update.
3 | allow update_engine_common xbl_block_device:blk_file rw_file_perms;
4 | allow update_engine_common modem_block_device:blk_file rw_file_perms;
5 | allow update_engine_common ab_block_device:blk_file rw_file_perms;
6 |
--------------------------------------------------------------------------------
/sepolicy/vendor/verizon/keys.conf:
--------------------------------------------------------------------------------
1 | [@VERIZON]
2 | ALL : device/google/crosshatch/sepolicy/vendor/verizon/verizon.x509.pem
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/verizon/mac_permissions.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/verizon/obdm_app.te:
--------------------------------------------------------------------------------
1 | type obdm_app, domain, coredomain;
2 |
3 | app_domain(obdm_app)
4 | net_domain(obdm_app)
5 |
6 | allow obdm_app proc_stat:file r_file_perms;
7 |
8 | # talk to /dev/diag
9 | allow obdm_app diag_device:chr_file rw_file_perms;
10 |
11 | allow obdm_app app_api_service:service_manager find;
12 | allow obdm_app radio_service:service_manager find;
13 | allow obdm_app surfaceflinger_service:service_manager find;
14 |
15 | allow obdm_app self:socket create_socket_perms;
16 | allowxperm obdm_app self:socket ioctl { 0x0000c302 0x0000c304 };
17 |
18 | allow obdm_app sysfs:dir r_dir_perms;
19 | r_dir_file(obdm_app, sysfs_msm_subsys)
20 |
--------------------------------------------------------------------------------
/sepolicy/vendor/verizon/seapp_contexts:
--------------------------------------------------------------------------------
1 | # Verizon for OBDM tool
2 | user=_app seinfo=verizon name=com.verizon.obdm domain=obdm_app type=app_data_file levelFrom=all
3 | user=_app seinfo=verizon name=com.verizon.obdm:background domain=obdm_app type=app_data_file levelFrom=all
4 |
--------------------------------------------------------------------------------
/setup-makefiles.py:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | #
3 | # SPDX-FileCopyrightText: 2024 The LineageOS Project
4 | # SPDX-License-Identifier: Apache-2.0
5 | #
6 |
7 | set -e
8 |
9 | MY_DIR="$(cd "$(dirname "${0}")"; pwd -P)"
10 |
11 | pushd "${MY_DIR}/crosshatch"
12 | ./setup-makefiles.py
13 | popd
14 |
--------------------------------------------------------------------------------
/teeui/tests/blueline/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | cc_test_host {
6 | name: "system.teeui_localization_rendering_test.blueline",
7 | cflags: [
8 | "-Wall",
9 | "-Werror",
10 | "-Wextra",
11 | "-O0",
12 | ],
13 | srcs: [
14 | "test_main.cpp",
15 | ],
16 | test_suites: ["device-tests"],
17 | shared_libs: [
18 | "libbase",
19 | "libteeui_localization_rendering_test",
20 | ],
21 | }
22 |
--------------------------------------------------------------------------------
/teeui/tests/blueline/TEST_MAPPING:
--------------------------------------------------------------------------------
1 | {
2 | "postsubmit": [
3 | {
4 | "name": "system.teeui_localization_rendering_test.blueline",
5 | "host" : true,
6 | "options": [
7 | {
8 | "native-test-flag": "--width=1080"
9 | },
10 | {
11 | "native-test-flag": "--height=2160"
12 | },
13 | {
14 | "native-test-flag": "--dp2px=2.62135"
15 | },
16 | {
17 | "native-test-flag": "--mm2px=17.42075974"
18 | },
19 | {
20 | "native-test-flag": "--powerButtonTop=20.26"
21 | },
22 | {
23 | "native-test-flag": "--powerButtonBottom=30.26"
24 | },
25 | {
26 | "native-test-flag": "--volUpButtonTop=40.26"
27 | },
28 | {
29 | "native-test-flag": "--volUpButtonBottom=50.26"
30 | }
31 | ]
32 | }
33 | ]
34 | }
35 |
36 |
--------------------------------------------------------------------------------
/teeui/tests/blueline/test_main.cpp:
--------------------------------------------------------------------------------
1 | /*
2 | * Copyright 2020, The Android Open Source Project
3 | *
4 | * Licensed under the Apache License, Version 2.0 (the "License");
5 | * you may not use this file except in compliance with the License.
6 | * You may obtain a copy of the License at
7 | *
8 | * http://www.apache.org/licenses/LICENSE-2.0
9 | *
10 | * Unless required by applicable law or agreed to in writing, software
11 | * distributed under the License is distributed on an "AS IS" BASIS,
12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | * See the License for the specific language governing permissions and
14 | * limitations under the License.
15 | */
16 |
17 | #include
18 | #include
19 |
20 | int main(int argc, char **argv) {
21 | ::testing::InitGoogleTest(&argc, argv);
22 | teeui::test::initRenderTest(argc, argv);
23 | return RUN_ALL_TESTS();
24 | }
25 |
--------------------------------------------------------------------------------
/teeui/tests/crosshatch/Android.bp:
--------------------------------------------------------------------------------
1 | package {
2 | default_applicable_licenses: ["Android-Apache-2.0"],
3 | }
4 |
5 | cc_test_host {
6 | name: "system.teeui_localization_rendering_test.crosshatch",
7 | cflags: [
8 | "-Wall",
9 | "-Werror",
10 | "-Wextra",
11 | "-O0",
12 | ],
13 | srcs: [
14 | "test_main.cpp",
15 | ],
16 | test_suites: ["device-tests"],
17 | shared_libs: [
18 | "libbase",
19 | "libteeui_localization_rendering_test",
20 | ],
21 | }
22 |
--------------------------------------------------------------------------------
/teeui/tests/crosshatch/TEST_MAPPING:
--------------------------------------------------------------------------------
1 | {
2 | "postsubmit": [
3 | {
4 | "name": "system.teeui_localization_rendering_test.crosshatch",
5 | "host" : true,
6 | "options": [
7 | {
8 | "native-test-flag": "--width=1440"
9 | },
10 | {
11 | "native-test-flag": "--height=2950"
12 | },
13 | {
14 | "native-test-flag": "--dp2px=3.495145631"
15 | },
16 | {
17 | "native-test-flag": "--mm2px=20.42958729"
18 | },
19 | {
20 | "native-test-flag": "--powerButtonTop=34.146"
21 | },
22 | {
23 | "native-test-flag": "--powerButtonBottom=44.146"
24 | },
25 | {
26 | "native-test-flag": "--volUpButtonTop=54.146"
27 | },
28 | {
29 | "native-test-flag": "--volUpButtonBottom=64.146"
30 | }
31 | ]
32 | }
33 | ]
34 | }
35 |
36 |
--------------------------------------------------------------------------------
/teeui/tests/crosshatch/test_main.cpp:
--------------------------------------------------------------------------------
1 | /*
2 | * Copyright 2020, The Android Open Source Project
3 | *
4 | * Licensed under the Apache License, Version 2.0 (the "License");
5 | * you may not use this file except in compliance with the License.
6 | * You may obtain a copy of the License at
7 | *
8 | * http://www.apache.org/licenses/LICENSE-2.0
9 | *
10 | * Unless required by applicable law or agreed to in writing, software
11 | * distributed under the License is distributed on an "AS IS" BASIS,
12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 | * See the License for the specific language governing permissions and
14 | * limitations under the License.
15 | */
16 |
17 | #include
18 | #include
19 |
20 | int main(int argc, char **argv) {
21 | ::testing::InitGoogleTest(&argc, argv);
22 | teeui::test::initRenderTest(argc, argv);
23 | return RUN_ALL_TESTS();
24 | }
25 |
--------------------------------------------------------------------------------
/thermal-engine-blueline-vr-evt.conf:
--------------------------------------------------------------------------------
1 | [SKIN-MONITOR]
2 | algo_type monitor
3 | sampling 2000
4 | sensor quiet-therm-adc
5 | thresholds 52000 62000
6 | thresholds_clr 48000 61000
7 | actions cpu0+cpu4+gpu shutdown
8 | action_info 825600+902400+257000000 1
9 |
10 | [BATTERY-MONITOR]
11 | algo_type monitor
12 | sampling 2000
13 | sensor quiet-therm-adc
14 | thresholds 42000 44000 46000
15 | thresholds_clr 41000 43000 45000
16 | actions battery battery battery
17 | action_info 1 2 3
18 |
19 | [MODEM-MONITOR]
20 | algo_type monitor
21 | sampling 1000
22 | sensor quiet-therm-adc
23 | thresholds 51000 56000 58000
24 | thresholds_clr 48000 54000 56000
25 | actions modem+modem_proc modem+modem_proc modem+modem_proc
26 | action_info 1+1 1+2 3+3
27 |
--------------------------------------------------------------------------------
/thermal-engine-blueline-vr-prod.conf:
--------------------------------------------------------------------------------
1 | [SKIN-MONITOR]
2 | algo_type monitor
3 | sampling 2000
4 | sensor fps-therm-adc
5 | thresholds 49000 57000
6 | thresholds_clr 45000 56000
7 | actions cpu0+cpu4+gpu shutdown
8 | action_info 825600+902400+257000000 1
9 |
10 | [BATTERY-MONITOR]
11 | algo_type monitor
12 | sampling 2000
13 | sensor fps-therm-adc
14 | thresholds 39000 41000 43000 48000
15 | thresholds_clr 38000 40000 42000 46000
16 | actions battery battery battery battery
17 | action_info 1 2 3 4
18 |
19 | [MODEM-MONITOR]
20 | algo_type monitor
21 | sampling 1000
22 | sensor fps-therm-adc
23 | thresholds 48000 51000 53000
24 | thresholds_clr 45000 49000 51000
25 | actions modem+modem_proc modem+modem_proc modem+modem_proc
26 | action_info 1+1 1+2 3+3
27 |
--------------------------------------------------------------------------------
/thermal-engine-crosshatch-vr-evt.conf:
--------------------------------------------------------------------------------
1 | [SKIN-MONITOR]
2 | algo_type monitor
3 | sampling 2000
4 | sensor quiet-therm-adc
5 | thresholds 52000 62000
6 | thresholds_clr 48000 61000
7 | actions cpu0+cpu4+gpu shutdown
8 | action_info 825600+902400+257000000 1
9 |
10 | [BATTERY-MONITOR]
11 | algo_type monitor
12 | sampling 2000
13 | sensor quiet-therm-adc
14 | thresholds 42000 44000 46000
15 | thresholds_clr 41000 43000 45000
16 | actions battery battery battery
17 | action_info 1 2 3
18 |
19 | [MODEM-MONITOR]
20 | algo_type monitor
21 | sampling 1000
22 | sensor quiet-therm-adc
23 | thresholds 51000 56000 58000
24 | thresholds_clr 48000 54000 56000
25 | actions modem+modem_proc modem+modem_proc modem+modem_proc
26 | action_info 1+1 1+2 3+3
27 |
--------------------------------------------------------------------------------
/thermal-engine-crosshatch-vr-prod.conf:
--------------------------------------------------------------------------------
1 | [SKIN-MONITOR]
2 | algo_type monitor
3 | sampling 2000
4 | sensor fps-therm-adc
5 | thresholds 49000 57000
6 | thresholds_clr 45000 56000
7 | actions cpu0+cpu4+gpu shutdown
8 | action_info 825600+902400+257000000 1
9 |
10 | [BATTERY-MONITOR]
11 | algo_type monitor
12 | sampling 2000
13 | sensor fps-therm-adc
14 | thresholds 39000 41000 43000 48000
15 | thresholds_clr 38000 40000 42000 46000
16 | actions battery battery battery battery
17 | action_info 1 2 3 4
18 |
19 | [MODEM-MONITOR]
20 | algo_type monitor
21 | sampling 1000
22 | sensor fps-therm-adc
23 | thresholds 48000 51000 53000
24 | thresholds_clr 45000 49000 51000
25 | actions modem+modem_proc modem+modem_proc modem+modem_proc
26 | action_info 1+1 1+2 3+3
27 |
--------------------------------------------------------------------------------
/uinput-fpc.idc:
--------------------------------------------------------------------------------
1 | # Copyright (C) 2017 The Android Open Source Project
2 | #
3 | # Licensed under the Apache License, Version 2.0 (the "License");
4 | # you may not use this file except in compliance with the License.
5 | # You may obtain a copy of the License at
6 | #
7 | # http://www.apache.org/licenses/LICENSE-2.0
8 | #
9 | # Unless required by applicable law or agreed to in writing, software
10 | # distributed under the License is distributed on an "AS IS" BASIS,
11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 | # See the License for the specific language governing permissions and
13 | # limitations under the License.
14 |
15 | #
16 | # Fingerprint navigation configuration file
17 | #
18 | keyboard.orientationAware = 1
19 | keyboard.builtIn = 1
20 |
21 |
--------------------------------------------------------------------------------
/uinput-fpc.kl:
--------------------------------------------------------------------------------
1 | key 106 SYSTEM_NAVIGATION_LEFT
2 | key 108 SYSTEM_NAVIGATION_DOWN
3 | key 103 SYSTEM_NAVIGATION_UP
4 | key 105 SYSTEM_NAVIGATION_RIGHT
5 |
--------------------------------------------------------------------------------
/usb/.clang-format:
--------------------------------------------------------------------------------
1 | BasedOnStyle: Google
2 | AccessModifierOffset: -2
3 | AllowShortFunctionsOnASingleLine: Inline
4 | ColumnLimit: 99
5 | CommentPragmas: NOLINT:.*
6 | DerivePointerAlignment: false
7 | IndentWidth: 4
8 | PointerAlignment: Right
9 | TabWidth: 4
10 | UseTab: Never
11 | PenaltyExcessCharacter: 32
12 | AllowShortIfStatementsOnASingleLine: false
13 | SpacesBeforeTrailingComments: 2
14 |
15 |
--------------------------------------------------------------------------------
/usb/gadget/android.hardware.usb.gadget-service.crosshatch.rc:
--------------------------------------------------------------------------------
1 | service vendor.usb-gadget-hal-1-1 /vendor/bin/hw/android.hardware.usb.gadget-service.crosshatch
2 | class hal
3 | user root
4 | group root system shell mtp
5 |
6 | on boot
7 | chown root system /sys/class/typec/port0/power_role
8 | chown root system /sys/class/typec/port0/data_role
9 | chown root system /sys/class/typec/port0/port_type
10 | chmod 664 /sys/class/typec/port0/power_role
11 | chmod 664 /sys/class/typec/port0/data_role
12 | chmod 664 /sys/class/typec/port0/port_type
13 |
14 | on post-fs
15 | chown root system /sys/devices/platform/soc/a600000.ssusb/b_sess
16 | chown root system /sys/devices/platform/soc/a600000.ssusb/id
17 | chown root system /sys/devices/platform/soc/a600000.ssusb/usb_data_enabled
18 | chmod 664 /sys/devices/platform/soc/a600000.ssusb/b_sess
19 | chmod 664 /sys/devices/platform/soc/a600000.ssusb/id
20 | chmod 664 /sys/devices/platform/soc/a600000.ssusb/usb_data_enabled
21 |
--------------------------------------------------------------------------------
/usb/gadget/android.hardware.usb.gadget@1.1-service.crosshatch.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | android.hardware.usb.gadget
4 | hwbinder
5 | 1.1
6 |
7 | IUsbGadget
8 | default
9 |
10 |
11 |
12 |
--------------------------------------------------------------------------------
/usb/usb/android.hardware.usb-service.crosshatch.rc:
--------------------------------------------------------------------------------
1 | service vendor.usb /vendor/bin/hw/android.hardware.usb-service.crosshatch
2 | class hal
3 | user system
4 | group system shell
5 |
--------------------------------------------------------------------------------
/usb/usb/android.hardware.usb-service.crosshatch.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | android.hardware.usb
4 | 1
5 |
6 | IUsb
7 | default
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/vendor.prop:
--------------------------------------------------------------------------------
1 | # DRM
2 | drm.service.enabled=true
3 | media.mediadrmservice.enable=true
4 |
5 | # Graphics
6 | ro.hardware.egl=adreno
7 | ro.hardware.vulkan=adreno
8 |
--------------------------------------------------------------------------------
/vf/OWNERS:
--------------------------------------------------------------------------------
1 | # Treble team for Vendor Freeze
2 | bpeckham@google.com
3 | chrisgross@google.com
4 | danielnorman@google.com
5 | inseob@google.com
6 | justinyun@google.com
7 |
--------------------------------------------------------------------------------
/vf/framework_item_list.txt:
--------------------------------------------------------------------------------
1 | IMAGES/product.img
2 | IMAGES/product.map
3 | IMAGES/system_ext.img
4 | IMAGES/system_ext.map
5 | IMAGES/system.img
6 | IMAGES/system.map
7 | IMAGES/system_other.img
8 | IMAGES/userdata.img
9 | META/apexkeys.txt
10 | META/apkcerts.txt
11 | META/filesystem_config.txt
12 | META/postinstall_config.txt
13 | META/product_filesystem_config.txt
14 | META/root_filesystem_config.txt
15 | META/system_ext_filesystem_config.txt
16 | META/system_other_filesystem_config.txt
17 | META/update_engine_config.txt
18 | PRODUCT/*
19 | ROOT/*
20 | SYSTEM/*
21 | SYSTEM_EXT/*
22 | SYSTEM_OTHER/*
23 |
--------------------------------------------------------------------------------
/vf/framework_misc_info_keys.txt:
--------------------------------------------------------------------------------
1 | ab_update
2 | avb_product_add_hashtree_footer_args
3 | avb_product_hashtree_enable
4 | avb_system_add_hashtree_footer_args
5 | avb_system_ext_add_hashtree_footer_args
6 | avb_system_ext_hashtree_enable
7 | avb_system_hashtree_enable
8 | avb_system_other_add_hashtree_footer_args
9 | avb_system_other_hashtree_enable
10 | building_product_image
11 | building_system_ext_image
12 | building_system_image
13 | building_system_other_image
14 | default_system_dev_certificate
15 | product_fs_type
16 | root_dir
17 | system_ext_fs_type
18 |
--------------------------------------------------------------------------------
/vf/vendor_item_list.txt:
--------------------------------------------------------------------------------
1 | BOOT/*
2 | DATA/*
3 | IMAGES/boot.img
4 | IMAGES/dtbo.img
5 | IMAGES/vendor_boot.img
6 | IMAGES/vendor.img
7 | IMAGES/vendor.map
8 | META/boot_filesystem_config.txt
9 | META/care_map.pb
10 | META/kernel_configs.txt
11 | META/kernel_version.txt
12 | META/otakeys.txt
13 | META/releasetools.py
14 | META/vendor_boot_filesystem_config.txt
15 | META/vendor_filesystem_config.txt
16 | ODM/*
17 | OTA/android-info.txt
18 | PREBUILT_IMAGES/*
19 | RADIO/*
20 | VENDOR/*
21 | VENDOR_BOOT/*
22 |
--------------------------------------------------------------------------------
/vibrator/OWNERS:
--------------------------------------------------------------------------------
1 | eliptus@google.com
2 | michaelwr@google.com
3 |
--------------------------------------------------------------------------------
/vibrator/android.hardware.vibrator-service.crosshatch.rc:
--------------------------------------------------------------------------------
1 | service vendor.vibrator.crosshatch /vendor/bin/hw/android.hardware.vibrator-service.crosshatch
2 | class hal
3 | user system
4 | group system
5 |
--------------------------------------------------------------------------------
/vibrator/android.hardware.vibrator-service.crosshatch.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | android.hardware.vibrator
4 | 2
5 | IVibrator/default
6 |
7 |
8 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/cs40l20.bin:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/cs40l20.bin
--------------------------------------------------------------------------------
/vibrator/cs40l20/cs40l20.wmfw:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/cs40l20.wmfw
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/09_POP(SNAP)_0503.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/09_POP(SNAP)_0503.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/09_POP(SNAP)_0503.wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/10_THUD_0503.json:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/10_THUD_0503.json
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/10_THUD_0503.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/10_THUD_0503.wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/11_The_big_adventure.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Version": "1.4.0", "Repeat": "11", "WaitTime": "0",
4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0" ,
5 | "Time1" : "4" , "Level1" : "0.46" , "Frequency1" : "0",
6 | "Time2" : "8" , "Level2" : "0.46" , "Frequency2" : "0",
7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0",
8 | "Time4" : "392" , "Level4" : "0" , "Frequency4" : "0",
9 | "Time5" : "4" , "Level5" : "0.46" , "Frequency5" : "0",
10 | "Time6" : "8" , "Level6" : "0.46" , "Frequency6" : "0",
11 | "Time7" : "4" , "Level7" : "0" , "Frequency7" : "0",
12 | "Time8" : "392" , "Level8" : "0" , "Frequency8" : "0",
13 | "Time9" : "4" , "Level9" : "0.46" , "Frequency9" : "0",
14 | "Time10" : "8" , "Level10" : "0.46" , "Frequency10" : "0",
15 | "Time11" : "4" , "Level11" : "0" , "Frequency11" : "0",
16 | "Time12" : "260" , "Level12" : "0" , "Frequency12" : "0"
17 | }
18 | ]
19 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/14_Flutterby.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Version": "1.4.0", "Repeat": "1", "WaitTime": "0",
4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0",
5 | "Time1" : "300" , "Level1" : "0.23" , "Frequency1" : "0",
6 | "Time2" : "100" , "Level2" : "0.23" , "Frequency2" : "0",
7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0",
8 | "Time4" : "296" , "Level4" : "0" , "Frequency4" : "0",
9 | "Time5" : "300" , "Level5" : "0.23" , "Frequency5" : "0",
10 | "Time6" : "100" , "Level6" : "0.23" , "Frequency6" : "0",
11 | "Time7" : "4" , "Level7" : "0" , "Frequency7" : "0",
12 | "Time8" : "1020" , "Level8" : "0" , "Frequency8" : "0",
13 | "Time9" : "260" , "Level9" : "0" , "Frequency9" : "0"
14 | }
15 | ]
16 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/15_Hotline.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Version": "1.4.0", "Repeat": "1", "WaitTime": "0",
4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0",
5 | "Time1" : "300" , "Level1" : "0.23" , "Frequency1" : "0",
6 | "Time2" : "100" , "Level2" : "0.23" , "Frequency2" : "0",
7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0",
8 | "Time4" : "596" , "Level4" : "0" , "Frequency4" : "0",
9 | "Time5" : "300" , "Level5" : "0.23" , "Frequency5" : "0",
10 | "Time6" : "100" , "Level6" : "0.23" , "Frequency6" : "0",
11 | "Time7" : "4" , "Level7" : "0" , "Frequency7" : "0",
12 | "Time8" : "1020" , "Level8" : "0" , "Frequency8" : "0",
13 | "Time9" : "908" , "Level9" : "0" , "Frequency9" : "0"
14 | }
15 | ]
16 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/21_Schools_out.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Version": "1.4.0", "Repeat": "0", "WaitTime": "0",
4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0",
5 | "Time1" : "300" , "Level1" : "0.23" , "Frequency1" : "0",
6 | "Time2" : "100" , "Level2" : "0.23" , "Frequency2" : "0",
7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0",
8 | "Time4" : "596" , "Level4" : "0" , "Frequency4" : "0"
9 | }
10 | ]
11 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/23_Extra1_100x8.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Version": "1.4.0", "Repeat": "7", "WaitTime": "0",
4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0",
5 | "Time1" : "40" , "Level1" : "0.23" , "Frequency1" : "0",
6 | "Time2" : "20" , "Level2" : "0.23" , "Frequency2" : "0",
7 | "Time3" : "20" , "Level3" : "0" , "Frequency3" : "0",
8 | "Time4" : "20" , "Level4" : "0" , "Frequency4" : "0"
9 | }
10 | ]
11 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/README:
--------------------------------------------------------------------------------
1 | Bin file generated by the following command:
2 |
3 | python2 pdata2bin.py \
4 | continuous_sine_f0.json \
5 | \[#1\]\ 00\ \(23%\).json \
6 | \[#2\]\ 00\ \(39%\).json \
7 | \[#3\]\ 00\ \(55%\).json \
8 | \[#4\]\ 00\ \(75%\).json \
9 | \[#4\]\ 00\ \(75%\).json \
10 | \[#6\]\ Double\ \(L\)\ \=\ #1\ +\ #2.json \
11 | \[#7\]\ Double\ \(M\)\ \=\ #2\ +\ #3.json \
12 | \[#8\]\ Double\ \(H\)\ \=\ #3\ +\ #4.json \
13 | \[#4\]\ 00\ \(75%\).json \
14 | \[#4\]\ 00\ \(75%\).json \
15 | 11_The_big_adventure.json \
16 | 12_Copycat.json \
17 | 13_Crackle.json \
18 | 14_Flutterby.json \
19 | 15_Hotline.json \
20 | 16_Leaps_and_bounds.json \
21 | 17_Lollipop.json \
22 | 18_Lost_and_found.json \
23 | 19_Mash_up.json \
24 | 20_Monkey_around.json \
25 | 21_Schools_out.json \
26 | 22_Zen_too.json \
27 | 23_Extra1_100x8.json \
28 | cs40l20.bin
29 |
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#1] 00 (23%).json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#1] 00 (23%).wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#1] 00 (23%).wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#2] 00 (39%).json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#2] 00 (39%).wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#2] 00 (39%).wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#3] 00 (55%).json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#3] 00 (55%).wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#3] 00 (55%).wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#4] 00 (75%).json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#4] 00 (75%).wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#4] 00 (75%).wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#5] 11-2 (-3).json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#5] 11-2 (-3).wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#5] 11-2 (-3).wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#6] Double (L) = #1 + #2.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#6] Double (L) = #1 + #2.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#6] Double (L) = #1 + #2.wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#7] Double (M) = #2 + #3.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#7] Double (M) = #2 + #3.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#7] Double (M) = #2 + #3.wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#8] Double (H) = #3 + #4.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "F0": "160",
4 | "ReDC": "15"
5 | }
6 | ]
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/[#8] Double (H) = #3 + #4.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#8] Double (H) = #3 + #4.wav
--------------------------------------------------------------------------------
/vibrator/cs40l20/wav_wavetable/continuous_sine_f0.json:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "Version": "1.4.2",
4 | "Repeat": "0",
5 | "WaitTime": "0",
6 |
7 | "Time0": "0",
8 | "Level0": "0.23",
9 | "Frequency0": "0",
10 |
11 | "Time1": "-1",
12 | "Level1": "0.23",
13 | "Frequency1": "0"
14 | }
15 | ]
16 |
--------------------------------------------------------------------------------
/vibrator/drv2624/drv2624.bin:
--------------------------------------------------------------------------------
1 | $&