├── sepolicy
├── vendor
│ ├── radio.te
│ ├── rild.te
│ ├── sensors.te
│ ├── rmt_storage.te
│ ├── hal_audio_default.te
│ ├── hal_drm_default.te
│ ├── hal_wifi_default.te
│ ├── device.te
│ ├── vold.te
│ ├── hal_graphics_composer_default.te
│ ├── property.te
│ ├── thermal-engine.te
│ ├── seapp_contexts
│ ├── platform_app.te
│ ├── wcnss_service.te
│ ├── hwservice.te
│ ├── tee.te
│ ├── attributes
│ ├── init.te
│ ├── hal_cameraHIDL_default.te
│ ├── file.te
│ ├── hal_ifaa.te
│ ├── vendor_init.te
│ ├── hal_cameraHIDL.te
│ ├── dashd.te
│ ├── qtidataservices_app.te
│ ├── hal_power_default.te
│ ├── hwservice_contexts
│ ├── hal_touch_oneplus_msm8998.te
│ ├── hal_ifaa_default.te
│ ├── hal_camera_default.te
│ ├── init_radio.te
│ ├── hal_fingerprint_default.te
│ ├── init_devstart.te
│ ├── hal_livedisplay_oneplus_msm8998.te
│ ├── genfs_contexts
│ ├── property_contexts
│ └── file_contexts
├── public
│ └── file.te
└── private
│ ├── seapp_contexts
│ └── pocketmode_app.te
├── setup-makefiles.py
├── livedisplay
├── .clang-format
├── vendor.lineage.livedisplay@2.0-service.oneplus_msm8998.rc
├── vendor.lineage.livedisplay@2.0-service.oneplus_msm8998.xml
├── Android.bp
├── DisplayModes.h
├── service.cpp
└── DisplayModes.cpp
├── pocketmode
├── proguard.flags
├── Android.bp
├── src
│ └── org
│ │ └── lineageos
│ │ └── pocketmode
│ │ ├── BootCompletedReceiver.java
│ │ ├── ProximitySensor.java
│ │ └── PocketModeService.java
└── AndroidManifest.xml
├── wifi
├── p2p_supplicant_overlay.conf
└── wpa_supplicant_overlay.conf
├── system_ext.prop
├── configs
├── qmi_fw.conf
├── msm_irqbalance.conf
├── public.libraries.txt
├── gps
│ ├── lowi.conf
│ ├── flp.conf
│ ├── xtwifi.conf
│ ├── apdr.conf
│ ├── sap.conf
│ ├── izat.conf
│ └── gps.conf
├── FOSSConfig.xml
├── system_ext-privapp-permissions-qti.xml
├── qti_whitelist.xml
├── nfc
│ └── libnfc-nci.conf
└── media_codecs_performance.xml
├── rro_overlays
├── WifiOverlay
│ ├── Android.bp
│ ├── AndroidManifest.xml
│ └── res
│ │ └── values
│ │ └── config.xml
├── CarrierConfigOverlay
│ ├── Android.bp
│ └── AndroidManifest.xml
└── TetheringOverlay
│ ├── Android.bp
│ ├── AndroidManifest.xml
│ └── res
│ └── values
│ └── config.xml
├── rootdir
├── bin
│ ├── init.devstart.sh
│ └── init.radio.sh
├── Android.bp
└── etc
│ ├── fstab.qcom
│ ├── ueventd.qcom.rc
│ └── init.qcom.usb.rc
├── lineage.dependencies
├── recovery
├── root
│ └── init.recovery.qcom.rc
├── Android.bp
└── recovery_updater.cpp
├── ifaa
├── java
│ └── org
│ │ └── ifaa
│ │ └── android
│ │ └── manager
│ │ ├── IFAAManagerV2.java
│ │ ├── IFAAManager.java
│ │ └── IFAAManagerFactory.java
├── Android.bp
└── aidl
│ └── com
│ └── android
│ └── internal
│ └── app
│ └── IIFAAService.aidl
├── seccomp_policy
└── mediacodec-seccomp.policy
├── init
├── Android.bp
└── init_oneplus_msm8998.cpp
├── overlay-lineage
├── packages
│ └── apps
│ │ ├── Dialer
│ │ └── java
│ │ │ └── com
│ │ │ └── android
│ │ │ └── dialer
│ │ │ └── callrecord
│ │ │ └── res
│ │ │ └── values
│ │ │ └── config.xml
│ │ └── Aperture
│ │ └── app
│ │ └── src
│ │ └── main
│ │ └── res
│ │ └── values
│ │ └── config.xml
├── lineage-sdk
│ ├── packages
│ │ └── LineageSettingsProvider
│ │ │ └── res
│ │ │ └── values
│ │ │ └── defaults.xml
│ └── lineage
│ │ └── res
│ │ └── res
│ │ └── values
│ │ └── config.xml
└── hardware
│ └── oneplus
│ └── doze
│ └── res
│ └── values
│ └── config.xml
├── overlay
├── frameworks
│ └── base
│ │ ├── packages
│ │ ├── SettingsProvider
│ │ │ └── res
│ │ │ │ └── values
│ │ │ │ └── defaults.xml
│ │ └── SystemUI
│ │ │ └── res
│ │ │ └── values
│ │ │ └── config.xml
│ │ └── core
│ │ └── res
│ │ └── res
│ │ └── xml
│ │ └── power_profile.xml
└── packages
│ ├── apps
│ └── Settings
│ │ └── res
│ │ └── values
│ │ └── arrays.xml
│ └── services
│ └── Telephony
│ └── res
│ └── values
│ └── config.xml
├── Android.bp
├── touch
└── include
│ └── TouchscreenGestureConfig.h
├── framework_compatibility_matrix.xml
├── system.prop
├── config.fs
├── audio
├── graphite_ipc_platform_info.xml
├── audio_output_policy.conf
├── audio_effects.xml
└── audio_policy_volumes.xml
├── extract-files.py
├── releasetools
└── releasetools.py
├── BoardConfigCommon.mk
└── vendor.prop
/sepolicy/vendor/radio.te:
--------------------------------------------------------------------------------
1 | get_prop(radio, vendor_qcom_ims_prop)
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/rild.te:
--------------------------------------------------------------------------------
1 | binder_call(rild, qtidataservices_app)
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/sensors.te:
--------------------------------------------------------------------------------
1 | r_dir_file(sensors, proc_cmdline)
2 |
--------------------------------------------------------------------------------
/setup-makefiles.py:
--------------------------------------------------------------------------------
1 | #!./extract-files.py --regenerate_makefiles
2 |
--------------------------------------------------------------------------------
/sepolicy/public/file.te:
--------------------------------------------------------------------------------
1 | type sysfs_proximity, fs_type, sysfs_type;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/rmt_storage.te:
--------------------------------------------------------------------------------
1 | r_dir_file(rmt_storage, sysfs_data)
2 |
--------------------------------------------------------------------------------
/livedisplay/.clang-format:
--------------------------------------------------------------------------------
1 | ../../../../build/soong/scripts/system-clang-format
--------------------------------------------------------------------------------
/pocketmode/proguard.flags:
--------------------------------------------------------------------------------
1 | -keep class org.lineageos.pocketmode.* {
2 | *;
3 | }
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_audio_default.te:
--------------------------------------------------------------------------------
1 | allow hal_audio_default sysfs:dir r_dir_perms;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_drm_default.te:
--------------------------------------------------------------------------------
1 | add_hwservice(hal_drm_default, hal_drmkey_hwservice)
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_wifi_default.te:
--------------------------------------------------------------------------------
1 | allow hal_wifi_default proc_net:file w_file_perms;
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/device.te:
--------------------------------------------------------------------------------
1 | type dash_device, dev_type;
2 | type fingerprint_device, dev_type;
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/vold.te:
--------------------------------------------------------------------------------
1 | # For setting read_ahead_kb
2 | allow vold sysfs_mmc_host:file w_file_perms;
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_graphics_composer_default.te:
--------------------------------------------------------------------------------
1 | r_dir_file(hal_graphics_composer_default, sysfs_graphics)
2 |
--------------------------------------------------------------------------------
/wifi/p2p_supplicant_overlay.conf:
--------------------------------------------------------------------------------
1 | disable_scan_offload=1
2 | p2p_no_group_iface=1
3 | persistent_reconnect=1
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/property.te:
--------------------------------------------------------------------------------
1 | vendor_internal_prop(thermal_engine_prop)
2 | vendor_internal_prop(vendor_device_prop)
3 |
--------------------------------------------------------------------------------
/system_ext.prop:
--------------------------------------------------------------------------------
1 | # Dex2oat
2 | dalvik.vm.dex2oat64.enabled=true
3 |
4 | # DPM
5 | persist.vendor.dpm.feature=11
6 |
--------------------------------------------------------------------------------
/configs/qmi_fw.conf:
--------------------------------------------------------------------------------
1 | #Debug messages with priority >= ANDROID_LOG_WARN
2 | QMI_CCI_DEBUG_LEVEL=5
3 | QMI_CSI_DEBUG_LEVEL=5
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/thermal-engine.te:
--------------------------------------------------------------------------------
1 | r_dir_file(thermal-engine, sysfs)
2 |
3 | set_prop(thermal-engine, thermal_engine_prop)
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/seapp_contexts:
--------------------------------------------------------------------------------
1 | user=radio seinfo=platform name=.qtidataservices domain=qtidataservices_app type=radio_data_file
2 |
--------------------------------------------------------------------------------
/sepolicy/private/seapp_contexts:
--------------------------------------------------------------------------------
1 | user=system seinfo=platform name=org.lineageos.pocketmode domain=pocketmode_app type=system_app_data_file
2 |
--------------------------------------------------------------------------------
/sepolicy/vendor/platform_app.te:
--------------------------------------------------------------------------------
1 | allow platform_app hal_ifaa_hwservice:hwservice_manager find;
2 | binder_call(platform_app, hal_ifaa_default)
3 |
--------------------------------------------------------------------------------
/sepolicy/vendor/wcnss_service.te:
--------------------------------------------------------------------------------
1 | allow wcnss_service sysfs_project_info:dir search;
2 | allow wcnss_service sysfs_project_info:file r_file_perms;
3 |
--------------------------------------------------------------------------------
/rro_overlays/WifiOverlay/Android.bp:
--------------------------------------------------------------------------------
1 | runtime_resource_overlay {
2 | name: "WifiOverlay",
3 | theme: "WifiOverlay",
4 | product_specific: true,
5 | }
6 |
--------------------------------------------------------------------------------
/configs/msm_irqbalance.conf:
--------------------------------------------------------------------------------
1 | PRIO=1,1,1,1,0,0,0,0
2 | #arch_timer, arm-pmu, arch_mem_timer, smem-rpm, mpm
3 | IGNORED_IRQ=19,22,39,200,203
4 | #WLAN irqs
5 | BLACKLIST_IRQ=446,455,456
6 |
--------------------------------------------------------------------------------
/rootdir/bin/init.devstart.sh:
--------------------------------------------------------------------------------
1 | #!/vendor/bin/sh
2 |
3 | echo 1 > /dev/ipa
4 | echo 1 > /sys/kernel/boot_adsp/boot
5 | echo 1 > /sys/kernel/boot_slpi/boot
6 |
7 | setprop vendor.qcom.devup 1
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hwservice.te:
--------------------------------------------------------------------------------
1 | type hal_cameraHIDL_hwservice, hwservice_manager_type;
2 | type hal_drmkey_hwservice, hwservice_manager_type;
3 | type hal_ifaa_hwservice, hwservice_manager_type;
4 |
--------------------------------------------------------------------------------
/sepolicy/vendor/tee.te:
--------------------------------------------------------------------------------
1 | typeattribute tee data_between_core_and_vendor_violators;
2 | allow tee fingerprintd_data_file:dir rw_dir_perms;
3 | allow tee fingerprintd_data_file:file create_file_perms;
4 |
--------------------------------------------------------------------------------
/rro_overlays/CarrierConfigOverlay/Android.bp:
--------------------------------------------------------------------------------
1 | runtime_resource_overlay {
2 | name: "CarrierConfigOverlay",
3 | theme: "CarrierConfigOverlay",
4 | product_specific: true,
5 | aaptflags: ["--keep-raw-values"],
6 | }
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/attributes:
--------------------------------------------------------------------------------
1 | # HALs
2 | attribute hal_cameraHIDL;
3 | attribute hal_cameraHIDL_client;
4 | attribute hal_cameraHIDL_server;
5 |
6 | attribute hal_ifaa;
7 | attribute hal_ifaa_client;
8 | attribute hal_ifaa_server;
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/init.te:
--------------------------------------------------------------------------------
1 | allow init proc_alarm_boot:file r_file_perms;
2 | allow init socket_device:sock_file { unlink setattr create };
3 |
4 | allow init bt_firmware_file:filesystem getattr;
5 | allow init firmware_file:filesystem getattr;
6 |
--------------------------------------------------------------------------------
/configs/public.libraries.txt:
--------------------------------------------------------------------------------
1 | libadsprpc.so
2 | libcdsprpc.so
3 | libsdsprpc.so
4 | libfastcvopt.so
5 | liblistenjni.so
6 | liblistensoundmodel2.so
7 | libOpenCL.so
8 | libnpu.so
9 | libhta_hexagon_runtime.so
10 | libprotobuf-cpp-lite.so
11 |
--------------------------------------------------------------------------------
/wifi/wpa_supplicant_overlay.conf:
--------------------------------------------------------------------------------
1 | disable_scan_offload=1
2 | p2p_disabled=1
3 | tdls_external_control=1
4 | bss_max_count=512
5 | interworking=1
6 | hs20=1
7 | auto_interworking=0
8 | bss_no_flush_when_down=1
9 | driver_param=use_p2p_group_interface=1
10 |
--------------------------------------------------------------------------------
/lineage.dependencies:
--------------------------------------------------------------------------------
1 | [
2 | {
3 | "repository": "android_hardware_oneplus",
4 | "target_path": "hardware/oneplus"
5 | },
6 | {
7 | "repository": "android_kernel_oneplus_msm8998",
8 | "target_path": "kernel/oneplus/msm8998"
9 | }
10 | ]
11 |
--------------------------------------------------------------------------------
/recovery/root/init.recovery.qcom.rc:
--------------------------------------------------------------------------------
1 | on fs
2 | wait /dev/block/platform/soc/1da4000.ufshc
3 | symlink /dev/block/platform/soc/1da4000.ufshc /dev/block/bootdevice
4 |
5 | on init
6 | setprop sys.usb.controller "a800000.dwc3"
7 | setprop sys.usb.configfs 1
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_cameraHIDL_default.te:
--------------------------------------------------------------------------------
1 | type hal_cameraHIDL_default, domain;
2 | hal_server_domain(hal_cameraHIDL_default, hal_cameraHIDL)
3 |
4 | type hal_cameraHIDL_default_exec, exec_type, vendor_file_type, file_type;
5 | init_daemon_domain(hal_cameraHIDL_default)
6 |
--------------------------------------------------------------------------------
/sepolicy/vendor/file.te:
--------------------------------------------------------------------------------
1 | type debugfs_rpm, fs_type, debugfs_type;
2 | type proc_alarm_boot, fs_type, proc_type;
3 | type proc_touchpanel, fs_type, proc_type;
4 | type sysfs_fp_detect, fs_type, sysfs_type;
5 | type sysfs_project_info, fs_type, sysfs_type;
6 | type sysfs_wifi, fs_type, sysfs_type;
7 |
--------------------------------------------------------------------------------
/rro_overlays/TetheringOverlay/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // Copyright (C) 2020 The Android Open-Source Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | runtime_resource_overlay {
7 | name: "TetheringConfigOverlay",
8 | resource_dirs: ["res"],
9 | proprietary: true,
10 | }
11 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_ifaa.te:
--------------------------------------------------------------------------------
1 | # HwBinder IPC from client to server, and callbacks
2 | binder_call(hal_ifaa_client, hal_ifaa_server)
3 | binder_call(hal_ifaa_server, hal_ifaa_client)
4 |
5 | add_hwservice(hal_ifaa_server, hal_ifaa_hwservice)
6 | allow hal_ifaa_client hal_ifaa_hwservice:hwservice_manager find;
7 |
--------------------------------------------------------------------------------
/ifaa/java/org/ifaa/android/manager/IFAAManagerV2.java:
--------------------------------------------------------------------------------
1 | package org.ifaa.android.manager;
2 |
3 | import android.content.Context;
4 |
5 | public abstract class IFAAManagerV2 extends IFAAManager {
6 |
7 | public abstract byte[] processCmdV2(Context paramContext, byte[] paramArrayOfByte);
8 |
9 | }
10 |
--------------------------------------------------------------------------------
/ifaa/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // Copyright (C) 2017-2019 The LineageOS Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | java_library {
7 | name: "org.ifaa.android.manager",
8 | installable: true,
9 | srcs: [
10 | "java/**/*.java",
11 | "aidl/**/I*.aidl",
12 | ],
13 | }
14 |
--------------------------------------------------------------------------------
/seccomp_policy/mediacodec-seccomp.policy:
--------------------------------------------------------------------------------
1 | # device specific syscalls
2 | # extension of services/mediacodec/minijail/seccomp_policy/mediacodec-seccomp-arm.policy
3 | pselect6: 1
4 | eventfd2: 1
5 | sendto: 1
6 | recvfrom: 1
7 | _llseek: 1
8 | sysinfo: 1
9 | getcwd: 1
10 | getdents64: 1
11 | inotify_init1: 1
12 | inotify_add_watch: 1
13 |
--------------------------------------------------------------------------------
/sepolicy/vendor/vendor_init.te:
--------------------------------------------------------------------------------
1 | allow vendor_init dash_device:chr_file r_file_perms;
2 | allow vendor_init tmpfs:dir { create rw_dir_perms };
3 |
4 | allow vendor_init sysfs_wifi:file w_file_perms;
5 |
6 | set_prop(vendor_init, camera_prop);
7 | set_prop(vendor_init, vendor_qcom_ims_prop);
8 | set_prop(vendor_init, vendor_time_service_prop);
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_cameraHIDL.te:
--------------------------------------------------------------------------------
1 | # HwBinder IPC from client to server, and callbacks
2 | binder_call(hal_cameraHIDL_client, hal_cameraHIDL_server)
3 | binder_call(hal_cameraHIDL_server, hal_cameraHIDL_client)
4 |
5 | add_hwservice(hal_cameraHIDL_server, hal_cameraHIDL_hwservice)
6 | allow hal_cameraHIDL_client hal_cameraHIDL_hwservice:hwservice_manager find;
7 |
--------------------------------------------------------------------------------
/sepolicy/vendor/dashd.te:
--------------------------------------------------------------------------------
1 | type dashd, domain;
2 | type dashd_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(dashd)
5 |
6 | wakelock_use(dashd)
7 |
8 | allow dashd kmsg_device:chr_file rw_file_perms;
9 | allow dashd dash_device:chr_file rw_file_perms;
10 |
11 | r_dir_file(dashd, sysfs_usb_supply);
12 | r_dir_file(dashd, sysfs_battery_supply);
13 |
--------------------------------------------------------------------------------
/sepolicy/vendor/qtidataservices_app.te:
--------------------------------------------------------------------------------
1 | allow qtidataservices_app self:socket create_socket_perms;
2 |
3 | allow qtidataservices_app system_app_data_file:dir create_dir_perms;
4 | allow qtidataservices_app system_app_data_file:file create_file_perms;
5 |
6 | binder_call(qtidataservices_app, location)
7 |
8 | allowxperm qtidataservices_app self:socket ioctl msm_sock_ipc_ioctls;
9 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_power_default.te:
--------------------------------------------------------------------------------
1 | # To do powerhint on nodes defined in powerhint.json
2 | allow hal_power_default device_latency:chr_file rw_file_perms;
3 |
4 | # Enable DT2W
5 | allow hal_power_default proc_touchpanel:dir search;
6 | allow hal_power_default proc_touchpanel:file rw_file_perms;
7 |
8 | # Connect to PPS
9 | unix_socket_connect(hal_power_default, pps, mm-pp-daemon)
10 |
--------------------------------------------------------------------------------
/init/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // Copyright (C) 2019-2020,2022 The LineageOS Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | cc_library_static {
7 | name: "libinit_oneplus_msm8998",
8 | recovery_available: true,
9 | srcs: ["init_oneplus_msm8998.cpp"],
10 | include_dirs: [
11 | "system/core/init",
12 | ],
13 | shared_libs: [
14 | "libbase",
15 | ],
16 | }
17 |
--------------------------------------------------------------------------------
/overlay-lineage/packages/apps/Dialer/java/com/android/dialer/callrecord/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 | true
9 | 4
10 |
11 |
12 |
--------------------------------------------------------------------------------
/overlay/frameworks/base/packages/SettingsProvider/res/values/defaults.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
9 | true
10 |
11 |
12 |
--------------------------------------------------------------------------------
/overlay-lineage/lineage-sdk/packages/LineageSettingsProvider/res/values/defaults.xml:
--------------------------------------------------------------------------------
1 |
2 |
7 |
8 |
9 |
10 | true
11 |
12 |
13 |
--------------------------------------------------------------------------------
/rro_overlays/TetheringOverlay/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
5 |
6 |
11 |
12 |
--------------------------------------------------------------------------------
/recovery/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // SPDX-FileCopyrightText: 2024 The LineageOS Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | cc_library_static {
7 | srcs: ["recovery_updater.cpp"],
8 | name: "librecovery_updater_oneplus",
9 | include_dirs: [
10 | "bootable/deprecated-ota/edify/include",
11 | "bootable/deprecated-ota/updater/include",
12 | "bootable/recovery",
13 | "bootable/recovery/otautil/include",
14 | "system/libbase/include",
15 | ],
16 | }
17 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hwservice_contexts:
--------------------------------------------------------------------------------
1 | vendor.nxp.nxpnfc::INxpNfc u:object_r:hal_nfc_hwservice:s0
2 |
3 | vendor.oneplus.fingerprint.extension::IVendorFingerprintExtensions u:object_r:hal_fingerprint_hwservice:s0
4 |
5 | vendor.oneplus.camera.CameraHIDL::IOnePlusCameraProvider u:object_r:hal_cameraHIDL_hwservice:s0
6 | vendor.oneplus.hardware.drmkey::IOneplusDrmKey u:object_r:hal_drmkey_hwservice:s0
7 | vendor.oneplus.hardware.ifaa::IOneplusIfaa u:object_r:hal_ifaa_hwservice:s0
8 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_touch_oneplus_msm8998.te:
--------------------------------------------------------------------------------
1 | type hal_touch_oneplus_msm8998, domain;
2 | type hal_touch_oneplus_msm8998_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(hal_touch_oneplus_msm8998)
5 |
6 | hal_server_domain(hal_touch_oneplus_msm8998, hal_lineage_touch)
7 |
8 | binder_call(hal_touch_oneplus_msm8998, servicemanager)
9 |
10 | # Allow access to gesture enable nodes
11 | allow hal_touch_oneplus_msm8998 proc_touchpanel:dir search;
12 | allow hal_touch_oneplus_msm8998 proc_touchpanel:file rw_file_perms;
13 |
--------------------------------------------------------------------------------
/overlay/packages/apps/Settings/res/values/arrays.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
10 |
11 | - 0
12 | - -1
13 | - -1
14 |
15 |
16 |
17 |
--------------------------------------------------------------------------------
/pocketmode/Android.bp:
--------------------------------------------------------------------------------
1 | /*
2 | * Copyright (C) 2024 The LineageOS Project
3 | *
4 | * SPDX-License-Identifier: Apache-2.0
5 | */
6 |
7 | android_app {
8 | name: "OnePlusPocketMode",
9 |
10 | srcs: ["src/**/*.java"],
11 |
12 | certificate: "platform",
13 | platform_apis: true,
14 | privileged: true,
15 | system_ext_specific: true,
16 |
17 | static_libs: [
18 | "org.lineageos.platform.internal",
19 | ],
20 |
21 | optimize: {
22 | proguard_flags_files: ["proguard.flags"],
23 | },
24 | }
25 |
--------------------------------------------------------------------------------
/overlay-lineage/hardware/oneplus/doze/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
9 | android.sensor.tilt_detector
10 | android.sensor.proximity
11 |
12 |
13 | - 5.0002785
14 |
15 |
16 |
--------------------------------------------------------------------------------
/sepolicy/private/pocketmode_app.te:
--------------------------------------------------------------------------------
1 | type pocketmode_app, domain;
2 |
3 | app_domain(pocketmode_app)
4 |
5 | # Allow pocketmode_app to find app_api_service
6 | allow pocketmode_app app_api_service:service_manager find;
7 |
8 | # Allow pocketmode_app read and write /data/data subdirectory
9 | allow pocketmode_app system_app_data_file:dir create_dir_perms;
10 | allow pocketmode_app system_app_data_file:{ file lnk_file } create_file_perms;
11 |
12 | # Allow pocketmode_app to enable/disable proximity_state
13 | allow pocketmode_app sysfs_proximity:file { w_file_perms getattr };
14 |
--------------------------------------------------------------------------------
/overlay-lineage/packages/apps/Aperture/app/src/main/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
9 | true
10 |
11 |
12 |
13 | - 3
14 |
15 |
16 |
17 |
--------------------------------------------------------------------------------
/livedisplay/vendor.lineage.livedisplay@2.0-service.oneplus_msm8998.rc:
--------------------------------------------------------------------------------
1 | on init
2 | chown system graphics /sys/devices/virtual/graphics/fb0/hbm
3 | chown system graphics /sys/devices/virtual/graphics/fb0/preset
4 | chmod 0660 /sys/devices/virtual/graphics/fb0/hbm
5 | chmod 0660 /sys/devices/virtual/graphics/fb0/preset
6 |
7 | on post-fs-data
8 | mkdir /data/vendor/display/ 0770 system graphics
9 |
10 | service vendor.livedisplay-hal-2-0 /vendor/bin/hw/vendor.lineage.livedisplay@2.0-service.oneplus_msm8998
11 | class late_start
12 | user system
13 | group system
14 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_ifaa_default.te:
--------------------------------------------------------------------------------
1 | type hal_ifaa_default, domain;
2 | type hal_ifaa_default_exec, exec_type, vendor_file_type, file_type;
3 |
4 | hal_server_domain(hal_ifaa_default, hal_ifaa)
5 | init_daemon_domain(hal_ifaa_default)
6 |
7 | allow hal_ifaa_default tee_device:chr_file rw_file_perms;
8 | allow hal_ifaa_default ion_device:chr_file r_file_perms;
9 | r_dir_file(hal_ifaa_default, firmware_file)
10 |
11 | allow hal_ifaa_default hal_perf_hwservice:hwservice_manager find;
12 | binder_call(hal_ifaa_default, hal_perf_default)
13 |
14 | get_prop(hal_ifaa_default, hwservicemanager_prop)
15 |
--------------------------------------------------------------------------------
/overlay/frameworks/base/packages/SystemUI/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
9 | true
10 |
11 |
13 | true
14 |
15 |
16 |
--------------------------------------------------------------------------------
/rro_overlays/CarrierConfigOverlay/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
10 |
11 |
15 |
16 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_camera_default.te:
--------------------------------------------------------------------------------
1 | hal_client_domain(hal_camera_default, hal_configstore)
2 | hal_client_domain(hal_camera_default, hal_graphics_allocator)
3 |
4 | allow hal_camera_default mnt_vendor_file:file { rw_file_perms setattr };
5 |
6 | typeattribute hal_camera_default data_between_core_and_vendor_violators;
7 | r_dir_file(hal_camera_default, camera_data_file)
8 |
9 | get_prop(hal_camera_default, bootanim_system_prop)
10 | userdebug_or_eng(`
11 | get_prop(hal_camera_default, vendor_sensors_dbg_prop)
12 | ')
13 | get_prop(hal_camera_default, vendor_system_prop)
14 | set_prop(hal_camera_default, camera_prop)
15 |
--------------------------------------------------------------------------------
/sepolicy/vendor/init_radio.te:
--------------------------------------------------------------------------------
1 | type init-radio-sh, domain;
2 | type init-radio-sh_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(init-radio-sh)
5 |
6 | allow init-radio-sh vendor_shell_exec:file rx_file_perms;
7 | allow init-radio-sh vendor_toolbox_exec:file rx_file_perms;
8 |
9 | allow init-radio-sh self:capability fowner;
10 |
11 | allow init-radio-sh vendor_mbn_data_file:dir create_dir_perms;
12 | allow init-radio-sh vendor_mbn_data_file:file create_file_perms;
13 | allow init-radio-sh vendor_radio_data_file:file create_file_perms;
14 |
15 | r_dir_file(init-radio-sh, vendor_radio_data_file)
16 |
--------------------------------------------------------------------------------
/rro_overlays/WifiOverlay/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
10 |
11 |
16 |
17 |
--------------------------------------------------------------------------------
/livedisplay/vendor.lineage.livedisplay@2.0-service.oneplus_msm8998.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | vendor.lineage.livedisplay
4 | hwbinder
5 | 2.0
6 |
7 | IDisplayModes
8 | default
9 |
10 |
11 | IPictureAdjustment
12 | default
13 |
14 |
15 | ISunlightEnhancement
16 | default
17 |
18 |
19 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_fingerprint_default.te:
--------------------------------------------------------------------------------
1 | allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;
2 |
3 | allow hal_fingerprint_default firmware_file:dir search;
4 | allow hal_fingerprint_default firmware_file:file r_file_perms;
5 |
6 | typeattribute hal_fingerprint_default data_between_core_and_vendor_violators;
7 | allow hal_fingerprint_default fingerprintd_data_file:dir rw_dir_perms;
8 | allow hal_fingerprint_default fingerprintd_data_file:file create_file_perms;
9 |
10 | allow hal_fingerprint_default sysfs_fp_detect:file r_file_perms;
11 |
12 | allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
13 | allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;
14 |
--------------------------------------------------------------------------------
/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // Copyright (C) 2018-2024 The LineageOS Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | soong_namespace {
7 | imports: [
8 | "hardware/google/interfaces",
9 | "hardware/google/pixel"
10 | ],
11 | }
12 |
13 | install_symlink {
14 | name: "firmware_wlan_mac.bin_symlink",
15 | vendor: true,
16 | installed_location: "firmware/wlan/qca_cld/wlan_mac.bin",
17 | symlink_target: "/mnt/vendor/persist/wlan_mac.bin",
18 | }
19 |
20 | install_symlink {
21 | name: "firmware_WCNSS_qcom_cfg.ini_symlink",
22 | vendor: true,
23 | installed_location: "firmware/wlan/qca_cld/WCNSS_qcom_cfg.ini",
24 | symlink_target: "/vendor/etc/wifi/WCNSS_qcom_cfg.ini",
25 | }
26 |
--------------------------------------------------------------------------------
/pocketmode/src/org/lineageos/pocketmode/BootCompletedReceiver.java:
--------------------------------------------------------------------------------
1 | /*
2 | * Copyright (c) 2016 The CyanogenMod Project
3 | *
4 | * SPDX-License-Identifier: Apache-2.0
5 | */
6 | package org.lineageos.pocketmode;
7 |
8 | import android.content.BroadcastReceiver;
9 | import android.content.Context;
10 | import android.content.Intent;
11 | import android.os.UserHandle;
12 | import android.util.Log;
13 |
14 | public class BootCompletedReceiver extends BroadcastReceiver {
15 |
16 | private static final String TAG = "OnePlusPocketMode";
17 |
18 | @Override
19 | public void onReceive(final Context context, Intent intent) {
20 | Log.d(TAG, "Starting");
21 | context.startServiceAsUser(new Intent(context, PocketModeService.class),
22 | UserHandle.CURRENT);
23 | }
24 | }
25 |
--------------------------------------------------------------------------------
/ifaa/aidl/com/android/internal/app/IIFAAService.aidl:
--------------------------------------------------------------------------------
1 | /********************************************************************************
2 | ** Copyright (C), 2014-2017, OnePlus Mobile Comm Corp., Ltd
3 | ** VENDOR_EDIT, All rights reserved.
4 | **
5 | ** File: - IIFAAService.aidl
6 | ** Description:
7 | ** IFAAService service interface
8 | **
9 | ** ------------------------------- Revision History: ----------------------------
10 | **
11 | ** ------------------------------------------------------------------------------
12 | ** KenShen@Framework 2017-03-30 v1 add init version.
13 |
14 | ********************************************************************************/
15 |
16 | package com.android.internal.app;
17 |
18 | interface IIFAAService {
19 | byte[] processCmdV2(in byte[] dataIn);
20 | }
21 |
--------------------------------------------------------------------------------
/sepolicy/vendor/init_devstart.te:
--------------------------------------------------------------------------------
1 | type init-devstart-sh, domain;
2 | type init-devstart-sh_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(init-devstart-sh)
5 |
6 | allow init-devstart-sh vendor_shell_exec:file rx_file_perms;
7 | allow init-devstart-sh vendor_toolbox_exec:file rx_file_perms;
8 |
9 | # execute grep
10 | allow init-devstart-sh vendor_file:file rx_file_perms;
11 |
12 | # Set the vendor.qcom.devup property
13 | set_prop(init-devstart-sh, vendor_device_prop)
14 |
15 | allow init-devstart-sh ipa_dev:chr_file w_file_perms;
16 | allow init-devstart-sh sysfs_boot_adsp:dir r_dir_perms;
17 | allow init-devstart-sh sysfs_boot_adsp:file w_file_perms;
18 | allow init-devstart-sh sysfs_slpi:dir r_dir_perms;
19 | allow init-devstart-sh sysfs_slpi:file w_file_perms;
20 |
21 | # Read versions from firmware
22 | r_dir_file(init-devstart-sh, firmware_file)
23 |
--------------------------------------------------------------------------------
/configs/gps/lowi.conf:
--------------------------------------------------------------------------------
1 | #*====*====*====*====*====*====*====*====*====*====*====*====*====*====*====*
2 | #
3 | # LOWI Config file
4 | #
5 | # GENERAL DESCRIPTION
6 | # This file contains the config params for LOWI
7 | #
8 | # Copyright (c) 2019 Qualcomm Technologies, Inc.
9 | # All Rights Reserved.
10 | # Confidential and Proprietary - Qualcomm Technologies, Inc.
11 | #
12 | # 2012-2013 Qualcomm Atheros, Inc.
13 | # All Rights Reserved.
14 | # Qualcomm Atheros Confidential and Proprietary.
15 | #
16 | # Export of this technology or software is regulated by the U.S. Government.
17 | # Diversion contrary to U.S. law prohibited.
18 | #=============================================================================*/
19 |
20 | # X86 ONLY - UBUNTU:
21 | # Copy this file in the same directory where the executable is
22 |
23 | # Log level
24 | # EL_LOG_OFF = 0, EL_ERROR = 1, EL_WARNING = 2, EL_INFO = 3, EL_DEBUG = 4, EL_VERBOSE = 5, EL_LOG_ALL = 100
25 | LOWI_LOG_LEVEL = 3
26 | LOWI_USE_LOWI_LP = 0
27 |
28 |
--------------------------------------------------------------------------------
/sepolicy/vendor/hal_livedisplay_oneplus_msm8998.te:
--------------------------------------------------------------------------------
1 | type hal_livedisplay_oneplus_msm8998, domain;
2 | type hal_livedisplay_oneplus_msm8998_exec, exec_type, vendor_file_type, file_type;
3 |
4 | init_daemon_domain(hal_livedisplay_oneplus_msm8998)
5 |
6 | hal_server_domain(hal_livedisplay_oneplus_msm8998, hal_lineage_livedisplay)
7 |
8 | # Allow LiveDisplay to use vendor-binder service
9 | vndbinder_use(hal_livedisplay_oneplus_msm8998)
10 | allow hal_livedisplay_oneplus_msm8998 qdisplay_service:service_manager find;
11 | binder_call(hal_livedisplay_oneplus_msm8998, hal_graphics_composer_default)
12 |
13 | # Write DisplayMode nodes
14 | allow hal_livedisplay_oneplus_msm8998 sysfs_graphics:dir r_dir_perms;
15 | allow hal_livedisplay_oneplus_msm8998 sysfs_livedisplay_tuneable:file rw_file_perms;
16 |
17 | # Store files in /data/vendor/display and access them
18 | allow hal_livedisplay_oneplus_msm8998 display_vendor_data_file:dir rw_dir_perms;
19 | allow hal_livedisplay_oneplus_msm8998 display_vendor_data_file:file create_file_perms;
20 |
--------------------------------------------------------------------------------
/rootdir/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // SPDX-FileCopyrightText: 2024 The LineageOS Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | // Init configuration files
7 |
8 | prebuilt_etc {
9 | name: "fstab.qcom",
10 | src: "etc/fstab.qcom",
11 | vendor: true,
12 | ramdisk_available: true,
13 | }
14 |
15 | prebuilt_etc {
16 | name: "init.qcom.usb.rc",
17 | src: "etc/init.qcom.usb.rc",
18 | sub_dir: "init/hw",
19 | vendor: true,
20 | }
21 |
22 | prebuilt_etc {
23 | name: "init.qcom.rc",
24 | src: "etc/init.qcom.rc",
25 | sub_dir: "init/hw",
26 | vendor: true,
27 | }
28 |
29 | prebuilt_etc {
30 | name: "ueventd.qcom.rc",
31 | filename: "ueventd.rc",
32 | src: "etc/ueventd.qcom.rc",
33 | vendor: true,
34 | }
35 |
36 | // Init scripts
37 |
38 | sh_binary {
39 | name: "init.devstart.sh",
40 | src: "bin/init.devstart.sh",
41 | vendor: true,
42 | }
43 |
44 | sh_binary {
45 | name: "init.radio.sh",
46 | src: "bin/init.radio.sh",
47 | vendor: true,
48 | }
49 |
--------------------------------------------------------------------------------
/rro_overlays/TetheringOverlay/res/values/config.xml:
--------------------------------------------------------------------------------
1 |
2 |
6 |
7 |
8 |
11 |
12 | - "wlan\\d"
13 |
14 |
15 |
18 |
19 | - "bnep\\d"
20 | - "bt-pan"
21 |
22 |
23 |
24 |
--------------------------------------------------------------------------------
/livedisplay/Android.bp:
--------------------------------------------------------------------------------
1 | //
2 | // Copyright (C) 2019 The LineageOS Project
3 | // SPDX-License-Identifier: Apache-2.0
4 | //
5 |
6 | cc_binary {
7 | name: "vendor.lineage.livedisplay@2.0-service.oneplus_msm8998",
8 | defaults: ["hidl_defaults"],
9 | init_rc: ["vendor.lineage.livedisplay@2.0-service.oneplus_msm8998.rc"],
10 | vintf_fragments: ["vendor.lineage.livedisplay@2.0-service.oneplus_msm8998.xml"],
11 | relative_install_path: "hw",
12 | srcs: [
13 | ":vendor.lineage.livedisplay@2.0-sdm-pa",
14 | ":vendor.lineage.livedisplay@2.0-sdm-utils",
15 | ":vendor.lineage.livedisplay@2.0-sysfs-sre",
16 | "DisplayModes.cpp",
17 | "service.cpp",
18 | ],
19 | shared_libs: [
20 | "libbase",
21 | "libbinder",
22 | "libhidlbase",
23 | "libutils",
24 | "vendor.lineage.livedisplay@2.0",
25 | ],
26 | header_libs: [
27 | "vendor.lineage.livedisplay@2.0-sdm-headers",
28 | "vendor.lineage.livedisplay@2.0-sysfs-headers",
29 | ],
30 | proprietary: true,
31 | }
32 |
--------------------------------------------------------------------------------
/pocketmode/AndroidManifest.xml:
--------------------------------------------------------------------------------
1 |
2 |
7 |
8 |
9 |
10 |
15 |
16 |
18 |
19 |
20 |
21 |
22 |
23 |
25 |
26 |
27 |
28 |
29 |
--------------------------------------------------------------------------------
/configs/FOSSConfig.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | 20
4 | 0
5 | 128
6 | 1
7 | 60
8 | 8
9 | 4
10 | 4
11 | 0 36 72 109 145 182 218 255
12 | 0 45 73 143 253 438 717 1023
13 | 32 48 700 788
14 | 255 204 204 192
15 | 55 128 175 204
16 | 80 64 16 1
17 |
18 |
--------------------------------------------------------------------------------
/rootdir/bin/init.radio.sh:
--------------------------------------------------------------------------------
1 | #! /vendor/bin/sh
2 |
3 | #
4 | # Make modem config folder and copy firmware config to that folder for RIL
5 | #
6 | if [ -f /data/vendor/modem_config/ver_info.txt ]; then
7 | prev_version_info=`cat /data/vendor/modem_config/ver_info.txt`
8 | else
9 | prev_version_info=""
10 | fi
11 |
12 | cur_version_info=`cat /vendor/firmware_mnt/verinfo/ver_info.txt`
13 | if [ ! -f /vendor/firmware_mnt/verinfo/ver_info.txt -o "$prev_version_info" != "$cur_version_info" ]; then
14 | # add W for group recursively before delete
15 | chmod g+w -R /data/vendor/modem_config/*
16 | rm -rf /data/vendor/modem_config/*
17 | # preserve the read only mode for all subdir and files
18 | cp --preserve=m -dr /vendor/firmware_mnt/image/modem_pr/mcfg/configs/* /data/vendor/modem_config
19 | cp --preserve=m -d /vendor/firmware_mnt/verinfo/ver_info.txt /data/vendor/modem_config/
20 | cp --preserve=m -d /vendor/firmware/mbn_ota/mbn_ota.txt /data/vendor/modem_config/
21 | # the group must be root, otherwise this script could not add "W" for group recursively
22 | chown -hR radio.root /data/vendor/modem_config/*
23 | fi
24 | chmod g-w /data/vendor/modem_config
25 | echo 1 > /data/vendor/radio/copy_complete
26 |
--------------------------------------------------------------------------------
/ifaa/java/org/ifaa/android/manager/IFAAManager.java:
--------------------------------------------------------------------------------
1 | package org.ifaa.android.manager;
2 |
3 | import android.content.Context;
4 |
5 | public abstract class IFAAManager {
6 |
7 | /**
8 | * 返回手机系统上支持的校验方式,目前IFAF协议1.0版本指纹为0x01、虹膜为0x02
9 | */
10 | public abstract int getSupportBIOTypes(Context context);
11 |
12 | /**
13 | * 启动系统的指纹/虹膜管理应用界面,让用户进行指纹录入。指纹录入是在系统的指纹管理应用中实现的,
14 | * 本函数的作用只是将指纹管理应用运行起来,直接进行页面跳转,方便用户录入。
15 | * @param context
16 | * @param authType 生物特征识别类型,指纹为1,虹膜为2
17 | * @return 0,成功启动指纹管理应用;-1,启动指纹管理应用失败。
18 | */
19 | public abstract int startBIOManager(Context context, int authType);
20 |
21 | /**
22 | * 通过ifaateeclient的so文件实现REE到TA的通道
23 | * @param context
24 | * @param param 用于传输到IFAA TA的数据buffer
25 | * @return IFAA TA返回给REE数据buffer
26 | */
27 | public native byte[] processCmd(Context context, byte[] param);
28 |
29 | /**
30 | * 获取设备型号,同一款机型型号需要保持一致
31 | */
32 | public abstract String getDeviceModel();
33 |
34 | /**
35 | * 获取IFAAManager接口定义版本,目前为1
36 | */
37 | public abstract int getVersion();
38 |
39 | /**
40 | * load so to communicate from REE to TEE
41 | */
42 | static {
43 | System.loadLibrary("teeclientjni");//teeclientjni for TA test binary //ifaateeclient
44 | }
45 | }
46 |
--------------------------------------------------------------------------------
/sepolicy/vendor/genfs_contexts:
--------------------------------------------------------------------------------
1 | genfscon debugfs /system_stats u:object_r:debugfs_rpm:s0
2 | userdebug_or_eng(`
3 | genfscon debugfs /rmt_storage/rmts u:object_r:qti_debugfs:s0
4 | genfscon debugfs /msm_core u:object_r:qti_debugfs:s0
5 | ')
6 |
7 | genfscon proc /touchpanel u:object_r:proc_touchpanel:s0
8 | genfscon proc /tri-state-key u:object_r:proc_touchpanel:s0
9 | genfscon proc /sys/kernel/boot_reason u:object_r:proc_alarm_boot:s0
10 |
11 | genfscon sysfs /devices/soc/soc:fingerprint_detect/sensor_version u:object_r:sysfs_fp_detect:s0
12 | genfscon sysfs /devices/virtual/graphics/fb0 u:object_r:sysfs_graphics:s0
13 |
14 | # LiveDisplay
15 | genfscon sysfs /devices/virtual/graphics/fb0/num_presets u:object_r:sysfs_livedisplay_tuneable:s0
16 | genfscon sysfs /devices/virtual/graphics/fb0/preset u:object_r:sysfs_livedisplay_tuneable:s0
17 |
18 | genfscon sysfs /project_info u:object_r:sysfs_project_info:s0
19 |
20 | genfscon sysfs /devices/soc/800f000.qcom,spmi/spmi-0/spmi0-02/800f000.qcom,spmi:qcom,pmi8998@2:gpio-leds/leds/button-backlight/brightness u:object_r:sysfs_graphics:s0
21 | genfscon sysfs /devices/soc/800f000.qcom,spmi/spmi-0/spmi0-03/800f000.qcom,spmi:qcom,pmi8998@3:qcom,leds@d000/leds/rgb/rgb_blink u:object_r:sysfs_graphics:s0
22 |
--------------------------------------------------------------------------------
/sepolicy/vendor/property_contexts:
--------------------------------------------------------------------------------
1 | # Bluetooth
2 | persist.vendor.bt.address u:object_r:vendor_bluetooth_prop:s0
3 | ro.vendor.bt.bdaddr_path u:object_r:vendor_bluetooth_prop:s0
4 |
5 | # Camera
6 | camera.on u:object_r:camera_prop:s0
7 | persist.camera. u:object_r:camera_prop:s0
8 | persist.vendor.camera. u:object_r:camera_prop:s0
9 | vendor.camera. u:object_r:camera_prop:s0
10 |
11 | # Display
12 | sdm.disable_hdr_lut_gen u:object_r:vendor_display_prop:s0
13 |
14 | # Fingerprint
15 | gf.debug.dump_data u:object_r:vendor_default_prop:s0
16 |
17 | # Firmware
18 | ro.build.expect. u:object_r:exported_default_prop:s0
19 |
20 | # Init
21 | vendor.qcom.devup u:object_r:vendor_device_prop:s0
22 |
23 | # Mediacodec
24 | gpu.stats.debug.level u:object_r:vendor_video_prop:s0
25 |
26 | # RIL
27 | persist.sys.assert.panic u:object_r:radio_control_prop:s0
28 | persist.sys.oem.region u:object_r:radio_control_prop:s0
29 | vendor.oem.device.imeicache0 u:object_r:vendor_radio_prop:s0
30 | vendor.oem.device.imeicache1 u:object_r:vendor_radio_prop:s0
31 |
32 | # Thermal
33 | sys.thermal. u:object_r:thermal_engine_prop:s0
34 |
--------------------------------------------------------------------------------
/touch/include/TouchscreenGestureConfig.h:
--------------------------------------------------------------------------------
1 | /*
2 | * SPDX-FileCopyrightText: 2025 The LineageOS Project
3 | * SPDX-License-Identifier: Apache-2.0
4 | */
5 |
6 | #ifndef TOUCH_ONEPLUS_TOUCHSCREENGESTURECONFIG_H
7 | #define TOUCH_ONEPLUS_TOUCHSCREENGESTURECONFIG_H
8 |
9 | #include