2009-03-04 04:28:42 +01:00
# This is included by the top-level Makefile.
# It sets up standard variables based on the
# current configuration and platform, which
# are not specific to what is being built.
2017-10-17 10:30:14 +02:00
i f n d e f K A T I
$( warning Directly using config .mk from make is no longer supported .)
2017-11-03 23:52:50 +01:00
$( warning )
$(warning If you are just attempting to build, you probably need to re-source envsetup.sh : )
$( warning )
$( warning $ $ source build /envsetup .sh )
$( warning )
$(warning If you are attempting to emulate get_build_var, use one of the following : )
$( warning $ $ build /soong /soong_ui .bash --dumpvar -mode )
$( warning $ $ build /soong /soong_ui .bash --dumpvars -mode )
$( warning )
2017-10-17 10:30:14 +02:00
$( error done )
e n d i f
2018-10-19 01:11:40 +02:00
BUILD_SYSTEM := $= build/make/core
BUILD_SYSTEM_COMMON := $= build/make/common
2012-09-27 22:26:25 +02:00
2018-10-19 01:11:40 +02:00
i n c l u d e $( BUILD_SYSTEM_COMMON ) / c o r e . m k
2018-03-28 23:33:10 +02:00
# Mark variables that should be coming as environment variables from soong_ui
# as readonly
2018-10-18 01:50:49 +02:00
.KATI_READONLY := OUT_DIR TMPDIR BUILD_DATETIME_FILE
i f d e f C A L L E D _ F R O M _ S E T U P
2018-10-21 06:37:44 +02:00
.KATI_READONLY := CALLED_FROM_SETUP
2018-10-18 01:50:49 +02:00
e n d i f
i f d e f K A T I _ P A C K A G E _ M K _ D I R
.KATI_READONLY := KATI_PACKAGE_MK_DIR
e n d i f
2018-03-28 23:33:10 +02:00
2017-10-30 21:41:53 +01:00
# Mark variables deprecated/obsolete
2017-11-09 01:39:18 +01:00
CHANGES_URL := https://android.googlesource.com/platform/build/+/master/Changes.md
2019-01-23 04:38:56 +01:00
.KATI_READONLY := CHANGES_URL
2017-12-28 01:57:34 +01:00
$( KATI_obsolete_var PATH ,Do not use PATH directly . See $ ( CHANGES_URL ) #PATH )
2017-11-29 07:32:05 +01:00
$( KATI_obsolete_var PYTHONPATH ,Do not use PYTHONPATH directly . See $ ( CHANGES_URL ) #PYTHONPATH )
$( KATI_obsolete_var OUT ,Use OUT_DIR instead . See $ ( CHANGES_URL ) #OUT )
$( KATI_obsolete_var ANDROID_HOST_OUT ,Use HOST_OUT instead . See $ ( CHANGES_URL ) #ANDROID_HOST_OUT )
2017-12-28 01:57:34 +01:00
$( KATI_obsolete_var ANDROID_PRODUCT_OUT ,Use PRODUCT_OUT instead . See $ ( CHANGES_URL ) #ANDROID_PRODUCT_OUT )
2017-11-29 07:32:05 +01:00
$( KATI_obsolete_var ANDROID_HOST_OUT_TESTCASES ,Use HOST_OUT_TESTCASES instead . See $ ( CHANGES_URL ) #ANDROID_HOST_OUT_TESTCASES )
$( KATI_obsolete_var ANDROID_TARGET_OUT_TESTCASES ,Use TARGET_OUT_TESTCASES instead . See $ ( CHANGES_URL ) #ANDROID_TARGET_OUT_TESTCASES )
2018-01-04 00:15:38 +01:00
$( KATI_obsolete_var ANDROID_BUILD_TOP ,Use '.' instead . See $ ( CHANGES_URL ) #ANDROID_BUILD_TOP )
2017-11-29 07:32:05 +01:00
$( KATI_obsolete_var \
2017-11-09 01:39:18 +01:00
ANDROID_TOOLCHAIN \
ANDROID_TOOLCHAIN_2ND_ARCH \
ANDROID_DEV_SCRIPTS \
ANDROID_EMULATOR_PREBUILTS \
ANDROID_PRE_BUILD_PATHS \
,See $( CHANGES_URL) #other_envsetup_variables)
2017-12-13 03:01:09 +01:00
$( KATI_obsolete_var PRODUCT_COMPATIBILITY_MATRIX_LEVEL_OVERRIDE ,Set FCM Version in device manifest instead . See $ ( CHANGES_URL ) #PRODUCT_COMPATIBILITY_MATRIX_LEVEL_OVERRIDE )
2018-01-11 20:54:48 +01:00
$( KATI_obsolete_var USE_CLANG_PLATFORM_BUILD ,Clang is the only supported Android compiler . See $ ( CHANGES_URL ) #USE_CLANG_PLATFORM_BUILD )
2018-08-30 23:47:35 +02:00
$( KATI_obsolete_var BUILD_DROIDDOC ,Droiddoc is only supported in Soong . See details on build /soong /java /droiddoc .go )
2018-09-17 23:32:52 +02:00
$( KATI_obsolete_var BUILD_APIDIFF ,Apidiff is only supported in Soong . See details on build /soong /java /droiddoc .go )
2018-09-05 07:25:22 +02:00
$( KATI_obsolete_var \
DEFAULT_GCC_CPP_STD_VERSION \
HOST_GLOBAL_CFLAGS 2ND_HOST_GLOBAL_CFLAGS \
HOST_GLOBAL_CONLYFLAGS 2ND_HOST_GLOBAL_CONLYFLAGS \
HOST_GLOBAL_CPPFLAGS 2ND_HOST_GLOBAL_CPPFLAGS \
HOST_GLOBAL_LDFLAGS 2ND_HOST_GLOBAL_LDFLAGS \
HOST_GLOBAL_LLDFLAGS 2ND_HOST_GLOBAL_LLDFLAGS \
HOST_CLANG_SUPPORTED 2ND_HOST_CLANG_SUPPORTED \
HOST_CC 2ND_HOST_CC \
HOST_CXX 2ND_HOST_CXX \
HOST_CROSS_GLOBAL_CFLAGS 2ND_HOST_CROSS_GLOBAL_CFLAGS \
HOST_CROSS_GLOBAL_CONLYFLAGS 2ND_HOST_CROSS_GLOBAL_CONLYFLAGS \
HOST_CROSS_GLOBAL_CPPFLAGS 2ND_HOST_CROSS_GLOBAL_CPPFLAGS \
HOST_CROSS_GLOBAL_LDFLAGS 2ND_HOST_CROSS_GLOBAL_LDFLAGS \
HOST_CROSS_GLOBAL_LLDFLAGS 2ND_HOST_CROSS_GLOBAL_LLDFLAGS \
HOST_CROSS_CLANG_SUPPORTED 2ND_HOST_CROSS_CLANG_SUPPORTED \
HOST_CROSS_CC 2ND_HOST_CROSS_CC \
HOST_CROSS_CXX 2ND_HOST_CROSS_CXX \
TARGET_GLOBAL_CFLAGS 2ND_TARGET_GLOBAL_CFLAGS \
TARGET_GLOBAL_CONLYFLAGS 2ND_TARGET_GLOBAL_CONLYFLAGS \
TARGET_GLOBAL_CPPFLAGS 2ND_TARGET_GLOBAL_CPPFLAGS \
TARGET_GLOBAL_LDFLAGS 2ND_TARGET_GLOBAL_LDFLAGS \
TARGET_GLOBAL_LLDFLAGS 2ND_TARGET_GLOBAL_LLDFLAGS \
TARGET_CLANG_SUPPORTED 2ND_TARGET_CLANG_SUPPORTED \
TARGET_CC 2ND_TARGET_CC \
TARGET_CXX 2ND_TARGET_CXX \
2018-10-08 04:41:21 +02:00
TARGET_TOOLCHAIN_ROOT 2ND_TARGET_TOOLCHAIN_ROOT \
HOST_TOOLCHAIN_ROOT 2ND_HOST_TOOLCHAIN_ROOT \
HOST_CROSS_TOOLCHAIN_ROOT 2ND_HOST_CROSS_TOOLCHAIN_ROOT \
HOST_TOOLS_PREFIX 2ND_HOST_TOOLS_PREFIX \
HOST_CROSS_TOOLS_PREFIX 2ND_HOST_CROSS_TOOLS_PREFIX \
HOST_GCC_VERSION 2ND_HOST_GCC_VERSION \
HOST_CROSS_GCC_VERSION 2ND_HOST_CROSS_GCC_VERSION \
TARGET_NDK_GCC_VERSION 2ND_TARGET_NDK_GCC_VERSION \
GLOBAL_CFLAGS_NO_OVERRIDE GLOBAL_CPPFLAGS_NO_OVERRIDE \
2018-09-05 07:25:22 +02:00
,GCC support has been removed. Use Clang instead)
2018-10-21 06:37:44 +02:00
$( KATI_obsolete_var DIST_DIR dist_goal ,Use dist -for -goals instead . See $ ( CHANGES_URL ) #dist )
2019-02-11 22:09:59 +01:00
$( KATI_obsolete_var TARGET_ANDROID_FILESYSTEM_CONFIG_H ,Use TARGET_FS_CONFIG_GEN instead )
2019-01-02 23:32:54 +01:00
$( KATI_deprecated_var USER ,Use BUILD_USERNAME instead . See $ ( CHANGES_URL ) #USER )
2019-04-17 00:18:52 +02:00
$( KATI_obsolete_var TARGET_ROOT_OUT_SBIN ,/sbin has been removed , use /system /bin instead )
$( KATI_obsolete_var TARGET_ROOT_OUT_SBIN_UNSTRIPPED ,/sbin has been removed , use /system /bin instead )
2019-04-18 18:38:25 +02:00
$( KATI_obsolete_var BUILD_BROKEN_PHONY_TARGETS )
2019-04-18 18:38:25 +02:00
$( KATI_obsolete_var BUILD_BROKEN_DUP_COPY_HEADERS )
2019-02-10 03:58:36 +01:00
$( KATI_obsolete_var BUILD_BROKEN_ENG_DEBUG_TAGS )
2019-05-15 07:03:58 +02:00
$( KATI_obsolete_export It is a global setting . See $ ( CHANGES_URL ) #export_keyword )
$( KATI_obsolete_var BUILD_BROKEN_ANDROIDMK_EXPORTS )
2019-05-29 01:30:18 +02:00
$( KATI_obsolete_var PRODUCT_STATIC_BOOT_CONTROL_HAL ,Use shared library module instead . See $ ( CHANGES_URL ) #PRODUCT_STATIC_BOOT_CONTROL_HAL )
2019-07-19 00:03:52 +02:00
$( KATI_obsolete_var \
ARCH_ARM_HAVE_ARMV7A \
ARCH_DSP_REV \
ARCH_HAVE_ALIGNED_DOUBLES \
ARCH_MIPS_HAS_DSP \
ARCH_MIPS_HAS_FPU \
ARCH_MIPS_REV6 \
ARCH_X86_HAVE_AES_NI \
ARCH_X86_HAVE_AVX \
ARCH_X86_HAVE_AVX2 \
ARCH_X86_HAVE_AVX512 \
ARCH_X86_HAVE_MOVBE \
ARCH_X86_HAVE_POPCNT \
ARCH_X86_HAVE_SSE4 \
ARCH_X86_HAVE_SSE4_2 \
ARCH_X86_HAVE_SSSE3 \
)
2019-07-30 17:41:49 +02:00
$( KATI_obsolete_var PRODUCT_IOT )
2019-09-06 19:58:14 +02:00
$( KATI_obsolete_var MD 5SUM )
2019-10-12 00:52:44 +02:00
$( KATI_obsolete_var BOARD_HAL_STATIC_LIBRARIES , See $ ( CHANGES_URL ) #BOARD_HAL_STATIC_LIBRARIES )
$( KATI_obsolete_var LOCAL_HAL_STATIC_LIBRARIES , See $ ( CHANGES_URL ) #BOARD_HAL_STATIC_LIBRARIES )
2018-02-27 11:15:32 +01:00
2016-11-10 01:35:34 +01:00
# Used to force goals to build. Only use for conditionally defined goals.
.PHONY : FORCE
FORCE :
ORIGINAL_MAKECMDGOALS := $( MAKECMDGOALS)
2017-07-25 09:57:38 +02:00
UNAME := $( shell uname -sm)
2019-04-10 06:35:37 +02:00
SRC_TARGET_DIR := $( TOPDIR) build/make/target
2009-03-04 04:28:42 +01:00
# Some specific paths to tools
2017-12-06 23:38:40 +01:00
SRC_DROIDDOC_DIR := $( TOPDIR) build/make/tools/droiddoc
2009-03-04 04:28:42 +01:00
2018-05-02 09:15:41 +02:00
# Mark some inputs as readonly
i f d e f T A R G E T _ D E V I C E _ D I R
.KATI_READONLY := TARGET_DEVICE_DIR
e n d i f
2019-07-30 08:45:19 +02:00
ONE_SHOT_MAKEFILE :=
.KATI_READONLY := ONE_SHOT_MAKEFILE
2017-05-31 21:48:55 +02:00
# Set up efficient math functions which are used in make.
# Here since this file is included by envsetup as well as during build.
2018-10-19 01:11:40 +02:00
i n c l u d e $( BUILD_SYSTEM_COMMON ) / m a t h . m k
2017-05-31 21:48:55 +02:00
2018-10-19 01:11:40 +02:00
i n c l u d e $( BUILD_SYSTEM_COMMON ) / s t r i n g s . m k
2018-09-22 01:39:37 +02:00
2018-11-17 06:26:33 +01:00
i n c l u d e $( BUILD_SYSTEM_COMMON ) / j s o n . m k
2009-03-04 04:28:42 +01:00
# Various mappings to avoid hard-coding paths all over the place
i n c l u d e $( BUILD_SYSTEM ) / p a t h m a p . m k
2018-02-15 17:26:31 +01:00
# Allow projects to define their own globally-available variables
i n c l u d e $( BUILD_SYSTEM ) / p r o j e c t _ d e f i n i t i o n s . m k
2009-03-04 04:28:42 +01:00
# ###############################################################
# Build system internal files
# ###############################################################
2019-04-17 21:25:25 +02:00
BUILD_COMBOS := $= $( BUILD_SYSTEM) /combo
CLEAR_VARS := $= $( BUILD_SYSTEM) /clear_vars.mk
BUILD_HOST_STATIC_LIBRARY := $= $( BUILD_SYSTEM) /host_static_library.mk
BUILD_HOST_SHARED_LIBRARY := $= $( BUILD_SYSTEM) /host_shared_library.mk
BUILD_STATIC_LIBRARY := $= $( BUILD_SYSTEM) /static_library.mk
BUILD_HEADER_LIBRARY := $= $( BUILD_SYSTEM) /header_library.mk
BUILD_AUX_STATIC_LIBRARY := $= $( BUILD_SYSTEM) /aux_static_library.mk
BUILD_AUX_EXECUTABLE := $= $( BUILD_SYSTEM) /aux_executable.mk
BUILD_SHARED_LIBRARY := $= $( BUILD_SYSTEM) /shared_library.mk
BUILD_EXECUTABLE := $= $( BUILD_SYSTEM) /executable.mk
BUILD_HOST_EXECUTABLE := $= $( BUILD_SYSTEM) /host_executable.mk
BUILD_PACKAGE := $= $( BUILD_SYSTEM) /package.mk
BUILD_PHONY_PACKAGE := $= $( BUILD_SYSTEM) /phony_package.mk
BUILD_RRO_PACKAGE := $= $( BUILD_SYSTEM) /build_rro_package.mk
BUILD_HOST_PREBUILT := $= $( BUILD_SYSTEM) /host_prebuilt.mk
BUILD_PREBUILT := $= $( BUILD_SYSTEM) /prebuilt.mk
BUILD_MULTI_PREBUILT := $= $( BUILD_SYSTEM) /multi_prebuilt.mk
BUILD_JAVA_LIBRARY := $= $( BUILD_SYSTEM) /java_library.mk
BUILD_STATIC_JAVA_LIBRARY := $= $( BUILD_SYSTEM) /static_java_library.mk
BUILD_HOST_JAVA_LIBRARY := $= $( BUILD_SYSTEM) /host_java_library.mk
BUILD_COPY_HEADERS := $= $( BUILD_SYSTEM) /copy_headers.mk
BUILD_NATIVE_TEST := $= $( BUILD_SYSTEM) /native_test.mk
BUILD_NATIVE_BENCHMARK := $= $( BUILD_SYSTEM) /native_benchmark.mk
BUILD_HOST_NATIVE_TEST := $= $( BUILD_SYSTEM) /host_native_test.mk
BUILD_FUZZ_TEST := $= $( BUILD_SYSTEM) /fuzz_test.mk
BUILD_HOST_FUZZ_TEST := $= $( BUILD_SYSTEM) /host_fuzz_test.mk
BUILD_SHARED_TEST_LIBRARY := $= $( BUILD_SYSTEM) /shared_test_lib.mk
BUILD_HOST_SHARED_TEST_LIBRARY := $= $( BUILD_SYSTEM) /host_shared_test_lib.mk
BUILD_STATIC_TEST_LIBRARY := $= $( BUILD_SYSTEM) /static_test_lib.mk
BUILD_HOST_STATIC_TEST_LIBRARY := $= $( BUILD_SYSTEM) /host_static_test_lib.mk
BUILD_NOTICE_FILE := $= $( BUILD_SYSTEM) /notice_files.mk
BUILD_HOST_DALVIK_JAVA_LIBRARY := $= $( BUILD_SYSTEM) /host_dalvik_java_library.mk
BUILD_HOST_DALVIK_STATIC_JAVA_LIBRARY := $= $( BUILD_SYSTEM) /host_dalvik_static_java_library.mk
BUILD_HOST_TEST_CONFIG := $= $( BUILD_SYSTEM) /host_test_config.mk
BUILD_TARGET_TEST_CONFIG := $= $( BUILD_SYSTEM) /target_test_config.mk
2017-12-07 00:57:31 +01:00
2019-04-17 21:25:09 +02:00
i n c l u d e $( BUILD_SYSTEM ) / d e p r e c a t i o n . m k
2017-12-07 00:57:31 +01:00
2009-03-04 04:28:42 +01:00
# ###############################################################
# Parse out any modifier targets.
# ###############################################################
2017-05-26 07:10:08 +02:00
hide := @
2009-03-04 04:28:42 +01:00
2015-10-28 22:33:40 +01:00
################################################################
# Tools needed in product configuration makefiles.
################################################################
2017-12-06 23:38:40 +01:00
NORMALIZE_PATH := build/make/tools/normalize_path.py
2015-10-28 22:33:40 +01:00
# $(1): the paths to be normalized
d e f i n e n o r m a l i z e - p a t h s
$( if $ ( 1) ,$ ( shell $ ( NORMALIZE_PATH ) $ ( 1) ) )
e n d e f
2009-03-04 04:28:42 +01:00
# ###############################################################
# Set common values
# ###############################################################
2018-03-13 08:04:48 +01:00
# Initialize SOONG_CONFIG_NAMESPACES so that it isn't recursive.
SOONG_CONFIG_NAMESPACES :=
2020-01-03 02:59:11 +01:00
# The add_soong_config_namespace function adds a namespace and initializes it
# to be empty.
# $1 is the namespace.
# Ex: $(call add_soong_config_namespace,acme)
d e f i n e a d d _ s o o n g _ c o n f i g _ n a m e s p a c e
$( eval SOONG_CONFIG_NAMESPACES += $ 1) \
$(eval SOONG_CONFIG_$1 : =)
e n d e f
2020-02-07 00:27:59 +01:00
# The add_soong_config_var function adds a a list of soong config variables to
# SOONG_CONFIG_*. The variables and their values are then available to a
2020-01-03 02:59:11 +01:00
# soong_config_module_type in an Android.bp file.
2020-02-07 00:27:59 +01:00
# $1 is the namespace. $2 is the list of variables.
# Ex: $(call add_soong_config_var,acme,COOL_FEATURE_A COOL_FEATURE_B)
2020-01-03 02:59:11 +01:00
d e f i n e a d d _ s o o n g _ c o n f i g _ v a r
$( eval SOONG_CONFIG_ $ 1 += $ 2) \
2020-02-07 00:27:59 +01:00
$(foreach v,$2,$(eval SOONG_CONFIG_$1_$v : = $( $ v ) ))
2020-01-03 02:59:11 +01:00
e n d e f
# The add_soong_config_var_value function defines a make variable and also adds
# the variable to SOONG_CONFIG_*.
# $1 is the namespace. $2 is the variable name. $3 is the variable value.
# Ex: $(call add_soong_config_var_value,acme,COOL_FEATURE,true)
d e f i n e a d d _ s o o n g _ c o n f i g _ v a r _ v a l u e
$(eval $2 : = $3) \
$( call add_soong_config_var ,$ 1,$ 2)
e n d e f
2009-03-04 04:28:42 +01:00
# Set the extensions used for various packages
COMMON_PACKAGE_SUFFIX := .zip
COMMON_JAVA_PACKAGE_SUFFIX := .jar
COMMON_ANDROID_PACKAGE_SUFFIX := .apk
2015-03-13 12:08:26 +01:00
i f d e f T M P D I R
JAVA_TMPDIR_ARG := -Djava.io.tmpdir= $( TMPDIR)
e l s e
JAVA_TMPDIR_ARG :=
e n d i f
2009-03-04 04:28:42 +01:00
# ###############################################################
# Include sub-configuration files
# ###############################################################
# ---------------------------------------------------------------
# Try to include buildspec.mk, which will try to set stuff up.
2013-06-27 21:02:46 +02:00
# If this file doesn't exist, the environment variables will
2009-03-04 04:28:42 +01:00
# be used, and if that doesn't work, then the default is an
# arm build
2011-11-02 21:49:08 +01:00
i f n d e f A N D R O I D _ B U I L D S P E C
ANDROID_BUILDSPEC := $( TOPDIR) buildspec.mk
e n d i f
- i n c l u d e $( ANDROID_BUILDSPEC )
2009-03-04 04:28:42 +01:00
# ---------------------------------------------------------------
# Define most of the global variables. These are the ones that
# are specific to the user's build configuration.
i n c l u d e $( BUILD_SYSTEM ) / e n v s e t u p . m k
2015-06-09 19:35:45 +02:00
# Pruned directory options used when using findleaves.py
# See envsetup.mk for a description of SCAN_EXCLUDE_DIRS
2016-10-05 01:21:49 +02:00
FIND_LEAVES_EXCLUDES := $( addprefix --prune= , $( SCAN_EXCLUDE_DIRS) .repo .git)
2015-06-09 19:35:45 +02:00
2012-03-30 19:45:38 +02:00
# The build system exposes several variables for where to find the kernel
# headers:
# TARGET_DEVICE_KERNEL_HEADERS is automatically created for the current
# device being built. It is set as $(TARGET_DEVICE_DIR)/kernel-headers,
# e.g. device/samsung/tuna/kernel-headers. This directory is not
# explicitly set by anyone, the build system always adds this subdir.
#
# TARGET_BOARD_KERNEL_HEADERS is specified by the BoardConfig.mk file
# to allow other directories to be included. This is useful if there's
# some common place where a few headers are being kept for a group
# of devices. For example, device/<vendor>/common/kernel-headers could
# contain some headers for several of <vendor>'s devices.
#
# TARGET_PRODUCT_KERNEL_HEADERS is generated by the product inheritance
# graph. This allows architecture products to provide headers for the
# devices using that architecture. For example,
# hardware/ti/omap4xxx/omap4.mk will specify
# PRODUCT_VENDOR_KERNEL_HEADERS variable that specify where the omap4
# specific headers are, e.g. hardware/ti/omap4xxx/kernel-headers.
# The build system then combines all the values specified by all the
# PRODUCT_VENDOR_KERNEL_HEADERS directives in the product inheritance
# tree and then exports a TARGET_PRODUCT_KERNEL_HEADERS variable.
#
# The layout of subdirs in any of the kernel-headers dir should mirror the
# layout of the kernel include/ directory. For example,
# device/samsung/tuna/kernel-headers/linux/,
# hardware/ti/omap4xxx/kernel-headers/media/,
# etc.
#
# NOTE: These directories MUST contain post-processed headers using the
2016-04-22 19:18:15 +02:00
# bionic/libc/kernel/tools/clean_header.py tool. Additionally, the original
# kernel headers must also be checked in, but in a different subdirectory. By
2012-03-30 19:45:38 +02:00
# convention, the originals should be checked into original-kernel-headers
# directory of the same parent dir. For example,
# device/samsung/tuna/kernel-headers <----- post-processed
# device/samsung/tuna/original-kernel-headers <----- originals
#
2012-03-15 07:50:17 +01:00
TARGET_DEVICE_KERNEL_HEADERS := $( strip $( wildcard $( TARGET_DEVICE_DIR) /kernel-headers) )
2012-03-16 17:57:11 +01:00
d e f i n e v a l i d a t e - k e r n e l - h e a d e r s
$( if $ ( firstword $ ( foreach hdr_dir ,$ ( 1) ,\
$( filter-out kernel-headers,$( notdir $( hdr_dir) ) ) ) ) ,\
$( error Kernel header dirs must be end in kernel-headers: $( 1) ) )
e n d e f
2012-03-15 07:50:17 +01:00
# also allow the board config to provide additional directories since
# there could be device/oem/base_hw and device/oem/derived_hw
# that both are valid devices but derived_hw needs to use kernel headers
# from base_hw.
TARGET_BOARD_KERNEL_HEADERS := $( strip $( wildcard $( TARGET_BOARD_KERNEL_HEADERS) ) )
TARGET_BOARD_KERNEL_HEADERS := $( patsubst %/,%,$( TARGET_BOARD_KERNEL_HEADERS) )
2012-03-16 17:57:11 +01:00
$( call validate -kernel -headers ,$ ( TARGET_BOARD_KERNEL_HEADERS ) )
# then add product-inherited includes, to allow for
# hardware/sivendor/chip/chip.mk to include their own headers
TARGET_PRODUCT_KERNEL_HEADERS := $( strip $( wildcard $( PRODUCT_VENDOR_KERNEL_HEADERS) ) )
TARGET_PRODUCT_KERNEL_HEADERS := $( patsubst %/,%,$( TARGET_PRODUCT_KERNEL_HEADERS) )
$( call validate -kernel -headers ,$ ( TARGET_PRODUCT_KERNEL_HEADERS ) )
2019-02-26 16:49:25 +01:00
.KATI_READONLY := TARGET_DEVICE_KERNEL_HEADERS TARGET_BOARD_KERNEL_HEADERS TARGET_PRODUCT_KERNEL_HEADERS
2012-03-15 07:50:17 +01:00
2015-10-09 07:36:04 +02:00
# Commands to generate .toc file common to ELF .so files.
d e f i n e _ g e n _ t o c _ c o m m a n d _ f o r _ e l f
2015-11-05 04:51:08 +01:00
$( hide ) ( $( $ ( PRIVATE_ 2ND_ARCH_VAR_PREFIX ) $ ( PRIVATE_PREFIX ) READELF ) - d $( 1) | g r e p S O N A M E | | e c h o "No SONAME for $1" ) > $( 2)
2016-01-06 07:13:25 +01:00
$( hide ) $( $ ( PRIVATE_ 2ND_ARCH_VAR_PREFIX ) $ ( PRIVATE_PREFIX ) READELF ) - - d y n - s y m s $( 1) | a w k '{$$2=""; $$3=""; print}' > > $( 2)
2015-10-09 07:36:04 +02:00
e n d e f
# Commands to generate .toc file from Darwin dynamic library.
d e f i n e _ g e n _ t o c _ c o m m a n d _ f o r _ m a c h o
2018-06-04 01:20:08 +02:00
$( hide ) $( HOST_OTOOL ) - l $( 1) | g r e p L C _ I D _ D Y L I B - A 5 > $( 2)
$( hide ) $( HOST_NM ) - g P $( 1) | c u t - f 1 - 2 - d " " | ( g r e p - v U $$ > > $( 2) | | t r u e )
2015-10-09 07:36:04 +02:00
e n d e f
2017-10-12 10:35:14 +02:00
i f e q ( $( CALLED_FROM_SETUP ) , t r u e )
2015-07-21 03:40:18 +02:00
i n c l u d e $( BUILD_SYSTEM ) / c c a c h e . m k
2015-08-17 10:38:24 +02:00
i n c l u d e $( BUILD_SYSTEM ) / g o m a . m k
2019-07-17 14:28:40 +02:00
i n c l u d e $( BUILD_SYSTEM ) / r b e . m k
2016-08-31 22:32:39 +02:00
e n d i f
2016-08-31 18:35:32 +02:00
2014-05-01 03:09:13 +02:00
i f d e f T A R G E T _ P R E F E R _ 3 2 _ B I T
TARGET_PREFER_32_BIT_APPS := true
TARGET_PREFER_32_BIT_EXECUTABLES := true
e n d i f
2016-05-17 07:07:31 +02:00
# GCC version selection
TARGET_GCC_VERSION := 4.9
i f d e f T A R G E T _ 2 N D _ A R C H
2ND_TARGET_GCC_VERSION := 4.9
e n d i f
2016-09-27 02:37:19 +02:00
# Normalize WITH_STATIC_ANALYZER
2013-09-10 11:37:14 +02:00
i f e q ( $( strip $ ( WITH_STATIC_ANALYZER ) ) , 0 )
WITH_STATIC_ANALYZER :=
e n d i f
2016-04-01 01:30:23 +02:00
# Unset WITH_TIDY_ONLY if global WITH_TIDY_ONLY is not true nor 1.
i f e q ( , $( filter 1 true ,$ ( WITH_TIDY_ONLY ) ) )
WITH_TIDY_ONLY :=
e n d i f
2009-03-04 04:28:42 +01:00
# Pick a Java compiler.
i n c l u d e $( BUILD_SYSTEM ) / c o m b o / j a v a c . m k
# ---------------------------------------------------------------
# Check that the configuration is current. We check that
# BUILD_ENV_SEQUENCE_NUMBER is current against this value.
# Don't fail if we're called from envsetup, so they have a
# chance to update their environment.
i f e q ( , $( strip $ ( CALLED_FROM_SETUP ) ) )
i f n e q ( , $( strip $ ( BUILD_ENV_SEQUENCE_NUMBER ) ) )
i f n e q ( $( BUILD_ENV_SEQUENCE_NUMBER ) , $( CORRECT_BUILD_ENV_SEQUENCE_NUMBER ) )
$( warning BUILD_ENV_SEQUENCE_NUMBER is set incorrectly .)
$(info *** If you use envsetup/lunch/choosecombo : )
$( info *** - Re -execute envsetup ( ". envsetup .sh ") )
$( info *** - Re -run lunch or choosecombo )
$(info *** If you use buildspec.mk : )
$( info *** - Look at buildspec .mk .default to see what has changed )
$( info *** - Update BUILD_ENV_SEQUENCE_NUMBER to "$ ( CORRECT_BUILD_ENV_SEQUENCE_NUMBER ) ")
$( error bailing ..)
e n d i f
e n d i f
e n d i f
2016-01-27 00:59:50 +01:00
# Set up PDK so we can use TARGET_BUILD_PDK to select prebuilt tools below
.PHONY : pdk fusion
pdk fusion : $( DEFAULT_GOAL )
# What to build:
# pdk fusion if:
2018-03-06 23:07:21 +01:00
# 1) PDK_FUSION_PLATFORM_ZIP / PDK_FUSION_PLATFORM_DIR is passed in from the environment
2016-01-27 00:59:50 +01:00
# or
2018-03-06 23:07:21 +01:00
# 2) the platform.zip / pdk.mk exists in the default location
2016-01-27 00:59:50 +01:00
# or
# 3) fusion is a command line build goal,
# PDK_FUSION_PLATFORM_ZIP is needed anyway, then do we need the 'fusion' goal?
# otherwise pdk only if:
# 1) pdk is a command line build goal
# or
# 2) TARGET_BUILD_PDK is passed in from the environment
2018-03-06 23:07:21 +01:00
# if PDK_FUSION_PLATFORM_ZIP or PDK_FUSION_PLATFORM_DIR is specified, do not override.
i f e q ( , $( strip $ ( PDK_FUSION_PLATFORM_ZIP ) $ ( PDK_FUSION_PLATFORM_DIR ) ) )
# Most PDK project paths should be using vendor/pdk/TARGET_DEVICE
# but some legacy ones (e.g. mini_armv7a_neon generic PDK) were setup
# with vendor/pdk/TARGET_PRODUCT.
# Others are set up with vendor/pdk/TARGET_DEVICE/TARGET_DEVICE-userdebug
_pdk_fusion_search_paths := \
vendor/pdk/$( TARGET_DEVICE) /$( TARGET_DEVICE) -$( TARGET_BUILD_VARIANT) /platform \
vendor/pdk/$( TARGET_DEVICE) /$( TARGET_PRODUCT) -$( TARGET_BUILD_VARIANT) /platform \
vendor/pdk/$( TARGET_DEVICE) /$( patsubst aosp_%,full_%,$( TARGET_PRODUCT) ) -$( TARGET_BUILD_VARIANT) /platform \
vendor/pdk/$( TARGET_PRODUCT) /$( TARGET_PRODUCT) -$( TARGET_BUILD_VARIANT) /platform \
vendor/pdk/$( TARGET_PRODUCT) /$( patsubst aosp_%,full_%,$( TARGET_PRODUCT) ) -$( TARGET_BUILD_VARIANT) /platform
_pdk_fusion_default_platform_zip := $( strip $( foreach p,$( _pdk_fusion_search_paths) ,$( wildcard $( p) /platform.zip) ) )
ifneq ( ,$( _pdk_fusion_default_platform_zip) )
PDK_FUSION_PLATFORM_ZIP := $( word 1, $( _pdk_fusion_default_platform_zip) )
_pdk_fusion_default_platform_zip :=
else
_pdk_fusion_default_platform_mk := $( strip $( foreach p,$( _pdk_fusion_search_paths) ,$( wildcard $( p) /pdk.mk) ) )
ifneq ( ,$( _pdk_fusion_default_platform_mk) )
PDK_FUSION_PLATFORM_DIR := $( dir $( word 1,$( _pdk_fusion_default_platform_mk) ) )
_pdk_fusion_default_platform_mk :=
endif
endif # _pdk_fusion_default_platform_zip
_pdk_fusion_search_paths :=
e n d i f # !PDK_FUSION_PLATFORM_ZIP && !PDK_FUSION_PLATFORM_DIR
i f n e q ( , $( PDK_FUSION_PLATFORM_ZIP ) )
ifneq ( ,$( PDK_FUSION_PLATFORM_DIR) )
$( error Only one of PDK_FUSION_PLATFORM_ZIP or PDK_FUSION_PLATFORM_DIR may be specified)
endif
e n d i f
2016-01-27 00:59:50 +01:00
i f n e q ( , $( filter pdk fusion , $ ( MAKECMDGOALS ) ) )
TARGET_BUILD_PDK := true
i f n e q ( , $( filter fusion , $ ( MAKECMDGOALS ) ) )
2018-03-06 23:07:21 +01:00
i f e q ( , $( strip $ ( PDK_FUSION_PLATFORM_ZIP ) $ ( PDK_FUSION_PLATFORM_DIR ) ) )
$( error Specify PDK_FUSION_PLATFORM_ZIP or PDK_FUSION_PLATFORM_DIR to do a PDK fusion.)
2016-01-27 00:59:50 +01:00
e n d i f
e n d i f # fusion
e n d i f # pdk or fusion
i f d e f P D K _ F U S I O N _ P L A T F O R M _ Z I P
TARGET_BUILD_PDK := true
i f e q ( , $( wildcard $ ( PDK_FUSION_PLATFORM_ZIP ) ) )
2018-11-05 19:40:45 +01:00
ifneq ( ,$( wildcard $( patsubst %.zip,%,$( PDK_FUSION_PLATFORM_ZIP) ) /pdk.mk) )
PDK_FUSION_PLATFORM_DIR := $( patsubst %.zip,%,$( PDK_FUSION_PLATFORM_ZIP) )
2018-03-06 23:07:21 +01:00
PDK_FUSION_PLATFORM_ZIP :=
else
$( error Cannot find file $( PDK_FUSION_PLATFORM_ZIP) .)
endif
e n d i f
e n d i f
i f d e f P D K _ F U S I O N _ P L A T F O R M _ D I R
TARGET_BUILD_PDK := true
i f e q ( , $( wildcard $ ( PDK_FUSION_PLATFORM_DIR ) /pdk .mk ) )
$( error Cannot find file $( PDK_FUSION_PLATFORM_DIR) /pdk.mk.)
2016-01-27 00:59:50 +01:00
e n d i f
e n d i f
2016-03-11 19:32:01 +01:00
BUILD_PLATFORM_ZIP := $( filter platform platform-java,$( MAKECMDGOALS) )
2017-06-03 00:25:20 +02:00
# ---------------------------------------------------------------
# Whether we can expect a full build graph
ALLOW_MISSING_DEPENDENCIES := $( filter true,$( ALLOW_MISSING_DEPENDENCIES) )
i f n e q ( $( TARGET_BUILD_APPS ) , )
ALLOW_MISSING_DEPENDENCIES := true
e n d i f
i f e q ( $( TARGET_BUILD_PDK ) , t r u e )
ALLOW_MISSING_DEPENDENCIES := true
e n d i f
i f n e q ( $( filter true ,$ ( SOONG_ALLOW_MISSING_DEPENDENCIES ) ) , )
ALLOW_MISSING_DEPENDENCIES := true
e n d i f
.KATI_READONLY := ALLOW_MISSING_DEPENDENCIES
2018-12-19 07:43:16 +01:00
TARGET_BUILD_APPS_USE_PREBUILT_SDK :=
i f d e f T A R G E T _ B U I L D _ A P P S
ifndef UNBUNDLED_BUILD_SDKS_FROM_SOURCE
TARGET_BUILD_APPS_USE_PREBUILT_SDK := true
endif
e n d i f
2016-03-08 20:12:40 +01:00
prebuilt_sdk_tools := prebuilts/sdk/tools
prebuilt_sdk_tools_bin := $( prebuilt_sdk_tools) /$( HOST_OS) /bin
2015-12-03 01:33:04 +01:00
2017-09-23 00:03:38 +02:00
prebuilt_build_tools := prebuilts/build-tools
prebuilt_build_tools_wrappers := prebuilts/build-tools/common/bin
prebuilt_build_tools_jars := prebuilts/build-tools/common/framework
2018-05-26 01:13:52 +02:00
prebuilt_build_tools_bin_noasan := $( prebuilt_build_tools) /$( HOST_PREBUILT_TAG) /bin
2017-09-23 00:03:38 +02:00
i f e q ( $( filter address ,$ ( SANITIZE_HOST ) ) , )
2018-05-26 01:13:52 +02:00
prebuilt_build_tools_bin := $( prebuilt_build_tools_bin_noasan)
2017-09-23 00:03:38 +02:00
e l s e
prebuilt_build_tools_bin := $( prebuilt_build_tools) /$( HOST_PREBUILT_TAG) /asan/bin
e n d i f
2017-07-06 22:42:00 +02:00
USE_PREBUILT_SDK_TOOLS_IN_PLACE := true
2017-05-12 02:44:59 +02:00
2017-11-02 01:49:52 +01:00
# Work around for b/68406220
# This should match the soong version.
2018-06-06 23:46:25 +02:00
USE_D8 := true
2018-06-19 19:23:50 +02:00
.KATI_READONLY := USE_D8
2017-11-02 01:49:52 +01:00
2017-07-06 22:42:00 +02:00
#
# Tools that are prebuilts for TARGET_BUILD_APPS
#
i f e q ( , $( TARGET_BUILD_APPS ) $( filter true ,$ ( TARGET_BUILD_PDK ) ) )
AAPT := $( HOST_OUT_EXECUTABLES) /aapt
MAINDEXCLASSES := $( HOST_OUT_EXECUTABLES) /mainDexClasses
2017-07-18 07:22:59 +02:00
2017-07-06 22:42:00 +02:00
e l s e # TARGET_BUILD_APPS || TARGET_BUILD_PDK
AAPT := $( prebuilt_sdk_tools_bin) /aapt
MAINDEXCLASSES := $( prebuilt_sdk_tools) /mainDexClasses
e n d i f # TARGET_BUILD_APPS || TARGET_BUILD_PDK
2015-12-03 01:33:04 +01:00
2017-07-06 22:42:00 +02:00
i f e q ( , $( TARGET_BUILD_APPS ) )
# Use RenderScript prebuilts for unbundled builds but not PDK builds
LLVM_RS_CC := $( HOST_OUT_EXECUTABLES) /llvm-rs-cc
BCC_COMPAT := $( HOST_OUT_EXECUTABLES) /bcc_compat
e l s e
LLVM_RS_CC := $( prebuilt_sdk_tools_bin) /llvm-rs-cc
BCC_COMPAT := $( prebuilt_sdk_tools_bin) /bcc_compat
e n d i f # TARGET_BUILD_PDK
2016-08-07 05:15:06 +02:00
2017-07-06 22:42:00 +02:00
prebuilt_sdk_tools :=
prebuilt_sdk_tools_bin :=
2017-04-17 23:59:43 +02:00
2016-06-06 23:44:00 +02:00
ACP := $( prebuilt_build_tools_bin) /acp
2016-04-20 00:32:22 +02:00
CKATI := $( prebuilt_build_tools_bin) /ckati
2017-07-06 22:42:00 +02:00
DEPMOD := $( HOST_OUT_EXECUTABLES) /depmod
FILESLIST := $( SOONG_HOST_OUT_EXECUTABLES) /fileslist
2019-06-11 01:39:45 +02:00
FILESLIST_UTIL := $= build/make/tools/fileslist_util.py
2018-06-13 23:51:05 +02:00
HOST_INIT_VERIFIER := $( HOST_OUT_EXECUTABLES) /host_init_verifier
2018-02-27 03:26:44 +01:00
XMLLINT := $( SOONG_HOST_OUT_EXECUTABLES) /xmllint
2019-08-08 21:56:01 +02:00
# SOONG_ZIP is exported by Soong, but needs to be defined early for
# $OUT/dexpreopt.global. It will be verified against the Soong version.
SOONG_ZIP := $( SOONG_HOST_OUT_EXECUTABLES) /soong_zip
2016-03-08 20:12:40 +01:00
2009-03-04 04:28:42 +01:00
# ---------------------------------------------------------------
# Generic tools.
2018-05-26 01:13:52 +02:00
LEX := $( prebuilt_build_tools_bin_noasan) /flex
2013-04-06 03:02:16 +02:00
# The default PKGDATADIR built in the prebuilt bison is a relative path
2018-01-09 02:28:17 +01:00
# prebuilts/build-tools/common/bison.
2013-04-06 03:02:16 +02:00
# To run bison from elsewhere you need to set up enviromental variable
# BISON_PKGDATADIR.
2018-01-09 02:28:17 +01:00
BISON_PKGDATADIR := $( PWD) /prebuilts/build-tools/common/bison
2018-05-26 01:13:52 +02:00
BISON := $( prebuilt_build_tools_bin_noasan) /bison
2013-04-06 03:02:16 +02:00
YACC := $( BISON) -d
2018-01-09 02:28:17 +01:00
BISON_DATA := $( wildcard $( BISON_PKGDATADIR) /* $( BISON_PKGDATADIR) /*/*)
2020-01-09 07:31:12 +01:00
M4 := $= $( prebuilt_build_tools_bin_noasan) /m4
2013-04-06 03:02:16 +02:00
2014-06-06 04:05:47 +02:00
YASM := prebuilts/misc/$( BUILD_OS) -$( HOST_PREBUILT_ARCH) /yasm/yasm
2009-03-04 04:28:42 +01:00
DOXYGEN := doxygen
2015-09-24 10:40:52 +02:00
i f e q ( $( HOST_OS ) , l i n u x )
BREAKPAD_DUMP_SYMS := $( HOST_OUT_EXECUTABLES) /dump_syms
e l s e
# For non-supported hosts, do not generate breakpad symbols.
BREAKPAD_GENERATE_SYMBOLS := false
e n d i f
2010-11-05 19:28:51 +01:00
PROTOC := $( HOST_OUT_EXECUTABLES) /aprotoc$( HOST_EXECUTABLE_SUFFIX)
2018-08-04 01:48:10 +02:00
NANOPB_SRCS := $( HOST_OUT_EXECUTABLES) /protoc-gen-nanopb
2016-02-19 20:06:58 +01:00
VTSC := $( HOST_OUT_EXECUTABLES) /vtsc$( HOST_EXECUTABLE_SUFFIX)
2009-03-04 04:28:42 +01:00
MKBOOTFS := $( HOST_OUT_EXECUTABLES) /mkbootfs$( HOST_EXECUTABLE_SUFFIX)
2009-05-27 18:14:25 +02:00
MINIGZIP := $( HOST_OUT_EXECUTABLES) /minigzip$( HOST_EXECUTABLE_SUFFIX)
2012-11-26 01:53:44 +01:00
i f e q ( , $( strip $ ( BOARD_CUSTOM_MKBOOTIMG ) ) )
2009-03-04 04:28:42 +01:00
MKBOOTIMG := $( HOST_OUT_EXECUTABLES) /mkbootimg$( HOST_EXECUTABLE_SUFFIX)
2012-11-26 01:53:44 +01:00
e l s e
MKBOOTIMG := $( BOARD_CUSTOM_MKBOOTIMG)
e n d i f
2016-04-08 21:08:03 +02:00
i f e q ( , $( strip $ ( BOARD_CUSTOM_BPTTOOL ) ) )
BPTTOOL := $( HOST_OUT_EXECUTABLES) /bpttool$( HOST_EXECUTABLE_SUFFIX)
e l s e
BPTTOOL := $( BOARD_CUSTOM_BPTTOOL)
e n d i f
Update for new Android Verified Boot (AVB).
This updates the build system for the new Android Verified Boot
codebase. As this is based on Brillo Verified Boot, this change replaces
the existing BVB support.
Android Verified Boot is enabled by the BOARD_AVB_ENABLE variable
BOARD_AVB_ENABLE := true
This will make the build system create vbmeta.img which will contain a
hash descriptor for boot.img, a hashtree descriptor for system.img, a
kernel-cmdline descriptor for setting up dm-verity for system.img and
append a hash-tree to system.img.
Additionally, the descriptors are left in boot.img and system.img so a
third party can create their own vbmeta.img file linking - using the
option --chain_partition - to these images. If this is not needed
footers can be erased using the 'avbtool erase_footer' command. It's
also harmless to just leave them in the images.
By default, the algorithm SHA256_RSA4096 is used with a test key from
the AVB source directory. This can be overriden by the
BOARD_AVB_ALGORITHM and BOARD_AVB_KEY_PATH variables to use e.g. a
4096-bit RSA key and SHA-512:
BOARD_AVB_ALGORITHM := SHA512_RSA4096
BOARD_AVB_KEY_PATH := /path/to/rsa_key_4096bits.pem
To prevent rollback attacks, the rollback index should be increased on a
regular basis. The rollback index can be set with the
BOARD_AVB_ROLLBACK_INDEX variable:
BOARD_AVB_ROLLBACK_INDEX := 5
If this is not set, the rollback index defaults to 0.
The variable BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS can be used to specify
additional options passed to 'avbtool make_vbmeta_image'. Typical
options to be used here include '--prop', '--prop_from_file', and
'--chain_partition'.
The variable BOARD_AVBTOOL_BOOT_ADD_HASH_FOOTER_ARGS can be used to
specify additional options passed to 'avbtool add_hash_footer' for
boot.img. Typical options to be used here include '--hash_algorithm' and
'--salt'.
The variable BOARD_AVBTOOL_SYSTEM_ADD_HASHTREE_FOOTER_ARGS can be used
to specify additional options passed to 'avbtool add_hashtree_footer'
for systems.img. Typical options to be used here include
'--hash_algorithm', '--salt', and '--block_size'.
BUG=31264226
TEST=Manually tested on edison-eng by inspecting {boot, system,
vbmeta}.img in out/ directory as well as their counterparts in
the IMAGES/ directory of edision-target_files-eng.zeuthen.zip
Merged-In: Ic9a61cfc65c148b12996e57f04da5432eef6b982
Change-Id: I97042655bca15e7eac899f12c5bada2f6184d307
2016-09-15 19:43:54 +02:00
i f e q ( , $( strip $ ( BOARD_CUSTOM_AVBTOOL ) ) )
AVBTOOL := $( HOST_OUT_EXECUTABLES) /avbtool$( HOST_EXECUTABLE_SUFFIX)
2016-01-29 22:59:17 +01:00
e l s e
Update for new Android Verified Boot (AVB).
This updates the build system for the new Android Verified Boot
codebase. As this is based on Brillo Verified Boot, this change replaces
the existing BVB support.
Android Verified Boot is enabled by the BOARD_AVB_ENABLE variable
BOARD_AVB_ENABLE := true
This will make the build system create vbmeta.img which will contain a
hash descriptor for boot.img, a hashtree descriptor for system.img, a
kernel-cmdline descriptor for setting up dm-verity for system.img and
append a hash-tree to system.img.
Additionally, the descriptors are left in boot.img and system.img so a
third party can create their own vbmeta.img file linking - using the
option --chain_partition - to these images. If this is not needed
footers can be erased using the 'avbtool erase_footer' command. It's
also harmless to just leave them in the images.
By default, the algorithm SHA256_RSA4096 is used with a test key from
the AVB source directory. This can be overriden by the
BOARD_AVB_ALGORITHM and BOARD_AVB_KEY_PATH variables to use e.g. a
4096-bit RSA key and SHA-512:
BOARD_AVB_ALGORITHM := SHA512_RSA4096
BOARD_AVB_KEY_PATH := /path/to/rsa_key_4096bits.pem
To prevent rollback attacks, the rollback index should be increased on a
regular basis. The rollback index can be set with the
BOARD_AVB_ROLLBACK_INDEX variable:
BOARD_AVB_ROLLBACK_INDEX := 5
If this is not set, the rollback index defaults to 0.
The variable BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS can be used to specify
additional options passed to 'avbtool make_vbmeta_image'. Typical
options to be used here include '--prop', '--prop_from_file', and
'--chain_partition'.
The variable BOARD_AVBTOOL_BOOT_ADD_HASH_FOOTER_ARGS can be used to
specify additional options passed to 'avbtool add_hash_footer' for
boot.img. Typical options to be used here include '--hash_algorithm' and
'--salt'.
The variable BOARD_AVBTOOL_SYSTEM_ADD_HASHTREE_FOOTER_ARGS can be used
to specify additional options passed to 'avbtool add_hashtree_footer'
for systems.img. Typical options to be used here include
'--hash_algorithm', '--salt', and '--block_size'.
BUG=31264226
TEST=Manually tested on edison-eng by inspecting {boot, system,
vbmeta}.img in out/ directory as well as their counterparts in
the IMAGES/ directory of edision-target_files-eng.zeuthen.zip
Merged-In: Ic9a61cfc65c148b12996e57f04da5432eef6b982
Change-Id: I97042655bca15e7eac899f12c5bada2f6184d307
2016-09-15 19:43:54 +02:00
AVBTOOL := $( BOARD_CUSTOM_AVBTOOL)
2016-01-29 22:59:17 +01:00
e n d i f
2018-12-28 16:47:50 +01:00
APICHECK := $( HOST_OUT_JAVA_LIBRARIES) /metalava$( COMMON_JAVA_PACKAGE_SUFFIX)
2009-03-04 04:28:42 +01:00
FS_GET_STATS := $( HOST_OUT_EXECUTABLES) /fs_get_stats$( HOST_EXECUTABLE_SUFFIX)
2018-08-16 01:16:21 +02:00
MKEXTUSERIMG := $( HOST_OUT_EXECUTABLES) /mkuserimg_mke2fs
2017-03-11 01:53:45 +01:00
MKE2FS_CONF := system/extras/ext4_utils/mke2fs.conf
2015-03-03 21:30:37 +01:00
MKSQUASHFSUSERIMG := $( HOST_OUT_EXECUTABLES) /mksquashfsimage.sh
2014-06-16 23:17:40 +02:00
MKF2FSUSERIMG := $( HOST_OUT_EXECUTABLES) /mkf2fsuserimg.sh
2012-11-27 03:10:23 +01:00
SIMG2IMG := $( HOST_OUT_EXECUTABLES) /simg2img$( HOST_EXECUTABLE_SUFFIX)
E2FSCK := $( HOST_OUT_EXECUTABLES) /e2fsck$( HOST_EXECUTABLE_SUFFIX)
2010-05-07 11:23:59 +02:00
TUNE2FS := $( HOST_OUT_EXECUTABLES) /tune2fs$( HOST_EXECUTABLE_SUFFIX)
2010-05-04 00:01:38 +02:00
JARJAR := $( HOST_OUT_JAVA_LIBRARIES) /jarjar.jar
2015-04-19 18:55:39 +02:00
DATA_BINDING_COMPILER := $( HOST_OUT_JAVA_LIBRARIES) /databinding-compiler.jar
2017-12-06 23:38:40 +01:00
FAT16COPY := build/make/tools/fat16copy.py
2018-11-06 10:32:40 +01:00
CHECK_ELF_FILE := build/make/tools/check_elf_file.py
2018-08-30 22:11:47 +02:00
LPMAKE := $( HOST_OUT_EXECUTABLES) /lpmake$( HOST_EXECUTABLE_SUFFIX)
2019-06-25 20:42:12 +02:00
ADD_IMG_TO_TARGET_FILES := $( HOST_OUT_EXECUTABLES) /add_img_to_target_files$( HOST_EXECUTABLE_SUFFIX)
2019-05-07 22:12:21 +02:00
BUILD_IMAGE := $( HOST_OUT_EXECUTABLES) /build_image$( HOST_EXECUTABLE_SUFFIX)
BUILD_SUPER_IMAGE := $( HOST_OUT_EXECUTABLES) /build_super_image$( HOST_EXECUTABLE_SUFFIX)
2019-08-15 08:08:18 +02:00
IMG_FROM_TARGET_FILES := $( HOST_OUT_EXECUTABLES) /img_from_target_files$( HOST_EXECUTABLE_SUFFIX)
2019-08-07 08:21:23 +02:00
MAKE_RECOVERY_PATCH := $( HOST_OUT_EXECUTABLES) /make_recovery_patch$( HOST_EXECUTABLE_SUFFIX)
2019-08-05 21:05:45 +02:00
OTA_FROM_TARGET_FILES := $( HOST_OUT_EXECUTABLES) /ota_from_target_files$( HOST_EXECUTABLE_SUFFIX)
2019-08-07 08:21:23 +02:00
SPARSE_IMG := $( HOST_OUT_EXECUTABLES) /sparse_img$( HOST_EXECUTABLE_SUFFIX)
2019-11-01 19:23:19 +01:00
CHECK_PARTITION_SIZES := $( HOST_OUT_EXECUTABLES) /check_partition_sizes$( HOST_EXECUTABLE_SUFFIX)
2015-02-02 12:18:20 +01:00
2019-01-18 08:01:45 +01:00
PROGUARD_HOME := external/proguard
PROGUARD := $( PROGUARD_HOME) /bin/proguard.sh
PROGUARD_DEPS := $( PROGUARD) $( PROGUARD_HOME) /lib/proguard.jar
2017-12-06 23:38:40 +01:00
JAVATAGS := build/make/tools/java-event-log-tags.py
MERGETAGS := build/make/tools/merge-event-log-tags.py
2014-04-29 01:27:32 +02:00
APPEND2SIMG := $( HOST_OUT_EXECUTABLES) /append2simg
VERITY_SIGNER := $( HOST_OUT_EXECUTABLES) /verity_signer
2019-05-03 03:17:18 +02:00
BUILD_VERITY_METADATA := $( HOST_OUT_EXECUTABLES) /build_verity_metadata
2014-04-17 03:49:56 +02:00
BUILD_VERITY_TREE := $( HOST_OUT_EXECUTABLES) /build_verity_tree
2014-07-09 05:07:41 +02:00
BOOT_SIGNER := $( HOST_OUT_EXECUTABLES) /boot_signer
2017-02-17 23:11:13 +01:00
FUTILITY := $( HOST_OUT_EXECUTABLES) /futility-host
2019-05-07 01:23:09 +02:00
VBOOT_SIGNER := $( HOST_OUT_EXECUTABLES) /vboot_signer
2015-05-20 08:30:57 +02:00
FEC := $( HOST_OUT_EXECUTABLES) /fec
2009-03-04 04:28:42 +01:00
2019-04-03 18:30:06 +02:00
DEXDUMP := $( HOST_OUT_EXECUTABLES) /dexdump$( BUILD_EXECUTABLE_SUFFIX)
2017-02-28 20:17:32 +01:00
PROFMAN := $( HOST_OUT_EXECUTABLES) /profman
2015-11-09 08:47:42 +01:00
2014-05-20 10:04:16 +02:00
FINDBUGS_DIR := external/owasp/sanitizer/tools/findbugs/bin
FINDBUGS := $( FINDBUGS_DIR) /findbugs
2009-03-04 04:28:42 +01:00
2018-01-31 23:34:07 +01:00
JETIFIER := prebuilts/sdk/tools/jetifier/jetifier-standalone/bin/jetifier-standalone
2018-11-02 21:43:30 +01:00
EXTRACT_KERNEL := build/make/tools/extract_kernel.py
Pass OpenJDK 8's bootclasspath for host tools targeting <= 1.8.
Host (as opposed to hostdex) tools compile and run against OpenJDK's
core libraries. Before this CL, the core libraries of the default
toolchain were always used, even when targeting an earlier language
version.
This meant that code that uses APIs from a later version of OpenJDK
than corresponded to LOCAL_JAVA_LANGUAGE_VERSION would compile, but
would fail to run under that earlier version of OpenJDK. It also
meant that calls to existing APIs might be reinterpreted; for
example, the return type of java.nio.ByteBuffer.clear() changed from
Buffer in OpenJDK 8 to ByteBuffer in OpenJDK 9. At compile time, this
was noted via the warning:
bootstrap class path not set in conjunction with -source 1.8
After this CL, when targeting a language version <= 1.8 (which is
always the case when building with OpenJDK 8), some of OpenJDK 8's
core library/tools jars are now passed on the bootclasspath. The
decision to include the bootclasspath argument when building with
OpenJDK 8 was somewhat arbitrary, but has the advantage that we
discover any issues before we switch to OpenJDK 9.
Even when compiling with OpenJDK 9, use of OpenJDK 9 APIs will now
fail at compile time rather than at runtime; calls to existing APIs
will now be interpreted in OpenJDK 8 rather than 9 fashion. For
example, this means that dx and host-side CTS tests built with
OpenJDK 9 javac -target 1.8 will be runnable under OpenJDK 8.
Bug: 70521453
Bug: 70862583
Test: Checked that the bootclasspath argument was passed
in the javac invocation targeting 1.8 during:
make showcommands compatibility-common-util-hostsidelib
Test: make checkbuild
Change-Id: I9b6081edfdd2c3e9a450ae8a39c4e32c3d2cda92
2017-12-20 19:36:56 +01:00
# Path to tools.jar
HOST_JDK_TOOLS_JAR := $( ANDROID_JAVA8_HOME) /lib/tools.jar
2009-03-04 04:28:42 +01:00
2018-12-28 16:47:50 +01:00
APICHECK_COMMAND := $( JAVA) -Xmx4g -jar $( APICHECK) --no-banner --compatible-output= yes
2011-04-09 02:32:52 +02:00
2018-01-16 06:14:59 +01:00
# Boolean variable determining if the whitelist for compatible properties is enabled
PRODUCT_COMPATIBLE_PROPERTY := false
i f n e q ( $( PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE ) , )
PRODUCT_COMPATIBLE_PROPERTY := $( PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE)
e l s e i f e q ( $( PRODUCT_SHIPPING_API_LEVEL ) , )
#$(warning no product shipping level defined)
e l s e i f n e q ( $( call math_lt ,27,$ ( PRODUCT_SHIPPING_API_LEVEL ) ) , )
PRODUCT_COMPATIBLE_PROPERTY := true
e n d i f
.KATI_READONLY := \
PRODUCT_COMPATIBLE_PROPERTY
2017-05-19 00:26:59 +02:00
# Boolean variable determining if Treble is fully enabled
PRODUCT_FULL_TREBLE := false
i f n e q ( $( PRODUCT_FULL_TREBLE_OVERRIDE ) , )
PRODUCT_FULL_TREBLE := $( PRODUCT_FULL_TREBLE_OVERRIDE)
e l s e i f e q ( $( PRODUCT_SHIPPING_API_LEVEL ) , )
#$(warning no product shipping level defined)
e l s e i f n e q ( $( call math_gt_or_eq ,$ ( PRODUCT_SHIPPING_API_LEVEL ) ,26) , )
PRODUCT_FULL_TREBLE := true
e n d i f
2017-12-15 23:49:55 +01:00
# TODO(b/69865032): Make PRODUCT_NOTICE_SPLIT the default behavior and remove
# references to it here and below.
i f d e f P R O D U C T _ N O T I C E _ S P L I T _ O V E R R I D E
$( error PRODUCT_NOTICE_SPLIT_OVERRIDE cannot be set.)
e n d i f
2017-11-09 19:15:31 +01:00
requirements := \
PRODUCT_TREBLE_LINKER_NAMESPACES \
PRODUCT_SEPOLICY_SPLIT \
PRODUCT_ENFORCE_VINTF_MANIFEST \
2017-12-15 23:49:55 +01:00
PRODUCT_NOTICE_SPLIT
2017-11-09 19:15:31 +01:00
# If it is overriden, then the requirement override is taken, otherwise it's
# PRODUCT_FULL_TREBLE
$( foreach req ,$ ( requirements ) ,$ ( eval \
$( req) := $( if $( $( req) _OVERRIDE) ,$( $( req) _OVERRIDE) ,$( PRODUCT_FULL_TREBLE) ) ) )
2017-12-06 18:21:02 +01:00
# If the requirement is false for any reason, then it's not PRODUCT_FULL_TREBLE
$( foreach req ,$ ( requirements ) ,$ ( eval \
PRODUCT_FULL_TREBLE := $( if $( filter false,$( $( req) ) ) ,false,$( PRODUCT_FULL_TREBLE) ) ) )
2017-11-09 19:15:31 +01:00
2017-11-17 19:47:30 +01:00
PRODUCT_FULL_TREBLE_OVERRIDE ?=
$( foreach req ,$ ( requirements ) ,$ ( eval $ ( req ) _OVERRIDE ?=) )
2018-09-14 01:57:51 +02:00
# TODO(b/114488870): disallow PRODUCT_FULL_TREBLE_OVERRIDE from being used.
2017-11-09 19:15:31 +01:00
.KATI_READONLY := \
2017-11-17 19:47:30 +01:00
PRODUCT_FULL_TREBLE_OVERRIDE \
$( foreach req,$( requirements) ,$( req) _OVERRIDE) \
2017-11-09 19:15:31 +01:00
$( requirements) \
2017-11-17 19:47:30 +01:00
PRODUCT_FULL_TREBLE \
2017-11-09 19:15:31 +01:00
2018-09-14 01:57:51 +02:00
$( KATI_obsolete_var $ ( foreach req ,$ ( requirements ) ,$ ( req ) _OVERRIDE ) \
,This should be referenced without the _OVERRIDE suffix.)
2017-11-09 19:15:31 +01:00
requirements :=
2018-02-07 23:19:55 +01:00
# BOARD_PROPERTY_OVERRIDES_SPLIT_ENABLED can be true only if early-mount of
# partitions is supported. But the early-mount must be supported for full
# treble products, and so BOARD_PROPERTY_OVERRIDES_SPLIT_ENABLED should be set
# by default for full treble products.
i f e q ( $( PRODUCT_FULL_TREBLE ) , t r u e )
BOARD_PROPERTY_OVERRIDES_SPLIT_ENABLED ?= true
e n d i f
2017-12-12 07:47:14 +01:00
# If PRODUCT_USE_VNDK is true and BOARD_VNDK_VERSION is not defined yet,
# BOARD_VNDK_VERSION will be set to "current" as default.
# PRODUCT_USE_VNDK will be true in Android-P or later launching devices.
PRODUCT_USE_VNDK := false
i f n e q ( $( PRODUCT_USE_VNDK_OVERRIDE ) , )
PRODUCT_USE_VNDK := $( PRODUCT_USE_VNDK_OVERRIDE)
e l s e i f e q ( $( PRODUCT_SHIPPING_API_LEVEL ) , )
# No shipping level defined
2019-12-20 11:17:38 +01:00
e l s e i f e q ( $( call math_gt ,$ ( PRODUCT_SHIPPING_API_LEVEL ) ,27) , t r u e )
2017-12-12 07:47:14 +01:00
PRODUCT_USE_VNDK := $( PRODUCT_FULL_TREBLE)
e n d i f
2019-12-20 11:17:38 +01:00
# Define PRODUCT_PRODUCT_VNDK_VERSION if PRODUCT_USE_VNDK is true and
# PRODUCT_SHIPPING_API_LEVEL is greater than 29.
PRODUCT_USE_PRODUCT_VNDK := false
2017-12-12 07:47:14 +01:00
i f e q ( $( PRODUCT_USE_VNDK ) , t r u e )
2019-12-20 11:17:38 +01:00
ifneq ( $( PRODUCT_USE_PRODUCT_VNDK_OVERRIDE) ,)
PRODUCT_USE_PRODUCT_VNDK := $( PRODUCT_USE_PRODUCT_VNDK_OVERRIDE)
else ifeq ( $( PRODUCT_SHIPPING_API_LEVEL) ,)
# No shipping level defined
else ifeq ( $( call math_gt,$( PRODUCT_SHIPPING_API_LEVEL) ,29) ,true)
PRODUCT_USE_PRODUCT_VNDK := true
endif
2017-12-12 07:47:14 +01:00
ifndef BOARD_VNDK_VERSION
BOARD_VNDK_VERSION := current
endif
2019-12-20 11:17:38 +01:00
ifeq ( $( PRODUCT_USE_PRODUCT_VNDK) ,true)
ifndef PRODUCT_PRODUCT_VNDK_VERSION
PRODUCT_PRODUCT_VNDK_VERSION := current
endif
endif
2017-12-12 07:47:14 +01:00
e n d i f
2019-12-20 11:17:38 +01:00
$( KATI_obsolete_var PRODUCT_USE_VNDK ,Use BOARD_VNDK_VERSION instead )
$( KATI_obsolete_var PRODUCT_USE_VNDK_OVERRIDE ,Use BOARD_VNDK_VERSION instead )
$( KATI_obsolete_var PRODUCT_USE_PRODUCT_VNDK ,Use PRODUCT_PRODUCT_VNDK_VERSION instead )
$( KATI_obsolete_var PRODUCT_USE_PRODUCT_VNDK_OVERRIDE ,Use PRODUCT_PRODUCT_VNDK_VERSION instead )
2017-12-12 07:47:14 +01:00
2018-04-23 03:39:54 +02:00
# Set BOARD_SYSTEMSDK_VERSIONS to the latest SystemSDK version starting from P-launching
# devices if unset.
i f n d e f B O A R D _ S Y S T E M S D K _ V E R S I O N S
ifdef PRODUCT_SHIPPING_API_LEVEL
ifneq ( $( call math_gt_or_eq,$( PRODUCT_SHIPPING_API_LEVEL) ,28) ,)
ifeq ( REL,$( PLATFORM_VERSION_CODENAME) )
BOARD_SYSTEMSDK_VERSIONS := $( PLATFORM_SDK_VERSION)
else
BOARD_SYSTEMSDK_VERSIONS := $( PLATFORM_VERSION_CODENAME)
endif
endif
endif
e n d i f
2017-09-30 00:32:22 +02:00
i f d e f P R O D U C T _ S H I P P I N G _ A P I _ L E V E L
2018-01-22 07:25:14 +01:00
ifneq ( $( call numbers_less_than,$( PRODUCT_SHIPPING_API_LEVEL) ,$( BOARD_SYSTEMSDK_VERSIONS) ) ,)
$( error BOARD_SYSTEMSDK_VERSIONS ( $( BOARD_SYSTEMSDK_VERSIONS) ) must all be greater than or equal to PRODUCT_SHIPPING_API_LEVEL ( $( PRODUCT_SHIPPING_API_LEVEL) ) )
endif
2018-01-22 09:01:15 +01:00
ifneq ( $( call math_gt_or_eq,$( PRODUCT_SHIPPING_API_LEVEL) ,28) ,)
ifneq ( $( TARGET_IS_64_BIT) , true )
ifneq ( $( TARGET_USES_64_BIT_BINDER) , true )
$( error When PRODUCT_SHIPPING_API_LEVEL >= 28, TARGET_USES_64_BIT_BINDER must be true )
endif
endif
endif
2018-08-13 18:13:24 +02:00
ifneq ( $( call math_gt_or_eq,$( PRODUCT_SHIPPING_API_LEVEL) ,29) ,)
ifneq ( $( BOARD_OTA_FRAMEWORK_VBMETA_VERSION_OVERRIDE) ,)
$( error When PRODUCT_SHIPPING_API_LEVEL >= 29, BOARD_OTA_FRAMEWORK_VBMETA_VERSION_OVERRIDE cannot be set )
endif
endif
2017-09-30 00:32:22 +02:00
e n d i f
2011-10-04 19:50:08 +02:00
# The default key if not set as LOCAL_CERTIFICATE
i f d e f P R O D U C T _ D E F A U L T _ D E V _ C E R T I F I C A T E
DEFAULT_SYSTEM_DEV_CERTIFICATE := $( PRODUCT_DEFAULT_DEV_CERTIFICATE)
e l s e
2019-04-10 06:35:37 +02:00
DEFAULT_SYSTEM_DEV_CERTIFICATE := build/make/target/product/security/testkey
2011-10-04 19:50:08 +02:00
e n d i f
2019-02-26 16:49:25 +01:00
.KATI_READONLY := DEFAULT_SYSTEM_DEV_CERTIFICATE
2011-10-04 19:50:08 +02:00
2019-08-07 11:13:33 +02:00
# Certificate for the NetworkStack sepolicy context
i f d e f P R O D U C T _ M A I N L I N E _ S E P O L I C Y _ D E V _ C E R T I F I C A T E S
MAINLINE_SEPOLICY_DEV_CERTIFICATES := $( PRODUCT_MAINLINE_SEPOLICY_DEV_CERTIFICATES)
e l s e
MAINLINE_SEPOLICY_DEV_CERTIFICATES := $( dir $( DEFAULT_SYSTEM_DEV_CERTIFICATE) )
e n d i f
2020-02-28 22:26:54 +01:00
BUILD_NUMBER_FROM_FILE := $$ ( cat $( SOONG_OUT_DIR) /build_number.txt)
2018-02-14 22:30:53 +01:00
BUILD_DATETIME_FROM_FILE := $$ ( cat $( BUILD_DATETIME_FILE) )
2017-11-03 23:49:25 +01:00
2018-02-06 00:51:34 +01:00
# SEPolicy versions
# PLATFORM_SEPOLICY_VERSION is a number of the form "NN.m" with "NN" mapping to
# PLATFORM_SDK_VERSION and "m" as a minor number which allows for SELinux
# changes independent of PLATFORM_SDK_VERSION. This value will be set to
# 10000.0 to represent tip-of-tree development that is inherently unstable and
# thus designed not to work with any shipping vendor policy. This is similar in
# spirit to how DEFAULT_APP_TARGET_SDK is set.
# The minor version ('m' component) must be updated every time a platform release
# is made which breaks compatibility with the previous platform sepolicy version,
# not just on every increase in PLATFORM_SDK_VERSION. The minor version should
# be reset to 0 on every bump of the PLATFORM_SDK_VERSION.
2020-04-30 02:17:43 +02:00
sepolicy_major_vers := 30
2018-02-06 00:51:34 +01:00
sepolicy_minor_vers := 0
i f n e q ( $( sepolicy_major_vers ) , $( PLATFORM_SDK_VERSION ) )
$( error sepolicy_major_version does not match PLATFORM_SDK_VERSION , please update .)
e n d i f
2018-03-27 22:49:19 +02:00
TOT_SEPOLICY_VERSION := 10000.0
2018-02-06 00:51:34 +01:00
i f n e q ( R E L , $( PLATFORM_VERSION_CODENAME ) )
2018-03-27 22:49:19 +02:00
PLATFORM_SEPOLICY_VERSION := $( TOT_SEPOLICY_VERSION)
e l s e
PLATFORM_SEPOLICY_VERSION := $( join $( addsuffix .,$( sepolicy_major_vers) ) , $( sepolicy_minor_vers) )
2018-02-06 00:51:34 +01:00
e n d i f
sepolicy_major_vers :=
sepolicy_minor_vers :=
2018-02-06 00:52:46 +01:00
# A list of SEPolicy versions, besides PLATFORM_SEPOLICY_VERSION, that the framework supports.
PLATFORM_SEPOLICY_COMPAT_VERSIONS := \
26.0 \
2018-07-18 00:00:26 +02:00
27.0 \
28.0 \
2019-06-02 02:06:05 +02:00
29.0 \
2020-04-30 02:17:43 +02:00
30.0 \
2018-02-06 00:52:46 +01:00
2018-03-27 22:49:19 +02:00
.KATI_READONLY := \
PLATFORM_SEPOLICY_COMPAT_VERSIONS \
PLATFORM_SEPOLICY_VERSION \
TOT_SEPOLICY_VERSION \
2018-10-31 02:47:59 +01:00
i f e q ( $( PRODUCT_RETROFIT_DYNAMIC_PARTITIONS ) , t r u e )
ifneq ( $( PRODUCT_USE_DYNAMIC_PARTITIONS) ,true)
$( error PRODUCT_USE_DYNAMIC_PARTITIONS must be true when PRODUCT_RETROFIT_DYNAMIC_PARTITIONS \
is set )
endif
ifdef PRODUCT_SHIPPING_API_LEVEL
ifeq ( true,$( call math_gt_or_eq,$( PRODUCT_SHIPPING_API_LEVEL) ,29) )
$( error Devices with shipping API level $( PRODUCT_SHIPPING_API_LEVEL) must not set \
PRODUCT_RETROFIT_DYNAMIC_PARTITIONS)
endif
endif
e n d i f
2018-11-09 19:27:23 +01:00
i f e q ( $( PRODUCT_USE_DYNAMIC_PARTITIONS ) , t r u e )
2019-02-14 00:07:46 +01:00
ifeq ( $( BOARD_BUILD_SYSTEM_ROOT_IMAGE) ,true)
$( error BOARD_BUILD_SYSTEM_ROOT_IMAGE cannot be true for devices with dynamic partitions)
endif
2019-03-13 20:27:07 +01:00
ifneq ( $( PRODUCT_USE_DYNAMIC_PARTITION_SIZE) ,true)
$( error PRODUCT_USE_DYNAMIC_PARTITION_SIZE must be true for devices with dynamic partitions)
endif
e n d i f
2019-02-14 00:07:46 +01:00
2019-03-13 20:27:07 +01:00
i f e q ( $( PRODUCT_BUILD_SUPER_PARTITION ) , t r u e )
ifneq ( $( PRODUCT_USE_DYNAMIC_PARTITIONS) ,true)
$( error Can only build super partition for devices with dynamic partitions)
endif
2018-07-31 21:47:27 +02:00
e n d i f
2019-03-13 20:27:07 +01:00
2018-07-31 21:47:27 +02:00
i f e q ( $( PRODUCT_USE_DYNAMIC_PARTITION_SIZE ) , t r u e )
2018-06-19 01:32:35 +02:00
i f n e q ( $( BOARD_SYSTEMIMAGE_PARTITION_SIZE ) , )
i f n e q ( $( BOARD_SYSTEMIMAGE_PARTITION_RESERVED_SIZE ) , )
$( error Should not define BOARD_SYSTEMIMAGE_PARTITION_SIZE and \
BOARD_SYSTEMIMAGE_PARTITION_RESERVED_SIZE together)
e n d i f
2018-05-19 02:46:04 +02:00
e n d i f
2018-06-20 01:23:16 +02:00
i f n e q ( $( BOARD_VENDORIMAGE_PARTITION_SIZE ) , )
i f n e q ( $( BOARD_VENDORIMAGE_PARTITION_RESERVED_SIZE ) , )
$( error Should not define BOARD_VENDORIMAGE_PARTITION_SIZE and \
BOARD_VENDORIMAGE_PARTITION_RESERVED_SIZE together)
e n d i f
2018-05-19 02:46:04 +02:00
e n d i f
2017-11-14 16:42:30 +01:00
i f n e q ( $( BOARD_ODMIMAGE_PARTITION_SIZE ) , )
i f n e q ( $( BOARD_ODMIMAGE_PARTITION_RESERVED_SIZE ) , )
$( error Should not define BOARD_ODMIMAGE_PARTITION_SIZE and \
BOARD_ODMIMAGE_PARTITION_RESERVED_SIZE together)
e n d i f
e n d i f
2018-07-21 00:19:34 +02:00
i f n e q ( $( BOARD_PRODUCTIMAGE_PARTITION_SIZE ) , )
i f n e q ( $( BOARD_PRODUCTIMAGE_PARTITION_RESERVED_SIZE ) , )
$( error Should not define BOARD_PRODUCTIMAGE_PARTITION_SIZE and \
BOARD_PRODUCTIMAGE_PARTITION_RESERVED_SIZE together)
e n d i f
e n d i f
2019-06-25 08:58:13 +02:00
i f n e q ( $( BOARD_SYSTEM_EXTIMAGE_PARTITION_SIZE ) , )
i f n e q ( $( BOARD_SYSTEM_EXTIMAGE_PARTITION_RESERVED_SIZE ) , )
$( error Should not define BOARD_SYSTEM_EXTIMAGE_PARTITION_SIZE and \
BOARD_SYSTEM_EXTIMAGE_PARTITION_RESERVED_SIZE together)
2018-07-21 00:33:47 +02:00
e n d i f
e n d i f
2018-07-31 21:47:27 +02:00
e n d i f # PRODUCT_USE_DYNAMIC_PARTITION_SIZE
2019-03-13 20:27:07 +01:00
i f e q ( $( PRODUCT_USE_DYNAMIC_PARTITIONS ) , t r u e )
2018-10-02 02:30:01 +02:00
# BOARD_SUPER_PARTITION_GROUPS defines a list of "updatable groups". Each updatable group is a
# group of partitions that share the same pool of free spaces.
# For each group in BOARD_SUPER_PARTITION_GROUPS, a BOARD_{GROUP}_SIZE and
# BOARD_{GROUP}_PARTITION_PARTITION_LIST may be defined.
# - BOARD_{GROUP}_SIZE: The maximum sum of sizes of all partitions in the group.
2018-10-25 22:17:27 +02:00
# Must not be empty.
2018-10-02 02:30:01 +02:00
# - BOARD_{GROUP}_PARTITION_PARTITION_LIST: the list of partitions that belongs to this group.
# If empty, no partitions belong to this group, and the sum of sizes is effectively 0.
$( foreach group ,$ ( call to -upper ,$ ( BOARD_SUPER_PARTITION_GROUPS ) ) , \
2018-11-27 20:37:38 +01:00
$( eval BOARD_$( group) _SIZE := $( strip $( BOARD_$( group) _SIZE) ) ) \
2018-10-25 22:17:27 +02:00
$( if $( BOARD_$( group) _SIZE) ,,$( error BOARD_$( group) _SIZE must not be empty) ) \
2018-10-02 02:30:01 +02:00
$( eval .KATI_READONLY := BOARD_$( group) _SIZE) \
2019-06-28 20:00:05 +02:00
$( eval BOARD_$( group) _PARTITION_LIST ?= ) \
$( eval .KATI_READONLY := BOARD_$( group) _PARTITION_LIST) \
2018-10-02 02:30:01 +02:00
)
# BOARD_*_PARTITION_LIST: a list of the following tokens
2019-06-25 08:58:13 +02:00
valid_super_partition_list := system vendor product system_ext odm
2018-10-02 02:30:01 +02:00
$( foreach group ,$ ( call to -upper ,$ ( BOARD_SUPER_PARTITION_GROUPS ) ) , \
$( if $( filter-out $( valid_super_partition_list) ,$( BOARD_$( group) _PARTITION_LIST) ) , \
$( error BOARD_$( group) _PARTITION_LIST contains invalid partition name \
$( filter-out $( valid_super_partition_list) ,$( BOARD_$( group) _PARTITION_LIST) ) . \
Valid names are $( valid_super_partition_list) ) ) )
2018-07-25 02:44:18 +02:00
valid_super_partition_list :=
2018-10-02 02:30:01 +02:00
# Define BOARD_SUPER_PARTITION_PARTITION_LIST, the sum of all BOARD_*_PARTITION_LIST
i f d e f B O A R D _ S U P E R _ P A R T I T I O N _ P A R T I T I O N _ L I S T
$( error BOARD_SUPER_PARTITION_PARTITION_LIST should not be defined , but computed from \
BOARD_SUPER_PARTITION_GROUPS and BOARD_*_PARTITION_LIST)
e n d i f
BOARD_SUPER_PARTITION_PARTITION_LIST := \
$( foreach group,$( call to-upper,$( BOARD_SUPER_PARTITION_GROUPS) ) , \
$( BOARD_$( group) _PARTITION_LIST) )
.KATI_READONLY := BOARD_SUPER_PARTITION_PARTITION_LIST
2018-11-27 20:37:38 +01:00
i f n e q ( $( BOARD_SUPER_PARTITION_SIZE ) , )
2018-10-31 02:47:59 +01:00
i f e q ( $( PRODUCT_RETROFIT_DYNAMIC_PARTITIONS ) , t r u e )
# The metadata device must be specified manually for retrofitting.
2018-11-09 00:41:24 +01:00
i f e q ( $( BOARD_SUPER_PARTITION_METADATA_DEVICE ) , )
$( error Must specify BOARD_SUPER_PARTITION_METADATA_DEVICE if PRODUCT_RETROFIT_DYNAMIC_PARTITIONS =true .)
e n d i f
# The super partition block device list must be specified manually for retrofitting.
i f e q ( $( BOARD_SUPER_PARTITION_BLOCK_DEVICES ) , )
$( error Must specify BOARD_SUPER_PARTITION_BLOCK_DEVICES if PRODUCT_RETROFIT_DYNAMIC_PARTITIONS =true .)
2018-10-31 02:47:59 +01:00
e n d i f
# The metadata device must be included in the super partition block device list.
i f e q ( , $( filter $ ( BOARD_SUPER_PARTITION_METADATA_DEVICE ) ,$ ( BOARD_SUPER_PARTITION_BLOCK_DEVICES ) ) )
$( error BOARD_SUPER_PARTITION_METADATA_DEVICE is not listed in BOARD_SUPER_PARTITION_BLOCK_DEVICES .)
e n d i f
# The metadata device must be supplied to init via the kernel command-line.
2019-02-26 18:36:30 +01:00
INTERNAL_KERNEL_CMDLINE += androidboot.super_partition= $( BOARD_SUPER_PARTITION_METADATA_DEVICE)
2018-10-31 02:47:59 +01:00
2018-12-27 21:47:23 +01:00
BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE := true
# If "vendor" is listed as one of the dynamic partitions but without its image available (e.g. an
# AOSP target built without vendor image), don't build the retrofit full OTA package. Because we
# won't be able to build meaningful super_* images for retrofitting purpose.
i f n e q ( , $( filter vendor ,$ ( BOARD_SUPER_PARTITION_PARTITION_LIST ) ) )
Add PRODUCT_BUILD_*_IMAGE, BUILDING_*_IMAGE to control building of images
These centralize the decisions on whether to build certain images or
not, and allow the product definition to override that choice.
There are a few use cases here:
* For GSI-like cases, we only want to build the system image. This
didn't really change, but it's somewhat simpler to configure, and
easier to understand the build logic.
* On the opposite side, when you're planning on using a GSI, the device
specific build can only build the vendor images (or some other set).
* Some cases (Fuchsia, etc) don't want to build any images, as they'll
be distributing the build artifacts in their own packaging.
I suspect in the future, TARGET_BUILD_APPS may be able to be refactored
into the third use case.
Test: treehugger
Test: Create a product definition that includes nothing, try to build it.
Test: compare build-aosp_crosshatch.ninja and build-crosshatch.ninja before/after
Change-Id: I685ab841be3718d3dd7052c28ccd764bb6f1991a
2019-01-16 21:42:05 +01:00
i f n d e f B U I L D I N G _ V E N D O R _ I M A G E
2018-12-27 21:47:23 +01:00
i f n d e f B O A R D _ P R E B U I L T _ V E N D O R I M A G E
BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE :=
e n d i f # BOARD_PREBUILT_VENDORIMAGE
Add PRODUCT_BUILD_*_IMAGE, BUILDING_*_IMAGE to control building of images
These centralize the decisions on whether to build certain images or
not, and allow the product definition to override that choice.
There are a few use cases here:
* For GSI-like cases, we only want to build the system image. This
didn't really change, but it's somewhat simpler to configure, and
easier to understand the build logic.
* On the opposite side, when you're planning on using a GSI, the device
specific build can only build the vendor images (or some other set).
* Some cases (Fuchsia, etc) don't want to build any images, as they'll
be distributing the build artifacts in their own packaging.
I suspect in the future, TARGET_BUILD_APPS may be able to be refactored
into the third use case.
Test: treehugger
Test: Create a product definition that includes nothing, try to build it.
Test: compare build-aosp_crosshatch.ninja and build-crosshatch.ninja before/after
Change-Id: I685ab841be3718d3dd7052c28ccd764bb6f1991a
2019-01-16 21:42:05 +01:00
e n d i f # BUILDING_VENDOR_IMAGE
2018-12-27 21:47:23 +01:00
e n d i f # BOARD_SUPER_PARTITION_PARTITION_LIST
2018-10-31 02:47:59 +01:00
e l s e # PRODUCT_RETROFIT_DYNAMIC_PARTITIONS
# For normal devices, we populate BOARD_SUPER_PARTITION_BLOCK_DEVICES so the
# build can handle both cases consistently.
2019-01-04 23:54:56 +01:00
i f e q ( $( BOARD_SUPER_PARTITION_METADATA_DEVICE ) , )
2018-10-31 02:47:59 +01:00
BOARD_SUPER_PARTITION_METADATA_DEVICE := super
2019-01-04 23:54:56 +01:00
e n d i f
i f e q ( $( BOARD_SUPER_PARTITION_BLOCK_DEVICES ) , )
BOARD_SUPER_PARTITION_BLOCK_DEVICES := $( BOARD_SUPER_PARTITION_METADATA_DEVICE)
e n d i f
# If only one super block device, default to super partition size.
i f e q ( $( word 2,$ ( BOARD_SUPER_PARTITION_BLOCK_DEVICES ) ) , )
B O A R D _ S U P E R _ P A R T I T I O N _ $( call to -upper ,$ ( strip $ ( BOARD_SUPER_PARTITION_BLOCK_DEVICES ) ) ) _DEVICE_SIZE ?= \
$( BOARD_SUPER_PARTITION_SIZE)
e n d i f
i f n e q ( $( BOARD_SUPER_PARTITION_METADATA_DEVICE ) , s u p e r )
2019-02-26 18:36:30 +01:00
INTERNAL_KERNEL_CMDLINE += androidboot.super_partition= $( BOARD_SUPER_PARTITION_METADATA_DEVICE)
2019-01-04 23:54:56 +01:00
e n d i f
2018-12-27 21:47:23 +01:00
BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE :=
2018-10-31 02:47:59 +01:00
e n d i f # PRODUCT_RETROFIT_DYNAMIC_PARTITIONS
e n d i f # BOARD_SUPER_PARTITION_SIZE
2019-06-10 21:50:19 +02:00
BOARD_SUPER_PARTITION_BLOCK_DEVICES ?=
2018-10-31 02:47:59 +01:00
.KATI_READONLY := BOARD_SUPER_PARTITION_BLOCK_DEVICES
2019-06-10 21:50:19 +02:00
BOARD_SUPER_PARTITION_METADATA_DEVICE ?=
2018-10-31 02:47:59 +01:00
.KATI_READONLY := BOARD_SUPER_PARTITION_METADATA_DEVICE
2019-06-10 21:50:19 +02:00
BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE ?=
2018-12-27 21:47:23 +01:00
.KATI_READONLY := BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE
2018-10-31 02:47:59 +01:00
$( foreach device ,$ ( call to -upper ,$ ( BOARD_SUPER_PARTITION_BLOCK_DEVICES ) ) , \
2018-11-27 20:37:38 +01:00
$( eval BOARD_SUPER_PARTITION_$( device) _DEVICE_SIZE := $( strip $( BOARD_SUPER_PARTITION_$( device) _DEVICE_SIZE) ) ) \
2018-10-31 02:47:59 +01:00
$( if $( BOARD_SUPER_PARTITION_$( device) _DEVICE_SIZE) ,, \
2019-01-04 23:54:56 +01:00
$( error BOARD_SUPER_PARTITION_$( device) _DEVICE_SIZE must not be empty) ) \
2018-10-31 02:47:59 +01:00
$( eval .KATI_READONLY := BOARD_SUPER_PARTITION_$( device) _DEVICE_SIZE) )
2019-06-10 21:50:19 +02:00
e n d i f # PRODUCT_USE_DYNAMIC_PARTITIONS
2018-06-19 01:32:35 +02:00
2009-03-04 04:28:42 +01:00
# ###############################################################
# Set up final options.
# ###############################################################
2015-12-16 22:10:35 +01:00
# We run gcc/clang with PWD=/proc/self/cwd to remove the $TOP
# from the debug output. That way two builds in two different
# directories will create the same output.
# /proc doesn't exist on Darwin.
i f e q ( $( HOST_OS ) , l i n u x )
RELATIVE_PWD := PWD = /proc/self/cwd
e l s e
RELATIVE_PWD :=
e n d i f
2016-07-20 21:22:57 +02:00
TARGET_PROJECT_INCLUDES :=
2016-11-18 23:05:39 +01:00
TARGET_PROJECT_SYSTEM_INCLUDES := \
2012-03-30 19:24:31 +02:00
$( TARGET_DEVICE_KERNEL_HEADERS) $( TARGET_BOARD_KERNEL_HEADERS) \
$( TARGET_PRODUCT_KERNEL_HEADERS)
2009-03-04 04:28:42 +01:00
2013-12-27 20:09:36 +01:00
i f d e f T A R G E T _ 2 N D _ A R C H
2014-02-22 01:17:05 +01:00
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_PROJECT_INCLUDES := $( TARGET_PROJECT_INCLUDES)
2016-07-20 21:22:57 +02:00
$(TARGET_2ND_ARCH_VAR_PREFIX)TARGET_PROJECT_SYSTEM_INCLUDES := $( TARGET_PROJECT_SYSTEM_INCLUDES)
2013-12-27 20:09:36 +01:00
e n d i f
2014-04-19 00:23:40 +02:00
# Flags for DEX2OAT
2015-10-16 05:43:29 +02:00
first_non_empty_of_three = $( if $( 1) ,$( 1) ,$( if $( 2) ,$( 2) ,$( 3) ) )
2014-04-19 00:23:40 +02:00
DEX2OAT_TARGET_ARCH := $( TARGET_ARCH)
2015-10-16 05:43:29 +02:00
DEX2OAT_TARGET_CPU_VARIANT := $( call first_non_empty_of_three,$( TARGET_CPU_VARIANT) ,$( TARGET_ARCH_VARIANT) ,default)
2019-02-21 12:36:37 +01:00
DEX2OAT_TARGET_CPU_VARIANT_RUNTIME := $( call first_non_empty_of_three,$( TARGET_CPU_VARIANT_RUNTIME) ,$( TARGET_ARCH_VARIANT) ,default)
2014-03-20 20:13:10 +01:00
DEX2OAT_TARGET_INSTRUCTION_SET_FEATURES := default
2014-04-19 00:23:40 +02:00
i f d e f T A R G E T _ 2 N D _ A R C H
2014-05-13 22:57:28 +02:00
$(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_ARCH := $( TARGET_2ND_ARCH)
2015-10-16 05:43:29 +02:00
$(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_CPU_VARIANT := $( call first_non_empty_of_three,$( TARGET_2ND_CPU_VARIANT) ,$( TARGET_2ND_ARCH_VARIANT) ,default)
2019-02-21 12:36:37 +01:00
$(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_CPU_VARIANT_RUNTIME := $( call first_non_empty_of_three,$( TARGET_2ND_CPU_VARIANT_RUNTIME) ,$( TARGET_2ND_ARCH_VARIANT) ,default)
2014-05-13 22:57:28 +02:00
$(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_INSTRUCTION_SET_FEATURES := default
2014-03-20 20:13:10 +01:00
e n d i f
2009-03-04 04:28:42 +01:00
# ###############################################################
# Collect a list of the SDK versions that we could compile against
# For use with the LOCAL_SDK_VERSION variable for include $(BUILD_PACKAGE)
# ###############################################################
2011-11-29 19:24:27 +01:00
HISTORICAL_SDK_VERSIONS_ROOT := $( TOPDIR) prebuilts/sdk
2011-11-29 20:20:16 +01:00
HISTORICAL_NDK_VERSIONS_ROOT := $( TOPDIR) prebuilts/ndk
2010-06-09 19:26:26 +02:00
2015-05-20 01:03:57 +02:00
# The path where app can reference the support library resources.
i f d e f T A R G E T _ B U I L D _ A P P S
SUPPORT_LIBRARY_ROOT := $( HISTORICAL_SDK_VERSIONS_ROOT) /current/support
e l s e
SUPPORT_LIBRARY_ROOT := frameworks/support
e n d i f
2018-04-27 15:11:17 +02:00
get-sdk-version = $( if $( findstring _,$( 1) ) ,$( subst core_,,$( subst system_,,$( subst test_,,$( 1) ) ) ) ,$( 1) )
get-sdk-api = $( if $( findstring _,$( 1) ) ,$( patsubst %_$( call get-sdk-version,$( 1) ) ,%,$( 1) ) ,public)
get-prebuilt-sdk-dir = $( HISTORICAL_SDK_VERSIONS_ROOT) /$( call get-sdk-version,$( 1) ) /$( call get-sdk-api,$( 1) )
2018-04-10 17:16:33 +02:00
# Resolve LOCAL_SDK_VERSION to prebuilt module name, e.g.:
2018-04-10 17:18:44 +02:00
# 23 -> sdk_public_23_android
# system_current -> sdk_system_current_android
2018-04-10 17:16:33 +02:00
# $(1): An sdk version (LOCAL_SDK_VERSION)
2018-04-12 17:17:55 +02:00
# $(2): optional library name (default: android)
2018-04-10 17:16:33 +02:00
d e f i n e r e s o l v e - p r e b u i l t - s d k - m o d u l e
2018-04-10 17:18:44 +02:00
$( if $ ( findstring _ ,$ ( 1) ) ,\
2018-04-12 17:17:55 +02:00
sdk_$( 1) _$( or $( 2) ,android) ,\
sdk_public_$( 1) _$( or $( 2) ,android) )
2018-04-10 17:18:44 +02:00
e n d e f
2018-04-27 15:11:17 +02:00
# Resolve LOCAL_SDK_VERSION to prebuilt android.jar
# $(1): LOCAL_SDK_VERSION
resolve-prebuilt-sdk-jar-path = $( call get-prebuilt-sdk-dir,$( 1) ) /android.jar
2018-04-10 17:18:44 +02:00
# Resolve LOCAL_SDK_VERSION to prebuilt framework.aidl
# $(1): An sdk version (LOCAL_SDK_VERSION)
2018-04-27 15:11:17 +02:00
resolve-prebuilt-sdk-aidl-path = $( call get-prebuilt-sdk-dir,$( call get-sdk-version,$( 1) ) ) /framework.aidl
2018-04-10 17:16:33 +02:00
2010-06-09 19:26:26 +02:00
# Historical SDK version N is stored in $(HISTORICAL_SDK_VERSIONS_ROOT)/N.
# The 'current' version is whatever this source tree is.
2009-03-04 04:28:42 +01:00
#
# sgrax is the opposite of xargs. It takes the list of args and puts them
# on each line for sort to process.
# sort -g is a numeric sort, so 1 2 3 10 instead of 1 10 2 3.
2010-06-09 19:26:26 +02:00
# Numerically sort a list of numbers
# $(1): the list of numbers to be sorted
d e f i n e n u m e r i c a l l y _ s o r t
$( shell function sgrax ( ) { \
while [ -n " $$ 1 " ] ; do echo $$ 1 ; shift ; done \
} ; \
( sgrax $( 1) | sort -g ) )
e n d e f
2018-04-10 17:18:44 +02:00
# This produces a list like "current/core current/public current/system 4/public"
TARGET_AVAILABLE_SDK_VERSIONS := $( wildcard $( HISTORICAL_SDK_VERSIONS_ROOT) /*/*/android.jar)
TARGET_AVAILABLE_SDK_VERSIONS := $( patsubst $( HISTORICAL_SDK_VERSIONS_ROOT) /%/android.jar,%,$( TARGET_AVAILABLE_SDK_VERSIONS) )
# Strips and reorganizes the "public", "core" and "system" subdirs.
TARGET_AVAILABLE_SDK_VERSIONS := $( subst /public,,$( TARGET_AVAILABLE_SDK_VERSIONS) )
TARGET_AVAILABLE_SDK_VERSIONS := $( patsubst %/core,core_%,$( TARGET_AVAILABLE_SDK_VERSIONS) )
TARGET_AVAILABLE_SDK_VERSIONS := $( patsubst %/system,system_%,$( TARGET_AVAILABLE_SDK_VERSIONS) )
# No prebuilt for test_current.
TARGET_AVAILABLE_SDK_VERSIONS += test_current
TARGET_AVAIALBLE_SDK_VERSIONS := $( call numerically_sort,$( TARGET_AVAILABLE_SDK_VERSIONS) )
2009-03-04 04:28:42 +01:00
2017-10-12 22:34:40 +02:00
TARGET_SDK_VERSIONS_WITHOUT_JAVA_18_SUPPORT := $( call numbers_less_than,24,$( TARGET_AVAILABLE_SDK_VERSIONS) )
2019-05-20 16:41:12 +02:00
TARGET_SDK_VERSIONS_WITHOUT_JAVA_19_SUPPORT := $( call numbers_less_than,30,$( TARGET_AVAILABLE_SDK_VERSIONS) )
2017-10-12 22:34:40 +02:00
2018-03-24 05:57:02 +01:00
# Missing optional uses-libraries so that the platform doesn't create build rules that depend on
2019-05-22 19:21:21 +02:00
# them.
INTERNAL_PLATFORM_MISSING_USES_LIBRARIES := \
com.google.android.ble \
com.google.android.media.effects \
com.google.android.wearable \
2018-03-24 05:57:02 +01:00
2010-10-14 23:31:48 +02:00
# This is the standard way to name a directory containing prebuilt target
# objects. E.g., prebuilt/$(TARGET_PREBUILT_TAG)/libc.so
2011-07-12 07:11:46 +02:00
TARGET_PREBUILT_TAG := android-$( TARGET_ARCH)
2014-05-22 21:01:23 +02:00
i f d e f T A R G E T _ 2 N D _ A R C H
TARGET_2ND_PREBUILT_TAG := android-$( TARGET_2ND_ARCH)
e n d i f
2010-10-14 23:31:48 +02:00
2013-03-05 20:07:15 +01:00
# Set up RS prebuilt variables for compatibility library
2014-10-01 00:08:03 +02:00
RS_PREBUILT_CLCORE := prebuilts/sdk/renderscript/lib/$( TARGET_ARCH) /librsrt_$( TARGET_ARCH) .bc
2013-03-05 20:07:15 +01:00
RS_PREBUILT_COMPILER_RT := prebuilts/sdk/renderscript/lib/$( TARGET_ARCH) /libcompiler_rt.a
2015-01-08 03:18:41 +01:00
# API Level lists for Renderscript Compat lib.
RSCOMPAT_32BIT_ONLY_API_LEVELS := 8 9 10 11 12 13 14 15 16 17 18 19 20
2014-11-20 20:05:18 +01:00
RSCOMPAT_NO_USAGEIO_API_LEVELS := 8 9 10 11 12 13
2015-01-08 03:18:41 +01:00
2017-10-31 01:31:44 +01:00
# Add BUILD_NUMBER to apps default version name if it's unbundled build.
i f d e f T A R G E T _ B U I L D _ A P P S
TARGET_BUILD_WITH_APPS_VERSION_NAME := true
e n d i f
i f d e f T A R G E T _ B U I L D _ W I T H _ A P P S _ V E R S I O N _ N A M E
APPS_DEFAULT_VERSION_NAME := $( PLATFORM_VERSION) -$( BUILD_NUMBER_FROM_FILE)
e l s e
APPS_DEFAULT_VERSION_NAME := $( PLATFORM_VERSION)
e n d i f
2017-11-06 19:47:24 +01:00
# ANDROID_WARNING_ALLOWED_PROJECTS is generated by build/soong.
2016-10-12 00:38:39 +02:00
d e f i n e f i n d _ w a r n i n g _ a l l o w e d _ p r o j e c t s
$( filter $( ANDROID_WARNING_ALLOWED_PROJECTS) ,$( 1) /)
e n d e f
2019-11-12 01:04:34 +01:00
GOMA_POOL :=
RBE_POOL :=
GOMA_OR_RBE_POOL :=
# When goma or RBE are enabled, kati will be passed --default_pool=local_pool to put
# most rules into the local pool. Explicitly set the pool to "none" for rules that
# should be run outside the local pool, i.e. with -j500.
i f n e q ( , $( filter -out false ,$ ( USE_GOMA ) ) )
GOMA_POOL := none
GOMA_OR_RBE_POOL := none
e l s e i f n e q ( , $( filter -out false ,$ ( USE_RBE ) ) )
RBE_POOL := none
GOMA_OR_RBE_POOL := none
e n d i f
.KATI_READONLY := GOMA_POOL RBE_POOL GOMA_OR_RBE_POOL
2016-11-10 01:35:34 +01:00
# These goals don't need to collect and include Android.mks/CleanSpec.mks
# in the source tree.
2017-05-18 22:42:40 +02:00
dont_bother_goals := out \
2016-11-10 01:35:34 +01:00
snod systemimage-nodeps \
2019-07-12 03:35:20 +02:00
userdataimage-nodeps \
2016-11-10 01:35:34 +01:00
cacheimage-nodeps \
bptimage-nodeps \
2017-03-07 21:10:09 +01:00
vnod vendorimage-nodeps \
2017-11-27 09:04:47 +01:00
pnod productimage-nodeps \
2019-06-25 08:58:13 +02:00
senod systemextimage-nodeps \
2017-11-14 16:42:30 +01:00
onod odmimage-nodeps \
2016-11-10 01:35:34 +01:00
systemotherimage-nodeps \
ramdisk-nodeps \
Adding boot-debug.img and ramdisk-debug.img
The two new debugging images adds additional files based on
boot.img and ramdisk.img/ramdisk-recovery.img, respectively.
File /force_debuggable is to trigger special logic in /init to load an
userdebug version of sepolicy and an additional property file from this
ramdisk to allow adb root, if the device is unlocked.
It's intentional to skip signing for boot-debug.img, as it can
only be used if the device is unlocked, where verification error
is allowed.
Those debugging images allows adb root on user build
system.img, vendor.img, product.img, etc. This can facilitate more
automated testings on user builds and is helpful to narrow down the
delta between what's being tested v.s. what's being shipped.
Bug: 126493225
Test: `make dist`, checks both boot-debug.img and ramdisk-debug.img
are in $OUT/ and out/dist.
Test: `make dist`, checks installed-files-ramdisk-debug.{json,txt} are
in out/dist.
Test: `system/core/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-debug.img`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-debug.img and $OUT/boot.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk ./ramdisk-debug`
Test: `make ramdisk_debug-nodeps` and `make bootimage_debug-nodeps`
Change-Id: I30137c3caef91805d9143d404e5e4d06c0fccc30
2019-03-20 10:59:52 +01:00
ramdisk_debug-nodeps \
Adding boot-test-harness.img
In commit I30137c3caef91805d9143d404e5e4d06c0fccc30, we added
a boot-debug.img to allow adb root when using an user build GSI image.
However, to run automated tests, it requires additional properties,
which are not needed for GSI compliance:
ro.audio.silent=1
ro.test_harness=1
This CL adds an additional boot-test-harness.img for automated tests,
and keeps the original boot-debug.img for GSI compliance.
Note: boot-test-harness.img won't be built by default, it needs
explicit `make bootimage_test_harness`.
Bug: 140036184
Test: `m bootimage_test_harness`, flashes boot-test-harness.img and checks
adb root works and test harness props are set.
Test: `m bootimage_test_harness dist -j32`, checks both
boot-test-harness.img and ramdisk-test-harness.img are under ./out/dist/.
Test: `system/tools/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-test-harness.img --out ramdisk-test-harness`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-test-harness.img and $OUT/boot-debug.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk-test-harness ./ramdisk-debug`
Test: `m ramdisk_test_harness-nodeps` and `m bootimage_test_harness-nodeps`
Change-Id: Iadea0b5c933c3b7fa10dcf3d9e85596916b3333d
2019-10-08 04:22:19 +02:00
ramdisk_test_harness-nodeps \
2016-11-10 01:35:34 +01:00
bootimage-nodeps \
Adding boot-debug.img and ramdisk-debug.img
The two new debugging images adds additional files based on
boot.img and ramdisk.img/ramdisk-recovery.img, respectively.
File /force_debuggable is to trigger special logic in /init to load an
userdebug version of sepolicy and an additional property file from this
ramdisk to allow adb root, if the device is unlocked.
It's intentional to skip signing for boot-debug.img, as it can
only be used if the device is unlocked, where verification error
is allowed.
Those debugging images allows adb root on user build
system.img, vendor.img, product.img, etc. This can facilitate more
automated testings on user builds and is helpful to narrow down the
delta between what's being tested v.s. what's being shipped.
Bug: 126493225
Test: `make dist`, checks both boot-debug.img and ramdisk-debug.img
are in $OUT/ and out/dist.
Test: `make dist`, checks installed-files-ramdisk-debug.{json,txt} are
in out/dist.
Test: `system/core/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-debug.img`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-debug.img and $OUT/boot.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk ./ramdisk-debug`
Test: `make ramdisk_debug-nodeps` and `make bootimage_debug-nodeps`
Change-Id: I30137c3caef91805d9143d404e5e4d06c0fccc30
2019-03-20 10:59:52 +01:00
bootimage_debug-nodeps \
Adding boot-test-harness.img
In commit I30137c3caef91805d9143d404e5e4d06c0fccc30, we added
a boot-debug.img to allow adb root when using an user build GSI image.
However, to run automated tests, it requires additional properties,
which are not needed for GSI compliance:
ro.audio.silent=1
ro.test_harness=1
This CL adds an additional boot-test-harness.img for automated tests,
and keeps the original boot-debug.img for GSI compliance.
Note: boot-test-harness.img won't be built by default, it needs
explicit `make bootimage_test_harness`.
Bug: 140036184
Test: `m bootimage_test_harness`, flashes boot-test-harness.img and checks
adb root works and test harness props are set.
Test: `m bootimage_test_harness dist -j32`, checks both
boot-test-harness.img and ramdisk-test-harness.img are under ./out/dist/.
Test: `system/tools/mkbootimg/unpack_bootimg.py --boot_img $OUT/boot-test-harness.img --out ramdisk-test-harness`,
checks the extracted out/ramdisk is as expected
Test: Run `gunzip -c ramdisk | cpio -idm` for the ramdisk extracted from
$OUT/boot-test-harness.img and $OUT/boot-debug.img, respectively.
Then compare the root dirs of both, e.g.,
`diff -rq --no-dereference ./ramdisk-test-harness ./ramdisk-debug`
Test: `m ramdisk_test_harness-nodeps` and `m bootimage_test_harness-nodeps`
Change-Id: Iadea0b5c933c3b7fa10dcf3d9e85596916b3333d
2019-10-08 04:22:19 +02:00
bootimage_test_harness-nodeps \
2016-11-10 01:35:34 +01:00
recoveryimage-nodeps \
vbmetaimage-nodeps \
product-graph dump-products
2017-10-12 10:35:14 +02:00
i f e q ( $( CALLED_FROM_SETUP ) , t r u e )
2016-11-10 02:22:15 +01:00
i n c l u d e $( BUILD_SYSTEM ) / n i n j a _ c o n f i g . m k
i n c l u d e $( BUILD_SYSTEM ) / s o o n g _ c o n f i g . m k
e n d i f
2019-03-14 02:04:05 +01:00
- i n c l u d e e x t e r n a l / l i n u x - k s e l f t e s t / a n d r o i d / k s e l f t e s t _ t e s t _ l i s t . m k
- i n c l u d e e x t e r n a l / l t p / a n d r o i d / l t p _ p a c k a g e _ l i s t . m k
DEFAULT_DATA_OUT_MODULES := ltp $( ltp_packages) $( kselftest_modules)
2019-03-25 21:26:03 +01:00
.KATI_READONLY := DEFAULT_DATA_OUT_MODULES
2019-03-14 02:04:05 +01:00
2013-04-06 03:02:16 +02:00
i n c l u d e $( BUILD_SYSTEM ) / d u m p v a r . m k