2015-07-09 09:13:11 +08:00
|
|
|
// Copyright 2015 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package cc
|
|
|
|
|
|
|
|
import (
|
2016-02-10 09:43:51 +08:00
|
|
|
"fmt"
|
2015-07-09 09:13:11 +08:00
|
|
|
"io"
|
2016-03-25 04:14:12 +08:00
|
|
|
"path/filepath"
|
2015-07-09 09:13:11 +08:00
|
|
|
"strings"
|
|
|
|
|
2016-05-19 06:37:25 +08:00
|
|
|
"android/soong/android"
|
2015-07-09 09:13:11 +08:00
|
|
|
)
|
|
|
|
|
2017-07-18 12:23:39 +08:00
|
|
|
var (
|
2020-10-22 06:17:56 +08:00
|
|
|
nativeBridgeSuffix = ".native_bridge"
|
|
|
|
productSuffix = ".product"
|
2021-02-05 23:57:43 +08:00
|
|
|
VendorSuffix = ".vendor"
|
2020-10-22 06:17:56 +08:00
|
|
|
ramdiskSuffix = ".ramdisk"
|
2021-02-05 23:57:43 +08:00
|
|
|
VendorRamdiskSuffix = ".vendor_ramdisk"
|
2020-10-22 06:17:56 +08:00
|
|
|
recoverySuffix = ".recovery"
|
|
|
|
sdkSuffix = ".sdk"
|
2017-07-18 12:23:39 +08:00
|
|
|
)
|
|
|
|
|
2016-07-14 07:50:22 +08:00
|
|
|
type AndroidMkContext interface {
|
2020-10-14 09:43:54 +08:00
|
|
|
BaseModuleName() string
|
2016-07-14 07:50:22 +08:00
|
|
|
Target() android.Target
|
2020-02-25 04:01:37 +08:00
|
|
|
subAndroidMk(*android.AndroidMkEntries, interface{})
|
2019-01-16 03:53:23 +08:00
|
|
|
Arch() android.Arch
|
|
|
|
Os() android.OsType
|
|
|
|
Host() bool
|
2019-10-19 05:49:46 +08:00
|
|
|
UseVndk() bool
|
2019-11-18 18:52:14 +08:00
|
|
|
VndkVersion() string
|
2018-12-20 21:10:17 +08:00
|
|
|
static() bool
|
2020-01-22 07:53:22 +08:00
|
|
|
InRamdisk() bool
|
2020-10-22 06:17:56 +08:00
|
|
|
InVendorRamdisk() bool
|
2019-10-19 05:49:46 +08:00
|
|
|
InRecovery() bool
|
2020-12-09 20:18:56 +08:00
|
|
|
NotInPlatform() bool
|
2016-07-30 08:28:03 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
type subAndroidMkProvider interface {
|
2020-02-25 04:01:37 +08:00
|
|
|
AndroidMkEntries(AndroidMkContext, *android.AndroidMkEntries)
|
2016-07-30 08:28:03 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (c *Module) subAndroidMk(entries *android.AndroidMkEntries, obj interface{}) {
|
2016-07-30 08:28:03 +08:00
|
|
|
if c.subAndroidMkOnce == nil {
|
|
|
|
c.subAndroidMkOnce = make(map[subAndroidMkProvider]bool)
|
|
|
|
}
|
|
|
|
if androidmk, ok := obj.(subAndroidMkProvider); ok {
|
|
|
|
if !c.subAndroidMkOnce[androidmk] {
|
|
|
|
c.subAndroidMkOnce[androidmk] = true
|
2020-02-25 04:01:37 +08:00
|
|
|
androidmk.AndroidMkEntries(c, entries)
|
2016-07-30 08:28:03 +08:00
|
|
|
}
|
|
|
|
}
|
2016-07-14 07:50:22 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (c *Module) AndroidMkEntries() []android.AndroidMkEntries {
|
2020-09-16 09:30:11 +08:00
|
|
|
if c.hideApexVariantFromMake || c.Properties.HideFromMake {
|
2020-02-25 04:01:37 +08:00
|
|
|
return []android.AndroidMkEntries{{
|
2017-08-11 08:00:19 +08:00
|
|
|
Disabled: true,
|
2020-02-25 04:01:37 +08:00
|
|
|
}}
|
2016-05-25 06:39:04 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
entries := android.AndroidMkEntries{
|
2017-08-11 08:00:19 +08:00
|
|
|
OutputFile: c.outputFile,
|
2020-10-12 22:10:36 +08:00
|
|
|
// TODO(jiyong): add the APEXes providing shared libs to the required
|
|
|
|
// modules Currently, adding c.Properties.ApexesProvidingSharedLibs is
|
|
|
|
// causing multiple ART APEXes (com.android.art and com.android.art.debug)
|
|
|
|
// to be installed. And this is breaking some older devices (like marlin)
|
|
|
|
// where system.img is small.
|
2018-12-20 21:10:17 +08:00
|
|
|
Required: c.Properties.AndroidMkRuntimeLibs,
|
|
|
|
Include: "$(BUILD_SYSTEM)/soong_cc_prebuilt.mk",
|
2017-12-20 01:17:32 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
ExtraEntries: []android.AndroidMkExtraEntriesFunc{
|
2020-07-04 04:18:24 +08:00
|
|
|
func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2017-12-08 07:28:59 +08:00
|
|
|
if len(c.Properties.Logtags) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_LOGTAGS_FILES", c.Properties.Logtags...)
|
2017-12-08 07:28:59 +08:00
|
|
|
}
|
2020-09-22 18:45:04 +08:00
|
|
|
// Note: Pass the exact value of AndroidMkSystemSharedLibs to the Make
|
|
|
|
// world, even if it is an empty list. In the Make world,
|
|
|
|
// LOCAL_SYSTEM_SHARED_LIBRARIES defaults to "none", which is expanded
|
|
|
|
// to the default list of system shared libs by the build system.
|
|
|
|
// Soong computes the exact list of system shared libs, so we have to
|
|
|
|
// override the default value when the list of libs is actually empty.
|
|
|
|
entries.SetString("LOCAL_SYSTEM_SHARED_LIBRARIES", strings.Join(c.Properties.AndroidMkSystemSharedLibs, " "))
|
2017-08-11 08:00:19 +08:00
|
|
|
if len(c.Properties.AndroidMkSharedLibs) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_SHARED_LIBRARIES", c.Properties.AndroidMkSharedLibs...)
|
2017-08-11 08:00:19 +08:00
|
|
|
}
|
2018-11-16 09:19:56 +08:00
|
|
|
if len(c.Properties.AndroidMkStaticLibs) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_STATIC_LIBRARIES", c.Properties.AndroidMkStaticLibs...)
|
2018-11-16 09:19:56 +08:00
|
|
|
}
|
|
|
|
if len(c.Properties.AndroidMkWholeStaticLibs) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_WHOLE_STATIC_LIBRARIES", c.Properties.AndroidMkWholeStaticLibs...)
|
2018-11-16 09:19:56 +08:00
|
|
|
}
|
2020-04-22 08:23:37 +08:00
|
|
|
if len(c.Properties.AndroidMkHeaderLibs) > 0 {
|
|
|
|
entries.AddStrings("LOCAL_HEADER_LIBRARIES", c.Properties.AndroidMkHeaderLibs...)
|
|
|
|
}
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_LINK_TYPE", c.makeLinkType)
|
2019-10-19 05:49:46 +08:00
|
|
|
if c.UseVndk() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_USE_VNDK", true)
|
2019-10-19 05:49:46 +08:00
|
|
|
if c.IsVndk() && !c.static() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_VNDK_VERSION", c.VndkVersion())
|
2019-10-29 04:24:42 +08:00
|
|
|
// VNDK libraries available to vendor are not installed because
|
|
|
|
// they are packaged in VNDK APEX and installed by APEX packages (apex/apex.go)
|
2020-12-02 22:00:51 +08:00
|
|
|
if !c.IsVndkExt() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
2019-10-29 04:24:42 +08:00
|
|
|
}
|
2019-05-20 17:49:10 +08:00
|
|
|
}
|
2017-08-11 08:00:19 +08:00
|
|
|
}
|
2020-04-08 00:50:32 +08:00
|
|
|
if c.Properties.IsSdkVariant && c.Properties.SdkAndPlatformVariantVisibleToMake {
|
|
|
|
// Make the SDK variant uninstallable so that there are not two rules to install
|
|
|
|
// to the same location.
|
|
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
|
|
// Add the unsuffixed name to SOONG_SDK_VARIANT_MODULES so that Make can rewrite
|
|
|
|
// dependencies to the .sdk suffix when building a module that uses the SDK.
|
|
|
|
entries.SetString("SOONG_SDK_VARIANT_MODULES",
|
|
|
|
"$(SOONG_SDK_VARIANT_MODULES) $(patsubst %.sdk,%,$(LOCAL_MODULE))")
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ExtraFooters: []android.AndroidMkExtraFootersFunc{
|
2020-12-08 02:23:54 +08:00
|
|
|
func(w io.Writer, name, prefix, moduleDir string) {
|
2020-04-08 00:50:32 +08:00
|
|
|
if c.Properties.IsSdkVariant && c.Properties.SdkAndPlatformVariantVisibleToMake &&
|
|
|
|
c.CcLibraryInterface() && c.Shared() {
|
|
|
|
// Using the SDK variant as a JNI library needs a copy of the .so that
|
|
|
|
// is not named .sdk.so so that it can be packaged into the APK with
|
|
|
|
// the right name.
|
|
|
|
fmt.Fprintln(w, "$(eval $(call copy-one-file,",
|
|
|
|
"$(LOCAL_BUILT_MODULE),",
|
|
|
|
"$(patsubst %.sdk.so,%.so,$(LOCAL_BUILT_MODULE))))")
|
|
|
|
}
|
2017-08-11 08:00:19 +08:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2016-01-05 06:34:37 +08:00
|
|
|
|
|
|
|
for _, feature := range c.features {
|
2020-02-25 04:01:37 +08:00
|
|
|
c.subAndroidMk(&entries, feature)
|
2016-01-05 06:34:37 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
c.subAndroidMk(&entries, c.compiler)
|
|
|
|
c.subAndroidMk(&entries, c.linker)
|
2017-05-09 04:44:11 +08:00
|
|
|
if c.sanitize != nil {
|
2020-02-25 04:01:37 +08:00
|
|
|
c.subAndroidMk(&entries, c.sanitize)
|
2017-05-09 04:44:11 +08:00
|
|
|
}
|
2020-02-25 04:01:37 +08:00
|
|
|
c.subAndroidMk(&entries, c.installer)
|
2016-01-05 06:34:37 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SubName += c.Properties.SubName
|
Split /system and /vendor modules, allow multi-installation
Nothing changes if BOARD_VNDK_VERSION isn't set.
When the VNDK is enabled (BOARD_VNDK_VERSION in Make), this will split
/system and /vendor modules into two different variant spaces that can't
link to each other. There are a few interfaces between the two variant
spaces:
The `llndk_library` stubs will be available in the /vendor variant, but
won't be installed, so at runtime the /system variant will be used.
Setting `vendor_available: true` will split a module into both variants.
The /system (or "core") variant will compile just like today. The
/vendor ("vendor") variant will compile against everything else in the
vendor space (so LL-NDK instead of libc/liblog/etc). There will be two
copies of these libraries installed onto the final device.
Since the available runtime interfaces for vendor modules may be
reduced, and your dependencies may not expose their private interfaces,
we allow the vendor variants to reduce their compilation set, and export
a different set of headers:
cc_library {
name: "libfoo",
srcs: ["common.cpp", "private_impl.cpp"],
export_include_dirs: ["include"],
target: {
vendor: {
export_include_dirs: ["include_vndk"],
exclude_srcs: ["private_impl.cpp"],
srcs: ["vendor_only.cpp"],
},
},
}
So the "core" variant would compile with both "common.cpp" and
"private_impl.cpp", and export "include".
The "vendor" variant would compile "common.cpp" and "vendor_only.cpp",
and export "include_vndk".
Bug: 36426473
Bug: 36079834
Test: out/soong/build.ninja, out/soong/Android- only changes due to _core addition and
.llndk -> .vendor
Test: attempt to compile with BOARD_VNDK_VERSION:=current
Change-Id: Idef28764043bf6c33dc0d2e7e2026c38867ff769
2017-04-07 03:43:22 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
return []android.AndroidMkEntries{entries}
|
2016-01-05 06:34:37 +08:00
|
|
|
}
|
|
|
|
|
2020-08-16 03:24:26 +08:00
|
|
|
func androidMkWriteExtraTestConfigs(extraTestConfigs android.Paths, entries *android.AndroidMkEntries) {
|
|
|
|
if len(extraTestConfigs) > 0 {
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries,
|
|
|
|
func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
|
|
|
entries.AddStrings("LOCAL_EXTRA_FULL_TEST_CONFIGS", extraTestConfigs.Strings()...)
|
|
|
|
})
|
2020-08-16 03:24:26 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-30 01:48:05 +08:00
|
|
|
func AndroidMkWriteTestData(data []android.DataPath, entries *android.AndroidMkEntries) {
|
2020-09-22 03:11:02 +08:00
|
|
|
testFiles := android.AndroidMkDataPaths(data)
|
2017-07-15 06:20:13 +08:00
|
|
|
if len(testFiles) > 0 {
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_TEST_DATA", testFiles...)
|
2017-07-15 06:20:13 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-20 22:16:47 +08:00
|
|
|
func makeOverrideModuleNames(ctx AndroidMkContext, overrides []string) []string {
|
|
|
|
if ctx.Target().NativeBridge == android.NativeBridgeEnabled {
|
|
|
|
var result []string
|
|
|
|
for _, override := range overrides {
|
|
|
|
result = append(result, override+nativeBridgeSuffix)
|
|
|
|
}
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
|
|
|
return overrides
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (library *libraryDecorator) androidMkWriteExportedFlags(entries *android.AndroidMkEntries) {
|
2021-04-13 03:42:51 +08:00
|
|
|
var exportedFlags []string
|
|
|
|
var includeDirs android.Paths
|
|
|
|
var systemIncludeDirs android.Paths
|
|
|
|
var exportedDeps android.Paths
|
|
|
|
|
|
|
|
if library.flagExporterInfo != nil {
|
|
|
|
exportedFlags = library.flagExporterInfo.Flags
|
|
|
|
includeDirs = library.flagExporterInfo.IncludeDirs
|
|
|
|
systemIncludeDirs = library.flagExporterInfo.SystemIncludeDirs
|
|
|
|
exportedDeps = library.flagExporterInfo.Deps
|
|
|
|
} else {
|
|
|
|
exportedFlags = library.flagExporter.flags
|
|
|
|
includeDirs = library.flagExporter.dirs
|
|
|
|
systemIncludeDirs = library.flagExporter.systemDirs
|
|
|
|
exportedDeps = library.flagExporter.deps
|
|
|
|
}
|
|
|
|
for _, dir := range includeDirs {
|
2019-10-22 19:19:51 +08:00
|
|
|
exportedFlags = append(exportedFlags, "-I"+dir.String())
|
2019-06-03 18:10:47 +08:00
|
|
|
}
|
2021-04-13 03:42:51 +08:00
|
|
|
for _, dir := range systemIncludeDirs {
|
2019-10-22 19:19:51 +08:00
|
|
|
exportedFlags = append(exportedFlags, "-isystem "+dir.String())
|
2019-06-03 18:10:47 +08:00
|
|
|
}
|
2017-03-20 04:44:32 +08:00
|
|
|
if len(exportedFlags) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_EXPORT_CFLAGS", exportedFlags...)
|
2017-03-20 04:44:32 +08:00
|
|
|
}
|
2019-06-03 18:10:47 +08:00
|
|
|
if len(exportedDeps) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_EXPORT_C_INCLUDE_DEPS", exportedDeps.Strings()...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (library *libraryDecorator) androidMkEntriesWriteAdditionalDependenciesForSourceAbiDiff(entries *android.AndroidMkEntries) {
|
2020-07-28 20:01:31 +08:00
|
|
|
if library.sAbiDiff.Valid() && !library.static() {
|
|
|
|
entries.AddStrings("LOCAL_ADDITIONAL_DEPENDENCIES", library.sAbiDiff.String())
|
2017-02-16 08:15:21 +08:00
|
|
|
}
|
2017-03-20 04:44:32 +08:00
|
|
|
}
|
2017-02-16 08:15:21 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
// TODO(ccross): remove this once apex/androidmk.go is converted to AndroidMkEntries
|
2019-04-10 13:33:58 +08:00
|
|
|
func (library *libraryDecorator) androidMkWriteAdditionalDependenciesForSourceAbiDiff(w io.Writer) {
|
2020-07-28 20:01:31 +08:00
|
|
|
if library.sAbiDiff.Valid() && !library.static() {
|
|
|
|
fmt.Fprintln(w, "LOCAL_ADDITIONAL_DEPENDENCIES +=", library.sAbiDiff.String())
|
2019-04-10 13:33:58 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (library *libraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2017-02-16 08:15:21 +08:00
|
|
|
if library.static() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "STATIC_LIBRARIES"
|
2017-02-16 08:15:21 +08:00
|
|
|
} else if library.shared() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "SHARED_LIBRARIES"
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(_ android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_TOC", library.toc().String())
|
2019-02-05 21:33:10 +08:00
|
|
|
if !library.buildStubs() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_UNSTRIPPED_BINARY", library.unstrippedOutputFile.String())
|
2019-02-05 21:33:10 +08:00
|
|
|
}
|
2018-11-07 20:43:34 +08:00
|
|
|
if len(library.Properties.Overrides) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_OVERRIDES_MODULES", strings.Join(makeOverrideModuleNames(ctx, library.Properties.Overrides), " "))
|
2018-11-07 20:43:34 +08:00
|
|
|
}
|
2020-12-22 01:11:10 +08:00
|
|
|
if len(library.postInstallCmds) > 0 {
|
|
|
|
entries.SetString("LOCAL_POST_INSTALL_CMD", strings.Join(library.postInstallCmds, "&& "))
|
2019-02-25 10:05:47 +08:00
|
|
|
}
|
2018-09-05 07:28:17 +08:00
|
|
|
})
|
2017-02-16 08:15:21 +08:00
|
|
|
} else if library.header() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "HEADER_LIBRARIES"
|
2017-02-16 08:15:21 +08:00
|
|
|
}
|
|
|
|
|
2020-06-15 13:24:19 +08:00
|
|
|
if library.distFile != nil {
|
|
|
|
entries.DistFiles = android.MakeDefaultDistFiles(library.distFile)
|
|
|
|
}
|
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
library.androidMkWriteExportedFlags(entries)
|
|
|
|
library.androidMkEntriesWriteAdditionalDependenciesForSourceAbiDiff(entries)
|
2015-07-09 09:13:11 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
_, _, ext := android.SplitFileExt(entries.OutputFile.Path().Base())
|
2018-07-26 00:19:50 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
2015-07-09 09:13:11 +08:00
|
|
|
|
2017-02-10 08:16:31 +08:00
|
|
|
if library.coverageOutputFile.Valid() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_PREBUILT_COVERAGE_ARCHIVE", library.coverageOutputFile.String())
|
2017-02-10 08:16:31 +08:00
|
|
|
}
|
2018-11-13 12:19:56 +08:00
|
|
|
|
|
|
|
if library.useCoreVariant {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
|
|
|
entries.SetBool("LOCAL_VNDK_DEPEND_ON_CORE_VARIANT", true)
|
2018-11-13 12:19:56 +08:00
|
|
|
}
|
2020-01-09 06:32:28 +08:00
|
|
|
if library.checkSameCoreVariant {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_CHECK_SAME_VNDK_VARIANTS", true)
|
2020-01-09 06:32:28 +08:00
|
|
|
}
|
2016-01-05 06:34:37 +08:00
|
|
|
})
|
2016-07-30 08:28:03 +08:00
|
|
|
|
2018-12-20 21:10:17 +08:00
|
|
|
if library.shared() && !library.buildStubs() {
|
2020-02-25 04:01:37 +08:00
|
|
|
ctx.subAndroidMk(entries, library.baseInstaller)
|
2018-09-05 07:28:17 +08:00
|
|
|
} else {
|
2020-12-17 08:46:01 +08:00
|
|
|
if library.buildStubs() && library.stubsVersion() != "" {
|
2020-02-27 16:56:44 +08:00
|
|
|
entries.SubName = "." + library.stubsVersion()
|
|
|
|
}
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-12-17 02:20:23 +08:00
|
|
|
// library.makeUninstallable() depends on this to bypass HideFromMake() for
|
2020-08-07 05:34:42 +08:00
|
|
|
// static libraries.
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
2018-12-20 21:10:17 +08:00
|
|
|
if library.buildStubs() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
2018-12-20 21:10:17 +08:00
|
|
|
}
|
2018-09-05 07:28:17 +08:00
|
|
|
})
|
2016-07-30 08:28:03 +08:00
|
|
|
}
|
2020-12-09 20:18:56 +08:00
|
|
|
// If a library providing a stub is included in an APEX, the private APIs of the library
|
|
|
|
// is accessible only inside the APEX. From outside of the APEX, clients can only use the
|
|
|
|
// public APIs via the stub. To enforce this, the (latest version of the) stub gets the
|
|
|
|
// name of the library. The impl library instead gets the `.bootstrap` suffix to so that
|
|
|
|
// they can be exceptionally used directly when APEXes are not available (e.g. during the
|
|
|
|
// very early stage in the boot process).
|
|
|
|
if len(library.Properties.Stubs.Versions) > 0 && !ctx.Host() && ctx.NotInPlatform() &&
|
2020-10-22 06:17:56 +08:00
|
|
|
!ctx.InRamdisk() && !ctx.InVendorRamdisk() && !ctx.InRecovery() && !ctx.UseVndk() && !ctx.static() {
|
2020-02-27 16:56:44 +08:00
|
|
|
if library.buildStubs() && library.isLatestStubVersion() {
|
|
|
|
entries.SubName = ""
|
|
|
|
}
|
2018-12-20 21:10:17 +08:00
|
|
|
if !library.buildStubs() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SubName = ".bootstrap"
|
2018-12-20 21:10:17 +08:00
|
|
|
}
|
|
|
|
}
|
2015-07-09 09:13:11 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (object *objectLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
entries.Class = "STATIC_LIBRARIES"
|
|
|
|
entries.ExtraFooters = append(entries.ExtraFooters,
|
2020-12-08 02:23:54 +08:00
|
|
|
func(w io.Writer, name, prefix, moduleDir string) {
|
2020-02-25 04:01:37 +08:00
|
|
|
out := entries.OutputFile.Path()
|
|
|
|
varname := fmt.Sprintf("SOONG_%sOBJECT_%s%s", prefix, name, entries.SubName)
|
2015-07-09 09:13:11 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
fmt.Fprintf(w, "\n%s := %s\n", varname, out.String())
|
|
|
|
fmt.Fprintln(w, ".KATI_READONLY: "+varname)
|
|
|
|
})
|
2015-07-09 09:13:11 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (binary *binaryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, binary.baseInstaller)
|
2016-06-11 08:20:30 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "EXECUTABLES"
|
2020-06-15 13:24:19 +08:00
|
|
|
entries.DistFiles = binary.distFiles
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(_ android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_UNSTRIPPED_BINARY", binary.unstrippedOutputFile.String())
|
2016-12-08 05:37:42 +08:00
|
|
|
if len(binary.symlinks) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_MODULE_SYMLINKS", binary.symlinks...)
|
2016-12-08 05:37:42 +08:00
|
|
|
}
|
|
|
|
|
2017-02-10 08:16:31 +08:00
|
|
|
if binary.coverageOutputFile.Valid() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_PREBUILT_COVERAGE_ARCHIVE", binary.coverageOutputFile.String())
|
2017-02-10 08:16:31 +08:00
|
|
|
}
|
2018-04-04 04:22:50 +08:00
|
|
|
|
|
|
|
if len(binary.Properties.Overrides) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_OVERRIDES_MODULES", strings.Join(makeOverrideModuleNames(ctx, binary.Properties.Overrides), " "))
|
2018-04-04 04:22:50 +08:00
|
|
|
}
|
2020-12-22 01:11:10 +08:00
|
|
|
if len(binary.postInstallCmds) > 0 {
|
|
|
|
entries.SetString("LOCAL_POST_INSTALL_CMD", strings.Join(binary.postInstallCmds, "&& "))
|
2019-02-25 10:05:47 +08:00
|
|
|
}
|
2016-01-05 06:34:37 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (benchmark *benchmarkDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, benchmark.binaryDecorator)
|
|
|
|
entries.Class = "NATIVE_TESTS"
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2017-04-25 09:10:29 +08:00
|
|
|
if len(benchmark.Properties.Test_suites) > 0 {
|
2020-11-25 04:42:58 +08:00
|
|
|
entries.AddCompatibilityTestSuites(benchmark.Properties.Test_suites...)
|
2017-04-25 09:10:29 +08:00
|
|
|
}
|
2018-08-08 07:49:25 +08:00
|
|
|
if benchmark.testConfig != nil {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_FULL_TEST_CONFIG", benchmark.testConfig.String())
|
2018-08-03 06:00:46 +08:00
|
|
|
}
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_NATIVE_BENCHMARK", true)
|
2020-01-07 07:47:57 +08:00
|
|
|
if !BoolDefault(benchmark.Properties.Auto_gen_config, true) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", true)
|
2020-01-07 07:47:57 +08:00
|
|
|
}
|
2017-04-25 09:10:29 +08:00
|
|
|
})
|
2020-07-10 05:12:52 +08:00
|
|
|
dataPaths := []android.DataPath{}
|
|
|
|
for _, srcPath := range benchmark.data {
|
|
|
|
dataPaths = append(dataPaths, android.DataPath{SrcPath: srcPath})
|
|
|
|
}
|
2021-01-30 01:48:05 +08:00
|
|
|
AndroidMkWriteTestData(dataPaths, entries)
|
2016-07-30 08:28:03 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (test *testBinary) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, test.binaryDecorator)
|
|
|
|
entries.Class = "NATIVE_TESTS"
|
2016-07-30 08:28:03 +08:00
|
|
|
if Bool(test.Properties.Test_per_src) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SubName = "_" + String(test.binaryDecorator.Properties.Stem)
|
2016-03-25 04:14:12 +08:00
|
|
|
}
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2017-03-28 07:27:50 +08:00
|
|
|
if len(test.Properties.Test_suites) > 0 {
|
2020-11-25 04:42:58 +08:00
|
|
|
entries.AddCompatibilityTestSuites(test.Properties.Test_suites...)
|
2017-03-28 07:27:50 +08:00
|
|
|
}
|
2018-08-08 07:49:25 +08:00
|
|
|
if test.testConfig != nil {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_FULL_TEST_CONFIG", test.testConfig.String())
|
2018-08-03 06:00:46 +08:00
|
|
|
}
|
2020-01-07 07:47:57 +08:00
|
|
|
if !BoolDefault(test.Properties.Auto_gen_config, true) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", true)
|
2020-01-07 07:47:57 +08:00
|
|
|
}
|
2020-08-17 18:46:00 +08:00
|
|
|
entries.AddStrings("LOCAL_TEST_MAINLINE_MODULES", test.Properties.Test_mainline_modules...)
|
2020-11-14 06:33:46 +08:00
|
|
|
if Bool(test.Properties.Test_options.Unit_test) {
|
|
|
|
entries.SetBool("LOCAL_IS_UNIT_TEST", true)
|
|
|
|
}
|
2017-03-28 07:27:50 +08:00
|
|
|
})
|
|
|
|
|
2021-01-30 01:48:05 +08:00
|
|
|
AndroidMkWriteTestData(test.data, entries)
|
2020-08-16 03:24:26 +08:00
|
|
|
androidMkWriteExtraTestConfigs(test.extraTestConfigs, entries)
|
2016-03-25 04:14:12 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (fuzz *fuzzBinary) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, fuzz.binaryDecorator)
|
2019-09-14 08:32:50 +08:00
|
|
|
|
|
|
|
var fuzzFiles []string
|
|
|
|
for _, d := range fuzz.corpus {
|
2019-10-18 06:04:01 +08:00
|
|
|
fuzzFiles = append(fuzzFiles,
|
|
|
|
filepath.Dir(fuzz.corpusIntermediateDir.String())+":corpus/"+d.Base())
|
2019-09-14 08:32:50 +08:00
|
|
|
}
|
|
|
|
|
2019-11-28 05:45:45 +08:00
|
|
|
for _, d := range fuzz.data {
|
|
|
|
fuzzFiles = append(fuzzFiles,
|
|
|
|
filepath.Dir(fuzz.dataIntermediateDir.String())+":data/"+d.Rel())
|
|
|
|
}
|
|
|
|
|
2019-09-14 08:32:50 +08:00
|
|
|
if fuzz.dictionary != nil {
|
2019-10-18 06:04:01 +08:00
|
|
|
fuzzFiles = append(fuzzFiles,
|
|
|
|
filepath.Dir(fuzz.dictionary.String())+":"+fuzz.dictionary.Base())
|
2019-09-14 08:32:50 +08:00
|
|
|
}
|
|
|
|
|
2019-10-23 01:52:01 +08:00
|
|
|
if fuzz.config != nil {
|
|
|
|
fuzzFiles = append(fuzzFiles,
|
|
|
|
filepath.Dir(fuzz.config.String())+":config.json")
|
|
|
|
}
|
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_IS_FUZZ_TARGET", true)
|
2019-10-18 10:20:41 +08:00
|
|
|
if len(fuzzFiles) > 0 {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_TEST_DATA", fuzzFiles...)
|
2019-10-18 10:20:41 +08:00
|
|
|
}
|
|
|
|
if fuzz.installedSharedDeps != nil {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_FUZZ_INSTALLED_SHARED_DEPS", fuzz.installedSharedDeps...)
|
2019-10-18 10:20:41 +08:00
|
|
|
}
|
2019-09-14 08:32:50 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (test *testLibrary) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, test.libraryDecorator)
|
2016-07-30 08:28:03 +08:00
|
|
|
}
|
2016-05-17 06:56:53 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (library *toolchainLibraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
entries.Class = "STATIC_LIBRARIES"
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
_, suffix, _ := android.SplitFileExt(entries.OutputFile.Path().Base())
|
|
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
2016-06-11 08:20:30 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (installer *baseInstaller) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2020-04-08 00:50:32 +08:00
|
|
|
if installer.path == (android.InstallPath{}) {
|
|
|
|
return
|
|
|
|
}
|
2016-09-30 03:17:49 +08:00
|
|
|
// Soong installation is only supported for host modules. Have Make
|
|
|
|
// installation trigger Soong installation.
|
|
|
|
if ctx.Target().Os.Class == android.Host {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.OutputFile = android.OptionalPathForPath(installer.path)
|
2016-09-30 03:17:49 +08:00
|
|
|
}
|
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2019-10-03 07:01:35 +08:00
|
|
|
path, file := filepath.Split(installer.path.ToMakePath().String())
|
2019-09-10 11:29:31 +08:00
|
|
|
stem, suffix, _ := android.SplitFileExt(file)
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
|
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
2016-03-25 04:14:12 +08:00
|
|
|
})
|
2015-07-09 09:13:11 +08:00
|
|
|
}
|
2016-06-18 07:45:24 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (c *stubDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
Replace stringly-typed API levels.
Handling of API levels within Soong is currently fairly difficult
since it isn't always clear based on context what kind of API level a
given string represents, how much canonicalizing and error checking
the code receiving the string are expected to do, or how those errors
should be treated.
The API level struct does not export its raw data, so as to keep its
"constructor" private to the android package, and to prevent misuse of
the `number` field, which is only an implementation detail for preview
API levels. API levels can be parsed with either
`android.ApiLevelFromUser`, which returns any errors to the caller, or
`android.ApiLevelOrPanic`, which is used in the case where the input
is trusted and any errors in parsing should panic. Even within the
`android` package, these APIs should be preferred over direct
construction.
For cases where there are context specific parsing requirements, such
as handling the "minimum" alias in the cc module,
`nativeApiLevelFromUser` and `nativeApiLevelOrPanic` should be used
instead.
Test: treehugger
Bug: http://b/154667674
Change-Id: Id52921fda32cb437fb1775ac2183299dedc0cf20
2020-07-07 05:49:35 +08:00
|
|
|
entries.SubName = ndkLibrarySuffix + "." + c.apiLevel.String()
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "SHARED_LIBRARIES"
|
2016-06-18 07:45:24 +08:00
|
|
|
|
2020-10-01 02:41:33 +08:00
|
|
|
if !c.buildStubs() {
|
|
|
|
entries.Disabled = true
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2017-11-29 09:34:01 +08:00
|
|
|
path, file := filepath.Split(c.installPath.String())
|
2019-09-10 11:29:31 +08:00
|
|
|
stem, suffix, _ := android.SplitFileExt(file)
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
|
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
|
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
2020-05-30 04:37:12 +08:00
|
|
|
if c.parsedCoverageXmlPath.String() != "" {
|
|
|
|
entries.SetString("SOONG_NDK_API_XML", "$(SOONG_NDK_API_XML) "+c.parsedCoverageXmlPath.String())
|
|
|
|
}
|
2016-06-18 07:45:24 +08:00
|
|
|
})
|
|
|
|
}
|
2017-03-20 04:44:32 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (c *vndkPrebuiltLibraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
entries.Class = "SHARED_LIBRARIES"
|
Install VNDK snapshot libraries for system build
When BOARD_VNDK_VERSION := <VNDK version>, or
PRODUCT_EXTRA_VNDK_VERSIONS includes the needed <VNDK version> list,
the prebuilt VNDK libs in prebuilts/vndk/ directory will be
installed.
Each prebuilt VNDK module uses "vndk_prebuilt_shared" for shared
VNDK/VNDK-SP libs.
Following is the sample configuration of a vndk snapshot module:
vndk_prebuilt_shared {
name: "libfoo",
version: "27",
vendor_available: true,
vndk: {
enabled: true,
},
arch: {
arm64: {
srcs: ["arm/lib64/libfoo.so"],
},
arm: {
srcs: ["arm/lib/libfoo.so"],
},
},
}
The Android.bp for the snapshot modules will be auto-generated by a
script.
Bug: 38304393
Bug: 65377115
Bug: 68123344
Test: set BOARD_VNDK_VERSION := 27
copy a snapshot for v27
build with make command
Change-Id: Ib93107530dbabb4a24583f4d6e4f0c513c9adfec
2017-11-17 11:10:28 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SubName = c.androidMkSuffix
|
Install VNDK snapshot libraries for system build
When BOARD_VNDK_VERSION := <VNDK version>, or
PRODUCT_EXTRA_VNDK_VERSIONS includes the needed <VNDK version> list,
the prebuilt VNDK libs in prebuilts/vndk/ directory will be
installed.
Each prebuilt VNDK module uses "vndk_prebuilt_shared" for shared
VNDK/VNDK-SP libs.
Following is the sample configuration of a vndk snapshot module:
vndk_prebuilt_shared {
name: "libfoo",
version: "27",
vendor_available: true,
vndk: {
enabled: true,
},
arch: {
arm64: {
srcs: ["arm/lib64/libfoo.so"],
},
arm: {
srcs: ["arm/lib/libfoo.so"],
},
},
}
The Android.bp for the snapshot modules will be auto-generated by a
script.
Bug: 38304393
Bug: 65377115
Bug: 68123344
Test: set BOARD_VNDK_VERSION := 27
copy a snapshot for v27
build with make command
Change-Id: Ib93107530dbabb4a24583f4d6e4f0c513c9adfec
2017-11-17 11:10:28 +08:00
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
c.libraryDecorator.androidMkWriteExportedFlags(entries)
|
Install VNDK snapshot libraries for system build
When BOARD_VNDK_VERSION := <VNDK version>, or
PRODUCT_EXTRA_VNDK_VERSIONS includes the needed <VNDK version> list,
the prebuilt VNDK libs in prebuilts/vndk/ directory will be
installed.
Each prebuilt VNDK module uses "vndk_prebuilt_shared" for shared
VNDK/VNDK-SP libs.
Following is the sample configuration of a vndk snapshot module:
vndk_prebuilt_shared {
name: "libfoo",
version: "27",
vendor_available: true,
vndk: {
enabled: true,
},
arch: {
arm64: {
srcs: ["arm/lib64/libfoo.so"],
},
arm: {
srcs: ["arm/lib/libfoo.so"],
},
},
}
The Android.bp for the snapshot modules will be auto-generated by a
script.
Bug: 38304393
Bug: 65377115
Bug: 68123344
Test: set BOARD_VNDK_VERSION := 27
copy a snapshot for v27
build with make command
Change-Id: Ib93107530dbabb4a24583f4d6e4f0c513c9adfec
2017-11-17 11:10:28 +08:00
|
|
|
|
2020-10-23 13:36:11 +08:00
|
|
|
// Specifying stem is to pass check_elf_files when vendor modules link against vndk prebuilt.
|
|
|
|
// We can't use install path because VNDKs are not installed. Instead, Srcs is directly used.
|
|
|
|
_, file := filepath.Split(c.properties.Srcs[0])
|
|
|
|
stem, suffix, ext := android.SplitFileExt(file)
|
|
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
|
|
|
|
2020-01-22 10:11:29 +08:00
|
|
|
if c.tocFile.Valid() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_TOC", c.tocFile.String())
|
2020-01-22 10:11:29 +08:00
|
|
|
}
|
2020-10-23 13:36:11 +08:00
|
|
|
|
|
|
|
// VNDK libraries available to vendor are not installed because
|
|
|
|
// they are packaged in VNDK APEX and installed by APEX packages (apex/apex.go)
|
|
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
2020-01-22 10:11:29 +08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-11-14 04:07:36 +08:00
|
|
|
func (c *snapshotLibraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2020-01-22 10:11:29 +08:00
|
|
|
// Each vendor snapshot is exported to androidMk only when BOARD_VNDK_VERSION != current
|
|
|
|
// and the version of the prebuilt is same as BOARD_VNDK_VERSION.
|
|
|
|
if c.shared() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "SHARED_LIBRARIES"
|
2020-01-22 10:11:29 +08:00
|
|
|
} else if c.static() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "STATIC_LIBRARIES"
|
2020-01-22 10:11:29 +08:00
|
|
|
} else if c.header() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "HEADER_LIBRARIES"
|
2020-01-22 10:11:29 +08:00
|
|
|
}
|
|
|
|
|
Add cfi static libraries to vendor snapshot
CFI modules can't link against non-CFI static libraries, and vice versa.
So without capturing both CFI and non-CFI static libraries, vendor
modules won't be able to use CFI, which will be a critical security
hole.
This captures both CFI and non-CFI variants of all static libraries for
vendor snapshot, except for those whose cfi are explicitly disabled.
For example, suppose that "libfoo" is defined as follows.
cc_library_static {
name: "libfoo",
vendor_available: true,
}
As it doesn't have cfi disabled, two libraries "libfoo.a" and
"libfoo.cfi.a" will be captured. When installed, vendor snapshot module
for "libfoo" will look like:
vendor_snapshot_static {
name: "libfoo",
src: "libfoo.a",
cfi: {
src: "libfoo.cfi.a",
},
}
The build system will recognize the "cfi" property, and will create both
CFI and non-CFI variant, allowing any modules to link against "libfoo"
safely, no matter whether CFI is enabled or not.
Two clarification:
1) The reason why we don't create separate modules is that DepsMutator
runs before sanitize mutators. CFI and non-CFI variant of a library
should exist in a single module.
2) We can't capture CFI variant if the source module explicitly disables
cfi variant by specifying the following.
sanitize: {
cfi: false,
}
In this case, only non-CFI variant will be created for the vendor
snapshot module.
Bug: 65377115
Test: m dist vendor-snapshot && install && build against snapshot
Change-Id: Idbf3e3205d581800d6093c8d6cf6152374129ba4
2020-07-29 19:32:10 +08:00
|
|
|
entries.SubName = ""
|
|
|
|
|
|
|
|
if c.sanitizerProperties.CfiEnabled {
|
|
|
|
entries.SubName += ".cfi"
|
|
|
|
}
|
|
|
|
|
2021-01-23 06:06:33 +08:00
|
|
|
entries.SubName += c.baseProperties.Androidmk_suffix
|
2020-01-22 10:11:29 +08:00
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
c.libraryDecorator.androidMkWriteExportedFlags(entries)
|
2020-01-22 10:11:29 +08:00
|
|
|
|
2020-02-18 11:42:54 +08:00
|
|
|
if c.shared() || c.static() {
|
2020-01-22 10:11:29 +08:00
|
|
|
path, file := filepath.Split(c.path.ToMakePath().String())
|
|
|
|
stem, suffix, ext := android.SplitFileExt(file)
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
2020-01-22 10:11:29 +08:00
|
|
|
if c.shared() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
2020-01-22 10:11:29 +08:00
|
|
|
}
|
|
|
|
if c.tocFile.Valid() {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetString("LOCAL_SOONG_TOC", c.tocFile.String())
|
2020-01-22 10:11:29 +08:00
|
|
|
}
|
2020-02-18 11:42:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if !c.shared() { // static or header
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
2020-01-22 10:11:29 +08:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-11-14 04:07:36 +08:00
|
|
|
func (c *snapshotBinaryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.Class = "EXECUTABLES"
|
2021-01-23 06:06:33 +08:00
|
|
|
entries.SubName = c.baseProperties.Androidmk_suffix
|
2020-01-22 10:11:29 +08:00
|
|
|
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.AddStrings("LOCAL_MODULE_SYMLINKS", c.Properties.Symlinks...)
|
Install VNDK snapshot libraries for system build
When BOARD_VNDK_VERSION := <VNDK version>, or
PRODUCT_EXTRA_VNDK_VERSIONS includes the needed <VNDK version> list,
the prebuilt VNDK libs in prebuilts/vndk/ directory will be
installed.
Each prebuilt VNDK module uses "vndk_prebuilt_shared" for shared
VNDK/VNDK-SP libs.
Following is the sample configuration of a vndk snapshot module:
vndk_prebuilt_shared {
name: "libfoo",
version: "27",
vendor_available: true,
vndk: {
enabled: true,
},
arch: {
arm64: {
srcs: ["arm/lib64/libfoo.so"],
},
arm: {
srcs: ["arm/lib/libfoo.so"],
},
},
}
The Android.bp for the snapshot modules will be auto-generated by a
script.
Bug: 38304393
Bug: 65377115
Bug: 68123344
Test: set BOARD_VNDK_VERSION := 27
copy a snapshot for v27
build with make command
Change-Id: Ib93107530dbabb4a24583f4d6e4f0c513c9adfec
2017-11-17 11:10:28 +08:00
|
|
|
})
|
2017-12-07 05:08:00 +08:00
|
|
|
}
|
2017-12-15 05:23:15 +08:00
|
|
|
|
2020-11-14 04:07:36 +08:00
|
|
|
func (c *snapshotObjectLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2020-06-01 22:23:05 +08:00
|
|
|
entries.Class = "STATIC_LIBRARIES"
|
2021-01-23 06:06:33 +08:00
|
|
|
entries.SubName = c.baseProperties.Androidmk_suffix
|
2020-06-01 22:23:05 +08:00
|
|
|
|
|
|
|
entries.ExtraFooters = append(entries.ExtraFooters,
|
2020-12-08 02:23:54 +08:00
|
|
|
func(w io.Writer, name, prefix, moduleDir string) {
|
2020-06-01 22:23:05 +08:00
|
|
|
out := entries.OutputFile.Path()
|
|
|
|
varname := fmt.Sprintf("SOONG_%sOBJECT_%s%s", prefix, name, entries.SubName)
|
|
|
|
|
|
|
|
fmt.Fprintf(w, "\n%s := %s\n", varname, out.String())
|
|
|
|
fmt.Fprintln(w, ".KATI_READONLY: "+varname)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (c *ndkPrebuiltStlLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
entries.Class = "SHARED_LIBRARIES"
|
2017-12-15 05:23:15 +08:00
|
|
|
}
|
Allow platform modules to link to vendor public libraries
Normally, when building with VNDK, platform modules are not allowed to
link against vendor libraries, because the ABI of the vendor libraries
are not guaranteed to be stable and may differ across multiple vendor
images.
However, the vendor public libraries are the exceptions. Vendor public
libraries are vendor libraries that are exposed to 3rd party apps and
listed in /vendor/etc/public.libraries.txt. Since they are intended to
be exposed to public, their ABI stability is guaranteed (by definition,
though it is up to the vendor to actually guarantee it).
This change provides a way to make a vendor lib as public by defining a
module of type 'vendor_public_library' with a map file that enumerates
public symbols that are publicized:
cc_library {
name: "libvendor",
proprietary: true,
...
}
vendor_public_library {
name: "libvendor",
symbol_file: "libvendor.map.txt",
}
This defines a stub library module named libvendor.vendorpublic from the
map file. `shared_libs: ["libvendor"]` is redirected to the stub library
when it is from the outside of the vendor partition.
Bug: 74275385
Test: m -j
Test: cc_test.go passes
Change-Id: I5bed94d7c4282b777632ab2f0fb63c203ee313ba
2018-03-19 17:23:01 +08:00
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (p *prebuiltLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2018-11-20 11:59:08 +08:00
|
|
|
if p.properties.Check_elf_files != nil {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_CHECK_ELF_FILES", *p.properties.Check_elf_files)
|
2018-11-20 11:59:08 +08:00
|
|
|
} else {
|
|
|
|
// soong_cc_prebuilt.mk does not include check_elf_file.mk by default
|
|
|
|
// because cc_library_shared and cc_binary use soong_cc_prebuilt.mk as well.
|
|
|
|
// In order to turn on prebuilt ABI checker, set `LOCAL_CHECK_ELF_FILES` to
|
|
|
|
// true if `p.properties.Check_elf_files` is not specified.
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_CHECK_ELF_FILES", true)
|
2018-11-20 11:59:08 +08:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (p *prebuiltLibraryLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, p.libraryDecorator)
|
2018-11-20 11:59:08 +08:00
|
|
|
if p.shared() {
|
2020-02-25 04:01:37 +08:00
|
|
|
ctx.subAndroidMk(entries, &p.prebuiltLinker)
|
|
|
|
androidMkWriteAllowUndefinedSymbols(p.baseLinker, entries)
|
2018-11-20 11:59:08 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func (p *prebuiltBinaryLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
|
|
ctx.subAndroidMk(entries, p.binaryDecorator)
|
|
|
|
ctx.subAndroidMk(entries, &p.prebuiltLinker)
|
|
|
|
androidMkWriteAllowUndefinedSymbols(p.baseLinker, entries)
|
2018-11-20 11:59:08 +08:00
|
|
|
}
|
|
|
|
|
2020-02-25 04:01:37 +08:00
|
|
|
func androidMkWriteAllowUndefinedSymbols(linker *baseLinker, entries *android.AndroidMkEntries) {
|
|
|
|
allow := linker.Properties.Allow_undefined_symbols
|
|
|
|
if allow != nil {
|
2020-07-04 04:18:24 +08:00
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
|
2020-02-25 04:01:37 +08:00
|
|
|
entries.SetBool("LOCAL_ALLOW_UNDEFINED_SYMBOLS", *allow)
|
|
|
|
})
|
|
|
|
}
|
2018-11-20 11:59:08 +08:00
|
|
|
}
|