blob: bd6af83585ba1dcdd00f247e3cdab6fefee0bc35 [file] [log] [blame]
Chong Zhang9bda4522019-02-27 13:43:50 -08001# Copyright (C) 2019 The Android Open Source Project
2#
3# Bionic loader config file for the media swcodec APEX.
4#
5# There are no versioned APEX paths here - this APEX module does not support
6# having several versions mounted.
7
8dir.swcodec = /apex/com.android.media.swcodec/bin/
9
10[swcodec]
Chong Zhang81468732019-04-02 10:15:38 -070011additional.namespaces = platform,sphal
Chong Zhang9bda4522019-02-27 13:43:50 -080012
13###############################################################################
14# "default" namespace
15#
16# This namespace is for the binaries and libraries on the swcodec APEX.
17###############################################################################
18
19namespace.default.isolated = true
20namespace.default.visible = true
21
22namespace.default.search.paths = /apex/com.android.media.swcodec/${LIB}
23namespace.default.asan.search.paths = /apex/com.android.media.swcodec/${LIB}
24
Jiyong Parkbb8f9852020-01-07 19:54:39 +090025# Below lines are required to be able to access libs in APEXes which are
26# actually symlinks to the files under /system/lib. The symlinks exist for
27# bundled APEXes to reduce space.
28namespace.default.permitted.paths = /system/${LIB}
29namespace.default.asan.permitted.paths = /system/${LIB}
30
Chong Zhang9bda4522019-02-27 13:43:50 -080031namespace.default.links = platform
32
33# TODO: replace the following when apex has a way to auto-generate this list
34# namespace.default.link.platform.shared_libs = %LLNDK_LIBRARIES%
35# namespace.default.link.platform.shared_libs += %SANITIZER_RUNTIME_LIBRARIES%
dimitrya1ce07c2019-04-12 15:04:27 +020036namespace.default.link.platform.shared_libs = libEGL.so:libGLESv1_CM.so:libGLESv2.so:libGLESv3.so:libRS.so:libandroid_net.so:libc.so:libcgrouprc.so:libclang_rt.asan-aarch64-android.so:libclang_rt.asan-arm-android.so:libclang_rt.hwasan-aarch64-android.so:libclang_rt.asan-i686-android.so:libclang_rt.asan-x86_64-android.so:libdl.so:libft2.so:liblog.so:libm.so:libmediandk.so:libnativewindow.so:libneuralnetworks.so:libsync.so:libvndksupport.so:libdl_android.so:libvulkan.so
Chong Zhang9bda4522019-02-27 13:43:50 -080037
38###############################################################################
39# "platform" namespace
40#
41# This namespace is for linking to LLNDK and ASAN libraries on the system.
42###############################################################################
43
44namespace.platform.isolated = true
45
Peter Collingbourne97835e92019-04-25 23:27:18 -070046namespace.platform.search.paths = /system/${LIB}
47namespace.platform.search.paths += /apex/com.android.runtime/${LIB}
Jiyong Park08ad2122019-04-25 12:45:55 +090048namespace.platform.asan.search.paths = /data/asan/system/${LIB}
49namespace.platform.asan.search.paths += /system/${LIB}
Peter Collingbourne97835e92019-04-25 23:27:18 -070050namespace.platform.asan.search.paths += /apex/com.android.runtime/${LIB}
Chong Zhang9bda4522019-02-27 13:43:50 -080051
Dongwon Kang82022c12019-03-18 11:53:26 -070052# /system/lib/libc.so, etc are symlinks to /apex/com.android.lib/lib/bionic/libc.so, etc.
Jooyung Hane485c712019-10-29 05:48:18 +090053# Add /apex/... path to the permitted paths because linker uses realpath(3)
Chong Zhang9bda4522019-02-27 13:43:50 -080054# to check the accessibility of the lib. We could add this to search.paths
55# instead but that makes the resolution of bionic libs be dependent on
Jiyong Parkc21e52b2019-03-09 17:26:48 +090056# the order of /system/lib and /apex/... in search.paths. If /apex/...
57# is after /system/lib, then /apex/... is never tried because libc.so
Chong Zhang9bda4522019-02-27 13:43:50 -080058# is always found in /system/lib but fails to pass the accessibility test
59# because of its realpath. It's better to not depend on the ordering if
60# possible.
Jiyong Parkc21e52b2019-03-09 17:26:48 +090061namespace.platform.permitted.paths = /apex/com.android.runtime/${LIB}/bionic
62namespace.platform.asan.permitted.paths = /apex/com.android.runtime/${LIB}/bionic
Chong Zhang81468732019-04-02 10:15:38 -070063
64###############################################################################
65# "sphal" namespace
66#
67###############################################################################
68namespace.sphal.isolated = true
69namespace.sphal.visible = true
70
71# Keep the below in sync with "sphal" namespace in system's /etc/ld.config.txt
72# Codec2 has dependencies on some SP-hals (eg. android.hardware.graphics.mapper@2.0)
73# These are dlopen'ed by libvndksupport.so.
74namespace.sphal.search.paths = /odm/${LIB}
75namespace.sphal.search.paths += /vendor/${LIB}
76
77namespace.sphal.permitted.paths = /odm/${LIB}
78namespace.sphal.permitted.paths += /vendor/${LIB}
79namespace.sphal.permitted.paths += /vendor/${LIB}/hw
80namespace.sphal.permitted.paths += /system/vendor/${LIB}
81
82namespace.sphal.asan.search.paths = /data/asan/odm/${LIB}
83namespace.sphal.asan.search.paths += /odm/${LIB}
84namespace.sphal.asan.search.paths += /data/asan/vendor/${LIB}
85namespace.sphal.asan.search.paths += /vendor/${LIB}
86
87namespace.sphal.asan.permitted.paths = /data/asan/odm/${LIB}
88namespace.sphal.asan.permitted.paths += /odm/${LIB}
89namespace.sphal.asan.permitted.paths += /data/asan/vendor/${LIB}
90namespace.sphal.asan.permitted.paths += /vendor/${LIB}
91
92# Keep the below in sync with "vndk" namespace in system's /etc/ld.config.txt
93# System's sphal namespace links to vndk namespace for %VNDK_SAMEPROCESS_LIBRARIES%,
94# since we don't have a good way to auto-expand %VNDK_SAMEPROCESS_LIBRARIES%,
95# we'll add the vndk paths below.
96
97namespace.sphal.search.paths += /odm/${LIB}/vndk-sp
98namespace.sphal.search.paths += /vendor/${LIB}/vndk-sp
Jooyung Hane23a2992019-10-16 22:42:56 +000099namespace.sphal.search.paths += /system/${LIB}/vndk-sp${VNDK_VER}
Chong Zhang81468732019-04-02 10:15:38 -0700100
101namespace.sphal.permitted.paths += /odm/${LIB}/hw
102namespace.sphal.permitted.paths += /odm/${LIB}/egl
103namespace.sphal.permitted.paths += /vendor/${LIB}/hw
104namespace.sphal.permitted.paths += /vendor/${LIB}/egl
105namespace.sphal.permitted.paths += /system/vendor/${LIB}/hw
106namespace.sphal.permitted.paths += /system/vendor/${LIB}/egl
107# This is exceptionally required since android.hidl.memory@1.0-impl.so is here
Jooyung Hane23a2992019-10-16 22:42:56 +0000108namespace.sphal.permitted.paths += /system/${LIB}/vndk-sp${VNDK_VER}/hw
Chong Zhang81468732019-04-02 10:15:38 -0700109
110namespace.sphal.asan.search.paths += /data/asan/odm/${LIB}/vndk-sp
111namespace.sphal.asan.search.paths += /odm/${LIB}/vndk-sp
112namespace.sphal.asan.search.paths += /data/asan/vendor/${LIB}/vndk-sp
113namespace.sphal.asan.search.paths += /vendor/${LIB}/vndk-sp
Jooyung Hane23a2992019-10-16 22:42:56 +0000114namespace.sphal.asan.search.paths += /data/asan/system/${LIB}/vndk-sp${VNDK_VER}
115namespace.sphal.asan.search.paths += /system/${LIB}/vndk-sp${VNDK_VER}
Chong Zhang81468732019-04-02 10:15:38 -0700116
117namespace.sphal.asan.permitted.paths += /data/asan/odm/${LIB}/hw
118namespace.sphal.asan.permitted.paths += /odm/${LIB}/hw
119namespace.sphal.asan.permitted.paths += /data/asan/odm/${LIB}/egl
120namespace.sphal.asan.permitted.paths += /odm/${LIB}/egl
121namespace.sphal.asan.permitted.paths += /data/asan/vendor/${LIB}/hw
122namespace.sphal.asan.permitted.paths += /vendor/${LIB}/hw
123namespace.sphal.asan.permitted.paths += /data/asan/vendor/${LIB}/egl
124namespace.sphal.asan.permitted.paths += /vendor/${LIB}/egl
125
Jooyung Hane23a2992019-10-16 22:42:56 +0000126namespace.sphal.asan.permitted.paths += /data/asan/system/${LIB}/vndk-sp${VNDK_VER}/hw
127namespace.sphal.asan.permitted.paths += /system/${LIB}/vndk-sp${VNDK_VER}/hw
Chong Zhang81468732019-04-02 10:15:38 -0700128
129# Once in this namespace, access to libraries in /system/lib is restricted. Only
130# libs listed here can be used.
131namespace.sphal.links = platform
132
133# TODO: replace the following when apex has a way to auto-generate this list
134# namespace.sphal.link.platform.shared_libs = %LLNDK_LIBRARIES%
135# namespace.sphal.link.platform.shared_libs += %SANITIZER_RUNTIME_LIBRARIES%
136namespace.sphal.link.platform.shared_libs = libEGL.so:libGLESv1_CM.so:libGLESv2.so:libGLESv3.so:libRS.so:libandroid_net.so:libc.so:libcgrouprc.so:libclang_rt.asan-aarch64-android.so:libclang_rt.asan-arm-android.so:libclang_rt.hwasan-aarch64-android.so:libclang_rt.asan-i686-android.so:libclang_rt.asan-x86_64-android.so:libdl.so:libft2.so:liblog.so:libm.so:libmediandk.so:libnativewindow.so:libneuralnetworks.so:libsync.so:libvndksupport.so:libvulkan.so
137
Dongwon Kang3ac37142019-05-24 20:58:09 -0700138# Add a link for libz.so which is llndk on devices where VNDK is not enforced.
139namespace.sphal.link.platform.shared_libs += libz.so
Jooyung Hane485c712019-10-29 05:48:18 +0900140
141# With VNDK APEX, /system/${LIB}/vndk-sp${VNDK_VER} is a symlink to the following.
142# Add /apex/... path to the permitted paths because linker uses realpath(3)
143# to check the accessibility of the lib.
144namespace.sphal.permitted.paths += /apex/com.android.vndk.${VNDK_APEX_VER}/${LIB}
145namespace.sphal.asan.permitted.paths += /apex/com.android.vndk.${VNDK_APEX_VER}/${LIB}