2009-03-04 04:28:42 +01:00
|
|
|
# Variables we check:
|
|
|
|
# HOST_BUILD_TYPE = { release debug }
|
|
|
|
# TARGET_BUILD_TYPE = { release debug }
|
|
|
|
# and we output a bunch of variables, see the case statement at
|
|
|
|
# the bottom for the full list
|
|
|
|
# OUT_DIR is also set to "out" if it's not already set.
|
|
|
|
# this allows you to set it to somewhere else if you like
|
2015-06-09 19:35:45 +02:00
|
|
|
# SCAN_EXCLUDE_DIRS is an optional, whitespace separated list of
|
|
|
|
# directories that will also be excluded from full checkout tree
|
|
|
|
# searches for source or make files, in addition to OUT_DIR.
|
|
|
|
# This can be useful if you set OUT_DIR to be a different directory
|
|
|
|
# than other outputs of your build system.
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2017-03-28 22:07:56 +02:00
|
|
|
# Returns all words in $1 up to and including $2
|
|
|
|
define find_and_earlier
|
|
|
|
$(strip $(if $(1),
|
|
|
|
$(firstword $(1))
|
|
|
|
$(if $(filter $(firstword $(1)),$(2)),,
|
|
|
|
$(call find_and_earlier,$(wordlist 2,$(words $(1)),$(1)),$(2)))))
|
|
|
|
endef
|
|
|
|
|
|
|
|
#$(warning $(call find_and_earlier,A B C,A))
|
|
|
|
#$(warning $(call find_and_earlier,A B C,B))
|
|
|
|
#$(warning $(call find_and_earlier,A B C,C))
|
|
|
|
#$(warning $(call find_and_earlier,A B C,D))
|
|
|
|
|
2023-06-07 01:55:58 +02:00
|
|
|
# Runs a starlark file, and sets all the variables in its top-level
|
2023-05-09 23:56:36 +02:00
|
|
|
# variables_to_export_to_make variable as make variables.
|
|
|
|
#
|
|
|
|
# In order to avoid running starlark every time the stamp file is checked, we use
|
|
|
|
# $(KATI_shell_no_rerun). Then, to make sure that we actually do rerun kati when
|
|
|
|
# modifying the starlark files, we add the starlark files to the kati stamp file with
|
2023-05-19 18:13:36 +02:00
|
|
|
# $(KATI_extra_file_deps).
|
2023-06-07 01:55:58 +02:00
|
|
|
#
|
|
|
|
# Arguments:
|
|
|
|
# $(1): A single starlark file to use as the entrypoint
|
|
|
|
# $(2): An optional list of starlark files to NOT include as kati dependencies.
|
|
|
|
# $(3): An optional list of extra flags to pass to rbcrun
|
2023-05-09 23:56:36 +02:00
|
|
|
define run-starlark
|
|
|
|
$(eval _starlark_results := $(OUT_DIR)/starlark_results/$(subst /,_,$(1)).mk)
|
2023-06-07 01:55:58 +02:00
|
|
|
$(KATI_shell_no_rerun mkdir -p $(OUT_DIR)/starlark_results && $(OUT_DIR)/rbcrun --mode=make $(3) $(1) >$(_starlark_results) && touch -t 200001010000 $(_starlark_results))
|
2023-05-09 23:56:36 +02:00
|
|
|
$(if $(filter-out 0,$(.SHELLSTATUS)),$(error Starlark failed to run))
|
|
|
|
$(eval include $(_starlark_results))
|
2023-06-07 01:55:58 +02:00
|
|
|
$(KATI_extra_file_deps $(filter-out $(2),$(LOADED_STARLARK_FILES)))
|
2023-05-09 23:56:36 +02:00
|
|
|
$(eval LOADED_STARLARK_FILES :=)
|
|
|
|
$(eval _starlark_results :=)
|
2017-03-28 22:07:56 +02:00
|
|
|
endef
|
|
|
|
|
2023-05-06 21:29:01 +02:00
|
|
|
# ---------------------------------------------------------------
|
|
|
|
# Release config
|
|
|
|
include $(BUILD_SYSTEM)/release_config.mk
|
|
|
|
|
|
|
|
# ---------------------------------------------------------------
|
2023-10-19 06:54:15 +02:00
|
|
|
# Set up version information
|
|
|
|
include $(BUILD_SYSTEM)/version_util.mk
|
2017-03-28 22:07:56 +02:00
|
|
|
|
2023-10-19 06:54:15 +02:00
|
|
|
# This used to be calculated, but is now fixed and not expected
|
|
|
|
# to change over time anymore. New code attempting to use a
|
|
|
|
# variable like IS_AT_LAST_* should instead use a
|
|
|
|
# build system flag.
|
2017-03-28 22:07:56 +02:00
|
|
|
|
2023-10-19 06:54:15 +02:00
|
|
|
ENABLED_VERSIONS := "OPR1 OPD1 OPD2 OPM1 OPM2 PPR1 PPD1 PPD2 PPM1 PPM2 QPR1 QP1A QP1B QP2A QP2B QD1A QD1B QD2A QD2B QQ1A QQ1B QQ2A QQ2B QQ3A QQ3B RP1A RP1B RP2A RP2B RD1A RD1B RD2A RD2B RQ1A RQ1B RQ2A RQ2B RQ3A RQ3B SP1A SP1B SP2A SP2B SD1A SD1B SD2A SD2B SQ1A SQ1B SQ2A SQ2B SQ3A SQ3B TP1A TP1B TP2A TP2B TD1A TD1B TD2A TD2B TQ1A TQ1B TQ2A TQ2B TQ3A TQ3B UP1A UP1B UP2A UP2B UD1A UD1B UD2A UD2B UQ1A UQ1B UQ2A UQ2B UQ3A UQ3B"
|
2017-03-28 22:07:56 +02:00
|
|
|
|
|
|
|
$(foreach v,$(ENABLED_VERSIONS), \
|
|
|
|
$(eval IS_AT_LEAST_$(v) := true))
|
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
# ---------------------------------------------------------------
|
|
|
|
# If you update the build system such that the environment setup
|
|
|
|
# or buildspec.mk need to be updated, increment this number, and
|
|
|
|
# people who haven't re-run those will have to do so before they
|
|
|
|
# can build. Make sure to also update the corresponding value in
|
|
|
|
# buildspec.mk.default and envsetup.sh.
|
2017-03-22 01:41:03 +01:00
|
|
|
CORRECT_BUILD_ENV_SEQUENCE_NUMBER := 13
|
2009-03-04 04:28:42 +01:00
|
|
|
|
|
|
|
# ---------------------------------------------------------------
|
2011-07-12 07:11:46 +02:00
|
|
|
# The product defaults to generic on hardware
|
2009-03-04 04:28:42 +01:00
|
|
|
ifeq ($(TARGET_PRODUCT),)
|
2024-05-31 20:07:34 +02:00
|
|
|
TARGET_PRODUCT := aosp_arm64
|
2009-03-04 04:28:42 +01:00
|
|
|
endif
|
|
|
|
|
|
|
|
|
|
|
|
# the variant -- the set of files that are included for a build
|
|
|
|
ifeq ($(strip $(TARGET_BUILD_VARIANT)),)
|
|
|
|
TARGET_BUILD_VARIANT := eng
|
|
|
|
endif
|
|
|
|
|
2019-07-29 23:22:05 +02:00
|
|
|
TARGET_BUILD_APPS ?=
|
2020-07-08 11:10:38 +02:00
|
|
|
TARGET_BUILD_UNBUNDLED_IMAGE ?=
|
2019-07-29 23:22:05 +02:00
|
|
|
|
2020-06-04 16:16:39 +02:00
|
|
|
# Set to true for an unbundled build, i.e. a build without
|
|
|
|
# support for platform targets like the system image. This also
|
|
|
|
# disables consistency checks that only apply to full platform
|
|
|
|
# builds.
|
|
|
|
TARGET_BUILD_UNBUNDLED ?=
|
|
|
|
|
|
|
|
# TARGET_BUILD_APPS implies unbundled build, otherwise we default
|
|
|
|
# to bundled (i.e. platform targets such as the system image are
|
|
|
|
# included).
|
|
|
|
ifneq ($(TARGET_BUILD_APPS),)
|
|
|
|
TARGET_BUILD_UNBUNDLED := true
|
|
|
|
endif
|
|
|
|
|
2020-07-08 11:10:38 +02:00
|
|
|
# TARGET_BUILD_UNBUNDLED_IMAGE also implies unbundled build.
|
|
|
|
# (i.e. it targets to only unbundled image, such as the vendor image,
|
|
|
|
# ,or the product image).
|
|
|
|
ifneq ($(TARGET_BUILD_UNBUNDLED_IMAGE),)
|
|
|
|
TARGET_BUILD_UNBUNDLED := true
|
|
|
|
endif
|
|
|
|
|
2019-07-29 23:22:05 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_PRODUCT \
|
|
|
|
TARGET_BUILD_VARIANT \
|
2020-06-04 16:16:39 +02:00
|
|
|
TARGET_BUILD_APPS \
|
|
|
|
TARGET_BUILD_UNBUNDLED \
|
2020-07-08 11:10:38 +02:00
|
|
|
TARGET_BUILD_UNBUNDLED_IMAGE \
|
2019-07-29 23:22:05 +02:00
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
# ---------------------------------------------------------------
|
|
|
|
# Set up configuration for host machine. We don't do cross-
|
2020-03-07 01:46:59 +01:00
|
|
|
# compiles except for arm, so the HOST is whatever we are
|
2009-03-04 04:28:42 +01:00
|
|
|
# running on
|
|
|
|
|
|
|
|
# HOST_OS
|
|
|
|
ifneq (,$(findstring Linux,$(UNAME)))
|
2014-04-17 19:03:35 +02:00
|
|
|
HOST_OS := linux
|
2009-03-04 04:28:42 +01:00
|
|
|
endif
|
|
|
|
ifneq (,$(findstring Darwin,$(UNAME)))
|
2014-04-17 19:03:35 +02:00
|
|
|
HOST_OS := darwin
|
2009-03-04 04:28:42 +01:00
|
|
|
endif
|
2010-04-17 02:50:09 +02:00
|
|
|
|
2022-11-02 23:26:31 +01:00
|
|
|
ifeq ($(CALLED_FROM_SETUP),true)
|
|
|
|
HOST_OS_EXTRA := $(shell uname -rsm)
|
|
|
|
ifeq ($(HOST_OS),linux)
|
|
|
|
ifneq ($(wildcard /etc/os-release),)
|
|
|
|
HOST_OS_EXTRA += $(shell source /etc/os-release; echo $$PRETTY_NAME)
|
|
|
|
endif
|
|
|
|
else ifeq ($(HOST_OS),darwin)
|
|
|
|
HOST_OS_EXTRA += $(shell sw_vers -productVersion)
|
2017-07-25 09:57:38 +02:00
|
|
|
endif
|
2022-11-02 23:26:31 +01:00
|
|
|
HOST_OS_EXTRA := $(subst $(space),-,$(HOST_OS_EXTRA))
|
2017-07-25 09:57:38 +02:00
|
|
|
endif
|
2016-03-04 05:57:21 +01:00
|
|
|
|
2010-04-17 02:50:09 +02:00
|
|
|
# BUILD_OS is the real host doing the build.
|
|
|
|
BUILD_OS := $(HOST_OS)
|
|
|
|
|
2020-07-13 06:53:52 +02:00
|
|
|
# We can do the cross-build only on Linux
|
2010-04-17 02:50:09 +02:00
|
|
|
ifeq ($(HOST_OS),linux)
|
2020-07-13 06:53:52 +02:00
|
|
|
# Windows has been the default host_cross OS
|
|
|
|
ifeq (,$(filter-out windows,$(HOST_CROSS_OS)))
|
|
|
|
# We can only create static host binaries for Linux, so if static host
|
|
|
|
# binaries are requested, turn off Windows cross-builds.
|
|
|
|
ifeq ($(BUILD_HOST_static),)
|
|
|
|
HOST_CROSS_OS := windows
|
|
|
|
HOST_CROSS_ARCH := x86
|
|
|
|
HOST_CROSS_2ND_ARCH := x86_64
|
|
|
|
2ND_HOST_CROSS_IS_64_BIT := true
|
|
|
|
endif
|
|
|
|
else ifeq ($(HOST_CROSS_OS),linux_bionic)
|
|
|
|
ifeq (,$(HOST_CROSS_ARCH))
|
|
|
|
$(error HOST_CROSS_ARCH missing.)
|
|
|
|
endif
|
|
|
|
else
|
|
|
|
$(error Unsupported HOST_CROSS_OS $(HOST_CROSS_OS))
|
|
|
|
endif
|
2021-10-19 09:30:37 +02:00
|
|
|
else ifeq ($(HOST_OS),darwin)
|
|
|
|
HOST_CROSS_OS := darwin
|
|
|
|
HOST_CROSS_ARCH := arm64
|
|
|
|
HOST_CROSS_2ND_ARCH :=
|
2017-11-06 20:03:28 +01:00
|
|
|
endif
|
2009-03-04 04:28:42 +01:00
|
|
|
|
|
|
|
ifeq ($(HOST_OS),)
|
|
|
|
$(error Unable to determine HOST_OS from uname -sm: $(UNAME)!)
|
|
|
|
endif
|
|
|
|
|
|
|
|
# HOST_ARCH
|
2014-04-17 19:03:35 +02:00
|
|
|
ifneq (,$(findstring x86_64,$(UNAME)))
|
2014-06-09 21:31:12 +02:00
|
|
|
HOST_ARCH := x86_64
|
|
|
|
HOST_2ND_ARCH := x86
|
2014-07-09 02:07:36 +02:00
|
|
|
HOST_IS_64_BIT := true
|
2015-03-20 19:39:00 +01:00
|
|
|
else
|
2016-06-29 21:26:53 +02:00
|
|
|
ifneq (,$(findstring i686,$(UNAME))$(findstring x86,$(UNAME)))
|
2015-03-20 19:39:00 +01:00
|
|
|
$(error Building on a 32-bit x86 host is not supported: $(UNAME)!)
|
|
|
|
endif
|
2009-03-04 04:28:42 +01:00
|
|
|
endif
|
|
|
|
|
2018-08-28 10:51:25 +02:00
|
|
|
ifeq ($(HOST_OS),darwin)
|
|
|
|
# Mac no longer supports 32-bit executables
|
|
|
|
HOST_2ND_ARCH :=
|
|
|
|
endif
|
|
|
|
|
2019-02-28 18:15:57 +01:00
|
|
|
HOST_2ND_ARCH_VAR_PREFIX := 2ND_
|
|
|
|
HOST_2ND_ARCH_MODULE_SUFFIX := _32
|
|
|
|
HOST_CROSS_2ND_ARCH_VAR_PREFIX := 2ND_
|
|
|
|
HOST_CROSS_2ND_ARCH_MODULE_SUFFIX := _64
|
|
|
|
TARGET_2ND_ARCH_VAR_PREFIX := 2ND_
|
|
|
|
.KATI_READONLY := \
|
|
|
|
HOST_ARCH \
|
|
|
|
HOST_2ND_ARCH \
|
|
|
|
HOST_IS_64_BIT \
|
|
|
|
HOST_2ND_ARCH_VAR_PREFIX \
|
|
|
|
HOST_2ND_ARCH_MODULE_SUFFIX \
|
|
|
|
HOST_CROSS_2ND_ARCH_VAR_PREFIX \
|
|
|
|
HOST_CROSS_2ND_ARCH_MODULE_SUFFIX \
|
|
|
|
TARGET_2ND_ARCH_VAR_PREFIX \
|
|
|
|
|
|
|
|
combo_target := HOST_
|
|
|
|
combo_2nd_arch_prefix :=
|
|
|
|
include $(BUILD_COMBOS)/select.mk
|
|
|
|
|
|
|
|
ifdef HOST_2ND_ARCH
|
|
|
|
combo_2nd_arch_prefix := $(HOST_2ND_ARCH_VAR_PREFIX)
|
|
|
|
include $(BUILD_SYSTEM)/combo/select.mk
|
|
|
|
endif
|
|
|
|
|
|
|
|
# Load the windows cross compiler under Linux
|
|
|
|
ifdef HOST_CROSS_OS
|
|
|
|
combo_target := HOST_CROSS_
|
|
|
|
combo_2nd_arch_prefix :=
|
|
|
|
include $(BUILD_SYSTEM)/combo/select.mk
|
|
|
|
|
|
|
|
ifdef HOST_CROSS_2ND_ARCH
|
|
|
|
combo_2nd_arch_prefix := $(HOST_CROSS_2ND_ARCH_VAR_PREFIX)
|
|
|
|
include $(BUILD_SYSTEM)/combo/select.mk
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
|
|
|
|
# on windows, the tools have .exe at the end, and we depend on the
|
|
|
|
# host config stuff being done first
|
|
|
|
|
2010-04-17 02:50:09 +02:00
|
|
|
BUILD_ARCH := $(HOST_ARCH)
|
2014-04-17 19:03:35 +02:00
|
|
|
BUILD_2ND_ARCH := $(HOST_2ND_ARCH)
|
2010-04-17 02:50:09 +02:00
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
ifeq ($(HOST_ARCH),)
|
|
|
|
$(error Unable to determine HOST_ARCH from uname -sm: $(UNAME)!)
|
|
|
|
endif
|
|
|
|
|
|
|
|
# the host build defaults to release, and it must be release or debug
|
|
|
|
ifeq ($(HOST_BUILD_TYPE),)
|
|
|
|
HOST_BUILD_TYPE := release
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifneq ($(HOST_BUILD_TYPE),release)
|
|
|
|
ifneq ($(HOST_BUILD_TYPE),debug)
|
|
|
|
$(error HOST_BUILD_TYPE must be either release or debug, not '$(HOST_BUILD_TYPE)')
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
|
2014-04-17 19:03:35 +02:00
|
|
|
# We don't want to move all the prebuilt host tools to a $(HOST_OS)-x86_64 dir.
|
|
|
|
HOST_PREBUILT_ARCH := x86
|
2009-03-04 04:28:42 +01:00
|
|
|
# This is the standard way to name a directory containing prebuilt host
|
|
|
|
# objects. E.g., prebuilt/$(HOST_PREBUILT_TAG)/cc
|
2024-05-14 22:54:13 +02:00
|
|
|
# This must match the logic in get_host_prebuilt_prefix in envsetup.sh
|
2015-05-04 21:44:44 +02:00
|
|
|
HOST_PREBUILT_TAG := $(BUILD_OS)-$(HOST_PREBUILT_ARCH)
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2011-10-28 00:18:39 +02:00
|
|
|
# TARGET_COPY_OUT_* are all relative to the staging directory, ie PRODUCT_OUT.
|
|
|
|
# Define them here so they can be used in product config files.
|
|
|
|
TARGET_COPY_OUT_SYSTEM := system
|
2022-01-20 07:43:09 +01:00
|
|
|
TARGET_COPY_OUT_SYSTEM_DLKM := system_dlkm
|
2016-06-16 23:47:10 +02:00
|
|
|
TARGET_COPY_OUT_SYSTEM_OTHER := system_other
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_COPY_OUT_DATA := data
|
2017-03-30 00:32:04 +02:00
|
|
|
TARGET_COPY_OUT_ASAN := $(TARGET_COPY_OUT_DATA)/asan
|
2014-03-12 01:13:27 +01:00
|
|
|
TARGET_COPY_OUT_OEM := oem
|
2018-08-09 23:26:00 +02:00
|
|
|
TARGET_COPY_OUT_RAMDISK := ramdisk
|
Adding boot-debug.img and ramdisk-debug.img
The two new debugging images adds additional files based on
boot.img and ramdisk.img/ramdisk-recovery.img, respectively.
File /force_debuggable is to trigger special logic in /init to load an
userdebug version of sepolicy and an additional property file from this
ramdisk to allow adb root, if the device is unlocked.
It's intentional to skip signing for boot-debug.img, as it can
only be used if the device is unlocked, where verification error
is allowed.
Those debugging images allows adb root on user build
system.img, vendor.img, product.img, etc. This can facilitate more
automated testings on user builds and is helpful to narrow down the
delta between what's being tested v.s. what's being shipped.
Bug: 126493225
Test: `make dist`, checks both boot-debug.img and ramdisk-debug.img
are in $OUT/ and out/dist.
Test: `make dist`, checks installed-files-ramdisk-debug.{json,txt} are
in out/dist.
Test: `system/core/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-debug.img`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-debug.img and $OUT/boot.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk ./ramdisk-debug`
Test: `make ramdisk_debug-nodeps` and `make bootimage_debug-nodeps`
Change-Id: I30137c3caef91805d9143d404e5e4d06c0fccc30
2019-03-20 10:59:52 +01:00
|
|
|
TARGET_COPY_OUT_DEBUG_RAMDISK := debug_ramdisk
|
2020-02-14 12:00:15 +01:00
|
|
|
TARGET_COPY_OUT_VENDOR_DEBUG_RAMDISK := vendor_debug_ramdisk
|
Adding boot-test-harness.img
In commit I30137c3caef91805d9143d404e5e4d06c0fccc30, we added
a boot-debug.img to allow adb root when using an user build GSI image.
However, to run automated tests, it requires additional properties,
which are not needed for GSI compliance:
ro.audio.silent=1
ro.test_harness=1
This CL adds an additional boot-test-harness.img for automated tests,
and keeps the original boot-debug.img for GSI compliance.
Note: boot-test-harness.img won't be built by default, it needs
explicit `make bootimage_test_harness`.
Bug: 140036184
Test: `m bootimage_test_harness`, flashes boot-test-harness.img and checks
adb root works and test harness props are set.
Test: `m bootimage_test_harness dist -j32`, checks both
boot-test-harness.img and ramdisk-test-harness.img are under ./out/dist/.
Test: `system/tools/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-test-harness.img --out ramdisk-test-harness`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-test-harness.img and $OUT/boot-debug.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk-test-harness ./ramdisk-debug`
Test: `m ramdisk_test_harness-nodeps` and `m bootimage_test_harness-nodeps`
Change-Id: Iadea0b5c933c3b7fa10dcf3d9e85596916b3333d
2019-10-08 04:22:19 +02:00
|
|
|
TARGET_COPY_OUT_TEST_HARNESS_RAMDISK := test_harness_ramdisk
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_COPY_OUT_ROOT := root
|
|
|
|
TARGET_COPY_OUT_RECOVERY := recovery
|
2018-10-02 15:10:16 +02:00
|
|
|
# The directory used for optional partitions depend on the BoardConfig, so
|
|
|
|
# they're defined to placeholder values here and swapped after reading the
|
|
|
|
# BoardConfig, to be either the partition dir, or a subdir within 'system'.
|
2014-07-24 05:20:49 +02:00
|
|
|
_vendor_path_placeholder := ||VENDOR-PATH-PH||
|
2017-11-27 09:04:47 +01:00
|
|
|
_product_path_placeholder := ||PRODUCT-PATH-PH||
|
2019-06-25 08:58:13 +02:00
|
|
|
_system_ext_path_placeholder := ||SYSTEM_EXT-PATH-PH||
|
2017-11-14 16:42:30 +01:00
|
|
|
_odm_path_placeholder := ||ODM-PATH-PH||
|
2020-05-07 23:58:20 +02:00
|
|
|
_vendor_dlkm_path_placeholder := ||VENDOR_DLKM-PATH-PH||
|
2020-07-16 01:52:59 +02:00
|
|
|
_odm_dlkm_path_placeholder := ||ODM_DLKM-PATH-PH||
|
2022-01-27 08:05:08 +01:00
|
|
|
_system_dlkm_path_placeholder := ||SYSTEM_DLKM-PATH-PH||
|
2018-10-02 15:10:16 +02:00
|
|
|
TARGET_COPY_OUT_VENDOR := $(_vendor_path_placeholder)
|
2021-03-03 08:54:08 +01:00
|
|
|
TARGET_COPY_OUT_VENDOR_RAMDISK := vendor_ramdisk
|
2022-02-24 03:30:15 +01:00
|
|
|
TARGET_COPY_OUT_VENDOR_KERNEL_RAMDISK := vendor_kernel_ramdisk
|
2018-10-02 15:10:16 +02:00
|
|
|
TARGET_COPY_OUT_PRODUCT := $(_product_path_placeholder)
|
2019-06-25 08:58:13 +02:00
|
|
|
# TODO(b/135957588) TARGET_COPY_OUT_PRODUCT_SERVICES will copy the target to
|
|
|
|
# product
|
|
|
|
TARGET_COPY_OUT_PRODUCT_SERVICES := $(_product_path_placeholder)
|
|
|
|
TARGET_COPY_OUT_SYSTEM_EXT := $(_system_ext_path_placeholder)
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_COPY_OUT_ODM := $(_odm_path_placeholder)
|
2020-05-07 23:58:20 +02:00
|
|
|
TARGET_COPY_OUT_VENDOR_DLKM := $(_vendor_dlkm_path_placeholder)
|
2020-07-16 01:52:59 +02:00
|
|
|
TARGET_COPY_OUT_ODM_DLKM := $(_odm_dlkm_path_placeholder)
|
2022-01-27 08:05:08 +01:00
|
|
|
TARGET_COPY_OUT_SYSTEM_DLKM := $(_system_dlkm_path_placeholder)
|
2018-10-02 15:10:16 +02:00
|
|
|
|
|
|
|
# Returns the non-sanitized version of the path provided in $1.
|
|
|
|
define get_non_asan_path
|
|
|
|
$(patsubst $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/%,$(PRODUCT_OUT)/%,$1)
|
|
|
|
endef
|
2017-11-14 16:42:30 +01:00
|
|
|
|
2017-06-15 19:41:02 +02:00
|
|
|
#################################################################
|
|
|
|
# Set up minimal BOOTCLASSPATH list of jars to build/execute
|
|
|
|
# java code with dalvikvm/art.
|
2021-07-05 21:53:57 +02:00
|
|
|
# Jars present in the ART apex. These should match exactly the list of Java
|
|
|
|
# libraries in art-bootclasspath-fragment. The APEX variant name
|
|
|
|
# (com.android.art) is the same regardless which Soong module provides the ART
|
|
|
|
# APEX. See the long comment in build/soong/java/dexprepopt_bootjars.go for
|
|
|
|
# details.
|
2020-04-30 11:59:48 +02:00
|
|
|
ART_APEX_JARS := \
|
|
|
|
com.android.art:core-oj \
|
|
|
|
com.android.art:core-libart \
|
|
|
|
com.android.art:okhttp \
|
|
|
|
com.android.art:bouncycastle \
|
|
|
|
com.android.art:apache-xml
|
2021-02-17 13:26:19 +01:00
|
|
|
# With EMMA_INSTRUMENT_FRAMEWORK=true the Core libraries depend on jacoco.
|
|
|
|
ifeq (true,$(EMMA_INSTRUMENT_FRAMEWORK))
|
|
|
|
ART_APEX_JARS += com.android.art:jacocoagent
|
|
|
|
endif
|
2017-06-15 19:41:02 +02:00
|
|
|
#################################################################
|
|
|
|
|
2021-12-01 22:49:12 +01:00
|
|
|
# Dumps all variables that match [A-Z][A-Z0-9_]* (with a few exceptions)
|
|
|
|
# to the file at $(1). It is used to print only the variables that are
|
|
|
|
# likely to be relevant to the product or board configuration.
|
2022-01-13 06:20:07 +01:00
|
|
|
# Soong config variables are dumped as $(call soong_config_set) calls
|
|
|
|
# instead of the raw variable values, because mk2rbc can't read the
|
2022-07-21 17:08:32 +02:00
|
|
|
# raw ones. There is a final sed command on the output file to
|
|
|
|
# remove leading spaces because I couldn't figure out how to remove
|
|
|
|
# them in pure make code.
|
2021-12-01 22:49:12 +01:00
|
|
|
define dump-variables-rbc
|
2022-03-24 20:21:55 +01:00
|
|
|
$(eval _dump_variables_rbc_excluded := \
|
2022-04-04 20:52:52 +02:00
|
|
|
BUILD_NUMBER \
|
|
|
|
DATE \
|
2022-03-24 20:21:55 +01:00
|
|
|
LOCAL_PATH \
|
2022-04-04 20:52:52 +02:00
|
|
|
MAKEFILE_LIST \
|
|
|
|
PRODUCTS \
|
|
|
|
PRODUCT_COPY_OUT_% \
|
|
|
|
RBC_PRODUCT_CONFIG \
|
|
|
|
RBC_BOARD_CONFIG \
|
|
|
|
SOONG_% \
|
2023-05-06 21:29:01 +02:00
|
|
|
TARGET_RELEASE \
|
2022-03-24 20:21:55 +01:00
|
|
|
TOPDIR \
|
|
|
|
TRACE_BEGIN_SOONG \
|
2022-04-04 20:52:52 +02:00
|
|
|
USER)
|
|
|
|
$(file >$(OUT_DIR)/dump-variables-rbc-temp.txt,$(subst $(space),$(newline),$(sort $(filter-out $(_dump_variables_rbc_excluded),$(.VARIABLES)))))
|
2021-12-01 22:49:12 +01:00
|
|
|
$(file >$(1),\
|
2022-04-06 20:58:37 +02:00
|
|
|
$(foreach v, $(shell grep -he "^[A-Z][A-Z0-9_]*$$" $(OUT_DIR)/dump-variables-rbc-temp.txt),\
|
2022-01-13 06:20:07 +01:00
|
|
|
$(v) := $(strip $($(v)))$(newline))\
|
2022-04-04 20:52:52 +02:00
|
|
|
$(foreach ns,$(sort $(SOONG_CONFIG_NAMESPACES)),\
|
|
|
|
$(foreach v,$(sort $(SOONG_CONFIG_$(ns))),\
|
2022-01-13 06:20:07 +01:00
|
|
|
$$(call soong_config_set,$(ns),$(v),$(SOONG_CONFIG_$(ns)_$(v)))$(newline))))
|
2022-07-21 17:08:32 +02:00
|
|
|
$(shell sed -i "s/^ *//g" $(1))
|
2021-12-01 22:49:12 +01:00
|
|
|
endef
|
|
|
|
|
2014-07-24 05:20:49 +02:00
|
|
|
# Read the product specs so we can get TARGET_DEVICE and other
|
2011-06-17 01:58:11 +02:00
|
|
|
# variables that we need in order to locate the output files.
|
|
|
|
include $(BUILD_SYSTEM)/product_config.mk
|
2010-09-22 19:59:10 +02:00
|
|
|
|
2011-11-17 23:51:12 +01:00
|
|
|
build_variant := $(filter-out eng user userdebug,$(TARGET_BUILD_VARIANT))
|
2011-06-17 01:58:11 +02:00
|
|
|
ifneq ($(build_variant)-$(words $(TARGET_BUILD_VARIANT)),-1)
|
|
|
|
$(warning bad TARGET_BUILD_VARIANT: $(TARGET_BUILD_VARIANT))
|
2011-11-17 23:51:12 +01:00
|
|
|
$(error must be empty or one of: eng user userdebug)
|
2011-06-17 01:58:11 +02:00
|
|
|
endif
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2014-09-03 00:11:20 +02:00
|
|
|
SDK_HOST_ARCH := x86
|
2019-02-28 18:15:57 +01:00
|
|
|
TARGET_OS := linux
|
2014-09-03 00:11:20 +02:00
|
|
|
|
2021-11-30 20:24:33 +01:00
|
|
|
# Some board configuration files use $(PRODUCT_OUT)
|
|
|
|
TARGET_OUT_ROOT := $(OUT_DIR)/target
|
|
|
|
TARGET_PRODUCT_OUT_ROOT := $(TARGET_OUT_ROOT)/product
|
|
|
|
PRODUCT_OUT := $(TARGET_PRODUCT_OUT_ROOT)/$(TARGET_DEVICE)
|
|
|
|
.KATI_READONLY := TARGET_OUT_ROOT TARGET_PRODUCT_OUT_ROOT PRODUCT_OUT
|
|
|
|
|
2019-02-26 13:34:03 +01:00
|
|
|
include $(BUILD_SYSTEM)/board_config.mk
|
2018-01-15 06:48:40 +01:00
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
# the target build type defaults to release
|
|
|
|
ifneq ($(TARGET_BUILD_TYPE),debug)
|
|
|
|
TARGET_BUILD_TYPE := release
|
|
|
|
endif
|
|
|
|
|
2023-11-03 20:27:43 +01:00
|
|
|
include $(BUILD_SYSTEM)/product_validation_checks.mk
|
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
# ---------------------------------------------------------------
|
|
|
|
# figure out the output directories
|
|
|
|
|
2016-05-28 00:15:47 +02:00
|
|
|
SOONG_OUT_DIR := $(OUT_DIR)/soong
|
|
|
|
|
2017-09-08 23:29:51 +02:00
|
|
|
HOST_OUT_ROOT := $(OUT_DIR)/host
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2021-11-30 20:24:33 +01:00
|
|
|
.KATI_READONLY := SOONG_OUT_DIR HOST_OUT_ROOT
|
2018-03-28 23:33:10 +02:00
|
|
|
|
2014-04-17 19:03:35 +02:00
|
|
|
# We want to avoid two host bin directories in multilib build.
|
2017-09-08 23:29:51 +02:00
|
|
|
HOST_OUT := $(HOST_OUT_ROOT)/$(HOST_OS)-$(HOST_PREBUILT_ARCH)
|
2021-11-19 00:42:19 +01:00
|
|
|
|
|
|
|
# Soong now installs to the same directory as Make.
|
|
|
|
SOONG_HOST_OUT := $(HOST_OUT)
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2020-07-13 12:19:27 +02:00
|
|
|
HOST_CROSS_OUT := $(HOST_OUT_ROOT)/$(HOST_CROSS_OS)-$(HOST_CROSS_ARCH)
|
2010-04-17 02:50:09 +02:00
|
|
|
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := HOST_OUT SOONG_HOST_OUT HOST_CROSS_OUT
|
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_COMMON_OUT_ROOT := $(TARGET_OUT_ROOT)/common
|
|
|
|
HOST_COMMON_OUT_ROOT := $(HOST_OUT_ROOT)/common
|
|
|
|
|
2021-11-30 20:24:33 +01:00
|
|
|
.KATI_READONLY := TARGET_COMMON_OUT_ROOT HOST_COMMON_OUT_ROOT
|
2018-03-28 23:33:10 +02:00
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
OUT_DOCS := $(TARGET_COMMON_OUT_ROOT)/docs
|
2017-10-04 19:20:20 +02:00
|
|
|
OUT_NDK_DOCS := $(TARGET_COMMON_OUT_ROOT)/ndk-docs
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := OUT_DOCS OUT_NDK_DOCS
|
|
|
|
|
|
|
|
$(call KATI_obsolete,BUILD_OUT,Use HOST_OUT instead)
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2018-03-28 23:33:10 +02:00
|
|
|
BUILD_OUT_EXECUTABLES := $(HOST_OUT)/bin
|
2016-05-28 00:15:47 +02:00
|
|
|
SOONG_HOST_OUT_EXECUTABLES := $(SOONG_HOST_OUT)/bin
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := BUILD_OUT_EXECUTABLES SOONG_HOST_OUT_EXECUTABLES
|
2010-04-17 02:50:09 +02:00
|
|
|
|
2014-01-14 01:14:20 +01:00
|
|
|
HOST_OUT_EXECUTABLES := $(HOST_OUT)/bin
|
2014-07-01 02:06:21 +02:00
|
|
|
HOST_OUT_SHARED_LIBRARIES := $(HOST_OUT)/lib64
|
2019-08-27 20:23:35 +02:00
|
|
|
HOST_OUT_DYLIB_LIBRARIES := $(HOST_OUT)/lib64
|
2016-02-13 09:19:40 +01:00
|
|
|
HOST_OUT_RENDERSCRIPT_BITCODE := $(HOST_OUT_SHARED_LIBRARIES)
|
2014-01-14 01:14:20 +01:00
|
|
|
HOST_OUT_JAVA_LIBRARIES := $(HOST_OUT)/framework
|
2009-04-10 04:31:12 +02:00
|
|
|
HOST_OUT_SDK_ADDON := $(HOST_OUT)/sdk_addon
|
Add NATIVE_TESTS class, move host native tests
Host native tests have been getting installed into
out/host/linux-x86/bin/..., but this pollutes the bin directory with a
lot of poorly named tests. Also, to support 32-bit and 64-bit tests, we
need to have different names with different suffixes. This causes
problems when tests expect to be named something specific (like gtest).
It's also convenient to store test data next to the test itself.
So with this change, native tests will be installed in
out/host/linux-x86/nativetest[64]/$(LOCAL_MODULE)/$(LOCAL_MODULE_STEM)
just like target tests get installed into /data/nativetest[64].
Implement this using a new NATIVE_TESTS class, which is like
EXECUTABLES, but sets up the install path differently, and configures
the rpath to load shared libraries with the proper relative path.
LOCAL_MODULE_RELATIVE_PATH can be used to control the directory name, it
will default to $(LOCAL_MODULE). This way multiple related tests can be
grouped together.
Target native tests also use NATIVE_TESTS now, but nothing should change
other than LOCAL_MODULE_RELATIVE_PATH can be used.
Change-Id: I535e42b1a6b21c5b8d6a580aa2f944d2be35e27d
2016-03-02 22:54:51 +01:00
|
|
|
HOST_OUT_NATIVE_TESTS := $(HOST_OUT)/nativetest64
|
2016-09-12 22:56:50 +02:00
|
|
|
HOST_OUT_COVERAGE := $(HOST_OUT)/coverage
|
2018-03-17 06:09:50 +01:00
|
|
|
HOST_OUT_TESTCASES := $(HOST_OUT)/testcases
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
HOST_OUT_EXECUTABLES \
|
|
|
|
HOST_OUT_SHARED_LIBRARIES \
|
|
|
|
HOST_OUT_RENDERSCRIPT_BITCODE \
|
|
|
|
HOST_OUT_JAVA_LIBRARIES \
|
|
|
|
HOST_OUT_SDK_ADDON \
|
|
|
|
HOST_OUT_NATIVE_TESTS \
|
|
|
|
HOST_OUT_COVERAGE \
|
|
|
|
HOST_OUT_TESTCASES
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2015-08-14 21:59:50 +02:00
|
|
|
HOST_CROSS_OUT_EXECUTABLES := $(HOST_CROSS_OUT)/bin
|
|
|
|
HOST_CROSS_OUT_SHARED_LIBRARIES := $(HOST_CROSS_OUT)/lib
|
Add NATIVE_TESTS class, move host native tests
Host native tests have been getting installed into
out/host/linux-x86/bin/..., but this pollutes the bin directory with a
lot of poorly named tests. Also, to support 32-bit and 64-bit tests, we
need to have different names with different suffixes. This causes
problems when tests expect to be named something specific (like gtest).
It's also convenient to store test data next to the test itself.
So with this change, native tests will be installed in
out/host/linux-x86/nativetest[64]/$(LOCAL_MODULE)/$(LOCAL_MODULE_STEM)
just like target tests get installed into /data/nativetest[64].
Implement this using a new NATIVE_TESTS class, which is like
EXECUTABLES, but sets up the install path differently, and configures
the rpath to load shared libraries with the proper relative path.
LOCAL_MODULE_RELATIVE_PATH can be used to control the directory name, it
will default to $(LOCAL_MODULE). This way multiple related tests can be
grouped together.
Target native tests also use NATIVE_TESTS now, but nothing should change
other than LOCAL_MODULE_RELATIVE_PATH can be used.
Change-Id: I535e42b1a6b21c5b8d6a580aa2f944d2be35e27d
2016-03-02 22:54:51 +01:00
|
|
|
HOST_CROSS_OUT_NATIVE_TESTS := $(HOST_CROSS_OUT)/nativetest
|
2016-09-12 22:56:50 +02:00
|
|
|
HOST_CROSS_OUT_COVERAGE := $(HOST_CROSS_OUT)/coverage
|
2018-03-17 06:09:50 +01:00
|
|
|
HOST_CROSS_OUT_TESTCASES := $(HOST_CROSS_OUT)/testcases
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
HOST_CROSS_OUT_EXECUTABLES \
|
|
|
|
HOST_CROSS_OUT_SHARED_LIBRARIES \
|
|
|
|
HOST_CROSS_OUT_NATIVE_TESTS \
|
|
|
|
HOST_CROSS_OUT_COVERAGE \
|
|
|
|
HOST_CROSS_OUT_TESTCASES
|
2015-08-14 21:59:50 +02:00
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
HOST_OUT_INTERMEDIATES := $(HOST_OUT)/obj
|
2014-01-14 01:14:20 +01:00
|
|
|
HOST_OUT_NOTICE_FILES := $(HOST_OUT_INTERMEDIATES)/NOTICE_FILES
|
2009-03-04 04:28:42 +01:00
|
|
|
HOST_OUT_COMMON_INTERMEDIATES := $(HOST_COMMON_OUT_ROOT)/obj
|
2013-11-14 00:56:18 +01:00
|
|
|
HOST_OUT_FAKE := $(HOST_OUT)/fake_packages
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
HOST_OUT_INTERMEDIATES \
|
|
|
|
HOST_OUT_NOTICE_FILES \
|
|
|
|
HOST_OUT_COMMON_INTERMEDIATES \
|
|
|
|
HOST_OUT_FAKE
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2015-08-14 21:59:50 +02:00
|
|
|
HOST_CROSS_OUT_INTERMEDIATES := $(HOST_CROSS_OUT)/obj
|
|
|
|
HOST_CROSS_OUT_NOTICE_FILES := $(HOST_CROSS_OUT_INTERMEDIATES)/NOTICE_FILES
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
HOST_CROSS_OUT_INTERMEDIATES \
|
|
|
|
HOST_CROSS_OUT_NOTICE_FILES
|
2015-08-14 21:59:50 +02:00
|
|
|
|
2014-01-25 08:17:21 +01:00
|
|
|
HOST_OUT_GEN := $(HOST_OUT)/gen
|
|
|
|
HOST_OUT_COMMON_GEN := $(HOST_COMMON_OUT_ROOT)/gen
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
HOST_OUT_GEN \
|
|
|
|
HOST_OUT_COMMON_GEN
|
2014-01-25 08:17:21 +01:00
|
|
|
|
2015-08-14 21:59:50 +02:00
|
|
|
HOST_CROSS_OUT_GEN := $(HOST_CROSS_OUT)/gen
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := HOST_CROSS_OUT_GEN
|
2015-08-14 21:59:50 +02:00
|
|
|
|
2014-04-17 19:03:35 +02:00
|
|
|
# Out for HOST_2ND_ARCH
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_INTERMEDIATES := $(HOST_OUT)/obj32
|
2014-05-20 23:43:51 +02:00
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_SHARED_LIBRARIES := $(HOST_OUT)/lib
|
2014-04-17 19:03:35 +02:00
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_EXECUTABLES := $(HOST_OUT_EXECUTABLES)
|
2015-05-05 03:17:52 +02:00
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_JAVA_LIBRARIES := $(HOST_OUT_JAVA_LIBRARIES)
|
Add NATIVE_TESTS class, move host native tests
Host native tests have been getting installed into
out/host/linux-x86/bin/..., but this pollutes the bin directory with a
lot of poorly named tests. Also, to support 32-bit and 64-bit tests, we
need to have different names with different suffixes. This causes
problems when tests expect to be named something specific (like gtest).
It's also convenient to store test data next to the test itself.
So with this change, native tests will be installed in
out/host/linux-x86/nativetest[64]/$(LOCAL_MODULE)/$(LOCAL_MODULE_STEM)
just like target tests get installed into /data/nativetest[64].
Implement this using a new NATIVE_TESTS class, which is like
EXECUTABLES, but sets up the install path differently, and configures
the rpath to load shared libraries with the proper relative path.
LOCAL_MODULE_RELATIVE_PATH can be used to control the directory name, it
will default to $(LOCAL_MODULE). This way multiple related tests can be
grouped together.
Target native tests also use NATIVE_TESTS now, but nothing should change
other than LOCAL_MODULE_RELATIVE_PATH can be used.
Change-Id: I535e42b1a6b21c5b8d6a580aa2f944d2be35e27d
2016-03-02 22:54:51 +01:00
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_NATIVE_TESTS := $(HOST_OUT)/nativetest
|
2017-01-26 00:11:55 +01:00
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_TESTCASES := $(HOST_OUT_TESTCASES)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_INTERMEDIATES \
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_SHARED_LIBRARIES \
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_EXECUTABLES \
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_JAVA_LIBRARIES \
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_NATIVE_TESTS \
|
|
|
|
$(HOST_2ND_ARCH_VAR_PREFIX)HOST_OUT_TESTCASES
|
2014-04-17 19:03:35 +02:00
|
|
|
|
2014-06-10 21:04:56 +02:00
|
|
|
# The default host library path.
|
|
|
|
# It always points to the path where we build libraries in the default bitness.
|
2014-08-14 20:03:56 +02:00
|
|
|
HOST_LIBRARY_PATH := $(HOST_OUT_SHARED_LIBRARIES)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := HOST_LIBRARY_PATH
|
2014-04-17 19:03:35 +02:00
|
|
|
|
2016-02-06 01:20:19 +01:00
|
|
|
# Out for HOST_CROSS_2ND_ARCH
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_INTERMEDIATES := $(HOST_CROSS_OUT)/obj64
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_SHARED_LIBRARIES := $(HOST_CROSS_OUT)/lib64
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_EXECUTABLES := $(HOST_CROSS_OUT_EXECUTABLES)
|
Add NATIVE_TESTS class, move host native tests
Host native tests have been getting installed into
out/host/linux-x86/bin/..., but this pollutes the bin directory with a
lot of poorly named tests. Also, to support 32-bit and 64-bit tests, we
need to have different names with different suffixes. This causes
problems when tests expect to be named something specific (like gtest).
It's also convenient to store test data next to the test itself.
So with this change, native tests will be installed in
out/host/linux-x86/nativetest[64]/$(LOCAL_MODULE)/$(LOCAL_MODULE_STEM)
just like target tests get installed into /data/nativetest[64].
Implement this using a new NATIVE_TESTS class, which is like
EXECUTABLES, but sets up the install path differently, and configures
the rpath to load shared libraries with the proper relative path.
LOCAL_MODULE_RELATIVE_PATH can be used to control the directory name, it
will default to $(LOCAL_MODULE). This way multiple related tests can be
grouped together.
Target native tests also use NATIVE_TESTS now, but nothing should change
other than LOCAL_MODULE_RELATIVE_PATH can be used.
Change-Id: I535e42b1a6b21c5b8d6a580aa2f944d2be35e27d
2016-03-02 22:54:51 +01:00
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_NATIVE_TESTS := $(HOST_CROSS_OUT)/nativetest64
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_INTERMEDIATES \
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_SHARED_LIBRARIES \
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_EXECUTABLES \
|
|
|
|
$(HOST_CROSS_2ND_ARCH_VAR_PREFIX)HOST_CROSS_OUT_NATIVE_TESTS
|
2016-02-06 01:20:19 +01:00
|
|
|
|
2017-05-10 04:36:54 +02:00
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
|
|
|
TARGET_OUT_INTERMEDIATES := $(PRODUCT_OUT)/obj_asan
|
|
|
|
else
|
|
|
|
TARGET_OUT_INTERMEDIATES := $(PRODUCT_OUT)/obj
|
|
|
|
endif
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_HEADERS := $(TARGET_OUT_INTERMEDIATES)/include
|
2018-09-05 20:01:12 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_INTERMEDIATES TARGET_OUT_HEADERS
|
2017-05-10 04:36:54 +02:00
|
|
|
|
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
|
|
|
TARGET_OUT_COMMON_INTERMEDIATES := $(TARGET_COMMON_OUT_ROOT)/obj_asan
|
|
|
|
else
|
|
|
|
TARGET_OUT_COMMON_INTERMEDIATES := $(TARGET_COMMON_OUT_ROOT)/obj
|
|
|
|
endif
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_COMMON_INTERMEDIATES
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2014-01-25 08:17:21 +01:00
|
|
|
TARGET_OUT_GEN := $(PRODUCT_OUT)/gen
|
|
|
|
TARGET_OUT_COMMON_GEN := $(TARGET_COMMON_OUT_ROOT)/gen
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_GEN TARGET_OUT_COMMON_GEN
|
2014-01-25 08:17:21 +01:00
|
|
|
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_SYSTEM)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT
|
2015-09-18 20:54:43 +02:00
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
2017-03-30 00:32:04 +02:00
|
|
|
target_out_shared_libraries_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/system
|
2017-06-16 19:24:54 +02:00
|
|
|
ifeq ($(SANITIZE_LITE),true)
|
|
|
|
# When using SANITIZE_LITE, APKs must not be packaged with sanitized libraries, as they will not
|
|
|
|
# work with unsanitized app_process. For simplicity, generate APKs into /data/asan/.
|
|
|
|
target_out_app_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/system
|
|
|
|
else
|
|
|
|
target_out_app_base := $(TARGET_OUT)
|
|
|
|
endif
|
2015-06-12 02:32:31 +02:00
|
|
|
else
|
|
|
|
target_out_shared_libraries_base := $(TARGET_OUT)
|
2017-06-16 19:24:54 +02:00
|
|
|
target_out_app_base := $(TARGET_OUT)
|
2015-06-12 02:32:31 +02:00
|
|
|
endif
|
|
|
|
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_EXECUTABLES := $(TARGET_OUT)/bin
|
|
|
|
TARGET_OUT_OPTIONAL_EXECUTABLES := $(TARGET_OUT)/xbin
|
2014-07-09 02:07:36 +02:00
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
2014-01-14 01:14:20 +01:00
|
|
|
# /system/lib always contains 32-bit libraries,
|
|
|
|
# and /system/lib64 (if present) always contains 64-bit libraries.
|
2015-06-12 02:32:31 +02:00
|
|
|
TARGET_OUT_SHARED_LIBRARIES := $(target_out_shared_libraries_base)/lib64
|
2014-01-14 01:14:20 +01:00
|
|
|
else
|
2015-06-12 02:32:31 +02:00
|
|
|
TARGET_OUT_SHARED_LIBRARIES := $(target_out_shared_libraries_base)/lib
|
2014-01-14 01:14:20 +01:00
|
|
|
endif
|
2016-02-13 09:19:40 +01:00
|
|
|
TARGET_OUT_RENDERSCRIPT_BITCODE := $(TARGET_OUT_SHARED_LIBRARIES)
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_JAVA_LIBRARIES := $(TARGET_OUT)/framework
|
2017-06-16 19:24:54 +02:00
|
|
|
TARGET_OUT_APPS := $(target_out_app_base)/app
|
|
|
|
TARGET_OUT_APPS_PRIVILEGED := $(target_out_app_base)/priv-app
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_OUT_KEYLAYOUT := $(TARGET_OUT)/usr/keylayout
|
|
|
|
TARGET_OUT_KEYCHARS := $(TARGET_OUT)/usr/keychars
|
|
|
|
TARGET_OUT_ETC := $(TARGET_OUT)/etc
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_NOTICE_FILES := $(TARGET_OUT_INTERMEDIATES)/NOTICE_FILES
|
2010-09-28 02:37:17 +02:00
|
|
|
TARGET_OUT_FAKE := $(PRODUCT_OUT)/fake_packages
|
2017-01-26 00:11:55 +01:00
|
|
|
TARGET_OUT_TESTCASES := $(PRODUCT_OUT)/testcases
|
2023-05-06 21:29:01 +02:00
|
|
|
TARGET_OUT_FLAGS := $(TARGET_OUT_INTERMEDIATES)/FLAGS
|
|
|
|
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_EXECUTABLES \
|
|
|
|
TARGET_OUT_OPTIONAL_EXECUTABLES \
|
|
|
|
TARGET_OUT_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_RENDERSCRIPT_BITCODE \
|
|
|
|
TARGET_OUT_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_APPS \
|
|
|
|
TARGET_OUT_APPS_PRIVILEGED \
|
|
|
|
TARGET_OUT_KEYLAYOUT \
|
|
|
|
TARGET_OUT_KEYCHARS \
|
|
|
|
TARGET_OUT_ETC \
|
|
|
|
TARGET_OUT_NOTICE_FILES \
|
|
|
|
TARGET_OUT_FAKE \
|
2023-05-06 21:29:01 +02:00
|
|
|
TARGET_OUT_TESTCASES \
|
|
|
|
TARGET_OUT_FLAGS
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2017-06-16 19:24:54 +02:00
|
|
|
ifeq ($(SANITIZE_LITE),true)
|
|
|
|
# When using SANITIZE_LITE, APKs must not be packaged with sanitized libraries, as they will not
|
|
|
|
# work with unsanitized app_process. For simplicity, generate APKs into /data/asan/.
|
|
|
|
TARGET_OUT_SYSTEM_OTHER := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_SYSTEM_OTHER)
|
|
|
|
else
|
2016-06-16 23:47:10 +02:00
|
|
|
TARGET_OUT_SYSTEM_OTHER := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_SYSTEM_OTHER)
|
2017-06-16 19:24:54 +02:00
|
|
|
endif
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_SYSTEM_OTHER
|
2016-06-16 23:47:10 +02:00
|
|
|
|
2013-12-27 20:09:36 +01:00
|
|
|
# Out for TARGET_2ND_ARCH
|
2014-06-10 21:04:56 +02:00
|
|
|
TARGET_2ND_ARCH_MODULE_SUFFIX := $(HOST_2ND_ARCH_MODULE_SUFFIX)
|
2019-02-28 18:15:57 +01:00
|
|
|
.KATI_READONLY := TARGET_2ND_ARCH_MODULE_SUFFIX
|
2017-05-10 04:36:54 +02:00
|
|
|
|
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_INTERMEDIATES := $(PRODUCT_OUT)/obj_$(TARGET_2ND_ARCH)_asan
|
|
|
|
else
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_INTERMEDIATES := $(PRODUCT_OUT)/obj_$(TARGET_2ND_ARCH)
|
|
|
|
endif
|
2015-06-12 02:32:31 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SHARED_LIBRARIES := $(target_out_shared_libraries_base)/lib
|
2016-02-13 09:19:40 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_RENDERSCRIPT_BITCODE := $($(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SHARED_LIBRARIES)
|
2014-01-18 01:17:28 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_EXECUTABLES := $(TARGET_OUT_EXECUTABLES)
|
2014-01-24 22:37:07 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_APPS := $(TARGET_OUT_APPS)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_APPS_PRIVILEGED := $(TARGET_OUT_APPS_PRIVILEGED)
|
2017-01-26 00:11:55 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_TESTCASES := $(TARGET_OUT_TESTCASES)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_INTERMEDIATES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_RENDERSCRIPT_BITCODE \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_APPS_PRIVILEGED \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_TESTCASES
|
2013-12-27 20:09:36 +01:00
|
|
|
|
2019-03-14 02:04:05 +01:00
|
|
|
MODULE_CLASS_APPS := app
|
|
|
|
MODULE_CLASS_EXECUTABLES := bin
|
|
|
|
MODULE_CLASS_JAVA_LIBRARIES := framework
|
|
|
|
MODULE_CLASS_NATIVE_TESTS := nativetest
|
|
|
|
MODULE_CLASS_METRIC_TESTS := benchmarktest
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_OUT_DATA := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_DATA)
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_DATA_EXECUTABLES := $(TARGET_OUT_EXECUTABLES)
|
|
|
|
TARGET_OUT_DATA_SHARED_LIBRARIES := $(TARGET_OUT_SHARED_LIBRARIES)
|
|
|
|
TARGET_OUT_DATA_JAVA_LIBRARIES := $(TARGET_OUT_DATA)/framework
|
|
|
|
TARGET_OUT_DATA_APPS := $(TARGET_OUT_DATA)/app
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_OUT_DATA_KEYLAYOUT := $(TARGET_OUT_KEYLAYOUT)
|
|
|
|
TARGET_OUT_DATA_KEYCHARS := $(TARGET_OUT_KEYCHARS)
|
|
|
|
TARGET_OUT_DATA_ETC := $(TARGET_OUT_ETC)
|
2014-07-09 02:07:36 +02:00
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
|
|
|
TARGET_OUT_DATA_NATIVE_TESTS := $(TARGET_OUT_DATA)/nativetest64
|
2016-04-12 11:22:06 +02:00
|
|
|
TARGET_OUT_DATA_METRIC_TESTS := $(TARGET_OUT_DATA)/benchmarktest64
|
2017-07-11 23:59:30 +02:00
|
|
|
TARGET_OUT_VENDOR_NATIVE_TESTS := $(TARGET_OUT_DATA)/nativetest64$(TARGET_VENDOR_TEST_SUFFIX)
|
|
|
|
TARGET_OUT_VENDOR_METRIC_TESTS := $(TARGET_OUT_DATA)/benchmarktest64$(TARGET_VENDOR_TEST_SUFFIX)
|
2014-07-09 02:07:36 +02:00
|
|
|
else
|
2010-07-20 20:08:47 +02:00
|
|
|
TARGET_OUT_DATA_NATIVE_TESTS := $(TARGET_OUT_DATA)/nativetest
|
2016-04-12 11:22:06 +02:00
|
|
|
TARGET_OUT_DATA_METRIC_TESTS := $(TARGET_OUT_DATA)/benchmarktest
|
2017-07-11 23:59:30 +02:00
|
|
|
TARGET_OUT_VENDOR_NATIVE_TESTS := $(TARGET_OUT_DATA)/nativetest$(TARGET_VENDOR_TEST_SUFFIX)
|
|
|
|
TARGET_OUT_VENDOR_METRIC_TESTS := $(TARGET_OUT_DATA)/benchmarktest$(TARGET_VENDOR_TEST_SUFFIX)
|
2014-07-09 02:07:36 +02:00
|
|
|
endif
|
2019-03-14 02:04:05 +01:00
|
|
|
MODULE_CLASS_FAKE := fake_packages
|
2012-07-13 22:47:09 +02:00
|
|
|
TARGET_OUT_DATA_FAKE := $(TARGET_OUT_DATA)/fake_packages
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_DATA \
|
|
|
|
TARGET_OUT_DATA_EXECUTABLES \
|
|
|
|
TARGET_OUT_DATA_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_DATA_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_DATA_APPS \
|
|
|
|
TARGET_OUT_DATA_KEYLAYOUT \
|
|
|
|
TARGET_OUT_DATA_KEYCHARS \
|
|
|
|
TARGET_OUT_DATA_ETC \
|
|
|
|
TARGET_OUT_DATA_NATIVE_TESTS \
|
|
|
|
TARGET_OUT_DATA_METRIC_TESTS \
|
|
|
|
TARGET_OUT_VENDOR_NATIVE_TESTS \
|
|
|
|
TARGET_OUT_VENDOR_METRIC_TESTS \
|
2019-03-14 02:04:05 +01:00
|
|
|
TARGET_OUT_DATA_FAKE \
|
|
|
|
MODULE_CLASS_APPS \
|
|
|
|
MODULE_CLASS_EXECUTABLES \
|
|
|
|
MODULE_CLASS_JAVA_LIBRARIES \
|
|
|
|
MODULE_CLASS_NATIVE_TESTS \
|
|
|
|
MODULE_CLASS_METRIC_TESTS \
|
|
|
|
MODULE_CLASS_FAKE
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2014-01-24 00:09:04 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_EXECUTABLES := $(TARGET_OUT_DATA_EXECUTABLES)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_SHARED_LIBRARIES := $($(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SHARED_LIBRARIES)
|
2014-01-24 22:37:07 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_APPS := $(TARGET_OUT_DATA_APPS)
|
2014-07-09 02:07:36 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_NATIVE_TESTS := $(TARGET_OUT_DATA)/nativetest
|
2016-04-12 11:22:06 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_METRIC_TESTS := $(TARGET_OUT_DATA)/benchmarktest
|
2017-07-11 23:59:30 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_NATIVE_TESTS := $(TARGET_OUT_DATA)/nativetest$(TARGET_VENDOR_TEST_SUFFIX)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_METRIC_TESTS := $(TARGET_OUT_DATA)/benchmarktest$(TARGET_VENDOR_TEST_SUFFIX)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_NATIVE_TESTS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_DATA_METRIC_TESTS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_NATIVE_TESTS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_METRIC_TESTS \
|
2014-01-24 00:09:04 +01:00
|
|
|
|
2011-11-04 19:37:01 +01:00
|
|
|
TARGET_OUT_CACHE := $(PRODUCT_OUT)/cache
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_CACHE
|
2011-11-04 19:37:01 +01:00
|
|
|
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_OUT_VENDOR := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_VENDOR)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_VENDOR
|
2015-09-18 20:54:43 +02:00
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
2018-10-02 14:16:05 +02:00
|
|
|
target_out_vendor_shared_libraries_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_VENDOR)
|
2017-06-16 19:24:54 +02:00
|
|
|
ifeq ($(SANITIZE_LITE),true)
|
|
|
|
# When using SANITIZE_LITE, APKs must not be packaged with sanitized libraries, as they will not
|
|
|
|
# work with unsanitized app_process. For simplicity, generate APKs into /data/asan/.
|
2018-10-02 14:16:05 +02:00
|
|
|
target_out_vendor_app_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_VENDOR)
|
2017-06-16 19:24:54 +02:00
|
|
|
else
|
|
|
|
target_out_vendor_app_base := $(TARGET_OUT_VENDOR)
|
|
|
|
endif
|
2015-06-30 23:02:02 +02:00
|
|
|
else
|
|
|
|
target_out_vendor_shared_libraries_base := $(TARGET_OUT_VENDOR)
|
2017-06-16 19:24:54 +02:00
|
|
|
target_out_vendor_app_base := $(TARGET_OUT_VENDOR)
|
2015-06-30 23:02:02 +02:00
|
|
|
endif
|
|
|
|
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_VENDOR_EXECUTABLES := $(TARGET_OUT_VENDOR)/bin
|
|
|
|
TARGET_OUT_VENDOR_OPTIONAL_EXECUTABLES := $(TARGET_OUT_VENDOR)/xbin
|
2014-07-09 02:07:36 +02:00
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
2015-06-30 23:02:02 +02:00
|
|
|
TARGET_OUT_VENDOR_SHARED_LIBRARIES := $(target_out_vendor_shared_libraries_base)/lib64
|
2014-01-14 01:14:20 +01:00
|
|
|
else
|
2015-06-30 23:02:02 +02:00
|
|
|
TARGET_OUT_VENDOR_SHARED_LIBRARIES := $(target_out_vendor_shared_libraries_base)/lib
|
2014-01-14 01:14:20 +01:00
|
|
|
endif
|
2017-03-02 04:39:19 +01:00
|
|
|
TARGET_OUT_VENDOR_RENDERSCRIPT_BITCODE := $(TARGET_OUT_VENDOR_SHARED_LIBRARIES)
|
2014-01-14 01:14:20 +01:00
|
|
|
TARGET_OUT_VENDOR_JAVA_LIBRARIES := $(TARGET_OUT_VENDOR)/framework
|
2017-06-16 19:24:54 +02:00
|
|
|
TARGET_OUT_VENDOR_APPS := $(target_out_vendor_app_base)/app
|
|
|
|
TARGET_OUT_VENDOR_APPS_PRIVILEGED := $(target_out_vendor_app_base)/priv-app
|
2011-09-13 22:57:26 +02:00
|
|
|
TARGET_OUT_VENDOR_ETC := $(TARGET_OUT_VENDOR)/etc
|
2023-10-03 21:58:27 +02:00
|
|
|
TARGET_OUT_VENDOR_FAKE := $(PRODUCT_OUT)/vendor_fake_packages
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_VENDOR_EXECUTABLES \
|
|
|
|
TARGET_OUT_VENDOR_OPTIONAL_EXECUTABLES \
|
|
|
|
TARGET_OUT_VENDOR_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_VENDOR_RENDERSCRIPT_BITCODE \
|
|
|
|
TARGET_OUT_VENDOR_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_VENDOR_APPS \
|
|
|
|
TARGET_OUT_VENDOR_APPS_PRIVILEGED \
|
2023-10-03 21:58:27 +02:00
|
|
|
TARGET_OUT_VENDOR_ETC \
|
|
|
|
TARGET_OUT_VENDOR_FAKE
|
2011-09-13 22:57:26 +02:00
|
|
|
|
2014-01-24 00:09:04 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_EXECUTABLES := $(TARGET_OUT_VENDOR_EXECUTABLES)
|
2016-07-01 05:20:38 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_SHARED_LIBRARIES := $(target_out_vendor_shared_libraries_base)/lib
|
2017-03-02 04:39:19 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_RENDERSCRIPT_BITCODE := $($(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_SHARED_LIBRARIES)
|
2014-01-24 22:37:07 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_APPS := $(TARGET_OUT_VENDOR_APPS)
|
2016-07-20 11:51:56 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_APPS_PRIVILEGED := $(TARGET_OUT_VENDOR_APPS_PRIVILEGED)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_RENDERSCRIPT_BITCODE \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_APPS_PRIVILEGED
|
2014-01-16 01:02:16 +01:00
|
|
|
|
2014-03-12 01:13:27 +01:00
|
|
|
TARGET_OUT_OEM := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_OEM)
|
2014-06-26 23:12:35 +02:00
|
|
|
TARGET_OUT_OEM_EXECUTABLES := $(TARGET_OUT_OEM)/bin
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
2014-06-26 23:12:35 +02:00
|
|
|
TARGET_OUT_OEM_SHARED_LIBRARIES := $(TARGET_OUT_OEM)/lib64
|
|
|
|
else
|
|
|
|
TARGET_OUT_OEM_SHARED_LIBRARIES := $(TARGET_OUT_OEM)/lib
|
|
|
|
endif
|
2014-03-12 01:13:27 +01:00
|
|
|
# We don't expect Java libraries in the oem.img.
|
|
|
|
# TARGET_OUT_OEM_JAVA_LIBRARIES:= $(TARGET_OUT_OEM)/framework
|
2014-06-26 23:12:35 +02:00
|
|
|
TARGET_OUT_OEM_APPS := $(TARGET_OUT_OEM)/app
|
2014-03-12 01:13:27 +01:00
|
|
|
TARGET_OUT_OEM_ETC := $(TARGET_OUT_OEM)/etc
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_OEM \
|
|
|
|
TARGET_OUT_OEM_EXECUTABLES \
|
|
|
|
TARGET_OUT_OEM_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_OEM_APPS \
|
|
|
|
TARGET_OUT_OEM_ETC
|
2014-03-12 01:13:27 +01:00
|
|
|
|
2014-06-26 23:12:35 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_OEM_EXECUTABLES := $(TARGET_OUT_OEM_EXECUTABLES)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_OEM_SHARED_LIBRARIES := $(TARGET_OUT_OEM)/lib
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_OEM_APPS := $(TARGET_OUT_OEM_APPS)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_OEM_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_OEM_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_OEM_APPS \
|
2014-06-26 23:12:35 +02:00
|
|
|
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
TARGET_OUT_ODM := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ODM)
|
2017-11-14 16:42:30 +01:00
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
2018-10-02 14:16:05 +02:00
|
|
|
target_out_odm_shared_libraries_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_OEM)
|
2017-11-14 16:42:30 +01:00
|
|
|
ifeq ($(SANITIZE_LITE),true)
|
|
|
|
# When using SANITIZE_LITE, APKs must not be packaged with sanitized libraries, as they will not
|
|
|
|
# work with unsanitized app_process. For simplicity, generate APKs into /data/asan/.
|
2018-10-02 14:16:05 +02:00
|
|
|
target_out_odm_app_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_OEM)
|
2017-11-14 16:42:30 +01:00
|
|
|
else
|
|
|
|
target_out_odm_app_base := $(TARGET_OUT_ODM)
|
|
|
|
endif
|
|
|
|
else
|
|
|
|
target_out_odm_shared_libraries_base := $(TARGET_OUT_ODM)
|
|
|
|
target_out_odm_app_base := $(TARGET_OUT_ODM)
|
|
|
|
endif
|
|
|
|
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
TARGET_OUT_ODM_EXECUTABLES := $(TARGET_OUT_ODM)/bin
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_OPTIONAL_EXECUTABLES := $(TARGET_OUT_ODM)/xbin
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_SHARED_LIBRARIES := $(target_out_odm_shared_libraries_base)/lib64
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
else
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_SHARED_LIBRARIES := $(target_out_odm_shared_libraries_base)/lib
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
endif
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_RENDERSCRIPT_BITCODE := $(TARGET_OUT_ODM_SHARED_LIBRARIES)
|
|
|
|
TARGET_OUT_ODM_JAVA_LIBRARIES := $(TARGET_OUT_ODM)/framework
|
|
|
|
TARGET_OUT_ODM_APPS := $(target_out_odm_app_base)/app
|
|
|
|
TARGET_OUT_ODM_APPS_PRIVILEGED := $(target_out_odm_app_base)/priv-app
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
TARGET_OUT_ODM_ETC := $(TARGET_OUT_ODM)/etc
|
2024-03-18 20:37:41 +01:00
|
|
|
TARGET_OUT_ODM_FAKE := $(PRODUCT_OUT)/odm_fake_packages
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_ODM \
|
|
|
|
TARGET_OUT_ODM_EXECUTABLES \
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_OPTIONAL_EXECUTABLES \
|
2018-03-28 23:33:10 +02:00
|
|
|
TARGET_OUT_ODM_SHARED_LIBRARIES \
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_RENDERSCRIPT_BITCODE \
|
|
|
|
TARGET_OUT_ODM_JAVA_LIBRARIES \
|
2018-03-28 23:33:10 +02:00
|
|
|
TARGET_OUT_ODM_APPS \
|
2017-11-14 16:42:30 +01:00
|
|
|
TARGET_OUT_ODM_APPS_PRIVILEGED \
|
2024-03-18 20:37:41 +01:00
|
|
|
TARGET_OUT_ODM_ETC \
|
|
|
|
TARGET_OUT_ODM_FAKE
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_EXECUTABLES := $(TARGET_OUT_ODM_EXECUTABLES)
|
2017-11-14 16:42:30 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_SHARED_LIBRARIES := $(target_out_odm_shared_libraries_base)/lib
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_RENDERSCRIPT_BITCODE := $($(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_SHARED_LIBRARIES)
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_APPS := $(TARGET_OUT_ODM_APPS)
|
2017-11-14 16:42:30 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_APPS_PRIVILEGED := $(TARGET_OUT_ODM_APPS_PRIVILEGED)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_SHARED_LIBRARIES \
|
2017-11-14 16:42:30 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_RENDERSCRIPT_BITCODE \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_APPS_PRIVILEGED
|
Support to configure and build multiple custom images.
Build additional images requested by the product makefile.
This script gives the ability to build multiple additional images and
you can configure what modules/files to include in each image.
1. Define PRODUCT_CUSTOM_IMAGE_MAKEFILES in your product makefile.
PRODUCT_CUSTOM_IMAGE_MAKEFILES is a list of makefiles.
Each makefile configures an image.
For image configuration makefile foo/bar/xyz.mk, the built image
file name
will be xyz.img. So make sure they won't conflict.
2. In each image's configuration makefile, you can define variables:
- CUSTOM_IMAGE_MOUNT_POINT, the mount point, such as "oem", "odm"
etc.
- CUSTOM_IMAGE_PARTITION_SIZE
- CUSTOM_IMAGE_FILE_SYSTEM_TYPE
- CUSTOM_IMAGE_DICT_FILE, a text file defining a dictionary
accepted by BuildImage() in tools/releasetools/build_image.py.
- CUSTOM_IMAGE_MODULES, a list of module names you want to include
in the image; Not only the module itself will be installed to proper
path in the image, you can also piggyback additional files/directories
with the module's LOCAL_PICKUP_FILES.
- CUSTOM_IMAGE_COPY_FILES, a list of "<src>:<dest>" to be copied to
the image. <dest> is relativ to the root of the image.
To build all those images, run "make custom_images".
Bug: 19609718
Change-Id: Ic73587e08503a251be27797c7b00329716051927
(cherry picked from commit 5fcf1094f9cf4d57c2598237f99621f254130d71)
2015-03-13 02:30:39 +01:00
|
|
|
|
2020-05-07 23:58:20 +02:00
|
|
|
TARGET_OUT_VENDOR_DLKM := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_VENDOR_DLKM)
|
|
|
|
|
|
|
|
TARGET_OUT_VENDOR_DLKM_ETC := $(TARGET_OUT_VENDOR_DLKM)/etc
|
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_ETC
|
|
|
|
|
|
|
|
# Unlike other partitions, vendor_dlkm should only contain kernel modules.
|
|
|
|
TARGET_OUT_VENDOR_DLKM_EXECUTABLES :=
|
|
|
|
TARGET_OUT_VENDOR_DLKM_OPTIONAL_EXECUTABLES :=
|
|
|
|
TARGET_OUT_VENDOR_DLKM_SHARED_LIBRARIES :=
|
|
|
|
TARGET_OUT_VENDOR_DLKM_RENDERSCRIPT_BITCODE :=
|
|
|
|
TARGET_OUT_VENDOR_DLKM_JAVA_LIBRARIES :=
|
|
|
|
TARGET_OUT_VENDOR_DLKM_APPS :=
|
|
|
|
TARGET_OUT_VENDOR_DLKM_APPS_PRIVILEGED :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_EXECUTABLES :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_SHARED_LIBRARIES :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_RENDERSCRIPT_BITCODE :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_APPS :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_APPS_PRIVILEGED :=
|
|
|
|
$(KATI_obsolete_var \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_EXECUTABLES \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_OPTIONAL_EXECUTABLES \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_RENDERSCRIPT_BITCODE \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_APPS \
|
|
|
|
TARGET_OUT_VENDOR_DLKM_APPS_PRIVILEGED \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_RENDERSCRIPT_BITCODE \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_VENDOR_DLKM_APPS_PRIVILEGED \
|
|
|
|
, vendor_dlkm should not contain any executables, libraries, or apps)
|
|
|
|
|
2020-07-16 01:52:59 +02:00
|
|
|
TARGET_OUT_ODM_DLKM := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ODM_DLKM)
|
|
|
|
|
|
|
|
TARGET_OUT_ODM_DLKM_ETC := $(TARGET_OUT_ODM_DLKM)/etc
|
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_ODM_DLKM_ETC
|
|
|
|
|
|
|
|
# Unlike other partitions, odm_dlkm should only contain kernel modules.
|
|
|
|
TARGET_OUT_ODM_DLKM_EXECUTABLES :=
|
|
|
|
TARGET_OUT_ODM_DLKM_OPTIONAL_EXECUTABLES :=
|
|
|
|
TARGET_OUT_ODM_DLKM_SHARED_LIBRARIES :=
|
|
|
|
TARGET_OUT_ODM_DLKM_RENDERSCRIPT_BITCODE :=
|
|
|
|
TARGET_OUT_ODM_DLKM_JAVA_LIBRARIES :=
|
|
|
|
TARGET_OUT_ODM_DLKM_APPS :=
|
|
|
|
TARGET_OUT_ODM_DLKM_APPS_PRIVILEGED :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_EXECUTABLES :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_SHARED_LIBRARIES :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_RENDERSCRIPT_BITCODE :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_APPS :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_APPS_PRIVILEGED :=
|
|
|
|
$(KATI_obsolete_var \
|
|
|
|
TARGET_OUT_ODM_DLKM_EXECUTABLES \
|
|
|
|
TARGET_OUT_ODM_DLKM_OPTIONAL_EXECUTABLES \
|
|
|
|
TARGET_OUT_ODM_DLKM_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_ODM_DLKM_RENDERSCRIPT_BITCODE \
|
|
|
|
TARGET_OUT_ODM_DLKM_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_ODM_DLKM_APPS \
|
|
|
|
TARGET_OUT_ODM_DLKM_APPS_PRIVILEGED \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_RENDERSCRIPT_BITCODE \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_ODM_DLKM_APPS_PRIVILEGED \
|
|
|
|
, odm_dlkm should not contain any executables, libraries, or apps)
|
|
|
|
|
2022-01-27 08:05:08 +01:00
|
|
|
TARGET_OUT_SYSTEM_DLKM := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_SYSTEM_DLKM)
|
|
|
|
|
|
|
|
# Unlike other partitions, system_dlkm should only contain kernel modules.
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_EXECUTABLES :=
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_OPTIONAL_EXECUTABLES :=
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_SHARED_LIBRARIES :=
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_RENDERSCRIPT_BITCODE :=
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_JAVA_LIBRARIES :=
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_APPS :=
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_APPS_PRIVILEGED :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_EXECUTABLES :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_SHARED_LIBRARIES :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_RENDERSCRIPT_BITCODE :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_APPS :=
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_APPS_PRIVILEGED :=
|
|
|
|
$(KATI_obsolete_var \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_EXECUTABLES \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_OPTIONAL_EXECUTABLES \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_RENDERSCRIPT_BITCODE \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_APPS \
|
|
|
|
TARGET_OUT_SYSTEM_DLKM_APPS_PRIVILEGED \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_RENDERSCRIPT_BITCODE \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_DLKM_APPS_PRIVILEGED \
|
|
|
|
, system_dlkm should not contain any executables, libraries, or apps)
|
|
|
|
|
2017-11-27 09:04:47 +01:00
|
|
|
TARGET_OUT_PRODUCT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_PRODUCT)
|
2018-06-25 03:56:01 +02:00
|
|
|
TARGET_OUT_PRODUCT_EXECUTABLES := $(TARGET_OUT_PRODUCT)/bin
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_PRODUCT
|
2017-11-27 09:04:47 +01:00
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
2018-10-02 14:16:05 +02:00
|
|
|
target_out_product_shared_libraries_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_PRODUCT)
|
2017-11-27 09:04:47 +01:00
|
|
|
ifeq ($(SANITIZE_LITE),true)
|
|
|
|
# When using SANITIZE_LITE, APKs must not be packaged with sanitized libraries, as they will not
|
|
|
|
# work with unsanitized app_process. For simplicity, generate APKs into /data/asan/.
|
2018-10-02 14:16:05 +02:00
|
|
|
target_out_product_app_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_PRODUCT)
|
2017-11-27 09:04:47 +01:00
|
|
|
else
|
|
|
|
target_out_product_app_base := $(TARGET_OUT_PRODUCT)
|
|
|
|
endif
|
|
|
|
else
|
2018-05-04 04:20:43 +02:00
|
|
|
target_out_product_shared_libraries_base := $(TARGET_OUT_PRODUCT)
|
2017-11-27 09:04:47 +01:00
|
|
|
target_out_product_app_base := $(TARGET_OUT_PRODUCT)
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
|
|
|
TARGET_OUT_PRODUCT_SHARED_LIBRARIES := $(target_out_product_shared_libraries_base)/lib64
|
|
|
|
else
|
|
|
|
TARGET_OUT_PRODUCT_SHARED_LIBRARIES := $(target_out_product_shared_libraries_base)/lib
|
|
|
|
endif
|
2018-03-28 23:33:10 +02:00
|
|
|
TARGET_OUT_PRODUCT_JAVA_LIBRARIES := $(TARGET_OUT_PRODUCT)/framework
|
2017-11-27 09:04:47 +01:00
|
|
|
TARGET_OUT_PRODUCT_APPS := $(target_out_product_app_base)/app
|
|
|
|
TARGET_OUT_PRODUCT_APPS_PRIVILEGED := $(target_out_product_app_base)/priv-app
|
|
|
|
TARGET_OUT_PRODUCT_ETC := $(TARGET_OUT_PRODUCT)/etc
|
2024-03-18 20:37:41 +01:00
|
|
|
TARGET_OUT_PRODUCT_FAKE := $(TARGET_OUT_PRODUCT)/product_fake_packages
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
2018-06-25 03:56:01 +02:00
|
|
|
TARGET_OUT_PRODUCT_EXECUTABLES \
|
2018-03-28 23:33:10 +02:00
|
|
|
TARGET_OUT_PRODUCT_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_PRODUCT_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_PRODUCT_APPS \
|
|
|
|
TARGET_OUT_PRODUCT_APPS_PRIVILEGED \
|
2024-03-18 20:37:41 +01:00
|
|
|
TARGET_OUT_PRODUCT_ETC \
|
|
|
|
TARGET_OUT_PRODUCT_FAKE
|
2017-11-27 09:04:47 +01:00
|
|
|
|
2018-06-25 03:56:01 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_EXECUTABLES := $(TARGET_OUT_PRODUCT_EXECUTABLES)
|
2017-11-27 09:04:47 +01:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_SHARED_LIBRARIES := $(target_out_product_shared_libraries_base)/lib
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_APPS := $(TARGET_OUT_PRODUCT_APPS)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_APPS_PRIVILEGED := $(TARGET_OUT_PRODUCT_APPS_PRIVILEGED)
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
2018-06-25 03:56:01 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_EXECUTABLES \
|
2018-03-28 23:33:10 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_PRODUCT_APPS_PRIVILEGED
|
2017-11-27 09:04:47 +01:00
|
|
|
|
2019-06-25 08:58:13 +02:00
|
|
|
TARGET_OUT_SYSTEM_EXT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_SYSTEM_EXT)
|
2018-05-29 14:09:01 +02:00
|
|
|
ifneq ($(filter address,$(SANITIZE_TARGET)),)
|
2019-06-25 08:58:13 +02:00
|
|
|
target_out_system_ext_shared_libraries_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_SYSTEM_EXT)
|
2018-05-29 14:09:01 +02:00
|
|
|
ifeq ($(SANITIZE_LITE),true)
|
|
|
|
# When using SANITIZE_LITE, APKs must not be packaged with sanitized libraries, as they will not
|
|
|
|
# work with unsanitized app_process. For simplicity, generate APKs into /data/asan/.
|
2019-06-25 08:58:13 +02:00
|
|
|
target_out_system_ext_app_base := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ASAN)/$(TARGET_COPY_OUT_SYSTEM_EXT)
|
2018-05-29 14:09:01 +02:00
|
|
|
else
|
2019-06-25 08:58:13 +02:00
|
|
|
target_out_system_ext_app_base := $(TARGET_OUT_SYSTEM_EXT)
|
2018-05-29 14:09:01 +02:00
|
|
|
endif
|
|
|
|
else
|
2019-06-25 08:58:13 +02:00
|
|
|
target_out_system_ext_shared_libraries_base := $(TARGET_OUT_SYSTEM_EXT)
|
|
|
|
target_out_system_ext_app_base := $(TARGET_OUT_SYSTEM_EXT)
|
2018-05-29 14:09:01 +02:00
|
|
|
endif
|
|
|
|
|
|
|
|
ifeq ($(TARGET_IS_64_BIT),true)
|
2019-06-25 08:58:13 +02:00
|
|
|
TARGET_OUT_SYSTEM_EXT_SHARED_LIBRARIES := $(target_out_system_ext_shared_libraries_base)/lib64
|
2018-05-29 14:09:01 +02:00
|
|
|
else
|
2019-06-25 08:58:13 +02:00
|
|
|
TARGET_OUT_SYSTEM_EXT_SHARED_LIBRARIES := $(target_out_system_ext_shared_libraries_base)/lib
|
2018-05-29 14:09:01 +02:00
|
|
|
endif
|
2019-06-25 08:58:13 +02:00
|
|
|
TARGET_OUT_SYSTEM_EXT_JAVA_LIBRARIES:= $(TARGET_OUT_SYSTEM_EXT)/framework
|
|
|
|
TARGET_OUT_SYSTEM_EXT_APPS := $(target_out_system_ext_app_base)/app
|
|
|
|
TARGET_OUT_SYSTEM_EXT_APPS_PRIVILEGED := $(target_out_system_ext_app_base)/priv-app
|
|
|
|
TARGET_OUT_SYSTEM_EXT_ETC := $(TARGET_OUT_SYSTEM_EXT)/etc
|
2019-08-20 12:24:43 +02:00
|
|
|
TARGET_OUT_SYSTEM_EXT_EXECUTABLES := $(TARGET_OUT_SYSTEM_EXT)/bin
|
2024-03-18 20:37:41 +01:00
|
|
|
TARGET_OUT_SYSTEM_EXT_FAKE := $(PRODUCT_OUT)/system_ext_fake_packages
|
2019-08-20 12:24:43 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_SYSTEM_EXT_EXECUTABLES \
|
|
|
|
TARGET_OUT_SYSTEM_EXT_SHARED_LIBRARIES \
|
|
|
|
TARGET_OUT_SYSTEM_EXT_JAVA_LIBRARIES \
|
|
|
|
TARGET_OUT_SYSTEM_EXT_APPS \
|
|
|
|
TARGET_OUT_SYSTEM_EXT_APPS_PRIVILEGED \
|
2024-03-18 20:37:41 +01:00
|
|
|
TARGET_OUT_SYSTEM_EXT_ETC \
|
|
|
|
TARGET_OUT_SYSTEM_EXT_FAKE
|
2019-08-20 12:24:43 +02:00
|
|
|
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_EXECUTABLES := $(TARGET_OUT_SYSTEM_EXT_EXECUTABLES)
|
2019-06-25 08:58:13 +02:00
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_SHARED_LIBRARIES := $(target_out_system_ext_shared_libraries_base)/lib
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_APPS := $(TARGET_OUT_SYSTEM_EXT_APPS)
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_APPS_PRIVILEGED := $(TARGET_OUT_SYSTEM_EXT_APPS_PRIVILEGED)
|
2019-08-20 12:24:43 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_EXECUTABLES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_SHARED_LIBRARIES \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_APPS \
|
|
|
|
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_OUT_SYSTEM_EXT_APPS_PRIVILEGED
|
2018-05-29 14:09:01 +02:00
|
|
|
|
2015-09-25 03:12:33 +02:00
|
|
|
TARGET_OUT_BREAKPAD := $(PRODUCT_OUT)/breakpad
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := TARGET_OUT_BREAKPAD
|
2015-09-25 03:12:33 +02:00
|
|
|
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_OUT_UNSTRIPPED := $(PRODUCT_OUT)/symbols
|
|
|
|
TARGET_OUT_EXECUTABLES_UNSTRIPPED := $(TARGET_OUT_UNSTRIPPED)/system/bin
|
|
|
|
TARGET_OUT_SHARED_LIBRARIES_UNSTRIPPED := $(TARGET_OUT_UNSTRIPPED)/system/lib
|
2014-06-20 22:33:36 +02:00
|
|
|
TARGET_OUT_VENDOR_SHARED_LIBRARIES_UNSTRIPPED := $(TARGET_OUT_UNSTRIPPED)/$(TARGET_COPY_OUT_VENDOR)/lib
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_ROOT_OUT_UNSTRIPPED := $(TARGET_OUT_UNSTRIPPED)
|
|
|
|
TARGET_ROOT_OUT_BIN_UNSTRIPPED := $(TARGET_OUT_UNSTRIPPED)/bin
|
2016-09-16 02:32:13 +02:00
|
|
|
TARGET_OUT_COVERAGE := $(PRODUCT_OUT)/coverage
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_OUT_UNSTRIPPED \
|
|
|
|
TARGET_OUT_EXECUTABLES_UNSTRIPPED \
|
|
|
|
TARGET_OUT_SHARED_LIBRARIES_UNSTRIPPED \
|
|
|
|
TARGET_OUT_VENDOR_SHARED_LIBRARIES_UNSTRIPPED \
|
|
|
|
TARGET_ROOT_OUT_UNSTRIPPED \
|
|
|
|
TARGET_ROOT_OUT_BIN_UNSTRIPPED \
|
|
|
|
TARGET_OUT_COVERAGE
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2018-08-09 23:26:00 +02:00
|
|
|
TARGET_RAMDISK_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_RAMDISK)
|
|
|
|
TARGET_RAMDISK_OUT_UNSTRIPPED := $(TARGET_OUT_UNSTRIPPED)
|
Adding boot-debug.img and ramdisk-debug.img
The two new debugging images adds additional files based on
boot.img and ramdisk.img/ramdisk-recovery.img, respectively.
File /force_debuggable is to trigger special logic in /init to load an
userdebug version of sepolicy and an additional property file from this
ramdisk to allow adb root, if the device is unlocked.
It's intentional to skip signing for boot-debug.img, as it can
only be used if the device is unlocked, where verification error
is allowed.
Those debugging images allows adb root on user build
system.img, vendor.img, product.img, etc. This can facilitate more
automated testings on user builds and is helpful to narrow down the
delta between what's being tested v.s. what's being shipped.
Bug: 126493225
Test: `make dist`, checks both boot-debug.img and ramdisk-debug.img
are in $OUT/ and out/dist.
Test: `make dist`, checks installed-files-ramdisk-debug.{json,txt} are
in out/dist.
Test: `system/core/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-debug.img`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-debug.img and $OUT/boot.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk ./ramdisk-debug`
Test: `make ramdisk_debug-nodeps` and `make bootimage_debug-nodeps`
Change-Id: I30137c3caef91805d9143d404e5e4d06c0fccc30
2019-03-20 10:59:52 +01:00
|
|
|
TARGET_DEBUG_RAMDISK_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_DEBUG_RAMDISK)
|
2020-02-14 12:00:15 +01:00
|
|
|
TARGET_VENDOR_DEBUG_RAMDISK_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_VENDOR_DEBUG_RAMDISK)
|
Adding boot-test-harness.img
In commit I30137c3caef91805d9143d404e5e4d06c0fccc30, we added
a boot-debug.img to allow adb root when using an user build GSI image.
However, to run automated tests, it requires additional properties,
which are not needed for GSI compliance:
ro.audio.silent=1
ro.test_harness=1
This CL adds an additional boot-test-harness.img for automated tests,
and keeps the original boot-debug.img for GSI compliance.
Note: boot-test-harness.img won't be built by default, it needs
explicit `make bootimage_test_harness`.
Bug: 140036184
Test: `m bootimage_test_harness`, flashes boot-test-harness.img and checks
adb root works and test harness props are set.
Test: `m bootimage_test_harness dist -j32`, checks both
boot-test-harness.img and ramdisk-test-harness.img are under ./out/dist/.
Test: `system/tools/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-test-harness.img --out ramdisk-test-harness`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-test-harness.img and $OUT/boot-debug.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk-test-harness ./ramdisk-debug`
Test: `m ramdisk_test_harness-nodeps` and `m bootimage_test_harness-nodeps`
Change-Id: Iadea0b5c933c3b7fa10dcf3d9e85596916b3333d
2019-10-08 04:22:19 +02:00
|
|
|
TARGET_TEST_HARNESS_RAMDISK_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_TEST_HARNESS_RAMDISK)
|
2018-08-09 23:26:00 +02:00
|
|
|
|
2022-01-20 07:43:09 +01:00
|
|
|
TARGET_SYSTEM_DLKM_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_SYSTEM_DLKM)
|
|
|
|
.KATI_READONLY := TARGET_SYSTEM_DLKM_OUT
|
|
|
|
|
2019-07-10 19:49:37 +02:00
|
|
|
TARGET_VENDOR_RAMDISK_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_VENDOR_RAMDISK)
|
2022-02-24 03:30:15 +01:00
|
|
|
TARGET_VENDOR_KERNEL_RAMDISK_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_VENDOR_KERNEL_RAMDISK)
|
2019-07-10 19:49:37 +02:00
|
|
|
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_ROOT_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_ROOT)
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_ROOT_OUT_BIN := $(TARGET_ROOT_OUT)/bin
|
|
|
|
TARGET_ROOT_OUT_ETC := $(TARGET_ROOT_OUT)/etc
|
|
|
|
TARGET_ROOT_OUT_USR := $(TARGET_ROOT_OUT)/usr
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_ROOT_OUT \
|
|
|
|
TARGET_ROOT_OUT_BIN \
|
|
|
|
TARGET_ROOT_OUT_ETC \
|
|
|
|
TARGET_ROOT_OUT_USR
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2011-10-28 00:18:39 +02:00
|
|
|
TARGET_RECOVERY_OUT := $(PRODUCT_OUT)/$(TARGET_COPY_OUT_RECOVERY)
|
2009-03-04 04:28:42 +01:00
|
|
|
TARGET_RECOVERY_ROOT_OUT := $(TARGET_RECOVERY_OUT)/root
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_RECOVERY_OUT \
|
|
|
|
TARGET_RECOVERY_ROOT_OUT
|
2009-03-04 04:28:42 +01:00
|
|
|
|
|
|
|
TARGET_SYSLOADER_OUT := $(PRODUCT_OUT)/sysloader
|
|
|
|
TARGET_SYSLOADER_ROOT_OUT := $(TARGET_SYSLOADER_OUT)/root
|
|
|
|
TARGET_SYSLOADER_SYSTEM_OUT := $(TARGET_SYSLOADER_OUT)/root/system
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_SYSLOADER_OUT \
|
|
|
|
TARGET_SYSLOADER_ROOT_OUT \
|
|
|
|
TARGET_SYSLOADER_SYSTEM_OUT
|
2009-03-04 04:28:42 +01:00
|
|
|
|
|
|
|
TARGET_INSTALLER_OUT := $(PRODUCT_OUT)/installer
|
|
|
|
TARGET_INSTALLER_DATA_OUT := $(TARGET_INSTALLER_OUT)/data
|
|
|
|
TARGET_INSTALLER_ROOT_OUT := $(TARGET_INSTALLER_OUT)/root
|
|
|
|
TARGET_INSTALLER_SYSTEM_OUT := $(TARGET_INSTALLER_OUT)/root/system
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := \
|
|
|
|
TARGET_INSTALLER_OUT \
|
|
|
|
TARGET_INSTALLER_DATA_OUT \
|
|
|
|
TARGET_INSTALLER_ROOT_OUT \
|
|
|
|
TARGET_INSTALLER_SYSTEM_OUT
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2020-06-09 06:00:18 +02:00
|
|
|
COMMON_MODULE_CLASSES := TARGET_NOTICE_FILES HOST_NOTICE_FILES HOST_JAVA_LIBRARIES
|
2019-08-27 20:23:35 +02:00
|
|
|
PER_ARCH_MODULE_CLASSES := SHARED_LIBRARIES STATIC_LIBRARIES EXECUTABLES GYP RENDERSCRIPT_BITCODE NATIVE_TESTS HEADER_LIBRARIES RLIB_LIBRARIES DYLIB_LIBRARIES
|
2018-03-28 23:33:10 +02:00
|
|
|
.KATI_READONLY := COMMON_MODULE_CLASSES PER_ARCH_MODULE_CLASSES
|
2009-03-04 04:28:42 +01:00
|
|
|
|
2017-10-12 10:35:14 +02:00
|
|
|
ifeq ($(CALLED_FROM_SETUP),true)
|
2017-02-18 19:32:13 +01:00
|
|
|
PRINT_BUILD_CONFIG ?= true
|
2009-03-04 04:28:42 +01:00
|
|
|
endif
|