|
|
|
@ -380,7 +380,7 @@ KNOWN_OEM_THUMBPRINT_PROPERTIES := \
|
|
|
|
|
ro.product.name \
|
|
|
|
|
ro.product.device
|
|
|
|
|
OEM_THUMBPRINT_PROPERTIES := $(filter $(KNOWN_OEM_THUMBPRINT_PROPERTIES),\
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_OEM_PROPERTIES))
|
|
|
|
|
$(PRODUCT_OEM_PROPERTIES))
|
|
|
|
|
|
|
|
|
|
# Display parameters shown under Settings -> About Phone
|
|
|
|
|
ifeq ($(TARGET_BUILD_VARIANT),user)
|
|
|
|
@ -426,11 +426,11 @@ $(intermediate_system_build_prop): $(BUILDINFO_SH) $(BUILDINFO_COMMON_SH) $(INTE
|
|
|
|
|
@echo Target buildinfo: $@
|
|
|
|
|
@mkdir -p $(dir $@)
|
|
|
|
|
$(hide) echo > $@
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_OEM_PROPERTIES),)
|
|
|
|
|
ifneq ($(PRODUCT_OEM_PROPERTIES),)
|
|
|
|
|
$(hide) echo "#" >> $@; \
|
|
|
|
|
echo "# PRODUCT_OEM_PROPERTIES" >> $@; \
|
|
|
|
|
echo "#" >> $@;
|
|
|
|
|
$(hide) $(foreach prop,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_OEM_PROPERTIES), \
|
|
|
|
|
$(hide) $(foreach prop,$(PRODUCT_OEM_PROPERTIES), \
|
|
|
|
|
echo "import /oem/oem.prop $(prop)" >> $@;)
|
|
|
|
|
endif
|
|
|
|
|
$(hide) PRODUCT_BRAND="$(PRODUCT_SYSTEM_BRAND)" \
|
|
|
|
@ -488,7 +488,7 @@ endif
|
|
|
|
|
$(hide) $(foreach line,$(FINAL_BUILD_PROPERTIES), \
|
|
|
|
|
echo "$(line)" >> $@;)
|
|
|
|
|
$(hide) cat $(INSTALLED_ANDROID_INFO_TXT_TARGET) | grep 'require version-' | sed -e 's/require version-/ro.build.expect./g' >> $@
|
|
|
|
|
$(hide) build/make/tools/post_process_props.py $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_PROPERTY_BLACKLIST)
|
|
|
|
|
$(hide) build/make/tools/post_process_props.py $@ $(PRODUCT_SYSTEM_PROPERTY_BLACKLIST)
|
|
|
|
|
|
|
|
|
|
build_desc :=
|
|
|
|
|
|
|
|
|
@ -535,7 +535,7 @@ ifdef property_overrides_split_enabled
|
|
|
|
|
$(hide) $(foreach line,$(FINAL_VENDOR_BUILD_PROPERTIES), \
|
|
|
|
|
echo "$(line)" >> $@;)
|
|
|
|
|
endif # property_overrides_split_enabled
|
|
|
|
|
$(hide) build/make/tools/post_process_props.py $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_PROPERTY_BLACKLIST)
|
|
|
|
|
$(hide) build/make/tools/post_process_props.py $@ $(PRODUCT_VENDOR_PROPERTY_BLACKLIST)
|
|
|
|
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
|
|
|
# product build.prop
|
|
|
|
@ -819,7 +819,7 @@ $(all_event_log_tags_file): $(all_event_log_tags_src) $(pdk_fusion_log_tags_file
|
|
|
|
|
# directory).
|
|
|
|
|
event_log_tags_src := \
|
|
|
|
|
$(sort $(foreach m,\
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PACKAGES) \
|
|
|
|
|
$(PRODUCT_PACKAGES) \
|
|
|
|
|
$(call module-names-for-tag-list,user), \
|
|
|
|
|
$(ALL_MODULES.$(m).EVENT_LOG_TAGS)) \
|
|
|
|
|
$(filter-out vendor/% device/% out/%,$(all_event_log_tags_src)))
|
|
|
|
@ -945,9 +945,9 @@ ifdef BOARD_KERNEL_PAGESIZE
|
|
|
|
|
INTERNAL_BOOTIMAGE_ARGS += --pagesize $(BOARD_KERNEL_PAGESIZE)
|
|
|
|
|
endif
|
|
|
|
|
|
|
|
|
|
ifeq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),true)
|
|
|
|
|
ifeq ($(PRODUCT_SUPPORTS_VERITY),true)
|
|
|
|
|
ifeq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
|
|
|
VERITY_KEYID := veritykeyid=id:`openssl x509 -in $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem -text \
|
|
|
|
|
VERITY_KEYID := veritykeyid=id:`openssl x509 -in $(PRODUCT_VERITY_SIGNING_KEY).x509.pem -text \
|
|
|
|
|
| grep keyid | sed 's/://g' | tr -d '[:space:]' | tr '[:upper:]' '[:lower:]' | sed 's/keyid//g'`
|
|
|
|
|
endif
|
|
|
|
|
endif
|
|
|
|
@ -989,34 +989,34 @@ bootimage-nodeps: $(MKBOOTIMG) $(AVBTOOL) $(BOARD_AVB_BOOT_KEY_PATH)
|
|
|
|
|
--partition_name boot $(INTERNAL_AVB_BOOT_SIGNING_ARGS) \
|
|
|
|
|
$(BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS)
|
|
|
|
|
|
|
|
|
|
else ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER)) # BOARD_AVB_ENABLE != true
|
|
|
|
|
else ifeq (true,$(PRODUCT_SUPPORTS_BOOT_SIGNER)) # BOARD_AVB_ENABLE != true
|
|
|
|
|
|
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_FILES) $(BOOT_SIGNER)
|
|
|
|
|
$(call pretty,"Target boot image: $@")
|
|
|
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $@
|
|
|
|
|
$(BOOT_SIGNER) /boot $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $@
|
|
|
|
|
$(BOOT_SIGNER) /boot $@ $(PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCT_VERITY_SIGNING_KEY).x509.pem $@
|
|
|
|
|
$(hide) $(call assert-max-image-size,$@,$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
|
|
|
|
|
|
.PHONY: bootimage-nodeps
|
|
|
|
|
bootimage-nodeps: $(MKBOOTIMG) $(BOOT_SIGNER)
|
|
|
|
|
@echo "make $@: ignoring dependencies"
|
|
|
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(INSTALLED_BOOTIMAGE_TARGET)
|
|
|
|
|
$(BOOT_SIGNER) /boot $(INSTALLED_BOOTIMAGE_TARGET) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(INSTALLED_BOOTIMAGE_TARGET)
|
|
|
|
|
$(BOOT_SIGNER) /boot $(INSTALLED_BOOTIMAGE_TARGET) $(PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCT_VERITY_SIGNING_KEY).x509.pem $(INSTALLED_BOOTIMAGE_TARGET)
|
|
|
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_BOOTIMAGE_TARGET),$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
|
|
|
|
|
|
else ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)) # PRODUCT_SUPPORTS_BOOT_SIGNER != true
|
|
|
|
|
else ifeq (true,$(PRODUCT_SUPPORTS_VBOOT)) # PRODUCT_SUPPORTS_BOOT_SIGNER != true
|
|
|
|
|
|
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_FILES) $(VBOOT_SIGNER) $(FUTILITY)
|
|
|
|
|
$(call pretty,"Target boot image: $@")
|
|
|
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $@.unsigned
|
|
|
|
|
$(VBOOT_SIGNER) $(FUTILITY) $@.unsigned $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $@.keyblock $@
|
|
|
|
|
$(VBOOT_SIGNER) $(FUTILITY) $@.unsigned $(PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $@.keyblock $@
|
|
|
|
|
$(hide) $(call assert-max-image-size,$@,$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
|
|
|
|
|
|
.PHONY: bootimage-nodeps
|
|
|
|
|
bootimage-nodeps: $(MKBOOTIMG) $(VBOOT_SIGNER) $(FUTILITY)
|
|
|
|
|
@echo "make $@: ignoring dependencies"
|
|
|
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(INSTALLED_BOOTIMAGE_TARGET).unsigned
|
|
|
|
|
$(VBOOT_SIGNER) $(FUTILITY) $(INSTALLED_BOOTIMAGE_TARGET).unsigned $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $(INSTALLED_BOOTIMAGE_TARGET).keyblock $(INSTALLED_BOOTIMAGE_TARGET)
|
|
|
|
|
$(VBOOT_SIGNER) $(FUTILITY) $(INSTALLED_BOOTIMAGE_TARGET).unsigned $(PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $(INSTALLED_BOOTIMAGE_TARGET).keyblock $(INSTALLED_BOOTIMAGE_TARGET)
|
|
|
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_BOOTIMAGE_TARGET),$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
|
|
|
|
|
|
else # PRODUCT_SUPPORTS_VBOOT != true
|
|
|
|
@ -1327,9 +1327,9 @@ endif
|
|
|
|
|
|
|
|
|
|
INTERNAL_USERIMAGES_BINARY_PATHS := $(sort $(dir $(INTERNAL_USERIMAGES_DEPS)))
|
|
|
|
|
|
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY))
|
|
|
|
|
ifeq (true,$(PRODUCT_SUPPORTS_VERITY))
|
|
|
|
|
INTERNAL_USERIMAGES_DEPS += $(BUILD_VERITY_METADATA) $(BUILD_VERITY_TREE) $(APPEND2SIMG) $(VERITY_SIGNER)
|
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY_FEC))
|
|
|
|
|
ifeq (true,$(PRODUCT_SUPPORTS_VERITY_FEC))
|
|
|
|
|
INTERNAL_USERIMAGES_DEPS += $(FEC)
|
|
|
|
|
endif
|
|
|
|
|
endif
|
|
|
|
@ -1343,7 +1343,7 @@ INTERNAL_USERIMAGES_DEPS += $(MKE2FS_CONF)
|
|
|
|
|
|
|
|
|
|
ifeq (true,$(PRODUCT_USE_DYNAMIC_PARTITIONS))
|
|
|
|
|
|
|
|
|
|
ifeq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),true)
|
|
|
|
|
ifeq ($(PRODUCT_SUPPORTS_VERITY),true)
|
|
|
|
|
$(error vboot 1.0 doesn't support logical partition)
|
|
|
|
|
endif
|
|
|
|
|
|
|
|
|
@ -1367,8 +1367,8 @@ $(if $(filter $(2),system),\
|
|
|
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "system_squashfs_compressor_opt=$(BOARD_SYSTEMIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
|
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "system_squashfs_block_size=$(BOARD_SYSTEMIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
|
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "system_squashfs_disable_4k_align=$(BOARD_SYSTEMIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH),$(hide) echo "system_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_HEADROOM),$(hide) echo "system_headroom=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_HEADROOM)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SYSTEM_BASE_FS_PATH),$(hide) echo "system_base_fs_file=$(PRODUCT_SYSTEM_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SYSTEM_HEADROOM),$(hide) echo "system_headroom=$(PRODUCT_SYSTEM_HEADROOM)" >> $(1))
|
|
|
|
|
$(if $(BOARD_SYSTEMIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "system_reserved_size=$(BOARD_SYSTEMIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
|
|
|
)
|
|
|
|
|
$(if $(filter $(2),userdata),\
|
|
|
|
@ -1389,7 +1389,7 @@ $(if $(filter $(2),vendor),\
|
|
|
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "vendor_squashfs_compressor_opt=$(BOARD_VENDORIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
|
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "vendor_squashfs_block_size=$(BOARD_VENDORIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
|
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "vendor_squashfs_disable_4k_align=$(BOARD_VENDORIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH),$(hide) echo "vendor_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_VENDOR_BASE_FS_PATH),$(hide) echo "vendor_base_fs_file=$(PRODUCT_VENDOR_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(BOARD_VENDORIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "vendor_reserved_size=$(BOARD_VENDORIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
|
|
|
)
|
|
|
|
|
$(if $(filter $(2),product),\
|
|
|
|
@ -1402,7 +1402,7 @@ $(if $(filter $(2),product),\
|
|
|
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "product_squashfs_compressor_opt=$(BOARD_PRODUCTIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
|
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "product_squashfs_block_size=$(BOARD_PRODUCTIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
|
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "product_squashfs_disable_4k_align=$(BOARD_PRODUCTIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH),$(hide) echo "product_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_PRODUCT_BASE_FS_PATH),$(hide) echo "product_base_fs_file=$(PRODUCT_PRODUCT_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(BOARD_PRODUCTIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "product_reserved_size=$(BOARD_PRODUCTIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
|
|
|
)
|
|
|
|
|
$(if $(filter $(2),product_services),\
|
|
|
|
@ -1427,7 +1427,7 @@ $(if $(filter $(2),odm),\
|
|
|
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "odm_squashfs_compressor_opt=$(BOARD_ODMIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
|
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "odm_squashfs_block_size=$(BOARD_ODMIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
|
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "odm_squashfs_disable_4k_align=$(BOARD_ODMIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH),$(hide) echo "odm_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_ODM_BASE_FS_PATH),$(hide) echo "odm_base_fs_file=$(PRODUCT_ODM_BASE_FS_PATH)" >> $(1))
|
|
|
|
|
$(if $(BOARD_ODMIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "odm_reserved_size=$(BOARD_ODMIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
|
|
|
)
|
|
|
|
|
$(if $(filter $(2),oem),\
|
|
|
|
@ -1445,21 +1445,21 @@ $(if $(BOARD_EXT4_SHARE_DUP_BLOCKS),$(hide) echo "ext4_share_dup_blocks=$(BOARD_
|
|
|
|
|
$(if $(BOARD_FLASH_LOGICAL_BLOCK_SIZE), $(hide) echo "flash_logical_block_size=$(BOARD_FLASH_LOGICAL_BLOCK_SIZE)" >> $(1))
|
|
|
|
|
$(if $(BOARD_FLASH_ERASE_BLOCK_SIZE), $(hide) echo "flash_erase_block_size=$(BOARD_FLASH_ERASE_BLOCK_SIZE)" >> $(1))
|
|
|
|
|
$(hide) echo "selinux_fc=$(SELINUX_FC)" >> $(1)
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER),$(hide) echo "boot_signer=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity_key=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity_signer_cmd=$(notdir $(VERITY_SIGNER))" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY_FEC),$(hide) echo "verity_fec=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY_FEC)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_BOOT_SIGNER),$(hide) echo "boot_signer=$(PRODUCT_SUPPORTS_BOOT_SIGNER)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity=$(PRODUCT_SUPPORTS_VERITY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity_key=$(PRODUCT_VERITY_SIGNING_KEY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity_signer_cmd=$(notdir $(VERITY_SIGNER))" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VERITY_FEC),$(hide) echo "verity_fec=$(PRODUCT_SUPPORTS_VERITY_FEC)" >> $(1))
|
|
|
|
|
$(if $(filter eng, $(TARGET_BUILD_VARIANT)),$(hide) echo "verity_disable=true" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_VERITY_PARTITION),$(hide) echo "system_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_VERITY_PARTITION),$(hide) echo "vendor_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_VERITY_PARTITION),$(hide) echo "product_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_VERITY_PARTITION),$(hide) echo "product_services_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_key=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_subkey=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "futility=$(notdir $(FUTILITY))" >> $(1))
|
|
|
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_signer_cmd=$(VBOOT_SIGNER)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SYSTEM_VERITY_PARTITION),$(hide) echo "system_verity_block_device=$(PRODUCT_SYSTEM_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_VENDOR_VERITY_PARTITION),$(hide) echo "vendor_verity_block_device=$(PRODUCT_VENDOR_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_PRODUCT_VERITY_PARTITION),$(hide) echo "product_verity_block_device=$(PRODUCT_PRODUCT_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_PRODUCT_SERVICES_VERITY_PARTITION),$(hide) echo "product_services_verity_block_device=$(PRODUCT_PRODUCT_SERVICES_VERITY_PARTITION)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot=$(PRODUCT_SUPPORTS_VBOOT)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_key=$(PRODUCT_VBOOT_SIGNING_KEY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_subkey=$(PRODUCT_VBOOT_SIGNING_SUBKEY)" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VBOOT),$(hide) echo "futility=$(notdir $(FUTILITY))" >> $(1))
|
|
|
|
|
$(if $(PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_signer_cmd=$(VBOOT_SIGNER)" >> $(1))
|
|
|
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_avbtool=$(notdir $(AVBTOOL))" >> $(1))
|
|
|
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_system_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
|
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_system_add_hashtree_footer_args=$(BOARD_AVB_SYSTEM_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
|
|
@ -1900,17 +1900,17 @@ define build-recoveryimage-target
|
|
|
|
|
$(hide) ln -sf prop.default $(TARGET_RECOVERY_ROOT_OUT)/default.prop
|
|
|
|
|
$(BOARD_RECOVERY_IMAGE_PREPARE)
|
|
|
|
|
$(hide) $(MKBOOTFS) -d $(TARGET_OUT) $(TARGET_RECOVERY_ROOT_OUT) | $(MINIGZIP) > $(recovery_ramdisk)
|
|
|
|
|
$(if $(filter true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)), \
|
|
|
|
|
$(if $(filter true,$(PRODUCT_SUPPORTS_VBOOT)), \
|
|
|
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_RECOVERYIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(1).unsigned, \
|
|
|
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_RECOVERYIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(1) --id > $(RECOVERYIMAGE_ID_FILE))
|
|
|
|
|
$(if $(filter true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER)),\
|
|
|
|
|
$(if $(filter true,$(PRODUCT_SUPPORTS_BOOT_SIGNER)),\
|
|
|
|
|
$(if $(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)),\
|
|
|
|
|
$(BOOT_SIGNER) /boot $(1) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(1),\
|
|
|
|
|
$(BOOT_SIGNER) /recovery $(1) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(1)\
|
|
|
|
|
$(BOOT_SIGNER) /boot $(1) $(PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCT_VERITY_SIGNING_KEY).x509.pem $(1),\
|
|
|
|
|
$(BOOT_SIGNER) /recovery $(1) $(PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCT_VERITY_SIGNING_KEY).x509.pem $(1)\
|
|
|
|
|
)\
|
|
|
|
|
)
|
|
|
|
|
$(if $(filter true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)), \
|
|
|
|
|
$(VBOOT_SIGNER) $(FUTILITY) $(1).unsigned $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $(1).keyblock $(1))
|
|
|
|
|
$(if $(filter true,$(PRODUCT_SUPPORTS_VBOOT)), \
|
|
|
|
|
$(VBOOT_SIGNER) $(FUTILITY) $(1).unsigned $(PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $(1).keyblock $(1))
|
|
|
|
|
$(if $(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)), \
|
|
|
|
|
$(hide) $(call assert-max-image-size,$(1),$(call get-hash-image-max-size,$(BOARD_BOOTIMAGE_PARTITION_SIZE))), \
|
|
|
|
|
$(hide) $(call assert-max-image-size,$(1),$(call get-hash-image-max-size,$(BOARD_RECOVERYIMAGE_PARTITION_SIZE))))
|
|
|
|
@ -1921,10 +1921,10 @@ define build-recoveryimage-target
|
|
|
|
|
endef
|
|
|
|
|
|
|
|
|
|
ifeq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER))
|
|
|
|
|
ifeq (true,$(PRODUCT_SUPPORTS_BOOT_SIGNER))
|
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET) : $(BOOT_SIGNER)
|
|
|
|
|
endif
|
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT))
|
|
|
|
|
ifeq (true,$(PRODUCT_SUPPORTS_VBOOT))
|
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET) : $(VBOOT_SIGNER)
|
|
|
|
|
endif
|
|
|
|
|
ifeq (true,$(BOARD_AVB_ENABLE))
|
|
|
|
@ -2714,7 +2714,7 @@ INTERNAL_VENDORIMAGE_FILES := \
|
|
|
|
|
# image which defines a vintf_fragment.
|
|
|
|
|
ifdef BUILT_VENDOR_MANIFEST
|
|
|
|
|
BUILT_ASSEMBLED_VENDOR_MANIFEST := $(PRODUCT_OUT)/verified_assembled_vendor_manifest.xml
|
|
|
|
|
ifeq (true,$(strip $(PRODUCT_ENFORCE_VINTF_MANIFEST)))
|
|
|
|
|
ifeq (true,$(PRODUCT_ENFORCE_VINTF_MANIFEST))
|
|
|
|
|
ifneq ($(strip $(DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE) $(DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE)),)
|
|
|
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): PRIVATE_SYSTEM_ASSEMBLE_VINTF_ENV_VARS := VINTF_ENFORCE_NO_UNUSED_HALS=true
|
|
|
|
|
endif # DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE or DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE
|
|
|
|
@ -3550,7 +3550,7 @@ OTATOOLS := $(HOST_OUT_EXECUTABLES)/minigzip \
|
|
|
|
|
$(BUILD_VERITY_METADATA) \
|
|
|
|
|
$(BUILD_VERITY_TREE)
|
|
|
|
|
|
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT))
|
|
|
|
|
ifeq (true,$(PRODUCT_SUPPORTS_VBOOT))
|
|
|
|
|
OTATOOLS += \
|
|
|
|
|
$(FUTILITY) \
|
|
|
|
|
$(VBOOT_SIGNER)
|
|
|
|
@ -3620,7 +3620,7 @@ endif
|
|
|
|
|
OTATOOLS_RELEASETOOLS := \
|
|
|
|
|
$(sort $(shell find build/make/tools/releasetools -name "*.pyc" -prune -o -type f))
|
|
|
|
|
|
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT))
|
|
|
|
|
ifeq (true,$(PRODUCT_SUPPORTS_VBOOT))
|
|
|
|
|
OTATOOLS_DEPS += \
|
|
|
|
|
$(sort $(shell find external/vboot_reference/tests/devkeys -type f))
|
|
|
|
|
endif
|
|
|
|
@ -3770,11 +3770,11 @@ $(BUILT_TARGET_FILES_PACKAGE): \
|
|
|
|
|
$(BOARD_PREBUILT_DTBOIMAGE) \
|
|
|
|
|
$(BOARD_PREBUILT_RECOVERY_DTBOIMAGE) \
|
|
|
|
|
$(BOARD_RECOVERY_ACPIO) \
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCT_SYSTEM_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCT_VENDOR_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCT_PRODUCT_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH) \
|
|
|
|
|
$(PRODUCT_ODM_BASE_FS_PATH) \
|
|
|
|
|
$(LPMAKE) \
|
|
|
|
|
$(SELINUX_FC) \
|
|
|
|
|
$(APKCERTS_FILE) \
|
|
|
|
@ -3957,25 +3957,25 @@ ifneq ($(OEM_THUMBPRINT_PROPERTIES),)
|
|
|
|
|
# OTA scripts are only interested in fingerprint related properties
|
|
|
|
|
$(hide) echo "oem_fingerprint_properties=$(OEM_THUMBPRINT_PROPERTIES)" >> $(zip_root)/META/misc_info.txt
|
|
|
|
|
endif
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH))
|
|
|
|
|
ifneq ($(PRODUCT_SYSTEM_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCT_SYSTEM_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCT_SYSTEM_BASE_FS_PATH))
|
|
|
|
|
endif
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH))
|
|
|
|
|
ifneq ($(PRODUCT_VENDOR_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCT_VENDOR_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCT_VENDOR_BASE_FS_PATH))
|
|
|
|
|
endif
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH))
|
|
|
|
|
ifneq ($(PRODUCT_PRODUCT_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCT_PRODUCT_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCT_PRODUCT_BASE_FS_PATH))
|
|
|
|
|
endif
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH))
|
|
|
|
|
ifneq ($(PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH))
|
|
|
|
|
endif
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH))
|
|
|
|
|
ifneq ($(PRODUCT_ODM_BASE_FS_PATH),)
|
|
|
|
|
$(hide) cp $(PRODUCT_ODM_BASE_FS_PATH) \
|
|
|
|
|
$(zip_root)/META/$(notdir $(PRODUCT_ODM_BASE_FS_PATH))
|
|
|
|
|
endif
|
|
|
|
|
ifneq (,$(filter address, $(SANITIZE_TARGET)))
|
|
|
|
|
# We need to create userdata.img with real data because the instrumented libraries are in userdata.img.
|
|
|
|
@ -4615,8 +4615,8 @@ ifneq (,$(strip $(wildcard $(atree_dir)/sdk-android-$(TARGET_CPU_ABI).atree)))
|
|
|
|
|
sdk_atree_files += $(atree_dir)/sdk-android-$(TARGET_CPU_ABI).atree
|
|
|
|
|
endif
|
|
|
|
|
|
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SDK_ATREE_FILES),)
|
|
|
|
|
sdk_atree_files += $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SDK_ATREE_FILES)
|
|
|
|
|
ifneq ($(PRODUCT_SDK_ATREE_FILES),)
|
|
|
|
|
sdk_atree_files += $(PRODUCT_SDK_ATREE_FILES)
|
|
|
|
|
else
|
|
|
|
|
sdk_atree_files += $(atree_dir)/sdk.atree
|
|
|
|
|
endif
|
|
|
|
|