Loading BoardConfig.mk +1 −1 Original line number Diff line number Diff line Loading @@ -160,7 +160,7 @@ TARGET_USERIMAGES_USE_F2FS := true ENABLE_VENDOR_RIL_SERVICE := true # Security patch level VENDOR_SECURITY_PATCH := 2023-08-05 VENDOR_SECURITY_PATCH := 2023-11-05 # SEPolicy include device/qcom/sepolicy_vndr-legacy-um/SEPolicy.mk Loading extract-files.sh +3 −0 Original line number Diff line number Diff line Loading @@ -58,6 +58,9 @@ function blob_fixup() { system_ext/lib64/libwfdnative.so) sed -i "s/android.hidl.base@1.0.so/libhidlbase.so\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/" "${2}" ;; vendor/etc/libnfc-hal-st.conf) sed -i 's|STNFC_HAL_LOGLEVEL=.*|STNFC_HAL_LOGLEVEL=0x12|g' "${2}" ;; vendor/lib64/vendor.qti.hardware.camera.postproc@1.0-service-impl.bitra.so) "${SIGSCAN}" -p "13 0a 00 94" -P "1F 20 03 D5" -f "${2}" ;; Loading lineage_FP4.mk +2 −2 Original line number Diff line number Diff line Loading @@ -27,10 +27,10 @@ PRODUCT_MANUFACTURER := Fairphone PRODUCT_SYSTEM_NAME := FP4eea BUILD_FINGERPRINT := "Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP1V:user/release-keys" BUILD_FINGERPRINT := "Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP20:user/release-keys" PRODUCT_BUILD_PROP_OVERRIDES += \ TARGET_PRODUCT=FP4eea \ PRIVATE_BUILD_DESC="qssi-user 13 TKQ1.230127.002 TP1V release-keys" PRIVATE_BUILD_DESC="qssi-user 13 TKQ1.230127.002 TP20 release-keys" PRODUCT_GMS_CLIENTID_BASE := android-alcatel proprietary-files.txt +1 −1 Original line number Diff line number Diff line # Unpinned blobs from Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP1V:user/release-keys # Unpinned blobs from Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP20:user/release-keys # ACDB vendor/etc/acdbdata/MTP/lito-lagoon-fp4-snd-card/Bluetooth_cal.acdb:vendor/etc/acdbdata/MTP/lito-lagoonmtp-snd-card/Bluetooth_cal.acdb Loading Loading
BoardConfig.mk +1 −1 Original line number Diff line number Diff line Loading @@ -160,7 +160,7 @@ TARGET_USERIMAGES_USE_F2FS := true ENABLE_VENDOR_RIL_SERVICE := true # Security patch level VENDOR_SECURITY_PATCH := 2023-08-05 VENDOR_SECURITY_PATCH := 2023-11-05 # SEPolicy include device/qcom/sepolicy_vndr-legacy-um/SEPolicy.mk Loading
extract-files.sh +3 −0 Original line number Diff line number Diff line Loading @@ -58,6 +58,9 @@ function blob_fixup() { system_ext/lib64/libwfdnative.so) sed -i "s/android.hidl.base@1.0.so/libhidlbase.so\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/" "${2}" ;; vendor/etc/libnfc-hal-st.conf) sed -i 's|STNFC_HAL_LOGLEVEL=.*|STNFC_HAL_LOGLEVEL=0x12|g' "${2}" ;; vendor/lib64/vendor.qti.hardware.camera.postproc@1.0-service-impl.bitra.so) "${SIGSCAN}" -p "13 0a 00 94" -P "1F 20 03 D5" -f "${2}" ;; Loading
lineage_FP4.mk +2 −2 Original line number Diff line number Diff line Loading @@ -27,10 +27,10 @@ PRODUCT_MANUFACTURER := Fairphone PRODUCT_SYSTEM_NAME := FP4eea BUILD_FINGERPRINT := "Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP1V:user/release-keys" BUILD_FINGERPRINT := "Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP20:user/release-keys" PRODUCT_BUILD_PROP_OVERRIDES += \ TARGET_PRODUCT=FP4eea \ PRIVATE_BUILD_DESC="qssi-user 13 TKQ1.230127.002 TP1V release-keys" PRIVATE_BUILD_DESC="qssi-user 13 TKQ1.230127.002 TP20 release-keys" PRODUCT_GMS_CLIENTID_BASE := android-alcatel
proprietary-files.txt +1 −1 Original line number Diff line number Diff line # Unpinned blobs from Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP1V:user/release-keys # Unpinned blobs from Fairphone/FP4eea/FP4:13/TKQ1.230127.002/TP20:user/release-keys # ACDB vendor/etc/acdbdata/MTP/lito-lagoon-fp4-snd-card/Bluetooth_cal.acdb:vendor/etc/acdbdata/MTP/lito-lagoonmtp-snd-card/Bluetooth_cal.acdb Loading