SAMA5D4 Xplained Ultra Board BSP
guowenxue
2019-08-08 1df3b4a26cecd6c7eab535d16d240e58cb78ec84
Add copy_library shell script:
1 files added
40 ■■■■■ changed files
linux-bsp/tarballs/copy_library.sh 40 ●●●●● patch | view | raw | blame | history
linux-bsp/tarballs/copy_library.sh
New file
@@ -0,0 +1,40 @@
#!/bin/sh
CROSS_LIBPATH=/opt/crosstool/cortex-a7/arm-linux-gnueabi/
ROOTFS_PATH=./rootfs
if [ `id -u` != 0 ] ; then
    echo ""
    echo "ERROR: This shell script must be excuted as root or sudo"
    echo ""
    exit ;
fi
if [ -z "$ROOTFS_PATH" ] ; then
    echo "Too dangerous to operator rootfs, exit now"
    exit;
fi
rm -f ${ROOTFS_PATH}/lib/*.so*
rm -f ${ROOTFS_PATH}/usr/lib/*.so*
for dir in `find ${CROSS_LIBPATH} -name lib`
do
    echo $dir | grep usr > /dev/null 2>&1
    if [ $? != 0 ] ; then
        echo "Copy $dir to /lib"
        cp -af $dir/*so* ${ROOTFS_PATH}/lib
    else
        echo "Copy $dir to /usr/lib"
        cp -af $dir/*so* ${ROOTFS_PATH}/usr/lib
    fi
done
find ${ROOTFS_PATH}/lib -iname "*.a" | xargs rm -rf {} \;
find ${ROOTFS_PATH}/usr/lib -iname "*.a" | xargs rm -rf {} \;
find ${ROOTFS_PATH}/usr/lib -iname "*.map" | xargs rm -rf {} \;
find ${ROOTFS_PATH}/lib -iname "*.py" | xargs rm -rf {} \;
find ${ROOTFS_PATH}/usr/lib -iname "*.py" | xargs rm -rf {} \;