From 593b43910b418eff7a2e63b631ee8d7fdebf2985 Mon Sep 17 00:00:00 2001 From: Marco Nelissen Date: Wed, 4 Oct 2017 13:47:17 -0700 Subject: [PATCH] Fix media on W/T W/T enforce restrictions on linker paths, which M/S do not. Because of this, media.extractor was unable to load its extractors on W/T. Bug: 67405932 Test: play sounds successfully Change-Id: I8914da74780c909da815beaffcd4d76fbe2cc6b5 --- rootdir/etc/ld.config.txt.in | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/rootdir/etc/ld.config.txt.in b/rootdir/etc/ld.config.txt.in index 2c73056a9..394f0e152 100644 --- a/rootdir/etc/ld.config.txt.in +++ b/rootdir/etc/ld.config.txt.in @@ -30,10 +30,10 @@ namespace.default.isolated = true namespace.default.search.paths = /system/${LIB} # /vendor/app, /vendor/framework were added since libart should be able to dlopen # the odex files from the directory. -namespace.default.permitted.paths = /system/${LIB}/drm:/system/${LIB}/hw:/system/framework:/system/app:/system/priv-app:/vendor/app:/vendor/framework:/oem/app:/data:/mnt/expand +namespace.default.permitted.paths = /system/${LIB}/drm:/system/${LIB}/extractors:/system/${LIB}/hw:/system/framework:/system/app:/system/priv-app:/vendor/app:/vendor/framework:/oem/app:/data:/mnt/expand namespace.default.asan.search.paths = /data/asan/system/${LIB}:/system/${LIB} -namespace.default.asan.permitted.paths = /data:/system/${LIB}/drm:/system/${LIB}/hw:/system/framework:/system/app:/system/priv-app:/vendor/app:/vendor/framework:/oem/app:/mnt/expand +namespace.default.asan.permitted.paths = /data:/system/${LIB}/drm:/system/${LIB}/extractors:/system/${LIB}/hw:/system/framework:/system/app:/system/priv-app:/vendor/app:/vendor/framework:/oem/app:/mnt/expand ############################################################################### # "sphal" namespace