#!/usr/bin/env -S PYTHONPATH=../../../tools/extract-utils python3 # # SPDX-FileCopyrightText: 2025 The LineageOS Project # SPDX-License-Identifier: Apache-2.0 # from extract_utils.file import File from extract_utils.fixups_blob import ( blob_fixup, blob_fixups_user_type, ) from extract_utils.fixups_lib import ( lib_fixup_remove, lib_fixups, lib_fixups_user_type, ) from extract_utils.main import ( ExtractUtils, ExtractUtilsModule, ) namespace_imports = [ 'device/samsung/sm8650-common', 'hardware/qcom-caf/sm8650', 'hardware/qcom-caf/wlan', 'hardware/samsung', 'vendor/qcom/opensource/commonsys/display', 'vendor/qcom/opensource/commonsys-intf/display', 'vendor/qcom/opensource/dataservices', ] def lib_fixup_vendor_suffix(lib: str, partition: str, *args, **kwargs): return f'{lib}_{partition}' if partition == 'vendor' else None lib_fixups: lib_fixups_user_type = { **lib_fixups, ( 'vendor.qti.diaghal@1.0', ): lib_fixup_vendor_suffix, ( 'libar-pal', 'liblx-osal', ): lib_fixup_remove, } blob_fixups: blob_fixups_user_type = { 'vendor/etc/init/android.hardware.security.keymint-service-qti.rc': blob_fixup() .regex_replace('android.hardware.security.keymint-service', 'android.hardware.security.keymint-service-qti'), 'vendor/lib64/libsec-ril.so': blob_fixup() .binary_regex_replace(b'ril.dds.call.ongoing', b'vendor.calls.slot_id') # mov x3, x21 -> mov x3, #0 .sig_replace('16 aa 82 0c 80 52 e3 03 15 aa 24 00 80 52 08', '16 aa 82 0c 80 52 03 00 80 d2 24 00 80 52 08'), 'vendor/lib64/libskeymint_cli.so': blob_fixup() .replace_needed('libcrypto.so', 'libcrypto-v33.so'), ('vendor/bin/hw/android.hardware.security.keymint-service-spu-qti', 'vendor/lib64/libspukeymint.so'): blob_fixup() .replace_needed('android.hardware.security.sharedsecret-V2-ndk.so', 'android.hardware.security.sharedsecret-V1-ndk.so'), } module = ExtractUtilsModule( 'sm8650-common', 'samsung', blob_fixups=blob_fixups, lib_fixups=lib_fixups, namespace_imports=namespace_imports, ) if __name__ == '__main__': utils = ExtractUtils.device(module) utils.run()