diff options
author | Dario Freni <dariofreni@google.com> | 2018-05-25 16:07:19 +0100 |
---|---|---|
committer | Dario Freni <dariofreni@google.com> | 2018-07-23 16:14:36 +0100 |
commit | 4fa866a4673877578f2aa9ab35353217eb2e39f4 (patch) | |
tree | bfb010e3e7a37d5d4f67c55957f4595748cfebca /rootdir | |
parent | 9ad886c3cb1f738b644ac95c7b0d4fba8ce6de80 (diff) | |
download | system_core-4fa866a4673877578f2aa9ab35353217eb2e39f4.tar.gz system_core-4fa866a4673877578f2aa9ab35353217eb2e39f4.tar.bz2 system_core-4fa866a4673877578f2aa9ab35353217eb2e39f4.zip |
Add support for /product-services partition.
This CL is largely and adaptation of
Ie996def20e25dc1afe0c74af2096af844934b2dc
Bug: 80741439
Test: Successfully built product-services.img with one module in it, and
flashed on device. Also successfully built image with
/system/product-services and no dedicated /product-services partition.
Change-Id: I1046dfe19bf874da929c9131b76a1f85422fbb80
Diffstat (limited to 'rootdir')
-rw-r--r-- | rootdir/Android.mk | 6 | ||||
-rw-r--r-- | rootdir/etc/ld.config.txt | 14 |
2 files changed, 20 insertions, 0 deletions
diff --git a/rootdir/Android.mk b/rootdir/Android.mk index fd9b3ec57..316875d19 100644 --- a/rootdir/Android.mk +++ b/rootdir/Android.mk @@ -93,6 +93,11 @@ ifdef BOARD_USES_PRODUCTIMAGE else LOCAL_POST_INSTALL_CMD += ; ln -sf /system/product $(TARGET_ROOT_OUT)/product endif +ifdef BOARD_USES_PRODUCT_SERVICES_IMAGE + LOCAL_POST_INSTALL_CMD += ; mkdir -p $(TARGET_ROOT_OUT)/product-services +else + LOCAL_POST_INSTALL_CMD += ; ln -sf /system/product-services $(TARGET_ROOT_OUT)/product-services +endif ifdef BOARD_USES_METADATA_PARTITION LOCAL_POST_INSTALL_CMD += ; mkdir -p $(TARGET_ROOT_OUT)/metadata endif @@ -205,6 +210,7 @@ $(2): $(1) $$(hide) sed -i -e 's?%SANITIZER_RUNTIME_LIBRARIES%?$$(PRIVATE_SANITIZER_RUNTIME_LIBRARIES)?g' $$@ $$(hide) sed -i -e 's?%VNDK_VER%?$$(PRIVATE_VNDK_VERSION)?g' $$@ $$(hide) sed -i -e 's?%PRODUCT%?$$(TARGET_COPY_OUT_PRODUCT)?g' $$@ + $$(hide) sed -i -e 's?%PRODUCTSERVICES%?$$(TARGET_COPY_OUT_PRODUCTSERVICES)?g' $$@ llndk_libraries_list := vndksp_libraries_list := diff --git a/rootdir/etc/ld.config.txt b/rootdir/etc/ld.config.txt index 42dc7abe7..7d22a3acc 100644 --- a/rootdir/etc/ld.config.txt +++ b/rootdir/etc/ld.config.txt @@ -8,6 +8,7 @@ dir.system = /system/bin/ dir.system = /system/xbin/ dir.system = /%PRODUCT%/bin/ +dir.system = /%PRODUCTSERVICES%/bin/ dir.vendor = /odm/bin/ dir.vendor = /vendor/bin/ @@ -40,6 +41,7 @@ namespace.default.isolated = true namespace.default.search.paths = /system/${LIB} namespace.default.search.paths += /%PRODUCT%/${LIB} +namespace.default.search.paths += /%PRODUCTSERVICES%/${LIB} # We can't have entire /system/${LIB} as permitted paths because doing so # makes it possible to load libs in /system/${LIB}/vndk* directories by @@ -52,6 +54,7 @@ namespace.default.permitted.paths = /system/${LIB}/drm namespace.default.permitted.paths += /system/${LIB}/extractors namespace.default.permitted.paths += /system/${LIB}/hw namespace.default.permitted.paths += /%PRODUCT%/${LIB} +namespace.default.permitted.paths += /%PRODUCTSERVICES%/${LIB} # These are where odex files are located. libart has to be able to dlopen the files namespace.default.permitted.paths += /system/framework namespace.default.permitted.paths += /system/app @@ -66,6 +69,9 @@ namespace.default.permitted.paths += /oem/app namespace.default.permitted.paths += /%PRODUCT%/framework namespace.default.permitted.paths += /%PRODUCT%/app namespace.default.permitted.paths += /%PRODUCT%/priv-app +namespace.default.permitted.paths += /%PRODUCTSERVICES%/framework +namespace.default.permitted.paths += /%PRODUCTSERVICES%/app +namespace.default.permitted.paths += /%PRODUCTSERVICES%/priv-app namespace.default.permitted.paths += /data namespace.default.permitted.paths += /mnt/expand @@ -73,6 +79,8 @@ namespace.default.asan.search.paths = /data/asan/system/${LIB} namespace.default.asan.search.paths += /system/${LIB} namespace.default.asan.search.paths += /data/asan/product/${LIB} namespace.default.asan.search.paths += /product/${LIB} +namespace.default.asan.search.paths += /data/asan/product-services/${LIB} +namespace.default.asan.search.paths += /product-services/${LIB} namespace.default.asan.permitted.paths = /data namespace.default.asan.permitted.paths += /system/${LIB}/drm @@ -92,6 +100,10 @@ namespace.default.asan.permitted.paths += /%PRODUCT%/${LIB} namespace.default.asan.permitted.paths += /%PRODUCT%/framework namespace.default.asan.permitted.paths += /%PRODUCT%/app namespace.default.asan.permitted.paths += /%PRODUCT%/priv-app +namespace.default.asan.permitted.paths += /%PRODUCTSERVICES%/${LIB} +namespace.default.asan.permitted.paths += /%PRODUCTSERVICES%/framework +namespace.default.asan.permitted.paths += /%PRODUCTSERVICES%/app +namespace.default.asan.permitted.paths += /%PRODUCTSERVICES%/priv-app namespace.default.asan.permitted.paths += /mnt/expand ############################################################################### @@ -328,6 +340,7 @@ namespace.system.isolated = false namespace.system.search.paths = /system/${LIB} namespace.system.search.paths += /%PRODUCT%/${LIB} +namespace.system.search.paths += /%PRODUCTSERVICES%/${LIB} namespace.system.asan.search.paths = /data/asan/system/${LIB} namespace.system.asan.search.paths += /system/${LIB} @@ -346,3 +359,4 @@ namespace.system.asan.search.paths += /product/${LIB} namespace.default.isolated = false namespace.default.search.paths = /system/${LIB} namespace.default.search.paths += /%PRODUCT%/${LIB} +namespace.default.search.paths += /%PRODUCTSERVICES%/${LIB} |