├── .clang-format ├── .gitignore ├── Android.bp ├── AndroidProducts.mk ├── BoardConfig-common.mk ├── BoardConfigLineage.mk ├── METADATA ├── PREUPLOAD.cfg ├── WCNSS_qcom_cfg.ini ├── acdbdata ├── OEM │ ├── sdm845-tavil-b1-snd-card │ │ ├── Bluetooth_cal.acdb │ │ ├── Codec_cal.acdb │ │ ├── General_cal.acdb │ │ ├── Global_cal.acdb │ │ ├── Handset_cal.acdb │ │ ├── Hdmi_cal.acdb │ │ ├── Headset_cal.acdb │ │ ├── Speaker_cal.acdb │ │ ├── adsp_avs_config.acdb │ │ └── workspaceFile.qwsp │ ├── sdm845-tavil-c1-snd-card │ │ ├── Bluetooth_cal.acdb │ │ ├── Codec_cal.acdb │ │ ├── General_cal.acdb │ │ ├── Global_cal.acdb │ │ ├── Handset_cal.acdb │ │ ├── Hdmi_cal.acdb │ │ ├── Headset_cal.acdb │ │ ├── Speaker_cal.acdb │ │ ├── adsp_avs_config.acdb │ │ └── workspaceFile.qwsp │ └── sdm845-tavil-snd-card │ │ ├── Bluetooth_cal.acdb │ │ ├── Codec_cal.acdb │ │ ├── General_cal.acdb │ │ ├── Global_cal.acdb │ │ ├── Handset_cal.acdb │ │ ├── Hdmi_cal.acdb │ │ ├── Headset_cal.acdb │ │ ├── Speaker_cal.acdb │ │ └── workspaceFile.qwsp └── adsp_avs_config.acdb ├── allowlist_com.google.android.as.xml ├── aosp_blueline.mk ├── aosp_blueline_hwasan.mk ├── aosp_crosshatch.mk ├── aosp_crosshatch_hwasan.mk ├── audio ├── 100_Blueline_Stereo_Protect.h ├── 20180301_Crosshatch_Voice_24bit.exported_tuning ├── 20180301_Crosshatch_Voice_24bit.h ├── 20180301_Crosshatch_Voice_24bit_rx.bin ├── 20180301_Crosshatch_Voice_24bit_tx.bin ├── 20180307_Blueline_Voice_24bit.exported_tuning ├── 20180307_Blueline_Voice_24bit.h ├── 20180307_Blueline_Voice_24bit_rx.bin ├── 20180307_Blueline_Voice_24bit_tx.bin ├── 20180312_Blueline_Multimedia_24bit_MediumVibration.exported_tuning ├── 20180312_Blueline_Multimedia_24bit_MediumVibration.h ├── 20180312_Blueline_Multimedia_24bit_MediumVibration_rx.bin ├── 20180312_Blueline_Multimedia_24bit_MediumVibration_tx.bin ├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration.exported_tuning ├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration.h ├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration_rx.bin ├── 20180312_Crosshatch_Multimedia_24bit_MediumVibration_tx.bin ├── 20180405_Blueline_24bit.exported_tuning ├── 20180405_Blueline_24bit_ReducedVibration.h ├── 20180405_Blueline_24bit_ReducedVibration_rx.bin ├── 20180405_Blueline_24bit_ReducedVibration_tx.bin ├── 20180509_100_Blueline_Stereo_Protect.h ├── 20180509_Crosshatch_Protect_24bit.h ├── 510_Crosshatch_Baseline.h ├── 800_Blueline_Baseline.h ├── B1-Build325-Squeeze-Final.h ├── C1-Build325-Squeeze-Final.h ├── Crosshatch_05092018_Protect_24bit.h ├── README ├── Test1_Crosshatch_5_10_2018_onsite_final_remove_actisonic.h ├── Test1_Crosshatch_5_10_2018_onsite_final_remove_actisonic.tuning ├── convert_config_string.py ├── crus_sp_config_b1_rx.bin ├── crus_sp_config_b1_tx.bin ├── crus_sp_config_c1_rx.bin ├── crus_sp_config_c1_tx.bin └── generate_bin.sh ├── audio_effects.xml ├── audio_platform_info_tavil_b1.xml ├── audio_platform_info_tavil_c1.xml ├── audio_policy_configuration.xml ├── audio_policy_configuration_a2dp_offload_disabled.xml ├── audio_policy_configuration_bluetooth_legacy_hal.xml ├── audio_policy_volumes_b1.xml ├── audio_policy_volumes_c1.xml ├── blueline ├── AndroidBoard.mk ├── BoardConfig.mk ├── BoardConfigLineage.mk ├── device-lineage.mk ├── extract-files.py ├── init.blueline.rc ├── overlay │ └── frameworks │ │ └── base │ │ ├── core │ │ └── res │ │ │ └── res │ │ │ ├── values-mcc310-mnc004 │ │ │ └── config.xml │ │ │ ├── values-mcc311-mnc480 │ │ │ └── config.xml │ │ │ ├── values │ │ │ ├── config.xml │ │ │ └── dimens.xml │ │ │ └── xml │ │ │ └── power_profile.xml │ │ └── packages │ │ └── SystemUI │ │ └── res │ │ ├── drawable │ │ └── rounded.xml │ │ └── values │ │ ├── config.xml │ │ └── dimens.xml ├── overlay_packages │ ├── SettingsOverlayG013A │ │ ├── Android.bp │ │ ├── AndroidManifest.xml │ │ └── res │ │ │ └── drawable │ │ │ └── regulatory_info.png │ └── SettingsOverlayG013B │ │ ├── Android.bp │ │ ├── AndroidManifest.xml │ │ └── res │ │ └── drawable │ │ └── regulatory_info.png ├── proprietary-files-carriersettings.txt ├── proprietary-files-radio.txt ├── proprietary-files-vendor.txt ├── proprietary-files.txt ├── proprietary-firmware.txt └── setup-makefiles.py ├── bluetooth_hearing_aid_audio_policy_configuration.xml ├── board-info.txt ├── compatibility_matrix.xml ├── component-overrides.xml ├── config.fs ├── crosshatch ├── AndroidBoard.mk ├── BoardConfig.mk ├── BoardConfigLineage.mk ├── device-lineage.mk ├── extract-files.py ├── init.crosshatch.rc ├── overlay-lineage │ └── frameworks │ │ └── base │ │ └── packages │ │ └── overlays │ │ └── NoCutoutOverlay │ │ └── res │ │ └── values │ │ └── config.xml ├── overlay │ └── frameworks │ │ └── base │ │ ├── core │ │ └── res │ │ │ └── res │ │ │ ├── values-mcc310-mnc004 │ │ │ └── config.xml │ │ │ ├── values-mcc311-mnc480 │ │ │ └── config.xml │ │ │ ├── values │ │ │ ├── config.xml │ │ │ └── dimens.xml │ │ │ └── xml │ │ │ └── power_profile.xml │ │ └── packages │ │ └── SystemUI │ │ └── res │ │ ├── drawable │ │ └── rounded.xml │ │ ├── values-ldrtl │ │ └── dimens.xml │ │ └── values │ │ ├── config.xml │ │ └── dimens.xml ├── overlay_packages │ ├── SettingsOverlayG013C │ │ ├── Android.bp │ │ ├── AndroidManifest.xml │ │ └── res │ │ │ └── drawable │ │ │ └── regulatory_info.png │ └── SettingsOverlayG013D │ │ ├── Android.bp │ │ ├── AndroidManifest.xml │ │ └── res │ │ └── drawable │ │ └── regulatory_info.png ├── proprietary-files-carriersettings.txt ├── proprietary-files-radio.txt ├── proprietary-files-vendor.txt ├── proprietary-files.txt ├── proprietary-firmware.txt └── setup-makefiles.py ├── default-permissions.xml ├── default_volume_tables.xml ├── device-blueline.mk ├── device-common.mk ├── device-crosshatch.mk ├── device-lineage.mk ├── device.mk ├── device_framework_matrix.xml ├── dumpstate ├── Android.bp ├── DumpstateDevice.cpp ├── DumpstateDevice.h ├── android.hardware.dumpstate@1.1-service.crosshatch.rc └── service.cpp ├── extract-files.py ├── factory-images_blueline └── generate-factory-images-package.sh ├── factory-images_crosshatch └── generate-factory-images-package.sh ├── felica ├── loaderservice_updater_1.lss └── loaderservice_updater_2.lss ├── fstab.hardware ├── fstab.mainline.hardware ├── fstab.persist ├── fuzzy_fastboot ├── .gitignore ├── checksum_parser.py ├── config.xml ├── test.sh └── validator.py ├── gps.conf ├── graphite_ipc_platform_info.xml ├── health ├── Android.bp ├── BatteryRechargingControl.cpp ├── BatteryRechargingControl.h └── Health.cpp ├── init.edge_sense.sh ├── init.fingerprint.sh ├── init.firstboot.sh ├── init.hardware.diag.rc.user ├── init.hardware.diag.rc.userdebug ├── init.hardware.mpssrfs.rc.user ├── init.hardware.mpssrfs.rc.userdebug ├── init.hardware.rc ├── init.hardware.usb.rc ├── init.hardware.wlc.rc.userdebug ├── init.hardware.xr.rc ├── init.insmod.blueline.cfg ├── init.insmod.crosshatch.cfg ├── init.insmod.sh ├── init.logging.rc ├── init.power.rc ├── init.qcom.devstart.sh ├── init.qcom.ipastart.sh ├── init.radio.sh ├── init.ramoops.sh ├── init.recovery.hardware.device.rc ├── init.recovery.hardware.rc ├── keymaster ├── Android.bp └── wait_for_strongbox.cpp ├── lineage.dependencies ├── lineage_blueline.mk ├── lineage_crosshatch.mk ├── lineage_manifest.xml ├── lowi.conf ├── manifest.xml ├── media_codecs.xml ├── media_codecs_performance.xml ├── media_profiles_V1_0.xml ├── mixer_paths_tavil_b1.xml ├── mixer_paths_tavil_c1.xml ├── nfc ├── com.google.hardware.pixel.japan.xml ├── libese-nxp.conf ├── libnfc-nci.conf ├── libnfc-nxp.blueline.conf ├── libnfc-nxp.blueline.ese.conf ├── libnfc-nxp.blueline.uicc.conf ├── libnfc-nxp.crosshatch.conf ├── libnfc-nxp.crosshatch.ese.conf ├── libnfc-nxp.crosshatch.uicc.conf ├── manifest_se_SIM1.xml └── manifest_se_eSE1.xml ├── overlay-lineage ├── frameworks │ └── base │ │ ├── core │ │ └── res │ │ │ └── res │ │ │ └── values │ │ │ ├── arrays.xml │ │ │ └── config.xml │ │ └── packages │ │ ├── SettingsProvider │ │ └── res │ │ │ └── values │ │ │ └── defaults.xml │ │ └── SystemUI │ │ └── res │ │ └── values │ │ └── config.xml ├── lineage-sdk │ └── lineage │ │ └── res │ │ └── res │ │ └── values │ │ └── config.xml └── packages │ ├── apps │ ├── Dialer │ │ └── java │ │ │ └── com │ │ │ └── android │ │ │ └── dialer │ │ │ └── callrecord │ │ │ └── res │ │ │ └── values │ │ │ └── config.xml │ ├── Settings │ │ └── res │ │ │ └── values │ │ │ └── lineage_config.xml │ └── SimpleDeviceConfig │ │ └── res │ │ └── values │ │ └── config.xml │ └── services │ └── Telephony │ └── res │ └── values │ └── config.xml ├── overlay ├── frameworks │ └── base │ │ ├── core │ │ └── res │ │ │ └── res │ │ │ ├── values-mcc440-mnc20 │ │ │ └── config.xml │ │ │ └── values │ │ │ ├── config.xml │ │ │ ├── strings.xml │ │ │ └── symbols.xml │ │ └── packages │ │ ├── SettingsLib │ │ └── res │ │ │ └── values-mcc440-mnc20 │ │ │ └── config.xml │ │ └── SystemUI │ │ └── res │ │ └── values │ │ └── config.xml └── packages │ ├── apps │ ├── Nfc │ │ └── res │ │ │ └── values │ │ │ └── config.xml │ └── Settings │ │ └── res │ │ ├── values-mcc262-mnc01 │ │ └── strings.xml │ │ └── values │ │ ├── bools.xml │ │ └── config.xml │ └── services │ ├── Telecom │ └── res │ │ └── values │ │ └── config.xml │ └── Telephony │ └── res │ └── values │ └── config.xml ├── p2p_supplicant_overlay.conf ├── parts ├── Android.bp ├── AndroidManifest.xml ├── proguard.flags └── src │ └── org │ └── lineageos │ └── settings │ ├── BootCompletedReceiver.java │ └── EuiccDisabler.java ├── permissions └── com.google.hardware.camera.easel_2018.xml ├── powerhint.json ├── powerstats ├── Android.bp ├── android.hardware.power.stats@1.0-service.pixel.rc └── service.cpp ├── product.prop ├── qti_whitelist.xml ├── recovery.wipe ├── rro_overlays ├── ConnectivityOverlay │ ├── Android.bp │ ├── AndroidManifest.xml │ └── res │ │ └── values │ │ └── config.xml └── WifiOverlay │ ├── Android.bp │ ├── AndroidManifest.xml │ ├── OWNERS │ └── res │ └── values │ └── config.xml ├── sdm845 ├── kernel-headers │ ├── asm-generic │ │ └── ioctls.h │ ├── drm │ │ ├── msm_drm.h │ │ ├── msm_drm_pp.h │ │ └── sde_drm.h │ ├── linux │ │ ├── avtimer.h │ │ ├── esoc_ctrl.h │ │ ├── ion.h │ │ ├── ipa_qmi_service_v01.h │ │ ├── mdss_rotator.h │ │ ├── mfd │ │ │ ├── msm-adie-codec.h │ │ │ └── wcd9xxx │ │ │ │ ├── wcd9320_registers.h │ │ │ │ └── wcd9xxx_registers.h │ │ ├── msm-core-interface.h │ │ ├── msm_adsp.h │ │ ├── msm_audio.h │ │ ├── msm_audio_aac.h │ │ ├── msm_audio_ac3.h │ │ ├── msm_audio_alac.h │ │ ├── msm_audio_amrnb.h │ │ ├── msm_audio_amrwb.h │ │ ├── msm_audio_amrwbplus.h │ │ ├── msm_audio_ape.h │ │ ├── msm_audio_calibration.h │ │ ├── msm_audio_mvs.h │ │ ├── msm_audio_qcp.h │ │ ├── msm_audio_sbc.h │ │ ├── msm_audio_voicememo.h │ │ ├── msm_audio_wma.h │ │ ├── msm_audio_wmapro.h │ │ ├── msm_dsps.h │ │ ├── msm_ion.h │ │ ├── msm_ipa.h │ │ ├── msm_kgsl.h │ │ ├── msm_mdp.h │ │ ├── msm_mdp_ext.h │ │ ├── msm_pft.h │ │ ├── msm_rmnet.h │ │ ├── msm_rotator.h │ │ ├── msm_thermal_ioctl.h │ │ ├── msm_vidc_dec.h │ │ ├── msm_vidc_enc.h │ │ ├── qseecom.h │ │ ├── rmnet_data.h │ │ ├── rmnet_ipa_fd_ioctl.h │ │ ├── sockev.h │ │ ├── sockios.h │ │ ├── spcom.h │ │ ├── v4l2-controls.h │ │ ├── videodev2.h │ │ └── wcd-spi-ac-params.h │ ├── media │ │ ├── cam_cpas.h │ │ ├── cam_defs.h │ │ ├── cam_fd.h │ │ ├── cam_icp.h │ │ ├── cam_isp.h │ │ ├── cam_isp_ife.h │ │ ├── cam_isp_vfe.h │ │ ├── cam_jpeg.h │ │ ├── cam_lrme.h │ │ ├── cam_req_mgr.h │ │ ├── cam_sensor.h │ │ ├── cam_sync.h │ │ ├── msm_cam_sensor.h │ │ ├── msm_camera.h │ │ ├── msm_camsensor_sdk.h │ │ ├── msm_fd.h │ │ ├── msm_gemini.h │ │ ├── msm_gestures.h │ │ ├── msm_isp.h │ │ ├── msm_jpeg.h │ │ ├── msm_jpeg_dma.h │ │ ├── msm_media_info.h │ │ ├── msm_mercury.h │ │ ├── msm_sde_rotator.h │ │ ├── msm_vidc.h │ │ ├── msm_vpu.h │ │ ├── msmb_camera.h │ │ ├── msmb_generic_buf_mgr.h │ │ ├── msmb_isp.h │ │ ├── msmb_ispif.h │ │ └── msmb_pproc.h │ ├── scsi │ │ └── ufs │ │ │ ├── ioctl.h │ │ │ └── ufs.h │ ├── sound │ │ ├── asound.h │ │ ├── audio_effects.h │ │ ├── compress_offload.h │ │ ├── compress_params.h │ │ ├── devdep_params.h │ │ ├── lsm_params.h │ │ ├── msmcal-hwdep.h │ │ ├── voice_params.h │ │ ├── voice_svc.h │ │ └── wcd-dsp-glink.h │ └── video │ │ └── msm_hdmi_modes.h └── original-kernel-headers │ ├── asm-generic │ └── ioctls.h │ ├── drm │ ├── msm_drm.h │ ├── msm_drm_pp.h │ └── sde_drm.h │ ├── linux │ ├── avtimer.h │ ├── esoc_ctrl.h │ ├── ion.h │ ├── ipa_qmi_service_v01.h │ ├── mdss_rotator.h │ ├── mfd │ │ ├── msm-adie-codec.h │ │ └── wcd9xxx │ │ │ ├── wcd9320_registers.h │ │ │ └── wcd9xxx_registers.h │ ├── msm-core-interface.h │ ├── msm_adsp.h │ ├── msm_audio.h │ ├── msm_audio_aac.h │ ├── msm_audio_ac3.h │ ├── msm_audio_alac.h │ ├── msm_audio_amrnb.h │ ├── msm_audio_amrwb.h │ ├── msm_audio_amrwbplus.h │ ├── msm_audio_ape.h │ ├── msm_audio_calibration.h │ ├── msm_audio_mvs.h │ ├── msm_audio_qcp.h │ ├── msm_audio_sbc.h │ ├── msm_audio_voicememo.h │ ├── msm_audio_wma.h │ ├── msm_audio_wmapro.h │ ├── msm_dsps.h │ ├── msm_ion.h │ ├── msm_ipa.h │ ├── msm_kgsl.h │ ├── msm_mdp.h │ ├── msm_mdp_ext.h │ ├── msm_pft.h │ ├── msm_rmnet.h │ ├── msm_rotator.h │ ├── msm_thermal_ioctl.h │ ├── msm_vidc_dec.h │ ├── msm_vidc_enc.h │ ├── qseecom.h │ ├── rmnet_data.h │ ├── rmnet_ipa_fd_ioctl.h │ ├── sockev.h │ ├── sockios.h │ ├── spcom.h │ ├── v4l2-controls.h │ ├── videodev2.h │ └── wcd-spi-ac-params.h │ ├── media │ ├── cam_cpas.h │ ├── cam_defs.h │ ├── cam_fd.h │ ├── cam_icp.h │ ├── cam_isp.h │ ├── cam_isp_ife.h │ ├── cam_isp_vfe.h │ ├── cam_jpeg.h │ ├── cam_lrme.h │ ├── cam_req_mgr.h │ ├── cam_sensor.h │ ├── cam_sync.h │ ├── msm_cam_sensor.h │ ├── msm_camera.h │ ├── msm_camsensor_sdk.h │ ├── msm_fd.h │ ├── msm_gemini.h │ ├── msm_gestures.h │ ├── msm_isp.h │ ├── msm_jpeg.h │ ├── msm_jpeg_dma.h │ ├── msm_media_info.h │ ├── msm_mercury.h │ ├── msm_sde_rotator.h │ ├── msm_vidc.h │ ├── msm_vpu.h │ ├── msmb_camera.h │ ├── msmb_generic_buf_mgr.h │ ├── msmb_isp.h │ ├── msmb_ispif.h │ └── msmb_pproc.h │ ├── scsi │ └── ufs │ │ ├── ioctl.h │ │ └── ufs.h │ ├── sound │ ├── asound.h │ ├── audio_effects.h │ ├── compress_offload.h │ ├── compress_params.h │ ├── devdep_params.h │ ├── lsm_params.h │ ├── msmcal-hwdep.h │ ├── voice_params.h │ ├── voice_svc.h │ └── wcd-dsp-glink.h │ └── video │ └── msm_hdmi_modes.h ├── sec_config ├── self-extractors ├── PART1 ├── PART2 ├── PART3 ├── PROLOGUE ├── extract-lists.txt ├── google_devices │ ├── COPYRIGHT │ ├── LICENSE │ └── staging │ │ ├── Android.mk.template │ │ ├── BoardConfigPartial.mk │ │ └── device-partial.mk ├── qcom │ ├── COPYRIGHT │ ├── LICENSE │ └── staging │ │ ├── Android.bp.txt │ │ ├── Android.mk.template │ │ ├── BoardConfigPartial.mk │ │ └── device-partial.mk └── root │ ├── android-info.txt │ └── proprietary │ ├── BoardConfigVendor.mk │ └── device-vendor.mk ├── self-extractors_blueline ├── PART1 ├── PART2 ├── PART3 ├── PROLOGUE ├── extract-lists.txt ├── google_devices │ ├── COPYRIGHT │ ├── LICENSE │ └── staging │ │ ├── Android.mk.template │ │ ├── BoardConfigPartial.mk │ │ └── device-partial.mk ├── qcom │ ├── COPYRIGHT │ ├── LICENSE │ └── staging │ │ ├── Android.bp.txt │ │ ├── Android.mk.template │ │ ├── BoardConfigPartial.mk │ │ └── device-partial.mk └── root │ ├── android-info.txt │ └── proprietary │ ├── BoardConfigVendor.mk │ └── device-vendor.mk ├── sensors └── hals.conf ├── sepolicy-lineage ├── dynamic │ └── hal_lineage_livedisplay_qti.te └── vendor │ ├── file_contexts │ └── hal_lineage_livedisplay.te ├── sepolicy ├── OWNERS ├── PREUPLOAD.cfg ├── crosshatch-sepolicy.mk ├── private │ ├── certs │ │ └── wfcactivation.x509.pem │ ├── dataservice_app.te │ ├── genfs_contexts │ ├── keys.conf │ ├── mac_permissions.xml │ ├── priv_app.te │ ├── radio.te │ ├── recovery.te │ ├── seapp_contexts │ ├── service.te │ ├── service_contexts │ ├── sprint_hidden_menu.te │ ├── system_server.te │ ├── toolbox.te │ ├── uscc_omadm.te │ ├── vzw_omadm_connmo.te │ ├── vzw_omadm_dcmo.te │ ├── vzw_omadm_diagmon.te │ ├── vzw_omadm_trigger.te │ └── wfc_activation_app.te ├── public │ ├── charger.te │ ├── dataservice_app.te │ ├── file.te │ └── te_macros ├── system_ext │ └── private │ │ └── platform_app.te ├── tracking_denials │ ├── dumpstate.te │ ├── hal_drm_widevine.te │ ├── hal_dumpstate_impl.te │ ├── hal_health_default.te │ ├── hal_wlc.te │ ├── incidentd.te │ ├── kernel.te │ └── surfaceflinger.te └── vendor │ ├── google │ ├── bug_map │ ├── cbrs_setup.te │ ├── certs │ │ ├── app.x509.pem │ │ ├── com_google_mds.x509.pem │ │ ├── easel.x509.pem │ │ ├── pulse-release.x509.pem │ │ ├── tango.x509.pem │ │ ├── tango_release.x509.pem │ │ └── tango_userdev.x509.pem │ ├── citadeld.te │ ├── device.te │ ├── fastbootd.te │ ├── file.te │ ├── file_contexts │ ├── fsck.te │ ├── genfs_contexts │ ├── google_camera_app.te │ ├── grilservice_app.te │ ├── hal_confirmationui.te │ ├── hal_contexthub.te │ ├── hal_fingerprint.te │ ├── hal_health_default.te │ ├── hal_health_storage_default.te │ ├── hal_keymaster_citadel.te │ ├── hal_radioext_default.te │ ├── hal_usb_gadget_impl.te │ ├── hal_wifi_ext.te │ ├── hwservice.te │ ├── hwservice_contexts │ ├── init-devstart-sh.te │ ├── init-fingerprint.te │ ├── init-firstboot.te │ ├── keys.conf │ ├── mac_permissions.xml │ ├── mediacodec.te │ ├── mediaswcodec.te │ ├── modem_diagnostics.te │ ├── modem_svc.te │ ├── property.te │ ├── property_contexts │ ├── ramoops.te │ ├── seapp_contexts │ ├── service.te │ ├── service_contexts │ ├── shell.te │ └── vendor_init.te │ ├── qcom │ ├── common │ │ ├── adsprpcd.te │ │ ├── app.te │ │ ├── attributes │ │ ├── audioserver.te │ │ ├── bluetooth.te │ │ ├── bootanim.te │ │ ├── cameraserver.te │ │ ├── cdsprpcd.te │ │ ├── chre.te │ │ ├── cnd.te │ │ ├── con_monitor.te │ │ ├── dataservice_app.te │ │ ├── device.te │ │ ├── domain.te │ │ ├── dumpstate.te │ │ ├── easel.te │ │ ├── easelservice_app.te │ │ ├── file.te │ │ ├── file_contexts │ │ ├── fsck.te │ │ ├── ftmd.te │ │ ├── genfs_contexts │ │ ├── hal_audio_default.te │ │ ├── hal_bluetooth_default.te │ │ ├── hal_bootctl.te │ │ ├── hal_camera.te │ │ ├── hal_camera_default.te │ │ ├── hal_cas_default.te │ │ ├── hal_drm_default.te │ │ ├── hal_drm_widevine.te │ │ ├── hal_dumpstate_impl.te │ │ ├── hal_fingerprint.te │ │ ├── hal_gatekeeper.te │ │ ├── hal_gatekeeper_qti.te │ │ ├── hal_gnss_qti.te │ │ ├── hal_graphics_allocator_default.te │ │ ├── hal_graphics_composer_default.te │ │ ├── hal_health_default.te │ │ ├── hal_imsrtp.te │ │ ├── hal_keymaster_qti.te │ │ ├── hal_light.te │ │ ├── hal_light_default.te │ │ ├── hal_lineage_health_default.te │ │ ├── hal_memtrack_default.te │ │ ├── hal_neuralnetworks_paintbox.te │ │ ├── hal_nfc_default.te │ │ ├── hal_power_default.te │ │ ├── hal_power_stats_default.te │ │ ├── hal_rcsservice.te │ │ ├── hal_secure_element_default.te │ │ ├── hal_sensors_default.te │ │ ├── hal_telephony.te │ │ ├── hal_tetheroffload_default.te │ │ ├── hal_tui_comm.te │ │ ├── hal_usb_impl.te │ │ ├── hal_vibrator_default.te │ │ ├── hal_wifi_default.te │ │ ├── hal_wifi_ext.te │ │ ├── hal_wifi_hostapd.te │ │ ├── hal_wifi_supplicant_default.te │ │ ├── hal_wlc.te │ │ ├── hardware_info_app.te │ │ ├── healthd.te │ │ ├── hwservice.te │ │ ├── hwservice_contexts │ │ ├── ims.te │ │ ├── init-devstart-sh.te │ │ ├── init-insmod-sh.te │ │ ├── init-ipastart-sh.te │ │ ├── init.te │ │ ├── init_radio.te │ │ ├── ioctl_defines │ │ ├── ioctl_macros │ │ ├── irqbalance.te │ │ ├── irsc_util.te │ │ ├── kernel.te │ │ ├── location.te │ │ ├── logger_app.te │ │ ├── mediacodec.te │ │ ├── mediaextractor.te │ │ ├── mediaserver.te │ │ ├── mediatranscoding.te │ │ ├── mm-pp-daemon.te │ │ ├── netmgrd.te │ │ ├── netutils_wrapper.te │ │ ├── omadm.te │ │ ├── pd_services.te │ │ ├── per_mgr.te │ │ ├── per_proxy.te │ │ ├── platform_app.te │ │ ├── port-bridge.te │ │ ├── property.te │ │ ├── property_contexts │ │ ├── qlogd.te │ │ ├── qtelephony.te │ │ ├── qti.te │ │ ├── qtidataservices_app.te │ │ ├── radio.te │ │ ├── ramdump_app.te │ │ ├── rfs_access.te │ │ ├── ril_config_service.te │ │ ├── rild.te │ │ ├── rmt_storage.te │ │ ├── seapp_contexts │ │ ├── secure_ui_service_app.te │ │ ├── sensors.te │ │ ├── service.te │ │ ├── service_contexts │ │ ├── shell.te │ │ ├── ssr_detector.te │ │ ├── ssr_diag.te │ │ ├── ssr_setup.te │ │ ├── subsystem_ramdump.te │ │ ├── surfaceflinger.te │ │ ├── system_app.te │ │ ├── system_server.te │ │ ├── tango_core.te │ │ ├── tcpdump_logger.te │ │ ├── tee.te │ │ ├── thermal-engine.te │ │ ├── time_daemon.te │ │ ├── timeservice_app.te │ │ ├── ueventd.te │ │ ├── update_engine_common.te │ │ ├── vendor_init.te │ │ ├── vndservice.te │ │ ├── vndservice_contexts │ │ ├── vold.te │ │ ├── wcnss_service.te │ │ ├── wifi_sniffer.te │ │ └── zygote.te │ ├── compat │ │ └── file_contexts │ └── sdm845 │ │ ├── file_contexts │ │ ├── genfs_contexts │ │ ├── hal_neuralnetworks.te │ │ └── update_engine_common.te │ └── verizon │ ├── keys.conf │ ├── mac_permissions.xml │ ├── obdm_app.te │ ├── seapp_contexts │ └── verizon.x509.pem ├── setup-makefiles.py ├── sound_trigger_mixer_paths_wcd9340.xml ├── sound_trigger_platform_info.xml ├── teeui └── tests │ ├── blueline │ ├── Android.bp │ ├── TEST_MAPPING │ └── test_main.cpp │ └── crosshatch │ ├── Android.bp │ ├── TEST_MAPPING │ └── test_main.cpp ├── thermal-engine-blueline-novr-evt.conf ├── thermal-engine-blueline-novr-prod.conf ├── thermal-engine-blueline-vr-evt.conf ├── thermal-engine-blueline-vr-prod.conf ├── thermal-engine-crosshatch-novr-evt.conf ├── thermal-engine-crosshatch-novr-prod.conf ├── thermal-engine-crosshatch-vr-evt.conf ├── thermal-engine-crosshatch-vr-prod.conf ├── thermal_info_config_blueline.json ├── thermal_info_config_blueline_evt.json ├── thermal_info_config_crosshatch.json ├── thermal_info_config_crosshatch_evt.json ├── ueventd.hardware.rc ├── uinput-fpc.idc ├── uinput-fpc.kl ├── usb ├── .clang-format ├── gadget │ ├── Android.bp │ ├── UsbGadget.cpp │ ├── UsbGadget.h │ ├── android.hardware.usb.gadget-service.crosshatch.rc │ ├── android.hardware.usb.gadget@1.1-service.crosshatch.xml │ └── service_gadget.cpp └── usb │ ├── Android.bp │ ├── Usb.cpp │ ├── Usb.h │ ├── android.hardware.usb-service.crosshatch.rc │ ├── android.hardware.usb-service.crosshatch.xml │ └── service.cpp ├── utils.mk ├── vendor.prop ├── vf ├── OWNERS ├── aosp_crosshatch_vf.mk ├── framework_item_list.txt ├── framework_misc_info_keys.txt └── vendor_item_list.txt ├── vibrator ├── Android.bp ├── OWNERS ├── Vibrator.cpp ├── Vibrator.h ├── android.hardware.vibrator-service.crosshatch.rc ├── android.hardware.vibrator-service.crosshatch.xml ├── cs40l20 │ ├── cs40l20.bin │ ├── cs40l20.wmfw │ └── wav_wavetable │ │ ├── 09_POP(SNAP)_0503.json │ │ ├── 09_POP(SNAP)_0503.wav │ │ ├── 10_THUD_0503.json │ │ ├── 10_THUD_0503.wav │ │ ├── 11_The_big_adventure.json │ │ ├── 12_Copycat.json │ │ ├── 13_Crackle.json │ │ ├── 14_Flutterby.json │ │ ├── 15_Hotline.json │ │ ├── 16_Leaps_and_bounds.json │ │ ├── 17_Lollipop.json │ │ ├── 18_Lost_and_found.json │ │ ├── 19_Mash_up.json │ │ ├── 20_Monkey_around.json │ │ ├── 21_Schools_out.json │ │ ├── 22_Zen_too.json │ │ ├── 23_Extra1_100x8.json │ │ ├── README │ │ ├── [#1] 00 (23%).json │ │ ├── [#1] 00 (23%).wav │ │ ├── [#2] 00 (39%).json │ │ ├── [#2] 00 (39%).wav │ │ ├── [#3] 00 (55%).json │ │ ├── [#3] 00 (55%).wav │ │ ├── [#4] 00 (75%).json │ │ ├── [#4] 00 (75%).wav │ │ ├── [#5] 11-2 (-3).json │ │ ├── [#5] 11-2 (-3).wav │ │ ├── [#6] Double (L) = #1 + #2.json │ │ ├── [#6] Double (L) = #1 + #2.wav │ │ ├── [#7] Double (M) = #2 + #3.json │ │ ├── [#7] Double (M) = #2 + #3.wav │ │ ├── [#8] Double (H) = #3 + #4.json │ │ ├── [#8] Double (H) = #3 + #4.wav │ │ └── continuous_sine_f0.json ├── drv2624 │ └── drv2624.bin └── service.cpp ├── voice_processing ├── Android.bp └── voice_processing_descriptors.c ├── wifi_concurrency_cfg.txt ├── wpa_supplicant_overlay.conf └── wpa_supplicant_wcn.conf /.clang-format: -------------------------------------------------------------------------------- 1 | BasedOnStyle: Google 2 | AccessModifierOffset: -2 3 | AllowShortFunctionsOnASingleLine: Inline 4 | ColumnLimit: 99 5 | CommentPragmas: NOLINT:.* 6 | DerivePointerAlignment: false 7 | IndentWidth: 4 8 | PointerAlignment: Right 9 | TabWidth: 4 10 | UseTab: Never 11 | PenaltyExcessCharacter: 32 12 | AllowShortIfStatementsOnASingleLine: false 13 | SpacesBeforeTrailingComments: 2 14 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | edk2 2 | -------------------------------------------------------------------------------- /METADATA: -------------------------------------------------------------------------------- 1 | third_party { 2 | license_note: "would be NOTICE save for sdm845/original-kernel-headers/" 3 | license_type: RESTRICTED 4 | } 5 | -------------------------------------------------------------------------------- /PREUPLOAD.cfg: -------------------------------------------------------------------------------- 1 | [Builtin Hooks] 2 | clang_format = true 3 | 4 | [Builtin Hooks Options] 5 | clang_format = --commit ${PREUPLOAD_COMMIT} --style file --extensions c,h,cc,cpp 6 | -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Bluetooth_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Bluetooth_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Codec_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Codec_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/General_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/General_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Global_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Global_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Handset_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Handset_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Hdmi_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Hdmi_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Headset_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Headset_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/Speaker_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/Speaker_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-b1-snd-card/adsp_avs_config.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-b1-snd-card/adsp_avs_config.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Bluetooth_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Bluetooth_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Codec_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Codec_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/General_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/General_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Global_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Global_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Handset_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Handset_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Hdmi_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Hdmi_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Headset_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Headset_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/Speaker_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/Speaker_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-c1-snd-card/adsp_avs_config.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-c1-snd-card/adsp_avs_config.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Bluetooth_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Bluetooth_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Codec_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Codec_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/General_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/General_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Global_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Global_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Handset_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Handset_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Hdmi_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Hdmi_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Headset_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Headset_cal.acdb -------------------------------------------------------------------------------- /acdbdata/OEM/sdm845-tavil-snd-card/Speaker_cal.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/OEM/sdm845-tavil-snd-card/Speaker_cal.acdb -------------------------------------------------------------------------------- /acdbdata/adsp_avs_config.acdb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/acdbdata/adsp_avs_config.acdb -------------------------------------------------------------------------------- /aosp_blueline_hwasan.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright 2019 The Android Open Source Project 3 | # 4 | # Licensed under the Apache License, Version 2.0 (the "License"); 5 | # you may not use this file except in compliance with the License. 6 | # You may obtain a copy of the License at 7 | # 8 | # http://www.apache.org/licenses/LICENSE-2.0 9 | # 10 | # Unless required by applicable law or agreed to in writing, software 11 | # distributed under the License is distributed on an "AS IS" BASIS, 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | # See the License for the specific language governing permissions and 14 | # limitations under the License. 15 | # 16 | 17 | $(call inherit-product, device/google/crosshatch/aosp_blueline.mk) 18 | PRODUCT_NAME := aosp_blueline_hwasan 19 | 20 | # Add "hwaddress" as a global sanitizer if it's missing. 21 | ifeq ($(filter hwaddress,$(SANITIZE_TARGET)),) 22 | SANITIZE_TARGET := $(strip $(SANITIZE_TARGET) hwaddress) 23 | endif 24 | -------------------------------------------------------------------------------- /aosp_crosshatch_hwasan.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright 2019 The Android Open Source Project 3 | # 4 | # Licensed under the Apache License, Version 2.0 (the "License"); 5 | # you may not use this file except in compliance with the License. 6 | # You may obtain a copy of the License at 7 | # 8 | # http://www.apache.org/licenses/LICENSE-2.0 9 | # 10 | # Unless required by applicable law or agreed to in writing, software 11 | # distributed under the License is distributed on an "AS IS" BASIS, 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | # See the License for the specific language governing permissions and 14 | # limitations under the License. 15 | # 16 | 17 | $(call inherit-product, device/google/crosshatch/aosp_crosshatch.mk) 18 | PRODUCT_NAME := aosp_crosshatch_hwasan 19 | 20 | # Add "hwaddress" as a global sanitizer if it's missing. 21 | ifeq ($(filter hwaddress,$(SANITIZE_TARGET)),) 22 | SANITIZE_TARGET := $(strip $(SANITIZE_TARGET) hwaddress) 23 | endif 24 | -------------------------------------------------------------------------------- /audio/20180301_Crosshatch_Voice_24bit.exported_tuning: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180301_Crosshatch_Voice_24bit.exported_tuning -------------------------------------------------------------------------------- /audio/20180301_Crosshatch_Voice_24bit_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180301_Crosshatch_Voice_24bit_rx.bin -------------------------------------------------------------------------------- /audio/20180301_Crosshatch_Voice_24bit_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180301_Crosshatch_Voice_24bit_tx.bin -------------------------------------------------------------------------------- /audio/20180307_Blueline_Voice_24bit.exported_tuning: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180307_Blueline_Voice_24bit.exported_tuning -------------------------------------------------------------------------------- /audio/20180307_Blueline_Voice_24bit_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180307_Blueline_Voice_24bit_rx.bin -------------------------------------------------------------------------------- /audio/20180307_Blueline_Voice_24bit_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180307_Blueline_Voice_24bit_tx.bin -------------------------------------------------------------------------------- /audio/20180312_Blueline_Multimedia_24bit_MediumVibration.exported_tuning: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Blueline_Multimedia_24bit_MediumVibration.exported_tuning -------------------------------------------------------------------------------- /audio/20180312_Blueline_Multimedia_24bit_MediumVibration_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Blueline_Multimedia_24bit_MediumVibration_rx.bin -------------------------------------------------------------------------------- /audio/20180312_Blueline_Multimedia_24bit_MediumVibration_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Blueline_Multimedia_24bit_MediumVibration_tx.bin -------------------------------------------------------------------------------- /audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration.exported_tuning: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration.exported_tuning -------------------------------------------------------------------------------- /audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_rx.bin -------------------------------------------------------------------------------- /audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180312_Crosshatch_Multimedia_24bit_MediumVibration_tx.bin -------------------------------------------------------------------------------- /audio/20180405_Blueline_24bit.exported_tuning: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180405_Blueline_24bit.exported_tuning -------------------------------------------------------------------------------- /audio/20180405_Blueline_24bit_ReducedVibration_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180405_Blueline_24bit_ReducedVibration_rx.bin -------------------------------------------------------------------------------- /audio/20180405_Blueline_24bit_ReducedVibration_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/20180405_Blueline_24bit_ReducedVibration_tx.bin -------------------------------------------------------------------------------- /audio/README: -------------------------------------------------------------------------------- 1 | Example usage: 2 | 3 | $ python3.5 convert_config_string.py txt 510_Crosshatch_Baseline.h crus_sp_config_c1_rx.bin crus_sp_config_c1_tx.bin 4 | CSPL config string conversion used for android system 5 | python version: sys.version_info(major=3, minor=5, micro=3, releaselevel='final', serial=0) 6 | Current Os name: posix 7 | 24 bit detected 8 | wrote file: crus_sp_config_c1_rx.bin 9 | wrote file: crus_sp_config_c1_tx.bin 10 | 11 | -------------------------------------------------------------------------------- /audio/crus_sp_config_b1_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_b1_rx.bin -------------------------------------------------------------------------------- /audio/crus_sp_config_b1_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_b1_tx.bin -------------------------------------------------------------------------------- /audio/crus_sp_config_c1_rx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_c1_rx.bin -------------------------------------------------------------------------------- /audio/crus_sp_config_c1_tx.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/audio/crus_sp_config_c1_tx.bin -------------------------------------------------------------------------------- /audio/generate_bin.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # B1 4 | python3.5 convert_config_string.py txt 20180509_100_Blueline_Stereo_Protect.h crus_sp_config_b1_rx.bin crus_sp_config_b1_tx.bin 5 | 6 | # C1 7 | python3.5 convert_config_string.py txt 20180509_Crosshatch_Protect_24bit.h crus_sp_config_c1_rx.bin crus_sp_config_c1_tx.bin 8 | -------------------------------------------------------------------------------- /blueline/AndroidBoard.mk: -------------------------------------------------------------------------------- 1 | ../crosshatch/AndroidBoard.mk -------------------------------------------------------------------------------- /blueline/BoardConfig.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2016 The Android Open-Source Project 3 | # 4 | # Licensed under the Apache License, Version 2.0 (the "License"); 5 | # you may not use this file except in compliance with the License. 6 | # You may obtain a copy of the License at 7 | # 8 | # http://www.apache.org/licenses/LICENSE-2.0 9 | # 10 | # Unless required by applicable law or agreed to in writing, software 11 | # distributed under the License is distributed on an "AS IS" BASIS, 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | # See the License for the specific language governing permissions and 14 | # limitations under the License. 15 | # 16 | 17 | ifdef PHONE_CAR_BOARD_PRODUCT 18 | include device/google_car/$(PHONE_CAR_BOARD_PRODUCT)/BoardConfig.mk 19 | else 20 | TARGET_BOOTLOADER_BOARD_NAME := blueline 21 | TARGET_SCREEN_DENSITY := 440 22 | TARGET_RECOVERY_UI_MARGIN_HEIGHT := 20 23 | 24 | include device/google/crosshatch/BoardConfig-common.mk 25 | endif 26 | 27 | include device/google/crosshatch/blueline/BoardConfigLineage.mk 28 | -------------------------------------------------------------------------------- /blueline/BoardConfigLineage.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018-2021 The LineageOS Project 3 | # 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | include device/google/crosshatch/BoardConfigLineage.mk 8 | 9 | include vendor/google/blueline/BoardConfigVendor.mk 10 | -------------------------------------------------------------------------------- /blueline/device-lineage.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018-2021 The LineageOS Project 3 | # 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | $(call inherit-product, device/google/crosshatch/device-lineage.mk) 8 | -------------------------------------------------------------------------------- /blueline/overlay/frameworks/base/core/res/res/values/dimens.xml: -------------------------------------------------------------------------------- 1 | 2 | 18 | 19 | 20 | 21 | 28px 22 | 23 | -------------------------------------------------------------------------------- /blueline/overlay/frameworks/base/packages/SystemUI/res/drawable/rounded.xml: -------------------------------------------------------------------------------- 1 | 14 | 19 | 20 | 23 | 24 | 25 | -------------------------------------------------------------------------------- /blueline/overlay_packages/SettingsOverlayG013A/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | runtime_resource_overlay { 6 | name: "SettingsOverlayG013A", 7 | product_specific: true, 8 | } 9 | -------------------------------------------------------------------------------- /blueline/overlay_packages/SettingsOverlayG013A/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 4 | 5 | 9 | -------------------------------------------------------------------------------- /blueline/overlay_packages/SettingsOverlayG013A/res/drawable/regulatory_info.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/blueline/overlay_packages/SettingsOverlayG013A/res/drawable/regulatory_info.png -------------------------------------------------------------------------------- /blueline/overlay_packages/SettingsOverlayG013B/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | runtime_resource_overlay { 6 | name: "SettingsOverlayG013B", 7 | product_specific: true, 8 | } 9 | -------------------------------------------------------------------------------- /blueline/overlay_packages/SettingsOverlayG013B/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 4 | 5 | 9 | -------------------------------------------------------------------------------- /blueline/overlay_packages/SettingsOverlayG013B/res/drawable/regulatory_info.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/blueline/overlay_packages/SettingsOverlayG013B/res/drawable/regulatory_info.png -------------------------------------------------------------------------------- /blueline/proprietary-firmware.txt: -------------------------------------------------------------------------------- 1 | # All firmware images are extracted from Google factory images for each new ASB 2 | 3 | abl.img;AB 4 | aop.img;AB 5 | cmnlib.img;AB 6 | cmnlib64.img;AB 7 | devcfg.img;AB 8 | hyp.img;AB 9 | keymaster.img;AB 10 | modem.img;AB 11 | qupfw.img;AB 12 | tz.img;AB 13 | xbl.img;AB 14 | xbl_config.img;AB 15 | -------------------------------------------------------------------------------- /blueline/setup-makefiles.py: -------------------------------------------------------------------------------- 1 | #!./extract-files.py --regenerate_makefiles 2 | -------------------------------------------------------------------------------- /bluetooth_hearing_aid_audio_policy_configuration.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 19 | 20 | 21 | -------------------------------------------------------------------------------- /board-info.txt: -------------------------------------------------------------------------------- 1 | require board=crosshatch|blueline 2 | -------------------------------------------------------------------------------- /component-overrides.xml: -------------------------------------------------------------------------------- 1 | 2 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | -------------------------------------------------------------------------------- /crosshatch/BoardConfig.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2016 The Android Open-Source Project 3 | # 4 | # Licensed under the Apache License, Version 2.0 (the "License"); 5 | # you may not use this file except in compliance with the License. 6 | # You may obtain a copy of the License at 7 | # 8 | # http://www.apache.org/licenses/LICENSE-2.0 9 | # 10 | # Unless required by applicable law or agreed to in writing, software 11 | # distributed under the License is distributed on an "AS IS" BASIS, 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | # See the License for the specific language governing permissions and 14 | # limitations under the License. 15 | # 16 | 17 | ifdef PHONE_CAR_BOARD_PRODUCT 18 | include device/google_car/$(PHONE_CAR_BOARD_PRODUCT)/BoardConfig.mk 19 | else 20 | TARGET_BOOTLOADER_BOARD_NAME := crosshatch 21 | TARGET_SCREEN_DENSITY := 560 22 | TARGET_RECOVERY_UI_MARGIN_HEIGHT := 165 23 | 24 | include device/google/crosshatch/BoardConfig-common.mk 25 | endif 26 | 27 | include device/google/crosshatch/crosshatch/BoardConfigLineage.mk 28 | -------------------------------------------------------------------------------- /crosshatch/BoardConfigLineage.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018-2021 The LineageOS Project 3 | # 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | include device/google/crosshatch/BoardConfigLineage.mk 8 | 9 | include vendor/google/crosshatch/BoardConfigVendor.mk 10 | -------------------------------------------------------------------------------- /crosshatch/device-lineage.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018-2021 The LineageOS Project 3 | # 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | # Overlays 8 | DEVICE_PACKAGE_OVERLAYS += device/google/crosshatch/crosshatch/overlay-lineage 9 | 10 | PRODUCT_ENFORCE_RRO_EXCLUDED_OVERLAYS += \ 11 | device/google/crosshatch/crosshatch/overlay-lineage/frameworks/base/packages/overlays/NoCutoutOverlay 12 | 13 | $(call inherit-product, device/google/crosshatch/device-lineage.mk) 14 | -------------------------------------------------------------------------------- /crosshatch/overlay/frameworks/base/core/res/res/values/dimens.xml: -------------------------------------------------------------------------------- 1 | 2 | 18 | 19 | 20 | 21 | 28px 22 | 23 | -------------------------------------------------------------------------------- /crosshatch/overlay/frameworks/base/packages/SystemUI/res/drawable/rounded.xml: -------------------------------------------------------------------------------- 1 | 14 | 19 | 20 | 23 | 24 | 25 | -------------------------------------------------------------------------------- /crosshatch/overlay/frameworks/base/packages/SystemUI/res/values-ldrtl/dimens.xml: -------------------------------------------------------------------------------- 1 | 2 | 19 | 20 | 21 | 8dp 22 | 20dp 23 | 24 | -------------------------------------------------------------------------------- /crosshatch/overlay_packages/SettingsOverlayG013C/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | runtime_resource_overlay { 6 | name: "SettingsOverlayG013C", 7 | product_specific: true, 8 | } 9 | -------------------------------------------------------------------------------- /crosshatch/overlay_packages/SettingsOverlayG013C/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 4 | 5 | 9 | -------------------------------------------------------------------------------- /crosshatch/overlay_packages/SettingsOverlayG013C/res/drawable/regulatory_info.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/crosshatch/overlay_packages/SettingsOverlayG013C/res/drawable/regulatory_info.png -------------------------------------------------------------------------------- /crosshatch/overlay_packages/SettingsOverlayG013D/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | runtime_resource_overlay { 6 | name: "SettingsOverlayG013D", 7 | product_specific: true, 8 | } 9 | -------------------------------------------------------------------------------- /crosshatch/overlay_packages/SettingsOverlayG013D/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 4 | 5 | 9 | -------------------------------------------------------------------------------- /crosshatch/overlay_packages/SettingsOverlayG013D/res/drawable/regulatory_info.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/crosshatch/overlay_packages/SettingsOverlayG013D/res/drawable/regulatory_info.png -------------------------------------------------------------------------------- /crosshatch/proprietary-firmware.txt: -------------------------------------------------------------------------------- 1 | # All firmware images are extracted from Google factory images for each new ASB 2 | 3 | abl.img;AB 4 | aop.img;AB 5 | cmnlib.img;AB 6 | cmnlib64.img;AB 7 | devcfg.img;AB 8 | hyp.img;AB 9 | keymaster.img;AB 10 | modem.img;AB 11 | qupfw.img;AB 12 | tz.img;AB 13 | xbl.img;AB 14 | xbl_config.img;AB 15 | -------------------------------------------------------------------------------- /crosshatch/setup-makefiles.py: -------------------------------------------------------------------------------- 1 | #!./extract-files.py --regenerate_makefiles 2 | -------------------------------------------------------------------------------- /dumpstate/android.hardware.dumpstate@1.1-service.crosshatch.rc: -------------------------------------------------------------------------------- 1 | service vendor.dumpstate-1-1 /vendor/bin/hw/android.hardware.dumpstate@1.1-service.crosshatch 2 | class hal 3 | user system 4 | group system vendor_rfs 5 | interface android.hardware.dumpstate@1.0::IDumpstateDevice default 6 | interface android.hardware.dumpstate@1.1::IDumpstateDevice default 7 | oneshot 8 | disabled 9 | 10 | on boot 11 | chmod 0444 /sys/kernel/debug/tzdbg/qsee_log 12 | -------------------------------------------------------------------------------- /extract-files.py: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | # SPDX-FileCopyrightText: 2024 The LineageOS Project 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | set -e 8 | 9 | MY_DIR="$(cd "$(dirname "${0}")"; pwd -P)" 10 | 11 | pushd "${MY_DIR}/crosshatch" 12 | ./extract-files.py $@ 13 | popd 14 | -------------------------------------------------------------------------------- /factory-images_blueline/generate-factory-images-package.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | # Copyright 2018 The Android Open Source Project 4 | # 5 | # Licensed under the Apache License, Version 2.0 (the "License"); 6 | # you may not use this file except in compliance with the License. 7 | # You may obtain a copy of the License at 8 | # 9 | # http://www.apache.org/licenses/LICENSE-2.0 10 | # 11 | # Unless required by applicable law or agreed to in writing, software 12 | # distributed under the License is distributed on an "AS IS" BASIS, 13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 | # See the License for the specific language governing permissions and 15 | # limitations under the License. 16 | 17 | source ../../../common/clear-factory-images-variables.sh 18 | BUILD=4779185 19 | DEVICE=blueline 20 | PRODUCT=blueline 21 | VERSION=ppr1.180514.001 22 | SRCPREFIX=signed- 23 | BOOTLOADER=b1c1-0.1-4772579 24 | RADIO=g845-00008-180429-B-4752067 25 | source ../../../common/generate-factory-images-common.sh 26 | -------------------------------------------------------------------------------- /factory-images_crosshatch/generate-factory-images-package.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | # Copyright 2018 The Android Open Source Project 4 | # 5 | # Licensed under the Apache License, Version 2.0 (the "License"); 6 | # you may not use this file except in compliance with the License. 7 | # You may obtain a copy of the License at 8 | # 9 | # http://www.apache.org/licenses/LICENSE-2.0 10 | # 11 | # Unless required by applicable law or agreed to in writing, software 12 | # distributed under the License is distributed on an "AS IS" BASIS, 13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 14 | # See the License for the specific language governing permissions and 15 | # limitations under the License. 16 | 17 | source ../../../common/clear-factory-images-variables.sh 18 | BUILD=4779185 19 | DEVICE=crosshatch 20 | PRODUCT=crosshatch 21 | VERSION=ppr1.180514.001 22 | SRCPREFIX=signed- 23 | BOOTLOADER=b1c1-0.1-4772579 24 | RADIO=g845-00008-180429-B-4752067 25 | source ../../../common/generate-factory-images-common.sh 26 | -------------------------------------------------------------------------------- /fstab.persist: -------------------------------------------------------------------------------- 1 | # Keep persist in an fstab file, since we need to run fsck on it after abnormal shutdown. 2 | 3 | # 4 | /dev/block/platform/soc/1d84000.ufshc/by-name/persist /mnt/vendor/persist ext4 nosuid,nodev,noatime,barrier=1 wait 5 | -------------------------------------------------------------------------------- /fuzzy_fastboot/.gitignore: -------------------------------------------------------------------------------- 1 | *.img 2 | -------------------------------------------------------------------------------- /init.firstboot.sh: -------------------------------------------------------------------------------- 1 | #!/vendor/bin/sh 2 | 3 | # Init starts this script in the factory, to trigger shutdown after 4 | # setupwizard has started, and USB is removed. 5 | 6 | # wait for system to settle down after sys.boot_complete 7 | sleep 5 8 | 9 | # Wait for USB to be removed, debounce it three times in case it's enumerating still. 10 | disconnect_count=0 11 | while [ disconnect_count -le 3 ]; do 12 | type=`cat /sys/class/power_supply/usb/typec_mode` 13 | if [ "x$type" == "xNothing attached" ]; then 14 | (( disconnect_count++ )) 15 | echo disconnect count is $disconnect_count 16 | else 17 | # Restart the debounce count 18 | disconnect_count=0 19 | fi 20 | sleep 1 21 | done 22 | 23 | # Shutdown 24 | setprop sys.powerctl reboot,packout 25 | -------------------------------------------------------------------------------- /init.hardware.mpssrfs.rc.user: -------------------------------------------------------------------------------- 1 | on post-fs-data 2 | # Modem Remote FS 3 | mkdir /data/vendor/rfs 0770 vendor_rfs system 4 | mkdir /data/vendor/rfs/mpss 0770 vendor_rfs system 5 | mkdir /data/vendor/tombstones/rfs 0770 vendor_rfs system 6 | -------------------------------------------------------------------------------- /init.hardware.mpssrfs.rc.userdebug: -------------------------------------------------------------------------------- 1 | on post-fs-data 2 | # Modem Remote FS 3 | mkdir /data/vendor/rfs 0770 vendor_rfs system 4 | mkdir /data/vendor/rfs/mpss 0770 vendor_rfs system 5 | mkdir /data/vendor/tombstones/rfs 0770 vendor_rfs system 6 | write /data/vendor/rfs/mpss/mcfg_nv_list_flag "1" 7 | chown vendor_rfs vendor_rfs /data/vendor/rfs/mpss/mcfg_nv_list_flag 8 | chmod 0700 /data/vendor/rfs/mpss/mcfg_nv_list_flag 9 | 10 | on property:vendor.sys.modem.diag.efsdump=true 11 | chmod 0660 /data/vendor/rfs/mpss/modem_efs 12 | -------------------------------------------------------------------------------- /init.hardware.wlc.rc.userdebug: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018 The Android Open-Source Project 3 | # 4 | # Licensed under the Apache License, Version 2.0 (the "License"); 5 | # you may not use this file except in compliance with the License. 6 | # You may obtain a copy of the License at 7 | # 8 | # http://www.apache.org/licenses/LICENSE-2.0 9 | # 10 | # Unless required by applicable law or agreed to in writing, software 11 | # distributed under the License is distributed on an "AS IS" BASIS, 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | # See the License for the specific language governing permissions and 14 | # limitations under the License. 15 | # 16 | 17 | on property:sys.boot_completed=1 && property:persist.vendor.limit.wlc.current=1 18 | write /sys/class/power_supply/dc/current_max 75000 19 | 20 | on property:sys.boot_completed=1 && property:persist.vendor.limit.wlc.current=0 21 | write /sys/class/power_supply/dc/current_max 1100000 22 | 23 | on property:vendor.disable.wlc=1 24 | write /sys/class/power_supply/wireless/online 0 25 | -------------------------------------------------------------------------------- /init.insmod.blueline.cfg: -------------------------------------------------------------------------------- 1 | ############################################# 2 | # init.insmod.cfg # 3 | # This file contains kernel modules to load # 4 | # at init time by init.insmod.sh script # 5 | ############################################# 6 | 7 | # WiFi Driver module 8 | insmod /vendor/lib/modules/wlan.ko 9 | 10 | # Audio modules 11 | insmod /vendor/lib/modules/pinctrl-wcd.ko 12 | insmod /vendor/lib/modules/wcd-core.ko 13 | insmod /vendor/lib/modules/wcd-dsp-glink.ko 14 | insmod /vendor/lib/modules/snd-soc-wcd9xxx.ko 15 | insmod /vendor/lib/modules/snd-soc-wcd934x.ko 16 | insmod /vendor/lib/modules/snd-soc-wcd-spi.ko 17 | insmod /vendor/lib/modules/snd-soc-cs35l36.ko 18 | insmod /vendor/lib/modules/snd-soc-sdm845.ko 19 | 20 | # Touch 21 | insmod /vendor/lib/modules/videobuf2-memops.ko 22 | insmod /vendor/lib/modules/videobuf2-vmalloc.ko 23 | insmod /vendor/lib/modules/heatmap.ko 24 | insmod /vendor/lib/modules/ftm5.ko 25 | -------------------------------------------------------------------------------- /init.insmod.crosshatch.cfg: -------------------------------------------------------------------------------- 1 | ############################################# 2 | # init.insmod.cfg # 3 | # This file contains kernel modules to load # 4 | # at init time by init.insmod.sh script # 5 | ############################################# 6 | 7 | # WiFi Driver module 8 | insmod /vendor/lib/modules/wlan.ko 9 | 10 | # Audio modules 11 | insmod /vendor/lib/modules/pinctrl-wcd.ko 12 | insmod /vendor/lib/modules/wcd-core.ko 13 | insmod /vendor/lib/modules/wcd-dsp-glink.ko 14 | insmod /vendor/lib/modules/snd-soc-wcd9xxx.ko 15 | insmod /vendor/lib/modules/snd-soc-wcd934x.ko 16 | insmod /vendor/lib/modules/snd-soc-wcd-spi.ko 17 | insmod /vendor/lib/modules/snd-soc-cs35l36.ko 18 | insmod /vendor/lib/modules/snd-soc-sdm845.ko 19 | 20 | # Touch 21 | insmod /vendor/lib/modules/videobuf2-memops.ko 22 | insmod /vendor/lib/modules/videobuf2-vmalloc.ko 23 | insmod /vendor/lib/modules/heatmap.ko 24 | insmod /vendor/lib/modules/sec_touch.ko 25 | -------------------------------------------------------------------------------- /init.insmod.sh: -------------------------------------------------------------------------------- 1 | #! /vendor/bin/sh 2 | 3 | ######################################### 4 | ### init.insmod.cfg format: ### 5 | ### --------------------------------- ### 6 | ### [insmod|setprop] [path|prop name] ### 7 | ### ... ### 8 | ######################################### 9 | 10 | cfg_file="/vendor/etc/init.insmod.cfg" 11 | 12 | if [ -f $cfg_file ]; then 13 | while IFS=" " read -r action name 14 | do 15 | case $action in 16 | "insmod") insmod $name ;; 17 | "setprop") setprop $name 1 ;; 18 | esac 19 | done < $cfg_file 20 | fi 21 | 22 | # set property even if there is no insmod config 23 | # as property value "1" is expected in early-boot trigger 24 | setprop vendor.all.modules.ready 1 25 | -------------------------------------------------------------------------------- /init.logging.rc: -------------------------------------------------------------------------------- 1 | on post-fs-data 2 | mkdir /data/vendor/modem_dump 0777 system system 3 | mkdir /data/vendor/radio/diag_logs/logs 0777 system system 4 | mkdir /data/vendor/radio/extended_logs 0770 system radio 5 | -------------------------------------------------------------------------------- /init.qcom.devstart.sh: -------------------------------------------------------------------------------- 1 | #! /vendor/bin/sh 2 | 3 | # Initialize Edge Sense. 4 | /vendor/bin/init.edge_sense.sh 5 | 6 | echo 1 > /sys/kernel/boot_slpi/boot 7 | setprop vendor.qcom.devup 1 8 | log SLPI boot started. 9 | 10 | version=`grep -ao "OEM_IMAGE_VERSION_STRING[ -~]*" \ 11 | /vendor/firmware/slpi.b04 | \ 12 | sed -e s/OEM_IMAGE_VERSION_STRING=SLPI.version.// -e s/\(.*\).//` 13 | setprop vendor.sys.slpi.firmware.version "$version" 14 | -------------------------------------------------------------------------------- /init.qcom.ipastart.sh: -------------------------------------------------------------------------------- 1 | #! /vendor/bin/sh 2 | 3 | echo 1 > /dev/ipa 4 | -------------------------------------------------------------------------------- /init.ramoops.sh: -------------------------------------------------------------------------------- 1 | #!/vendor/bin/sh 2 | 3 | # Decrypt the keys and write them to the kernel 4 | ramoops -D 5 | 6 | if [ $? -eq 0 ]; then 7 | # Pivot (and decrypt) 8 | echo 1 > /sys/devices/virtual/ramoops/pstore/use_alt 9 | else 10 | setprop vendor.ramoops.decryption.error $? 11 | fi 12 | 13 | # Trigger remount of pstore regardless of decryption state 14 | setprop vendor.ramoops.decrypted true 15 | 16 | # Generate keys (if none exist), and load the keys to carveout 17 | ramoops -g -l -c 18 | 19 | -------------------------------------------------------------------------------- /init.recovery.hardware.device.rc: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2017 The Android Open-Source Project 3 | # 4 | # Licensed under the Apache License, Version 2.0 (the "License"); 5 | # you may not use this file except in compliance with the License. 6 | # You may obtain a copy of the License at 7 | # 8 | # http://www.apache.org/licenses/LICENSE-2.0 9 | # 10 | # Unless required by applicable law or agreed to in writing, software 11 | # distributed under the License is distributed on an "AS IS" BASIS, 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | # See the License for the specific language governing permissions and 14 | # limitations under the License. 15 | # 16 | 17 | import /init.recovery.${ro.boot.hardware.platform}.rc -------------------------------------------------------------------------------- /init.recovery.hardware.rc: -------------------------------------------------------------------------------- 1 | on fs 2 | wait /dev/block/platform/soc/${ro.boot.bootdevice} 3 | symlink /dev/block/platform/soc/${ro.boot.bootdevice} /dev/block/bootdevice 4 | 5 | on init 6 | setprop sys.usb.configfs 1 7 | # Don't lose recovery logs- keep warm reset for coming out of recovery. 8 | write /sys/module/msm_poweroff/parameters/warm_reset 1 9 | # Enable thermal mitigation 10 | write /sys/devices/virtual/thermal/tz-by-name/backup-charge/mode enabled 11 | -------------------------------------------------------------------------------- /lineage.dependencies: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "repository": "android_device_google_gs-common", 4 | "target_path": "device/google/gs-common" 5 | }, 6 | { 7 | "repository": "android_kernel_google_msm-4.9", 8 | "target_path": "kernel/google/msm-4.9" 9 | }, 10 | { 11 | "repository": "android_packages_apps_ElmyraService", 12 | "target_path": "packages/apps/ElmyraService" 13 | } 14 | ] 15 | -------------------------------------------------------------------------------- /lineage_blueline.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018-2021 The LineageOS Project 3 | # 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | # Inherit some common Lineage stuff. 8 | $(call inherit-product, vendor/lineage/config/common_full_phone.mk) 9 | 10 | # Inherit device configuration 11 | $(call inherit-product, device/google/crosshatch/aosp_blueline.mk) 12 | 13 | include device/google/crosshatch/blueline/device-lineage.mk 14 | 15 | # Device identifier. This must come after all inclusions 16 | PRODUCT_BRAND := google 17 | PRODUCT_MODEL := Pixel 3 18 | PRODUCT_NAME := lineage_blueline 19 | 20 | # Boot animation 21 | TARGET_SCREEN_HEIGHT := 2160 22 | TARGET_SCREEN_WIDTH := 1080 23 | 24 | PRODUCT_BUILD_PROP_OVERRIDES += \ 25 | BuildDesc="blueline-user 12 SP1A.210812.016.C2 8618562 release-keys" \ 26 | BuildFingerprint=google/blueline/blueline:12/SP1A.210812.016.C2/8618562:user/release-keys \ 27 | DeviceProduct=blueline 28 | 29 | $(call inherit-product, vendor/google/blueline/blueline-vendor.mk) 30 | -------------------------------------------------------------------------------- /lineage_crosshatch.mk: -------------------------------------------------------------------------------- 1 | # 2 | # Copyright (C) 2018-2021 The LineageOS Project 3 | # 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | # Inherit some common Lineage stuff. 8 | $(call inherit-product, vendor/lineage/config/common_full_phone.mk) 9 | 10 | # Inherit device configuration 11 | $(call inherit-product, device/google/crosshatch/aosp_crosshatch.mk) 12 | 13 | include device/google/crosshatch/crosshatch/device-lineage.mk 14 | 15 | # Device identifier. This must come after all inclusions 16 | PRODUCT_BRAND := google 17 | PRODUCT_MODEL := Pixel 3 XL 18 | PRODUCT_NAME := lineage_crosshatch 19 | 20 | # Boot animation 21 | TARGET_SCREEN_HEIGHT := 2960 22 | TARGET_SCREEN_WIDTH := 1440 23 | 24 | PRODUCT_BUILD_PROP_OVERRIDES += \ 25 | BuildDesc="crosshatch-user 12 SP1A.210812.016.C2 8618562 release-keys" \ 26 | BuildFingerprint=google/crosshatch/crosshatch:12/SP1A.210812.016.C2/8618562:user/release-keys \ 27 | DeviceProduct=crosshatch 28 | 29 | $(call inherit-product, vendor/google/crosshatch/crosshatch-vendor.mk) 30 | -------------------------------------------------------------------------------- /lineage_manifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | vendor.lineage.livedisplay 4 | hwbinder 5 | 2.0 6 | 7 | IPictureAdjustment 8 | default 9 | 10 | 11 | 12 | -------------------------------------------------------------------------------- /media_codecs.xml: -------------------------------------------------------------------------------- 1 | 2 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | -------------------------------------------------------------------------------- /mixer_paths_tavil_c1.xml: -------------------------------------------------------------------------------- 1 | mixer_paths_tavil_b1.xml -------------------------------------------------------------------------------- /nfc/com.google.hardware.pixel.japan.xml: -------------------------------------------------------------------------------- 1 | 2 | 16 | 19 | 20 | 21 | 22 | -------------------------------------------------------------------------------- /nfc/manifest_se_SIM1.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | android.hardware.secure_element 4 | hwbinder 5 | 1.2 6 | 7 | ISecureElement 8 | SIM1 9 | 10 | 11 | 12 | -------------------------------------------------------------------------------- /nfc/manifest_se_eSE1.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | android.hardware.secure_element 4 | hwbinder 5 | @1.2::ISecureElement/SIM1 6 | @1.1::ISecureElement/eSE1 7 | 8 | 9 | vendor.nxp.nxpese 10 | hwbinder 11 | 1.0 12 | 13 | INxpEse 14 | default 15 | 16 | 17 | 18 | -------------------------------------------------------------------------------- /overlay-lineage/frameworks/base/packages/SettingsProvider/res/values/defaults.xml: -------------------------------------------------------------------------------- 1 | 2 | 19 | 20 | 21 | 82 22 | 23 | true 24 | 25 | -------------------------------------------------------------------------------- /overlay-lineage/packages/apps/Dialer/java/com/android/dialer/callrecord/res/values/config.xml: -------------------------------------------------------------------------------- 1 | 2 | 17 | 18 | true 19 | 4 20 | 21 | -------------------------------------------------------------------------------- /overlay-lineage/packages/apps/Settings/res/values/lineage_config.xml: -------------------------------------------------------------------------------- 1 | 2 | 17 | 18 | 19 | true 20 | 21 | -------------------------------------------------------------------------------- /overlay-lineage/packages/services/Telephony/res/values/config.xml: -------------------------------------------------------------------------------- 1 | 2 | 16 | 17 | 19 | 20 | 21 | com.google.android.carrier 22 | 23 | -------------------------------------------------------------------------------- /overlay/frameworks/base/core/res/res/values/symbols.xml: -------------------------------------------------------------------------------- 1 | 2 | 18 | 19 | 20 | 21 | -------------------------------------------------------------------------------- /overlay/packages/apps/Settings/res/values-mcc262-mnc01/strings.xml: -------------------------------------------------------------------------------- 1 | 2 | 19 | 20 | 21 | WLAN Call 22 | 23 | -------------------------------------------------------------------------------- /overlay/packages/apps/Settings/res/values/bools.xml: -------------------------------------------------------------------------------- 1 | 2 | 16 | 17 | 18 | 19 | false 20 | 21 | -------------------------------------------------------------------------------- /overlay/packages/services/Telecom/res/values/config.xml: -------------------------------------------------------------------------------- 1 | 2 | 16 | 17 | 19 | 20 | 21 | false 22 | 23 | -------------------------------------------------------------------------------- /p2p_supplicant_overlay.conf: -------------------------------------------------------------------------------- 1 | disable_scan_offload=1 2 | p2p_go_vht=1 3 | -------------------------------------------------------------------------------- /parts/Android.bp: -------------------------------------------------------------------------------- 1 | // 2 | // Copyright (C) 2021 The LineageOS Project 3 | // 4 | // SPDX-License-Identifier: Apache-2.0 5 | // 6 | 7 | android_app { 8 | name: "GoogleParts", 9 | 10 | srcs: ["src/**/*.java"], 11 | certificate: "platform", 12 | platform_apis: true, 13 | privileged: true, 14 | system_ext_specific: true, 15 | 16 | static_libs: [ 17 | "org.lineageos.settings.resources", 18 | ], 19 | 20 | optimize: { 21 | proguard_flags_files: ["proguard.flags"], 22 | }, 23 | } 24 | -------------------------------------------------------------------------------- /parts/proguard.flags: -------------------------------------------------------------------------------- 1 | -keep class org.lineageos.settings.* { 2 | *; 3 | } 4 | -------------------------------------------------------------------------------- /permissions/com.google.hardware.camera.easel_2018.xml: -------------------------------------------------------------------------------- 1 | 2 | 6 | 7 | 8 | 9 | -------------------------------------------------------------------------------- /powerstats/android.hardware.power.stats@1.0-service.pixel.rc: -------------------------------------------------------------------------------- 1 | service vendor.power.stats-hal-1-0 /vendor/bin/hw/android.hardware.power.stats@1.0-service.pixel 2 | class hal 3 | user system 4 | group system 5 | -------------------------------------------------------------------------------- /recovery.wipe: -------------------------------------------------------------------------------- 1 | # All the partitions to be wiped (in order) under recovery. 2 | /dev/block/bootdevice/by-name/system_a 3 | /dev/block/bootdevice/by-name/system_b 4 | /dev/block/bootdevice/by-name/product_a 5 | /dev/block/bootdevice/by-name/product_b 6 | /dev/block/bootdevice/by-name/vendor_a 7 | /dev/block/bootdevice/by-name/vendor_b 8 | /dev/block/bootdevice/by-name/userdata 9 | # Wipe the boot partitions last so that all partitions will be wiped 10 | # correctly even if the wiping process gets interrupted by a force boot. 11 | /dev/block/bootdevice/by-name/boot_a 12 | /dev/block/bootdevice/by-name/boot_b 13 | -------------------------------------------------------------------------------- /rro_overlays/ConnectivityOverlay/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | runtime_resource_overlay { 6 | name: "ConnectivityOverlay", 7 | sdk_version: "current", 8 | product_specific: true 9 | } 10 | -------------------------------------------------------------------------------- /rro_overlays/WifiOverlay/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | runtime_resource_overlay { 6 | name: "WifiOverlay", 7 | theme: "WifiOverlay", 8 | sdk_version: "current", 9 | product_specific: true 10 | } 11 | -------------------------------------------------------------------------------- /rro_overlays/WifiOverlay/OWNERS: -------------------------------------------------------------------------------- 1 | # People who can approve changes for submission 2 | etancohen@google.com 3 | arabawy@google.com 4 | kumachang@google.com 5 | satk@google.com 6 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/avtimer.h: -------------------------------------------------------------------------------- 1 | #ifndef _AVTIMER_H 2 | #define _AVTIMER_H 3 | 4 | #include 5 | 6 | #define MAJOR_NUM 100 7 | 8 | #define IOCTL_GET_AVTIMER_TICK _IOR(MAJOR_NUM, 0, uint64_t) 9 | 10 | #endif 11 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm-core-interface.h: -------------------------------------------------------------------------------- 1 | #ifndef __MSM_CORE_LIB_H__ 2 | #define __MSM_CORE_LIB_H__ 3 | 4 | #include 5 | 6 | #define TEMP_DATA_POINTS 13 7 | #define MAX_NUM_FREQ 200 8 | 9 | enum msm_core_ioctl_params { 10 | MSM_CORE_LEAKAGE, 11 | MSM_CORE_VOLTAGE, 12 | }; 13 | 14 | #define MSM_CORE_MAGIC 0x9D 15 | 16 | struct sched_params { 17 | uint32_t cpumask; 18 | uint32_t cluster; 19 | uint32_t power[TEMP_DATA_POINTS][MAX_NUM_FREQ]; 20 | uint32_t voltage[MAX_NUM_FREQ]; 21 | uint32_t freq[MAX_NUM_FREQ]; 22 | }; 23 | 24 | 25 | #define EA_LEAKAGE _IOWR(MSM_CORE_MAGIC, MSM_CORE_LEAKAGE,\ 26 | struct sched_params) 27 | #define EA_VOLT _IOWR(MSM_CORE_MAGIC, MSM_CORE_VOLTAGE,\ 28 | struct sched_params) 29 | #endif 30 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_audio_alac.h: -------------------------------------------------------------------------------- 1 | #ifndef _MSM_AUDIO_ALAC_H 2 | #define _MSM_AUDIO_ALAC_H 3 | 4 | #define AUDIO_GET_ALAC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \ 5 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), struct msm_audio_alac_config) 6 | #define AUDIO_SET_ALAC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \ 7 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), struct msm_audio_alac_config) 8 | 9 | struct msm_audio_alac_config { 10 | uint32_t frameLength; 11 | uint8_t compatVersion; 12 | uint8_t bitDepth; 13 | uint8_t pb; /* currently unused */ 14 | uint8_t mb; /* currently unused */ 15 | uint8_t kb; /* currently unused */ 16 | uint8_t channelCount; 17 | uint16_t maxRun; /* currently unused */ 18 | uint32_t maxSize; 19 | uint32_t averageBitRate; 20 | uint32_t sampleRate; 21 | uint32_t channelLayout; 22 | }; 23 | 24 | #endif /* _MSM_AUDIO_ALAC_H */ 25 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_audio_amrwb.h: -------------------------------------------------------------------------------- 1 | #ifndef _MSM_AUDIO_AMRWB_H 2 | #define _MSM_AUDIO_AMRWB_H 3 | 4 | #include 5 | 6 | #define AUDIO_GET_AMRWB_ENC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \ 7 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), \ 8 | struct msm_audio_amrwb_enc_config) 9 | #define AUDIO_SET_AMRWB_ENC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \ 10 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), \ 11 | struct msm_audio_amrwb_enc_config) 12 | 13 | struct msm_audio_amrwb_enc_config { 14 | uint32_t band_mode; 15 | uint32_t dtx_enable; 16 | uint32_t frame_format; 17 | }; 18 | #endif /* _MSM_AUDIO_AMRWB_H */ 19 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_audio_amrwbplus.h: -------------------------------------------------------------------------------- 1 | #ifndef _MSM_AUDIO_AMR_WB_PLUS_H 2 | #define _MSM_AUDIO_AMR_WB_PLUS_H 3 | 4 | #define AUDIO_GET_AMRWBPLUS_CONFIG_V2 _IOR(AUDIO_IOCTL_MAGIC, \ 5 | (AUDIO_MAX_COMMON_IOCTL_NUM+2), struct msm_audio_amrwbplus_config_v2) 6 | #define AUDIO_SET_AMRWBPLUS_CONFIG_V2 _IOW(AUDIO_IOCTL_MAGIC, \ 7 | (AUDIO_MAX_COMMON_IOCTL_NUM+3), struct msm_audio_amrwbplus_config_v2) 8 | 9 | struct msm_audio_amrwbplus_config_v2 { 10 | unsigned int size_bytes; 11 | unsigned int version; 12 | unsigned int num_channels; 13 | unsigned int amr_band_mode; 14 | unsigned int amr_dtx_mode; 15 | unsigned int amr_frame_fmt; 16 | unsigned int amr_lsf_idx; 17 | }; 18 | #endif /* _MSM_AUDIO_AMR_WB_PLUS_H */ 19 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_audio_ape.h: -------------------------------------------------------------------------------- 1 | /* The following structure has been taken 2 | * from Monkey's Audio SDK with permission 3 | */ 4 | 5 | #ifndef _MSM_AUDIO_APE_H 6 | #define _MSM_AUDIO_APE_H 7 | 8 | #define AUDIO_GET_APE_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \ 9 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), struct msm_audio_ape_config) 10 | #define AUDIO_SET_APE_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \ 11 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), struct msm_audio_ape_config) 12 | 13 | struct msm_audio_ape_config { 14 | uint16_t compatibleVersion; 15 | uint16_t compressionLevel; 16 | uint32_t formatFlags; 17 | uint32_t blocksPerFrame; 18 | uint32_t finalFrameBlocks; 19 | uint32_t totalFrames; 20 | uint16_t bitsPerSample; 21 | uint16_t numChannels; 22 | uint32_t sampleRate; 23 | uint32_t seekTablePresent; 24 | }; 25 | 26 | #endif /* _MSM_AUDIO_APE_H */ 27 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_audio_qcp.h: -------------------------------------------------------------------------------- 1 | #ifndef _MSM_AUDIO_QCP_H 2 | #define _MSM_AUDIO_QCP_H 3 | 4 | #include 5 | 6 | #define AUDIO_SET_QCELP_ENC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \ 7 | 0, struct msm_audio_qcelp_enc_config) 8 | 9 | #define AUDIO_GET_QCELP_ENC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \ 10 | 1, struct msm_audio_qcelp_enc_config) 11 | 12 | #define AUDIO_SET_EVRC_ENC_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \ 13 | 2, struct msm_audio_evrc_enc_config) 14 | 15 | #define AUDIO_GET_EVRC_ENC_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \ 16 | 3, struct msm_audio_evrc_enc_config) 17 | 18 | #define CDMA_RATE_BLANK 0x00 19 | #define CDMA_RATE_EIGHTH 0x01 20 | #define CDMA_RATE_QUARTER 0x02 21 | #define CDMA_RATE_HALF 0x03 22 | #define CDMA_RATE_FULL 0x04 23 | #define CDMA_RATE_ERASURE 0x05 24 | 25 | struct msm_audio_qcelp_enc_config { 26 | uint32_t cdma_rate; 27 | uint32_t min_bit_rate; 28 | uint32_t max_bit_rate; 29 | }; 30 | 31 | struct msm_audio_evrc_enc_config { 32 | uint32_t cdma_rate; 33 | uint32_t min_bit_rate; 34 | uint32_t max_bit_rate; 35 | }; 36 | 37 | #endif /* _MSM_AUDIO_QCP_H */ 38 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_audio_wmapro.h: -------------------------------------------------------------------------------- 1 | #ifndef _MSM_AUDIO_WMAPRO_H 2 | #define _MSM_AUDIO_WMAPRO_H 3 | 4 | #define AUDIO_GET_WMAPRO_CONFIG _IOR(AUDIO_IOCTL_MAGIC, \ 5 | (AUDIO_MAX_COMMON_IOCTL_NUM+0), struct msm_audio_wmapro_config) 6 | #define AUDIO_SET_WMAPRO_CONFIG _IOW(AUDIO_IOCTL_MAGIC, \ 7 | (AUDIO_MAX_COMMON_IOCTL_NUM+1), struct msm_audio_wmapro_config) 8 | 9 | struct msm_audio_wmapro_config { 10 | unsigned short armdatareqthr; 11 | uint8_t validbitspersample; 12 | uint8_t numchannels; 13 | unsigned short formattag; 14 | uint32_t samplingrate; 15 | uint32_t avgbytespersecond; 16 | unsigned short asfpacketlength; 17 | uint32_t channelmask; 18 | unsigned short encodeopt; 19 | unsigned short advancedencodeopt; 20 | uint32_t advancedencodeopt2; 21 | }; 22 | #endif /* _MSM_AUDIO_WMAPRO_H */ 23 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/msm_dsps.h: -------------------------------------------------------------------------------- 1 | #ifndef _DSPS_H_ 2 | #define _DSPS_H_ 3 | 4 | #include 5 | 6 | #define DSPS_IOCTL_MAGIC 'd' 7 | 8 | #define DSPS_IOCTL_ON _IO(DSPS_IOCTL_MAGIC, 1) 9 | #define DSPS_IOCTL_OFF _IO(DSPS_IOCTL_MAGIC, 2) 10 | 11 | #define DSPS_IOCTL_READ_SLOW_TIMER _IOR(DSPS_IOCTL_MAGIC, 3, unsigned int*) 12 | #define DSPS_IOCTL_READ_FAST_TIMER _IOR(DSPS_IOCTL_MAGIC, 4, unsigned int*) 13 | 14 | #define DSPS_IOCTL_RESET _IO(DSPS_IOCTL_MAGIC, 5) 15 | 16 | #endif /* _DSPS_H_ */ 17 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/linux/sockev.h: -------------------------------------------------------------------------------- 1 | #ifndef _SOCKEV_H_ 2 | #define _SOCKEV_H_ 3 | 4 | #include 5 | #include 6 | #include 7 | 8 | enum sknetlink_groups { 9 | SKNLGRP_UNICAST, 10 | SKNLGRP_SOCKEV, 11 | __SKNLGRP_MAX 12 | }; 13 | 14 | #define SOCKEV_STR_MAX 32 15 | 16 | /******************************************************************** 17 | * Socket operation messages 18 | ****/ 19 | 20 | struct sknlsockevmsg { 21 | __u8 event[SOCKEV_STR_MAX]; 22 | __u32 pid; /* (struct task_struct*)->pid */ 23 | __u16 skfamily; /* (struct socket*)->sk->sk_family */ 24 | __u8 skstate; /* (struct socket*)->sk->sk_state */ 25 | __u8 skprotocol; /* (struct socket*)->sk->sk_protocol */ 26 | __u16 sktype; /* (struct socket*)->sk->sk_type */ 27 | __u64 skflags; /* (struct socket*)->sk->sk_flags */ 28 | }; 29 | 30 | #endif /* _SOCKEV_H_ */ 31 | 32 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/media/cam_cpas.h: -------------------------------------------------------------------------------- 1 | #ifndef __UAPI_CAM_CPAS_H__ 2 | #define __UAPI_CAM_CPAS_H__ 3 | 4 | #include "cam_defs.h" 5 | 6 | #define CAM_FAMILY_CAMERA_SS 1 7 | #define CAM_FAMILY_CPAS_SS 2 8 | 9 | /** 10 | * struct cam_cpas_query_cap - CPAS query device capability payload 11 | * 12 | * @camera_family : Camera family type 13 | * @reserved : Reserved field for alignment 14 | * @camera_version : Camera platform version 15 | * @cpas_version : Camera CPAS version within camera platform 16 | * 17 | */ 18 | struct cam_cpas_query_cap { 19 | uint32_t camera_family; 20 | uint32_t reserved; 21 | struct cam_hw_version camera_version; 22 | struct cam_hw_version cpas_version; 23 | }; 24 | 25 | #endif /* __UAPI_CAM_CPAS_H__ */ 26 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/media/msm_jpeg_dma.h: -------------------------------------------------------------------------------- 1 | /* Copyright (c) 2015-2016, 2018, The Linux Foundation. All rights reserved. 2 | * 3 | * This program is free software; you can redistribute it and/or modify 4 | * it under the terms of the GNU General Public License version 2 and 5 | * only version 2 as published by the Free Software Foundation. 6 | * 7 | * This program is distributed in the hope that it will be useful, 8 | * but WITHOUT ANY WARRANTY; without even the implied warranty of 9 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 10 | * GNU General Public License for more details. 11 | */ 12 | 13 | #ifndef __UAPI_MSM_JPEG_DMA__ 14 | #define __UAPI_MSM_JPEG_DMA__ 15 | 16 | #include 17 | 18 | /* msm jpeg dma control ID's */ 19 | #define V4L2_CID_JPEG_DMA_SPEED (V4L2_CID_PRIVATE_BASE) 20 | #define V4L2_CID_JPEG_DMA_MAX_DOWN_SCALE (V4L2_CID_PRIVATE_BASE + 1) 21 | 22 | /* msm_jpeg_dma_buf */ 23 | struct msm_jpeg_dma_buff { 24 | int32_t fd; 25 | uint32_t offset; 26 | }; 27 | 28 | #endif /* __UAPI_MSM_JPEG_DMA__ */ 29 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/sound/msmcal-hwdep.h: -------------------------------------------------------------------------------- 1 | #ifndef _CALIB_HWDEP_H 2 | #define _CALIB_HWDEP_H 3 | 4 | #define WCD9XXX_CODEC_HWDEP_NODE 1000 5 | enum wcd_cal_type { 6 | WCD9XXX_MIN_CAL, 7 | WCD9XXX_ANC_CAL = WCD9XXX_MIN_CAL, 8 | WCD9XXX_MAD_CAL, 9 | WCD9XXX_MBHC_CAL, 10 | WCD9XXX_VBAT_CAL, 11 | WCD9XXX_MAX_CAL, 12 | }; 13 | 14 | struct wcdcal_ioctl_buffer { 15 | __u32 size; 16 | __u8 *buffer; 17 | enum wcd_cal_type cal_type; 18 | }; 19 | 20 | #define SNDRV_CTL_IOCTL_HWDEP_CAL_TYPE \ 21 | _IOW('U', 0x1, struct wcdcal_ioctl_buffer) 22 | 23 | #endif /*_CALIB_HWDEP_H*/ 24 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/sound/voice_params.h: -------------------------------------------------------------------------------- 1 | #ifndef __VOICE_PARAMS_H__ 2 | #define __VOICE_PARAMS_H__ 3 | 4 | #include 5 | #include 6 | 7 | enum voice_lch_mode { 8 | VOICE_LCH_START = 1, 9 | VOICE_LCH_STOP 10 | }; 11 | 12 | #define SNDRV_VOICE_IOCTL_LCH _IOW('U', 0x00, enum voice_lch_mode) 13 | 14 | #endif 15 | -------------------------------------------------------------------------------- /sdm845/original-kernel-headers/sound/voice_svc.h: -------------------------------------------------------------------------------- 1 | #ifndef __VOICE_SVC_H__ 2 | #define __VOICE_SVC_H__ 3 | 4 | #include 5 | #include 6 | 7 | #define VOICE_SVC_DRIVER_NAME "voice_svc" 8 | 9 | #define VOICE_SVC_MVM_STR "MVM" 10 | #define VOICE_SVC_CVS_STR "CVS" 11 | #define MAX_APR_SERVICE_NAME_LEN 64 12 | 13 | #define MSG_REGISTER 0x1 14 | #define MSG_REQUEST 0x2 15 | #define MSG_RESPONSE 0x3 16 | 17 | struct voice_svc_write_msg { 18 | __u32 msg_type; 19 | __u8 payload[0]; 20 | }; 21 | 22 | struct voice_svc_register { 23 | char svc_name[MAX_APR_SERVICE_NAME_LEN]; 24 | __u32 src_port; 25 | __u8 reg_flag; 26 | }; 27 | 28 | struct voice_svc_cmd_response { 29 | __u32 src_port; 30 | __u32 dest_port; 31 | __u32 token; 32 | __u32 opcode; 33 | __u32 payload_size; 34 | __u8 payload[0]; 35 | }; 36 | 37 | struct voice_svc_cmd_request { 38 | char svc_name[MAX_APR_SERVICE_NAME_LEN]; 39 | __u32 src_port; 40 | __u32 dest_port; 41 | __u32 token; 42 | __u32 opcode; 43 | __u32 payload_size; 44 | __u8 payload[0]; 45 | }; 46 | 47 | #endif 48 | -------------------------------------------------------------------------------- /self-extractors/PART1: -------------------------------------------------------------------------------- 1 | # 2 | # Usage is subject to the enclosed license agreement 3 | 4 | echo 5 | echo The license for this software will now be displayed. 6 | echo You must agree to this license before using this software. 7 | echo 8 | echo -n Press Enter to view the license 9 | read dummy 10 | echo 11 | 12 | more << __EOF__ 13 | -------------------------------------------------------------------------------- /self-extractors/PART2: -------------------------------------------------------------------------------- 1 | __EOF__ 2 | 3 | if test $? != 0 4 | then 5 | echo ERROR: Couldn\'t display license file 1>&2 6 | exit 1 7 | fi 8 | 9 | echo 10 | 11 | echo -n Type \"I ACCEPT\" if you agree to the terms of the license:\ 12 | read typed 13 | 14 | if test "$typed" != I\ ACCEPT 15 | then 16 | echo 17 | echo You didn\'t accept the license. Extraction aborted. 18 | exit 2 19 | fi 20 | 21 | echo 22 | 23 | -------------------------------------------------------------------------------- /self-extractors/PART3: -------------------------------------------------------------------------------- 1 | 2 | if test $? != 0 3 | then 4 | echo 5 | echo ERROR: Couldn\'t extract files. 1>&2 6 | exit 3 7 | else 8 | echo 9 | echo Files extracted successfully. 10 | fi 11 | exit 0 12 | 13 | -------------------------------------------------------------------------------- /self-extractors/PROLOGUE: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | -------------------------------------------------------------------------------- /self-extractors/google_devices/COPYRIGHT: -------------------------------------------------------------------------------- 1 | # (C) Google Inc. 2 | -------------------------------------------------------------------------------- /self-extractors/google_devices/staging/BoardConfigPartial.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | BOARD_PREBUILT_VENDORIMAGE := vendor/google_devices/crosshatch/proprietary/vendor.img 16 | 17 | -include vendor/google/tools/android-info.mk 18 | ifdef USE_ANDROID_INFO 19 | TARGET_BOARD_INFO_FILE := vendor/google_devices/crosshatch/android-info.txt 20 | endif 21 | 22 | AB_OTA_PARTITIONS += \ 23 | vendor 24 | -------------------------------------------------------------------------------- /self-extractors/google_devices/staging/device-partial.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | -------------------------------------------------------------------------------- /self-extractors/qcom/COPYRIGHT: -------------------------------------------------------------------------------- 1 | # (C) Qualcomm Technologies, Inc. 2 | -------------------------------------------------------------------------------- /self-extractors/qcom/staging/BoardConfigPartial.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | VENDOR_BLOBS_LICENSE := vendor/qcom/crosshatch/LICENSE 16 | -------------------------------------------------------------------------------- /self-extractors/root/android-info.txt: -------------------------------------------------------------------------------- 1 | require board=crosshatch|blueline 2 | require partition-exists=product 3 | 4 | require version-bootloader=b1c1-0.2-6085603 5 | 6 | 7 | require version-baseband=g845-00096-200114-B-6134206 8 | -------------------------------------------------------------------------------- /self-extractors/root/proprietary/BoardConfigVendor.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | ifneq ($(filter blueline,$(TARGET_DEVICE)),) 16 | -include vendor/google_devices/blueline/BoardConfigPartial.mk 17 | -include vendor/qcom/blueline/BoardConfigPartial.mk 18 | else 19 | -include vendor/google_devices/crosshatch/BoardConfigPartial.mk 20 | -include vendor/qcom/crosshatch/BoardConfigPartial.mk 21 | endif 22 | -------------------------------------------------------------------------------- /self-extractors/root/proprietary/device-vendor.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | $(call inherit-product-if-exists, vendor/google_devices/crosshatch/device-partial.mk) 16 | $(call inherit-product-if-exists, vendor/qcom/crosshatch/device-partial.mk) 17 | -------------------------------------------------------------------------------- /self-extractors_blueline/PART1: -------------------------------------------------------------------------------- 1 | # 2 | # Usage is subject to the enclosed license agreement 3 | 4 | echo 5 | echo The license for this software will now be displayed. 6 | echo You must agree to this license before using this software. 7 | echo 8 | echo -n Press Enter to view the license 9 | read dummy 10 | echo 11 | 12 | more << __EOF__ 13 | -------------------------------------------------------------------------------- /self-extractors_blueline/PART2: -------------------------------------------------------------------------------- 1 | __EOF__ 2 | 3 | if test $? != 0 4 | then 5 | echo ERROR: Couldn\'t display license file 1>&2 6 | exit 1 7 | fi 8 | 9 | echo 10 | 11 | echo -n Type \"I ACCEPT\" if you agree to the terms of the license:\ 12 | read typed 13 | 14 | if test "$typed" != I\ ACCEPT 15 | then 16 | echo 17 | echo You didn\'t accept the license. Extraction aborted. 18 | exit 2 19 | fi 20 | 21 | echo 22 | 23 | -------------------------------------------------------------------------------- /self-extractors_blueline/PART3: -------------------------------------------------------------------------------- 1 | 2 | if test $? != 0 3 | then 4 | echo 5 | echo ERROR: Couldn\'t extract files. 1>&2 6 | exit 3 7 | else 8 | echo 9 | echo Files extracted successfully. 10 | fi 11 | exit 0 12 | 13 | -------------------------------------------------------------------------------- /self-extractors_blueline/PROLOGUE: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | -------------------------------------------------------------------------------- /self-extractors_blueline/google_devices/COPYRIGHT: -------------------------------------------------------------------------------- 1 | # (C) Google Inc. 2 | -------------------------------------------------------------------------------- /self-extractors_blueline/google_devices/staging/BoardConfigPartial.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | BOARD_PREBUILT_VENDORIMAGE := vendor/google_devices/blueline/proprietary/vendor.img 16 | 17 | -include vendor/google/tools/android-info.mk 18 | ifdef USE_ANDROID_INFO 19 | TARGET_BOARD_INFO_FILE := vendor/google_devices/blueline/android-info.txt 20 | endif 21 | 22 | AB_OTA_PARTITIONS += \ 23 | vendor 24 | -------------------------------------------------------------------------------- /self-extractors_blueline/google_devices/staging/device-partial.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | -------------------------------------------------------------------------------- /self-extractors_blueline/qcom/COPYRIGHT: -------------------------------------------------------------------------------- 1 | # (C) Qualcomm Technologies, Inc. 2 | -------------------------------------------------------------------------------- /self-extractors_blueline/qcom/staging/BoardConfigPartial.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | VENDOR_BLOBS_LICENSE := vendor/qcom/blueline/LICENSE 16 | -------------------------------------------------------------------------------- /self-extractors_blueline/root/android-info.txt: -------------------------------------------------------------------------------- 1 | require board=crosshatch|blueline 2 | require partition-exists=product 3 | 4 | require version-bootloader=b1c1-0.1-4768668 5 | 6 | 7 | require version-baseband=g845-00008-180429-B-4752067 8 | -------------------------------------------------------------------------------- /self-extractors_blueline/root/proprietary/BoardConfigVendor.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | ifneq ($(filter blueline,$(TARGET_DEVICE)),) 16 | -include vendor/google_devices/blueline/BoardConfigPartial.mk 17 | -include vendor/qcom/blueline/BoardConfigPartial.mk 18 | else 19 | -include vendor/google_devices/crosshatch/BoardConfigPartial.mk 20 | -include vendor/qcom/crosshatch/BoardConfigPartial.mk 21 | endif 22 | -------------------------------------------------------------------------------- /self-extractors_blueline/root/proprietary/device-vendor.mk: -------------------------------------------------------------------------------- 1 | # Copyright 2018 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | $(call inherit-product-if-exists, vendor/google_devices/blueline/device-partial.mk) 16 | $(call inherit-product-if-exists, vendor/qcom/blueline/device-partial.mk) 17 | -------------------------------------------------------------------------------- /sensors/hals.conf: -------------------------------------------------------------------------------- 1 | sensors.ssc.so 2 | -------------------------------------------------------------------------------- /sepolicy-lineage/dynamic/hal_lineage_livedisplay_qti.te: -------------------------------------------------------------------------------- 1 | # Do not use add_service() as hal_graphics_composer_default may be the provider as well 2 | allow hal_lineage_livedisplay_qti qdisplay_service:service_manager find; 3 | 4 | binder_call(hal_lineage_livedisplay_qti, hal_graphics_composer_default) 5 | 6 | # Allow LiveDisplay to access vendor display property 7 | get_prop(hal_lineage_livedisplay_qti, vendor_display_prop) 8 | -------------------------------------------------------------------------------- /sepolicy-lineage/vendor/file_contexts: -------------------------------------------------------------------------------- 1 | # LiveDisplay HAL 2 | /(vendor|system/vendor)/bin/hw/vendor\.lineage\.livedisplay@2\.0-service-sdm u:object_r:hal_lineage_livedisplay_qti_exec:s0 3 | -------------------------------------------------------------------------------- /sepolicy-lineage/vendor/hal_lineage_livedisplay.te: -------------------------------------------------------------------------------- 1 | type hal_lineage_livedisplay_qti, domain; 2 | hal_server_domain(hal_lineage_livedisplay_qti, hal_lineage_livedisplay) 3 | 4 | type hal_lineage_livedisplay_qti_exec, exec_type, vendor_file_type, file_type; 5 | init_daemon_domain(hal_lineage_livedisplay_qti) 6 | 7 | # Allow LiveDisplay HAL's default implementation to use vendor-binder service 8 | vndbinder_use(hal_lineage_livedisplay_qti) 9 | 10 | # Allow LiveDisplay to store files under /data/vendor/display and access them 11 | allow hal_lineage_livedisplay_qti display_vendor_data_file:dir rw_dir_perms; 12 | allow hal_lineage_livedisplay_qti display_vendor_data_file:file create_file_perms; 13 | -------------------------------------------------------------------------------- /sepolicy/OWNERS: -------------------------------------------------------------------------------- 1 | include platform/system/sepolicy:/OWNERS 2 | 3 | rurumihong@google.com 4 | -------------------------------------------------------------------------------- /sepolicy/PREUPLOAD.cfg: -------------------------------------------------------------------------------- 1 | [Hook Scripts] 2 | aosp_hook = ${REPO_ROOT}/frameworks/base/tools/aosp/aosp_sha.sh ${PREUPLOAD_COMMIT} "." 3 | 4 | -------------------------------------------------------------------------------- /sepolicy/private/dataservice_app.te: -------------------------------------------------------------------------------- 1 | typeattribute dataservice_app coredomain; 2 | app_domain(dataservice_app) 3 | net_domain(dataservice_app) 4 | 5 | add_service(dataservice_app, cne_service) 6 | allow dataservice_app { 7 | app_api_service 8 | audioserver_service 9 | radio_service 10 | }:service_manager find; 11 | 12 | allow dataservice_app radio_data_file:dir create_dir_perms; 13 | allow dataservice_app radio_data_file:{ file lnk_file } create_file_perms; 14 | 15 | hwbinder_use(dataservice_app) 16 | -------------------------------------------------------------------------------- /sepolicy/private/genfs_contexts: -------------------------------------------------------------------------------- 1 | genfscon debugfs /ion/heaps/system u:object_r:debugfs_system_ion_heap:s0 2 | -------------------------------------------------------------------------------- /sepolicy/private/keys.conf: -------------------------------------------------------------------------------- 1 | [@WFCACTIVATION] 2 | ALL : device/google/crosshatch/sepolicy/private/certs/wfcactivation.x509.pem 3 | -------------------------------------------------------------------------------- /sepolicy/private/priv_app.te: -------------------------------------------------------------------------------- 1 | dontaudit priv_app sysfs:file read; 2 | dontaudit priv_app zygote:dir search; 3 | dontaudit priv_app mnt_vendor_file:dir search; 4 | -------------------------------------------------------------------------------- /sepolicy/private/radio.te: -------------------------------------------------------------------------------- 1 | add_service(radio, qchook_service) 2 | add_service(radio, uce_service) 3 | -------------------------------------------------------------------------------- /sepolicy/private/recovery.te: -------------------------------------------------------------------------------- 1 | recovery_only(` 2 | allow recovery citadel_device:chr_file rw_file_perms; 3 | ') 4 | -------------------------------------------------------------------------------- /sepolicy/private/service.te: -------------------------------------------------------------------------------- 1 | type cne_service, service_manager_type; 2 | type qchook_service, service_manager_type; 3 | -------------------------------------------------------------------------------- /sepolicy/private/service_contexts: -------------------------------------------------------------------------------- 1 | qti.ims.ext u:object_r:radio_service:s0 2 | cneservice u:object_r:cne_service:s0 3 | qchook u:object_r:qchook_service:s0 4 | -------------------------------------------------------------------------------- /sepolicy/private/sprint_hidden_menu.te: -------------------------------------------------------------------------------- 1 | type sprint_hidden_menu, domain, coredomain; 2 | 3 | app_domain(sprint_hidden_menu) 4 | net_domain(sprint_hidden_menu) 5 | 6 | # Services 7 | allow sprint_hidden_menu app_api_service:service_manager find; 8 | allow sprint_hidden_menu qchook_service:service_manager find; 9 | allow sprint_hidden_menu radio_service:service_manager find; 10 | -------------------------------------------------------------------------------- /sepolicy/private/system_server.te: -------------------------------------------------------------------------------- 1 | # b/139283562: Read /sys/kernel/debug/ion/heaps/system. 2 | allow system_server debugfs_system_ion_heap:file r_file_perms; 3 | 4 | # b/129561352: Access to cpufreq interface for battery saver experiments. 5 | allow system_server sysfs_devices_system_cpu:file w_file_perms; 6 | -------------------------------------------------------------------------------- /sepolicy/private/toolbox.te: -------------------------------------------------------------------------------- 1 | # b/192320719 2 | dontaudit toolbox virtualizationservice_data_file:dir getattr; 3 | # b/193366323 4 | dontaudit toolbox toolbox:capability dac_override; 5 | dontaudit toolbox toolbox:capability dac_read_search; 6 | dontaudit toolbox toolbox:capability fowner; 7 | -------------------------------------------------------------------------------- /sepolicy/private/uscc_omadm.te: -------------------------------------------------------------------------------- 1 | type uscc_omadm, domain, coredomain; 2 | 3 | app_domain(uscc_omadm) 4 | net_domain(uscc_omadm) 5 | 6 | # Services 7 | allow uscc_omadm app_api_service:service_manager find; 8 | allow uscc_omadm qchook_service:service_manager find; 9 | allow uscc_omadm radio_service:service_manager find; -------------------------------------------------------------------------------- /sepolicy/private/vzw_omadm_connmo.te: -------------------------------------------------------------------------------- 1 | type vzw_omadm_connmo, domain, coredomain; 2 | 3 | app_domain(vzw_omadm_connmo) 4 | net_domain(vzw_omadm_connmo) 5 | 6 | # Services 7 | allow vzw_omadm_connmo app_api_service:service_manager find; 8 | allow vzw_omadm_connmo qchook_service:service_manager find; 9 | allow vzw_omadm_connmo radio_service:service_manager find; -------------------------------------------------------------------------------- /sepolicy/private/vzw_omadm_dcmo.te: -------------------------------------------------------------------------------- 1 | type vzw_omadm_dcmo, domain, coredomain; 2 | 3 | app_domain(vzw_omadm_dcmo) 4 | net_domain(vzw_omadm_dcmo) 5 | 6 | # Services 7 | allow vzw_omadm_dcmo app_api_service:service_manager find; 8 | allow vzw_omadm_dcmo qchook_service:service_manager find; 9 | allow vzw_omadm_dcmo radio_service:service_manager find; -------------------------------------------------------------------------------- /sepolicy/private/vzw_omadm_diagmon.te: -------------------------------------------------------------------------------- 1 | type vzw_omadm_diagmon, domain, coredomain; 2 | 3 | app_domain(vzw_omadm_diagmon) 4 | net_domain(vzw_omadm_diagmon) 5 | 6 | # Services 7 | allow vzw_omadm_diagmon app_api_service:service_manager find; 8 | allow vzw_omadm_diagmon qchook_service:service_manager find; 9 | allow vzw_omadm_diagmon radio_service:service_manager find; -------------------------------------------------------------------------------- /sepolicy/private/vzw_omadm_trigger.te: -------------------------------------------------------------------------------- 1 | type vzw_omadm_trigger, domain, coredomain; 2 | 3 | app_domain(vzw_omadm_trigger) 4 | net_domain(vzw_omadm_trigger) 5 | 6 | # Services 7 | allow vzw_omadm_trigger app_api_service:service_manager find; 8 | allow vzw_omadm_trigger qchook_service:service_manager find; 9 | allow vzw_omadm_trigger radio_service:service_manager find; -------------------------------------------------------------------------------- /sepolicy/private/wfc_activation_app.te: -------------------------------------------------------------------------------- 1 | type wfc_activation_app, domain, coredomain; 2 | 3 | app_domain(wfc_activation_app) 4 | net_domain(wfc_activation_app) 5 | 6 | # Services 7 | allow wfc_activation_app app_api_service:service_manager find; 8 | allow wfc_activation_app qchook_service:service_manager find; 9 | allow wfc_activation_app radio_service:service_manager find; 10 | -------------------------------------------------------------------------------- /sepolicy/public/charger.te: -------------------------------------------------------------------------------- 1 | allow charger self:capability2 wake_alarm; 2 | -------------------------------------------------------------------------------- /sepolicy/public/dataservice_app.te: -------------------------------------------------------------------------------- 1 | type dataservice_app, domain; -------------------------------------------------------------------------------- /sepolicy/public/file.te: -------------------------------------------------------------------------------- 1 | type debugfs_system_ion_heap, fs_type, debugfs_type; 2 | -------------------------------------------------------------------------------- /sepolicy/public/te_macros: -------------------------------------------------------------------------------- 1 | ########################################### 2 | # dump_hal(hal_type) 3 | # Ability to dump the hal debug info 4 | # 5 | define(`dump_hal', ` 6 | hal_client_domain(dumpstate, $1); 7 | allow $1_server dumpstate:fifo_file write; 8 | allow $1_server dumpstate:fd use; 9 | ') 10 | -------------------------------------------------------------------------------- /sepolicy/system_ext/private/platform_app.te: -------------------------------------------------------------------------------- 1 | # allow systemui to set boot animation colors 2 | set_prop(platform_app, bootanim_system_prop); 3 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/dumpstate.te: -------------------------------------------------------------------------------- 1 | # b/187006097 2 | dontaudit dumpstate incident:process signal; 3 | dontaudit dumpstate incident:process sigkill; 4 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/hal_drm_widevine.te: -------------------------------------------------------------------------------- 1 | # b/178757856 2 | dontaudit hal_drm_widevine firmware_file:dir search ; 3 | dontaudit hal_drm_widevine firmware_file:dir search ; 4 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/hal_dumpstate_impl.te: -------------------------------------------------------------------------------- 1 | # b/178757526 2 | dontaudit hal_dumpstate_impl citadel_updater_exec:file execute_no_trans ; 3 | dontaudit hal_dumpstate_impl citadel_updater_exec:file execute_no_trans ; 4 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/hal_health_default.te: -------------------------------------------------------------------------------- 1 | # b/187005897 2 | dontaudit hal_health_default unlabeled:file write; 3 | dontaudit hal_health_default unlabeled:file read; 4 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/hal_wlc.te: -------------------------------------------------------------------------------- 1 | # b/190690354 2 | dontaudit hal_wlc sysfs_msm_subsys:dir search; 3 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/incidentd.te: -------------------------------------------------------------------------------- 1 | # b/187006058 2 | dontaudit incidentd apex_info_file:file getattr; 3 | dontaudit incidentd sysfs_msm_subsys:dir search; 4 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/kernel.te: -------------------------------------------------------------------------------- 1 | # b/174527233 2 | dontaudit kernel sepolicy_file:file getattr; 3 | dontaudit kernel system_bootstrap_lib_file:file getattr; 4 | dontaudit kernel system_bootstrap_lib_file:dir getattr; 5 | -------------------------------------------------------------------------------- /sepolicy/tracking_denials/surfaceflinger.te: -------------------------------------------------------------------------------- 1 | # b/178757650 2 | dontaudit surfaceflinger hal_graphics_composer_default:dir search ; 3 | dontaudit surfaceflinger hal_graphics_composer_default:dir search ; 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/cbrs_setup.te: -------------------------------------------------------------------------------- 1 | # GoogleCBRS app 2 | type cbrs_setup_app, domain; 3 | 4 | userdebug_or_eng(` 5 | app_domain(cbrs_setup_app) 6 | net_domain(cbrs_setup_app) 7 | 8 | allow cbrs_setup_app app_api_service:service_manager find; 9 | allow cbrs_setup_app cameraserver_service:service_manager find; 10 | allow cbrs_setup_app radio_service:service_manager find; 11 | allow cbrs_setup_app surfaceflinger_service:service_manager find; 12 | set_prop(cbrs_setup_app, radio_prop) 13 | set_prop(cbrs_setup_app, vendor_radio_prop) 14 | ') 15 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/certs/pulse-release.x509.pem: -------------------------------------------------------------------------------- 1 | -----BEGIN CERTIFICATE----- 2 | MIICUjCCAbsCBEk0mH4wDQYJKoZIhvcNAQEEBQAwcDELMAkGA1UEBhMCVVMxCzAJ 3 | BgNVBAgTAkNBMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MRQwEgYDVQQKEwtHb29n 4 | bGUsIEluYzEUMBIGA1UECxMLR29vZ2xlLCBJbmMxEDAOBgNVBAMTB1Vua25vd24w 5 | HhcNMDgxMjAyMDIwNzU4WhcNMzYwNDE5MDIwNzU4WjBwMQswCQYDVQQGEwJVUzEL 6 | MAkGA1UECBMCQ0ExFjAUBgNVBAcTDU1vdW50YWluIFZpZXcxFDASBgNVBAoTC0dv 7 | b2dsZSwgSW5jMRQwEgYDVQQLEwtHb29nbGUsIEluYzEQMA4GA1UEAxMHVW5rbm93 8 | bjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAn0gDGZD5sUcmOE4EU9GPjAu/ 9 | jcd7JQSksSB8TGxEurwArcZhD6a2qy2oDjPy7vFrJqP2uFua+sqQn/u+s/TJT36B 10 | IqeY4OunXO090in6c2X0FRZBWqnBYX3Vg84Zuuigu9iF/BeptL0mQIBRIarbk3fe 11 | tAATOBQYiC7FIoL8WA0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQBAhmae1jHaQ4Td 12 | 0GHSJuBzuYzEuZ34teS+njy+l1Aeg98cb6lZwM5gXE/SrG0chM7eIEdsurGb6PIg 13 | Ov93F61lLY/MiQcI0SFtqERXWSZJ4OnTxLtM9Y2hnbHU/EG8uVhPZOZfQQ0FKf1b 14 | aIOMFB0Km9HbEZHLKg33kOoMsS2zpA== 15 | -----END CERTIFICATE----- 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/citadeld.te: -------------------------------------------------------------------------------- 1 | allow citadeld debugfs_ipc:dir search; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/device.te: -------------------------------------------------------------------------------- 1 | type ramoops_device, dev_type; 2 | type maxfg_device, dev_type; 3 | 4 | # Mark system_block_devices as super partition block devices for retrofit 5 | # dynamic partitions. 6 | typeattribute system_block_device super_block_device_type; 7 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/fastbootd.te: -------------------------------------------------------------------------------- 1 | recovery_only(` 2 | allow fastbootd ab_block_device:blk_file { w_file_perms ioctl }; 3 | allow fastbootd system_block_device:blk_file r_file_perms; 4 | 5 | allow fastbootd boot_block_device:blk_file ioctl; 6 | 7 | allow fastbootd devinfo_block_device:blk_file r_file_perms; 8 | allow fastbootd sysfs_leds:file w_file_perms; 9 | allow fastbootd citadel_device:chr_file rw_file_perms; 10 | userdebug_or_eng(` 11 | allow fastbootd firmware_file:dir { remove_name rmdir search write }; 12 | allow fastbootd firmware_file:{ file lnk_file } unlink; 13 | ') 14 | ') 15 | 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/file.te: -------------------------------------------------------------------------------- 1 | type sysfs_pstore, sysfs_type, fs_type; 2 | type ramoops_vendor_data_file, file_type, data_file_type, mlstrustedobject; 3 | type proc_touch, proc_type, fs_type; 4 | type sysfs_display, sysfs_type, fs_type; 5 | type sysfs_pixelstats, sysfs_type, fs_type; 6 | type persist_battery_file, file_type; 7 | type sysfs_chargelevel, sysfs_type, fs_type; 8 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/fsck.te: -------------------------------------------------------------------------------- 1 | allow fsck persist_block_device:blk_file rw_file_perms; 2 | 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/grilservice_app.te: -------------------------------------------------------------------------------- 1 | type grilservice_app, domain; 2 | 3 | app_domain(grilservice_app) 4 | 5 | allow grilservice_app hal_radioext_hwservice:hwservice_manager find; 6 | allow grilservice_app hal_wifi_ext_hwservice:hwservice_manager find; 7 | allow grilservice_app hal_wifi_ext_service:service_manager find; 8 | allow grilservice_app app_api_service:service_manager find; 9 | allow grilservice_app hal_bluetooth_sar_hwservice:hwservice_manager find; 10 | 11 | binder_call(grilservice_app, hal_radioext_default) 12 | binder_call(grilservice_app, hal_wifi_ext) 13 | 14 | # this denial on grilservice_app since this AudioMetric functionality is not used in legacy device. 15 | dontaudit grilservice_app hal_audiometricext_hwservice:hwservice_manager find; 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_confirmationui.te: -------------------------------------------------------------------------------- 1 | binder_call(hal_confirmationui_server, hal_tui_comm) 2 | binder_call(hal_confirmationui_server, citadeld) 3 | allow hal_confirmationui_server citadeld_service:service_manager find; 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_contexthub.te: -------------------------------------------------------------------------------- 1 | # Allow context hub HAL to communicate with daemon via socket 2 | allow hal_contexthub_default chre:unix_stream_socket connectto; 3 | allow hal_contexthub_default chre_socket:sock_file write; 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_fingerprint.te: -------------------------------------------------------------------------------- 1 | get_prop(hal_fingerprint_default, hwservicemanager_prop) 2 | allow hal_fingerprint_default fwk_stats_hwservice:hwservice_manager find; 3 | binder_call(hal_fingerprint_default, statsd) 4 | 5 | allow hal_fingerprint input_device:dir r_dir_perms; 6 | allow hal_fingerprint input_device:chr_file r_file_perms; 7 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_health_storage_default.te: -------------------------------------------------------------------------------- 1 | # Write to /sys/devices/platform/soc/1d84000.ufshc/manual_gc 2 | allow hal_health_storage_default sysfs:dir r_dir_perms; 3 | allow hal_health_storage_default sysfs_scsi_devices_0000:file rw_file_perms; 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_keymaster_citadel.te: -------------------------------------------------------------------------------- 1 | get_prop(hal_keymaster_citadel, vendor_tee_listener_prop) 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_usb_gadget_impl.te: -------------------------------------------------------------------------------- 1 | type hal_usb_gadget_impl, domain; 2 | hal_server_domain(hal_usb_gadget_impl, hal_usb) 3 | hal_server_domain(hal_usb_gadget_impl, hal_usb_gadget) 4 | 5 | type hal_usb_gadget_impl_exec, vendor_file_type, exec_type, file_type; 6 | init_daemon_domain(hal_usb_gadget_impl) 7 | 8 | allow hal_usb_gadget_impl configfs:dir { create rmdir }; 9 | allow hal_usb_gadget_impl functionfs:dir { watch watch_reads }; 10 | set_prop(hal_usb_gadget_impl, vendor_usb_prop) 11 | 12 | allow hal_usb_gadget_impl sysfs_batteryinfo:dir r_dir_perms; 13 | allow hal_usb_gadget_impl sysfs_batteryinfo:file rw_file_perms; 14 | allow hal_usb_gadget_impl sysfs_extcon:dir search; 15 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hal_wifi_ext.te: -------------------------------------------------------------------------------- 1 | type hal_wifi_ext, domain; 2 | hal_server_domain(hal_wifi_ext, hal_wifi) 3 | 4 | type hal_wifi_ext_exec, exec_type, vendor_file_type, file_type; 5 | init_daemon_domain(hal_wifi_ext) 6 | 7 | # Allow to start the IWifi:wifi_ext service 8 | add_hwservice(hal_wifi_ext, hal_wifi_ext_hwservice); 9 | add_service(hal_wifi_ext, hal_wifi_ext_service) 10 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hwservice.te: -------------------------------------------------------------------------------- 1 | type hal_wifi_ext_hwservice, hwservice_manager_type, vendor_hwservice_type; 2 | type hal_bluetooth_sar_hwservice, hwservice_manager_type, vendor_hwservice_type; 3 | type hal_audiometricext_hwservice, hwservice_manager_type; 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/hwservice_contexts: -------------------------------------------------------------------------------- 1 | vendor.google.wifi_ext::IWifiExt u:object_r:hal_wifi_ext_hwservice:s0 2 | 3 | # BT HAL HWSERVICE 4 | hardware.google.bluetooth.sar::IBluetoothSar u:object_r:hal_bluetooth_sar_hwservice:s0 5 | vendor.google.audiometricext::IAudioMetricExt u:object_r:hal_audiometricext_hwservice:s0 6 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/init-devstart-sh.te: -------------------------------------------------------------------------------- 1 | # ramoops 2 | dontaudit init-qcom-devstart-sh sysfs_pstore:file { getattr }; 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/init-fingerprint.te: -------------------------------------------------------------------------------- 1 | type init-fingerprint, domain; 2 | type init-fingerprint_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(init-fingerprint) 5 | 6 | allow init-fingerprint vendor_shell_exec:file rx_file_perms; 7 | allow init-fingerprint vendor_toolbox_exec:file rx_file_perms; 8 | 9 | set_prop(init-fingerprint, vendor_fingerprint_prop) 10 | set_prop(init-fingerprint, ctl_start_prop) 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/init-firstboot.te: -------------------------------------------------------------------------------- 1 | type init-firstboot, domain; 2 | type init-firstboot_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(init-firstboot) 5 | 6 | allow init-firstboot vendor_shell_exec:file rx_file_perms; 7 | allow init-firstboot vendor_toolbox_exec:file rx_file_perms; 8 | 9 | # Read USB connection state 10 | allow init-firstboot sysfs_msm_subsys:dir search; 11 | r_dir_file(init-firstboot, sysfs_batteryinfo) 12 | 13 | # Set property to trigger a shutdown 14 | set_prop(init-firstboot, powerctl_prop) 15 | 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/keys.conf: -------------------------------------------------------------------------------- 1 | [@TANGO] 2 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/tango_release.x509.pem 3 | 4 | # Release builds of Android should not trust development builds of Tango. 5 | # Unfortnately the infrastructure requires a certificate for each build variant, 6 | # so switch to a bogus, unused cert for user builds. 7 | [@TANGO_DEV] 8 | ENG : device/google/crosshatch/sepolicy/vendor/google/certs/tango.x509.pem 9 | USERDEBUG : device/google/crosshatch/sepolicy/vendor/google/certs/tango.x509.pem 10 | USER : device/google/crosshatch/sepolicy/vendor/google/certs/tango_userdev.x509.pem 11 | 12 | [@GOOGLE] 13 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/app.x509.pem 14 | 15 | [@GOOGLEPULSE] 16 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/pulse-release.x509.pem 17 | 18 | [@EASEL] 19 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/easel.x509.pem 20 | 21 | [@MDS] 22 | ALL : device/google/crosshatch/sepolicy/vendor/google/certs/com_google_mds.x509.pem 23 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/mediacodec.te: -------------------------------------------------------------------------------- 1 | allow mediacodec self:binder call; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/mediaswcodec.te: -------------------------------------------------------------------------------- 1 | allow mediaswcodec gpu_device:chr_file { ioctl open read write }; 2 | 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/modem_diagnostics.te: -------------------------------------------------------------------------------- 1 | # ModemDiagnosticSystem app 2 | type modem_diagnostic_app, domain; 3 | 4 | app_domain(modem_diagnostic_app) 5 | net_domain(modem_diagnostic_app) 6 | 7 | allow modem_diagnostic_app app_api_service:service_manager find; 8 | allow modem_diagnostic_app surfaceflinger_service:service_manager find; 9 | allow modem_diagnostic_app radio_service:service_manager find; 10 | 11 | userdebug_or_eng(` 12 | allow modem_diagnostic_app diag_device:chr_file rw_file_perms; 13 | 14 | allow modem_diagnostic_app sysfs_esim:file r_file_perms; 15 | 16 | allow modem_diagnostic_app ssr_log_file:dir r_dir_perms; 17 | allow modem_diagnostic_app ssr_log_file:file r_file_perms; 18 | 19 | unix_socket_connect(modem_diagnostic_app, diag, qlogd); 20 | 21 | set_prop(modem_diagnostic_app, vendor_modem_diag_prop) 22 | set_prop(modem_diagnostic_app, radio_control_prop) 23 | 24 | allow modem_diagnostic_app sysfs_batteryinfo:file r_file_perms; 25 | allow modem_diagnostic_app sysfs_batteryinfo:dir search; 26 | ') 27 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/modem_svc.te: -------------------------------------------------------------------------------- 1 | type modem_svc, domain; 2 | type modem_svc_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(modem_svc) 5 | 6 | allow modem_svc self:capability net_bind_service; 7 | allow modem_svc self:socket create_socket_perms; 8 | allowxperm modem_svc self:socket ioctl msm_sock_ipc_ioctls; 9 | 10 | # For property service 11 | set_prop(modem_svc, vendor_modem_diag_prop) 12 | set_prop(modem_svc, vendor_modem_prop) 13 | get_prop(modem_svc, vendor_build_type_prop) 14 | get_prop(modem_svc, radio_control_prop) 15 | 16 | # For bugreport collection 17 | allow modem_svc hal_dumpstate_impl:fd use; 18 | allow modem_svc dumpstate:fd use; 19 | allow modem_svc shell_data_file:file write; 20 | 21 | dontaudit modem_svc kernel:system module_request; 22 | dontaudit modem_svc sysfs_msm_subsys:dir search; 23 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/property.te: -------------------------------------------------------------------------------- 1 | vendor_internal_prop(vendor_build_type_prop) 2 | vendor_internal_prop(vendor_modem_prop) 3 | vendor_internal_prop(vendor_ramoops_prop) 4 | vendor_internal_prop(vendor_shutdown_prop) 5 | 6 | # fingerprint 7 | vendor_internal_prop(vendor_fingerprint_prop) 8 | 9 | # hal_health 10 | vendor_internal_prop(vendor_battery_defender_prop) 11 | 12 | # Logger 13 | vendor_internal_prop(vendor_logger_prop) 14 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/ramoops.te: -------------------------------------------------------------------------------- 1 | type ramoops, domain; 2 | type ramoops_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(ramoops); 5 | 6 | # kmod=crypto-gcm(aes) 7 | dontaudit ramoops kernel:system module_request; 8 | 9 | allow ramoops ramoops_exec:file rx_file_perms; 10 | allow ramoops vendor_shell_exec:file rx_file_perms; 11 | allow ramoops vendor_toolbox_exec:file rx_file_perms; 12 | 13 | set_prop(ramoops, vendor_ramoops_prop); 14 | 15 | allow ramoops sysfs_pstore:file rw_file_perms; 16 | allow ramoops ramoops_device:chr_file rw_file_perms; 17 | allow ramoops ramoops_vendor_data_file:file create_file_perms; 18 | allow ramoops ramoops_vendor_data_file:dir rw_dir_perms; 19 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/seapp_contexts: -------------------------------------------------------------------------------- 1 | # Domain for grilservice 2 | user=_app isPrivApp=true name=com.google.android.grilservice domain=grilservice_app levelFrom=all 3 | 4 | # Domain for GoogleCBRS app 5 | user=_app seinfo=platform name=com.google.googlecbrs domain=cbrs_setup_app type=app_data_file levelFrom=user 6 | 7 | # Domain for modem diagnostic system 8 | user=_app seinfo=mds name=com.google.mds domain=modem_diagnostic_app type=app_data_file levelFrom=user 9 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/service.te: -------------------------------------------------------------------------------- 1 | type hal_wifi_ext_service, service_manager_type, hal_service_type; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/service_contexts: -------------------------------------------------------------------------------- 1 | vendor.google.wifi_ext.IWifiExt/default u:object_r:hal_wifi_ext_service:s0 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/shell.te: -------------------------------------------------------------------------------- 1 | dontaudit shell sysfs_wlc:dir search; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/google/vendor_init.te: -------------------------------------------------------------------------------- 1 | # ro.vendor.build.type 2 | set_prop(vendor_init, vendor_build_type_prop) 3 | 4 | # To allow setting audio.camerasound.force based on 5 | # ro.boot.hardware.radio.subtype at boot 6 | get_prop(vendor_init, vendor_radio_sku_prop) 7 | 8 | # Allow vendor_init to set property of logpersistd_logging_prop 9 | userdebug_or_eng(` 10 | set_prop(vendor_init, logpersistd_logging_prop) 11 | ') 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/adsprpcd.te: -------------------------------------------------------------------------------- 1 | type adsprpcd, domain; 2 | type adsprpcd_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(adsprpcd) 5 | 6 | allow adsprpcd ion_device:chr_file r_file_perms; 7 | allow adsprpcd qdsp_device:chr_file r_file_perms; 8 | 9 | allow adsprpcd system_file:dir r_dir_perms; 10 | 11 | r_dir_file(adsprpcd, adsprpcd_file) 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/app.te: -------------------------------------------------------------------------------- 1 | # For the camera app 2 | get_prop(appdomain, vendor_camera_prop) 3 | 4 | get_prop(appdomain, vendor_display_prop) 5 | 6 | dontaudit appdomain sysfs_msm_subsys:dir search; 7 | dontaudit appdomain sysfs_msm_subsys:file r_file_perms; 8 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/attributes: -------------------------------------------------------------------------------- 1 | # All types in /mnt/vendor/persist 2 | attribute vendor_persist_type; 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/audioserver.te: -------------------------------------------------------------------------------- 1 | binder_call(audioserver, bootanim) 2 | 3 | allow audioserver sysfs_soc:file r_file_perms; 4 | allow audioserver sysfs_soc:dir search; 5 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/bluetooth.te: -------------------------------------------------------------------------------- 1 | typeattribute bluetooth system_writes_vendor_properties_violators; 2 | set_prop(bluetooth, vendor_bluetooth_prop) 3 | 4 | # Allow access to net_admin ioctls 5 | allowxperm bluetooth self:udp_socket ioctl priv_sock_ioctls; 6 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/bootanim.te: -------------------------------------------------------------------------------- 1 | allow bootanim hwservicemanager:binder call; 2 | 3 | # TODO(b/62954877). On Android Wear, bootanim reads the time 4 | # during boot to display. It currently gets that time from a file 5 | # in /data/system. This should be moved. In the meantime, suppress 6 | # this denial on phones since this functionality is not used. 7 | dontaudit bootanim system_data_file:dir read; 8 | 9 | # TODO(b/37205419): Remove upon resolution 10 | dontaudit bootanim kernel:system module_request; 11 | 12 | get_prop(bootanim, vendor_display_prop) 13 | 14 | dontaudit bootanim sysfs_msm_subsys:dir search; 15 | dontaudit bootanim sysfs_msm_subsys:file r_file_perms; 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/cameraserver.te: -------------------------------------------------------------------------------- 1 | allow cameraserver gpu_device:chr_file rw_file_perms; 2 | 3 | typeattribute cameraserver system_writes_vendor_properties_violators; 4 | get_prop(cameraserver, vendor_camera_prop) 5 | 6 | allow cameraserver sysfs_camera:file r_file_perms; 7 | allow cameraserver sysfs_camera:dir search; 8 | 9 | allow cameraserver system_server:unix_stream_socket { read write }; 10 | 11 | binder_call(cameraserver, mediacodec) 12 | 13 | dontaudit cameraserver vendor_display_prop:file r_file_perms; 14 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/cdsprpcd.te: -------------------------------------------------------------------------------- 1 | # cdsprpcd daemon 2 | type cdsprpcd, domain; 3 | type cdsprpcd_exec, exec_type, vendor_file_type, file_type; 4 | 5 | # Started by init 6 | init_daemon_domain(cdsprpcd) 7 | 8 | # For reading dir/files on /dsp 9 | r_dir_file(cdsprpcd, adsprpcd_file) 10 | 11 | allow cdsprpcd qdsp_device:chr_file r_file_perms; 12 | allow cdsprpcd ion_device:chr_file r_file_perms; 13 | 14 | r_dir_file(cdsprpcd, sysfs_devfreq) 15 | allow cdsprpcd sysfs_devfreq_l3cdsp:dir r_dir_perms; 16 | allow cdsprpcd sysfs_devfreq_l3cdsp:file rw_file_perms; -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/chre.te: -------------------------------------------------------------------------------- 1 | # This daemon loads the Context Hub Runtime Environment (CHRE) dynamic modules 2 | # onto the SLPI using FastRPC, and exposes a sockets interface for clients on 3 | # the applications processor to interact CHRE 4 | type chre, domain; 5 | type chre_exec, exec_type, vendor_file_type, file_type; 6 | 7 | init_daemon_domain(chre) 8 | 9 | allow chre system_file:dir read; 10 | 11 | allow chre ion_device:chr_file r_file_perms; 12 | allow chre qdsp_device:chr_file r_file_perms; 13 | allow chre dsp_device:chr_file r_file_perms; 14 | 15 | r_dir_file(chre, adsprpcd_file) 16 | 17 | # Allow CHRE to obtain wakelock 18 | wakelock_use(chre) 19 | 20 | # To communicate with ST HAL 21 | hal_client_domain(chre, hal_audio) 22 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/con_monitor.te: -------------------------------------------------------------------------------- 1 | # ConnectivityMonitor app 2 | type con_monitor_app, domain, coredomain; 3 | 4 | app_domain(con_monitor_app) 5 | 6 | set_prop(con_monitor_app, radio_prop) 7 | userdebug_or_eng(`set_prop(con_monitor_app, dumpstate_options_prop)') 8 | allow con_monitor_app app_api_service:service_manager find; 9 | allow con_monitor_app radio_vendor_data_file:dir rw_dir_perms; 10 | allow con_monitor_app radio_vendor_data_file:file create_file_perms; 11 | allow con_monitor_app radio_service:service_manager find; 12 | allow con_monitor_app audioserver_service:service_manager find; 13 | hal_client_domain(con_monitor_app, hal_power_stats); 14 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/dataservice_app.te: -------------------------------------------------------------------------------- 1 | get_prop(dataservice_app, cnd_prop) 2 | 3 | r_dir_file(dataservice_app, sysfs_msm_subsys) 4 | 5 | allow dataservice_app hal_imsrcsd_hwservice:hwservice_manager find; 6 | 7 | binder_call(dataservice_app, cnd) 8 | 9 | # imsrcsd to bind with UceShimService.apk 10 | binder_call(dataservice_app, hal_rcsservice) 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/device.te: -------------------------------------------------------------------------------- 1 | type ab_block_device, dev_type; 2 | type at_device, dev_type; 3 | type avtimer_device, dev_type; 4 | type devinfo_block_device, dev_type; 5 | type diag_device, dev_type, mlstrustedobject; 6 | type dsp_device, dev_type; 7 | type easel_device, dev_type, mlstrustedobject; 8 | type gpt_block_device, dev_type; 9 | type ipa_dev, dev_type; 10 | type modem_block_device, dev_type; 11 | type persist_block_device, dev_type; 12 | type qsee_ipc_irq_spss_device, dev_type; 13 | type qdsp_device, dev_type, mlstrustedobject; 14 | type ramdump_device, dev_type; 15 | type rmnet_device, dev_type; 16 | type seemplog_device, dev_type; 17 | type sg_device, dev_type; 18 | type smd_device, dev_type; 19 | type spcom_device, dev_type; 20 | type ssd_block_device, dev_type; 21 | type ssr_device, dev_type; 22 | type wlan_device, dev_type; 23 | type xbl_block_device, dev_type; 24 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/domain.te: -------------------------------------------------------------------------------- 1 | # In order for /sys/kernel/debug/kgsl/proc//mem 2 | # to be created for memory tracking, the domain of 3 | # the tracked process must have permission to search 4 | # in /sys/kernel/debug/kgsl 5 | allow domain debugfs_kgsl:dir search; 6 | 7 | allow domain debugfs_ion:dir search; 8 | 9 | get_prop(domain, public_vendor_default_prop) 10 | get_prop(domain, vendor_radio_prop) 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/dumpstate.te: -------------------------------------------------------------------------------- 1 | dump_hal(hal_telephony) 2 | dump_hal(hal_thermal) 3 | dump_hal(hal_power) 4 | dump_hal(hal_power_stats) 5 | 6 | userdebug_or_eng(` 7 | allow dumpstate debugfs_dma_bufinfo:file r_file_perms; 8 | allow dumpstate proc_modules:file r_file_perms; 9 | allow dumpstate proc_stat:file r_file_perms; 10 | allow dumpstate persist_file:dir r_dir_perms; 11 | allow dumpstate sysfs_leds:dir search; 12 | allow dumpstate system_block_device:blk_file r_file_perms; 13 | allow dumpstate media_rw_data_file:file append; 14 | 15 | dontaudit dumpstate self:netlink_xfrm_socket create_socket_perms_no_ioctl; 16 | 17 | binder_call(dumpstate, per_mgr) 18 | ') 19 | 20 | # For collecting bugreports. 21 | allow dumpstate sysfs_scsi_devices_0000:file r_file_perms; 22 | allow dumpstate sysfs_scsi_devices_other:file r_file_perms; 23 | 24 | dontaudit dumpstate debugfs_dma_bufinfo:file r_file_perms; 25 | dontaudit dumpstate kernel:system module_request; 26 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/easel.te: -------------------------------------------------------------------------------- 1 | # easel service 2 | type easel, domain; 3 | type easel_exec, exec_type, vendor_file_type, file_type; 4 | 5 | init_daemon_domain(easel) 6 | 7 | hwbinder_use(easel) 8 | add_hwservice(easel, hal_paintbox_hwservice) 9 | get_prop(easel, hwservicemanager_prop) 10 | 11 | # access easel dev nodes 12 | allow easel easel_device:chr_file rw_file_perms; 13 | allow easel sysfs_easel:file rw_file_perms; 14 | allow easel sysfs_easel:dir r_dir_perms; 15 | 16 | # access easel thermal sysfs 17 | allow easel sysfs_thermal:dir r_dir_perms; 18 | allow easel sysfs_thermal:file r_file_perms; 19 | allow easel sysfs_thermal:lnk_file r_file_perms; 20 | 21 | # access "/proc/stat" 22 | allow easel proc_stat:file r_file_perms; 23 | 24 | allow easel google_camera_app:binder call; 25 | allow easel hal_camera_default:binder call; 26 | allow easel hal_neuralnetworks_paintbox:binder call; 27 | 28 | allow easel hal_graphics_allocator_default:fd use; 29 | allow easel ion_device:chr_file r_file_perms; 30 | 31 | # access to keychain for kernel based authentication 32 | allow easel kernel:key search; -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/easelservice_app.te: -------------------------------------------------------------------------------- 1 | type easelservice_app, domain; 2 | 3 | app_domain(easelservice_app) 4 | 5 | allow easelservice_app app_api_service:service_manager find; 6 | allow easelservice_app surfaceflinger_service:service_manager find; 7 | # Access to mnh_sm driver 8 | allow easelservice_app easel_device:chr_file { read write ioctl open }; 9 | # Access to libeaselmanager_client.so 10 | allow easelservice_app hal_paintbox_hwservice:hwservice_manager find; 11 | binder_call(easelservice_app, easel) 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/fsck.te: -------------------------------------------------------------------------------- 1 | allow fsck proc_version:file r_file_perms; 2 | allow fsck sysfs_dm:dir search; 3 | allow fsck sysfs_dm:file r_file_perms; 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ftmd.te: -------------------------------------------------------------------------------- 1 | type ftmd, domain; 2 | type ftmd_exec, exec_type, vendor_file_type, file_type; 3 | 4 | userdebug_or_eng(` 5 | # make transition from init to its domain 6 | init_daemon_domain(ftmd) 7 | ') 8 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_audio_default.te: -------------------------------------------------------------------------------- 1 | r_dir_file(hal_audio_default, sysfs_soc) 2 | 3 | hal_client_domain(hal_audio_default, hal_power) 4 | 5 | userdebug_or_eng(` 6 | allow hal_audio diag_device:chr_file rw_file_perms; 7 | ') 8 | 9 | # read-only permission to obtain the calibration data 10 | r_dir_file(hal_audio_default, persist_audio_file); 11 | allow hal_audio_default mnt_vendor_file:dir search; 12 | allow hal_audio_default persist_file:dir search; 13 | 14 | allow hal_audio_default audio_vendor_data_file:dir rw_dir_perms; 15 | allow hal_audio_default audio_vendor_data_file:file create_file_perms; 16 | 17 | # For interfacing with PowerHAL 18 | hal_client_domain(hal_audio_default, hal_power) 19 | 20 | # Allow hal to take wakelock 21 | wakelock_use(hal_audio_default) 22 | 23 | # read-only permission to obtain the soc data 24 | get_prop(hal_audio_default, vendor_bluetooth_prop) 25 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_bluetooth_default.te: -------------------------------------------------------------------------------- 1 | allow hal_bluetooth_default bt_device:chr_file rw_file_perms; 2 | 3 | # talk to system_server to set priority 4 | allow hal_bluetooth fwk_scheduler_hwservice:hwservice_manager find; 5 | allow hal_bluetooth system_server:binder call; 6 | 7 | set_prop(hal_bluetooth_default, vendor_bluetooth_prop) 8 | 9 | userdebug_or_eng(` 10 | allow hal_bluetooth_default diag_device:chr_file rw_file_perms; 11 | allow hal_bluetooth_default ramdump_vendor_data_file:dir rw_dir_perms; 12 | allow hal_bluetooth_default ramdump_vendor_data_file:file { create rw_file_perms }; 13 | allow hal_bluetooth_default sysfs_timestamp_switch:file r_file_perms; 14 | r_dir_file(hal_bluetooth_default, debugfs_ipc) 15 | r_dir_file(hal_bluetooth_default, sysfs_diag) 16 | set_prop(hal_bluetooth_default, vendor_ssr_prop) 17 | ') 18 | 19 | dontaudit hal_bluetooth_default diag_device:chr_file rw_file_perms; 20 | dontaudit hal_bluetooth_default kernel:system module_request; 21 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_cas_default.te: -------------------------------------------------------------------------------- 1 | # Allow CAS HAL to use vendor-binder service 2 | vndbinder_use(hal_cas_default); 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_drm_default.te: -------------------------------------------------------------------------------- 1 | allow hal_drm_default vndbinder_device:chr_file rw_file_perms; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_drm_widevine.te: -------------------------------------------------------------------------------- 1 | type hal_drm_widevine, domain; 2 | type hal_drm_widevine_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(hal_drm_widevine) 5 | 6 | hal_server_domain(hal_drm_widevine, hal_drm) 7 | 8 | vndbinder_use(hal_drm_widevine); 9 | 10 | allow hal_drm mediacodec:fd use; 11 | allow hal_drm { appdomain -isolated_app_all }:fd use; 12 | 13 | allow hal_drm_widevine hal_allocator_server:fd use; 14 | 15 | allow hal_drm_widevine mediadrm_vendor_data_file:dir create_dir_perms; 16 | allow hal_drm_widevine mediadrm_vendor_data_file:file create_file_perms; 17 | allow hal_drm_widevine hal_display_config_hwservice:hwservice_manager find; 18 | binder_call(hal_drm_widevine, hal_graphics_composer_default) 19 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_fingerprint.te: -------------------------------------------------------------------------------- 1 | allow hal_fingerprint sysfs_fingerprint:dir r_dir_perms; 2 | allow hal_fingerprint sysfs_fingerprint:file rw_file_perms; 3 | allow hal_fingerprint sysfs_msm_subsys:dir search; 4 | allow hal_fingerprint sysfs_msm_subsys:file r_file_perms; 5 | allow hal_fingerprint sysfs_camera:dir search; 6 | allow hal_fingerprint sysfs_camera:file r_file_perms; 7 | allow hal_fingerprint sysfs_leds:dir search; 8 | allow { hal_fingerprint -coredomain } sysfs_leds:file r_file_perms; 9 | allow hal_fingerprint sysfs_pinctrl:dir search; 10 | allow hal_fingerprint sysfs_pinctrl:file r_file_perms; 11 | 12 | allow hal_fingerprint tee_device:file rw_file_perms; 13 | allow { hal_fingerprint -coredomain } tee_device:chr_file rw_file_perms; 14 | allow hal_fingerprint uhid_device:chr_file rw_file_perms; 15 | 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_gatekeeper.te: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/sepolicy/vendor/qcom/common/hal_gatekeeper.te -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_gatekeeper_qti.te: -------------------------------------------------------------------------------- 1 | type hal_gatekeeper_qti, domain; 2 | hal_server_domain(hal_gatekeeper_qti, hal_gatekeeper) 3 | 4 | type hal_gatekeeper_qti_exec, exec_type, vendor_file_type, file_type; 5 | init_daemon_domain(hal_gatekeeper_qti) 6 | 7 | get_prop(hal_gatekeeper_qti, vendor_tee_listener_prop) 8 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_graphics_allocator_default.te: -------------------------------------------------------------------------------- 1 | dontaudit hal_graphics_allocator_default vendor_display_prop:file r_file_perms; 2 | 3 | dontaudit hal_graphics_allocator_default sysfs_msm_subsys:dir search; 4 | dontaudit hal_graphics_allocator_default sysfs_msm_subsys:file r_file_perms; 5 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_health_default.te: -------------------------------------------------------------------------------- 1 | r_dir_file(hal_health_default, sysfs_usb_c) 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_keymaster_qti.te: -------------------------------------------------------------------------------- 1 | type hal_keymaster_qti, domain; 2 | hal_server_domain(hal_keymaster_qti, hal_keymaster) 3 | 4 | type hal_keymaster_qti_exec, exec_type, vendor_file_type, file_type; 5 | init_daemon_domain(hal_keymaster_qti) 6 | 7 | get_prop(hal_keymaster_qti, vendor_tee_listener_prop) 8 | get_prop(hal_keymaster_qti, vendor_security_patch_level_prop) 9 | 10 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_light.te: -------------------------------------------------------------------------------- 1 | allow hal_light sysfs_graphics:dir search; 2 | allow hal_light sysfs_graphics:file rw_file_perms; 3 | allow hal_light sysfs_lights:dir search; 4 | allow hal_light sysfs_lights:file rw_file_perms; 5 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_light_default.te: -------------------------------------------------------------------------------- 1 | allow hal_light_default sysfs_msm_subsys:dir search; 2 | 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_lineage_health_default.te: -------------------------------------------------------------------------------- 1 | allow hal_lineage_health_default sysfs_msm_subsys:dir search; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_memtrack_default.te: -------------------------------------------------------------------------------- 1 | allow hal_memtrack_default sysfs_kgsl_proc:file r_file_perms; 2 | allow hal_memtrack_default sysfs_kgsl_proc:dir search; 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_neuralnetworks_paintbox.te: -------------------------------------------------------------------------------- 1 | type hal_neuralnetworks_paintbox, domain; 2 | hal_server_domain(hal_neuralnetworks_paintbox, hal_neuralnetworks) 3 | 4 | type hal_neuralnetworks_paintbox_exec, exec_type, vendor_file_type, file_type; 5 | init_daemon_domain(hal_neuralnetworks_paintbox) 6 | 7 | allow hal_neuralnetworks_paintbox hal_paintbox_hwservice:hwservice_manager find; 8 | 9 | allow hal_neuralnetworks_paintbox proc_stat:file r_file_perms; 10 | allow hal_neuralnetworks_paintbox easel_device:chr_file rw_file_perms; 11 | 12 | binder_call(hal_neuralnetworks_paintbox, easel) 13 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_nfc_default.te: -------------------------------------------------------------------------------- 1 | # Data file accesses. 2 | allow hal_nfc_default nfc_vendor_data_file:dir create_dir_perms; 3 | allow hal_nfc_default nfc_vendor_data_file:file create_file_perms; 4 | 5 | allow hal_nfc_default hal_secure_element_default:binder call; 6 | 7 | allow hal_nfc_default nxpese_hwservice:hwservice_manager find; 8 | add_hwservice(hal_nfc_default, nxpnfc_hwservice) 9 | get_prop(hal_nfc_default, vendor_nfc_prop) 10 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_power_default.te: -------------------------------------------------------------------------------- 1 | allow hal_power_default sysfs_graphics:dir search; 2 | allow hal_power_default sysfs_graphics:file r_file_perms; 3 | 4 | # To do powerhint on nodes defined in powerhint.json 5 | allow hal_power_default sysfs_msm_subsys:dir search; 6 | allow hal_power_default sysfs_msm_subsys:file rw_file_perms; 7 | allow hal_power_default cgroup:dir search; 8 | allow hal_power_default cgroup:file rw_file_perms; 9 | allow hal_power_default debugfs_sched_features:file rw_file_perms; 10 | allow hal_power_default proc_sysctl_schedboost:file rw_file_perms; 11 | 12 | # Allow power hal to talk to mm-pp-daemon to control display lpm 13 | allow hal_power_default mm-pp-daemon:unix_stream_socket connectto; 14 | allow hal_power_default pps_socket:sock_file write; 15 | 16 | # interact with thermal_config 17 | set_prop(hal_power_default, vendor_thermal_prop) 18 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_power_stats_default.te: -------------------------------------------------------------------------------- 1 | # Allow power.stats hal to read from the following 2 | r_dir_file(hal_power_stats, sysfs_rpm) 3 | r_dir_file(hal_power_stats, sysfs_system_sleep_stats) 4 | r_dir_file(hal_power_stats, debugfs_wlan) 5 | r_dir_file(hal_power_stats, sysfs_easel) 6 | get_prop(hal_power_stats_default, wifi_hal_prop) # Needed to detect wifi on/off 7 | 8 | binder_call(hal_power_stats, citadeld) 9 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_secure_element_default.te: -------------------------------------------------------------------------------- 1 | hal_client_domain(hal_secure_element_default, hal_nfc) 2 | 3 | get_prop(hal_secure_element, vendor_secure_element_prop) 4 | allow hal_secure_element_default nxpnfc_hwservice:hwservice_manager find; 5 | add_hwservice(hal_secure_element_default, nxpese_hwservice) 6 | 7 | allow hal_secure_element_default secure_element_vendor_data_file:dir create_dir_perms; 8 | allow hal_secure_element_default secure_element_vendor_data_file:file create_file_perms; 9 | 10 | allow hal_secure_element_default sysfs_devicetree_ese:file r_file_perms; 11 | allow hal_secure_element_default debugfs_ipc:dir search; 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_telephony.te: -------------------------------------------------------------------------------- 1 | set_prop(hal_telephony_server, vendor_radio_prop) 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_tetheroffload_default.te: -------------------------------------------------------------------------------- 1 | # associate netdomain to use for accessing internet sockets 2 | net_domain(hal_tetheroffload_default) 3 | 4 | userdebug_or_eng(` 5 | # Allow using the logging file between ipacm and ipacm-diag 6 | unix_socket_send(hal_tetheroffload_default, ipacm, hal_tetheroffload_default) 7 | ') 8 | # Allow operations with /dev/ipa, /dev/wwan_ioctl and /dev/ipaNatTable 9 | allow hal_tetheroffload_default ipa_dev:chr_file rw_file_perms; 10 | 11 | # Allow receiving NETLINK messages 12 | allow hal_tetheroffload_default self:{ 13 | netlink_socket 14 | netlink_generic_socket 15 | } create_socket_perms_no_ioctl; 16 | 17 | # Allow creating and modifying the PID file 18 | allow hal_tetheroffload_default ipa_vendor_data_file:dir w_dir_perms; 19 | allow hal_tetheroffload_default ipa_vendor_data_file:file create_file_perms; 20 | 21 | # Register to hwbinder service 22 | hwbinder_use(hal_tetheroffload_default) 23 | get_prop(hal_tetheroffload_default, hwservicemanager_prop) 24 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_tui_comm.te: -------------------------------------------------------------------------------- 1 | type hal_tui_comm, domain; 2 | type hal_tui_comm_exec, file_type, vendor_file_type, exec_type; 3 | 4 | init_daemon_domain(hal_tui_comm); 5 | 6 | get_prop(hal_tui_comm, hwservicemanager_prop) 7 | 8 | add_hwservice(hal_tui_comm, hal_tui_comm_hwservice) 9 | hwbinder_use(hal_tui_comm) 10 | 11 | binder_call(hal_tui_comm, secure_ui_service_app) 12 | binder_call(hal_tui_comm, hal_confirmationui_default) 13 | binder_call(hal_tui_comm, tee) 14 | 15 | allow hal_tui_comm hal_graphics_allocator_default:fd use; 16 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_usb_impl.te: -------------------------------------------------------------------------------- 1 | type hal_usb_impl, domain; 2 | hal_server_domain(hal_usb_impl, hal_usb) 3 | hal_server_domain(hal_usb_impl, hal_usb_gadget) 4 | 5 | type hal_usb_impl_exec, exec_type, vendor_file_type, file_type; 6 | init_daemon_domain(hal_usb_impl) 7 | 8 | allow hal_usb_impl sysfs_msm_subsys:dir search; 9 | allow hal_usb_impl sysfs_msm_subsys:file r_file_perms; 10 | r_dir_file(hal_usb_impl, sysfs_usb_c) 11 | allow hal_usb_impl sysfs_usb_c:file w_file_perms; 12 | allow hal_usb_impl sysfs_usb_device:dir r_dir_perms; 13 | allow hal_usb_impl sysfs_usb_device:file rw_file_perms; 14 | allow hal_usb_impl configfs:file create_file_perms; 15 | 16 | set_prop(hal_usb_impl, vendor_usb_config_prop) 17 | get_prop(hal_usb_impl, vendor_usb_prop) 18 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_vibrator_default.te: -------------------------------------------------------------------------------- 1 | r_dir_file(hal_vibrator_default, sysfs_leds) 2 | allow hal_vibrator_default sysfs_leds:file w_file_perms; 3 | allow hal_vibrator_default sysfs_msm_subsys:file rw_file_perms; 4 | allow hal_vibrator_default sysfs_msm_subsys:dir search; 5 | 6 | # read-only permission to obtain the calibration data 7 | r_dir_file(hal_vibrator_default, persist_haptics_file) 8 | allow hal_vibrator_default mnt_vendor_file:dir search; 9 | allow hal_vibrator_default persist_file:dir search; 10 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_wifi_default.te: -------------------------------------------------------------------------------- 1 | # Allow wifi hal access to LOWI 2 | allow hal_wifi_default location:unix_stream_socket connectto; 3 | 4 | # write to files owned by location daemon 5 | allow hal_wifi_default location_socket:dir search; 6 | allow hal_wifi_default location_socket:sock_file write; 7 | allow hal_wifi_default location_data_file:{ file fifo_file } create_file_perms; 8 | 9 | allow hal_wifi_default wlan_device:chr_file w_file_perms; 10 | 11 | # Allow wifi hal to read debug info from the driver. 12 | r_dir_file(hal_wifi_default, proc_wifi_dbg) 13 | 14 | # Write wlan driver/fw version into property 15 | set_prop(hal_wifi_default, vendor_wifi_version) 16 | 17 | dontaudit hal_wifi_default kernel:system module_request; 18 | dontaudit hal_wifi_default self:capability sys_module; 19 | 20 | userdebug_or_eng(` 21 | # debugfs entries are only needed in user-debug or eng builds 22 | 23 | # Allow wifi hal to access wlan debugfs files and directories 24 | allow hal_wifi_default debugfs_wlan:dir r_dir_perms; 25 | ') 26 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_wifi_ext.te: -------------------------------------------------------------------------------- 1 | # Allow wifi hal access to LOWI 2 | allow hal_wifi_ext location:unix_stream_socket connectto; 3 | 4 | # write to files owned by location daemon 5 | allow hal_wifi_ext location_socket:dir search; 6 | allow hal_wifi_ext location_socket:sock_file write; 7 | allow hal_wifi_ext location_data_file:{ file fifo_file } create_file_perms; 8 | 9 | allow hal_wifi_ext wlan_device:chr_file rw_file_perms; 10 | 11 | # Allow wifi hal to read debug info from the driver. 12 | r_dir_file(hal_wifi_ext, proc_wifi_dbg) 13 | 14 | # Write wlan driver/fw version into property 15 | set_prop(hal_wifi_ext, vendor_wifi_version) 16 | 17 | # Allow wifi_ext to report callbacks to gril-service app 18 | allow hal_wifi_ext grilservice_app:binder call; 19 | 20 | dontaudit hal_wifi_ext kernel:system module_request; 21 | dontaudit hal_wifi_ext self:capability sys_module; 22 | 23 | userdebug_or_eng(` 24 | # debugfs entries are only needed in user-debug or eng builds 25 | 26 | # Allow wifi hal to access wlan debugfs files and directories 27 | allow hal_wifi_ext debugfs_wlan:dir r_dir_perms; 28 | ') 29 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_wifi_hostapd.te: -------------------------------------------------------------------------------- 1 | userdebug_or_eng(` 2 | allow hal_wifi_hostapd wifi_vendor_log_data_file:dir search; 3 | ') 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_wifi_supplicant_default.te: -------------------------------------------------------------------------------- 1 | allow hal_wifi_supplicant_default self:socket create_socket_perms; 2 | # ioctlcmd=c304, c302 3 | allowxperm hal_wifi_supplicant_default self:socket ioctl msm_sock_ipc_ioctls; 4 | 5 | allow hal_wifi_supplicant_default cnd:unix_dgram_socket sendto; 6 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/hal_wlc.te: -------------------------------------------------------------------------------- 1 | type hal_wlc, domain; 2 | type hal_wlc_exec, exec_type, vendor_file_type, file_type; 3 | 4 | hwbinder_use(hal_wlc) 5 | add_hwservice(hal_wlc, hal_wlc_hwservice) 6 | get_prop(hal_wlc, hwservicemanager_prop) 7 | 8 | init_daemon_domain(hal_wlc) 9 | 10 | # Allow access to /sys/class/power_supply/wireless 11 | r_dir_file(hal_wlc, sysfs_batteryinfo) 12 | 13 | # Allow access to /sys/devices/platform/soc/a88000.i2c/i2c-0/0-0061 14 | r_dir_file(hal_wlc, sysfs_wlc) 15 | allow hal_wlc sysfs_wlc:file rw_file_perms; 16 | 17 | allow hal_wlc self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; 18 | 19 | binder_call(hal_wlc, platform_app) 20 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/healthd.te: -------------------------------------------------------------------------------- 1 | allow healthd self:global_capability2_class_set wake_alarm; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/init-insmod-sh.te: -------------------------------------------------------------------------------- 1 | type init-insmod-sh, domain; 2 | type init-insmod-sh_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(init-insmod-sh) 5 | 6 | allow init-insmod-sh vendor_shell_exec:file rx_file_perms; 7 | allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms; 8 | 9 | # Set the vendor.all.modules.ready property 10 | set_prop(init-insmod-sh, vendor_device_prop) 11 | 12 | # Allow insmod 13 | allow init-insmod-sh self:capability sys_module; 14 | allow init-insmod-sh system_file:system module_load; 15 | 16 | allow init-insmod-sh vendor_file:system module_load; 17 | 18 | allow init-insmod-sh kernel:key search; 19 | 20 | # Caused by insmod wlan.ko. 21 | dontaudit init-insmod-sh debugfs_wlan:dir search; 22 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/init-ipastart-sh.te: -------------------------------------------------------------------------------- 1 | type init-qcom-ipastart-sh, domain; 2 | type init-qcom-ipastart-sh_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(init-qcom-ipastart-sh) 5 | 6 | allow init-qcom-ipastart-sh vendor_shell_exec:file rx_file_perms; 7 | allow init-qcom-ipastart-sh vendor_toolbox_exec:file rx_file_perms; 8 | 9 | # Set /dev/ipa to 1 10 | allow init-qcom-ipastart-sh ipa_dev:chr_file w_file_perms; 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/init.te: -------------------------------------------------------------------------------- 1 | allow init configfs:lnk_file create; 2 | 3 | allow init configfs:file w_file_perms; 4 | allow init debugfs_clk:file w_file_perms; 5 | 6 | allow init tty_device:chr_file rw_file_perms; 7 | 8 | allow init mnt_vendor_file:dir mounton; 9 | 10 | allow init ab_block_device:lnk_file relabelto; 11 | allow init boot_block_device:lnk_file relabelto; 12 | 13 | dontaudit init kernel:system module_request; 14 | 15 | # b/70518189 vDSO experiments 16 | allow init sysfs_vdso:file w_file_perms; 17 | 18 | allow init sysfs_poweroff:file w_file_perms; 19 | # b/72993533 Thermal mitigation in recovery mode 20 | allow init sysfs_thermal:file w_file_perms; 21 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/init_radio.te: -------------------------------------------------------------------------------- 1 | # /vendor/bin/init.radio.sh 2 | type init_radio, domain; 3 | type init_radio_exec, exec_type, vendor_file_type, file_type; 4 | 5 | init_daemon_domain(init_radio) 6 | 7 | allow init_radio vendor_shell_exec:file rx_file_perms; 8 | allow init_radio vendor_toolbox_exec:file rx_file_perms; 9 | 10 | allow init_radio radio_vendor_data_file:dir create_dir_perms; 11 | allow init_radio radio_vendor_data_file:file create_file_perms; 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ioctl_defines: -------------------------------------------------------------------------------- 1 | # socket ioctls 2 | define(`RMNET_IOCTL_EXTENDED', `0x000089FD') 3 | 4 | # socket ioctls defined in the kernel in include/uapi/linux/msm_ipc.h 5 | define(`IPC_ROUTER_IOCTL_GET_VERSION', `0x0000c300') 6 | define(`IPC_ROUTER_IOCTL_GET_MTU', `0x0000c301') 7 | define(`IPC_ROUTER_IOCTL_LOOKUP_SERVER', `0x0000c302') 8 | define(`IPC_ROUTER_IOCTL_GET_CURR_PKT_SIZE', `0x0000c303') 9 | define(`IPC_ROUTER_IOCTL_BIND_CONTROL_PORT', `0x0000c304') 10 | define(`IPC_ROUTER_IOCTL_CONFIG_SEC_RULES', `0x0000c305') 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ioctl_macros: -------------------------------------------------------------------------------- 1 | define(`msm_sock_ipc_ioctls', `{ 2 | IPC_ROUTER_IOCTL_GET_VERSION 3 | IPC_ROUTER_IOCTL_GET_MTU 4 | IPC_ROUTER_IOCTL_LOOKUP_SERVER 5 | IPC_ROUTER_IOCTL_GET_CURR_PKT_SIZE 6 | IPC_ROUTER_IOCTL_BIND_CONTROL_PORT 7 | IPC_ROUTER_IOCTL_CONFIG_SEC_RULES 8 | }') 9 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/irqbalance.te: -------------------------------------------------------------------------------- 1 | type irqbalance, domain; 2 | type irqbalance_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(irqbalance); 5 | 6 | allow irqbalance sysfs_devices_system_cpu:file rw_file_perms; 7 | allow irqbalance proc_irq:dir r_dir_perms; 8 | allow irqbalance proc_irq:file rw_file_perms; 9 | allow irqbalance sysfs_irq:file r_file_perms; 10 | 11 | allow irqbalance proc_stat:file r_file_perms; 12 | allow irqbalance proc_interrupts:file r_file_perms; 13 | 14 | r_dir_file(irqbalance, proc) 15 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/irsc_util.te: -------------------------------------------------------------------------------- 1 | type irsc_util, domain; 2 | type irsc_util_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(irsc_util) 5 | 6 | allow irsc_util self:socket create_socket_perms; 7 | allowxperm irsc_util self:socket ioctl msm_sock_ipc_ioctls; 8 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/kernel.te: -------------------------------------------------------------------------------- 1 | # for diag over socket 2 | allow kernel self:socket create; 3 | 4 | allow kernel debugfs_wlan:dir search; 5 | 6 | dontaudit kernel kernel:system module_request; 7 | 8 | # Read FDs from /vendor/firmware 9 | allow kernel vendor_file:file r_file_perms; 10 | 11 | allow kernel debugfs_ipc:dir search; 12 | allow kernel persist_file:dir search; 13 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/mediacodec.te: -------------------------------------------------------------------------------- 1 | allow mediacodec sysfs_soc:file r_file_perms; 2 | allow mediacodec sysfs_soc:dir search; 3 | 4 | allow mediacodec system_file:dir r_dir_perms; 5 | 6 | userdebug_or_eng(` 7 | allow mediacodec dumpstate:fd use; 8 | ') 9 | 10 | dontaudit mediacodec vendor_display_prop:file r_file_perms; 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/mediaextractor.te: -------------------------------------------------------------------------------- 1 | userdebug_or_eng(` 2 | allow mediaextractor dumpstate:fifo_file append; 3 | ') 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/mediaserver.te: -------------------------------------------------------------------------------- 1 | dontaudit mediaserver vendor_display_prop:file r_file_perms; 2 | dontaudit mediaserver sysfs_msm_subsys:dir search; 3 | dontaudit mediaserver sysfs_msm_subsys:file r_file_perms; 4 | 5 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/mediatranscoding.te: -------------------------------------------------------------------------------- 1 | get_prop(domain, vendor_display_prop) 2 | 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/netutils_wrapper.te: -------------------------------------------------------------------------------- 1 | # For netutils to be able to write their stdout stderr to the pipes opened by netmgrd 2 | allow netutils_wrapper netmgrd:fd use; 3 | allow netutils_wrapper netmgrd:fifo_file { getattr ioctl read write append }; 4 | allowxperm netutils_wrapper netmgrd:fifo_file ioctl { TCGETS }; 5 | 6 | userdebug_or_eng(` 7 | allow netutils_wrapper diag_device:chr_file rw_file_perms; 8 | ') 9 | 10 | dontaudit netutils_wrapper netmgrd:unix_stream_socket { read write }; 11 | dontaudit netutils_wrapper netmgrd:socket { read write }; 12 | dontaudit netutils_wrapper netmgrd:netlink_socket { getattr read write append }; 13 | dontaudit netutils_wrapper kernel:system module_request; 14 | dontaudit netutils_wrapper self:capability sys_module; 15 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/omadm.te: -------------------------------------------------------------------------------- 1 | # OMADM app 2 | type omadm_app, domain; 3 | 4 | app_domain(omadm_app) 5 | net_domain(omadm_app) 6 | 7 | allow omadm_app app_api_service:service_manager find; 8 | allow omadm_app radio_vendor_data_file:dir rw_dir_perms; 9 | allow omadm_app radio_vendor_data_file:file create_file_perms; 10 | allow omadm_app radio_service:service_manager find; 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/pd_services.te: -------------------------------------------------------------------------------- 1 | type pd_mapper, domain; 2 | 3 | type pd_mapper_exec, exec_type, vendor_file_type, file_type; 4 | init_daemon_domain(pd_mapper); 5 | 6 | allow pd_mapper self:capability { setgid setpcap setuid net_bind_service }; 7 | 8 | allow pd_mapper firmware_file:dir r_dir_perms; 9 | allow pd_mapper firmware_file:file r_file_perms; 10 | 11 | allow pd_mapper self:socket create_socket_perms; 12 | allowxperm pd_mapper self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT; 13 | 14 | r_dir_file(pd_mapper, sysfs_msm_subsys) 15 | userdebug_or_eng(`set_prop(pd_mapper, vendor_ssr_prop)') 16 | 17 | dontaudit pd_mapper kernel:system module_request; 18 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/per_mgr.te: -------------------------------------------------------------------------------- 1 | # Policy for pm-service and pm-proxy 2 | type per_mgr, domain; 3 | type per_mgr_exec, exec_type, vendor_file_type, file_type; 4 | 5 | init_daemon_domain(per_mgr); 6 | 7 | add_service(per_mgr, per_mgr_service) 8 | 9 | vndbinder_use(per_mgr) 10 | binder_call(per_mgr, hal_gnss) 11 | binder_call(per_mgr, per_proxy) 12 | binder_call(per_mgr, wcnss_service) 13 | binder_call(per_mgr, rild) 14 | 15 | allow per_mgr self:capability net_bind_service; 16 | 17 | allow per_mgr self:socket create_socket_perms; 18 | allowxperm per_mgr self:socket ioctl msm_sock_ipc_ioctls; 19 | allow per_mgr ssr_device:chr_file { open read }; 20 | 21 | r_dir_file(per_mgr, sysfs_msm_subsys) 22 | r_dir_file(per_mgr, sysfs) 23 | 24 | set_prop(per_mgr, per_mgr_state_prop) 25 | 26 | dontaudit per_mgr kernel:system module_request; 27 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/per_proxy.te: -------------------------------------------------------------------------------- 1 | # Policy for /system/bin/pm-proxy 2 | type per_proxy, domain; 3 | type per_proxy_exec, exec_type, vendor_file_type, file_type; 4 | 5 | init_daemon_domain(per_proxy) 6 | 7 | allow per_proxy per_mgr_service:service_manager find; 8 | r_dir_file(per_proxy, sysfs_type) 9 | 10 | vndbinder_use(per_proxy) 11 | binder_call(per_proxy, per_mgr) 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/platform_app.te: -------------------------------------------------------------------------------- 1 | # To read /persist/sensors/elmyra. 2 | allow platform_app persist_file:dir search; 3 | allow platform_app persist_sensors_file:dir search; 4 | allow platform_app persist_sensors_file:file r_file_perms; 5 | # To find and bind hal_wlc 6 | allow platform_app hal_wlc_hwservice:hwservice_manager find; 7 | allow platform_app hal_wlc:binder call; 8 | allow platform_app hal_wlc:binder { call transfer }; 9 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/port-bridge.te: -------------------------------------------------------------------------------- 1 | type port-bridge, domain; 2 | type port-bridge_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(port-bridge) 5 | 6 | r_dir_file(port-bridge, sysfs_msm_subsys) 7 | 8 | allow port-bridge sysfs_soc:dir search; 9 | allow port-bridge sysfs_soc:file r_file_perms; 10 | 11 | allow port-bridge at_device:chr_file rw_file_perms; 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/qlogd.te: -------------------------------------------------------------------------------- 1 | type qlogd, domain, mlstrustedsubject; 2 | type qlogd_exec, exec_type, vendor_file_type, file_type; 3 | 4 | # make transition from init to its domain 5 | init_daemon_domain(qlogd) 6 | 7 | allow qlogd diag_device:chr_file rw_file_perms; 8 | allow qlogd qlogd_exec:file rx_file_perms; 9 | 10 | allow qlogd radio_vendor_data_file:file create_file_perms; 11 | allow qlogd radio_vendor_data_file:dir create_dir_perms; 12 | 13 | set_prop(qlogd, vendor_modem_diag_prop) 14 | 15 | allow qlogd self:socket create_socket_perms; 16 | allowxperm qlogd self:socket ioctl msm_sock_ipc_ioctls; 17 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/qti.te: -------------------------------------------------------------------------------- 1 | type qti, domain; 2 | type qti_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(qti) 5 | net_domain(qti) 6 | 7 | allow qti sysfs_soc:dir search; 8 | allow qti sysfs_soc:file r_file_perms; 9 | 10 | allow qti smd_device:chr_file { read write }; 11 | allow qti rmnet_device:chr_file rw_file_perms; 12 | 13 | allow qti self:socket create_socket_perms; 14 | allowxperm qti self:socket ioctl msm_sock_ipc_ioctls; 15 | 16 | r_dir_file(qti, sysfs_msm_subsys) 17 | 18 | dontaudit qti kernel:system module_request; 19 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/qtidataservices_app.te: -------------------------------------------------------------------------------- 1 | type qtidataservices_app, domain; 2 | app_domain(qtidataservices_app) 3 | net_domain(qtidataservices_app) 4 | 5 | hwbinder_use(qtidataservices_app) 6 | 7 | allow qtidataservices_app hal_datafactory_hwservice:hwservice_manager find; 8 | allow qtidataservices_app location_service:service_manager find; 9 | allow qtidataservices_app radio_service:service_manager find; 10 | allow qtidataservices_app registry_service:service_manager find; 11 | allow qtidataservices_app thermal_service:service_manager find; 12 | allow qtidataservices_app wifi_service:service_manager find; 13 | 14 | binder_call(qtidataservices_app, cnd) 15 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/radio.te: -------------------------------------------------------------------------------- 1 | typeattribute radio system_writes_vendor_properties_violators; 2 | 3 | get_prop(radio, ims_prop) 4 | get_prop(radio, vendor_radio_prop) 5 | 6 | allow radio qmuxd_socket:dir search; 7 | allow radio qmuxd_socket:sock_file write; 8 | 9 | allow radio vendor_file:lnk_file r_file_perms; 10 | allow radio vendor_framework_file:file r_file_perms; 11 | allow radio vendor_framework_file:dir search; 12 | 13 | hwbinder_use(radio) 14 | allow radio hal_imsrtp_hwservice:hwservice_manager find; 15 | 16 | add_service(radio, radio_service) 17 | allow radio { 18 | mediaextractor_service 19 | }:service_manager find; 20 | 21 | r_dir_file(radio, sysfs_msm_subsys) 22 | 23 | # IMS needs permission to use avtimer 24 | allow radio avtimer_device:chr_file r_file_perms; 25 | 26 | binder_call(radio, hal_imsrtp) 27 | binder_call(radio, hal_rcsservice) 28 | allow radio hal_imsrcsd_hwservice:hwservice_manager find; 29 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ramdump_app.te: -------------------------------------------------------------------------------- 1 | type ramdump_app, domain; 2 | 3 | userdebug_or_eng(` 4 | app_domain(ramdump_app) 5 | 6 | allow ramdump_app app_api_service:service_manager find; 7 | allow ramdump_app surfaceflinger_service:service_manager find; 8 | 9 | allow ramdump_app ramdump_vendor_data_file:file create_file_perms; 10 | allow ramdump_app ramdump_vendor_data_file:dir create_dir_perms; 11 | allow ramdump_app wifidump_vendor_data_file:file r_file_perms; 12 | 13 | set_prop(ramdump_app, vendor_ramdump_prop); 14 | get_prop(system_app, vendor_ssr_prop) 15 | get_prop(ramdump_app, system_boot_reason_prop) 16 | 17 | # To access ramdumpfs. 18 | allow ramdump_app mnt_vendor_file:dir search; 19 | allow ramdump_app ramdump_vendor_mnt_file:dir create_dir_perms; 20 | allow ramdump_app ramdump_vendor_mnt_file:file create_file_perms; 21 | ') 22 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ril_config_service.te: -------------------------------------------------------------------------------- 1 | type ril_config_service_app, domain; 2 | app_domain(ril_config_service_app) 3 | 4 | set_prop(ril_config_service_app, vendor_radio_prop) 5 | allow ril_config_service_app app_api_service:service_manager find; 6 | allow ril_config_service_app radio_vendor_data_file:dir rw_dir_perms; 7 | allow ril_config_service_app radio_vendor_data_file:file create_file_perms; 8 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/rild.te: -------------------------------------------------------------------------------- 1 | binder_call(rild, per_mgr) 2 | 3 | vndbinder_use(rild) 4 | 5 | allow rild qmuxd_socket:dir w_dir_perms; 6 | allow rild qmuxd_socket:sock_file create_file_perms; 7 | 8 | allow rild netmgrd_socket:dir search; 9 | unix_socket_connect(rild, netmgrd, netmgrd) 10 | 11 | allow rild vendor_file:file { execute_no_trans lock ioctl }; 12 | 13 | allow rild per_mgr_service:service_manager find; 14 | 15 | userdebug_or_eng(` 16 | allow rild diag_device:chr_file rw_file_perms; 17 | ') 18 | 19 | add_hwservice(rild, hal_iwlan_hwservice) 20 | add_hwservice(rild, hal_dataconnection_hwservice) 21 | 22 | allow rild self:socket ioctl; 23 | allowxperm rild self:socket ioctl msm_sock_ipc_ioctls; 24 | allow rild time_daemon:unix_stream_socket connectto; 25 | 26 | allow rild radio_vendor_data_file:dir rw_dir_perms; 27 | allow rild radio_vendor_data_file:file create_file_perms; 28 | 29 | get_prop(rild, vendor_dataqdp_prop) 30 | get_prop(rild, sota_prop) 31 | set_prop(rild, vendor_radio_prop) 32 | set_prop(rild, vendor_xlat_prop) 33 | 34 | hal_server_domain(rild, hal_secure_element) 35 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/secure_ui_service_app.te: -------------------------------------------------------------------------------- 1 | type secure_ui_service_app, domain; 2 | app_domain(secure_ui_service_app); 3 | 4 | binder_use(secure_ui_service_app); 5 | hwbinder_use(secure_ui_service_app); 6 | binder_call(secure_ui_service_app, hal_tui_comm); 7 | binder_call(secure_ui_service_app, surfaceflinger); 8 | binder_call(secure_ui_service_app, system_server); 9 | 10 | allow secure_ui_service_app hal_tui_comm_hwservice:hwservice_manager find; 11 | 12 | allow secure_ui_service_app app_api_service:service_manager find; 13 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/service.te: -------------------------------------------------------------------------------- 1 | type hal_telephony_service, service_manager_type, hal_service_type, protected_service; 2 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/service_contexts: -------------------------------------------------------------------------------- 1 | com.fingerprints.extension.IFingerprintNavigation u:object_r:fingerprint_service:s0 2 | vendor.qti.hardware.radio.ims.IImsRadio/default u:object_r:hal_telephony_service:s0 3 | vendor.qti.hardware.radio.ims.IImsRadio/imsradio0 u:object_r:hal_telephony_service:s0 4 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/shell.te: -------------------------------------------------------------------------------- 1 | # To allow non-root to find power_supply management info 2 | allow shell sysfs_msm_subsys:dir search; 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ssr_detector.te: -------------------------------------------------------------------------------- 1 | # SSRestartDetector app 2 | type ssr_detector_app, domain; 3 | 4 | app_domain(ssr_detector_app) 5 | 6 | userdebug_or_eng(` 7 | allow ssr_detector_app ramdump_vendor_data_file:dir r_dir_perms; 8 | allow ssr_detector_app ramdump_vendor_data_file:file r_file_perms; 9 | get_prop(ssr_detector_app, vendor_ssr_prop) 10 | ') 11 | get_prop(ssr_detector_app, vendor_wifi_version) 12 | get_prop(ssr_detector_app, public_vendor_system_prop) 13 | 14 | allow ssr_detector_app app_api_service:service_manager find; 15 | allow ssr_detector_app radio_service:service_manager find; 16 | 17 | # ssr_detector app's data type is system_app_data_file. 18 | allow ssr_detector_app system_app_data_file:dir create_dir_perms; 19 | allow ssr_detector_app system_app_data_file:{ file lnk_file } create_file_perms; 20 | 21 | allow ssr_detector_app sysfs:lnk_file r_file_perms; 22 | 23 | r_dir_file(ssr_detector_app, sysfs_msm_subsys) 24 | 25 | allow ssr_detector_app cgroup:file w_file_perms; 26 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ssr_diag.te: -------------------------------------------------------------------------------- 1 | type ssr_diag, domain; 2 | type ssr_diag_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(ssr_diag); 5 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ssr_setup.te: -------------------------------------------------------------------------------- 1 | type ssr_setup, domain; 2 | type ssr_setup_exec, exec_type, vendor_file_type, file_type; 3 | 4 | init_daemon_domain(ssr_setup); 5 | 6 | allow ssr_setup sysfs_msm_subsys:dir r_dir_perms; 7 | allow ssr_setup sysfs_msm_subsys:file rw_file_perms; 8 | allow ssr_setup sysfs_msm_subsys:lnk_file read; 9 | 10 | get_prop(ssr_setup, vendor_ssr_prop) 11 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/surfaceflinger.te: -------------------------------------------------------------------------------- 1 | dontaudit surfaceflinger vendor_file:file read; 2 | dontaudit surfaceflinger kernel:system module_request; 3 | dontaudit surfaceflinger vendor_default_prop:file read; 4 | userdebug_or_eng(`get_prop(surfaceflinger, vendor_display_prop)') 5 | allow surfaceflinger debugfs_ion:dir search; 6 | 7 | dontaudit surfaceflinger sysfs_msm_subsys:dir search; 8 | dontaudit surfaceflinger sysfs_msm_subsys:file r_file_perms; 9 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/system_app.te: -------------------------------------------------------------------------------- 1 | typeattribute system_app system_writes_vendor_properties_violators; 2 | 3 | userdebug_or_eng(` 4 | allow system_app diag_device:chr_file rw_file_perms; 5 | ') 6 | set_prop(system_app, vendor_bluetooth_prop) 7 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/system_server.te: -------------------------------------------------------------------------------- 1 | allow system_server self:socket ioctl; 2 | allowxperm system_server self:socket ioctl msm_sock_ipc_ioctls; 3 | 4 | binder_call(system_server, hal_camera_default) 5 | binder_call(system_server, mm-pp-daemon) 6 | 7 | allow system_server persist_file:dir search; 8 | allow system_server persist_sensors_file:dir search; 9 | allow system_server persist_sensors_file:file r_file_perms; 10 | allow system_server wlan_device:chr_file rw_file_perms; 11 | 12 | dontaudit system_server self:capability sys_module; 13 | 14 | dontaudit system_server vendor_display_prop:file r_file_perms; 15 | 16 | dontaudit system_server sysfs_msm_subsys:dir search; 17 | dontaudit system_server sysfs_msm_subsys:file r_file_perms; 18 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/tango_core.te: -------------------------------------------------------------------------------- 1 | type tango_core, domain; 2 | 3 | app_domain(tango_core) 4 | 5 | allow tango_core persist_file:dir search; 6 | allow tango_core persist_sensors_file:dir search; 7 | allow tango_core persist_sensors_file:file { getattr open read }; 8 | allow tango_core qdsp_device:chr_file { ioctl open read }; 9 | allow tango_core vendor_file:file { getattr open read }; 10 | 11 | allow tango_core app_api_service:service_manager find; 12 | allow tango_core surfaceflinger_service:service_manager find; 13 | allow tango_core cameraserver_service:service_manager find; 14 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/tcpdump_logger.te: -------------------------------------------------------------------------------- 1 | type tcpdump_logger, domain; 2 | type tcpdump_logger_exec, exec_type, vendor_file_type, file_type; 3 | 4 | userdebug_or_eng(` 5 | # make transition from init to its domain 6 | init_daemon_domain(tcpdump_logger) 7 | 8 | allow tcpdump_logger self:capability {net_raw}; 9 | allow tcpdump_logger self:packet_socket { create setopt getopt ioctl read write }; 10 | allowxperm tcpdump_logger self:packet_socket ioctl 0x8933; 11 | allow tcpdump_logger tcpdump_exec:file rx_file_perms; 12 | allow tcpdump_logger tcpdump_vendor_data_file:dir create_dir_perms; 13 | allow tcpdump_logger tcpdump_vendor_data_file:file create_file_perms; 14 | allow tcpdump_logger radio_vendor_data_file:file create_file_perms; 15 | allow tcpdump_logger radio_vendor_data_file:dir create_dir_perms; 16 | allow tcpdump_logger cnss_vendor_data_file:file create_file_perms; 17 | allow tcpdump_logger cnss_vendor_data_file:dir create_dir_perms; 18 | 19 | set_prop(tcpdump_logger, vendor_tcpdump_log_prop) 20 | ') 21 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/timeservice_app.te: -------------------------------------------------------------------------------- 1 | type timeservice_app, domain; 2 | app_domain(timeservice_app); 3 | 4 | allow timeservice_app app_api_service:service_manager find; 5 | allow timeservice_app app_data_file:dir { search getattr }; 6 | allow timeservice_app time_daemon:unix_stream_socket connectto; 7 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/ueventd.te: -------------------------------------------------------------------------------- 1 | allow ueventd sysfs_thermal:file w_file_perms; 2 | allow ueventd sysfs_leds:file w_file_perms; 3 | allow ueventd sysfs_camera:file w_file_perms; 4 | allow ueventd sysfs_easel:file w_file_perms; 5 | allow ueventd sysfs_fingerprint:file w_file_perms; 6 | allow ueventd sysfs_graphics:file w_file_perms; 7 | allow ueventd sysfs_laser:file w_file_perms; 8 | allow ueventd sysfs_rmtfs:file w_file_perms; 9 | allow ueventd sysfs_scsi_devices_0000:file write; 10 | allow ueventd sysfs_soc:file w_file_perms; 11 | allow ueventd sysfs_net:file w_file_perms; 12 | allow ueventd sysfs_msm_subsys:file w_file_perms; 13 | allow ueventd sysfs_bluetooth_writable:file w_file_perms; 14 | allow ueventd sysfs_usb_c:file w_file_perms; 15 | allow ueventd firmware_file:lnk_file read; 16 | allow ueventd firmware_file:dir search; 17 | allow ueventd firmware_file:file r_file_perms; 18 | allow ueventd tmpfs:blk_file getattr; 19 | allow ueventd persist_file:dir search; 20 | allow ueventd persist_file:file r_file_perms; 21 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/update_engine_common.te: -------------------------------------------------------------------------------- 1 | # Allow update_engine and update_engine_sideload (recovery) read/write on the 2 | # device-specific partitions it should update. 3 | allow update_engine_common postinstall_mnt_dir:dir r_dir_perms; 4 | allow update_engine_common tmpfs:lnk_file r_file_perms; 5 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/vndservice.te: -------------------------------------------------------------------------------- 1 | type qdisplay_service, vndservice_manager_type; 2 | type per_mgr_service, vndservice_manager_type; 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/vndservice_contexts: -------------------------------------------------------------------------------- 1 | display.qservice u:object_r:qdisplay_service:s0 2 | vendor.qcom.PeripheralManager u:object_r:per_mgr_service:s0 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/vold.te: -------------------------------------------------------------------------------- 1 | get_prop(vold, vendor_tee_listener_prop) 2 | 3 | allow vold sysfs_scsi_devices_0000:file w_file_perms; 4 | allow vold sysfs_scsi_devices_other:file w_file_perms; 5 | allow vold sysfs_devices_block:file write; 6 | 7 | # allow vold to trim /mnt/vendor/persist by sending ioctl FITRIM 8 | allow vold persist_file:dir { ioctl open read }; 9 | 10 | # generated by proc scan, unnecessary 11 | dontaudit vold proc_irq:dir read; 12 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/wifi_sniffer.te: -------------------------------------------------------------------------------- 1 | type wifi_sniffer, domain; 2 | type wifi_sniffer_exec, exec_type, vendor_file_type, file_type; 3 | 4 | userdebug_or_eng(` 5 | # make transition from init to its domain 6 | init_daemon_domain(wifi_sniffer) 7 | net_domain(wifi_sniffer) 8 | 9 | # configurate con mode 10 | allow wifi_sniffer self:capability { net_admin net_raw }; 11 | allow wifi_sniffer sysfs_wifi_conmode:file rw_file_perms; 12 | 13 | # interface up 14 | allowxperm wifi_sniffer self:udp_socket ioctl SIOCSIFFLAGS; 15 | allow wifi_sniffer self:netlink_generic_socket create_socket_perms_no_ioctl; 16 | 17 | get_prop(wifi_sniffer, vendor_wifi_sniffer_prop) 18 | 19 | dontaudit wifi_sniffer debugfs_wlan:dir search; 20 | ') 21 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/common/zygote.te: -------------------------------------------------------------------------------- 1 | # Allow the Zygote to read vendor graphics device properties 2 | get_prop(zygote, vendor_display_prop) 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/compat/file_contexts: -------------------------------------------------------------------------------- 1 | # Keep them for independent system update (b/120578809) 2 | /firmware u:object_r:rootfs:s0 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/sdm845/genfs_contexts: -------------------------------------------------------------------------------- 1 | genfscon sysfs /devices/platform/soc/soc:qcom,l3-cdsp/devfreq u:object_r:sysfs_devfreq:s0 2 | genfscon sysfs /devices/platform/soc/soc:qcom,l3-cdsp/devfreq/soc:qcom,l3-cdsp/userspace u:object_r:sysfs_devfreq_l3cdsp:s0 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/sdm845/hal_neuralnetworks.te: -------------------------------------------------------------------------------- 1 | type hal_neuralnetworks_default, domain; 2 | hal_server_domain(hal_neuralnetworks_default, hal_neuralnetworks) 3 | 4 | type hal_neuralnetworks_default_exec, exec_type, vendor_file_type, file_type; 5 | init_daemon_domain(hal_neuralnetworks_default) 6 | 7 | allow hal_neuralnetworks_default fwk_sensor_hwservice:hwservice_manager find; 8 | allow hal_neuralnetworks_default qdsp_device:chr_file r_file_perms; 9 | allow hal_neuralnetworks_default ion_device:chr_file r_file_perms; 10 | 11 | allow hal_neuralnetworks_default app_data_file:file { read getattr }; 12 | allow hal_neuralnetworks_default shell_data_file:file { read getattr }; 13 | allow hal_neuralnetworks_default hal_neuralnetworks_data_file:dir create_dir_perms; 14 | allow hal_neuralnetworks_default hal_neuralnetworks_data_file:{ file fifo_file } create_file_perms; 15 | allow hal_neuralnetworks_default gpu_device:chr_file rw_file_perms; 16 | 17 | r_dir_file(hal_neuralnetworks_default, sysfs_soc) 18 | r_dir_file(hal_neuralnetworks_default, adsprpcd_file) 19 | -------------------------------------------------------------------------------- /sepolicy/vendor/qcom/sdm845/update_engine_common.te: -------------------------------------------------------------------------------- 1 | # Allow update_engine and update_engine_sideload (recovery) read/write on the 2 | # device-specific partitions it should update. 3 | allow update_engine_common xbl_block_device:blk_file rw_file_perms; 4 | allow update_engine_common modem_block_device:blk_file rw_file_perms; 5 | allow update_engine_common ab_block_device:blk_file rw_file_perms; 6 | -------------------------------------------------------------------------------- /sepolicy/vendor/verizon/keys.conf: -------------------------------------------------------------------------------- 1 | [@VERIZON] 2 | ALL : device/google/crosshatch/sepolicy/vendor/verizon/verizon.x509.pem 3 | -------------------------------------------------------------------------------- /sepolicy/vendor/verizon/mac_permissions.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | -------------------------------------------------------------------------------- /sepolicy/vendor/verizon/obdm_app.te: -------------------------------------------------------------------------------- 1 | type obdm_app, domain, coredomain; 2 | 3 | app_domain(obdm_app) 4 | net_domain(obdm_app) 5 | 6 | allow obdm_app proc_stat:file r_file_perms; 7 | 8 | # talk to /dev/diag 9 | allow obdm_app diag_device:chr_file rw_file_perms; 10 | 11 | allow obdm_app app_api_service:service_manager find; 12 | allow obdm_app radio_service:service_manager find; 13 | allow obdm_app surfaceflinger_service:service_manager find; 14 | 15 | allow obdm_app self:socket create_socket_perms; 16 | allowxperm obdm_app self:socket ioctl { 0x0000c302 0x0000c304 }; 17 | 18 | allow obdm_app sysfs:dir r_dir_perms; 19 | r_dir_file(obdm_app, sysfs_msm_subsys) 20 | -------------------------------------------------------------------------------- /sepolicy/vendor/verizon/seapp_contexts: -------------------------------------------------------------------------------- 1 | # Verizon for OBDM tool 2 | user=_app seinfo=verizon name=com.verizon.obdm domain=obdm_app type=app_data_file levelFrom=all 3 | user=_app seinfo=verizon name=com.verizon.obdm:background domain=obdm_app type=app_data_file levelFrom=all 4 | -------------------------------------------------------------------------------- /setup-makefiles.py: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | # SPDX-FileCopyrightText: 2024 The LineageOS Project 4 | # SPDX-License-Identifier: Apache-2.0 5 | # 6 | 7 | set -e 8 | 9 | MY_DIR="$(cd "$(dirname "${0}")"; pwd -P)" 10 | 11 | pushd "${MY_DIR}/crosshatch" 12 | ./setup-makefiles.py 13 | popd 14 | -------------------------------------------------------------------------------- /teeui/tests/blueline/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | cc_test_host { 6 | name: "system.teeui_localization_rendering_test.blueline", 7 | cflags: [ 8 | "-Wall", 9 | "-Werror", 10 | "-Wextra", 11 | "-O0", 12 | ], 13 | srcs: [ 14 | "test_main.cpp", 15 | ], 16 | test_suites: ["device-tests"], 17 | shared_libs: [ 18 | "libbase", 19 | "libteeui_localization_rendering_test", 20 | ], 21 | } 22 | -------------------------------------------------------------------------------- /teeui/tests/blueline/TEST_MAPPING: -------------------------------------------------------------------------------- 1 | { 2 | "postsubmit": [ 3 | { 4 | "name": "system.teeui_localization_rendering_test.blueline", 5 | "host" : true, 6 | "options": [ 7 | { 8 | "native-test-flag": "--width=1080" 9 | }, 10 | { 11 | "native-test-flag": "--height=2160" 12 | }, 13 | { 14 | "native-test-flag": "--dp2px=2.62135" 15 | }, 16 | { 17 | "native-test-flag": "--mm2px=17.42075974" 18 | }, 19 | { 20 | "native-test-flag": "--powerButtonTop=20.26" 21 | }, 22 | { 23 | "native-test-flag": "--powerButtonBottom=30.26" 24 | }, 25 | { 26 | "native-test-flag": "--volUpButtonTop=40.26" 27 | }, 28 | { 29 | "native-test-flag": "--volUpButtonBottom=50.26" 30 | } 31 | ] 32 | } 33 | ] 34 | } 35 | 36 | -------------------------------------------------------------------------------- /teeui/tests/blueline/test_main.cpp: -------------------------------------------------------------------------------- 1 | /* 2 | * Copyright 2020, The Android Open Source Project 3 | * 4 | * Licensed under the Apache License, Version 2.0 (the "License"); 5 | * you may not use this file except in compliance with the License. 6 | * You may obtain a copy of the License at 7 | * 8 | * http://www.apache.org/licenses/LICENSE-2.0 9 | * 10 | * Unless required by applicable law or agreed to in writing, software 11 | * distributed under the License is distributed on an "AS IS" BASIS, 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | * See the License for the specific language governing permissions and 14 | * limitations under the License. 15 | */ 16 | 17 | #include 18 | #include 19 | 20 | int main(int argc, char **argv) { 21 | ::testing::InitGoogleTest(&argc, argv); 22 | teeui::test::initRenderTest(argc, argv); 23 | return RUN_ALL_TESTS(); 24 | } 25 | -------------------------------------------------------------------------------- /teeui/tests/crosshatch/Android.bp: -------------------------------------------------------------------------------- 1 | package { 2 | default_applicable_licenses: ["Android-Apache-2.0"], 3 | } 4 | 5 | cc_test_host { 6 | name: "system.teeui_localization_rendering_test.crosshatch", 7 | cflags: [ 8 | "-Wall", 9 | "-Werror", 10 | "-Wextra", 11 | "-O0", 12 | ], 13 | srcs: [ 14 | "test_main.cpp", 15 | ], 16 | test_suites: ["device-tests"], 17 | shared_libs: [ 18 | "libbase", 19 | "libteeui_localization_rendering_test", 20 | ], 21 | } 22 | -------------------------------------------------------------------------------- /teeui/tests/crosshatch/TEST_MAPPING: -------------------------------------------------------------------------------- 1 | { 2 | "postsubmit": [ 3 | { 4 | "name": "system.teeui_localization_rendering_test.crosshatch", 5 | "host" : true, 6 | "options": [ 7 | { 8 | "native-test-flag": "--width=1440" 9 | }, 10 | { 11 | "native-test-flag": "--height=2950" 12 | }, 13 | { 14 | "native-test-flag": "--dp2px=3.495145631" 15 | }, 16 | { 17 | "native-test-flag": "--mm2px=20.42958729" 18 | }, 19 | { 20 | "native-test-flag": "--powerButtonTop=34.146" 21 | }, 22 | { 23 | "native-test-flag": "--powerButtonBottom=44.146" 24 | }, 25 | { 26 | "native-test-flag": "--volUpButtonTop=54.146" 27 | }, 28 | { 29 | "native-test-flag": "--volUpButtonBottom=64.146" 30 | } 31 | ] 32 | } 33 | ] 34 | } 35 | 36 | -------------------------------------------------------------------------------- /teeui/tests/crosshatch/test_main.cpp: -------------------------------------------------------------------------------- 1 | /* 2 | * Copyright 2020, The Android Open Source Project 3 | * 4 | * Licensed under the Apache License, Version 2.0 (the "License"); 5 | * you may not use this file except in compliance with the License. 6 | * You may obtain a copy of the License at 7 | * 8 | * http://www.apache.org/licenses/LICENSE-2.0 9 | * 10 | * Unless required by applicable law or agreed to in writing, software 11 | * distributed under the License is distributed on an "AS IS" BASIS, 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | * See the License for the specific language governing permissions and 14 | * limitations under the License. 15 | */ 16 | 17 | #include 18 | #include 19 | 20 | int main(int argc, char **argv) { 21 | ::testing::InitGoogleTest(&argc, argv); 22 | teeui::test::initRenderTest(argc, argv); 23 | return RUN_ALL_TESTS(); 24 | } 25 | -------------------------------------------------------------------------------- /thermal-engine-blueline-vr-evt.conf: -------------------------------------------------------------------------------- 1 | [SKIN-MONITOR] 2 | algo_type monitor 3 | sampling 2000 4 | sensor quiet-therm-adc 5 | thresholds 52000 62000 6 | thresholds_clr 48000 61000 7 | actions cpu0+cpu4+gpu shutdown 8 | action_info 825600+902400+257000000 1 9 | 10 | [BATTERY-MONITOR] 11 | algo_type monitor 12 | sampling 2000 13 | sensor quiet-therm-adc 14 | thresholds 42000 44000 46000 15 | thresholds_clr 41000 43000 45000 16 | actions battery battery battery 17 | action_info 1 2 3 18 | 19 | [MODEM-MONITOR] 20 | algo_type monitor 21 | sampling 1000 22 | sensor quiet-therm-adc 23 | thresholds 51000 56000 58000 24 | thresholds_clr 48000 54000 56000 25 | actions modem+modem_proc modem+modem_proc modem+modem_proc 26 | action_info 1+1 1+2 3+3 27 | -------------------------------------------------------------------------------- /thermal-engine-blueline-vr-prod.conf: -------------------------------------------------------------------------------- 1 | [SKIN-MONITOR] 2 | algo_type monitor 3 | sampling 2000 4 | sensor fps-therm-adc 5 | thresholds 49000 57000 6 | thresholds_clr 45000 56000 7 | actions cpu0+cpu4+gpu shutdown 8 | action_info 825600+902400+257000000 1 9 | 10 | [BATTERY-MONITOR] 11 | algo_type monitor 12 | sampling 2000 13 | sensor fps-therm-adc 14 | thresholds 39000 41000 43000 48000 15 | thresholds_clr 38000 40000 42000 46000 16 | actions battery battery battery battery 17 | action_info 1 2 3 4 18 | 19 | [MODEM-MONITOR] 20 | algo_type monitor 21 | sampling 1000 22 | sensor fps-therm-adc 23 | thresholds 48000 51000 53000 24 | thresholds_clr 45000 49000 51000 25 | actions modem+modem_proc modem+modem_proc modem+modem_proc 26 | action_info 1+1 1+2 3+3 27 | -------------------------------------------------------------------------------- /thermal-engine-crosshatch-vr-evt.conf: -------------------------------------------------------------------------------- 1 | [SKIN-MONITOR] 2 | algo_type monitor 3 | sampling 2000 4 | sensor quiet-therm-adc 5 | thresholds 52000 62000 6 | thresholds_clr 48000 61000 7 | actions cpu0+cpu4+gpu shutdown 8 | action_info 825600+902400+257000000 1 9 | 10 | [BATTERY-MONITOR] 11 | algo_type monitor 12 | sampling 2000 13 | sensor quiet-therm-adc 14 | thresholds 42000 44000 46000 15 | thresholds_clr 41000 43000 45000 16 | actions battery battery battery 17 | action_info 1 2 3 18 | 19 | [MODEM-MONITOR] 20 | algo_type monitor 21 | sampling 1000 22 | sensor quiet-therm-adc 23 | thresholds 51000 56000 58000 24 | thresholds_clr 48000 54000 56000 25 | actions modem+modem_proc modem+modem_proc modem+modem_proc 26 | action_info 1+1 1+2 3+3 27 | -------------------------------------------------------------------------------- /thermal-engine-crosshatch-vr-prod.conf: -------------------------------------------------------------------------------- 1 | [SKIN-MONITOR] 2 | algo_type monitor 3 | sampling 2000 4 | sensor fps-therm-adc 5 | thresholds 49000 57000 6 | thresholds_clr 45000 56000 7 | actions cpu0+cpu4+gpu shutdown 8 | action_info 825600+902400+257000000 1 9 | 10 | [BATTERY-MONITOR] 11 | algo_type monitor 12 | sampling 2000 13 | sensor fps-therm-adc 14 | thresholds 39000 41000 43000 48000 15 | thresholds_clr 38000 40000 42000 46000 16 | actions battery battery battery battery 17 | action_info 1 2 3 4 18 | 19 | [MODEM-MONITOR] 20 | algo_type monitor 21 | sampling 1000 22 | sensor fps-therm-adc 23 | thresholds 48000 51000 53000 24 | thresholds_clr 45000 49000 51000 25 | actions modem+modem_proc modem+modem_proc modem+modem_proc 26 | action_info 1+1 1+2 3+3 27 | -------------------------------------------------------------------------------- /uinput-fpc.idc: -------------------------------------------------------------------------------- 1 | # Copyright (C) 2017 The Android Open Source Project 2 | # 3 | # Licensed under the Apache License, Version 2.0 (the "License"); 4 | # you may not use this file except in compliance with the License. 5 | # You may obtain a copy of the License at 6 | # 7 | # http://www.apache.org/licenses/LICENSE-2.0 8 | # 9 | # Unless required by applicable law or agreed to in writing, software 10 | # distributed under the License is distributed on an "AS IS" BASIS, 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | # See the License for the specific language governing permissions and 13 | # limitations under the License. 14 | 15 | # 16 | # Fingerprint navigation configuration file 17 | # 18 | keyboard.orientationAware = 1 19 | keyboard.builtIn = 1 20 | 21 | -------------------------------------------------------------------------------- /uinput-fpc.kl: -------------------------------------------------------------------------------- 1 | key 106 SYSTEM_NAVIGATION_LEFT 2 | key 108 SYSTEM_NAVIGATION_DOWN 3 | key 103 SYSTEM_NAVIGATION_UP 4 | key 105 SYSTEM_NAVIGATION_RIGHT 5 | -------------------------------------------------------------------------------- /usb/.clang-format: -------------------------------------------------------------------------------- 1 | BasedOnStyle: Google 2 | AccessModifierOffset: -2 3 | AllowShortFunctionsOnASingleLine: Inline 4 | ColumnLimit: 99 5 | CommentPragmas: NOLINT:.* 6 | DerivePointerAlignment: false 7 | IndentWidth: 4 8 | PointerAlignment: Right 9 | TabWidth: 4 10 | UseTab: Never 11 | PenaltyExcessCharacter: 32 12 | AllowShortIfStatementsOnASingleLine: false 13 | SpacesBeforeTrailingComments: 2 14 | 15 | -------------------------------------------------------------------------------- /usb/gadget/android.hardware.usb.gadget-service.crosshatch.rc: -------------------------------------------------------------------------------- 1 | service vendor.usb-gadget-hal-1-1 /vendor/bin/hw/android.hardware.usb.gadget-service.crosshatch 2 | class hal 3 | user root 4 | group root system shell mtp 5 | 6 | on boot 7 | chown root system /sys/class/typec/port0/power_role 8 | chown root system /sys/class/typec/port0/data_role 9 | chown root system /sys/class/typec/port0/port_type 10 | chmod 664 /sys/class/typec/port0/power_role 11 | chmod 664 /sys/class/typec/port0/data_role 12 | chmod 664 /sys/class/typec/port0/port_type 13 | 14 | on post-fs 15 | chown root system /sys/devices/platform/soc/a600000.ssusb/b_sess 16 | chown root system /sys/devices/platform/soc/a600000.ssusb/id 17 | chown root system /sys/devices/platform/soc/a600000.ssusb/usb_data_enabled 18 | chmod 664 /sys/devices/platform/soc/a600000.ssusb/b_sess 19 | chmod 664 /sys/devices/platform/soc/a600000.ssusb/id 20 | chmod 664 /sys/devices/platform/soc/a600000.ssusb/usb_data_enabled 21 | -------------------------------------------------------------------------------- /usb/gadget/android.hardware.usb.gadget@1.1-service.crosshatch.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | android.hardware.usb.gadget 4 | hwbinder 5 | 1.1 6 | 7 | IUsbGadget 8 | default 9 | 10 | 11 | 12 | -------------------------------------------------------------------------------- /usb/usb/android.hardware.usb-service.crosshatch.rc: -------------------------------------------------------------------------------- 1 | service vendor.usb /vendor/bin/hw/android.hardware.usb-service.crosshatch 2 | class hal 3 | user system 4 | group system shell 5 | -------------------------------------------------------------------------------- /usb/usb/android.hardware.usb-service.crosshatch.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | android.hardware.usb 4 | 1 5 | 6 | IUsb 7 | default 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /vendor.prop: -------------------------------------------------------------------------------- 1 | # DRM 2 | drm.service.enabled=true 3 | media.mediadrmservice.enable=true 4 | 5 | # Graphics 6 | ro.hardware.egl=adreno 7 | ro.hardware.vulkan=adreno 8 | -------------------------------------------------------------------------------- /vf/OWNERS: -------------------------------------------------------------------------------- 1 | # Treble team for Vendor Freeze 2 | bpeckham@google.com 3 | chrisgross@google.com 4 | danielnorman@google.com 5 | inseob@google.com 6 | justinyun@google.com 7 | -------------------------------------------------------------------------------- /vf/framework_item_list.txt: -------------------------------------------------------------------------------- 1 | IMAGES/product.img 2 | IMAGES/product.map 3 | IMAGES/system_ext.img 4 | IMAGES/system_ext.map 5 | IMAGES/system.img 6 | IMAGES/system.map 7 | IMAGES/system_other.img 8 | IMAGES/userdata.img 9 | META/apexkeys.txt 10 | META/apkcerts.txt 11 | META/filesystem_config.txt 12 | META/postinstall_config.txt 13 | META/product_filesystem_config.txt 14 | META/root_filesystem_config.txt 15 | META/system_ext_filesystem_config.txt 16 | META/system_other_filesystem_config.txt 17 | META/update_engine_config.txt 18 | PRODUCT/* 19 | ROOT/* 20 | SYSTEM/* 21 | SYSTEM_EXT/* 22 | SYSTEM_OTHER/* 23 | -------------------------------------------------------------------------------- /vf/framework_misc_info_keys.txt: -------------------------------------------------------------------------------- 1 | ab_update 2 | avb_product_add_hashtree_footer_args 3 | avb_product_hashtree_enable 4 | avb_system_add_hashtree_footer_args 5 | avb_system_ext_add_hashtree_footer_args 6 | avb_system_ext_hashtree_enable 7 | avb_system_hashtree_enable 8 | avb_system_other_add_hashtree_footer_args 9 | avb_system_other_hashtree_enable 10 | building_product_image 11 | building_system_ext_image 12 | building_system_image 13 | building_system_other_image 14 | default_system_dev_certificate 15 | product_fs_type 16 | root_dir 17 | system_ext_fs_type 18 | -------------------------------------------------------------------------------- /vf/vendor_item_list.txt: -------------------------------------------------------------------------------- 1 | BOOT/* 2 | DATA/* 3 | IMAGES/boot.img 4 | IMAGES/dtbo.img 5 | IMAGES/vendor_boot.img 6 | IMAGES/vendor.img 7 | IMAGES/vendor.map 8 | META/boot_filesystem_config.txt 9 | META/care_map.pb 10 | META/kernel_configs.txt 11 | META/kernel_version.txt 12 | META/otakeys.txt 13 | META/releasetools.py 14 | META/vendor_boot_filesystem_config.txt 15 | META/vendor_filesystem_config.txt 16 | ODM/* 17 | OTA/android-info.txt 18 | PREBUILT_IMAGES/* 19 | RADIO/* 20 | VENDOR/* 21 | VENDOR_BOOT/* 22 | -------------------------------------------------------------------------------- /vibrator/OWNERS: -------------------------------------------------------------------------------- 1 | eliptus@google.com 2 | michaelwr@google.com 3 | -------------------------------------------------------------------------------- /vibrator/android.hardware.vibrator-service.crosshatch.rc: -------------------------------------------------------------------------------- 1 | service vendor.vibrator.crosshatch /vendor/bin/hw/android.hardware.vibrator-service.crosshatch 2 | class hal 3 | user system 4 | group system 5 | -------------------------------------------------------------------------------- /vibrator/android.hardware.vibrator-service.crosshatch.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | android.hardware.vibrator 4 | 2 5 | IVibrator/default 6 | 7 | 8 | -------------------------------------------------------------------------------- /vibrator/cs40l20/cs40l20.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/cs40l20.bin -------------------------------------------------------------------------------- /vibrator/cs40l20/cs40l20.wmfw: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/cs40l20.wmfw -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/09_POP(SNAP)_0503.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/09_POP(SNAP)_0503.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/09_POP(SNAP)_0503.wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/10_THUD_0503.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/10_THUD_0503.json -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/10_THUD_0503.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/10_THUD_0503.wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/11_The_big_adventure.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "Version": "1.4.0", "Repeat": "11", "WaitTime": "0", 4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0" , 5 | "Time1" : "4" , "Level1" : "0.46" , "Frequency1" : "0", 6 | "Time2" : "8" , "Level2" : "0.46" , "Frequency2" : "0", 7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0", 8 | "Time4" : "392" , "Level4" : "0" , "Frequency4" : "0", 9 | "Time5" : "4" , "Level5" : "0.46" , "Frequency5" : "0", 10 | "Time6" : "8" , "Level6" : "0.46" , "Frequency6" : "0", 11 | "Time7" : "4" , "Level7" : "0" , "Frequency7" : "0", 12 | "Time8" : "392" , "Level8" : "0" , "Frequency8" : "0", 13 | "Time9" : "4" , "Level9" : "0.46" , "Frequency9" : "0", 14 | "Time10" : "8" , "Level10" : "0.46" , "Frequency10" : "0", 15 | "Time11" : "4" , "Level11" : "0" , "Frequency11" : "0", 16 | "Time12" : "260" , "Level12" : "0" , "Frequency12" : "0" 17 | } 18 | ] 19 | -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/14_Flutterby.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "Version": "1.4.0", "Repeat": "1", "WaitTime": "0", 4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0", 5 | "Time1" : "300" , "Level1" : "0.23" , "Frequency1" : "0", 6 | "Time2" : "100" , "Level2" : "0.23" , "Frequency2" : "0", 7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0", 8 | "Time4" : "296" , "Level4" : "0" , "Frequency4" : "0", 9 | "Time5" : "300" , "Level5" : "0.23" , "Frequency5" : "0", 10 | "Time6" : "100" , "Level6" : "0.23" , "Frequency6" : "0", 11 | "Time7" : "4" , "Level7" : "0" , "Frequency7" : "0", 12 | "Time8" : "1020" , "Level8" : "0" , "Frequency8" : "0", 13 | "Time9" : "260" , "Level9" : "0" , "Frequency9" : "0" 14 | } 15 | ] 16 | -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/15_Hotline.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "Version": "1.4.0", "Repeat": "1", "WaitTime": "0", 4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0", 5 | "Time1" : "300" , "Level1" : "0.23" , "Frequency1" : "0", 6 | "Time2" : "100" , "Level2" : "0.23" , "Frequency2" : "0", 7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0", 8 | "Time4" : "596" , "Level4" : "0" , "Frequency4" : "0", 9 | "Time5" : "300" , "Level5" : "0.23" , "Frequency5" : "0", 10 | "Time6" : "100" , "Level6" : "0.23" , "Frequency6" : "0", 11 | "Time7" : "4" , "Level7" : "0" , "Frequency7" : "0", 12 | "Time8" : "1020" , "Level8" : "0" , "Frequency8" : "0", 13 | "Time9" : "908" , "Level9" : "0" , "Frequency9" : "0" 14 | } 15 | ] 16 | -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/21_Schools_out.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "Version": "1.4.0", "Repeat": "0", "WaitTime": "0", 4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0", 5 | "Time1" : "300" , "Level1" : "0.23" , "Frequency1" : "0", 6 | "Time2" : "100" , "Level2" : "0.23" , "Frequency2" : "0", 7 | "Time3" : "4" , "Level3" : "0" , "Frequency3" : "0", 8 | "Time4" : "596" , "Level4" : "0" , "Frequency4" : "0" 9 | } 10 | ] 11 | -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/23_Extra1_100x8.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "Version": "1.4.0", "Repeat": "7", "WaitTime": "0", 4 | "Time0" : "0" , "Level0" : "0" , "Frequency0" : "0", 5 | "Time1" : "40" , "Level1" : "0.23" , "Frequency1" : "0", 6 | "Time2" : "20" , "Level2" : "0.23" , "Frequency2" : "0", 7 | "Time3" : "20" , "Level3" : "0" , "Frequency3" : "0", 8 | "Time4" : "20" , "Level4" : "0" , "Frequency4" : "0" 9 | } 10 | ] 11 | -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/README: -------------------------------------------------------------------------------- 1 | Bin file generated by the following command: 2 | 3 | python2 pdata2bin.py \ 4 | continuous_sine_f0.json \ 5 | \[#1\]\ 00\ \(23%\).json \ 6 | \[#2\]\ 00\ \(39%\).json \ 7 | \[#3\]\ 00\ \(55%\).json \ 8 | \[#4\]\ 00\ \(75%\).json \ 9 | \[#4\]\ 00\ \(75%\).json \ 10 | \[#6\]\ Double\ \(L\)\ \=\ #1\ +\ #2.json \ 11 | \[#7\]\ Double\ \(M\)\ \=\ #2\ +\ #3.json \ 12 | \[#8\]\ Double\ \(H\)\ \=\ #3\ +\ #4.json \ 13 | \[#4\]\ 00\ \(75%\).json \ 14 | \[#4\]\ 00\ \(75%\).json \ 15 | 11_The_big_adventure.json \ 16 | 12_Copycat.json \ 17 | 13_Crackle.json \ 18 | 14_Flutterby.json \ 19 | 15_Hotline.json \ 20 | 16_Leaps_and_bounds.json \ 21 | 17_Lollipop.json \ 22 | 18_Lost_and_found.json \ 23 | 19_Mash_up.json \ 24 | 20_Monkey_around.json \ 25 | 21_Schools_out.json \ 26 | 22_Zen_too.json \ 27 | 23_Extra1_100x8.json \ 28 | cs40l20.bin 29 | -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#1] 00 (23%).json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#1] 00 (23%).wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#1] 00 (23%).wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#2] 00 (39%).json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#2] 00 (39%).wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#2] 00 (39%).wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#3] 00 (55%).json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#3] 00 (55%).wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#3] 00 (55%).wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#4] 00 (75%).json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#4] 00 (75%).wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#4] 00 (75%).wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#5] 11-2 (-3).json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#5] 11-2 (-3).wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#5] 11-2 (-3).wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#6] Double (L) = #1 + #2.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#6] Double (L) = #1 + #2.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#6] Double (L) = #1 + #2.wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#7] Double (M) = #2 + #3.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#7] Double (M) = #2 + #3.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#7] Double (M) = #2 + #3.wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#8] Double (H) = #3 + #4.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "F0": "160", 4 | "ReDC": "15" 5 | } 6 | ] -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/[#8] Double (H) = #3 + #4.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/LineageOS/android_device_google_crosshatch/5ae083f5c7e5b5352d3df0d90a5b10a83578e649/vibrator/cs40l20/wav_wavetable/[#8] Double (H) = #3 + #4.wav -------------------------------------------------------------------------------- /vibrator/cs40l20/wav_wavetable/continuous_sine_f0.json: -------------------------------------------------------------------------------- 1 | [ 2 | { 3 | "Version": "1.4.2", 4 | "Repeat": "0", 5 | "WaitTime": "0", 6 | 7 | "Time0": "0", 8 | "Level0": "0.23", 9 | "Frequency0": "0", 10 | 11 | "Time1": "-1", 12 | "Level1": "0.23", 13 | "Frequency1": "0" 14 | } 15 | ] 16 | -------------------------------------------------------------------------------- /vibrator/drv2624/drv2624.bin: -------------------------------------------------------------------------------- 1 | $&(1 { 2 |  ??d? 3 | -------------------------------------------------------------------------------- /voice_processing/Android.bp: -------------------------------------------------------------------------------- 1 | // Copyright (C) 2017 The Android Open Source Project 2 | // 3 | // Licensed under the Apache License, Version 2.0 (the "License"); 4 | // you may not use this file except in compliance with the License. 5 | // You may obtain a copy of the License at 6 | // 7 | // http://www.apache.org/licenses/LICENSE-2.0 8 | // 9 | // Unless required by applicable law or agreed to in writing, software 10 | // distributed under the License is distributed on an "AS IS" BASIS, 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 | // See the License for the specific language governing permissions and 13 | // limitations under the License. 14 | 15 | package { 16 | default_applicable_licenses: ["Android-Apache-2.0"], 17 | } 18 | 19 | cc_library_shared { 20 | name: "libqcomvoiceprocessingdescriptors", 21 | srcs: ["voice_processing_descriptors.c"], 22 | header_libs: [ 23 | "libaudioeffects", 24 | "libhardware_headers", 25 | ], 26 | relative_install_path: "soundfx", 27 | owner: "qcom", 28 | proprietary: true, 29 | } 30 | -------------------------------------------------------------------------------- /wifi_concurrency_cfg.txt: -------------------------------------------------------------------------------- 1 | ENABLE_STA_SAP_CONCURRENCY:1 2 | SAP_INTERFACE_NAME:softap0 3 | SAP_CHANNEL:6 4 | -------------------------------------------------------------------------------- /wpa_supplicant_overlay.conf: -------------------------------------------------------------------------------- 1 | disable_scan_offload=1 2 | p2p_disabled=1 3 | tdls_external_control=1 4 | wowlan_triggers=magic_pkt 5 | bss_max_count=512 6 | interworking=1 7 | hs20=1 8 | auto_interworking=0 9 | bss_no_flush_when_down=1 10 | driver_param=use_p2p_group_interface=1 11 | --------------------------------------------------------------------------------