gts3l-common: Separate into the two types of boards

gts3llte, gts3lwifi

Signed-off-by: Deokgyu Yang <secugyu@gmail.com>
Change-Id: I7d169ed9435d28cd7096bfff07be2077fbeeb71a
This commit is contained in:
Deokgyu Yang 2021-06-25 00:26:14 +09:00
parent f617afeb55
commit 0da3859ba1
16 changed files with 59 additions and 787 deletions

View file

@ -1,20 +0,0 @@
#
# Copyright (C) 2016 The CyanogenMod Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
PRODUCT_MAKEFILES := \
$(LOCAL_DIR)/lineage_gts3llte.mk
COMMON_LUNCH_CHOICES := \
lineage_gts3llte-userdebug

View file

@ -17,12 +17,9 @@
BOARD_VENDOR := samsung
DEVICE_PATH := device/samsung/gts3llte
COMMON_PATH := device/samsung/gts3l-common
TARGET_SPECIFIC_HEADER_PATH := $(DEVICE_PATH)/include
# Assert
TARGET_OTA_ASSERT_DEVICE := gts3llte
TARGET_SPECIFIC_HEADER_PATH := $(COMMON_PATH)/include
# Architecture
TARGET_ARCH := arm64
@ -56,7 +53,6 @@ BOARD_CUSTOM_BOOTIMG := true
BOARD_CUSTOM_BOOTIMG_MK := hardware/samsung/mkbootimg.mk
TARGET_KERNEL_ARCH := arm64
TARGET_KERNEL_SOURCE := kernel/samsung/msm8996
TARGET_KERNEL_CONFIG := lineage_gts3llte_defconfig
TARGET_COMPILE_WITH_MSM_KERNEL := true
# Platform
@ -104,7 +100,7 @@ USE_CUSTOM_AUDIO_POLICY := 1
USE_XML_AUDIO_POLICY_CONF := 1
# Bluetooth
BOARD_BLUETOOTH_BDROID_BUILDCFG_INCLUDE_DIR := $(DEVICE_PATH)/bluetooth
BOARD_BLUETOOTH_BDROID_BUILDCFG_INCLUDE_DIR := $(COMMON_PATH)/bluetooth
BOARD_HAS_QCA_BT_ROME := true
BOARD_HAVE_BLUETOOTH_QCOM := true
QCOM_BT_USE_BTNV := true
@ -150,12 +146,11 @@ TARGET_ENABLE_MEDIADRM_64 := true
TARGET_HW_DISK_ENCRYPTION := true
# Filesystem
TARGET_FS_CONFIG_GEN := $(DEVICE_PATH)/config.fs
TARGET_FS_CONFIG_GEN := $(COMMON_PATH)/config.fs
# HIDL
DEVICE_FRAMEWORK_MANIFEST_FILE := $(DEVICE_PATH)/framework_manifest.xml
DEVICE_MANIFEST_FILE := $(DEVICE_PATH)/manifest.xml
DEVICE_MATRIX_FILE := $(DEVICE_PATH)/compatibility_matrix.xml
DEVICE_MANIFEST_FILE := $(COMMON_PATH)/manifest.xml
DEVICE_MATRIX_FILE := $(COMMON_PATH)/compatibility_matrix.xml
# Partitions
BOARD_BOOTIMAGE_PARTITION_SIZE := 79691776
@ -191,30 +186,32 @@ TARGET_PROVIDES_KEYMASTER := true
TARGET_USES_INTERACTION_BOOST := true
# Properties
TARGET_SYSTEM_PROP += $(DEVICE_PATH)/system.prop
TARGET_SYSTEM_PROP += $(COMMON_PATH)/system.prop
# QCOM
BOARD_USES_QCOM_HARDWARE := true
# Recovery
TARGET_RECOVERY_FSTAB := $(DEVICE_PATH)/rootdir/etc/fstab.qcom
TARGET_RECOVERY_FSTAB := $(COMMON_PATH)/rootdir/etc/fstab.qcom
TARGET_RECOVERY_PIXEL_FORMAT := "BGRA_8888"
TARGET_USERIMAGES_USE_EXT4 := true
TARGET_USERIMAGES_USE_F2FS := true
# RIL
BOARD_PROVIDES_LIBRIL := true
ENABLE_VENDOR_RIL_SERVICE := true
# Security patch level - T825N0KOU3CTD1
# Security patch level
VENDOR_SECURITY_PATCH := 2020-03-01
# SELinux
include device/qcom/sepolicy-legacy-um/SEPolicy.mk
BOARD_SEPOLICY_DIRS += $(DEVICE_PATH)/sepolicy
BOARD_SEPOLICY_DIRS += $(COMMON_PATH)/sepolicy
SELINUX_IGNORE_NEVERALLOWS := true
# Shims
TARGET_LD_SHIM_LIBS := \
/vendor/lib/libbauthserver.so|libbauthtzcommon_shim.so \
/vendor/lib64/libbauthserver.so|libbauthtzcommon_shim.so
# Wifi
BOARD_HAVE_SAMSUNG_WIFI := true
BOARD_HAS_QCOM_WLAN := true
BOARD_HAS_QCOM_WLAN_SDK := true
BOARD_WLAN_DEVICE := qcwcn
@ -228,13 +225,3 @@ WIFI_DRIVER_FW_PATH_STA := "sta"
WIFI_DRIVER_FW_PATH_P2P := "p2p"
WIFI_HIDL_FEATURE_DISABLE_AP_MAC_RANDOMIZATION := true
WPA_SUPPLICANT_VERSION := VER_0_8_X
BOARD_HAVE_SAMSUNG_WIFI := true
# Shims
TARGET_LD_SHIM_LIBS := \
/vendor/lib/libbauthserver.so|libbauthtzcommon_shim.so \
/vendor/lib64/libbauthserver.so|libbauthtzcommon_shim.so
# inherit from the proprietary version
-include vendor/samsung/gts3llte/BoardConfigVendor.mk

View file

@ -1,8 +1,4 @@
# Device Tree for Samsung Galaxy Tab S3 LTE (gts3llte)
> - Currently working in progress.
> - Some commits are meaningless, I'm digging in.
> - Will be separated to use common device tree.
# Common Device Tree for Samsung Galaxy Tab S3
## Copyright
@ -12,47 +8,6 @@ Copyright (C) 2018-2020 Valera Chigir <valera1978@tut.by>
Copyright (C) 2021 Deokgyu Yang <secugyu@gmail.com>
```
## Disclaimer
```xxx
/*
* Your warranty will be VOID after installing a custom ROM.
*
* Get notified yourself that I am not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed.
* Please do some research if you have any concerns about features included in this ROM
* before flashing it!
* YOU are choosing to make these modifications,
* and if you point the finger at me for messing up your device,
* I will laugh at you.
*/
```
## Local manifest
```xml
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<project name="awesometic/android_device_samsung_gts3llte"
path="device/samsung/gts3llte"
revision="lineage-18.1"
remote="github" />
<project name="awesometic/android_kernel_samsung_msm8996"
path="kernel/samsung/msm8996"
revision="lineage-18.1"
remote="github" />
<project name="LineageOS/android_device_samsung_qcom-common"
path="device/samsung/qcom-common"
revision="lineage-18.1"
remote="github" />
<project name="LineageOS/android_hardware_samsung"
path="hardware/samsung"
revision="lineage-18.1"
remote="github" />
</manifest>
```
## License
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License.

View file

@ -8,9 +8,6 @@
set -e
DEVICE=gts3llte
VENDOR=samsung
# Load extract_utils and do some sanity checks
MY_DIR="${BASH_SOURCE%/*}"
if [[ ! -d "${MY_DIR}" ]]; then MY_DIR="${PWD}"; fi
@ -27,11 +24,19 @@ source "${HELPER}"
# Default to sanitizing the vendor folder before extraction
CLEAN_VENDOR=true
ONLY_COMMON=
ONLY_TARGET=
KANG=
SECTION=
while [ "${#}" -gt 0 ]; do
case "${1}" in
--only-common )
ONLY_COMMON=true
;;
--only-target )
ONLY_TARGET=true
;;
-n | --no-cleanup )
CLEAN_VENDOR=false
;;
@ -64,9 +69,19 @@ function blob_fixup() {
esac
}
# Initialize the helper
setup_vendor "${DEVICE}" "${VENDOR}" "${ANDROID_ROOT}" false "${CLEAN_VENDOR}"
if [ -z "${ONLY_TARGET}" ]; then
# Initialize the helper for common device
setup_vendor "${DEVICE_COMMON}" "${VENDOR}" "${ANDROID_ROOT}" true "${CLEAN_VENDOR}"
extract "${MY_DIR}/proprietary-files.txt" "${SRC}" "${KANG}" --section "${SECTION}"
fi
if [ -z "${ONLY_COMMON}" ] && [ -s "${MY_DIR}/../${DEVICE}/proprietary-files.txt" ]; then
# Reinitialize the helper for device
source "${MY_DIR}/../${DEVICE}/extract-files.sh"
setup_vendor "${DEVICE}" "${VENDOR}" "${ANDROID_ROOT}" false "${CLEAN_VENDOR}"
extract "${MY_DIR}/../${DEVICE}/proprietary-files.txt" "${SRC}" "${KANG}" --section "${SECTION}"
fi
"${MY_DIR}/setup-makefiles.sh"

View file

@ -1,39 +0,0 @@
<!-- Copyright (c) 2018, The Linux Foundation. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided
with the distribution.
* Neither the name of The Linux Foundation nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<manifest version="1.0" type="framework">
<!-- atfwd -->
<hal format="hidl">
<name>vendor.qti.hardware.radio.atcmdfwd</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IAtCmdFwd</name>
<instance>AtCmdFwdService</instance>
</interface>
</hal>
</manifest>

View file

@ -18,9 +18,7 @@
$(call inherit-product, $(SRC_TARGET_DIR)/product/product_launched_with_n.mk)
# Get non-open-source specific aspects
$(call inherit-product-if-exists, vendor/samsung/gts3llte/gts3llte-vendor.mk)
LOCAL_PATH := device/samsung/gts3llte
$(call inherit-product-if-exists, vendor/samsung/gts3l-common/gts3l-common-vendor.mk)
# Overlays
DEVICE_PACKAGE_OVERLAYS += \
@ -59,9 +57,6 @@ PRODUCT_COPY_FILES += \
frameworks/native/data/etc/android.hardware.sensor.proximity.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.sensor.proximity.xml \
frameworks/native/data/etc/android.hardware.sensor.stepcounter.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.sensor.stepcounter.xml \
frameworks/native/data/etc/android.hardware.sensor.stepdetector.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.sensor.stepdetector.xml \
frameworks/native/data/etc/android.hardware.telephony.cdma.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.telephony.cdma.xml \
frameworks/native/data/etc/android.hardware.telephony.gsm.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.telephony.gsm.xml \
frameworks/native/data/etc/android.hardware.telephony.ims.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.telephony.ims.xml \
frameworks/native/data/etc/android.hardware.touchscreen.multitouch.jazzhand.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.touchscreen.multitouch.jazzhand.xml \
frameworks/native/data/etc/android.hardware.usb.accessory.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.usb.accessory.xml \
frameworks/native/data/etc/android.hardware.usb.host.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.usb.host.xml \
@ -212,11 +207,6 @@ PRODUCT_PACKAGES += \
libhwbinder \
libhwbinder.vendor
# IPA Manager
PRODUCT_PACKAGES += \
ipacm \
IPACM_cfg.xml
# IPC router config
PRODUCT_COPY_FILES += \
$(LOCAL_PATH)/configs/sec_config:$(TARGET_COPY_OUT_VENDOR)/etc/sec_config
@ -309,10 +299,9 @@ PRODUCT_PACKAGES += \
rcs_service_api \
rcs_service_api.xml
# Ramdisk
# Device init scripts
PRODUCT_PACKAGES += \
fstab.qcom \
init.carrier.rc \
init.class_main.sh \
init.qcom.early_boot.sh \
init.qcom.post_boot.sh \
@ -323,8 +312,6 @@ PRODUCT_PACKAGES += \
init.qcom.usb.rc \
init.qcom.usb.sh \
init.usb.configfs.rc \
init.rilchip.rc \
init.rilcommon.rc \
init.samsung.rc \
init.target.rc \
ueventd.qcom.rc \
@ -339,15 +326,6 @@ PRODUCT_COPY_FILES += \
PRODUCT_PACKAGES += \
android.hardware.renderscript@1.0-impl
# RIL
PRODUCT_PACKAGES += \
android.hardware.radio@1.4 \
android.hardware.radio.config@1.1 \
android.hardware.secure_element@1.0 \
librmnetctl \
libxml2 \
libprotobuf-cpp-full
# Seccomp policy
PRODUCT_COPY_FILES += \
$(LOCAL_PATH)/seccomp/mediacodec.policy:$(TARGET_COPY_OUT_VENDOR)/etc/seccomp_policy/mediacodec.policy \
@ -407,11 +385,6 @@ PRODUCT_COPY_FILES += \
prebuilts/vndk/v28/arm64/arch-arm-armv8-a/shared/vndk-core/libprotobuf-cpp-lite.so:$(TARGET_COPY_OUT_VENDOR)/lib/libprotobuf-cpp-lite-v28.so \
prebuilts/vndk/v28/arm64/arch-arm64-armv8-a/shared/vndk-core/libprotobuf-cpp-full.so:$(TARGET_COPY_OUT_VENDOR)/lib64/libprotobuf-cpp-full-v28.so
# Vibrator
PRODUCT_PACKAGES += \
android.hardware.vibrator@1.0-impl \
android.hardware.vibrator@1.0-service
# WiFi
PRODUCT_PACKAGES += \
android.hardware.wifi@1.0-service \

View file

@ -1,42 +0,0 @@
#
# Copyright (C) 2020-2021 The LineageOS Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Inherit from those products. Most specific first.
$(call inherit-product, $(SRC_TARGET_DIR)/product/core_64_bit.mk)
$(call inherit-product, $(SRC_TARGET_DIR)/product/full_base_telephony.mk)
# Inherit from gts3llte device
$(call inherit-product, device/samsung/gts3llte/device.mk)
# Inherit some common Lineage stuff.
$(call inherit-product, vendor/lineage/config/common_full_phone.mk)
# Device identifier. This must come after all inclusions
PRODUCT_DEVICE := gts3llte
PRODUCT_NAME := lineage_gts3llte
PRODUCT_BRAND := samsung
PRODUCT_MODEL := SM-T825
PRODUCT_MANUFACTURER := samsung
PRODUCT_GMS_CLIENTID_BASE := android-samsung
# Use the latest approved GMS identifiers
PRODUCT_BUILD_PROP_OVERRIDES += \
PRODUCT_NAME=gts3llte \
PRIVATE_BUILD_DESC="gts3lltekx-user 9 PPR1.180610.011 T825N0KOU3CTD1 release-keys"
# Set BUILD_FINGERPRINT variable to be picked up by both system and vendor build.prop
BUILD_FINGERPRINT := "samsung/gts3lltekx/gts3llte:9/PPR1.180610.011/T825N0KOU3CTD1:user/release-keys"

View file

@ -44,15 +44,6 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>android.hardware.broadcastradio</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IBroadcastRadioFactory</name>
<instance>default</instance>
</interface>
</hal>
<hal format="hidl" override="true">
<name>android.hardware.camera.provider</name>
<transport>hwbinder</transport>
@ -184,30 +175,6 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl" override="true">
<name>android.hardware.radio</name>
<transport>hwbinder</transport>
<version>1.2</version>
<interface>
<name>IRadio</name>
<instance>slot1</instance>
</interface>
<interface>
<name>ISap</name>
<instance>slot1</instance>
</interface>
<fqname>@1.2::IRadio/slot1</fqname>
<fqname>@1.2::ISap/slot1</fqname>
</hal>
<hal format="hidl">
<name>android.hardware.radio.config</name>
<transport>hwbinder</transport>
<version>1.1</version>
<interface>
<name>IRadioConfig</name>
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>android.hardware.renderscript</name>
<transport arch="32+64">passthrough</transport>
@ -226,24 +193,6 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>android.hardware.tetheroffload.config</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IOffloadConfig</name>
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>android.hardware.tetheroffload.control</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IOffloadControl</name>
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>android.hardware.thermal</name>
<transport>hwbinder</transport>
@ -253,15 +202,6 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>android.hardware.vibrator</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IVibrator</name>
<instance>default</instance>
</interface>
</hal>
<hal format="hidl">
<name>com.qualcomm.qti.ant</name>
<transport>hwbinder</transport>
@ -284,14 +224,6 @@
<name>com.qualcomm.qti.dpm.api</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>com.qualcomm.qti.imscmservice</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>com.qualcomm.qti.uceservice</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl">
<name>com.qualcomm.qti.wifidisplayhal</name>
<transport>hwbinder</transport>
@ -377,14 +309,6 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.data.connection</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.data.latency</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl">
<name>vendor.qti.hardware.capabilityconfigstore</name>
<transport>hwbinder</transport>
@ -443,38 +367,6 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.am</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.ims</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.lpa</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.qcrilhook</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.qtiradio</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.uim</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.uim_remote_client</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.hardware.radio.uim_remote_server</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl">
<name>vendor.qti.hardware.tui_comm</name>
<transport>hwbinder</transport>
@ -505,14 +397,6 @@
<instance>wifidisplaysessionvideotrack</instance>
</interface>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.ims.callinfo</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl" override="true">
<name>vendor.qti.imsrtpservice</name>
<transport>hwbinder</transport>
</hal>
<hal format="hidl">
<name>vendor.samsung.hardware.bluetooth</name>
<transport>hwbinder</transport>
@ -549,56 +433,4 @@
<instance>miscpower</instance>
</interface>
</hal>
<hal format="hidl">
<name>vendor.samsung.hardware.radio</name>
<transport>hwbinder</transport>
<version>1.2</version>
<interface>
<name>IRadio</name>
<instance>slot1</instance>
</interface>
<fqname>@1.2::IRadio/slot1</fqname>
</hal>
<hal format="hidl">
<name>vendor.samsung.hardware.radio.channel</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>ISecChannel</name>
<instance>epdgd</instance>
<instance>imsd</instance>
</interface>
<fqname>@1.0::ISecChannel/epdgd</fqname>
<fqname>@1.0::ISecChannel/imsd</fqname>
</hal>
<hal format="hidl">
<name>vendor.samsung.hardware.radio.configsvc</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IConfigSvc</name>
<instance>default</instance>
</interface>
<fqname>@1.0::IConfigSvc/default</fqname>
</hal>
<hal format="hidl">
<name>vendor.samsung.hardware.radio.secbridge</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>ISecBridge</name>
<instance>slot1</instance>
</interface>
<fqname>@1.0::ISecBridge/slot1</fqname>
</hal>
<hal format="hidl">
<name>vendor.samsung.hardware.radio.sechook</name>
<transport>hwbinder</transport>
<version>1.0</version>
<interface>
<name>IOemHook</name>
<instance>slot1</instance>
</interface>
<fqname>@1.0::IOemHook/slot1</fqname>
</hal>
</manifest>

View file

@ -1,13 +1,3 @@
# ACDB data
vendor/etc/General_cal.acdb
vendor/etc/Hdmi_cal.acdb
vendor/etc/Headset_cal.acdb
vendor/etc/Bluetooth_cal.acdb
vendor/etc/Speaker_cal.acdb
vendor/etc/Handset_cal.acdb
vendor/etc/Global_cal.acdb
vendor/etc/workspaceFile.qwsp
# ADSP
vendor/bin/adsprpcd
vendor/lib64/libadsp_default_listener.so
@ -1003,38 +993,6 @@ vendor/lib64/libqsocket.so
lib64/libdiag_system.so
lib/libdiag_system.so
# RIL
etc/mtu-conf.xml
lib64/vendor.samsung.hardware.radio.secbridge@1.0.so
lib64/vendor.qti.hardware.radio.atcmdfwd@1.0.so
vendor/bin/hw/rild
vendor/bin/hw/vendor.samsung.hardware.radio.configsvc@1.0-service
vendor/bin/adpl
vendor/bin/ATFWD-daemon
vendor/bin/netmgrd
vendor/etc/data/netmgr_config.xml
vendor/etc/init/vendor.samsung.hardware.radio.configsvc@1.0-service.rc
vendor/etc/plmn_se13.bin
vendor/etc/sec_config_oem
-vendor/lib/libril.so
vendor/lib64/libconfigdb.so
vendor/lib64/liblqe.so
vendor/lib64/libnetmgr.so
vendor/lib64/libnetmgr_common.so
vendor/lib64/libnlnetmgr.so
vendor/lib64/libpdnotifier.so
vendor/lib64/libqrtr.so
-vendor/lib64/libril.so
vendor/lib64/libsec-ril.so
vendor/lib64/libsystem_health_mon.so
vendor/lib64/libvndsecril-client.so
vendor/lib64/libxml.so
vendor/lib64/vendor.samsung.hardware.radio.channel@1.0_vendor.so
vendor/lib64/vendor.samsung.hardware.radio.configsvc@1.0_vendor.so
vendor/lib64/vendor.samsung.hardware.radio.secbridge@1.0_vendor.so
vendor/lib64/vendor.samsung.hardware.radio.sechook@1.0_vendor.so
vendor/lib64/vendor.samsung.hardware.radio@1.2_vendor.so
# SEC
lib/libsecnativefeature.so
lib64/libsecnativefeature.so
@ -1046,13 +1004,11 @@ vendor/lib64/hw/activity_recognition.msm8996.so
vendor/lib64/libsensor1.so
vendor/lib64/libsensor_reg.so
vendor/lib64/sensor_calibrate.so
vendor/lib64/sensors.grip.so
vendor/lib64/sensors.ssc.so
vendor/lib/hw/activity_recognition.msm8996.so
vendor/lib/libsensor1.so
vendor/lib/libsensor_reg.so
vendor/lib/sensor_calibrate.so
vendor/lib/sensors.grip.so
vendor/lib/sensors.ssc.so
lib/libsensorlistener.so

View file

@ -60,14 +60,6 @@ LOCAL_SRC_FILES := etc/fstab.qcom
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)
include $(BUILD_PREBUILT)
include $(CLEAR_VARS)
LOCAL_MODULE := init.carrier.rc
LOCAL_MODULE_TAGS := optional
LOCAL_MODULE_CLASS := ETC
LOCAL_SRC_FILES := etc/init.carrier.rc
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)/init/hw
include $(BUILD_PREBUILT)
include $(CLEAR_VARS)
LOCAL_MODULE := init.usb.configfs.rc
LOCAL_MODULE_TAGS := optional
@ -100,22 +92,6 @@ LOCAL_SRC_FILES := etc/init.qcom.usb.rc
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)/init/hw
include $(BUILD_PREBUILT)
include $(CLEAR_VARS)
LOCAL_MODULE := init.rilchip.rc
LOCAL_MODULE_TAGS := optional
LOCAL_MODULE_CLASS := ETC
LOCAL_SRC_FILES := etc/init.rilchip.rc
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)/init
include $(BUILD_PREBUILT)
include $(CLEAR_VARS)
LOCAL_MODULE := init.rilcommon.rc
LOCAL_MODULE_TAGS := optional
LOCAL_MODULE_CLASS := ETC
LOCAL_SRC_FILES := etc/init.rilcommon.rc
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)/init
include $(BUILD_PREBUILT)
include $(CLEAR_VARS)
LOCAL_MODULE := init.samsung.rc
LOCAL_MODULE_TAGS := optional

View file

@ -1,82 +0,0 @@
# Copyright (C) 2012 The Android Open Source Project
#
# IMPORTANT: Do not create world writable files or directories.
# This is a common source of Android security bugs.
#
on boot
# permission for MUIC(waterproof)
chown system radio /sys/class/sec/switch/uart_en
# permission for touchkey grip
chown system radio /sys/class/sec/sec_touchkey/sar_enable
chown system radio /sys/class/sec/sec_touchkey/sw_reset
# op mode for charger
chmod 0664 /sys/class/power_supply/sm5705-charger/charger_op_mode
chown system radio /sys/class/power_supply/sm5705-charger/charger_op_mode
# Permissions for Charging
chown sdcard_rw sdcard_rw /sys/class/power_supply/battery/store_mode
# bluetooth
chown bluetooth bluetooth /dev/ttyHS0
chmod 0660 /dev/ttyHS0
# Permissions for System LSI NFC
# NFC : Permissions for NFC
chmod 0660 /dev/sec-nfc
# NFC : change owner
chown nfc nfc /dev/sec-nfc
# Permissions for S.LSI ESE
chmod 0660 /dev/p3
chown system system /dev/p3
# Permissions for NXP NFC
# NFC : Permissions for NFC
chmod 0660 /dev/pn547
# NFC : change owner
chown nfc nfc /dev/pn547
# Permissions for NXP ESE
chmod 0660 /dev/p61
chown system system /dev/p61
# Fingerprint
mkdir /dev/validity 0770 system system
# Fingerprint_sensor
chmod 0660 /dev/vfsspi
chmod 0660 /dev/esfp0
chown system system /dev/vfsspi
chown system system /dev/esfp0
chown system radio /sys/class/fingerprint/fingerprint/type_check
chown system radio /sys/class/fingerprint/fingerprint/name
chown system radio /sys/class/fingerprint/fingerprint/vendor
chown system radio /sys/class/fingerprint/fingerprint/adm
on post-fs-data
# permissions for audio
chown system radio /sys/class/rt5508_cal/trigger
chown system radio /sys/class/rt5508_cal/status
chown system radio /sys/class/rt5508_cal/rt5508.0/gsense_otp
chown system radio /sys/class/rt5508_cal/rt5508.0/n20db
chown system radio /sys/class/rt5508_cal/rt5508.0/n15db
chown system radio /sys/class/rt5508_cal/rt5508.0/n10db
chown system radio /sys/class/rt5508_cal/rt5508.0/rspk
chown system radio /sys/class/rt5508_cal/rt5508.0/dcr_offset
mkdir /efs/richtek/rt5508_cal 0771 radio system
# permissions for bluetooth.
setprop ro.bt.bdaddr_path "/efs/bluetooth/bt_addr"
chown bluetooth bluetooth ro.bt.bdaddr_path
chown radio bluetooth /efs/bluetooth/bt_addr
chmod 0640 /efs/bluetooth/bt_addr
chmod 0660 /sys/class/rfkill/rfkill0/state
chmod 0660 /sys/class/rfkill/rfkill0/device/extldo
chown bluetooth bluetooth /sys/class/rfkill/rfkill0/state
chown bluetooth bluetooth /sys/class/rfkill/rfkill0/type
chown bluetooth bluetooth /sys/class/rfkill/rfkill0/device/extldo

View file

@ -1,47 +0,0 @@
# Copyright (C) 2012 The Android Open Source Project
#
# IMPORTANT: Do not create world writable files or directories.
# This is a common source of Android security bugs.
#
service sec_diag_uart_log /system/bin/sec_diag_uart_log
class main
user root
group radio oem_2901 system
service SMD-daemon /system/bin/smdexe
class main
user root
group system radio inet net_raw
service vendor.atfwd /vendor/bin/ATFWD-daemon
class late_start
user system
group system radio
service start_netmgrd /vendor/bin/sh /system/etc/control_netmgrd.sh start
class main
user root
group radio
disabled
oneshot
service stop_netmgrd /vendor/bin/sh /system/etc/control_netmgrd.sh stop
class main
user root
group radio
disabled
oneshot
on property:ril.restart.netmgrd=true
start stop_netmgrd
on property:init.svc.netmgrd=stopped
start start_netmgrd
on property:sys.control.netmgr=started
setprop ril.restart.netmgrd false
setprop sys.control.netmgr done
on property:init.svc.netmgrd=restarting
setprop sys.control.netmgr restarted

View file

@ -1,133 +0,0 @@
# Copyright (C) 2012 The Android Open Source Project
#
# IMPORTANT: Do not create world writable files or directories.
# This is a common source of Android security bugs.
#
# service can not be overwritten except SPRINT
# Thus, rilcarrier is imported before common rc, like init.rilchip.rc
import /init.rilmptcp.rc
import /init.rilmcpsd.rc
# AT Distributor for factory test
service at_distributor /system/bin/at_distributor
class late_start
user root
group radio misc log system
service DR-daemon /system/bin/ddexe
class main
user root
group system radio inet net_raw
service BCS-daemon /system/bin/connfwexe
class main
user root
group system shell radio inet net_raw
# for ethernet
service dhcpcd_eth0 /system/bin/dhcpcd -ABKL
class main
disabled
oneshot
# for SmartSwitch
service dhcpcd_usb0 /system/bin/dhcpcd -ABKL
class main
disabled
oneshot
# for Wi-Fi only models
on property:ro.radio.noril=yes
stop ril-daemon
# for recovering at restarting netd
service recover_radio /vendor/bin/sh /system/etc/restart_radio_process.sh
class main
user root
group radio
disabled
oneshot
on post-fs-data
# For Samsung members
mkdir /data/log/err 0775 radio log
chown radio log /data/log/err
# For KOR Model SKU
chown radio system /efs/imei/replace_code.dat
chmod 0664 /efs/imei/replace_code.dat
on property:init.svc.netd=restarting
start recover_radio
on post-fs-data
mkdir /efs/imei 0775 root radio
restorecon -R /efs/imei
on property:ro.telephony.default_network=*
setprop ro.ril.def_network_after_check_tdscdma ${ro.telephony.default_network}
on property:ro.ril.def_network_after_check_tdscdma=*
setprop ro.telephony.default_network ${ro.ril.def_network_after_check_tdscdma}
on property:ro.boot.sales.param.offset=*
setprop ro.vendor.boot.sales.param.offset ${ro.boot.sales.param.offset}
on property:ro.boot.carrierid.param.offset=*
setprop ro.vendor.boot.carrierid.param.offset ${ro.boot.carrierid.param.offset}
on property:ro.boot.im.param.offset=*
setprop ro.vendor.boot.im.param.offset ${ro.boot.im.param.offset}
on property:ro.boot.me.param.offset=*
setprop ro.vendor.boot.me.param.offset ${ro.boot.me.param.offset}
on property:ro.boot.omcnw.param.offset=*
setprop ro.vendor.boot.omcnw.param.offset ${ro.boot.omcnw.param.offset}
on property:ro.boot.debug_level=*
setprop ro.vendor.boot.debug_level ${ro.boot.debug_level}
on property:ro.boot.sn.param.offset=*
setprop ro.vendor.boot.sn.param.offset ${ro.boot.sn.param.offset}
on property:ro.build.characteristics=*
setprop ro.vendor.build.characteristics ${ro.build.characteristics}
on property:ro.product_ship=*
setprop ro.vendor.product_ship ${ro.product_ship}
on property:ro.boot.warranty_bit=*
setprop ro.vendor.boot.warranty_bit ${ro.boot.warranty_bit}
on property:ro.boot.force_upload=*
setprop ro.vendor.boot.force_upload ${ro.boot.force_upload}
on property:ro.multisim.simslotcount=*
setprop ro.vendor.multisim.simslotcount ${ro.multisim.simslotcount}
on property:ro.ril.cdma.home.operator.alpha=*
setprop ro.cdma.home.operator.alpha ${ro.ril.cdma.home.operator.alpha}
on property:ro.ril.cdma.home.operator.numeric=*
setprop ro.cdma.home.operator.numeric ${ro.ril.cdma.home.operator.numeric}
on property:ro.ril.home.operator.carrierid=*
setprop ro.home.operator.carrierid ${ro.ril.home.operator.carrierid}
on property:ro.ril.home.operator.rrenabled=*
setprop ro.home.operator.rrenabled ${ro.ril.home.operator.rrenabled}
on property:ril.product_code=*
setprop vendor.ril.product_code ${ril.product_code}
on property:gsm.current.vsid=*
setprop vendor.gsm.current.vsid ${gsm.current.vsid}
on property:gsm.current.vsid2=*
setprop vendor.gsm.current.vsid2 ${gsm.current.vsid2}
on property:ro.factory.factory_binary=*
setprop ro.vendor.factory_binary ${ro.factory.factory_binary}

View file

@ -8,9 +8,6 @@
set -e
DEVICE=gts3llte
VENDOR=samsung
# Load extract_utils and do some sanity checks
MY_DIR="${BASH_SOURCE%/*}"
if [[ ! -d "${MY_DIR}" ]]; then MY_DIR="${PWD}"; fi
@ -24,13 +21,28 @@ if [ ! -f "${HELPER}" ]; then
fi
source "${HELPER}"
# Initialize the helper
setup_vendor "${DEVICE}" "${VENDOR}" "${ANDROID_ROOT}"
# Initialize the helper for common
setup_vendor "${DEVICE_COMMON}" "${VENDOR}" "${ANDROID_ROOT}" true
# Warning headers and guards
write_headers
write_headers "gts3llte gts3lwifi"
# The standard common blobs
write_makefiles "${MY_DIR}/proprietary-files.txt" true
# Finish
write_footers
if [ -s "${MY_DIR}/../${DEVICE}/proprietary-files.txt" ]; then
# Reinitialize the helper for device
setup_vendor "${DEVICE}" "${VENDOR}" "${ANDROID_ROOT}" false
# Warning headers and guards
write_headers
# The standard device blobs
write_makefiles "${MY_DIR}/../${DEVICE}/proprietary-files.txt" true
# Finish
write_footers
fi

View file

@ -107,19 +107,6 @@ ro.vendor.qti.sys.fw.bg_apps_limit=60
# Qualcomm System Daemon
persist.vendor.qcomsysd.enabled=1
# Radio
ro.telephony.default_network=9
ro.config.dha_pwhitelist_enable=1
persist.radio.multisim.config=ss
persist.vendor.radio.atfwd.start=true
persist.vendor.radio.apm_sim_not_pwdn=1
persist.vendor.radio.sib16_support=1
persist.vendor.radio.custom_ecc=1
persist.vendor.radio.rat_on=combine
rild.libargs=-d /dev/umts_ipc0
telephony.lteOnCdmaDevice=0
vendor.sec.rild.libpath=/vendor/lib64/libsec-ril.so
# Shutdown
sys.vendor.shutdown.waittime=500

View file

@ -1,58 +0,0 @@
#!/usr/bin/env python
#
# Copyright (C) 2016 The CyanogenMod Project
# Copyright (C) 2017 The LineageOS Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
from hashlib import sha1
device='gts3llte'
vendor='samsung'
lines = [ line for line in open('proprietary-files.txt', 'r') ]
vendorPath = '../../../vendor/' + vendor + '/' + device + '/proprietary'
needSHA1 = False
for index, line in enumerate(lines):
# Remove '\n' character
line = line[:-1]
# Skip empty lines
if len(line) == 0:
continue
# Check if we need to set SHA1 hash for the next files
if line[0] == '#':
needSHA1 = (' - from' in line)
continue
if needSHA1:
# Remove existing SHA1 hash
line = line.split('|')[0]
filePath = line.split(':')[1] if len(line.split(':')) == 2 else line
if filePath[0] == '-':
file = open('%s/%s' % (vendorPath, filePath[1:]), 'rb').read()
else:
file = open('%s/%s' % (vendorPath, filePath), 'rb').read()
hash = sha1(file).hexdigest()
lines[index] = '%s|%s\n' % (line, hash)
with open('proprietary-files.txt', 'w') as file:
for line in lines:
file.write(line)
file.close()