adf8096c77
The recovery patch gets put in the SYSTEM directory. Placing the recovery patch here doesn't make sense when not building the system image, as is the case for merged (system + vendor) builds. Bug: 128838154 Test: Running make droid dist for a device target that sets PRODUCT_BUILD_SYSTEM_IMAGE to false. Change-Id: Ib5ce8c8490024199f82d0c093e9a7ae2de5f71f5
4734 lines
214 KiB
Makefile
4734 lines
214 KiB
Makefile
# Put some miscellaneous rules here
|
|
|
|
# HACK: clear LOCAL_PATH from including last build target before calling
|
|
# intermedites-dir-for
|
|
LOCAL_PATH := $(BUILD_SYSTEM)
|
|
|
|
# -----------------------------------------------------------------
|
|
# Define rules to copy PRODUCT_COPY_FILES defined by the product.
|
|
# PRODUCT_COPY_FILES contains words like <source file>:<dest file>[:<owner>].
|
|
# <dest file> is relative to $(PRODUCT_OUT), so it should look like,
|
|
# e.g., "system/etc/file.xml".
|
|
# The filter part means "only eval the copy-one-file rule if this
|
|
# src:dest pair is the first one to match the same dest"
|
|
#$(1): the src:dest pair
|
|
#$(2): the dest
|
|
define check-product-copy-files
|
|
$(if $(filter-out $(TARGET_COPY_OUT_SYSTEM_OTHER)/%,$(2)), \
|
|
$(if $(filter %.apk, $(2)),$(error \
|
|
Prebuilt apk found in PRODUCT_COPY_FILES: $(1), use BUILD_PREBUILT instead!)))
|
|
endef
|
|
# filter out the duplicate <source file>:<dest file> pairs.
|
|
unique_product_copy_files_pairs :=
|
|
$(foreach cf,$(PRODUCT_COPY_FILES), \
|
|
$(if $(filter $(unique_product_copy_files_pairs),$(cf)),,\
|
|
$(eval unique_product_copy_files_pairs += $(cf))))
|
|
unique_product_copy_files_destinations :=
|
|
product_copy_files_ignored :=
|
|
$(foreach cf,$(unique_product_copy_files_pairs), \
|
|
$(eval _src := $(call word-colon,1,$(cf))) \
|
|
$(eval _dest := $(call word-colon,2,$(cf))) \
|
|
$(call check-product-copy-files,$(cf),$(_dest)) \
|
|
$(if $(filter $(unique_product_copy_files_destinations),$(_dest)), \
|
|
$(eval product_copy_files_ignored += $(cf)), \
|
|
$(eval _fulldest := $(call append-path,$(PRODUCT_OUT),$(_dest))) \
|
|
$(if $(filter %.xml,$(_dest)),\
|
|
$(eval $(call copy-xml-file-checked,$(_src),$(_fulldest))),\
|
|
$(if $(and $(filter %.jar,$(_dest)),$(filter $(basename $(notdir $(_dest))),$(PRODUCT_LOADED_BY_PRIVILEGED_MODULES))),\
|
|
$(eval $(call copy-and-uncompress-dexs,$(_src),$(_fulldest))), \
|
|
$(if $(filter init%rc,$(notdir $(_dest)))$(filter %/etc/init,$(dir $(_dest))),\
|
|
$(eval $(call copy-init-script-file-checked,$(_src),$(_fulldest))),\
|
|
$(eval $(call copy-one-file,$(_src),$(_fulldest)))))) \
|
|
$(eval unique_product_copy_files_destinations += $(_dest))))
|
|
|
|
# Dump a list of overriden (and ignored PRODUCT_COPY_FILES entries)
|
|
pcf_ignored_file := $(PRODUCT_OUT)/product_copy_files_ignored.txt
|
|
$(pcf_ignored_file): PRIVATE_IGNORED := $(sort $(product_copy_files_ignored))
|
|
$(pcf_ignored_file):
|
|
echo "$(PRIVATE_IGNORED)" | tr " " "\n" >$@
|
|
|
|
$(call dist-for-goals,droidcore,$(pcf_ignored_file):logs/$(notdir $(pcf_ignored_file)))
|
|
|
|
pcf_ignored_file :=
|
|
product_copy_files_ignored :=
|
|
unique_product_copy_files_pairs :=
|
|
unique_product_copy_files_destinations :=
|
|
|
|
# -----------------------------------------------------------------
|
|
# Returns the max allowed size for an image suitable for hash verification
|
|
# (e.g., boot.img, recovery.img, etc).
|
|
# The value 69632 derives from MAX_VBMETA_SIZE + MAX_FOOTER_SIZE in $(AVBTOOL).
|
|
# $(1): partition size to flash the image
|
|
define get-hash-image-max-size
|
|
$(if $(1), \
|
|
$(if $(filter true,$(BOARD_AVB_ENABLE)), \
|
|
$(eval _hash_meta_size := 69632), \
|
|
$(eval _hash_meta_size := 0)) \
|
|
$(1)-$(_hash_meta_size))
|
|
endef
|
|
|
|
# -----------------------------------------------------------------
|
|
# Define rules to copy headers defined in copy_headers.mk
|
|
# If more than one makefile declared a header, print a warning,
|
|
# then copy the last one defined. This matches the previous make
|
|
# behavior.
|
|
has_dup_copy_headers :=
|
|
$(foreach dest,$(ALL_COPIED_HEADERS), \
|
|
$(eval _srcs := $(ALL_COPIED_HEADERS.$(dest).SRC)) \
|
|
$(eval _src := $(lastword $(_srcs))) \
|
|
$(if $(call streq,$(_src),$(_srcs)),, \
|
|
$(warning Duplicate header copy: $(dest)) \
|
|
$(warning _ Using $(_src)) \
|
|
$(warning __ from $(lastword $(ALL_COPIED_HEADERS.$(dest).MAKEFILE))) \
|
|
$(eval _makefiles := $$(wordlist 1,$(call int_subtract,$(words $(ALL_COPIED_HEADERS.$(dest).MAKEFILE)),1),$$(ALL_COPIED_HEADERS.$$(dest).MAKEFILE))) \
|
|
$(foreach src,$(wordlist 1,$(call int_subtract,$(words $(_srcs)),1),$(_srcs)), \
|
|
$(warning _ Ignoring $(src)) \
|
|
$(warning __ from $(firstword $(_makefiles))) \
|
|
$(eval _makefiles := $$(wordlist 2,9999,$$(_makefiles)))) \
|
|
$(eval has_dup_copy_headers := true)) \
|
|
$(eval $(call copy-one-header,$(_src),$(dest))))
|
|
all_copied_headers: $(ALL_COPIED_HEADERS)
|
|
|
|
ifdef has_dup_copy_headers
|
|
has_dup_copy_headers :=
|
|
ifneq ($(BUILD_BROKEN_DUP_COPY_HEADERS),true)
|
|
$(error duplicate header copies are no longer allowed. For more information about headers, see: https://android.googlesource.com/platform/build/soong/+/master/docs/best_practices.md#headers)
|
|
endif
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# docs/index.html
|
|
ifeq (,$(TARGET_BUILD_APPS))
|
|
gen := $(OUT_DOCS)/index.html
|
|
ALL_DOCS += $(gen)
|
|
$(gen): frameworks/base/docs/docs-redirect-index.html
|
|
@mkdir -p $(dir $@)
|
|
@cp -f $< $@
|
|
endif
|
|
|
|
ndk_doxygen_out := $(OUT_NDK_DOCS)
|
|
ndk_headers := $(SOONG_OUT_DIR)/ndk/sysroot/usr/include
|
|
ndk_docs_src_dir := frameworks/native/docs
|
|
ndk_doxyfile := $(ndk_docs_src_dir)/Doxyfile
|
|
ifneq ($(wildcard $(ndk_docs_src_dir)),)
|
|
ndk_docs_srcs := $(addprefix $(ndk_docs_src_dir)/,\
|
|
$(call find-files-in-subdirs,$(ndk_docs_src_dir),"*",.))
|
|
$(ndk_doxygen_out)/index.html: $(ndk_docs_srcs) $(SOONG_OUT_DIR)/ndk.timestamp
|
|
@mkdir -p $(ndk_doxygen_out)
|
|
@echo "Generating NDK docs to $(ndk_doxygen_out)"
|
|
@( cat $(ndk_doxyfile); \
|
|
echo "INPUT=$(ndk_headers)"; \
|
|
echo "HTML_OUTPUT=$(ndk_doxygen_out)" \
|
|
) | doxygen -
|
|
|
|
# Note: Not a part of the docs target because we don't have doxygen available.
|
|
# You can run this target locally if you have doxygen installed.
|
|
ndk-docs: $(ndk_doxygen_out)/index.html
|
|
.PHONY: ndk-docs
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# generate preview API fingerprint
|
|
api_fingerprint := $(call intermediates-dir-for,PACKAGING,api_fingerprint)/api_fingerprint.txt
|
|
.KATI_READONLY := api_fingerprint
|
|
|
|
ifeq (REL,$(PLATFORM_VERSION_CODENAME))
|
|
$(api_fingerprint):
|
|
echo REL >$@
|
|
else ifneq ($(TARGET_BUILD_APPS),)
|
|
# TODO: use a prebuilt api_fingerprint.txt from prebuilts/sdk/current.txt once we have one
|
|
#$(eval $(call copy-one-file,prebuilts/sdk/current/api_fingerprint.txt,$(api_fingerprint)))
|
|
$(api_fingerprint):
|
|
echo $(PLATFORM_PREVIEW_SDK_VERSION) >$@
|
|
else ifneq ($(TARGET_BUILD_PDK),)
|
|
$(eval $(call copy-one-file,$(_pdk_fusion_intermediates)/api_fingerprint.txt,$(api_fingerprint)))
|
|
else
|
|
ifeq ($(HOST_OS),darwin)
|
|
$(api_fingerprint): PRIVATE_HASH := md5
|
|
else
|
|
$(api_fingerprint): PRIVATE_HASH := md5sum
|
|
endif
|
|
$(api_fingerprint): $(sort $(wildcard frameworks/base/api/*current.txt))
|
|
cat $^ | $(PRIVATE_HASH) | cut -d' ' -f1 >$@
|
|
|
|
$(call dist-for-goals,sdk,$(api_fingerprint))
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# property_overrides_split_enabled
|
|
property_overrides_split_enabled :=
|
|
ifeq ($(BOARD_PROPERTY_OVERRIDES_SPLIT_ENABLED), true)
|
|
property_overrides_split_enabled := true
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# FINAL_VENDOR_DEFAULT_PROPERTIES will be installed in vendor/default.prop if
|
|
# property_overrides_split_enabled is true. Otherwise it will be installed in
|
|
# ROOT/default.prop.
|
|
ifdef BOARD_VNDK_VERSION
|
|
ifeq ($(BOARD_VNDK_VERSION),current)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES := ro.vndk.version=$(PLATFORM_VNDK_VERSION)
|
|
else
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES := ro.vndk.version=$(BOARD_VNDK_VERSION)
|
|
endif
|
|
ifdef BOARD_VNDK_RUNTIME_DISABLE
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += ro.vndk.lite=true
|
|
endif
|
|
else
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES := ro.vndk.version=$(PLATFORM_VNDK_VERSION)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += ro.vndk.lite=true
|
|
endif
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += \
|
|
$(call collapse-pairs, $(PRODUCT_DEFAULT_PROPERTY_OVERRIDES))
|
|
|
|
# Add cpu properties for bionic and ART.
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += ro.bionic.arch=$(TARGET_ARCH)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += ro.bionic.cpu_variant=$(TARGET_CPU_VARIANT_RUNTIME)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += ro.bionic.2nd_arch=$(TARGET_2ND_ARCH)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += ro.bionic.2nd_cpu_variant=$(TARGET_2ND_CPU_VARIANT_RUNTIME)
|
|
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += persist.sys.dalvik.vm.lib.2=libart.so
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += dalvik.vm.isa.$(TARGET_ARCH).variant=$(DEX2OAT_TARGET_CPU_VARIANT_RUNTIME)
|
|
ifneq ($(DEX2OAT_TARGET_INSTRUCTION_SET_FEATURES),)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += dalvik.vm.isa.$(TARGET_ARCH).features=$(DEX2OAT_TARGET_INSTRUCTION_SET_FEATURES)
|
|
endif
|
|
|
|
ifdef TARGET_2ND_ARCH
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += dalvik.vm.isa.$(TARGET_2ND_ARCH).variant=$($(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_CPU_VARIANT_RUNTIME)
|
|
ifneq ($($(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_INSTRUCTION_SET_FEATURES),)
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += dalvik.vm.isa.$(TARGET_2ND_ARCH).features=$($(TARGET_2ND_ARCH_VAR_PREFIX)DEX2OAT_TARGET_INSTRUCTION_SET_FEATURES)
|
|
endif
|
|
endif
|
|
|
|
# Although these variables are prefixed with TARGET_RECOVERY_, they are also needed under charger
|
|
# mode (via libminui).
|
|
ifdef TARGET_RECOVERY_DEFAULT_ROTATION
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += \
|
|
ro.minui.default_rotation=$(TARGET_RECOVERY_DEFAULT_ROTATION)
|
|
endif
|
|
ifdef TARGET_RECOVERY_OVERSCAN_PERCENT
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += \
|
|
ro.minui.overscan_percent=$(TARGET_RECOVERY_OVERSCAN_PERCENT)
|
|
endif
|
|
ifdef TARGET_RECOVERY_PIXEL_FORMAT
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES += \
|
|
ro.minui.pixel_format=$(TARGET_RECOVERY_PIXEL_FORMAT)
|
|
endif
|
|
FINAL_VENDOR_DEFAULT_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_VENDOR_DEFAULT_PROPERTIES),=)
|
|
|
|
# -----------------------------------------------------------------
|
|
# prop.default
|
|
|
|
BUILDINFO_SH := build/make/tools/buildinfo.sh
|
|
BUILDINFO_COMMON_SH := build/make/tools/buildinfo_common.sh
|
|
|
|
# Generates a set of sysprops common to all partitions to a file.
|
|
# $(1): Partition name
|
|
# $(2): Output file name
|
|
define generate-common-build-props
|
|
PRODUCT_BRAND="$(PRODUCT_BRAND)" \
|
|
PRODUCT_DEVICE="$(TARGET_DEVICE)" \
|
|
PRODUCT_MANUFACTURER="$(PRODUCT_MANUFACTURER)" \
|
|
PRODUCT_MODEL="$(PRODUCT_MODEL)" \
|
|
PRODUCT_NAME="$(TARGET_PRODUCT)" \
|
|
$(call generate-common-build-props-with-product-vars-set,$(1),$(2))
|
|
endef
|
|
|
|
# Like the above macro, but requiring the relevant PRODUCT_ environment
|
|
# variables to be set when called.
|
|
define generate-common-build-props-with-product-vars-set
|
|
BUILD_FINGERPRINT="$(BUILD_FINGERPRINT_FROM_FILE)" \
|
|
BUILD_ID="$(BUILD_ID)" \
|
|
BUILD_NUMBER="$(BUILD_NUMBER_FROM_FILE)" \
|
|
BUILD_VERSION_TAGS="$(BUILD_VERSION_TAGS)" \
|
|
DATE="$(DATE_FROM_FILE)" \
|
|
PLATFORM_SDK_VERSION="$(PLATFORM_SDK_VERSION)" \
|
|
PLATFORM_VERSION="$(PLATFORM_VERSION)" \
|
|
TARGET_BUILD_TYPE="$(TARGET_BUILD_VARIANT)" \
|
|
bash $(BUILDINFO_COMMON_SH) "$(1)" >> $(2)
|
|
endef
|
|
|
|
ifdef property_overrides_split_enabled
|
|
INSTALLED_DEFAULT_PROP_TARGET := $(TARGET_OUT)/etc/prop.default
|
|
INSTALLED_DEFAULT_PROP_OLD_TARGET := $(TARGET_ROOT_OUT)/default.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_DEFAULT_PROP_OLD_TARGET)
|
|
$(INSTALLED_DEFAULT_PROP_OLD_TARGET): $(INSTALLED_DEFAULT_PROP_TARGET)
|
|
else
|
|
# legacy path
|
|
INSTALLED_DEFAULT_PROP_TARGET := $(TARGET_ROOT_OUT)/default.prop
|
|
endif
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_DEFAULT_PROP_TARGET)
|
|
FINAL_DEFAULT_PROPERTIES := \
|
|
$(call collapse-pairs, $(ADDITIONAL_DEFAULT_PROPERTIES)) \
|
|
$(call collapse-pairs, $(PRODUCT_SYSTEM_DEFAULT_PROPERTIES))
|
|
ifndef property_overrides_split_enabled
|
|
FINAL_DEFAULT_PROPERTIES += \
|
|
$(call collapse-pairs, $(FINAL_VENDOR_DEFAULT_PROPERTIES))
|
|
endif
|
|
FINAL_DEFAULT_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_DEFAULT_PROPERTIES),=)
|
|
|
|
intermediate_system_build_prop := $(call intermediates-dir-for,ETC,system_build_prop)/build.prop
|
|
|
|
$(INSTALLED_DEFAULT_PROP_TARGET): $(BUILDINFO_COMMON_SH) $(intermediate_system_build_prop)
|
|
@echo Target buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) echo "#" > $@; \
|
|
echo "# ADDITIONAL_DEFAULT_PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(foreach line,$(FINAL_DEFAULT_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
$(hide) echo "#" >> $@; \
|
|
echo "# BOOTIMAGE_BUILD_PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(call generate-common-build-props,bootimage,$@)
|
|
$(hide) build/make/tools/post_process_props.py $@
|
|
ifdef property_overrides_split_enabled
|
|
$(hide) mkdir -p $(TARGET_ROOT_OUT)
|
|
$(hide) ln -sf system/etc/prop.default $(INSTALLED_DEFAULT_PROP_OLD_TARGET)
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# vendor default.prop
|
|
INSTALLED_VENDOR_DEFAULT_PROP_TARGET :=
|
|
ifdef property_overrides_split_enabled
|
|
INSTALLED_VENDOR_DEFAULT_PROP_TARGET := $(TARGET_OUT_VENDOR)/default.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_VENDOR_DEFAULT_PROP_TARGET)
|
|
|
|
$(INSTALLED_VENDOR_DEFAULT_PROP_TARGET): $(INSTALLED_DEFAULT_PROP_TARGET)
|
|
@echo Target buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) echo "#" > $@; \
|
|
echo "# ADDITIONAL VENDOR DEFAULT PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(foreach line,$(FINAL_VENDOR_DEFAULT_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
$(hide) build/make/tools/post_process_props.py $@
|
|
|
|
endif # property_overrides_split_enabled
|
|
|
|
# -----------------------------------------------------------------
|
|
# build.prop
|
|
INSTALLED_BUILD_PROP_TARGET := $(TARGET_OUT)/build.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_BUILD_PROP_TARGET)
|
|
FINAL_BUILD_PROPERTIES := \
|
|
$(call collapse-pairs, $(ADDITIONAL_BUILD_PROPERTIES))
|
|
FINAL_BUILD_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_BUILD_PROPERTIES),=)
|
|
|
|
# A list of arbitrary tags describing the build configuration.
|
|
# Force ":=" so we can use +=
|
|
BUILD_VERSION_TAGS := $(BUILD_VERSION_TAGS)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
BUILD_VERSION_TAGS += debug
|
|
endif
|
|
# The "test-keys" tag marks builds signed with the old test keys,
|
|
# which are available in the SDK. "dev-keys" marks builds signed with
|
|
# non-default dev keys (usually private keys from a vendor directory).
|
|
# Both of these tags will be removed and replaced with "release-keys"
|
|
# when the target-files is signed in a post-build step.
|
|
ifeq ($(DEFAULT_SYSTEM_DEV_CERTIFICATE),build/target/product/security/testkey)
|
|
BUILD_KEYS := test-keys
|
|
else
|
|
BUILD_KEYS := dev-keys
|
|
endif
|
|
BUILD_VERSION_TAGS += $(BUILD_KEYS)
|
|
BUILD_VERSION_TAGS := $(subst $(space),$(comma),$(sort $(BUILD_VERSION_TAGS)))
|
|
|
|
# A human-readable string that descibes this build in detail.
|
|
build_desc := $(TARGET_PRODUCT)-$(TARGET_BUILD_VARIANT) $(PLATFORM_VERSION) $(BUILD_ID) $(BUILD_NUMBER_FROM_FILE) $(BUILD_VERSION_TAGS)
|
|
$(intermediate_system_build_prop): PRIVATE_BUILD_DESC := $(build_desc)
|
|
|
|
# The string used to uniquely identify the combined build and product; used by the OTA server.
|
|
ifeq (,$(strip $(BUILD_FINGERPRINT)))
|
|
ifeq ($(strip $(HAS_BUILD_NUMBER)),false)
|
|
BF_BUILD_NUMBER := $(BUILD_USERNAME)$$($(DATE_FROM_FILE) +%m%d%H%M)
|
|
else
|
|
BF_BUILD_NUMBER := $(file <$(BUILD_NUMBER_FILE))
|
|
endif
|
|
BUILD_FINGERPRINT := $(PRODUCT_BRAND)/$(TARGET_PRODUCT)/$(TARGET_DEVICE):$(PLATFORM_VERSION)/$(BUILD_ID)/$(BF_BUILD_NUMBER):$(TARGET_BUILD_VARIANT)/$(BUILD_VERSION_TAGS)
|
|
endif
|
|
# unset it for safety.
|
|
BF_BUILD_NUMBER :=
|
|
|
|
BUILD_FINGERPRINT_FILE := $(PRODUCT_OUT)/build_fingerprint.txt
|
|
ifneq (,$(shell mkdir -p $(PRODUCT_OUT) && echo $(BUILD_FINGERPRINT) >$(BUILD_FINGERPRINT_FILE) && grep " " $(BUILD_FINGERPRINT_FILE)))
|
|
$(error BUILD_FINGERPRINT cannot contain spaces: "$(file <$(BUILD_FINGERPRINT_FILE))")
|
|
endif
|
|
BUILD_FINGERPRINT_FROM_FILE := $$(cat $(BUILD_FINGERPRINT_FILE))
|
|
# unset it for safety.
|
|
BUILD_FINGERPRINT :=
|
|
|
|
# The string used to uniquely identify the system build; used by the OTA server.
|
|
# This purposefully excludes any product-specific variables.
|
|
ifeq (,$(strip $(BUILD_THUMBPRINT)))
|
|
BUILD_THUMBPRINT := $(PLATFORM_VERSION)/$(BUILD_ID)/$(BUILD_NUMBER_FROM_FILE):$(TARGET_BUILD_VARIANT)/$(BUILD_VERSION_TAGS)
|
|
endif
|
|
|
|
BUILD_THUMBPRINT_FILE := $(PRODUCT_OUT)/build_thumbprint.txt
|
|
ifneq (,$(shell mkdir -p $(PRODUCT_OUT) && echo $(BUILD_THUMBPRINT) >$(BUILD_THUMBPRINT_FILE) && grep " " $(BUILD_THUMBPRINT_FILE)))
|
|
$(error BUILD_THUMBPRINT cannot contain spaces: "$(file <$(BUILD_THUMBPRINT_FILE))")
|
|
endif
|
|
BUILD_THUMBPRINT_FROM_FILE := $$(cat $(BUILD_THUMBPRINT_FILE))
|
|
# unset it for safety.
|
|
BUILD_THUMBPRINT :=
|
|
|
|
KNOWN_OEM_THUMBPRINT_PROPERTIES := \
|
|
ro.product.brand \
|
|
ro.product.name \
|
|
ro.product.device
|
|
OEM_THUMBPRINT_PROPERTIES := $(filter $(KNOWN_OEM_THUMBPRINT_PROPERTIES),\
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_OEM_PROPERTIES))
|
|
|
|
# Display parameters shown under Settings -> About Phone
|
|
ifeq ($(TARGET_BUILD_VARIANT),user)
|
|
# User builds should show:
|
|
# release build number or branch.buld_number non-release builds
|
|
|
|
# Dev. branches should have DISPLAY_BUILD_NUMBER set
|
|
ifeq (true,$(DISPLAY_BUILD_NUMBER))
|
|
BUILD_DISPLAY_ID := $(BUILD_ID).$(BUILD_NUMBER_FROM_FILE) $(BUILD_KEYS)
|
|
else
|
|
BUILD_DISPLAY_ID := $(BUILD_ID) $(BUILD_KEYS)
|
|
endif
|
|
else
|
|
# Non-user builds should show detailed build information
|
|
BUILD_DISPLAY_ID := $(build_desc)
|
|
endif
|
|
|
|
# Accepts a whitespace separated list of product locales such as
|
|
# (en_US en_AU en_GB...) and returns the first locale in the list with
|
|
# underscores replaced with hyphens. In the example above, this will
|
|
# return "en-US".
|
|
define get-default-product-locale
|
|
$(strip $(subst _,-, $(firstword $(1))))
|
|
endef
|
|
|
|
# TARGET_BUILD_FLAVOR and ro.build.flavor are used only by the test
|
|
# harness to distinguish builds. Only add _asan for a sanitized build
|
|
# if it isn't already a part of the flavor (via a dedicated lunch
|
|
# config for example).
|
|
TARGET_BUILD_FLAVOR := $(TARGET_PRODUCT)-$(TARGET_BUILD_VARIANT)
|
|
ifneq (, $(filter address, $(SANITIZE_TARGET)))
|
|
ifeq (,$(findstring _asan,$(TARGET_BUILD_FLAVOR)))
|
|
TARGET_BUILD_FLAVOR := $(TARGET_BUILD_FLAVOR)_asan
|
|
endif
|
|
endif
|
|
|
|
ifdef TARGET_SYSTEM_PROP
|
|
system_prop_file := $(TARGET_SYSTEM_PROP)
|
|
else
|
|
system_prop_file := $(wildcard $(TARGET_DEVICE_DIR)/system.prop)
|
|
endif
|
|
$(intermediate_system_build_prop): $(BUILDINFO_SH) $(BUILDINFO_COMMON_SH) $(INTERNAL_BUILD_ID_MAKEFILE) $(BUILD_SYSTEM)/version_defaults.mk $(system_prop_file) $(INSTALLED_ANDROID_INFO_TXT_TARGET) $(api_fingerprint)
|
|
@echo Target buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) echo > $@
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_OEM_PROPERTIES),)
|
|
$(hide) echo "#" >> $@; \
|
|
echo "# PRODUCT_OEM_PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(foreach prop,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_OEM_PROPERTIES), \
|
|
echo "import /oem/oem.prop $(prop)" >> $@;)
|
|
endif
|
|
$(hide) PRODUCT_BRAND="$(PRODUCT_SYSTEM_BRAND)" \
|
|
PRODUCT_MANUFACTURER="$(PRODUCT_SYSTEM_MANUFACTURER)" \
|
|
PRODUCT_MODEL="$(PRODUCT_SYSTEM_MODEL)" \
|
|
PRODUCT_NAME="$(PRODUCT_SYSTEM_NAME)" \
|
|
PRODUCT_DEVICE="$(PRODUCT_SYSTEM_DEVICE)" \
|
|
$(call generate-common-build-props-with-product-vars-set,system,$@)
|
|
$(hide) TARGET_BUILD_TYPE="$(TARGET_BUILD_VARIANT)" \
|
|
TARGET_BUILD_FLAVOR="$(TARGET_BUILD_FLAVOR)" \
|
|
TARGET_DEVICE="$(TARGET_DEVICE)" \
|
|
PRODUCT_DEFAULT_LOCALE="$(call get-default-product-locale,$(PRODUCT_LOCALES))" \
|
|
PRODUCT_DEFAULT_WIFI_CHANNELS="$(PRODUCT_DEFAULT_WIFI_CHANNELS)" \
|
|
PRIVATE_BUILD_DESC="$(PRIVATE_BUILD_DESC)" \
|
|
BUILD_ID="$(BUILD_ID)" \
|
|
BUILD_DISPLAY_ID="$(BUILD_DISPLAY_ID)" \
|
|
DATE="$(DATE_FROM_FILE)" \
|
|
BUILD_USERNAME="$(BUILD_USERNAME)" \
|
|
BUILD_HOSTNAME="$(BUILD_HOSTNAME)" \
|
|
BUILD_NUMBER="$(BUILD_NUMBER_FROM_FILE)" \
|
|
BOARD_BUILD_SYSTEM_ROOT_IMAGE="$(BOARD_BUILD_SYSTEM_ROOT_IMAGE)" \
|
|
AB_OTA_UPDATER="$(AB_OTA_UPDATER)" \
|
|
PLATFORM_VERSION="$(PLATFORM_VERSION)" \
|
|
PLATFORM_SECURITY_PATCH="$(PLATFORM_SECURITY_PATCH)" \
|
|
PLATFORM_BASE_OS="$(PLATFORM_BASE_OS)" \
|
|
PLATFORM_SDK_VERSION="$(PLATFORM_SDK_VERSION)" \
|
|
PLATFORM_PREVIEW_SDK_VERSION="$(PLATFORM_PREVIEW_SDK_VERSION)" \
|
|
PLATFORM_PREVIEW_SDK_FINGERPRINT="$$(cat $(api_fingerprint))" \
|
|
PLATFORM_VERSION_CODENAME="$(PLATFORM_VERSION_CODENAME)" \
|
|
PLATFORM_VERSION_ALL_CODENAMES="$(PLATFORM_VERSION_ALL_CODENAMES)" \
|
|
PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION="$(PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION)" \
|
|
BUILD_VERSION_TAGS="$(BUILD_VERSION_TAGS)" \
|
|
$(if $(OEM_THUMBPRINT_PROPERTIES),BUILD_THUMBPRINT="$(BUILD_THUMBPRINT_FROM_FILE)") \
|
|
TARGET_CPU_ABI_LIST="$(TARGET_CPU_ABI_LIST)" \
|
|
TARGET_CPU_ABI_LIST_32_BIT="$(TARGET_CPU_ABI_LIST_32_BIT)" \
|
|
TARGET_CPU_ABI_LIST_64_BIT="$(TARGET_CPU_ABI_LIST_64_BIT)" \
|
|
TARGET_CPU_ABI="$(TARGET_CPU_ABI)" \
|
|
TARGET_CPU_ABI2="$(TARGET_CPU_ABI2)" \
|
|
bash $(BUILDINFO_SH) >> $@
|
|
$(hide) $(foreach file,$(system_prop_file), \
|
|
if [ -f "$(file)" ]; then \
|
|
echo Target buildinfo from: "$(file)"; \
|
|
echo "" >> $@; \
|
|
echo "#" >> $@; \
|
|
echo "# from $(file)" >> $@; \
|
|
echo "#" >> $@; \
|
|
cat $(file) >> $@; \
|
|
echo "# end of $(file)" >> $@; \
|
|
fi;)
|
|
$(if $(FINAL_BUILD_PROPERTIES), \
|
|
$(hide) echo >> $@; \
|
|
echo "#" >> $@; \
|
|
echo "# ADDITIONAL_BUILD_PROPERTIES" >> $@; \
|
|
echo "#" >> $@; )
|
|
$(hide) $(foreach line,$(FINAL_BUILD_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
$(hide) cat $(INSTALLED_ANDROID_INFO_TXT_TARGET) | grep 'require version-' | sed -e 's/require version-/ro.build.expect./g' >> $@
|
|
$(hide) build/make/tools/post_process_props.py $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_PROPERTY_BLACKLIST)
|
|
|
|
build_desc :=
|
|
|
|
ifeq (,$(filter true, $(TARGET_NO_KERNEL) $(TARGET_NO_RECOVERY)))
|
|
INSTALLED_RECOVERYIMAGE_TARGET := $(PRODUCT_OUT)/recovery.img
|
|
else
|
|
INSTALLED_RECOVERYIMAGE_TARGET :=
|
|
endif
|
|
|
|
$(INSTALLED_BUILD_PROP_TARGET): $(intermediate_system_build_prop) $(INSTALLED_RECOVERYIMAGE_TARGET)
|
|
@echo "Target build info: $@"
|
|
$(hide) grep -v 'ro.product.first_api_level' $(intermediate_system_build_prop) > $@
|
|
|
|
# -----------------------------------------------------------------
|
|
# vendor build.prop
|
|
#
|
|
# For verifying that the vendor build is what we think it is
|
|
INSTALLED_VENDOR_BUILD_PROP_TARGET := $(TARGET_OUT_VENDOR)/build.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_VENDOR_BUILD_PROP_TARGET)
|
|
|
|
ifdef property_overrides_split_enabled
|
|
FINAL_VENDOR_BUILD_PROPERTIES += \
|
|
$(call collapse-pairs, $(PRODUCT_PROPERTY_OVERRIDES))
|
|
FINAL_VENDOR_BUILD_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_VENDOR_BUILD_PROPERTIES),=)
|
|
endif # property_overrides_split_enabled
|
|
|
|
$(INSTALLED_VENDOR_BUILD_PROP_TARGET): $(BUILDINFO_COMMON_SH) $(intermediate_system_build_prop)
|
|
@echo Target vendor buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) echo > $@
|
|
$(hide) grep 'ro.product.first_api_level' $(intermediate_system_build_prop) >> $@ || true
|
|
$(hide) echo ro.vendor.build.security_patch="$(VENDOR_SECURITY_PATCH)">>$@
|
|
$(hide) echo ro.vendor.product.cpu.abilist="$(TARGET_CPU_ABI_LIST)">>$@
|
|
$(hide) echo ro.vendor.product.cpu.abilist32="$(TARGET_CPU_ABI_LIST_32_BIT)">>$@
|
|
$(hide) echo ro.vendor.product.cpu.abilist64="$(TARGET_CPU_ABI_LIST_64_BIT)">>$@
|
|
$(hide) echo ro.product.board="$(TARGET_BOOTLOADER_BOARD_NAME)">>$@
|
|
$(hide) echo ro.board.platform="$(TARGET_BOARD_PLATFORM)">>$@
|
|
$(hide) $(call generate-common-build-props,vendor,$@)
|
|
ifdef property_overrides_split_enabled
|
|
$(hide) echo "#" >> $@; \
|
|
echo "# ADDITIONAL VENDOR BUILD PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(foreach line,$(FINAL_VENDOR_BUILD_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
endif # property_overrides_split_enabled
|
|
$(hide) build/make/tools/post_process_props.py $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_PROPERTY_BLACKLIST)
|
|
|
|
# -----------------------------------------------------------------
|
|
# product build.prop
|
|
INSTALLED_PRODUCT_BUILD_PROP_TARGET := $(TARGET_OUT_PRODUCT)/build.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_PRODUCT_BUILD_PROP_TARGET)
|
|
|
|
ifdef TARGET_PRODUCT_PROP
|
|
product_prop_files := $(TARGET_PRODUCT_PROP)
|
|
else
|
|
product_prop_files := $(wildcard $(TARGET_DEVICE_DIR)/product.prop)
|
|
endif
|
|
|
|
FINAL_PRODUCT_PROPERTIES += \
|
|
$(call collapse-pairs, $(PRODUCT_PRODUCT_PROPERTIES) $(ADDITIONAL_PRODUCT_PROPERTIES))
|
|
FINAL_PRODUCT_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_PRODUCT_PROPERTIES),=)
|
|
|
|
$(INSTALLED_PRODUCT_BUILD_PROP_TARGET): $(BUILDINFO_COMMON_SH) $(product_prop_files)
|
|
@echo Target product buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) echo > $@
|
|
ifdef BOARD_USES_PRODUCTIMAGE
|
|
$(hide) $(call generate-common-build-props,product,$@)
|
|
endif # BOARD_USES_PRODUCTIMAGE
|
|
$(hide) $(foreach file,$(product_prop_files), \
|
|
if [ -f "$(file)" ]; then \
|
|
echo Target product properties from: "$(file)"; \
|
|
echo "" >> $@; \
|
|
echo "#" >> $@; \
|
|
echo "# from $(file)" >> $@; \
|
|
echo "#" >> $@; \
|
|
cat $(file) >> $@; \
|
|
echo "# end of $(file)" >> $@; \
|
|
fi;)
|
|
$(hide) echo "#" >> $@; \
|
|
echo "# ADDITIONAL PRODUCT PROPERTIES" >> $@; \
|
|
echo "#" >> $@; \
|
|
echo "ro.build.characteristics=$(TARGET_AAPT_CHARACTERISTICS)" >> $@;
|
|
$(hide) $(foreach line,$(FINAL_PRODUCT_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
$(hide) build/make/tools/post_process_props.py $@
|
|
|
|
# ----------------------------------------------------------------
|
|
# odm build.prop
|
|
INSTALLED_ODM_BUILD_PROP_TARGET := $(TARGET_OUT_ODM)/build.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_ODM_BUILD_PROP_TARGET)
|
|
|
|
FINAL_ODM_BUILD_PROPERTIES += \
|
|
$(call collapse-pairs, $(PRODUCT_ODM_PROPERTIES))
|
|
FINAL_ODM_BUILD_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_ODM_BUILD_PROPERTIES),=)
|
|
|
|
$(INSTALLED_ODM_BUILD_PROP_TARGET): $(BUILDINFO_COMMON_SH)
|
|
@echo Target odm buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) echo > $@
|
|
$(hide) echo ro.odm.product.cpu.abilist="$(TARGET_CPU_ABI_LIST)">>$@
|
|
$(hide) echo ro.odm.product.cpu.abilist32="$(TARGET_CPU_ABI_LIST_32_BIT)">>$@
|
|
$(hide) echo ro.odm.product.cpu.abilist64="$(TARGET_CPU_ABI_LIST_64_BIT)">>$@
|
|
$(hide) $(call generate-common-build-props,odm,$@)
|
|
$(hide) echo "#" >> $@; \
|
|
echo "# ADDITIONAL ODM BUILD PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(foreach line,$(FINAL_ODM_BUILD_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
$(hide) build/make/tools/post_process_props.py $@
|
|
|
|
# -----------------------------------------------------------------
|
|
# product_services build.prop (unless it's merged into /product)
|
|
ifdef MERGE_PRODUCT_SERVICES_INTO_PRODUCT
|
|
ifneq (,$(PRODUCT_PRODUCT_SERVICES_PROPERTIES))
|
|
$(error PRODUCT_PRODUCT_SERVICES_PROPERTIES is not supported in this build.)
|
|
endif
|
|
else
|
|
INSTALLED_PRODUCT_SERVICES_BUILD_PROP_TARGET := $(TARGET_OUT_PRODUCT_SERVICES)/build.prop
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_PRODUCT_SERVICES_BUILD_PROP_TARGET)
|
|
|
|
FINAL_PRODUCT_SERVICES_PROPERTIES += \
|
|
$(call collapse-pairs, $(PRODUCT_PRODUCT_SERVICES_PROPERTIES))
|
|
FINAL_PRODUCT_SERVICES_PROPERTIES := $(call uniq-pairs-by-first-component, \
|
|
$(FINAL_PRODUCT_SERVICES_PROPERTIES),=)
|
|
$(INSTALLED_PRODUCT_SERVICES_BUILD_PROP_TARGET): $(BUILDINFO_COMMON_SH)
|
|
@echo Target product_services buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) echo > $@
|
|
ifdef BOARD_USES_PRODUCT_SERVICESIMAGE
|
|
$(hide) $(call generate-common-build-props,product_services,$@)
|
|
endif # BOARD_USES_PRODUCT_SERVICESIMAGE
|
|
$(hide) echo "#" >> $@; \
|
|
echo "# ADDITIONAL PRODUCT_SERVICES PROPERTIES" >> $@; \
|
|
echo "#" >> $@;
|
|
$(hide) $(foreach line,$(FINAL_PRODUCT_SERVICES_PROPERTIES), \
|
|
echo "$(line)" >> $@;)
|
|
$(hide) build/make/tools/post_process_props.py $@
|
|
endif # MERGE_PRODUCT_SERVICES_INTO_PRODUCT
|
|
|
|
# ----------------------------------------------------------------
|
|
|
|
# -----------------------------------------------------------------
|
|
# sdk-build.prop
|
|
#
|
|
# There are certain things in build.prop that we don't want to
|
|
# ship with the sdk; remove them.
|
|
|
|
# This must be a list of entire property keys followed by
|
|
# "=" characters, without any internal spaces.
|
|
sdk_build_prop_remove := \
|
|
ro.build.user= \
|
|
ro.build.host= \
|
|
ro.product.brand= \
|
|
ro.product.manufacturer= \
|
|
ro.product.device=
|
|
# TODO: Remove this soon-to-be obsolete property
|
|
sdk_build_prop_remove += ro.build.product=
|
|
INSTALLED_SDK_BUILD_PROP_TARGET := $(PRODUCT_OUT)/sdk/sdk-build.prop
|
|
$(INSTALLED_SDK_BUILD_PROP_TARGET): $(INSTALLED_BUILD_PROP_TARGET)
|
|
@echo SDK buildinfo: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) grep -v "$(subst $(space),\|,$(strip \
|
|
$(sdk_build_prop_remove)))" $< > $@.tmp
|
|
$(hide) for x in $(sdk_build_prop_remove); do \
|
|
echo "$$x"generic >> $@.tmp; done
|
|
$(hide) mv $@.tmp $@
|
|
|
|
# -----------------------------------------------------------------
|
|
# package stats
|
|
PACKAGE_STATS_FILE := $(PRODUCT_OUT)/package-stats.txt
|
|
PACKAGES_TO_STAT := \
|
|
$(sort $(filter $(TARGET_OUT)/% $(TARGET_OUT_DATA)/%, \
|
|
$(filter %.jar %.apk, $(ALL_DEFAULT_INSTALLED_MODULES))))
|
|
$(PACKAGE_STATS_FILE): $(PACKAGES_TO_STAT)
|
|
@echo Package stats: $@
|
|
@mkdir -p $(dir $@)
|
|
$(hide) rm -f $@
|
|
ifeq ($(PACKAGES_TO_STAT),)
|
|
# Create empty package stats file if target builds no jar(s) or apk(s).
|
|
$(hide) touch $@
|
|
else
|
|
$(hide) build/make/tools/dump-package-stats $^ > $@
|
|
endif
|
|
|
|
.PHONY: package-stats
|
|
package-stats: $(PACKAGE_STATS_FILE)
|
|
|
|
# -----------------------------------------------------------------
|
|
# Cert-to-package mapping. Used by the post-build signing tools.
|
|
# Use a macro to add newline to each echo command
|
|
define _apkcerts_write_line
|
|
$(hide) echo -n 'name="$(1).apk" certificate="$2" private_key="$3"' >> $5
|
|
$(if $(4), $(hide) echo -n ' compressed="$4"' >> $5)
|
|
$(hide) echo '' >> $5
|
|
|
|
endef
|
|
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-apkcerts-$(FILE_NAME_TAG)
|
|
intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,apkcerts)
|
|
APKCERTS_FILE := $(intermediates)/$(name).txt
|
|
# We don't need to really build all the modules.
|
|
# TODO: rebuild APKCERTS_FILE if any app change its cert.
|
|
$(APKCERTS_FILE):
|
|
@echo APK certs list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(foreach p,$(PACKAGES),\
|
|
$(if $(PACKAGES.$(p).EXTERNAL_KEY),\
|
|
$(call _apkcerts_write_line,$(p),"EXTERNAL","",$(PACKAGES.$(p).COMPRESSED),$@),\
|
|
$(call _apkcerts_write_line,$(p),$(PACKAGES.$(p).CERTIFICATE),$(PACKAGES.$(p).PRIVATE_KEY),$(PACKAGES.$(p).COMPRESSED),$@)))
|
|
# In case value of PACKAGES is empty.
|
|
$(hide) touch $@
|
|
|
|
.PHONY: apkcerts-list
|
|
apkcerts-list: $(APKCERTS_FILE)
|
|
|
|
ifneq (,$(TARGET_BUILD_APPS))
|
|
$(call dist-for-goals, apps_only, $(APKCERTS_FILE):apkcerts.txt)
|
|
$(call dist-for-goals, apps_only, $(SOONG_APEX_KEYS_FILE):apexkeys.txt)
|
|
endif
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
# build system stats
|
|
BUILD_SYSTEM_STATS := $(PRODUCT_OUT)/build_system_stats.txt
|
|
$(BUILD_SYSTEM_STATS):
|
|
@rm -f $@
|
|
@$(foreach s,$(STATS.MODULE_TYPE),echo "modules_type_make,$(s),$(words $(STATS.MODULE_TYPE.$(s)))" >>$@;)
|
|
@$(foreach s,$(STATS.SOONG_MODULE_TYPE),echo "modules_type_soong,$(s),$(STATS.SOONG_MODULE_TYPE.$(s))" >>$@;)
|
|
$(call dist-for-goals,droidcore,$(BUILD_SYSTEM_STATS))
|
|
|
|
# -----------------------------------------------------------------
|
|
# build /product/etc/security/avb/system_other.avbpubkey if needed
|
|
ifdef BUILDING_SYSTEM_OTHER_IMAGE
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
INSTALLED_PRODUCT_SYSTEM_OTHER_AVBKEY_TARGET := $(TARGET_OUT_PRODUCT_ETC)/security/avb/system_other.avbpubkey
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_PRODUCT_SYSTEM_OTHER_AVBKEY_TARGET)
|
|
endif # BOARD_AVB_ENABLE
|
|
endif # BUILDING_SYSTEM_OTHER_IMAGE
|
|
|
|
# -----------------------------------------------------------------
|
|
# Modules ready to be converted to Soong, ordered by how many
|
|
# modules depend on them.
|
|
SOONG_CONV := $(sort $(SOONG_CONV))
|
|
SOONG_CONV_DATA := $(call intermediates-dir-for,PACKAGING,soong_conversion)/soong_conv_data
|
|
$(SOONG_CONV_DATA):
|
|
@rm -f $@
|
|
@$(foreach s,$(SOONG_CONV),echo "$(s),$(SOONG_CONV.$(s).TYPE),$(sort $(SOONG_CONV.$(s).PROBLEMS)),$(sort $(filter-out $(SOONG_ALREADY_CONV),$(SOONG_CONV.$(s).DEPS)))" >>$@;)
|
|
|
|
SOONG_TO_CONVERT_SCRIPT := build/make/tools/soong_to_convert.py
|
|
SOONG_TO_CONVERT := $(PRODUCT_OUT)/soong_to_convert.txt
|
|
$(SOONG_TO_CONVERT): $(SOONG_CONV_DATA) $(SOONG_TO_CONVERT_SCRIPT)
|
|
@rm -f $@
|
|
$(hide) $(SOONG_TO_CONVERT_SCRIPT) $< >$@
|
|
$(call dist-for-goals,droidcore,$(SOONG_TO_CONVERT))
|
|
|
|
# -----------------------------------------------------------------
|
|
# Modules use -Wno-error, or added default -Wall -Werror
|
|
WALL_WERROR := $(PRODUCT_OUT)/wall_werror.txt
|
|
$(WALL_WERROR):
|
|
@rm -f $@
|
|
echo "# Modules using -Wno-error" >> $@
|
|
for m in $(sort $(SOONG_MODULES_USING_WNO_ERROR) $(MODULES_USING_WNO_ERROR)); do echo $$m >> $@; done
|
|
echo "# Modules added default -Wall" >> $@
|
|
for m in $(sort $(SOONG_MODULES_ADDED_WALL) $(MODULES_ADDED_WALL)); do echo $$m >> $@; done
|
|
|
|
$(call dist-for-goals,droidcore,$(WALL_WERROR))
|
|
|
|
# -----------------------------------------------------------------
|
|
# Modules missing profile files
|
|
PGO_PROFILE_MISSING := $(PRODUCT_OUT)/pgo_profile_file_missing.txt
|
|
$(PGO_PROFILE_MISSING):
|
|
@rm -f $@
|
|
echo "# Modules missing PGO profile files" >> $@
|
|
for m in $(SOONG_MODULES_MISSING_PGO_PROFILE_FILE); do echo $$m >> $@; done
|
|
|
|
$(call dist-for-goals,droidcore,$(PGO_PROFILE_MISSING))
|
|
|
|
# -----------------------------------------------------------------
|
|
# The dev key is used to sign this package, and as the key required
|
|
# for future OTA packages installed by this system. Actual product
|
|
# deliverables will be re-signed by hand. We expect this file to
|
|
# exist with the suffixes ".x509.pem" and ".pk8".
|
|
DEFAULT_KEY_CERT_PAIR := $(strip $(DEFAULT_SYSTEM_DEV_CERTIFICATE))
|
|
|
|
|
|
# Rules that need to be present for the all targets, even
|
|
# if they don't do anything.
|
|
.PHONY: systemimage
|
|
systemimage:
|
|
|
|
# -----------------------------------------------------------------
|
|
|
|
.PHONY: event-log-tags
|
|
|
|
# Produce an event logs tag file for everything we know about, in order
|
|
# to properly allocate numbers. Then produce a file that's filtered
|
|
# for what's going to be installed.
|
|
|
|
all_event_log_tags_file := $(TARGET_OUT_COMMON_INTERMEDIATES)/all-event-log-tags.txt
|
|
|
|
event_log_tags_file := $(TARGET_OUT)/etc/event-log-tags
|
|
|
|
# Include tags from all packages that we know about
|
|
all_event_log_tags_src := \
|
|
$(sort $(foreach m, $(ALL_MODULES), $(ALL_MODULES.$(m).EVENT_LOG_TAGS)))
|
|
|
|
# PDK builds will already have a full list of tags that needs to get merged
|
|
# in with the ones from source
|
|
pdk_fusion_log_tags_file := $(patsubst $(PRODUCT_OUT)/%,$(_pdk_fusion_intermediates)/%,$(filter $(event_log_tags_file),$(ALL_PDK_FUSION_FILES)))
|
|
|
|
$(all_event_log_tags_file): PRIVATE_SRC_FILES := $(all_event_log_tags_src) $(pdk_fusion_log_tags_file)
|
|
$(all_event_log_tags_file): $(all_event_log_tags_src) $(pdk_fusion_log_tags_file) $(MERGETAGS) build/make/tools/event_log_tags.py
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) $(MERGETAGS) -o $@ $(PRIVATE_SRC_FILES)
|
|
|
|
# Include tags from all packages included in this product, plus all
|
|
# tags that are part of the system (ie, not in a vendor/ or device/
|
|
# directory).
|
|
event_log_tags_src := \
|
|
$(sort $(foreach m,\
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PACKAGES) \
|
|
$(call module-names-for-tag-list,user), \
|
|
$(ALL_MODULES.$(m).EVENT_LOG_TAGS)) \
|
|
$(filter-out vendor/% device/% out/%,$(all_event_log_tags_src)))
|
|
|
|
$(event_log_tags_file): PRIVATE_SRC_FILES := $(event_log_tags_src) $(pdk_fusion_log_tags_file)
|
|
$(event_log_tags_file): PRIVATE_MERGED_FILE := $(all_event_log_tags_file)
|
|
$(event_log_tags_file): $(event_log_tags_src) $(all_event_log_tags_file) $(pdk_fusion_log_tags_file) $(MERGETAGS) build/make/tools/event_log_tags.py
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) $(MERGETAGS) -o $@ -m $(PRIVATE_MERGED_FILE) $(PRIVATE_SRC_FILES)
|
|
|
|
event-log-tags: $(event_log_tags_file)
|
|
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(event_log_tags_file)
|
|
|
|
|
|
# #################################################################
|
|
# Targets for boot/OS images
|
|
# #################################################################
|
|
ifneq ($(strip $(TARGET_NO_BOOTLOADER)),true)
|
|
INSTALLED_BOOTLOADER_MODULE := $(PRODUCT_OUT)/bootloader
|
|
ifeq ($(strip $(TARGET_BOOTLOADER_IS_2ND)),true)
|
|
INSTALLED_2NDBOOTLOADER_TARGET := $(PRODUCT_OUT)/2ndbootloader
|
|
else
|
|
INSTALLED_2NDBOOTLOADER_TARGET :=
|
|
endif
|
|
else
|
|
INSTALLED_BOOTLOADER_MODULE :=
|
|
INSTALLED_2NDBOOTLOADER_TARGET :=
|
|
endif # TARGET_NO_BOOTLOADER
|
|
ifneq ($(strip $(TARGET_NO_KERNEL)),true)
|
|
INSTALLED_KERNEL_TARGET := $(PRODUCT_OUT)/kernel
|
|
else
|
|
INSTALLED_KERNEL_TARGET :=
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# the root dir
|
|
INTERNAL_ROOT_FILES := $(filter $(TARGET_ROOT_OUT)/%, \
|
|
$(ALL_GENERATED_SOURCES) \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES))
|
|
|
|
INSTALLED_FILES_FILE_ROOT := $(PRODUCT_OUT)/installed-files-root.txt
|
|
INSTALLED_FILES_JSON_ROOT := $(INSTALLED_FILES_FILE_ROOT:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_ROOT): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_ROOT)
|
|
$(INSTALLED_FILES_FILE_ROOT) : $(INTERNAL_ROOT_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_ROOT_OUT) > $(@:.txt=.json)
|
|
$(hide) build/make/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
$(call dist-for-goals, sdk win_sdk sdk_addon, $(INSTALLED_FILES_FILE_ROOT))
|
|
|
|
#------------------------------------------------------------------
|
|
# dtb
|
|
|
|
ifdef BOARD_PREBUILT_DTBIMAGE_DIR
|
|
INSTALLED_DTBIMAGE_TARGET := $(PRODUCT_OUT)/dtb.img
|
|
$(INSTALLED_DTBIMAGE_TARGET) : $(sort $(wildcard $(BOARD_PREBUILT_DTBIMAGE_DIR)/*.dtb))
|
|
cat $^ > $@
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# the ramdisk
|
|
ifdef BUILDING_RAMDISK_IMAGE
|
|
INTERNAL_RAMDISK_FILES := $(filter $(TARGET_RAMDISK_OUT)/%, \
|
|
$(ALL_GENERATED_SOURCES) \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES))
|
|
|
|
INSTALLED_FILES_FILE_RAMDISK := $(PRODUCT_OUT)/installed-files-ramdisk.txt
|
|
INSTALLED_FILES_JSON_RAMDISK := $(INSTALLED_FILES_FILE_RAMDISK:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_RAMDISK): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_RAMDISK)
|
|
$(INSTALLED_FILES_FILE_RAMDISK) : $(INTERNAL_RAMDISK_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_RAMDISK_OUT) > $(@:.txt=.json)
|
|
$(hide) build/make/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
$(call dist-for-goals, sdk win_sdk sdk_addon, $(INSTALLED_FILES_FILE_RAMDISK))
|
|
BUILT_RAMDISK_TARGET := $(PRODUCT_OUT)/ramdisk.img
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_RAMDISK_TARGET := $(BUILT_RAMDISK_TARGET)
|
|
$(INSTALLED_RAMDISK_TARGET): $(MKBOOTFS) $(INTERNAL_RAMDISK_FILES) $(INSTALLED_FILES_FILE_RAMDISK) | $(MINIGZIP)
|
|
$(call pretty,"Target ram disk: $@")
|
|
$(hide) $(MKBOOTFS) -d $(TARGET_OUT) $(TARGET_RAMDISK_OUT) | $(MINIGZIP) > $@
|
|
|
|
.PHONY: ramdisk-nodeps
|
|
ramdisk-nodeps: $(MKBOOTFS) | $(MINIGZIP)
|
|
@echo "make $@: ignoring dependencies"
|
|
$(hide) $(MKBOOTFS) -d $(TARGET_OUT) $(TARGET_RAMDISK_OUT) | $(MINIGZIP) > $(INSTALLED_RAMDISK_TARGET)
|
|
|
|
endif # BUILDING_RAMDISK_IMAGE
|
|
|
|
|
|
INSTALLED_BOOTIMAGE_TARGET := $(PRODUCT_OUT)/boot.img
|
|
|
|
ifneq ($(strip $(TARGET_NO_KERNEL)),true)
|
|
|
|
# -----------------------------------------------------------------
|
|
# the boot image, which is a collection of other images.
|
|
INTERNAL_BOOTIMAGE_ARGS := \
|
|
$(addprefix --second ,$(INSTALLED_2NDBOOTLOADER_TARGET)) \
|
|
--kernel $(INSTALLED_KERNEL_TARGET)
|
|
|
|
ifdef BOARD_INCLUDE_DTB_IN_BOOTIMG
|
|
INTERNAL_BOOTIMAGE_ARGS += --dtb $(INSTALLED_DTBIMAGE_TARGET)
|
|
endif
|
|
|
|
ifneq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
INTERNAL_BOOTIMAGE_ARGS += --ramdisk $(INSTALLED_RAMDISK_TARGET)
|
|
endif
|
|
|
|
INTERNAL_BOOTIMAGE_FILES := $(filter-out --%,$(INTERNAL_BOOTIMAGE_ARGS))
|
|
|
|
ifdef BOARD_KERNEL_BASE
|
|
INTERNAL_BOOTIMAGE_ARGS += --base $(BOARD_KERNEL_BASE)
|
|
endif
|
|
|
|
ifdef BOARD_KERNEL_PAGESIZE
|
|
INTERNAL_BOOTIMAGE_ARGS += --pagesize $(BOARD_KERNEL_PAGESIZE)
|
|
endif
|
|
|
|
ifeq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),true)
|
|
ifeq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
VERITY_KEYID := veritykeyid=id:`openssl x509 -in $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem -text \
|
|
| grep keyid | sed 's/://g' | tr -d '[:space:]' | tr '[:upper:]' '[:lower:]' | sed 's/keyid//g'`
|
|
endif
|
|
endif
|
|
|
|
INTERNAL_KERNEL_CMDLINE := $(strip $(INTERNAL_KERNEL_CMDLINE) buildvariant=$(TARGET_BUILD_VARIANT) $(VERITY_KEYID))
|
|
ifdef INTERNAL_KERNEL_CMDLINE
|
|
INTERNAL_BOOTIMAGE_ARGS += --cmdline "$(INTERNAL_KERNEL_CMDLINE)"
|
|
endif
|
|
|
|
INTERNAL_MKBOOTIMG_VERSION_ARGS := \
|
|
--os_version $(PLATFORM_VERSION) \
|
|
--os_patch_level $(PLATFORM_SECURITY_PATCH)
|
|
|
|
# We build recovery as boot image if BOARD_USES_RECOVERY_AS_BOOT is true.
|
|
ifneq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
ifeq ($(TARGET_BOOTIMAGE_USE_EXT2),true)
|
|
$(error TARGET_BOOTIMAGE_USE_EXT2 is not supported anymore)
|
|
|
|
else ifeq (true,$(BOARD_AVB_ENABLE)) # TARGET_BOOTIMAGE_USE_EXT2 != true
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTIMG) $(AVBTOOL) $(INTERNAL_BOOTIMAGE_FILES) $(BOARD_AVB_BOOT_KEY_PATH)
|
|
$(call pretty,"Target boot image: $@")
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $@
|
|
$(hide) $(call assert-max-image-size,$@,$(call get-hash-image-max-size,$(BOARD_BOOTIMAGE_PARTITION_SIZE)))
|
|
$(hide) $(AVBTOOL) add_hash_footer \
|
|
--image $@ \
|
|
--partition_size $(BOARD_BOOTIMAGE_PARTITION_SIZE) \
|
|
--partition_name boot $(INTERNAL_AVB_BOOT_SIGNING_ARGS) \
|
|
$(BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS)
|
|
|
|
.PHONY: bootimage-nodeps
|
|
bootimage-nodeps: $(MKBOOTIMG) $(AVBTOOL) $(BOARD_AVB_BOOT_KEY_PATH)
|
|
@echo "make $@: ignoring dependencies"
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(INSTALLED_BOOTIMAGE_TARGET)
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_BOOTIMAGE_TARGET),$(call get-hash-image-max-size,$(BOARD_BOOTIMAGE_PARTITION_SIZE)))
|
|
$(hide) $(AVBTOOL) add_hash_footer \
|
|
--image $(INSTALLED_BOOTIMAGE_TARGET) \
|
|
--partition_size $(BOARD_BOOTIMAGE_PARTITION_SIZE) \
|
|
--partition_name boot $(INTERNAL_AVB_BOOT_SIGNING_ARGS) \
|
|
$(BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS)
|
|
|
|
else ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER)) # BOARD_AVB_ENABLE != true
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_FILES) $(BOOT_SIGNER)
|
|
$(call pretty,"Target boot image: $@")
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $@
|
|
$(BOOT_SIGNER) /boot $@ $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $@
|
|
$(hide) $(call assert-max-image-size,$@,$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
.PHONY: bootimage-nodeps
|
|
bootimage-nodeps: $(MKBOOTIMG) $(BOOT_SIGNER)
|
|
@echo "make $@: ignoring dependencies"
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(INSTALLED_BOOTIMAGE_TARGET)
|
|
$(BOOT_SIGNER) /boot $(INSTALLED_BOOTIMAGE_TARGET) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(INSTALLED_BOOTIMAGE_TARGET)
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_BOOTIMAGE_TARGET),$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
else ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)) # PRODUCT_SUPPORTS_BOOT_SIGNER != true
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_FILES) $(VBOOT_SIGNER) $(FUTILITY)
|
|
$(call pretty,"Target boot image: $@")
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $@.unsigned
|
|
$(VBOOT_SIGNER) $(FUTILITY) $@.unsigned $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $@.keyblock $@
|
|
$(hide) $(call assert-max-image-size,$@,$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
.PHONY: bootimage-nodeps
|
|
bootimage-nodeps: $(MKBOOTIMG) $(VBOOT_SIGNER) $(FUTILITY)
|
|
@echo "make $@: ignoring dependencies"
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(INSTALLED_BOOTIMAGE_TARGET).unsigned
|
|
$(VBOOT_SIGNER) $(FUTILITY) $(INSTALLED_BOOTIMAGE_TARGET).unsigned $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $(INSTALLED_BOOTIMAGE_TARGET).keyblock $(INSTALLED_BOOTIMAGE_TARGET)
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_BOOTIMAGE_TARGET),$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
else # PRODUCT_SUPPORTS_VBOOT != true
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_FILES)
|
|
$(call pretty,"Target boot image: $@")
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $@
|
|
$(hide) $(call assert-max-image-size,$@,$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
.PHONY: bootimage-nodeps
|
|
bootimage-nodeps: $(MKBOOTIMG)
|
|
@echo "make $@: ignoring dependencies"
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_BOOTIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(INSTALLED_BOOTIMAGE_TARGET)
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_BOOTIMAGE_TARGET),$(BOARD_BOOTIMAGE_PARTITION_SIZE))
|
|
|
|
endif # TARGET_BOOTIMAGE_USE_EXT2
|
|
endif # BOARD_USES_RECOVERY_AS_BOOT
|
|
|
|
else # TARGET_NO_KERNEL == "true"
|
|
ifdef BOARD_PREBUILT_BOOTIMAGE
|
|
ifneq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
# Remove when b/63676296 is resolved.
|
|
$(error Prebuilt bootimage is only supported for AB targets)
|
|
endif
|
|
$(eval $(call copy-one-file,$(BOARD_PREBUILT_BOOTIMAGE),$(INSTALLED_BOOTIMAGE_TARGET)))
|
|
else # BOARD_PREBUILT_BOOTIMAGE not defined
|
|
INSTALLED_BOOTIMAGE_TARGET :=
|
|
endif # BOARD_PREBUILT_BOOTIMAGE
|
|
endif # TARGET_NO_KERNEL
|
|
|
|
# -----------------------------------------------------------------
|
|
# NOTICE files
|
|
#
|
|
# We are required to publish the licenses for all code under BSD, GPL and
|
|
# Apache licenses (and possibly other more exotic ones as well). We err on the
|
|
# side of caution, so the licenses for other third-party code are included here
|
|
# too.
|
|
#
|
|
# This needs to be before the systemimage rules, because it adds to
|
|
# ALL_DEFAULT_INSTALLED_MODULES, which those use to pick which files
|
|
# go into the systemimage.
|
|
|
|
.PHONY: notice_files
|
|
|
|
# Create the rule to combine the files into text and html/xml forms
|
|
# $(1) - xml_excluded_vendor_product|xml_vendor|xml_product|html
|
|
# $(2) - Plain text output file
|
|
# $(3) - HTML/XML output file
|
|
# $(4) - File title
|
|
# $(5) - Directory to use. Notice files are all $(4)/src. Other
|
|
# directories in there will be used for scratch
|
|
# $(6) - Dependencies for the output files
|
|
#
|
|
# The algorithm here is that we go collect a hash for each of the notice
|
|
# files and write the names of the files that match that hash. Then
|
|
# to generate the real files, we go print out all of the files and their
|
|
# hashes.
|
|
#
|
|
# These rules are fairly complex, so they depend on this makefile so if
|
|
# it changes, they'll run again.
|
|
#
|
|
# TODO: We could clean this up so that we just record the locations of the
|
|
# original notice files instead of making rules to copy them somwehere.
|
|
# Then we could traverse that without quite as much bash drama.
|
|
define combine-notice-files
|
|
$(2) $(3): PRIVATE_MESSAGE := $(4)
|
|
$(2) $(3): PRIVATE_DIR := $(5)
|
|
$(2) : $(3)
|
|
$(3) : $(6) $(BUILD_SYSTEM)/Makefile build/make/tools/generate-notice-files.py
|
|
build/make/tools/generate-notice-files.py --text-output $(2) \
|
|
$(if $(filter $(1),xml_excluded_extra_partitions),-e vendor -e product -e product_services --xml-output, \
|
|
$(if $(filter $(1),xml_vendor),-i vendor --xml-output, \
|
|
$(if $(filter $(1),xml_product),-i product --xml-output, \
|
|
$(if $(filter $(1),xml_product_services),-i product_services --xml-output, \
|
|
--html-output)))) $(3) \
|
|
-t $$(PRIVATE_MESSAGE) -s $$(PRIVATE_DIR)/src
|
|
notice_files: $(2) $(3)
|
|
endef
|
|
|
|
# Notice file logic isn't relevant for TARGET_BUILD_APPS
|
|
ifndef TARGET_BUILD_APPS
|
|
|
|
# TODO These intermediate NOTICE.txt/NOTICE.html files should go into
|
|
# TARGET_OUT_NOTICE_FILES now that the notice files are gathered from
|
|
# the src subdirectory.
|
|
target_notice_file_txt := $(TARGET_OUT_INTERMEDIATES)/NOTICE.txt
|
|
tools_notice_file_txt := $(HOST_OUT_INTERMEDIATES)/NOTICE.txt
|
|
tools_notice_file_html := $(HOST_OUT_INTERMEDIATES)/NOTICE.html
|
|
kernel_notice_file := $(TARGET_OUT_NOTICE_FILES)/src/kernel.txt
|
|
winpthreads_notice_file := $(TARGET_OUT_NOTICE_FILES)/src/winpthreads.txt
|
|
pdk_fusion_notice_files := $(filter $(TARGET_OUT_NOTICE_FILES)/%, $(ALL_PDK_FUSION_FILES))
|
|
|
|
# TODO(b/69865032): Make PRODUCT_NOTICE_SPLIT the default behavior.
|
|
ifneq ($(PRODUCT_NOTICE_SPLIT),true)
|
|
target_notice_file_html := $(TARGET_OUT_INTERMEDIATES)/NOTICE.html
|
|
target_notice_file_html_gz := $(TARGET_OUT_INTERMEDIATES)/NOTICE.html.gz
|
|
installed_notice_html_or_xml_gz := $(TARGET_OUT)/etc/NOTICE.html.gz
|
|
$(eval $(call combine-notice-files, html, \
|
|
$(target_notice_file_txt), \
|
|
$(target_notice_file_html), \
|
|
"Notices for files contained in the filesystem images in this directory:", \
|
|
$(TARGET_OUT_NOTICE_FILES), \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES) $(kernel_notice_file) $(pdk_fusion_notice_files)))
|
|
$(target_notice_file_html_gz): $(target_notice_file_html) | $(MINIGZIP)
|
|
$(hide) $(MINIGZIP) -9 < $< > $@
|
|
$(installed_notice_html_or_xml_gz): $(target_notice_file_html_gz)
|
|
$(copy-file-to-target)
|
|
else
|
|
target_notice_file_xml := $(TARGET_OUT_INTERMEDIATES)/NOTICE.xml
|
|
target_notice_file_xml_gz := $(TARGET_OUT_INTERMEDIATES)/NOTICE.xml.gz
|
|
installed_notice_html_or_xml_gz := $(TARGET_OUT)/etc/NOTICE.xml.gz
|
|
|
|
target_vendor_notice_file_txt := $(TARGET_OUT_INTERMEDIATES)/NOTICE_VENDOR.txt
|
|
target_vendor_notice_file_xml := $(TARGET_OUT_INTERMEDIATES)/NOTICE_VENDOR.xml
|
|
target_vendor_notice_file_xml_gz := $(TARGET_OUT_INTERMEDIATES)/NOTICE_VENDOR.xml.gz
|
|
installed_vendor_notice_xml_gz := $(TARGET_OUT_VENDOR)/etc/NOTICE.xml.gz
|
|
|
|
target_product_notice_file_txt := $(TARGET_OUT_INTERMEDIATES)/NOTICE_PRODUCT.txt
|
|
target_product_notice_file_xml := $(TARGET_OUT_INTERMEDIATES)/NOTICE_PRODUCT.xml
|
|
target_product_notice_file_xml_gz := $(TARGET_OUT_INTERMEDIATES)/NOTICE_PRODUCT.xml.gz
|
|
installed_product_notice_xml_gz := $(TARGET_OUT_PRODUCT)/etc/NOTICE.xml.gz
|
|
|
|
target_product_services_notice_file_txt := $(TARGET_OUT_INTERMEDIATES)/NOTICE_PRODUCT_SERVICES.txt
|
|
target_product_services_notice_file_xml := $(TARGET_OUT_INTERMEDIATES)/NOTICE_PRODUCT_SERVICES.xml
|
|
target_product_services_notice_file_xml_gz := $(TARGET_OUT_INTERMEDIATES)/NOTICE_PRODUCT_SERVICES.xml.gz
|
|
installed_product_services_notice_xml_gz := $(TARGET_OUT_PRODUCT_SERVICES)/etc/NOTICE.xml.gz
|
|
|
|
# Notice files are copied to TARGET_OUT_NOTICE_FILES as a side-effect of their module
|
|
# being built. A notice xml file must depend on all modules that could potentially
|
|
# install a license file relevant to it.
|
|
license_modules := $(ALL_DEFAULT_INSTALLED_MODULES) $(kernel_notice_file) $(pdk_fusion_notice_files)
|
|
# Phonys/fakes don't have notice files (though their deps might)
|
|
license_modules := $(filter-out $(TARGET_OUT_FAKE)/%,$(license_modules))
|
|
license_modules_vendor := $(filter $(TARGET_OUT_VENDOR)/%,$(license_modules))
|
|
license_modules_product := $(filter $(TARGET_OUT_PRODUCT)/%,$(license_modules))
|
|
license_modules_product_services := $(filter $(TARGET_OUT_PRODUCT_SERVICES)/%,$(license_modules))
|
|
license_modules_agg := $(license_modules_vendor) $(license_modules_product) $(license_modules_product_services)
|
|
license_modules_rest := $(filter-out $(license_modules_agg),$(license_modules))
|
|
|
|
$(eval $(call combine-notice-files, xml_excluded_extra_partitions, \
|
|
$(target_notice_file_txt), \
|
|
$(target_notice_file_xml), \
|
|
"Notices for files contained in the filesystem images in this directory:", \
|
|
$(TARGET_OUT_NOTICE_FILES), \
|
|
$(license_modules_rest)))
|
|
$(eval $(call combine-notice-files, xml_vendor, \
|
|
$(target_vendor_notice_file_txt), \
|
|
$(target_vendor_notice_file_xml), \
|
|
"Notices for files contained in the vendor filesystem image in this directory:", \
|
|
$(TARGET_OUT_NOTICE_FILES), \
|
|
$(license_modules_vendor)))
|
|
$(eval $(call combine-notice-files, xml_product, \
|
|
$(target_product_notice_file_txt), \
|
|
$(target_product_notice_file_xml), \
|
|
"Notices for files contained in the product filesystem image in this directory:", \
|
|
$(TARGET_OUT_NOTICE_FILES), \
|
|
$(license_modules_product)))
|
|
$(eval $(call combine-notice-files, xml_product_services, \
|
|
$(target_product_services_notice_file_txt), \
|
|
$(target_product_services_notice_file_xml), \
|
|
"Notices for files contained in the product_services filesystem image in this directory:", \
|
|
$(TARGET_OUT_NOTICE_FILES), \
|
|
$(license_modules_product_services)))
|
|
|
|
$(target_notice_file_xml_gz): $(target_notice_file_xml) | $(MINIGZIP)
|
|
$(hide) $(MINIGZIP) -9 < $< > $@
|
|
$(target_vendor_notice_file_xml_gz): $(target_vendor_notice_file_xml) | $(MINIGZIP)
|
|
$(hide) $(MINIGZIP) -9 < $< > $@
|
|
$(target_product_notice_file_xml_gz): $(target_product_notice_file_xml) | $(MINIGZIP)
|
|
$(hide) $(MINIGZIP) -9 < $< > $@
|
|
$(target_product_services_notice_file_xml_gz): $(target_product_services_notice_file_xml) | $(MINIGZIP)
|
|
$(hide) $(MINIGZIP) -9 < $< > $@
|
|
$(installed_notice_html_or_xml_gz): $(target_notice_file_xml_gz)
|
|
$(copy-file-to-target)
|
|
$(installed_vendor_notice_xml_gz): $(target_vendor_notice_file_xml_gz)
|
|
$(copy-file-to-target)
|
|
$(installed_product_notice_xml_gz): $(target_product_notice_file_xml_gz)
|
|
$(copy-file-to-target)
|
|
|
|
# No notice file for product_services if its contents are merged into /product.
|
|
# The notices will be part of the /product notice file.
|
|
ifndef MERGE_PRODUCT_SERVICES_INTO_PRODUCT
|
|
$(installed_product_services_notice_xml_gz): $(target_product_services_notice_file_xml_gz)
|
|
$(copy-file-to-target)
|
|
endif
|
|
|
|
# if we've been run my mm, mmm, etc, don't reinstall this every time
|
|
ifeq ($(ONE_SHOT_MAKEFILE),)
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(installed_notice_html_or_xml_gz)
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(installed_vendor_notice_xml_gz)
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(installed_product_notice_xml_gz)
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(installed_product_services_notice_xml_gz)
|
|
endif
|
|
endif # PRODUCT_NOTICE_SPLIT
|
|
|
|
ifeq ($(ONE_SHOT_MAKEFILE),)
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(installed_notice_html_or_xml_gz)
|
|
endif
|
|
|
|
$(eval $(call combine-notice-files, html, \
|
|
$(tools_notice_file_txt), \
|
|
$(tools_notice_file_html), \
|
|
"Notices for files contained in the tools directory:", \
|
|
$(HOST_OUT_NOTICE_FILES), \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES) \
|
|
$(winpthreads_notice_file)))
|
|
|
|
endif # TARGET_BUILD_APPS
|
|
|
|
# The kernel isn't really a module, so to get its module file in there, we
|
|
# make the target NOTICE files depend on this particular file too, which will
|
|
# then be in the right directory for the find in combine-notice-files to work.
|
|
$(kernel_notice_file): \
|
|
$(BUILD_SYSTEM)/LINUX_KERNEL_COPYING \
|
|
| $(ACP)
|
|
@echo Copying: $@
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) $(ACP) $< $@
|
|
|
|
$(winpthreads_notice_file): \
|
|
$(BUILD_SYSTEM)/WINPTHREADS_COPYING \
|
|
| $(ACP)
|
|
@echo Copying: $@
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) $(ACP) $< $@
|
|
|
|
# -----------------------------------------------------------------
|
|
# Build a keystore with the authorized keys in it, used to verify the
|
|
# authenticity of downloaded OTA packages.
|
|
#
|
|
# This rule adds to ALL_DEFAULT_INSTALLED_MODULES, so it needs to come
|
|
# before the rules that use that variable to build the image.
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(TARGET_OUT_ETC)/security/otacerts.zip
|
|
$(TARGET_OUT_ETC)/security/otacerts.zip: PRIVATE_CERT := $(DEFAULT_KEY_CERT_PAIR).x509.pem
|
|
$(TARGET_OUT_ETC)/security/otacerts.zip: $(SOONG_ZIP)
|
|
$(TARGET_OUT_ETC)/security/otacerts.zip: $(DEFAULT_KEY_CERT_PAIR).x509.pem
|
|
$(hide) rm -f $@
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) $(SOONG_ZIP) -o $@ -C $(dir $(PRIVATE_CERT)) -f $(PRIVATE_CERT)
|
|
|
|
# Carry the public key for update_engine if it's a non-IoT target that
|
|
# uses the AB updater. We use the same key as otacerts but in RSA public key
|
|
# format.
|
|
ifeq ($(AB_OTA_UPDATER),true)
|
|
ifneq ($(PRODUCT_IOT),true)
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem
|
|
$(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem: $(DEFAULT_KEY_CERT_PAIR).x509.pem
|
|
$(hide) rm -f $@
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) openssl x509 -pubkey -noout -in $< > $@
|
|
|
|
ALL_DEFAULT_INSTALLED_MODULES += \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/system/etc/update_engine/update-payload-key.pub.pem
|
|
$(TARGET_RECOVERY_ROOT_OUT)/system/etc/update_engine/update-payload-key.pub.pem: \
|
|
$(TARGET_OUT_ETC)/update_engine/update-payload-key.pub.pem
|
|
$(hide) cp -f $< $@
|
|
endif
|
|
endif
|
|
|
|
.PHONY: otacerts
|
|
otacerts: $(TARGET_OUT_ETC)/security/otacerts.zip
|
|
|
|
|
|
# #################################################################
|
|
# Targets for user images
|
|
# #################################################################
|
|
|
|
INTERNAL_USERIMAGES_EXT_VARIANT :=
|
|
ifeq ($(TARGET_USERIMAGES_USE_EXT2),true)
|
|
INTERNAL_USERIMAGES_EXT_VARIANT := ext2
|
|
else
|
|
ifeq ($(TARGET_USERIMAGES_USE_EXT3),true)
|
|
INTERNAL_USERIMAGES_EXT_VARIANT := ext3
|
|
else
|
|
ifeq ($(TARGET_USERIMAGES_USE_EXT4),true)
|
|
INTERNAL_USERIMAGES_EXT_VARIANT := ext4
|
|
endif
|
|
endif
|
|
endif
|
|
|
|
# These options tell the recovery updater/installer how to mount the partitions writebale.
|
|
# <fstype>=<fstype_opts>[|<fstype_opts>]...
|
|
# fstype_opts := <opt>[,<opt>]...
|
|
# opt := <name>[=<value>]
|
|
# The following worked on Nexus devices with Kernel 3.1, 3.4, 3.10
|
|
DEFAULT_TARGET_RECOVERY_FSTYPE_MOUNT_OPTIONS := ext4=max_batch_time=0,commit=1,data=ordered,barrier=1,errors=panic,nodelalloc
|
|
|
|
ifneq (true,$(TARGET_USERIMAGES_SPARSE_EXT_DISABLED))
|
|
INTERNAL_USERIMAGES_SPARSE_EXT_FLAG := -s
|
|
endif
|
|
|
|
INTERNAL_USERIMAGES_DEPS := $(SIMG2IMG)
|
|
INTERNAL_USERIMAGES_DEPS += $(MKEXTUSERIMG) $(MAKE_EXT4FS) $(E2FSCK) $(TUNE2FS)
|
|
ifeq ($(TARGET_USERIMAGES_USE_F2FS),true)
|
|
INTERNAL_USERIMAGES_DEPS += $(MKF2FSUSERIMG) $(MAKE_F2FS)
|
|
endif
|
|
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
INTERNAL_USERIMAGES_DEPS += $(AVBTOOL)
|
|
endif
|
|
|
|
ifneq (true,$(TARGET_USERIMAGES_SPARSE_SQUASHFS_DISABLED))
|
|
INTERNAL_USERIMAGES_SPARSE_SQUASHFS_FLAG := -s
|
|
endif
|
|
ifneq ($(filter $(BOARD_PRODUCTIMAGE_FILE_SYSTEM_TYPE) $(BOARD_PRODUCT_SERVICESIMAGE_FILE_SYSTEM_TYPE) $(BOARD_ODMIMAGE_FILE_SYSTEM_TYPE) $(BOARD_VENDORIMAGE_FILE_SYSTEM_TYPE) $(BOARD_SYSTEMIMAGE_FILE_SYSTEM_TYPE),squashfs),)
|
|
INTERNAL_USERIMAGES_DEPS += $(MAKE_SQUASHFS) $(MKSQUASHFSUSERIMG) $(IMG2SIMG)
|
|
endif
|
|
|
|
INTERNAL_USERIMAGES_BINARY_PATHS := $(sort $(dir $(INTERNAL_USERIMAGES_DEPS)))
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY))
|
|
INTERNAL_USERIMAGES_DEPS += $(BUILD_VERITY_METADATA) $(BUILD_VERITY_TREE) $(APPEND2SIMG) $(VERITY_SIGNER)
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY_FEC))
|
|
INTERNAL_USERIMAGES_DEPS += $(FEC)
|
|
endif
|
|
endif
|
|
|
|
SELINUX_FC := $(call intermediates-dir-for,ETC,file_contexts.bin)/file_contexts.bin
|
|
INTERNAL_USERIMAGES_DEPS += $(SELINUX_FC)
|
|
|
|
INTERNAL_USERIMAGES_DEPS += $(BLK_ALLOC_TO_BASE_FS)
|
|
|
|
INTERNAL_USERIMAGES_DEPS += $(MKE2FS_CONF)
|
|
|
|
ifeq (true,$(PRODUCT_USE_DYNAMIC_PARTITIONS))
|
|
|
|
ifeq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),true)
|
|
$(error vboot 1.0 doesn't support logical partition)
|
|
endif
|
|
|
|
# TODO(b/80195851): Should not define BOARD_AVB_SYSTEM_KEY_PATH without
|
|
# BOARD_AVB_SYSTEM_DETACHED_VBMETA.
|
|
|
|
endif # PRODUCT_USE_DYNAMIC_PARTITIONS
|
|
|
|
# $(1): the path of the output dictionary file
|
|
# $(2): a subset of "system vendor cache userdata product product_services oem odm"
|
|
# $(3): additional "key=value" pairs to append to the dictionary file.
|
|
define generate-image-prop-dictionary
|
|
$(if $(filter $(2),system),\
|
|
$(if $(BOARD_SYSTEMIMAGE_PARTITION_SIZE),$(hide) echo "system_size=$(BOARD_SYSTEMIMAGE_PARTITION_SIZE)" >> $(1))
|
|
$(if $(INTERNAL_SYSTEM_OTHER_PARTITION_SIZE),$(hide) echo "system_other_size=$(INTERNAL_SYSTEM_OTHER_PARTITION_SIZE)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "system_fs_type=$(BOARD_SYSTEMIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_EXTFS_INODE_COUNT),$(hide) echo "system_extfs_inode_count=$(BOARD_SYSTEMIMAGE_EXTFS_INODE_COUNT)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_EXTFS_RSV_PCT),$(hide) echo "system_extfs_rsv_pct=$(BOARD_SYSTEMIMAGE_EXTFS_RSV_PCT)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_JOURNAL_SIZE),$(hide) echo "system_journal_size=$(BOARD_SYSTEMIMAGE_JOURNAL_SIZE)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_COMPRESSOR),$(hide) echo "system_squashfs_compressor=$(BOARD_SYSTEMIMAGE_SQUASHFS_COMPRESSOR)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "system_squashfs_compressor_opt=$(BOARD_SYSTEMIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "system_squashfs_block_size=$(BOARD_SYSTEMIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "system_squashfs_disable_4k_align=$(BOARD_SYSTEMIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH),$(hide) echo "system_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_HEADROOM),$(hide) echo "system_headroom=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_HEADROOM)" >> $(1))
|
|
$(if $(BOARD_SYSTEMIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "system_reserved_size=$(BOARD_SYSTEMIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),userdata),\
|
|
$(if $(BOARD_USERDATAIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "userdata_fs_type=$(BOARD_USERDATAIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_USERDATAIMAGE_PARTITION_SIZE),$(hide) echo "userdata_size=$(BOARD_USERDATAIMAGE_PARTITION_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),cache),\
|
|
$(if $(BOARD_CACHEIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "cache_fs_type=$(BOARD_CACHEIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_CACHEIMAGE_PARTITION_SIZE),$(hide) echo "cache_size=$(BOARD_CACHEIMAGE_PARTITION_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),vendor),\
|
|
$(if $(BOARD_VENDORIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "vendor_fs_type=$(BOARD_VENDORIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_EXTFS_INODE_COUNT),$(hide) echo "vendor_extfs_inode_count=$(BOARD_VENDORIMAGE_EXTFS_INODE_COUNT)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_EXTFS_RSV_PCT),$(hide) echo "vendor_extfs_rsv_pct=$(BOARD_VENDORIMAGE_EXTFS_RSV_PCT)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_PARTITION_SIZE),$(hide) echo "vendor_size=$(BOARD_VENDORIMAGE_PARTITION_SIZE)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_JOURNAL_SIZE),$(hide) echo "vendor_journal_size=$(BOARD_VENDORIMAGE_JOURNAL_SIZE)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_COMPRESSOR),$(hide) echo "vendor_squashfs_compressor=$(BOARD_VENDORIMAGE_SQUASHFS_COMPRESSOR)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "vendor_squashfs_compressor_opt=$(BOARD_VENDORIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "vendor_squashfs_block_size=$(BOARD_VENDORIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "vendor_squashfs_disable_4k_align=$(BOARD_VENDORIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH),$(hide) echo "vendor_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH)" >> $(1))
|
|
$(if $(BOARD_VENDORIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "vendor_reserved_size=$(BOARD_VENDORIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),product),\
|
|
$(if $(BOARD_PRODUCTIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "product_fs_type=$(BOARD_PRODUCTIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_EXTFS_INODE_COUNT),$(hide) echo "product_extfs_inode_count=$(BOARD_PRODUCTIMAGE_EXTFS_INODE_COUNT)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_EXTFS_RSV_PCT),$(hide) echo "product_extfs_rsv_pct=$(BOARD_PRODUCTIMAGE_EXTFS_RSV_PCT)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_PARTITION_SIZE),$(hide) echo "product_size=$(BOARD_PRODUCTIMAGE_PARTITION_SIZE)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_JOURNAL_SIZE),$(hide) echo "product_journal_size=$(BOARD_PRODUCTIMAGE_JOURNAL_SIZE)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_COMPRESSOR),$(hide) echo "product_squashfs_compressor=$(BOARD_PRODUCTIMAGE_SQUASHFS_COMPRESSOR)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "product_squashfs_compressor_opt=$(BOARD_PRODUCTIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "product_squashfs_block_size=$(BOARD_PRODUCTIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "product_squashfs_disable_4k_align=$(BOARD_PRODUCTIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH),$(hide) echo "product_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH)" >> $(1))
|
|
$(if $(BOARD_PRODUCTIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "product_reserved_size=$(BOARD_PRODUCTIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),product_services),\
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "product_services_fs_type=$(BOARD_PRODUCT_SERVICESIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_EXTFS_INODE_COUNT),$(hide) echo "product_services_extfs_inode_count=$(BOARD_PRODUCT_SERVICESIMAGE_EXTFS_INODE_COUNT)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_EXTFS_RSV_PCT),$(hide) echo "product_services_extfs_rsv_pct=$(BOARD_PRODUCT_SERVICESIMAGE_EXTFS_RSV_PCT)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_PARTITION_SIZE),$(hide) echo "product_services_size=$(BOARD_PRODUCT_SERVICESIMAGE_PARTITION_SIZE)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_JOURNAL_SIZE),$(hide) echo "product_services_journal_size=$(BOARD_PRODUCT_SERVICESIMAGE_JOURNAL_SIZE)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_COMPRESSOR),$(hide) echo "product_services_squashfs_compressor=$(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_COMPRESSOR)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "product_services_squashfs_compressor_opt=$(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "product_services_squashfs_block_size=$(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "product_services_squashfs_disable_4k_align=$(BOARD_PRODUCT_SERVICESIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
$(if $(BOARD_PRODUCT_SERVICESIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "product_services_reserved_size=$(BOARD_PRODUCT_SERVICESIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),odm),\
|
|
$(if $(BOARD_ODMIMAGE_FILE_SYSTEM_TYPE),$(hide) echo "odm_fs_type=$(BOARD_ODMIMAGE_FILE_SYSTEM_TYPE)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_EXTFS_INODE_COUNT),$(hide) echo "odm_extfs_inode_count=$(BOARD_ODMIMAGE_EXTFS_INODE_COUNT)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_EXTFS_RSV_PCT),$(hide) echo "odm_extfs_rsv_pct=$(BOARD_ODMIMAGE_EXTFS_RSV_PCT)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_PARTITION_SIZE),$(hide) echo "odm_size=$(BOARD_ODMIMAGE_PARTITION_SIZE)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_JOURNAL_SIZE),$(hide) echo "odm_journal_size=$(BOARD_ODMIMAGE_JOURNAL_SIZE)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_COMPRESSOR),$(hide) echo "odm_squashfs_compressor=$(BOARD_ODMIMAGE_SQUASHFS_COMPRESSOR)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_COMPRESSOR_OPT),$(hide) echo "odm_squashfs_compressor_opt=$(BOARD_ODMIMAGE_SQUASHFS_COMPRESSOR_OPT)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_BLOCK_SIZE),$(hide) echo "odm_squashfs_block_size=$(BOARD_ODMIMAGE_SQUASHFS_BLOCK_SIZE)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_SQUASHFS_DISABLE_4K_ALIGN),$(hide) echo "odm_squashfs_disable_4k_align=$(BOARD_ODMIMAGE_SQUASHFS_DISABLE_4K_ALIGN)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH),$(hide) echo "odm_base_fs_file=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH)" >> $(1))
|
|
$(if $(BOARD_ODMIMAGE_PARTITION_RESERVED_SIZE),$(hide) echo "odm_reserved_size=$(BOARD_ODMIMAGE_PARTITION_RESERVED_SIZE)" >> $(1))
|
|
)
|
|
$(if $(filter $(2),oem),\
|
|
$(if $(BOARD_OEMIMAGE_PARTITION_SIZE),$(hide) echo "oem_size=$(BOARD_OEMIMAGE_PARTITION_SIZE)" >> $(1))
|
|
$(if $(BOARD_OEMIMAGE_JOURNAL_SIZE),$(hide) echo "oem_journal_size=$(BOARD_OEMIMAGE_JOURNAL_SIZE)" >> $(1))
|
|
$(if $(BOARD_OEMIMAGE_EXTFS_INODE_COUNT),$(hide) echo "oem_extfs_inode_count=$(BOARD_OEMIMAGE_EXTFS_INODE_COUNT)" >> $(1))
|
|
$(if $(BOARD_OEMIMAGE_EXTFS_RSV_PCT),$(hide) echo "oem_extfs_rsv_pct=$(BOARD_OEMIMAGE_EXTFS_RSV_PCT)" >> $(1))
|
|
)
|
|
$(hide) echo "ext_mkuserimg=$(notdir $(MKEXTUSERIMG))" >> $(1)
|
|
|
|
$(if $(INTERNAL_USERIMAGES_EXT_VARIANT),$(hide) echo "fs_type=$(INTERNAL_USERIMAGES_EXT_VARIANT)" >> $(1))
|
|
$(if $(INTERNAL_USERIMAGES_SPARSE_EXT_FLAG),$(hide) echo "extfs_sparse_flag=$(INTERNAL_USERIMAGES_SPARSE_EXT_FLAG)" >> $(1))
|
|
$(if $(INTERNAL_USERIMAGES_SPARSE_SQUASHFS_FLAG),$(hide) echo "squashfs_sparse_flag=$(INTERNAL_USERIMAGES_SPARSE_SQUASHFS_FLAG)" >> $(1))
|
|
$(if $(BOARD_EXT4_SHARE_DUP_BLOCKS),$(hide) echo "ext4_share_dup_blocks=$(BOARD_EXT4_SHARE_DUP_BLOCKS)" >> $(1))
|
|
$(if $(BOARD_FLASH_LOGICAL_BLOCK_SIZE), $(hide) echo "flash_logical_block_size=$(BOARD_FLASH_LOGICAL_BLOCK_SIZE)" >> $(1))
|
|
$(if $(BOARD_FLASH_ERASE_BLOCK_SIZE), $(hide) echo "flash_erase_block_size=$(BOARD_FLASH_ERASE_BLOCK_SIZE)" >> $(1))
|
|
$(hide) echo "selinux_fc=$(SELINUX_FC)" >> $(1)
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER),$(hide) echo "boot_signer=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity_key=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY),$(hide) echo "verity_signer_cmd=$(notdir $(VERITY_SIGNER))" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY_FEC),$(hide) echo "verity_fec=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VERITY_FEC)" >> $(1))
|
|
$(if $(filter eng, $(TARGET_BUILD_VARIANT)),$(hide) echo "verity_disable=true" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_VERITY_PARTITION),$(hide) echo "system_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_VERITY_PARTITION)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_VERITY_PARTITION),$(hide) echo "vendor_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_VERITY_PARTITION)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_VERITY_PARTITION),$(hide) echo "product_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_VERITY_PARTITION)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_VERITY_PARTITION),$(hide) echo "product_services_verity_block_device=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_VERITY_PARTITION)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_key=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_subkey=$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY)" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "futility=$(notdir $(FUTILITY))" >> $(1))
|
|
$(if $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT),$(hide) echo "vboot_signer_cmd=$(VBOOT_SIGNER)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_avbtool=$(notdir $(AVBTOOL))" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_system_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_system_add_hashtree_footer_args=$(BOARD_AVB_SYSTEM_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(if $(BOARD_AVB_SYSTEM_KEY_PATH),\
|
|
$(hide) echo "avb_system_key_path=$(BOARD_AVB_SYSTEM_KEY_PATH)" >> $(1)
|
|
$(hide) echo "avb_system_algorithm=$(BOARD_AVB_SYSTEM_ALGORITHM)" >> $(1)
|
|
$(hide) echo "avb_system_rollback_index_location=$(BOARD_AVB_SYSTEM_ROLLBACK_INDEX_LOCATION)" >> $(1)))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_system_other_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_system_other_add_hashtree_footer_args=$(BOARD_AVB_SYSTEM_OTHER_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(if $(BOARD_AVB_SYSTEM_OTHER_KEY_PATH),\
|
|
$(hide) echo "avb_system_other_key_path=$(BOARD_AVB_SYSTEM_OTHER_KEY_PATH)" >> $(1)
|
|
$(hide) echo "avb_system_other_algorithm=$(BOARD_AVB_SYSTEM_OTHER_ALGORITHM)" >> $(1)))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_vendor_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_vendor_add_hashtree_footer_args=$(BOARD_AVB_VENDOR_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(if $(BOARD_AVB_VENDOR_KEY_PATH),\
|
|
$(hide) echo "avb_vendor_key_path=$(BOARD_AVB_VENDOR_KEY_PATH)" >> $(1)
|
|
$(hide) echo "avb_vendor_algorithm=$(BOARD_AVB_VENDOR_ALGORITHM)" >> $(1)
|
|
$(hide) echo "avb_vendor_rollback_index_location=$(BOARD_AVB_VENDOR_ROLLBACK_INDEX_LOCATION)" >> $(1)))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_product_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_product_add_hashtree_footer_args=$(BOARD_AVB_PRODUCT_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(if $(BOARD_AVB_PRODUCT_KEY_PATH),\
|
|
$(hide) echo "avb_product_key_path=$(BOARD_AVB_PRODUCT_KEY_PATH)" >> $(1)
|
|
$(hide) echo "avb_product_algorithm=$(BOARD_AVB_PRODUCT_ALGORITHM)" >> $(1)
|
|
$(hide) echo "avb_product_rollback_index_location=$(BOARD_AVB_PRODUCT_ROLLBACK_INDEX_LOCATION)" >> $(1)))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_product_services_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(hide) echo "avb_product_services_add_hashtree_footer_args=$(BOARD_AVB_PRODUCT_SERVICES_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(if $(BOARD_AVB_PRODUCT_SERVICES_KEY_PATH),\
|
|
$(hide) echo "avb_product_services_key_path=$(BOARD_AVB_PRODUCT_SERVICES_KEY_PATH)" >> $(1)
|
|
$(hide) echo "avb_product_services_algorithm=$(BOARD_AVB_PRODUCT_SERVICES_ALGORITHM)" >> $(1)
|
|
$(hide) echo "avb_product_services_rollback_index_location=$(BOARD_AVB_PRODUCT_SERVICES_ROLLBACK_INDEX_LOCATION)" >> $(1)))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_odm_hashtree_enable=$(BOARD_AVB_ENABLE)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),$(hide) echo "avb_odm_add_hashtree_footer_args=$(BOARD_AVB_ODM_ADD_HASHTREE_FOOTER_ARGS)" >> $(1))
|
|
$(if $(BOARD_AVB_ENABLE),\
|
|
$(if $(BOARD_AVB_ODM_KEY_PATH),\
|
|
$(hide) echo "avb_odm_key_path=$(BOARD_AVB_ODM_KEY_PATH)" >> $(1)
|
|
$(hide) echo "avb_odm_algorithm=$(BOARD_AVB_ODM_ALGORITHM)" >> $(1)
|
|
$(hide) echo "avb_odm_rollback_index_location=$(BOARD_AVB_ODM_ROLLBACK_INDEX_LOCATION)" >> $(1)))
|
|
$(if $(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)),\
|
|
$(hide) echo "recovery_as_boot=true" >> $(1))
|
|
$(if $(filter true,$(BOARD_BUILD_SYSTEM_ROOT_IMAGE)),\
|
|
$(hide) echo "system_root_image=true" >> $(1))
|
|
$(hide) echo "root_dir=$(TARGET_ROOT_OUT)" >> $(1)
|
|
$(if $(PRODUCT_USE_DYNAMIC_PARTITION_SIZE),$(hide) echo "use_dynamic_partition_size=true" >> $(1))
|
|
$(if $(3),$(hide) $(foreach kv,$(3),echo "$(kv)" >> $(1);))
|
|
endef
|
|
|
|
# $(1): the path of the output dictionary file
|
|
# $(2): additional "key=value" pairs to append to the dictionary file.
|
|
define generate-userimage-prop-dictionary
|
|
$(call generate-image-prop-dictionary,$(1),system vendor cache userdata product product_services oem odm,$(2))
|
|
endef
|
|
|
|
# $(1): the path of the input dictionary file, where each line has the format key=value
|
|
# $(2): the key to look up
|
|
define read-image-prop-dictionary
|
|
$$(grep '$(2)=' $(1) | cut -f2- -d'=')
|
|
endef
|
|
|
|
# $(1): modules list
|
|
# $(2): output dir
|
|
# $(3): mount point
|
|
# $(4): staging dir
|
|
# Depmod requires a well-formed kernel version so 0.0 is used as a placeholder.
|
|
define build-image-kernel-modules
|
|
$(hide) rm -rf $(2)/lib/modules
|
|
$(hide) mkdir -p $(2)/lib/modules
|
|
$(hide) cp $(1) $(2)/lib/modules/
|
|
$(hide) rm -rf $(4)
|
|
$(hide) mkdir -p $(4)/lib/modules/0.0/$(3)lib/modules
|
|
$(hide) cp $(1) $(4)/lib/modules/0.0/$(3)lib/modules
|
|
$(hide) $(DEPMOD) -b $(4) 0.0
|
|
$(hide) sed -e 's/\(.*modules.*\):/\/\1:/g' -e 's/ \([^ ]*modules[^ ]*\)/ \/\1/g' $(4)/lib/modules/0.0/modules.dep > $(2)/lib/modules/modules.dep
|
|
$(hide) cp $(4)/lib/modules/0.0/modules.alias $(2)/lib/modules
|
|
endef
|
|
|
|
# -----------------------------------------------------------------
|
|
# Recovery image
|
|
|
|
# Recovery image exists if we are building recovery, or building recovery as boot.
|
|
ifneq (,$(INSTALLED_RECOVERYIMAGE_TARGET)$(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)))
|
|
|
|
INTERNAL_RECOVERYIMAGE_FILES := $(filter $(TARGET_RECOVERY_OUT)/%, \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES))
|
|
|
|
INSTALLED_FILES_FILE_RECOVERY := $(PRODUCT_OUT)/installed-files-recovery.txt
|
|
INSTALLED_FILES_JSON_RECOVERY := $(INSTALLED_FILES_FILE_RECOVERY:.txt=.json)
|
|
|
|
# TODO(b/30414428): Can't depend on INTERNAL_RECOVERYIMAGE_FILES alone like other
|
|
# INSTALLED_FILES_FILE_* rules. Because currently there're cp/rsync/rm commands in
|
|
# build-recoveryimage-target, which would touch the files under TARGET_RECOVERY_OUT and race with
|
|
# the call to FILELIST.
|
|
ifeq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
$(INSTALLED_FILES_FILE_RECOVERY): $(INSTALLED_BOOTIMAGE_TARGET)
|
|
else
|
|
$(INSTALLED_FILES_FILE_RECOVERY): $(INSTALLED_RECOVERYIMAGE_TARGET)
|
|
endif
|
|
|
|
$(INSTALLED_FILES_FILE_RECOVERY): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_RECOVERY)
|
|
$(INSTALLED_FILES_FILE_RECOVERY): $(INTERNAL_RECOVERYIMAGE_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_RECOVERY_ROOT_OUT) > $(@:.txt=.json)
|
|
$(hide) build/make/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
recovery_initrc := $(call include-path-for, recovery)/etc/init.rc
|
|
recovery_sepolicy := \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/sepolicy \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/plat_file_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/vendor_file_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/plat_property_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/vendor_property_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/odm_file_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/odm_property_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/product_file_contexts \
|
|
$(TARGET_RECOVERY_ROOT_OUT)/product_property_contexts
|
|
|
|
# Passed into rsync from non-recovery root to recovery root, to avoid overwriting recovery-specific
|
|
# SELinux files
|
|
IGNORE_RECOVERY_SEPOLICY := $(patsubst $(TARGET_RECOVERY_OUT)/%,--exclude=/%,$(recovery_sepolicy))
|
|
|
|
recovery_kernel := $(INSTALLED_KERNEL_TARGET) # same as a non-recovery system
|
|
recovery_ramdisk := $(PRODUCT_OUT)/ramdisk-recovery.img
|
|
recovery_resources_common := $(call include-path-for, recovery)/res
|
|
|
|
# Set recovery_density to a density bucket based on PRODUCT_AAPT_PREF_CONFIG if set. Otherwise use
|
|
# the default medium density.
|
|
ifneq (,$(PRODUCT_AAPT_PREF_CONFIG))
|
|
# If PRODUCT_AAPT_PREF_CONFIG includes a non-numeric dpi bucket, always perfer that value.
|
|
recovery_density := $(filter %dpi,$(PRODUCT_AAPT_PREF_CONFIG))
|
|
ifeq (,$(filter xxxhdpi xxhdpi xhdpi hdpi mdpi,$(recovery_density)))
|
|
recovery_density_value := $(patsubst %dpi,%,$(recovery_density))
|
|
# Map the numeric dpi value to a bucket. We roughly use the medium point between the primary
|
|
# densities to split buckets.
|
|
# ------160------240------320----------480------------640------
|
|
# mdpi hdpi xhdpi xxhdpi xxxhdpi
|
|
recovery_density := $(strip \
|
|
$(or $(if $(filter $(shell echo $$(($(recovery_density_value) >= 560))),1),xxxhdpi),\
|
|
$(if $(filter $(shell echo $$(($(recovery_density_value) >= 400))),1),xxhdpi),\
|
|
$(if $(filter $(shell echo $$(($(recovery_density_value) >= 280))),1),xhdpi),\
|
|
$(if $(filter $(shell echo $$(($(recovery_density_value) >= 200))),1),hdpi,mdpi)))
|
|
endif
|
|
else # PRODUCT_AAPT_PREF_CONFIG is empty
|
|
recovery_density := mdpi
|
|
endif # PRODUCT_AAPT_PREF_CONFIG
|
|
|
|
ifneq (,$(wildcard $(recovery_resources_common)-$(recovery_density)))
|
|
recovery_resources_common := $(recovery_resources_common)-$(recovery_density)
|
|
else
|
|
recovery_resources_common := $(recovery_resources_common)-xhdpi
|
|
endif
|
|
|
|
# Select the 18x32 font on high-density devices (xhdpi and up); and the 12x22 font on other devices.
|
|
# Note that the font selected here can be overridden for a particular device by putting a font.png
|
|
# in its private recovery resources.
|
|
ifneq (,$(filter xxxhdpi xxhdpi xhdpi,$(recovery_density)))
|
|
recovery_font := $(call include-path-for, recovery)/fonts/18x32.png
|
|
else
|
|
recovery_font := $(call include-path-for, recovery)/fonts/12x22.png
|
|
endif
|
|
|
|
|
|
# We will only generate the recovery background text images if the variable
|
|
# TARGET_RECOVERY_UI_SCREEN_WIDTH is defined. For devices with xxxhdpi and xxhdpi, we set the
|
|
# variable to the commonly used values here, if it hasn't been intialized elsewhere. While for
|
|
# devices with lower density, they must have TARGET_RECOVERY_UI_SCREEN_WIDTH defined in their
|
|
# BoardConfig in order to use this feature.
|
|
ifeq ($(recovery_density),xxxhdpi)
|
|
TARGET_RECOVERY_UI_SCREEN_WIDTH ?= 1440
|
|
else ifeq ($(recovery_density),xxhdpi)
|
|
TARGET_RECOVERY_UI_SCREEN_WIDTH ?= 1080
|
|
endif
|
|
|
|
ifneq ($(TARGET_RECOVERY_UI_SCREEN_WIDTH),)
|
|
# Subtracts the margin width and menu indent from the screen width; it's safe to be conservative.
|
|
ifeq ($(TARGET_RECOVERY_UI_MARGIN_WIDTH),)
|
|
recovery_image_width := $$(($(TARGET_RECOVERY_UI_SCREEN_WIDTH) - 10))
|
|
else
|
|
recovery_image_width := $$(($(TARGET_RECOVERY_UI_SCREEN_WIDTH) - $(TARGET_RECOVERY_UI_MARGIN_WIDTH) - 10))
|
|
endif
|
|
|
|
|
|
RECOVERY_INSTALLING_TEXT_FILE := $(call intermediates-dir-for,PACKAGING,recovery_text_res)/installing_text.png
|
|
RECOVERY_INSTALLING_SECURITY_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/installing_security_text.png
|
|
RECOVERY_ERASING_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/erasing_text.png
|
|
RECOVERY_ERROR_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/error_text.png
|
|
RECOVERY_NO_COMMAND_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/no_command_text.png
|
|
|
|
RECOVERY_CANCEL_WIPE_DATA_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/cancel_wipe_data_text.png
|
|
RECOVERY_FACTORY_DATA_RESET_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/factory_data_reset_text.png
|
|
RECOVERY_TRY_AGAIN_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/try_again_text.png
|
|
RECOVERY_WIPE_DATA_CONFIRMATION_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/wipe_data_confirmation_text.png
|
|
RECOVERY_WIPE_DATA_MENU_HEADER_TEXT_FILE := $(dir $(RECOVERY_INSTALLING_TEXT_FILE))/wipe_data_menu_header_text.png
|
|
|
|
generated_recovery_text_files := \
|
|
$(RECOVERY_INSTALLING_TEXT_FILE) \
|
|
$(RECOVERY_INSTALLING_SECURITY_TEXT_FILE) \
|
|
$(RECOVERY_ERASING_TEXT_FILE) \
|
|
$(RECOVERY_ERROR_TEXT_FILE) \
|
|
$(RECOVERY_NO_COMMAND_TEXT_FILE) \
|
|
$(RECOVERY_CANCEL_WIPE_DATA_TEXT_FILE) \
|
|
$(RECOVERY_FACTORY_DATA_RESET_TEXT_FILE) \
|
|
$(RECOVERY_TRY_AGAIN_TEXT_FILE) \
|
|
$(RECOVERY_WIPE_DATA_CONFIRMATION_TEXT_FILE) \
|
|
$(RECOVERY_WIPE_DATA_MENU_HEADER_TEXT_FILE)
|
|
|
|
resource_dir := $(call include-path-for, recovery)/tools/recovery_l10n/res/
|
|
image_generator_jar := $(HOST_OUT_JAVA_LIBRARIES)/RecoveryImageGenerator.jar
|
|
zopflipng := $(HOST_OUT_EXECUTABLES)/zopflipng
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_SOURCE_FONTS := $(recovery_noto-fonts_dep) $(recovery_roboto-fonts_dep)
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_RECOVERY_FONT_FILES_DIR := $(call intermediates-dir-for,PACKAGING,recovery_font_files)
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_RESOURCE_DIR := $(resource_dir)
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_IMAGE_GENERATOR_JAR := $(image_generator_jar)
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_ZOPFLIPNG := $(zopflipng)
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_RECOVERY_IMAGE_WIDTH := $(recovery_image_width)
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_RECOVERY_BACKGROUND_TEXT_LIST := \
|
|
recovery_installing \
|
|
recovery_installing_security \
|
|
recovery_erasing \
|
|
recovery_error \
|
|
recovery_no_command
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): PRIVATE_RECOVERY_WIPE_DATA_TEXT_LIST := \
|
|
recovery_cancel_wipe_data \
|
|
recovery_factory_data_reset \
|
|
recovery_try_again \
|
|
recovery_wipe_data_menu_header \
|
|
recovery_wipe_data_confirmation
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): .KATI_IMPLICIT_OUTPUTS := $(filter-out $(RECOVERY_INSTALLING_TEXT_FILE),$(generated_recovery_text_files))
|
|
$(RECOVERY_INSTALLING_TEXT_FILE): $(image_generator_jar) $(resource_dir) $(recovery_noto-fonts_dep) $(recovery_roboto-fonts_dep) $(zopflipng)
|
|
# Prepares the font directory.
|
|
@rm -rf $(PRIVATE_RECOVERY_FONT_FILES_DIR)
|
|
@mkdir -p $(PRIVATE_RECOVERY_FONT_FILES_DIR)
|
|
$(foreach filename,$(PRIVATE_SOURCE_FONTS), cp $(filename) $(PRIVATE_RECOVERY_FONT_FILES_DIR) &&) true
|
|
@rm -rf $(dir $@)
|
|
@mkdir -p $(dir $@)
|
|
$(foreach text_name,$(PRIVATE_RECOVERY_BACKGROUND_TEXT_LIST) $(PRIVATE_RECOVERY_WIPE_DATA_TEXT_LIST), \
|
|
$(eval output_file := $(dir $@)/$(patsubst recovery_%,%_text.png,$(text_name))) \
|
|
$(eval center_alignment := $(if $(filter $(text_name),$(PRIVATE_RECOVERY_BACKGROUND_TEXT_LIST)), --center_alignment)) \
|
|
java -jar $(PRIVATE_IMAGE_GENERATOR_JAR) \
|
|
--image_width $(PRIVATE_RECOVERY_IMAGE_WIDTH) \
|
|
--text_name $(text_name) \
|
|
--font_dir $(PRIVATE_RECOVERY_FONT_FILES_DIR) \
|
|
--resource_dir $(PRIVATE_RESOURCE_DIR) \
|
|
--output_file $(output_file) $(center_alignment) && \
|
|
$(PRIVATE_ZOPFLIPNG) -y --iterations=1 --filters=0 $(output_file) $(output_file) > /dev/null &&) true
|
|
else
|
|
RECOVERY_INSTALLING_TEXT_FILE :=
|
|
RECOVERY_INSTALLING_SECURITY_TEXT_FILE :=
|
|
RECOVERY_ERASING_TEXT_FILE :=
|
|
RECOVERY_ERROR_TEXT_FILE :=
|
|
RECOVERY_NO_COMMAND_TEXT_FILE :=
|
|
RECOVERY_CANCEL_WIPE_DATA_TEXT_FILE :=
|
|
RECOVERY_FACTORY_DATA_RESET_TEXT_FILE :=
|
|
RECOVERY_TRY_AGAIN_TEXT_FILE :=
|
|
RECOVERY_WIPE_DATA_CONFIRMATION_TEXT_FILE :=
|
|
RECOVERY_WIPE_DATA_MENU_HEADER_TEXT_FILE :=
|
|
endif # TARGET_RECOVERY_UI_SCREEN_WIDTH
|
|
|
|
ifndef TARGET_PRIVATE_RES_DIRS
|
|
TARGET_PRIVATE_RES_DIRS := $(wildcard $(TARGET_DEVICE_DIR)/recovery/res)
|
|
endif
|
|
recovery_resource_deps := $(shell find $(recovery_resources_common) \
|
|
$(TARGET_PRIVATE_RES_DIRS) -type f)
|
|
recovery_resource_deps += $(generated_recovery_text_files)
|
|
|
|
|
|
ifdef TARGET_RECOVERY_FSTAB
|
|
recovery_fstab := $(TARGET_RECOVERY_FSTAB)
|
|
else
|
|
recovery_fstab := $(strip $(wildcard $(TARGET_DEVICE_DIR)/recovery.fstab))
|
|
endif
|
|
ifdef TARGET_RECOVERY_WIPE
|
|
recovery_wipe := $(TARGET_RECOVERY_WIPE)
|
|
else
|
|
recovery_wipe :=
|
|
endif
|
|
|
|
# Traditionally with non-A/B OTA we have:
|
|
# boot.img + recovery-from-boot.p + recovery-resource.dat = recovery.img.
|
|
# recovery-resource.dat is needed only if we carry an imgdiff patch of the boot and recovery images
|
|
# and invoke install-recovery.sh on the first boot post an OTA update.
|
|
#
|
|
# We no longer need that if one of the following conditions holds:
|
|
# a) We carry a full copy of the recovery image - no patching needed
|
|
# (BOARD_USES_FULL_RECOVERY_IMAGE = true);
|
|
# b) We build a single image that contains boot and recovery both - no recovery image to install
|
|
# (BOARD_USES_RECOVERY_AS_BOOT = true);
|
|
# c) We mount the system image as / and therefore do not have a ramdisk in boot.img
|
|
# (BOARD_BUILD_SYSTEM_ROOT_IMAGE = true).
|
|
# d) We include the recovery DTBO image within recovery - not needing the resource file as we
|
|
# do bsdiff because boot and recovery will contain different number of entries
|
|
# (BOARD_INCLUDE_RECOVERY_DTBO = true).
|
|
# e) We include the recovery ACPIO image within recovery - not needing the resource file as we
|
|
# do bsdiff because boot and recovery will contain different number of entries
|
|
# (BOARD_INCLUDE_RECOVERY_ACPIO = true).
|
|
|
|
ifeq (,$(filter true, $(BOARD_USES_FULL_RECOVERY_IMAGE) $(BOARD_USES_RECOVERY_AS_BOOT) \
|
|
$(BOARD_BUILD_SYSTEM_ROOT_IMAGE) $(BOARD_INCLUDE_RECOVERY_DTBO) $(BOARD_INCLUDE_RECOVERY_ACPIO)))
|
|
# Named '.dat' so we don't attempt to use imgdiff for patching it.
|
|
RECOVERY_RESOURCE_ZIP := $(TARGET_OUT)/etc/recovery-resource.dat
|
|
else
|
|
RECOVERY_RESOURCE_ZIP :=
|
|
endif
|
|
|
|
INSTALLED_RECOVERY_BUILD_PROP_TARGET := $(TARGET_RECOVERY_ROOT_OUT)/prop.default
|
|
|
|
$(INSTALLED_RECOVERY_BUILD_PROP_TARGET): PRIVATE_RECOVERY_UI_PROPERTIES := \
|
|
TARGET_RECOVERY_UI_ANIMATION_FPS:animation_fps \
|
|
TARGET_RECOVERY_UI_MARGIN_HEIGHT:margin_height \
|
|
TARGET_RECOVERY_UI_MARGIN_WIDTH:margin_width \
|
|
TARGET_RECOVERY_UI_MENU_UNUSABLE_ROWS:menu_unusable_rows \
|
|
TARGET_RECOVERY_UI_PROGRESS_BAR_BASELINE:progress_bar_baseline \
|
|
TARGET_RECOVERY_UI_TOUCH_LOW_THRESHOLD:touch_low_threshold \
|
|
TARGET_RECOVERY_UI_TOUCH_HIGH_THRESHOLD:touch_high_threshold \
|
|
TARGET_RECOVERY_UI_VR_STEREO_OFFSET:vr_stereo_offset
|
|
|
|
# Parses the given list of build variables and writes their values as build properties if defined.
|
|
# For example, if a target defines `TARGET_RECOVERY_UI_MARGIN_HEIGHT := 100`,
|
|
# `ro.recovery.ui.margin_height=100` will be appended to the given output file.
|
|
# $(1): Map from the build variable names to property names
|
|
# $(2): Output file
|
|
define append-recovery-ui-properties
|
|
echo "#" >> $(2)
|
|
echo "# RECOVERY UI BUILD PROPERTIES" >> $(2)
|
|
echo "#" >> $(2)
|
|
$(foreach prop,$(1), \
|
|
$(eval _varname := $(call word-colon,1,$(prop))) \
|
|
$(eval _propname := $(call word-colon,2,$(prop))) \
|
|
$(eval _value := $($(_varname))) \
|
|
$(if $(_value), \
|
|
echo ro.recovery.ui.$(_propname)=$(_value) >> $(2) &&)) true
|
|
endef
|
|
|
|
$(INSTALLED_RECOVERY_BUILD_PROP_TARGET): \
|
|
$(INSTALLED_DEFAULT_PROP_TARGET) \
|
|
$(INSTALLED_VENDOR_DEFAULT_PROP_TARGET) \
|
|
$(intermediate_system_build_prop) \
|
|
$(INSTALLED_VENDOR_BUILD_PROP_TARGET) \
|
|
$(INSTALLED_ODM_BUILD_PROP_TARGET) \
|
|
$(INSTALLED_PRODUCT_BUILD_PROP_TARGET) \
|
|
$(INSTALLED_PRODUCT_SERVICES_BUILD_PROP_TARGET)
|
|
@echo "Target recovery buildinfo: $@"
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) rm -f $@
|
|
$(hide) cat $(INSTALLED_DEFAULT_PROP_TARGET) > $@
|
|
$(hide) cat $(INSTALLED_VENDOR_DEFAULT_PROP_TARGET) >> $@
|
|
$(hide) cat $(intermediate_system_build_prop) >> $@
|
|
$(hide) cat $(INSTALLED_VENDOR_BUILD_PROP_TARGET) >> $@
|
|
$(hide) cat $(INSTALLED_ODM_BUILD_PROP_TARGET) >> $@
|
|
$(hide) cat $(INSTALLED_PRODUCT_BUILD_PROP_TARGET) >> $@
|
|
$(hide) cat $(INSTALLED_PRODUCT_SERVICES_BUILD_PROP_TARGET) >> $@
|
|
$(call append-recovery-ui-properties,$(PRIVATE_RECOVERY_UI_PROPERTIES),$@)
|
|
|
|
INTERNAL_RECOVERYIMAGE_ARGS := \
|
|
$(addprefix --second ,$(INSTALLED_2NDBOOTLOADER_TARGET)) \
|
|
--kernel $(recovery_kernel) \
|
|
--ramdisk $(recovery_ramdisk)
|
|
|
|
# Assumes this has already been stripped
|
|
ifdef INTERNAL_KERNEL_CMDLINE
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --cmdline "$(INTERNAL_KERNEL_CMDLINE)"
|
|
endif
|
|
ifdef BOARD_KERNEL_BASE
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --base $(BOARD_KERNEL_BASE)
|
|
endif
|
|
ifdef BOARD_KERNEL_PAGESIZE
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --pagesize $(BOARD_KERNEL_PAGESIZE)
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_DTBO
|
|
ifdef BOARD_PREBUILT_RECOVERY_DTBOIMAGE
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --recovery_dtbo $(BOARD_PREBUILT_RECOVERY_DTBOIMAGE)
|
|
else
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --recovery_dtbo $(BOARD_PREBUILT_DTBOIMAGE)
|
|
endif
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_ACPIO
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --recovery_acpio $(BOARD_RECOVERY_ACPIO)
|
|
endif
|
|
ifdef BOARD_INCLUDE_DTB_IN_BOOTIMG
|
|
INTERNAL_RECOVERYIMAGE_ARGS += --dtb $(INSTALLED_DTBIMAGE_TARGET)
|
|
endif
|
|
|
|
# Keys authorized to sign OTA packages this build will accept. The
|
|
# build always uses dev-keys for this; release packaging tools will
|
|
# substitute other keys for this one.
|
|
OTA_PUBLIC_KEYS := $(DEFAULT_SYSTEM_DEV_CERTIFICATE).x509.pem
|
|
|
|
# Generate a file containing the keys that will be read by the
|
|
# recovery binary.
|
|
RECOVERY_INSTALL_OTA_KEYS := \
|
|
$(call intermediates-dir-for,PACKAGING,ota_keys)/otacerts.zip
|
|
$(RECOVERY_INSTALL_OTA_KEYS): PRIVATE_OTA_PUBLIC_KEYS := $(OTA_PUBLIC_KEYS)
|
|
$(RECOVERY_INSTALL_OTA_KEYS): extra_keys := $(patsubst %,%.x509.pem,$(PRODUCT_EXTRA_RECOVERY_KEYS))
|
|
$(RECOVERY_INSTALL_OTA_KEYS): $(SOONG_ZIP) $(OTA_PUBLIC_KEYS) $(extra_keys)
|
|
$(hide) rm -f $@
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) $(SOONG_ZIP) -o $@ $(foreach key_file, $(PRIVATE_OTA_PUBLIC_KEYS) $(extra_keys), -C $(dir $(key_file)) -f $(key_file))
|
|
|
|
RECOVERYIMAGE_ID_FILE := $(PRODUCT_OUT)/recovery.id
|
|
|
|
# $(1): output file
|
|
define build-recoveryimage-target
|
|
# Making recovery image
|
|
$(hide) mkdir -p $(TARGET_RECOVERY_OUT)
|
|
$(hide) mkdir -p $(TARGET_RECOVERY_ROOT_OUT)/sdcard $(TARGET_RECOVERY_ROOT_OUT)/tmp
|
|
# Copying baseline ramdisk...
|
|
# Use rsync because "cp -Rf" fails to overwrite broken symlinks on Mac.
|
|
$(hide) rsync -a --exclude=sdcard $(IGNORE_RECOVERY_SEPOLICY) $(IGNORE_CACHE_LINK) $(TARGET_ROOT_OUT) $(TARGET_RECOVERY_OUT)
|
|
# Modifying ramdisk contents...
|
|
$(if $(filter true,$(BOARD_BUILD_SYSTEM_ROOT_IMAGE)),, \
|
|
$(hide) ln -sf /system/bin/init $(TARGET_RECOVERY_ROOT_OUT)/init)
|
|
$(if $(BOARD_RECOVERY_KERNEL_MODULES), \
|
|
$(call build-image-kernel-modules,$(BOARD_RECOVERY_KERNEL_MODULES),$(TARGET_RECOVERY_ROOT_OUT),,$(call intermediates-dir-for,PACKAGING,depmod_recovery)))
|
|
# Removes $(TARGET_RECOVERY_ROOT_OUT)/init*.rc EXCEPT init.recovery*.rc.
|
|
$(hide) find $(TARGET_RECOVERY_ROOT_OUT) -maxdepth 1 -name 'init*.rc' -type f -not -name "init.recovery.*.rc" | xargs rm -f
|
|
$(hide) cp -f $(recovery_initrc) $(TARGET_RECOVERY_ROOT_OUT)/
|
|
$(hide) cp $(TARGET_ROOT_OUT)/init.recovery.*.rc $(TARGET_RECOVERY_ROOT_OUT)/ 2> /dev/null || true # Ignore error when the src file doesn't exist.
|
|
$(hide) mkdir -p $(TARGET_RECOVERY_ROOT_OUT)/res
|
|
$(hide) rm -rf $(TARGET_RECOVERY_ROOT_OUT)/res/*
|
|
$(hide) cp -rf $(recovery_resources_common)/* $(TARGET_RECOVERY_ROOT_OUT)/res
|
|
$(hide) $(foreach recovery_text_file,$(generated_recovery_text_files), \
|
|
cp -rf $(recovery_text_file) $(TARGET_RECOVERY_ROOT_OUT)/res/images/ &&) true
|
|
$(hide) cp -f $(recovery_font) $(TARGET_RECOVERY_ROOT_OUT)/res/images/font.png
|
|
$(hide) $(foreach item,$(TARGET_PRIVATE_RES_DIRS), \
|
|
cp -rf $(item) $(TARGET_RECOVERY_ROOT_OUT)/$(newline))
|
|
$(hide) $(foreach item,$(recovery_fstab), \
|
|
cp -f $(item) $(TARGET_RECOVERY_ROOT_OUT)/system/etc/recovery.fstab)
|
|
$(if $(strip $(recovery_wipe)), \
|
|
$(hide) cp -f $(recovery_wipe) $(TARGET_RECOVERY_ROOT_OUT)/system/etc/recovery.wipe)
|
|
$(hide) mkdir -p $(TARGET_RECOVERY_ROOT_OUT)/system/etc/security
|
|
$(hide) cp $(RECOVERY_INSTALL_OTA_KEYS) $(TARGET_RECOVERY_ROOT_OUT)/system/etc/security/otacerts.zip
|
|
$(hide) ln -sf prop.default $(TARGET_RECOVERY_ROOT_OUT)/default.prop
|
|
$(BOARD_RECOVERY_IMAGE_PREPARE)
|
|
$(hide) $(MKBOOTFS) -d $(TARGET_OUT) $(TARGET_RECOVERY_ROOT_OUT) | $(MINIGZIP) > $(recovery_ramdisk)
|
|
$(if $(filter true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)), \
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_RECOVERYIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(1).unsigned, \
|
|
$(hide) $(MKBOOTIMG) $(INTERNAL_RECOVERYIMAGE_ARGS) $(INTERNAL_MKBOOTIMG_VERSION_ARGS) $(BOARD_MKBOOTIMG_ARGS) --output $(1) --id > $(RECOVERYIMAGE_ID_FILE))
|
|
$(if $(filter true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER)),\
|
|
$(if $(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)),\
|
|
$(BOOT_SIGNER) /boot $(1) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(1),\
|
|
$(BOOT_SIGNER) /recovery $(1) $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).pk8 $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VERITY_SIGNING_KEY).x509.pem $(1)\
|
|
)\
|
|
)
|
|
$(if $(filter true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT)), \
|
|
$(VBOOT_SIGNER) $(FUTILITY) $(1).unsigned $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbpubk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_KEY).vbprivk $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VBOOT_SIGNING_SUBKEY).vbprivk $(1).keyblock $(1))
|
|
$(if $(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)), \
|
|
$(hide) $(call assert-max-image-size,$(1),$(call get-hash-image-max-size,$(BOARD_BOOTIMAGE_PARTITION_SIZE))), \
|
|
$(hide) $(call assert-max-image-size,$(1),$(call get-hash-image-max-size,$(BOARD_RECOVERYIMAGE_PARTITION_SIZE))))
|
|
$(if $(filter true,$(BOARD_AVB_ENABLE)), \
|
|
$(if $(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)), \
|
|
$(hide) $(AVBTOOL) add_hash_footer --image $(1) --partition_size $(BOARD_BOOTIMAGE_PARTITION_SIZE) --partition_name boot $(INTERNAL_AVB_BOOT_SIGNING_ARGS) $(BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS),\
|
|
$(hide) $(AVBTOOL) add_hash_footer --image $(1) --partition_size $(BOARD_RECOVERYIMAGE_PARTITION_SIZE) --partition_name recovery $(INTERNAL_AVB_RECOVERY_SIGNING_ARGS) $(BOARD_AVB_RECOVERY_ADD_HASH_FOOTER_ARGS)))
|
|
endef
|
|
|
|
ifeq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_BOOT_SIGNER))
|
|
$(INSTALLED_BOOTIMAGE_TARGET) : $(BOOT_SIGNER)
|
|
endif
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT))
|
|
$(INSTALLED_BOOTIMAGE_TARGET) : $(VBOOT_SIGNER)
|
|
endif
|
|
ifeq (true,$(BOARD_AVB_ENABLE))
|
|
$(INSTALLED_BOOTIMAGE_TARGET) : $(AVBTOOL) $(BOARD_AVB_BOOT_KEY_PATH)
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_DTBO
|
|
ifdef BOARD_PREBUILT_RECOVERY_DTBOIMAGE
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(BOARD_PREBUILT_RECOVERY_DTBOIMAGE)
|
|
else
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(BOARD_PREBUILT_DTBOIMAGE)
|
|
endif
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_ACPIO
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(BOARD_RECOVERY_ACPIO)
|
|
endif
|
|
ifdef BOARD_INCLUDE_DTB_IN_BOOTIMG
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(INSTALLED_DTBIMAGE_TARGET)
|
|
endif
|
|
|
|
$(INSTALLED_BOOTIMAGE_TARGET): $(MKBOOTFS) $(MKBOOTIMG) $(MINIGZIP) \
|
|
$(INTERNAL_ROOT_FILES) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INTERNAL_RECOVERYIMAGE_FILES) \
|
|
$(recovery_initrc) $(recovery_sepolicy) $(recovery_kernel) \
|
|
$(INSTALLED_2NDBOOTLOADER_TARGET) \
|
|
$(INSTALLED_RECOVERY_BUILD_PROP_TARGET) \
|
|
$(recovery_resource_deps) \
|
|
$(recovery_fstab) \
|
|
$(RECOVERY_INSTALL_OTA_KEYS) \
|
|
$(BOARD_RECOVERY_KERNEL_MODULES) \
|
|
$(DEPMOD)
|
|
$(call pretty,"Target boot image from recovery: $@")
|
|
$(call build-recoveryimage-target, $@)
|
|
endif # BOARD_USES_RECOVERY_AS_BOOT
|
|
|
|
ifdef BOARD_INCLUDE_RECOVERY_DTBO
|
|
ifdef BOARD_PREBUILT_RECOVERY_DTBOIMAGE
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET): $(BOARD_PREBUILT_RECOVERY_DTBOIMAGE)
|
|
else
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET): $(BOARD_PREBUILT_DTBOIMAGE)
|
|
endif
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_ACPIO
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET): $(BOARD_RECOVERY_ACPIO)
|
|
endif
|
|
ifdef BOARD_INCLUDE_DTB_IN_BOOTIMG
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET): $(INSTALLED_DTBIMAGE_TARGET)
|
|
endif
|
|
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET): $(MKBOOTFS) $(MKBOOTIMG) $(MINIGZIP) \
|
|
$(INTERNAL_ROOT_FILES) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(INTERNAL_RECOVERYIMAGE_FILES) \
|
|
$(recovery_initrc) $(recovery_sepolicy) $(recovery_kernel) \
|
|
$(INSTALLED_2NDBOOTLOADER_TARGET) \
|
|
$(INSTALLED_RECOVERY_BUILD_PROP_TARGET) \
|
|
$(recovery_resource_deps) \
|
|
$(recovery_fstab) \
|
|
$(RECOVERY_INSTALL_OTA_KEYS) \
|
|
$(BOARD_RECOVERY_KERNEL_MODULES) \
|
|
$(DEPMOD)
|
|
$(call build-recoveryimage-target, $@)
|
|
|
|
ifdef RECOVERY_RESOURCE_ZIP
|
|
$(RECOVERY_RESOURCE_ZIP): $(INSTALLED_RECOVERYIMAGE_TARGET) | $(ZIPTIME)
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) find $(TARGET_RECOVERY_ROOT_OUT)/res -type f | sort | zip -0qrjX $@ -@
|
|
$(remove-timestamps-from-package)
|
|
endif
|
|
|
|
.PHONY: recoveryimage-nodeps
|
|
recoveryimage-nodeps:
|
|
@echo "make $@: ignoring dependencies"
|
|
$(call build-recoveryimage-target, $(INSTALLED_RECOVERYIMAGE_TARGET))
|
|
|
|
else # INSTALLED_RECOVERYIMAGE_TARGET not defined
|
|
RECOVERY_RESOURCE_ZIP :=
|
|
endif
|
|
|
|
.PHONY: recoveryimage
|
|
recoveryimage: $(INSTALLED_RECOVERYIMAGE_TARGET) $(RECOVERY_RESOURCE_ZIP)
|
|
|
|
ifneq ($(BOARD_NAND_PAGE_SIZE),)
|
|
$(error MTD device is no longer supported and thus BOARD_NAND_PAGE_SIZE is deprecated.)
|
|
endif
|
|
|
|
ifneq ($(BOARD_NAND_SPARE_SIZE),)
|
|
$(error MTD device is no longer supported and thus BOARD_NAND_SPARE_SIZE is deprecated.)
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# system image
|
|
#
|
|
# Remove overridden packages from $(ALL_PDK_FUSION_FILES)
|
|
PDK_FUSION_SYSIMG_FILES := \
|
|
$(filter-out $(foreach p,$(overridden_packages),$(p) %/$(p).apk), \
|
|
$(ALL_PDK_FUSION_FILES))
|
|
|
|
INTERNAL_SYSTEMIMAGE_FILES := $(sort $(filter $(TARGET_OUT)/%, \
|
|
$(ALL_GENERATED_SOURCES) \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES) \
|
|
$(PDK_FUSION_SYSIMG_FILES) \
|
|
$(RECOVERY_RESOURCE_ZIP)) \
|
|
$(PDK_FUSION_SYMLINK_STAMP))
|
|
|
|
FULL_SYSTEMIMAGE_DEPS := $(INTERNAL_SYSTEMIMAGE_FILES) $(INTERNAL_USERIMAGES_DEPS)
|
|
|
|
# ASAN libraries in the system image - add dependency.
|
|
ASAN_IN_SYSTEM_INSTALLED := $(TARGET_OUT)/asan.tar.bz2
|
|
ifneq (,$(filter address, $(SANITIZE_TARGET)))
|
|
ifeq (true,$(SANITIZE_TARGET_SYSTEM))
|
|
FULL_SYSTEMIMAGE_DEPS += $(ASAN_IN_SYSTEM_INSTALLED)
|
|
endif
|
|
endif
|
|
|
|
FULL_SYSTEMIMAGE_DEPS += $(INTERNAL_ROOT_FILES) $(INSTALLED_FILES_FILE_ROOT)
|
|
|
|
# -----------------------------------------------------------------
|
|
# Final System VINTF manifest including fragments. This is not assembled
|
|
# on the device because it depends on everything in a given device
|
|
# image which defines a vintf_fragment.
|
|
|
|
BUILT_ASSEMBLED_SYSTEM_MANIFEST := $(PRODUCT_OUT)/verified_assembled_system_manifest.xml
|
|
$(BUILT_ASSEMBLED_SYSTEM_MANIFEST): $(HOST_OUT_EXECUTABLES)/assemble_vintf
|
|
$(BUILT_ASSEMBLED_SYSTEM_MANIFEST): $(BUILT_VENDOR_MATRIX)
|
|
$(BUILT_ASSEMBLED_SYSTEM_MANIFEST): $(BUILT_SYSTEM_MANIFEST)
|
|
$(BUILT_ASSEMBLED_SYSTEM_MANIFEST): $(FULL_SYSTEMIMAGE_DEPS)
|
|
@echo "Verifying system VINTF manifest."
|
|
PRODUCT_ENFORCE_VINTF_MANIFEST=$(PRODUCT_ENFORCE_VINTF_MANIFEST) \
|
|
$(HOST_OUT_EXECUTABLES)/assemble_vintf \
|
|
-c $(BUILT_VENDOR_MATRIX) \
|
|
-i $(BUILT_SYSTEM_MANIFEST) \
|
|
$$([ -d $(TARGET_OUT)/etc/vintf/manifest ] && \
|
|
find $(TARGET_OUT)/etc/vintf/manifest -type f -name "*.xml" | \
|
|
sed "s/^/-i /" | tr '\n' ' ') -o $@
|
|
|
|
# -----------------------------------------------------------------
|
|
ifdef BUILDING_SYSTEM_IMAGE
|
|
|
|
# installed file list
|
|
# Depending on anything that $(BUILT_SYSTEMIMAGE) depends on.
|
|
# We put installed-files.txt ahead of image itself in the dependency graph
|
|
# so that we can get the size stat even if the build fails due to too large
|
|
# system image.
|
|
INSTALLED_FILES_FILE := $(PRODUCT_OUT)/installed-files.txt
|
|
INSTALLED_FILES_JSON := $(INSTALLED_FILES_FILE:.txt=.json)
|
|
$(INSTALLED_FILES_FILE): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON)
|
|
$(INSTALLED_FILES_FILE): $(FULL_SYSTEMIMAGE_DEPS) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_OUT) > $(@:.txt=.json)
|
|
$(hide) build/make/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
.PHONY: installed-file-list
|
|
installed-file-list: $(INSTALLED_FILES_FILE)
|
|
|
|
$(call dist-for-goals, sdk win_sdk sdk_addon, $(INSTALLED_FILES_FILE))
|
|
|
|
systemimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,systemimage)
|
|
BUILT_SYSTEMIMAGE := $(systemimage_intermediates)/system.img
|
|
|
|
# Create symlink /system/vendor to /vendor if necessary.
|
|
ifdef BOARD_USES_VENDORIMAGE
|
|
define create-system-vendor-symlink
|
|
$(hide) if [ -d $(TARGET_OUT)/vendor ] && [ ! -h $(TARGET_OUT)/vendor ]; then \
|
|
echo 'Non-symlink $(TARGET_OUT)/vendor detected!' 1>&2; \
|
|
echo 'You cannot install files to $(TARGET_OUT)/vendor while building a separate vendor.img!' 1>&2; \
|
|
exit 1; \
|
|
fi
|
|
$(hide) ln -sf /vendor $(TARGET_OUT)/vendor
|
|
endef
|
|
else
|
|
define create-system-vendor-symlink
|
|
endef
|
|
endif
|
|
|
|
# Create symlink /system/product to /product if necessary.
|
|
ifdef BOARD_USES_PRODUCTIMAGE
|
|
define create-system-product-symlink
|
|
$(hide) if [ -d $(TARGET_OUT)/product ] && [ ! -h $(TARGET_OUT)/product ]; then \
|
|
echo 'Non-symlink $(TARGET_OUT)/product detected!' 1>&2; \
|
|
echo 'You cannot install files to $(TARGET_OUT)/product while building a separate product.img!' 1>&2; \
|
|
exit 1; \
|
|
fi
|
|
$(hide) ln -sf /product $(TARGET_OUT)/product
|
|
endef
|
|
else
|
|
define create-system-product-symlink
|
|
endef
|
|
endif
|
|
|
|
# Create symlink /system/product_services to /product_services if necessary.
|
|
ifdef BOARD_USES_PRODUCT_SERVICESIMAGE
|
|
define create-system-product_services-symlink
|
|
$(hide) if [ -d $(TARGET_OUT)/product_services ] && [ ! -h $(TARGET_OUT)/product_services ]; then \
|
|
echo 'Non-symlink $(TARGET_OUT)/product_services detected!' 1>&2; \
|
|
echo 'You cannot install files to $(TARGET_OUT)/product_services while building a separate product_services.img!' 1>&2; \
|
|
exit 1; \
|
|
fi
|
|
$(hide) ln -sf /product_services $(TARGET_OUT)/product_services
|
|
endef
|
|
else
|
|
define create-system-product_services-symlink
|
|
endef
|
|
endif
|
|
|
|
# Create symlink /vendor/odm to /odm if necessary.
|
|
ifdef BOARD_USES_ODMIMAGE
|
|
define create-vendor-odm-symlink
|
|
$(hide) if [ -d $(TARGET_OUT_VENDOR)/odm ] && [ ! -h $(TARGET_OUT_VENDOR)/odm ]; then \
|
|
echo 'Non-symlink $(TARGET_OUT_VENDOR)/odm detected!' 1>&2; \
|
|
echo 'You cannot install files to $(TARGET_OUT_VENDOR)/odm while building a separate odm.img!' 1>&2; \
|
|
exit 1; \
|
|
fi
|
|
$(hide) ln -sf /odm $(TARGET_OUT_VENDOR)/odm
|
|
endef
|
|
else
|
|
define create-vendor-odm-symlink
|
|
endef
|
|
endif
|
|
|
|
# Check that libraries that should only be in APEXes don't end up in the system
|
|
# image. For the Runtime APEX this complements the checks in
|
|
# art/build/apex/art_apex_test.py.
|
|
# TODO(b/128708192): Implement this restriction in Soong instead.
|
|
|
|
# TODO(b/124293228): Fix remaining bugs and add these libraries to the list:
|
|
# libart-compiler.so
|
|
# libart-dexlayout.so
|
|
# libart.so
|
|
# libartbase.so
|
|
# libartpalette.so
|
|
# libdexfile.so
|
|
# libdexfile_external.so - aosp_marlin-userdebug gets this in a vndk-sp-Q subdirectory.
|
|
# libicui18n.so
|
|
# libicuuc.so
|
|
# libnativehelper.so - cf_x86_phone-userdebug builds get this in system/lib/arm
|
|
# libprofile.so
|
|
# libsigchain.so
|
|
# libtombstoned_client.so
|
|
APEX_MODULE_LIBS= \
|
|
libadbconnection.so \
|
|
libandroidicu.so \
|
|
libdt_fd_forward.so \
|
|
libdt_socket.so \
|
|
libjavacore.so \
|
|
libjdwp.so \
|
|
libnativebridge.so \
|
|
libnativeloader.so \
|
|
libnpt.so \
|
|
libopenjdk.so \
|
|
libopenjdkjvm.so \
|
|
libopenjdkjvmti.so \
|
|
libpac.so \
|
|
|
|
# If the check below fails, some library has ended up in system/lib or
|
|
# system/lib64 that is intended to only go into some APEX package. The likely
|
|
# cause is that a library or binary in /system has grown a dependency that
|
|
# directly or indirectly pulls in the prohibited library.
|
|
#
|
|
# To resolve this, look for the APEX package that the library belong to - search
|
|
# for it in 'native_shared_lib' properties in 'apex' build modules (see
|
|
# art/build/apex/Android.bp for an example). Then check if there is an exported
|
|
# library in that APEX package that should be used instead, i.e. one listed in
|
|
# its 'native_shared_lib' property for which the corresponding 'cc_library'
|
|
# module has a 'stubs' clause (like libdexfile_external in
|
|
# art/libdexfile/Android.bp).
|
|
#
|
|
# If you cannot find an APEX exported library that fits your needs, or you think
|
|
# that the library you want to depend on should be allowed in /system, then
|
|
# please contact the owners of the APEX package containing the library.
|
|
#
|
|
# If you get this error for a library that is exported in an APEX, then the APEX
|
|
# might be misconfigured or something is wrong in the build system. Please reach
|
|
# out to the APEX package owners and/or soong-team@, or
|
|
# android-building@googlegroups.com externally.
|
|
define check-apex-libs-absence
|
|
$(hide) ( \
|
|
cd $(TARGET_OUT); \
|
|
findres=$$(find lib* -type f \( -false $(foreach lib,$(APEX_MODULE_LIBS),-o -name $(lib)) \) -print) || exit 1; \
|
|
if [ -n "$$findres" ]; then \
|
|
echo "APEX libraries found in system image (see comment in this makefile for details):" 1>&2; \
|
|
echo "$$findres" | sort 1>&2; \
|
|
false; \
|
|
fi; \
|
|
)
|
|
endef
|
|
|
|
# $(1): output file
|
|
define build-systemimage-target
|
|
@echo "Target system fs image: $(1)"
|
|
$(call create-system-vendor-symlink)
|
|
$(call create-system-product-symlink)
|
|
$(call create-system-product_services-symlink)
|
|
$(call check-apex-libs-absence)
|
|
@mkdir -p $(dir $(1)) $(systemimage_intermediates) && rm -rf $(systemimage_intermediates)/system_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(systemimage_intermediates)/system_image_info.txt,system, \
|
|
skip_fsck=true)
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
build/make/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT) $(systemimage_intermediates)/system_image_info.txt $(1) $(TARGET_OUT) \
|
|
$(systemimage_intermediates)/generated_system_image_info.txt \
|
|
|| ( mkdir -p $${DIST_DIR}; cp $(INSTALLED_FILES_FILE) $${DIST_DIR}/installed-files-rescued.txt; \
|
|
exit 1 )
|
|
endef
|
|
|
|
$(BUILT_SYSTEMIMAGE): $(BUILT_ASSEMBLED_SYSTEM_MANIFEST)
|
|
$(BUILT_SYSTEMIMAGE): $(FULL_SYSTEMIMAGE_DEPS) $(INSTALLED_FILES_FILE) $(BUILD_IMAGE_SRCS)
|
|
$(call build-systemimage-target,$@)
|
|
|
|
INSTALLED_SYSTEMIMAGE_TARGET := $(PRODUCT_OUT)/system.img
|
|
SYSTEMIMAGE_SOURCE_DIR := $(TARGET_OUT)
|
|
|
|
# INSTALLED_SYSTEMIMAGE_TARGET used to be named INSTALLED_SYSTEMIMAGE. Create an alias for backward
|
|
# compatibility, in case device-specific Makefiles still refer to the old name.
|
|
INSTALLED_SYSTEMIMAGE := $(INSTALLED_SYSTEMIMAGE_TARGET)
|
|
|
|
# The system partition needs room for the recovery image as well. We
|
|
# now store the recovery image as a binary patch using the boot image
|
|
# as the source (since they are very similar). Generate the patch so
|
|
# we can see how big it's going to be, and include that in the system
|
|
# image size check calculation.
|
|
ifneq ($(INSTALLED_BOOTIMAGE_TARGET),)
|
|
ifneq ($(INSTALLED_RECOVERYIMAGE_TARGET),)
|
|
ifneq ($(BOARD_USES_FULL_RECOVERY_IMAGE),true)
|
|
ifneq (,$(filter true, $(BOARD_BUILD_SYSTEM_ROOT_IMAGE) $(BOARD_INCLUDE_RECOVERY_DTBO) $(BOARD_INCLUDE_RECOVERY_ACPIO)))
|
|
diff_tool := $(HOST_OUT_EXECUTABLES)/bsdiff
|
|
else
|
|
diff_tool := $(HOST_OUT_EXECUTABLES)/imgdiff
|
|
endif
|
|
intermediates := $(call intermediates-dir-for,PACKAGING,recovery_patch)
|
|
RECOVERY_FROM_BOOT_PATCH := $(intermediates)/recovery_from_boot.p
|
|
$(RECOVERY_FROM_BOOT_PATCH): PRIVATE_DIFF_TOOL := $(diff_tool)
|
|
$(RECOVERY_FROM_BOOT_PATCH): \
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(diff_tool)
|
|
@echo "Construct recovery from boot"
|
|
mkdir -p $(dir $@)
|
|
$(PRIVATE_DIFF_TOOL) $(INSTALLED_BOOTIMAGE_TARGET) $(INSTALLED_RECOVERYIMAGE_TARGET) $@
|
|
else # $(BOARD_USES_FULL_RECOVERY_IMAGE) == true
|
|
RECOVERY_FROM_BOOT_PATCH := $(INSTALLED_RECOVERYIMAGE_TARGET)
|
|
endif # BOARD_USES_FULL_RECOVERY_IMAGE
|
|
endif # INSTALLED_RECOVERYIMAGE_TARGET
|
|
endif # INSTALLED_BOOTIMAGE_TARGET
|
|
|
|
$(INSTALLED_SYSTEMIMAGE_TARGET): $(BUILT_SYSTEMIMAGE) $(RECOVERY_FROM_BOOT_PATCH)
|
|
@echo "Install system fs image: $@"
|
|
$(copy-file-to-target)
|
|
ifdef RECOVERY_FROM_BOOT_PATCH
|
|
ifeq ($(PRODUCT_USE_DYNAMIC_PARTITION_SIZE),true)
|
|
ifeq ($(BOARD_SYSTEMIMAGE_PARTITION_SIZE),)
|
|
# system image size is dynamic, hence system_size in generated_system_image_info.txt does not
|
|
# have room for recovery from boot patch. Increase system_size so that check-all-partition-sizes
|
|
# accounts for the size of the patch.
|
|
sed -i'.bak' -e 's/^system_size=.*$$/system_size='"$$(( \
|
|
$(call read-image-prop-dictionary,$(systemimage_intermediates)/generated_system_image_info.txt,system_size) + \
|
|
$$($(call get-file-size,$(RECOVERY_FROM_BOOT_PATCH))) ))"'/' \
|
|
$(systemimage_intermediates)/generated_system_image_info.txt
|
|
endif
|
|
endif
|
|
endif
|
|
$(hide) $(call assert-max-image-size,$@ $(RECOVERY_FROM_BOOT_PATCH),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(systemimage_intermediates)/generated_system_image_info.txt,system_size))
|
|
|
|
systemimage: $(INSTALLED_SYSTEMIMAGE_TARGET)
|
|
|
|
.PHONY: systemimage-nodeps snod
|
|
systemimage-nodeps snod: $(filter-out systemimage-nodeps snod,$(MAKECMDGOALS)) \
|
|
| $(INTERNAL_USERIMAGES_DEPS)
|
|
@echo "make $@: ignoring dependencies"
|
|
$(call build-systemimage-target,$(INSTALLED_SYSTEMIMAGE_TARGET))
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_SYSTEMIMAGE_TARGET),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(systemimage_intermediates)/generated_system_image_info.txt,system_size))
|
|
|
|
ifneq (,$(filter systemimage-nodeps snod, $(MAKECMDGOALS)))
|
|
ifeq (true,$(WITH_DEXPREOPT))
|
|
$(warning Warning: with dexpreopt enabled, you may need a full rebuild.)
|
|
endif
|
|
endif
|
|
|
|
endif # BUILDING_SYSTEM_IMAGE
|
|
|
|
.PHONY: sync syncsys
|
|
sync syncsys: $(INTERNAL_SYSTEMIMAGE_FILES)
|
|
|
|
#######
|
|
## system tarball
|
|
define build-systemtarball-target
|
|
$(call pretty,"Target system fs tarball: $(INSTALLED_SYSTEMTARBALL_TARGET)")
|
|
$(call create-system-vendor-symlink)
|
|
$(call create-system-product-symlink)
|
|
$(call create-system-product_services-symlink)
|
|
$(MKTARBALL) $(FS_GET_STATS) \
|
|
$(PRODUCT_OUT) system $(PRIVATE_SYSTEM_TAR) \
|
|
$(INSTALLED_SYSTEMTARBALL_TARGET) $(TARGET_OUT)
|
|
endef
|
|
|
|
ifndef SYSTEM_TARBALL_FORMAT
|
|
SYSTEM_TARBALL_FORMAT := bz2
|
|
endif
|
|
|
|
system_tar := $(PRODUCT_OUT)/system.tar
|
|
INSTALLED_SYSTEMTARBALL_TARGET := $(system_tar).$(SYSTEM_TARBALL_FORMAT)
|
|
$(INSTALLED_SYSTEMTARBALL_TARGET): PRIVATE_SYSTEM_TAR := $(system_tar)
|
|
$(INSTALLED_SYSTEMTARBALL_TARGET): $(FS_GET_STATS) $(INTERNAL_SYSTEMIMAGE_FILES)
|
|
$(build-systemtarball-target)
|
|
|
|
.PHONY: systemtarball-nodeps
|
|
systemtarball-nodeps: $(FS_GET_STATS) \
|
|
$(filter-out systemtarball-nodeps stnod,$(MAKECMDGOALS))
|
|
$(build-systemtarball-target)
|
|
|
|
.PHONY: stnod
|
|
stnod: systemtarball-nodeps
|
|
|
|
# -----------------------------------------------------------------
|
|
## platform.zip: system, plus other files to be used in PDK fusion build,
|
|
## in a zip file
|
|
##
|
|
## PDK_PLATFORM_ZIP_PRODUCT_BINARIES is used to store specified files to platform.zip.
|
|
## The variable will be typically set from BoardConfig.mk.
|
|
## Files under out dir will be rejected to prevent possible conflicts with other rules.
|
|
ifneq (,$(BUILD_PLATFORM_ZIP))
|
|
pdk_odex_javalibs := $(strip $(foreach m,$(DEXPREOPT.MODULES.JAVA_LIBRARIES),\
|
|
$(if $(filter $(DEXPREOPT.$(m).INSTALLED_STRIPPED),$(ALL_DEFAULT_INSTALLED_MODULES)),$(m))))
|
|
pdk_odex_apps := $(strip $(foreach m,$(DEXPREOPT.MODULES.APPS),\
|
|
$(if $(filter $(DEXPREOPT.$(m).INSTALLED_STRIPPED),$(ALL_DEFAULT_INSTALLED_MODULES)),$(m))))
|
|
pdk_classes_dex := $(strip \
|
|
$(foreach m,$(pdk_odex_javalibs),$(call intermediates-dir-for,JAVA_LIBRARIES,$(m),,COMMON)/javalib.jar) \
|
|
$(foreach m,$(pdk_odex_apps),$(call intermediates-dir-for,APPS,$(m))/package.dex.apk))
|
|
|
|
pdk_odex_config_mk := $(PRODUCT_OUT)/pdk_dexpreopt_config.mk
|
|
$(pdk_odex_config_mk): PRIVATE_JAVA_LIBRARIES := $(pdk_odex_javalibs)
|
|
$(pdk_odex_config_mk): PRIVATE_APPS := $(pdk_odex_apps)
|
|
$(pdk_odex_config_mk) :
|
|
@echo "PDK odex config makefile: $@"
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) echo "# Auto-generated. Do not modify." > $@
|
|
$(hide) echo "PDK.DEXPREOPT.JAVA_LIBRARIES:=$(PRIVATE_JAVA_LIBRARIES)" >> $@
|
|
$(hide) echo "PDK.DEXPREOPT.APPS:=$(PRIVATE_APPS)" >> $@
|
|
$(foreach m,$(PRIVATE_JAVA_LIBRARIES),\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).SRC:=$(patsubst $(OUT_DIR)/%,%,$(call intermediates-dir-for,JAVA_LIBRARIES,$(m),,COMMON)/javalib.jar)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).DEX_PREOPT:=$(DEXPREOPT.$(m).DEX_PREOPT)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).MULTILIB:=$(DEXPREOPT.$(m).MULTILIB)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).DEX_PREOPT_FLAGS:=$(DEXPREOPT.$(m).DEX_PREOPT_FLAGS)" >> $@$(newline)\
|
|
)
|
|
$(foreach m,$(PRIVATE_APPS),\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).SRC:=$(patsubst $(OUT_DIR)/%,%,$(call intermediates-dir-for,APPS,$(m))/package.dex.apk)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).DEX_PREOPT:=$(DEXPREOPT.$(m).DEX_PREOPT)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).MULTILIB:=$(DEXPREOPT.$(m).MULTILIB)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).DEX_PREOPT_FLAGS:=$(DEXPREOPT.$(m).DEX_PREOPT_FLAGS)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).PRIVILEGED_MODULE:=$(DEXPREOPT.$(m).PRIVILEGED_MODULE)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).VENDOR_MODULE:=$(DEXPREOPT.$(m).VENDOR_MODULE)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).TARGET_ARCH:=$(DEXPREOPT.$(m).TARGET_ARCH)" >> $@$(newline)\
|
|
$(hide) echo "PDK.DEXPREOPT.$(m).STRIPPED_SRC:=$(patsubst $(PRODUCT_OUT)/%,%,$(DEXPREOPT.$(m).INSTALLED_STRIPPED))" >> $@$(newline)\
|
|
)
|
|
|
|
PDK_PLATFORM_ZIP_PRODUCT_BINARIES := $(filter-out $(OUT_DIR)/%,$(PDK_PLATFORM_ZIP_PRODUCT_BINARIES))
|
|
INSTALLED_PLATFORM_ZIP := $(PRODUCT_OUT)/platform.zip
|
|
|
|
$(INSTALLED_PLATFORM_ZIP): PRIVATE_DEX_FILES := $(pdk_classes_dex)
|
|
$(INSTALLED_PLATFORM_ZIP): PRIVATE_ODEX_CONFIG := $(pdk_odex_config_mk)
|
|
$(INSTALLED_PLATFORM_ZIP) : $(SOONG_ZIP)
|
|
# dependencies for the other partitions are defined below after their file lists
|
|
# are known
|
|
$(INSTALLED_PLATFORM_ZIP) : $(INTERNAL_SYSTEMIMAGE_FILES) $(pdk_classes_dex) $(pdk_odex_config_mk) $(api_fingerprint)
|
|
$(call pretty,"Platform zip package: $(INSTALLED_PLATFORM_ZIP)")
|
|
rm -f $@ $@.lst
|
|
echo "-C $(PRODUCT_OUT)" >> $@.lst
|
|
echo "-D $(TARGET_OUT)" >> $@.lst
|
|
echo "-D $(TARGET_OUT_NOTICE_FILES)" >> $@.lst
|
|
echo "$(addprefix -f $(TARGET_OUT_UNSTRIPPED)/,$(PDK_SYMBOL_FILES_LIST))" >> $@.lst
|
|
ifdef BUILDING_VENDOR_IMAGE
|
|
echo "-D $(TARGET_OUT_VENDOR)" >> $@.lst
|
|
endif
|
|
ifdef BUILDING_PRODUCT_IMAGE
|
|
echo "-D $(TARGET_OUT_PRODUCT)" >> $@.lst
|
|
endif
|
|
ifdef BUILDING_PRODUCT_SERVICES_IMAGE
|
|
echo "-D $(TARGET_OUT_PRODUCT_SERVICES)" >> $@.lst
|
|
endif
|
|
ifdef BUILDING_ODM_IMAGE
|
|
echo "-D $(TARGET_OUT_ODM)" >> $@.lst
|
|
endif
|
|
ifneq ($(PDK_PLATFORM_JAVA_ZIP_CONTENTS),)
|
|
echo "-C $(OUT_DIR)" >> $@.lst
|
|
for f in $(filter-out $(PRIVATE_DEX_FILES),$(addprefix -f $(OUT_DIR)/,$(PDK_PLATFORM_JAVA_ZIP_CONTENTS))); do \
|
|
if [ -e $$f ]; then \
|
|
echo "-f $$f"; \
|
|
fi \
|
|
done >> $@.lst
|
|
endif
|
|
ifneq ($(PDK_PLATFORM_ZIP_PRODUCT_BINARIES),)
|
|
echo "-C . $(addprefix -f ,$(PDK_PLATFORM_ZIP_PRODUCT_BINARIES))" >> $@.lst
|
|
endif
|
|
@# Add dex-preopt files and config.
|
|
$(if $(PRIVATE_DEX_FILES),\
|
|
echo "-C $(OUT_DIR) $(addprefix -f ,$(PRIVATE_DEX_FILES))") >> $@.lst
|
|
echo "-C $(dir $(api_fingerprint)) -f $(api_fingerprint)" >> $@.lst
|
|
touch $(PRODUCT_OUT)/pdk.mk
|
|
echo "-C $(PRODUCT_OUT) -f $(PRIVATE_ODEX_CONFIG) -f $(PRODUCT_OUT)/pdk.mk" >> $@.lst
|
|
$(SOONG_ZIP) --ignore_missing_files -o $@ @$@.lst
|
|
|
|
.PHONY: platform
|
|
platform: $(INSTALLED_PLATFORM_ZIP)
|
|
|
|
.PHONY: platform-java
|
|
platform-java: platform
|
|
|
|
# Dist the platform.zip
|
|
ifneq (,$(filter platform platform-java, $(MAKECMDGOALS)))
|
|
$(call dist-for-goals, platform platform-java, $(INSTALLED_PLATFORM_ZIP))
|
|
endif
|
|
|
|
endif # BUILD_PLATFORM_ZIP
|
|
|
|
# -----------------------------------------------------------------
|
|
## boot tarball
|
|
define build-boottarball-target
|
|
$(hide) echo "Target boot fs tarball: $(INSTALLED_BOOTTARBALL_TARGET)"
|
|
$(hide) mkdir -p $(PRODUCT_OUT)/boot
|
|
$(hide) cp -f $(INTERNAL_BOOTIMAGE_FILES) $(PRODUCT_OUT)/boot/.
|
|
$(hide) echo $(INTERNAL_KERNEL_CMDLINE) > $(PRODUCT_OUT)/boot/cmdline
|
|
$(hide) $(MKTARBALL) $(FS_GET_STATS) \
|
|
$(PRODUCT_OUT) boot $(PRIVATE_BOOT_TAR) \
|
|
$(INSTALLED_BOOTTARBALL_TARGET) $(TARGET_OUT)
|
|
endef
|
|
|
|
ifndef BOOT_TARBALL_FORMAT
|
|
BOOT_TARBALL_FORMAT := bz2
|
|
endif
|
|
|
|
boot_tar := $(PRODUCT_OUT)/boot.tar
|
|
INSTALLED_BOOTTARBALL_TARGET := $(boot_tar).$(BOOT_TARBALL_FORMAT)
|
|
$(INSTALLED_BOOTTARBALL_TARGET): PRIVATE_BOOT_TAR := $(boot_tar)
|
|
$(INSTALLED_BOOTTARBALL_TARGET): $(FS_GET_STATS) $(INTERNAL_BOOTIMAGE_FILES)
|
|
$(build-boottarball-target)
|
|
|
|
.PHONY: boottarball-nodeps btnod
|
|
boottarball-nodeps btnod: $(FS_GET_STATS) \
|
|
$(filter-out boottarball-nodeps btnod,$(MAKECMDGOALS))
|
|
$(build-boottarball-target)
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
# data partition image
|
|
INTERNAL_USERDATAIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_DATA)/%,$(ALL_DEFAULT_INSTALLED_MODULES))
|
|
|
|
ifdef BUILDING_USERDATA_IMAGE
|
|
userdataimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,userdata)
|
|
BUILT_USERDATAIMAGE_TARGET := $(PRODUCT_OUT)/userdata.img
|
|
|
|
define build-userdataimage-target
|
|
$(call pretty,"Target userdata fs image: $(INSTALLED_USERDATAIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_DATA)
|
|
@mkdir -p $(userdataimage_intermediates) && rm -rf $(userdataimage_intermediates)/userdata_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(userdataimage_intermediates)/userdata_image_info.txt,userdata,skip_fsck=true)
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
build/make/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_DATA) $(userdataimage_intermediates)/userdata_image_info.txt $(INSTALLED_USERDATAIMAGE_TARGET) $(TARGET_OUT)
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_USERDATAIMAGE_TARGET),$(BOARD_USERDATAIMAGE_PARTITION_SIZE))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_USERDATAIMAGE_TARGET := $(BUILT_USERDATAIMAGE_TARGET)
|
|
INSTALLED_USERDATAIMAGE_TARGET_DEPS := \
|
|
$(INTERNAL_USERIMAGES_DEPS) \
|
|
$(INTERNAL_USERDATAIMAGE_FILES) \
|
|
$(BUILD_IMAGE_SRCS)
|
|
$(INSTALLED_USERDATAIMAGE_TARGET): $(INSTALLED_USERDATAIMAGE_TARGET_DEPS)
|
|
$(build-userdataimage-target)
|
|
|
|
.PHONY: userdataimage-nodeps
|
|
userdataimage-nodeps: | $(INTERNAL_USERIMAGES_DEPS)
|
|
$(build-userdataimage-target)
|
|
|
|
endif # BUILDING_USERDATA_IMAGE
|
|
|
|
# ASAN libraries in the system image - build rule.
|
|
ASAN_OUT_DIRS_FOR_SYSTEM_INSTALL := $(sort $(patsubst $(PRODUCT_OUT)/%,%,\
|
|
$(TARGET_OUT_SHARED_LIBRARIES) \
|
|
$(2ND_TARGET_OUT_SHARED_LIBRARIES) \
|
|
$(TARGET_OUT_VENDOR_SHARED_LIBRARIES) \
|
|
$(2ND_TARGET_OUT_VENDOR_SHARED_LIBRARIES)))
|
|
# Extra options: Enforce the system user for the files to avoid having to change ownership.
|
|
ASAN_SYSTEM_INSTALL_OPTIONS := --owner=1000 --group=1000
|
|
# Note: experimentally, it seems not worth it to try to get "best" compression. We don't save
|
|
# enough space.
|
|
$(ASAN_IN_SYSTEM_INSTALLED): $(INSTALLED_USERDATAIMAGE_TARGET_DEPS)
|
|
tar cfj $(ASAN_IN_SYSTEM_INSTALLED) $(ASAN_SYSTEM_INSTALL_OPTIONS) -C $(TARGET_OUT_DATA)/.. $(ASAN_OUT_DIRS_FOR_SYSTEM_INSTALL) >/dev/null
|
|
|
|
#######
|
|
## data partition tarball
|
|
define build-userdatatarball-target
|
|
$(call pretty,"Target userdata fs tarball: " \
|
|
"$(INSTALLED_USERDATATARBALL_TARGET)")
|
|
$(MKTARBALL) $(FS_GET_STATS) \
|
|
$(PRODUCT_OUT) data $(PRIVATE_USERDATA_TAR) \
|
|
$(INSTALLED_USERDATATARBALL_TARGET) $(TARGET_OUT)
|
|
endef
|
|
|
|
userdata_tar := $(PRODUCT_OUT)/userdata.tar
|
|
INSTALLED_USERDATATARBALL_TARGET := $(userdata_tar).bz2
|
|
$(INSTALLED_USERDATATARBALL_TARGET): PRIVATE_USERDATA_TAR := $(userdata_tar)
|
|
$(INSTALLED_USERDATATARBALL_TARGET): $(FS_GET_STATS) $(INTERNAL_USERDATAIMAGE_FILES)
|
|
$(build-userdatatarball-target)
|
|
|
|
$(call dist-for-goals,userdatatarball,$(INSTALLED_USERDATATARBALL_TARGET))
|
|
|
|
.PHONY: userdatatarball-nodeps
|
|
userdatatarball-nodeps: $(FS_GET_STATS)
|
|
$(build-userdatatarball-target)
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
# partition table image
|
|
ifdef BOARD_BPT_INPUT_FILES
|
|
|
|
BUILT_BPTIMAGE_TARGET := $(PRODUCT_OUT)/partition-table.img
|
|
BUILT_BPTJSON_TARGET := $(PRODUCT_OUT)/partition-table.bpt
|
|
|
|
INTERNAL_BVBTOOL_MAKE_TABLE_ARGS := \
|
|
--output_gpt $(BUILT_BPTIMAGE_TARGET) \
|
|
--output_json $(BUILT_BPTJSON_TARGET) \
|
|
$(foreach file, $(BOARD_BPT_INPUT_FILES), --input $(file))
|
|
|
|
ifdef BOARD_BPT_DISK_SIZE
|
|
INTERNAL_BVBTOOL_MAKE_TABLE_ARGS += --disk_size $(BOARD_BPT_DISK_SIZE)
|
|
endif
|
|
|
|
define build-bptimage-target
|
|
$(call pretty,"Target partition table image: $(INSTALLED_BPTIMAGE_TARGET)")
|
|
$(hide) $(BPTTOOL) make_table $(INTERNAL_BVBTOOL_MAKE_TABLE_ARGS) $(BOARD_BPT_MAKE_TABLE_ARGS)
|
|
endef
|
|
|
|
INSTALLED_BPTIMAGE_TARGET := $(BUILT_BPTIMAGE_TARGET)
|
|
$(BUILT_BPTJSON_TARGET): $(INSTALLED_BPTIMAGE_TARGET)
|
|
$(hide) touch -c $(BUILT_BPTJSON_TARGET)
|
|
|
|
$(INSTALLED_BPTIMAGE_TARGET): $(BPTTOOL) $(BOARD_BPT_INPUT_FILES)
|
|
$(build-bptimage-target)
|
|
|
|
.PHONY: bptimage-nodeps
|
|
bptimage-nodeps:
|
|
$(build-bptimage-target)
|
|
|
|
endif # BOARD_BPT_INPUT_FILES
|
|
|
|
# -----------------------------------------------------------------
|
|
# cache partition image
|
|
ifdef BUILDING_CACHE_IMAGE
|
|
INTERNAL_CACHEIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_CACHE)/%,$(ALL_DEFAULT_INSTALLED_MODULES))
|
|
|
|
cacheimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,cache)
|
|
BUILT_CACHEIMAGE_TARGET := $(PRODUCT_OUT)/cache.img
|
|
|
|
define build-cacheimage-target
|
|
$(call pretty,"Target cache fs image: $(INSTALLED_CACHEIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_CACHE)
|
|
@mkdir -p $(cacheimage_intermediates) && rm -rf $(cacheimage_intermediates)/cache_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(cacheimage_intermediates)/cache_image_info.txt,cache,skip_fsck=true)
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
build/make/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_CACHE) $(cacheimage_intermediates)/cache_image_info.txt $(INSTALLED_CACHEIMAGE_TARGET) $(TARGET_OUT)
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_CACHEIMAGE_TARGET),$(BOARD_CACHEIMAGE_PARTITION_SIZE))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_CACHEIMAGE_TARGET := $(BUILT_CACHEIMAGE_TARGET)
|
|
$(INSTALLED_CACHEIMAGE_TARGET): $(INTERNAL_USERIMAGES_DEPS) $(INTERNAL_CACHEIMAGE_FILES) $(BUILD_IMAGE_SRCS)
|
|
$(build-cacheimage-target)
|
|
|
|
.PHONY: cacheimage-nodeps
|
|
cacheimage-nodeps: | $(INTERNAL_USERIMAGES_DEPS)
|
|
$(build-cacheimage-target)
|
|
|
|
else # BUILDING_CACHE_IMAGE
|
|
# we need to ignore the broken cache link when doing the rsync
|
|
IGNORE_CACHE_LINK := --exclude=cache
|
|
endif # BUILDING_CACHE_IMAGE
|
|
|
|
# -----------------------------------------------------------------
|
|
# system_other partition image
|
|
ifdef BUILDING_SYSTEM_OTHER_IMAGE
|
|
ifeq ($(BOARD_USES_SYSTEM_OTHER_ODEX),true)
|
|
# Marker file to identify that odex files are installed
|
|
INSTALLED_SYSTEM_OTHER_ODEX_MARKER := $(TARGET_OUT_SYSTEM_OTHER)/system-other-odex-marker
|
|
ALL_DEFAULT_INSTALLED_MODULES += $(INSTALLED_SYSTEM_OTHER_ODEX_MARKER)
|
|
$(INSTALLED_SYSTEM_OTHER_ODEX_MARKER):
|
|
$(hide) touch $@
|
|
endif
|
|
|
|
INTERNAL_SYSTEMOTHERIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_SYSTEM_OTHER)/%,\
|
|
$(ALL_DEFAULT_INSTALLED_MODULES)\
|
|
$(ALL_PDK_FUSION_FILES)) \
|
|
$(PDK_FUSION_SYMLINK_STAMP)
|
|
|
|
# system_other dex files are installed as a side-effect of installing system image files
|
|
INTERNAL_SYSTEMOTHERIMAGE_FILES += $(INTERNAL_SYSTEMIMAGE_FILES)
|
|
|
|
INSTALLED_FILES_FILE_SYSTEMOTHER := $(PRODUCT_OUT)/installed-files-system-other.txt
|
|
INSTALLED_FILES_JSON_SYSTEMOTHER := $(INSTALLED_FILES_FILE_SYSTEMOTHER:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_SYSTEMOTHER): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_SYSTEMOTHER)
|
|
$(INSTALLED_FILES_FILE_SYSTEMOTHER) : $(INTERNAL_SYSTEMOTHERIMAGE_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_OUT_SYSTEM_OTHER) > $(@:.txt=.json)
|
|
$(hide) build/make/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
# Determines partition size for system_other.img.
|
|
ifeq ($(PRODUCT_RETROFIT_DYNAMIC_PARTITIONS),true)
|
|
ifneq ($(filter system,$(BOARD_SUPER_PARTITION_BLOCK_DEVICES)),)
|
|
INTERNAL_SYSTEM_OTHER_PARTITION_SIZE := $(BOARD_SUPER_PARTITION_SYSTEM_DEVICE_SIZE)
|
|
endif
|
|
endif
|
|
|
|
ifndef INTERNAL_SYSTEM_OTHER_PARTITION_SIZE
|
|
INTERNAL_SYSTEM_OTHER_PARTITION_SIZE:= $(BOARD_SYSTEMIMAGE_PARTITION_SIZE)
|
|
endif
|
|
|
|
systemotherimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,system_other)
|
|
BUILT_SYSTEMOTHERIMAGE_TARGET := $(PRODUCT_OUT)/system_other.img
|
|
|
|
# Note that we assert the size is SYSTEMIMAGE_PARTITION_SIZE since this is the 'b' system image.
|
|
define build-systemotherimage-target
|
|
$(call pretty,"Target system_other fs image: $(INSTALLED_SYSTEMOTHERIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_SYSTEM_OTHER)
|
|
@mkdir -p $(systemotherimage_intermediates) && rm -rf $(systemotherimage_intermediates)/system_other_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(systemotherimage_intermediates)/system_other_image_info.txt,system,skip_fsck=true)
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
build/make/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_SYSTEM_OTHER) $(systemotherimage_intermediates)/system_other_image_info.txt $(INSTALLED_SYSTEMOTHERIMAGE_TARGET) $(TARGET_OUT)\
|
|
$(systemotherimage_intermediates)/generated_system_other_image_info.txt
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_SYSTEMOTHERIMAGE_TARGET),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(systemotherimage_intermediates)/generated_system_other_image_info.txt,system_other_size))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_SYSTEMOTHERIMAGE_TARGET := $(BUILT_SYSTEMOTHERIMAGE_TARGET)
|
|
ifneq (true,$(SANITIZE_LITE))
|
|
# Only create system_other when not building the second stage of a SANITIZE_LITE build.
|
|
$(INSTALLED_SYSTEMOTHERIMAGE_TARGET): $(INTERNAL_USERIMAGES_DEPS) $(INTERNAL_SYSTEMOTHERIMAGE_FILES) $(INSTALLED_FILES_FILE_SYSTEMOTHER)
|
|
$(build-systemotherimage-target)
|
|
endif
|
|
|
|
.PHONY: systemotherimage-nodeps
|
|
systemotherimage-nodeps: | $(INTERNAL_USERIMAGES_DEPS)
|
|
$(build-systemotherimage-target)
|
|
|
|
endif # BUILDING_SYSTEM_OTHER_IMAGE
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
# vendor partition image
|
|
ifdef BUILDING_VENDOR_IMAGE
|
|
INTERNAL_VENDORIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_VENDOR)/%,\
|
|
$(ALL_DEFAULT_INSTALLED_MODULES)\
|
|
$(ALL_PDK_FUSION_FILES)) \
|
|
$(PDK_FUSION_SYMLINK_STAMP)
|
|
|
|
# Final Vendor VINTF manifest including fragments. This is not assembled
|
|
# on the device because it depends on everything in a given device
|
|
# image which defines a vintf_fragment.
|
|
ifdef BUILT_VENDOR_MANIFEST
|
|
BUILT_ASSEMBLED_VENDOR_MANIFEST := $(PRODUCT_OUT)/verified_assembled_vendor_manifest.xml
|
|
ifeq (true,$(strip $(PRODUCT_ENFORCE_VINTF_MANIFEST)))
|
|
ifneq ($(strip $(DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE) $(DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE)),)
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): PRIVATE_SYSTEM_ASSEMBLE_VINTF_ENV_VARS := VINTF_ENFORCE_NO_UNUSED_HALS=true
|
|
endif # DEVICE_FRAMEWORK_COMPATIBILITY_MATRIX_FILE or DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE
|
|
endif # PRODUCT_ENFORCE_VINTF_MANIFEST
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): $(HOST_OUT_EXECUTABLES)/assemble_vintf
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): $(BUILT_SYSTEM_MATRIX)
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): $(BUILT_VENDOR_MANIFEST)
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): $(INTERNAL_VENDORIMAGE_FILES)
|
|
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): PRIVATE_FLAGS :=
|
|
|
|
# -- Kernel version and configurations.
|
|
ifeq ($(PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS),true)
|
|
|
|
# BOARD_KERNEL_CONFIG_FILE and BOARD_KERNEL_VERSION can be used to override the values extracted
|
|
# from INSTALLED_KERNEL_TARGET.
|
|
ifdef BOARD_KERNEL_CONFIG_FILE
|
|
ifdef BOARD_KERNEL_VERSION
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): $(BOARD_KERNEL_CONFIG_FILE)
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): PRIVATE_FLAGS += --kernel $(BOARD_KERNEL_VERSION):$(BOARD_KERNEL_CONFIG_FILE)
|
|
my_board_extracted_kernel := true
|
|
endif # BOARD_KERNEL_VERSION
|
|
endif # BOARD_KERNEL_CONFIG_FILE
|
|
|
|
ifneq ($(my_board_extracted_kernel),true)
|
|
ifndef INSTALLED_KERNEL_TARGET
|
|
$(warning No INSTALLED_KERNEL_TARGET is defined when PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS \
|
|
is true. Information about the updated kernel cannot be built into OTA update package. \
|
|
You can fix this by: (1) setting TARGET_NO_KERNEL to false and installing the built kernel \
|
|
to $(PRODUCT_OUT)/kernel, so that kernel information will be extracted from the built kernel; \
|
|
or (2) extracting kernel configuration and defining BOARD_KERNEL_CONFIG_FILE and \
|
|
BOARD_KERNEL_VERSION manually; or (3) unsetting PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS \
|
|
manually.)
|
|
else
|
|
intermediates := $(call intermediates-dir-for,ETC,$(notdir $(BUILT_ASSEMBLED_VENDOR_MANIFEST)))
|
|
|
|
# Tools for decompression that is not in PATH.
|
|
# Check $(EXTRACT_KERNEL) for decompression algorithms supported by the script.
|
|
# Algorithms that are in the script but not in this list will be found in PATH.
|
|
my_decompress_tools := \
|
|
lz4:$(HOST_OUT_EXECUTABLES)/lz4 \
|
|
|
|
my_kernel_configs := $(intermediates)/kernel_configs.txt
|
|
my_kernel_version := $(intermediates)/kernel_version.txt
|
|
$(my_kernel_configs): .KATI_IMPLICIT_OUTPUTS := $(my_kernel_version)
|
|
$(my_kernel_configs): PRIVATE_KERNEL_VERSION_FILE := $(my_kernel_version)
|
|
$(my_kernel_configs): PRIVATE_DECOMPRESS_TOOLS := $(my_decompress_tools)
|
|
$(my_kernel_configs): $(foreach pair,$(my_decompress_tools),$(call word-colon,2,$(pair)))
|
|
$(my_kernel_configs): $(EXTRACT_KERNEL) $(INSTALLED_KERNEL_TARGET)
|
|
$< --tools $(PRIVATE_DECOMPRESS_TOOLS) --input $(INSTALLED_KERNEL_TARGET) \
|
|
--output-configs $@ \
|
|
--output-version $(PRIVATE_KERNEL_VERSION_FILE)
|
|
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): $(my_kernel_configs) $(my_kernel_version)
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST): PRIVATE_FLAGS += --kernel $$(cat $(my_kernel_version)):$(my_kernel_configs)
|
|
|
|
intermediates :=
|
|
my_kernel_configs :=
|
|
my_kernel_version :=
|
|
my_decompress_tools :=
|
|
|
|
endif # my_board_extracted_kernel
|
|
my_board_extracted_kernel :=
|
|
|
|
endif # INSTALLED_KERNEL_TARGET
|
|
endif # PRODUCT_OTA_ENFORCE_VINTF_KERNEL_REQUIREMENTS
|
|
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST):
|
|
@echo "Verifying vendor VINTF manifest."
|
|
PRODUCT_ENFORCE_VINTF_MANIFEST=$(PRODUCT_ENFORCE_VINTF_MANIFEST) \
|
|
$(PRIVATE_SYSTEM_ASSEMBLE_VINTF_ENV_VARS) \
|
|
$(HOST_OUT_EXECUTABLES)/assemble_vintf \
|
|
$(PRIVATE_FLAGS) \
|
|
-c $(BUILT_SYSTEM_MATRIX) \
|
|
-i $(BUILT_VENDOR_MANIFEST) \
|
|
$$([ -d $(TARGET_OUT_VENDOR)/etc/vintf/manifest ] && \
|
|
find $(TARGET_OUT_VENDOR)/etc/vintf/manifest -type f -name "*.xml" | \
|
|
sed "s/^/-i /" | tr '\n' ' ') -o $@
|
|
endif # BUILT_VENDOR_MANIFEST
|
|
|
|
# platform.zip depends on $(INTERNAL_VENDORIMAGE_FILES).
|
|
$(INSTALLED_PLATFORM_ZIP) : $(INTERNAL_VENDORIMAGE_FILES)
|
|
|
|
INSTALLED_FILES_FILE_VENDOR := $(PRODUCT_OUT)/installed-files-vendor.txt
|
|
INSTALLED_FILES_JSON_VENDOR := $(INSTALLED_FILES_FILE_VENDOR:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_VENDOR): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_VENDOR)
|
|
$(INSTALLED_FILES_FILE_VENDOR) : $(INTERNAL_VENDORIMAGE_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_OUT_VENDOR) > $(@:.txt=.json)
|
|
$(hide) build/make/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
vendorimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,vendor)
|
|
BUILT_VENDORIMAGE_TARGET := $(PRODUCT_OUT)/vendor.img
|
|
define build-vendorimage-target
|
|
$(call pretty,"Target vendor fs image: $(INSTALLED_VENDORIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_VENDOR)
|
|
$(call create-vendor-odm-symlink)
|
|
@mkdir -p $(vendorimage_intermediates) && rm -rf $(vendorimage_intermediates)/vendor_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(vendorimage_intermediates)/vendor_image_info.txt,vendor,skip_fsck=true)
|
|
$(if $(BOARD_VENDOR_KERNEL_MODULES), \
|
|
$(call build-image-kernel-modules,$(BOARD_VENDOR_KERNEL_MODULES),$(TARGET_OUT_VENDOR),vendor/,$(call intermediates-dir-for,PACKAGING,depmod_vendor)))
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
build/make/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_VENDOR) $(vendorimage_intermediates)/vendor_image_info.txt $(INSTALLED_VENDORIMAGE_TARGET) $(TARGET_OUT) \
|
|
$(vendorimage_intermediates)/generated_vendor_image_info.txt
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_VENDORIMAGE_TARGET),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(vendorimage_intermediates)/generated_vendor_image_info.txt,vendor_size))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_VENDORIMAGE_TARGET := $(BUILT_VENDORIMAGE_TARGET)
|
|
ifdef BUILT_VENDOR_MANIFEST
|
|
$(INSTALLED_VENDORIMAGE_TARGET): $(BUILT_ASSEMBLED_VENDOR_MANIFEST)
|
|
endif
|
|
$(INSTALLED_VENDORIMAGE_TARGET): $(INTERNAL_USERIMAGES_DEPS) $(INTERNAL_VENDORIMAGE_FILES) $(INSTALLED_FILES_FILE_VENDOR) $(BUILD_IMAGE_SRCS) $(DEPMOD) $(BOARD_VENDOR_KERNEL_MODULES)
|
|
$(build-vendorimage-target)
|
|
|
|
.PHONY: vendorimage-nodeps vnod
|
|
vendorimage-nodeps vnod: | $(INTERNAL_USERIMAGES_DEPS) $(DEPMOD)
|
|
$(build-vendorimage-target)
|
|
|
|
sync: $(INTERNAL_VENDORIMAGE_FILES)
|
|
|
|
else ifdef BOARD_PREBUILT_VENDORIMAGE
|
|
INSTALLED_VENDORIMAGE_TARGET := $(PRODUCT_OUT)/vendor.img
|
|
$(eval $(call copy-one-file,$(BOARD_PREBUILT_VENDORIMAGE),$(INSTALLED_VENDORIMAGE_TARGET)))
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# product partition image
|
|
ifdef BUILDING_PRODUCT_IMAGE
|
|
INTERNAL_PRODUCTIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_PRODUCT)/%,\
|
|
$(ALL_DEFAULT_INSTALLED_MODULES)\
|
|
$(ALL_PDK_FUSION_FILES)) \
|
|
$(PDK_FUSION_SYMLINK_STAMP)
|
|
|
|
# platform.zip depends on $(INTERNAL_PRODUCTIMAGE_FILES).
|
|
$(INSTALLED_PLATFORM_ZIP) : $(INTERNAL_PRODUCTIMAGE_FILES)
|
|
|
|
INSTALLED_FILES_FILE_PRODUCT := $(PRODUCT_OUT)/installed-files-product.txt
|
|
INSTALLED_FILES_JSON_PRODUCT := $(INSTALLED_FILES_FILE_PRODUCT:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_PRODUCT): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_PRODUCT)
|
|
$(INSTALLED_FILES_FILE_PRODUCT) : $(INTERNAL_PRODUCTIMAGE_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_OUT_PRODUCT) > $(@:.txt=.json)
|
|
$(hide) build/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
productimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,product)
|
|
BUILT_PRODUCTIMAGE_TARGET := $(PRODUCT_OUT)/product.img
|
|
define build-productimage-target
|
|
$(call pretty,"Target product fs image: $(INSTALLED_PRODUCTIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_PRODUCT)
|
|
@mkdir -p $(productimage_intermediates) && rm -rf $(productimage_intermediates)/product_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(productimage_intermediates)/product_image_info.txt,product,skip_fsck=true)
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
./build/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_PRODUCT) $(productimage_intermediates)/product_image_info.txt $(INSTALLED_PRODUCTIMAGE_TARGET) $(TARGET_OUT) \
|
|
$(productimage_intermediates)/generated_product_image_info.txt
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_PRODUCTIMAGE_TARGET),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(productimage_intermediates)/generated_product_image_info.txt,product_size))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_PRODUCTIMAGE_TARGET := $(BUILT_PRODUCTIMAGE_TARGET)
|
|
$(INSTALLED_PRODUCTIMAGE_TARGET): $(INTERNAL_USERIMAGES_DEPS) $(INTERNAL_PRODUCTIMAGE_FILES) $(INSTALLED_FILES_FILE_PRODUCT) $(BUILD_IMAGE_SRCS)
|
|
$(build-productimage-target)
|
|
|
|
.PHONY: productimage-nodeps pnod
|
|
productimage-nodeps pnod: | $(INTERNAL_USERIMAGES_DEPS)
|
|
$(build-productimage-target)
|
|
|
|
sync: $(INTERNAL_PRODUCTIMAGE_FILES)
|
|
|
|
else ifdef BOARD_PREBUILT_PRODUCTIMAGE
|
|
INSTALLED_PRODUCTIMAGE_TARGET := $(PRODUCT_OUT)/product.img
|
|
$(eval $(call copy-one-file,$(BOARD_PREBUILT_PRODUCTIMAGE),$(INSTALLED_PRODUCTIMAGE_TARGET)))
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# product_services partition image
|
|
ifdef BUILDING_PRODUCT_SERVICES_IMAGE
|
|
INTERNAL_PRODUCT_SERVICESIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_PRODUCT_SERVICES)/%,\
|
|
$(ALL_DEFAULT_INSTALLED_MODULES)\
|
|
$(ALL_PDK_FUSION_FILES)) \
|
|
$(PDK_FUSION_SYMLINK_STAMP)
|
|
|
|
# platform.zip depends on $(INTERNAL_PRODUCT_SERVICESIMAGE_FILES).
|
|
$(INSTALLED_PLATFORM_ZIP) : $(INTERNAL_PRODUCT_SERVICESIMAGE_FILES)
|
|
|
|
INSTALLED_FILES_FILE_PRODUCT_SERVICES := $(PRODUCT_OUT)/installed-files-product_services.txt
|
|
INSTALLED_FILES_JSON_PRODUCT_SERVICES := $(INSTALLED_FILES_FILE_PRODUCT_SERVICES:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_PRODUCT_SERVICES): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_PRODUCT_SERVICES)
|
|
$(INSTALLED_FILES_FILE_PRODUCT_SERVICES) : $(INTERNAL_PRODUCT_SERVICESIMAGE_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_OUT_PRODUCT_SERVICES) > $(@:.txt=.json)
|
|
$(hide) build/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
product_servicesimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,product_services)
|
|
BUILT_PRODUCT_SERVICESIMAGE_TARGET := $(PRODUCT_OUT)/product_services.img
|
|
define build-product_servicesimage-target
|
|
$(call pretty,"Target product_services fs image: $(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_PRODUCT_SERVICES)
|
|
@mkdir -p $(product_servicesimage_intermediates) && rm -rf $(product_servicesimage_intermediates)/product_services_image_info.txt
|
|
$(call generate-image-prop-dictionary, $(product_servicesimage_intermediates)/product_services_image_info.txt,product_services, skip_fsck=true)
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
./build/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_PRODUCT_SERVICES) $(product_servicesimage_intermediates)/product_services_image_info.txt $(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) $(TARGET_OUT) \
|
|
$(product_servicesimage_intermediates)/generated_product_services_image_info.txt
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(product_servicesimage_intermediates)/generated_product_services_image_info.txt,product_services_size))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_PRODUCT_SERVICESIMAGE_TARGET := $(BUILT_PRODUCT_SERVICESIMAGE_TARGET)
|
|
$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET): $(INTERNAL_USERIMAGES_DEPS) $(INTERNAL_PRODUCT_SERVICESIMAGE_FILES) $(INSTALLED_FILES_FILE_PRODUCT_SERVICES) $(BUILD_IMAGE_SRCS)
|
|
$(build-product_servicesimage-target)
|
|
|
|
.PHONY: productservicesimage-nodeps psnod
|
|
productservicesimage-nodeps psnod: | $(INTERNAL_USERIMAGES_DEPS)
|
|
$(build-product_servicesimage-target)
|
|
|
|
sync: $(INTERNAL_PRODUCT_SERVICESIMAGE_FILES)
|
|
|
|
else ifdef BOARD_PREBUILT_PRODUCT_SERVICESIMAGE
|
|
INSTALLED_PRODUCT_SERVICESIMAGE_TARGET := $(PRODUCT_OUT)/product_services.img
|
|
$(eval $(call copy-one-file,$(BOARD_PREBUILT_PRODUCT_SERVICESIMAGE),$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET)))
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# odm partition image
|
|
ifdef BUILDING_ODM_IMAGE
|
|
INTERNAL_ODMIMAGE_FILES := \
|
|
$(filter $(TARGET_OUT_ODM)/%,\
|
|
$(ALL_DEFAULT_INSTALLED_MODULES)\
|
|
$(ALL_PDK_FUSION_FILES)) \
|
|
$(PDK_FUSION_SYMLINK_STAMP)
|
|
# platform.zip depends on $(INTERNAL_ODMIMAGE_FILES).
|
|
$(INSTALLED_PLATFORM_ZIP) : $(INTERNAL_ODMIMAGE_FILES)
|
|
|
|
INSTALLED_FILES_FILE_ODM := $(PRODUCT_OUT)/installed-files-odm.txt
|
|
INSTALLED_FILES_JSON_ODM := $(INSTALLED_FILES_FILE_ODM:.txt=.json)
|
|
$(INSTALLED_FILES_FILE_ODM): .KATI_IMPLICIT_OUTPUTS := $(INSTALLED_FILES_JSON_ODM)
|
|
$(INSTALLED_FILES_FILE_ODM) : $(INTERNAL_ODMIMAGE_FILES) $(FILESLIST)
|
|
@echo Installed file list: $@
|
|
@mkdir -p $(dir $@)
|
|
@rm -f $@
|
|
$(hide) $(FILESLIST) $(TARGET_OUT_ODM) > $(@:.txt=.json)
|
|
$(hide) build/tools/fileslist_util.py -c $(@:.txt=.json) > $@
|
|
|
|
odmimage_intermediates := \
|
|
$(call intermediates-dir-for,PACKAGING,odm)
|
|
BUILT_ODMIMAGE_TARGET := $(PRODUCT_OUT)/odm.img
|
|
define build-odmimage-target
|
|
$(call pretty,"Target odm fs image: $(INSTALLED_ODMIMAGE_TARGET)")
|
|
@mkdir -p $(TARGET_OUT_ODM)
|
|
@mkdir -p $(odmimage_intermediates) && rm -rf $(odmimage_intermediates)/odm_image_info.txt
|
|
$(call generate-userimage-prop-dictionary, $(odmimage_intermediates)/odm_image_info.txt, skip_fsck=true)
|
|
$(if $(BOARD_ODM_KERNEL_MODULES), \
|
|
$(call build-image-kernel-modules,$(BOARD_ODM_KERNEL_MODULES),$(TARGET_OUT_ODM),odm/,$(call intermediates-dir-for,PACKAGING,depmod_odm)))
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH \
|
|
./build/tools/releasetools/build_image.py \
|
|
$(TARGET_OUT_ODM) $(odmimage_intermediates)/odm_image_info.txt $(INSTALLED_ODMIMAGE_TARGET) $(TARGET_OUT) \
|
|
$(odmimage_intermediates)/generated_odm_image_info.txt
|
|
$(hide) $(call assert-max-image-size,$(INSTALLED_ODMIMAGE_TARGET),\
|
|
$(call read-image-prop-dictionary,\
|
|
$(odmimage_intermediates)/generated_odm_image_info.txt,odm_size))
|
|
endef
|
|
|
|
# We just build this directly to the install location.
|
|
INSTALLED_ODMIMAGE_TARGET := $(BUILT_ODMIMAGE_TARGET)
|
|
$(INSTALLED_ODMIMAGE_TARGET): $(INTERNAL_USERIMAGES_DEPS) $(INTERNAL_ODMIMAGE_FILES) $(INSTALLED_FILES_FILE_ODM) $(BUILD_IMAGE_SRCS) $(DEPMOD) $(BOARD_ODM_KERNEL_MODULES)
|
|
$(build-odmimage-target)
|
|
|
|
.PHONY: odmimage-nodeps onod
|
|
odmimage-nodeps onod: | $(INTERNAL_USERIMAGES_DEPS) $(DEPMOD)
|
|
$(build-odmimage-target)
|
|
|
|
sync: $(INTERNAL_ODMIMAGE_FILES)
|
|
|
|
else ifdef BOARD_PREBUILT_ODMIMAGE
|
|
INSTALLED_ODMIMAGE_TARGET := $(PRODUCT_OUT)/odm.img
|
|
$(eval $(call copy-one-file,$(BOARD_PREBUILT_ODMIMAGE),$(INSTALLED_ODMIMAGE_TARGET)))
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# dtbo image
|
|
ifdef BOARD_PREBUILT_DTBOIMAGE
|
|
INSTALLED_DTBOIMAGE_TARGET := $(PRODUCT_OUT)/dtbo.img
|
|
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
$(INSTALLED_DTBOIMAGE_TARGET): $(BOARD_PREBUILT_DTBOIMAGE) $(AVBTOOL) $(BOARD_AVB_DTBO_KEY_PATH)
|
|
cp $(BOARD_PREBUILT_DTBOIMAGE) $@
|
|
$(AVBTOOL) add_hash_footer \
|
|
--image $@ \
|
|
--partition_size $(BOARD_DTBOIMG_PARTITION_SIZE) \
|
|
--partition_name dtbo $(INTERNAL_AVB_DTBO_SIGNING_ARGS) \
|
|
$(BOARD_AVB_DTBO_ADD_HASH_FOOTER_ARGS)
|
|
else
|
|
$(INSTALLED_DTBOIMAGE_TARGET): $(BOARD_PREBUILT_DTBOIMAGE)
|
|
cp $(BOARD_PREBUILT_DTBOIMAGE) $@
|
|
endif
|
|
|
|
endif # BOARD_PREBUILT_DTBOIMAGE
|
|
|
|
# Returns a list of image targets corresponding to the given list of partitions. For example, it
|
|
# returns "$(INSTALLED_PRODUCTIMAGE_TARGET)" for "product", or "$(INSTALLED_SYSTEMIMAGE_TARGET)
|
|
# $(INSTALLED_VENDORIMAGE_TARGET)" for "system vendor".
|
|
# (1): list of partitions like "system", "vendor" or "system product product_services".
|
|
define images-for-partitions
|
|
$(strip $(foreach item,$(1),$(INSTALLED_$(call to-upper,$(item))IMAGE_TARGET)))
|
|
endef
|
|
|
|
# -----------------------------------------------------------------
|
|
# vbmeta image
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
|
|
BUILT_VBMETAIMAGE_TARGET := $(PRODUCT_OUT)/vbmeta.img
|
|
AVB_CHAIN_KEY_DIR := $(TARGET_OUT_INTERMEDIATES)/avb_chain_keys
|
|
|
|
ifdef BOARD_AVB_KEY_PATH
|
|
$(if $(BOARD_AVB_ALGORITHM),,$(error BOARD_AVB_ALGORITHM is not defined))
|
|
else
|
|
# If key path isn't specified, use the 4096-bit test key.
|
|
BOARD_AVB_ALGORITHM := SHA256_RSA4096
|
|
BOARD_AVB_KEY_PATH := external/avb/test/data/testkey_rsa4096.pem
|
|
endif
|
|
|
|
# AVB signing for system_other.img.
|
|
ifdef BUILDING_SYSTEM_OTHER_IMAGE
|
|
ifdef BOARD_AVB_SYSTEM_OTHER_KEY_PATH
|
|
$(if $(BOARD_AVB_SYSTEM_OTHER_ALGORITHM),,$(error BOARD_AVB_SYSTEM_OTHER_ALGORITHM is not defined))
|
|
else
|
|
# If key path isn't specified, use the same key as BOARD_AVB_KEY_PATH.
|
|
BOARD_AVB_SYSTEM_OTHER_KEY_PATH := $(BOARD_AVB_KEY_PATH)
|
|
BOARD_AVB_SYSTEM_OTHER_ALGORITHM := $(BOARD_AVB_ALGORITHM)
|
|
endif
|
|
|
|
$(INSTALLED_PRODUCT_SYSTEM_OTHER_AVBKEY_TARGET): $(AVBTOOL) $(BOARD_AVB_SYSTEM_OTHER_KEY_PATH)
|
|
@echo Extracting system_other avb key: $@
|
|
@rm -f $@
|
|
@mkdir -p $(dir $@)
|
|
$(AVBTOOL) extract_public_key --key $(BOARD_AVB_SYSTEM_OTHER_KEY_PATH) --output $@
|
|
|
|
ifndef BOARD_AVB_SYSTEM_OTHER_ROLLBACK_INDEX
|
|
BOARD_AVB_SYSTEM_OTHER_ROLLBACK_INDEX := $(PLATFORM_SECURITY_PATCH_TIMESTAMP)
|
|
endif
|
|
|
|
BOARD_AVB_SYSTEM_OTHER_ADD_HASHTREE_FOOTER_ARGS += --rollback_index $(BOARD_AVB_SYSTEM_OTHER_ROLLBACK_INDEX)
|
|
endif # end of AVB for BUILDING_SYSTEM_OTHER_IMAGE
|
|
|
|
INTERNAL_AVB_PARTITIONS_IN_CHAINED_VBMETA_IMAGES := \
|
|
$(BOARD_AVB_VBMETA_SYSTEM) \
|
|
$(BOARD_AVB_VBMETA_VENDOR)
|
|
|
|
# Not allowing the same partition to appear in multiple groups.
|
|
ifneq ($(words $(sort $(INTERNAL_AVB_PARTITIONS_IN_CHAINED_VBMETA_IMAGES))),$(words $(INTERNAL_AVB_PARTITIONS_IN_CHAINED_VBMETA_IMAGES)))
|
|
$(error BOARD_AVB_VBMETA_SYSTEM and BOARD_AVB_VBMETA_VENDOR cannot have duplicates)
|
|
endif
|
|
|
|
# Appends security patch level as a AVB property descriptor
|
|
|
|
BOARD_AVB_SYSTEM_ADD_HASHTREE_FOOTER_ARGS += \
|
|
--prop com.android.build.system.security_patch:$(PLATFORM_SECURITY_PATCH)
|
|
|
|
BOARD_AVB_PRODUCT_ADD_HASHTREE_FOOTER_ARGS += \
|
|
--prop com.android.build.product.security_patch:$(PLATFORM_SECURITY_PATCH)
|
|
|
|
BOARD_AVB_PRODUCT_SERVICES_ADD_HASHTREE_FOOTER_ARGS += \
|
|
--prop com.android.build.product_services.security_patch:$(PLATFORM_SECURITY_PATCH)
|
|
|
|
# The following vendor- and odm-specific images needs explicitly set per board.
|
|
ifdef BOOT_SECURITY_PATCH
|
|
BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS += \
|
|
--prop com.android.build.boot.security_patch:$(BOOT_SECURITY_PATCH)
|
|
endif
|
|
|
|
ifdef VENDOR_SECURITY_PATCH
|
|
BOARD_AVB_VENDOR_ADD_HASHTREE_FOOTER_ARGS += \
|
|
--prop com.android.build.vendor.security_patch:$(VENDOR_SECURITY_PATCH)
|
|
endif
|
|
|
|
ifdef ODM_SECURITY_PATCH
|
|
BOARD_AVB_ODM_ADD_HASHTREE_FOOTER_ARGS += \
|
|
--prop com.android.build.odm.security_patch:$(ODM_SECURITY_PATCH)
|
|
endif
|
|
|
|
BOOT_FOOTER_ARGS := BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS
|
|
DTBO_FOOTER_ARGS := BOARD_AVB_DTBO_ADD_HASH_FOOTER_ARGS
|
|
SYSTEM_FOOTER_ARGS := BOARD_AVB_SYSTEM_ADD_HASHTREE_FOOTER_ARGS
|
|
VENDOR_FOOTER_ARGS := BOARD_AVB_VENDOR_ADD_HASHTREE_FOOTER_ARGS
|
|
RECOVERY_FOOTER_ARGS := BOARD_AVB_RECOVERY_ADD_HASH_FOOTER_ARGS
|
|
PRODUCT_FOOTER_ARGS := BOARD_AVB_PRODUCT_ADD_HASHTREE_FOOTER_ARGS
|
|
PRODUCT_SERVICES_FOOTER_ARGS := BOARD_AVB_PRODUCT_SERVICES_ADD_HASHTREE_FOOTER_ARGS
|
|
ODM_FOOTER_ARGS := BOARD_AVB_ODM_ADD_HASHTREE_FOOTER_ARGS
|
|
|
|
# Helper function that checks and sets required build variables for an AVB chained partition.
|
|
# $(1): the partition to enable AVB chain, e.g., boot or system or vbmeta_system.
|
|
define _check-and-set-avb-chain-args
|
|
$(eval part := $(1))
|
|
$(eval PART=$(call to-upper,$(part)))
|
|
|
|
$(eval _key_path := BOARD_AVB_$(PART)_KEY_PATH)
|
|
$(eval _signing_algorithm := BOARD_AVB_$(PART)_ALGORITHM)
|
|
$(eval _rollback_index := BOARD_AVB_$(PART)_ROLLBACK_INDEX)
|
|
$(eval _rollback_index_location := BOARD_AVB_$(PART)_ROLLBACK_INDEX_LOCATION)
|
|
$(if $($(_key_path)),,$(error $(_key_path) is not defined))
|
|
$(if $($(_signing_algorithm)),,$(error $(_signing_algorithm) is not defined))
|
|
$(if $($(_rollback_index)),,$(error $(_rollback_index) is not defined))
|
|
$(if $($(_rollback_index_location)),,$(error $(_rollback_index_location) is not defined))
|
|
|
|
# Set INTERNAL_AVB_(PART)_SIGNING_ARGS
|
|
$(eval _signing_args := INTERNAL_AVB_$(PART)_SIGNING_ARGS)
|
|
$(eval $(_signing_args) := \
|
|
--algorithm $($(_signing_algorithm)) --key $($(_key_path)))
|
|
|
|
$(eval INTERNAL_AVB_MAKE_VBMETA_IMAGE_ARGS += \
|
|
--chain_partition $(part):$($(_rollback_index_location)):$(AVB_CHAIN_KEY_DIR)/$(part).avbpubkey)
|
|
|
|
# Set rollback_index via footer args for non-chained vbmeta image. Chained vbmeta image will pick up
|
|
# the index via a separate flag (e.g. BOARD_AVB_VBMETA_SYSTEM_ROLLBACK_INDEX).
|
|
$(if $(filter $(part),$(part:vbmeta_%=%)),\
|
|
$(eval _footer_args := $(PART)_FOOTER_ARGS) \
|
|
$(eval $($(_footer_args)) += --rollback_index $($(_rollback_index))))
|
|
endef
|
|
|
|
# Checks and sets the required build variables for an AVB partition. The partition will be
|
|
# configured as a chained partition, if BOARD_AVB_<partition>_KEY_PATH is defined. Otherwise the
|
|
# image descriptor will be included into vbmeta.img, unless it has been already added to any chained
|
|
# VBMeta image.
|
|
# $(1): Partition name, e.g. boot or system.
|
|
define check-and-set-avb-args
|
|
$(eval _in_chained_vbmeta := $(filter $(1),$(INTERNAL_AVB_PARTITIONS_IN_CHAINED_VBMETA_IMAGES)))
|
|
$(if $(BOARD_AVB_$(call to-upper,$(1))_KEY_PATH),\
|
|
$(if $(_in_chained_vbmeta),\
|
|
$(error Chaining partition "$(1)" in chained VBMeta image is not supported)) \
|
|
$(call _check-and-set-avb-chain-args,$(1)),\
|
|
$(if $(_in_chained_vbmeta),,\
|
|
$(eval INTERNAL_AVB_MAKE_VBMETA_IMAGE_ARGS += \
|
|
--include_descriptors_from_image $(call images-for-partitions,$(1)))))
|
|
endef
|
|
|
|
ifdef INSTALLED_BOOTIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,boot))
|
|
endif
|
|
|
|
$(eval $(call check-and-set-avb-args,system))
|
|
|
|
ifdef INSTALLED_VENDORIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,vendor))
|
|
endif
|
|
|
|
ifdef INSTALLED_PRODUCTIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,product))
|
|
endif
|
|
|
|
ifdef INSTALLED_PRODUCT_SERVICESIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,product_services))
|
|
endif
|
|
|
|
ifdef INSTALLED_ODMIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,odm))
|
|
endif
|
|
|
|
ifdef INSTALLED_DTBOIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,dtbo))
|
|
endif
|
|
|
|
ifdef INSTALLED_RECOVERYIMAGE_TARGET
|
|
$(eval $(call check-and-set-avb-args,recovery))
|
|
endif
|
|
|
|
# Not using INSTALLED_VBMETA_SYSTEMIMAGE_TARGET as it won't be set yet.
|
|
ifdef BOARD_AVB_VBMETA_SYSTEM
|
|
$(eval $(call check-and-set-avb-args,vbmeta_system))
|
|
endif
|
|
|
|
ifdef BOARD_AVB_VBMETA_VENDOR
|
|
$(eval $(call check-and-set-avb-args,vbmeta_vendor))
|
|
endif
|
|
|
|
# Add kernel cmdline descriptor for kernel to mount system.img as root with
|
|
# dm-verity. This works when system.img is either chained or not-chained:
|
|
# - chained: The --setup_as_rootfs_from_kernel option will add dm-verity kernel
|
|
# cmdline descriptor to system.img
|
|
# - not-chained: The --include_descriptors_from_image option for make_vbmeta_image
|
|
# will include the kernel cmdline descriptor from system.img into vbmeta.img
|
|
ifeq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
ifeq ($(filter system, $(BOARD_SUPER_PARTITION_PARTITION_LIST)),)
|
|
BOARD_AVB_SYSTEM_ADD_HASHTREE_FOOTER_ARGS += --setup_as_rootfs_from_kernel
|
|
endif
|
|
endif
|
|
|
|
BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS += --padding_size 4096
|
|
BOARD_AVB_MAKE_VBMETA_SYSTEM_IMAGE_ARGS += --padding_size 4096
|
|
BOARD_AVB_MAKE_VBMETA_VENDOR_IMAGE_ARGS += --padding_size 4096
|
|
|
|
ifeq (eng,$(filter eng, $(TARGET_BUILD_VARIANT)))
|
|
# We only need the flag in top-level vbmeta.img.
|
|
BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS += --set_hashtree_disabled_flag
|
|
endif
|
|
|
|
ifdef BOARD_AVB_ROLLBACK_INDEX
|
|
BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS += --rollback_index $(BOARD_AVB_ROLLBACK_INDEX)
|
|
endif
|
|
|
|
ifdef BOARD_AVB_VBMETA_SYSTEM_ROLLBACK_INDEX
|
|
BOARD_AVB_MAKE_VBMETA_SYSTEM_IMAGE_ARGS += \
|
|
--rollback_index $(BOARD_AVB_VBMETA_SYSTEM_ROLLBACK_INDEX)
|
|
endif
|
|
|
|
ifdef BOARD_AVB_VBMETA_VENDOR_ROLLBACK_INDEX
|
|
BOARD_AVB_MAKE_VBMETA_VENDOR_IMAGE_ARGS += \
|
|
--rollback_index $(BOARD_AVB_VBMETA_VENDOR_ROLLBACK_INDEX)
|
|
endif
|
|
|
|
# $(1): the directory to extract public keys to
|
|
define extract-avb-chain-public-keys
|
|
$(if $(BOARD_AVB_BOOT_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_BOOT_KEY_PATH) \
|
|
--output $(1)/boot.avbpubkey)
|
|
$(if $(BOARD_AVB_SYSTEM_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_SYSTEM_KEY_PATH) \
|
|
--output $(1)/system.avbpubkey)
|
|
$(if $(BOARD_AVB_VENDOR_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_VENDOR_KEY_PATH) \
|
|
--output $(1)/vendor.avbpubkey)
|
|
$(if $(BOARD_AVB_PRODUCT_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_PRODUCT_KEY_PATH) \
|
|
--output $(1)/product.avbpubkey)
|
|
$(if $(BOARD_AVB_PRODUCT_SERVICES_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_PRODUCT_SERVICES_KEY_PATH) \
|
|
--output $(1)/product_services.avbpubkey)
|
|
$(if $(BOARD_AVB_ODM_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_ODM_KEY_PATH) \
|
|
--output $(1)/odm.avbpubkey)
|
|
$(if $(BOARD_AVB_DTBO_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_DTBO_KEY_PATH) \
|
|
--output $(1)/dtbo.avbpubkey)
|
|
$(if $(BOARD_AVB_RECOVERY_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_RECOVERY_KEY_PATH) \
|
|
--output $(1)/recovery.avbpubkey)
|
|
$(if $(BOARD_AVB_VBMETA_SYSTEM_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_VBMETA_SYSTEM_KEY_PATH) \
|
|
--output $(1)/vbmeta_system.avbpubkey)
|
|
$(if $(BOARD_AVB_VBMETA_VENDOR_KEY_PATH),\
|
|
$(hide) $(AVBTOOL) extract_public_key --key $(BOARD_AVB_VBMETA_VENDOR_KEY_PATH) \
|
|
--output $(1)/vbmeta_vendor.avbpubkey)
|
|
endef
|
|
|
|
# Builds a chained VBMeta image. This VBMeta image will contain the descriptors for the partitions
|
|
# specified in BOARD_AVB_VBMETA_<NAME>. The built VBMeta image will be included into the top-level
|
|
# vbmeta image as a chained partition. For example, if a target defines `BOARD_AVB_VBMETA_SYSTEM
|
|
# := system product_services`, `vbmeta_system.img` will be created that includes the descriptors
|
|
# for `system.img` and `product_services.img`. `vbmeta_system.img` itself will be included into
|
|
# `vbmeta.img` as a chained partition.
|
|
# $(1): VBMeta image name, such as "vbmeta_system", "vbmeta_vendor" etc.
|
|
# $(2): Output filename.
|
|
define build-chained-vbmeta-image
|
|
$(call pretty,"Target chained vbmeta image: $@")
|
|
$(hide) $(AVBTOOL) make_vbmeta_image \
|
|
$(INTERNAL_AVB_$(call to-upper,$(1))_SIGNING_ARGS) \
|
|
$(BOARD_AVB_MAKE_$(call to-upper,$(1))_IMAGE_ARGS) \
|
|
$(foreach image,$(BOARD_AVB_$(call to-upper,$(1))), \
|
|
--include_descriptors_from_image $(call images-for-partitions,$(image))) \
|
|
--output $@
|
|
endef
|
|
|
|
ifdef BOARD_AVB_VBMETA_SYSTEM
|
|
INSTALLED_VBMETA_SYSTEMIMAGE_TARGET := $(PRODUCT_OUT)/vbmeta_system.img
|
|
$(INSTALLED_VBMETA_SYSTEMIMAGE_TARGET): \
|
|
$(AVBTOOL) \
|
|
$(call images-for-partitions,$(BOARD_AVB_VBMETA_SYSTEM)) \
|
|
$(BOARD_AVB_VBMETA_SYSTEM_KEY_PATH)
|
|
$(call build-chained-vbmeta-image,vbmeta_system)
|
|
endif
|
|
|
|
ifdef BOARD_AVB_VBMETA_VENDOR
|
|
INSTALLED_VBMETA_VENDORIMAGE_TARGET := $(PRODUCT_OUT)/vbmeta_vendor.img
|
|
$(INSTALLED_VBMETA_VENDORIMAGE_TARGET): \
|
|
$(AVBTOOL) \
|
|
$(call images-for-partitions,$(BOARD_AVB_VBMETA_VENDOR)) \
|
|
$(BOARD_AVB_VBMETA_VENDOR_KEY_PATH)
|
|
$(call build-chained-vbmeta-image,vbmeta_vendor)
|
|
endif
|
|
|
|
define build-vbmetaimage-target
|
|
$(call pretty,"Target vbmeta image: $(INSTALLED_VBMETAIMAGE_TARGET)")
|
|
$(hide) mkdir -p $(AVB_CHAIN_KEY_DIR)
|
|
$(call extract-avb-chain-public-keys, $(AVB_CHAIN_KEY_DIR))
|
|
$(hide) $(AVBTOOL) make_vbmeta_image \
|
|
$(INTERNAL_AVB_MAKE_VBMETA_IMAGE_ARGS) \
|
|
$(PRIVATE_AVB_VBMETA_SIGNING_ARGS) \
|
|
$(BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS) \
|
|
--output $@
|
|
$(hide) rm -rf $(AVB_CHAIN_KEY_DIR)
|
|
endef
|
|
|
|
INSTALLED_VBMETAIMAGE_TARGET := $(BUILT_VBMETAIMAGE_TARGET)
|
|
$(INSTALLED_VBMETAIMAGE_TARGET): PRIVATE_AVB_VBMETA_SIGNING_ARGS := \
|
|
--algorithm $(BOARD_AVB_ALGORITHM) --key $(BOARD_AVB_KEY_PATH)
|
|
|
|
$(INSTALLED_VBMETAIMAGE_TARGET): \
|
|
$(AVBTOOL) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(INSTALLED_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_VENDORIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCTIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) \
|
|
$(INSTALLED_ODMIMAGE_TARGET) \
|
|
$(INSTALLED_DTBOIMAGE_TARGET) \
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET) \
|
|
$(INSTALLED_VBMETA_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_VBMETA_VENDORIMAGE_TARGET) \
|
|
$(BOARD_AVB_VBMETA_SYSTEM_KEY_PATH) \
|
|
$(BOARD_AVB_VBMETA_VENDOR_KEY_PATH) \
|
|
$(BOARD_AVB_KEY_PATH)
|
|
$(build-vbmetaimage-target)
|
|
|
|
.PHONY: vbmetaimage-nodeps
|
|
vbmetaimage-nodeps:
|
|
$(build-vbmetaimage-target)
|
|
|
|
endif # BOARD_AVB_ENABLE
|
|
|
|
# -----------------------------------------------------------------
|
|
# Check image sizes <= size of super partition
|
|
|
|
ifeq (,$(TARGET_BUILD_APPS))
|
|
# Do not check for apps-only build
|
|
|
|
ifeq (true,$(PRODUCT_BUILD_SUPER_PARTITION))
|
|
|
|
# (1): list of items like "system", "vendor", "product", "product_services"
|
|
# return: map each item into a command ( wrapped in $$() ) that reads the size
|
|
define read-size-of-partitions
|
|
$(foreach p,$(1),$(call read-image-prop-dictionary,$($(p)image_intermediates)/generated_$(p)_image_info.txt,$(p)_size))
|
|
endef
|
|
|
|
# round result to BOARD_SUPER_PARTITION_ALIGNMENT
|
|
#$(1): the calculated size
|
|
ifeq (,$(BOARD_SUPER_PARTITION_ALIGNMENT))
|
|
define round-partition-size
|
|
$(1)
|
|
endef
|
|
else
|
|
define round-partition-size
|
|
$$((($(1)+$(BOARD_SUPER_PARTITION_ALIGNMENT)-1)/$(BOARD_SUPER_PARTITION_ALIGNMENT)*$(BOARD_SUPER_PARTITION_ALIGNMENT)))
|
|
endef
|
|
endif
|
|
|
|
define super-slot-suffix
|
|
$(if $(filter true,$(AB_OTA_UPDATER)),$(if $(filter true,$(PRODUCT_RETROFIT_DYNAMIC_PARTITIONS)),,_a))
|
|
endef
|
|
|
|
droid_targets: check-all-partition-sizes
|
|
|
|
.PHONY: check-all-partition-sizes check-all-partition-sizes-nodeps
|
|
|
|
# Add image dependencies so that generated_*_image_info.txt are written before checking.
|
|
check-all-partition-sizes: $(call images-for-partitions,$(BOARD_SUPER_PARTITION_PARTITION_LIST))
|
|
|
|
ifeq ($(PRODUCT_RETROFIT_DYNAMIC_PARTITIONS),true)
|
|
# Check sum(super partition block devices) == super partition
|
|
# Non-retrofit devices already defines BOARD_SUPER_PARTITION_SUPER_DEVICE_SIZE = BOARD_SUPER_PARTITION_SIZE
|
|
define check-super-partition-size
|
|
size_list="$(foreach device,$(call to-upper,$(BOARD_SUPER_PARTITION_BLOCK_DEVICES)),$(BOARD_SUPER_PARTITION_$(device)_DEVICE_SIZE))"; \
|
|
sum_sizes_expr=$$(sed -e 's/ /+/g' <<< "$${size_list}"); \
|
|
max_size_expr="$(BOARD_SUPER_PARTITION_SIZE)"; \
|
|
if [ $$(( $${sum_sizes_expr} )) -ne $$(( $${max_size_expr} )) ]; then \
|
|
echo "The sum of super partition block device sizes is not equal to BOARD_SUPER_PARTITION_SIZE:"; \
|
|
echo $${sum_sizes_expr} '!=' $${max_size_expr}; \
|
|
exit 1; \
|
|
else \
|
|
echo "The sum of super partition block device sizes is equal to BOARD_SUPER_PARTITION_SIZE:"; \
|
|
echo $${sum_sizes_expr} '==' $${max_size_expr}; \
|
|
fi
|
|
endef
|
|
endif
|
|
|
|
# $(1): human-readable max size string
|
|
# $(2): max size expression
|
|
# $(3): list of partition names
|
|
define check-sum-of-partition-sizes
|
|
partition_size_list="$$(for i in $(call read-size-of-partitions,$(3)); do \
|
|
echo $(call round-partition-size,$${i}); \
|
|
done)"; \
|
|
sum_sizes_expr=$$(tr '\n' '+' <<< "$${partition_size_list}" | sed 's/+$$//'); \
|
|
if [ $$(( $${sum_sizes_expr} )) -gt $$(( $(2) )) ]; then \
|
|
echo "The sum of sizes of [$(strip $(3))] is larger than $(strip $(1)):"; \
|
|
echo $${sum_sizes_expr} '==' $$(( $${sum_sizes_expr} )) '>' "$(2)" '==' $$(( $(2) )); \
|
|
exit 1; \
|
|
else \
|
|
echo "The sum of sizes of [$(strip $(3))] is within $(strip $(1)):"; \
|
|
echo $${sum_sizes_expr} '==' $$(( $${sum_sizes_expr} )) '<=' "$(2)" '==' $$(( $(2) )); \
|
|
fi;
|
|
endef
|
|
|
|
define check-all-partition-sizes-target
|
|
# Check sum(all partitions) <= super partition (/ 2 for A/B devices launched with dynamic partitions)
|
|
$(if $(BOARD_SUPER_PARTITION_SIZE),$(if $(BOARD_SUPER_PARTITION_PARTITION_LIST), \
|
|
$(call check-sum-of-partition-sizes,BOARD_SUPER_PARTITION_SIZE$(if $(call super-slot-suffix), / 2), \
|
|
$(BOARD_SUPER_PARTITION_SIZE)$(if $(call super-slot-suffix), / 2),$(BOARD_SUPER_PARTITION_PARTITION_LIST))))
|
|
|
|
# For each group, check sum(partitions in group) <= group size
|
|
$(foreach group,$(call to-upper,$(BOARD_SUPER_PARTITION_GROUPS)), \
|
|
$(if $(BOARD_$(group)_SIZE),$(if $(BOARD_$(group)_PARTITION_LIST), \
|
|
$(call check-sum-of-partition-sizes,BOARD_$(group)_SIZE,$(BOARD_$(group)_SIZE),$(BOARD_$(group)_PARTITION_LIST)))))
|
|
|
|
# Check sum(all group sizes) <= super partition (/ 2 for A/B devices launched with dynamic partitions)
|
|
if [[ ! -z $(BOARD_SUPER_PARTITION_SIZE) ]]; then \
|
|
group_size_list="$(foreach group,$(call to-upper,$(BOARD_SUPER_PARTITION_GROUPS)),$(BOARD_$(group)_SIZE))"; \
|
|
sum_sizes_expr=$$(sed -e 's/ /+/g' <<< "$${group_size_list}"); \
|
|
max_size_tail=$(if $(call super-slot-suffix)," / 2"); \
|
|
max_size_expr="$(BOARD_SUPER_PARTITION_SIZE)$${max_size_tail}"; \
|
|
if [ $$(( $${sum_sizes_expr} )) -gt $$(( $${max_size_expr} )) ]; then \
|
|
echo "The sum of sizes of [$(strip $(BOARD_SUPER_PARTITION_GROUPS))] is larger than BOARD_SUPER_PARTITION_SIZE$${max_size_tail}:"; \
|
|
echo $${sum_sizes_expr} '==' $$(( $${sum_sizes_expr} )) '>' $${max_size_expr} '==' $$(( $${max_size_expr} )); \
|
|
exit 1; \
|
|
else \
|
|
echo "The sum of sizes of [$(strip $(BOARD_SUPER_PARTITION_GROUPS))] is within BOARD_SUPER_PARTITION_SIZE$${max_size_tail}:"; \
|
|
echo $${sum_sizes_expr} '==' $$(( $${sum_sizes_expr} )) '<=' $${max_size_expr} '==' $$(( $${max_size_expr} )); \
|
|
fi \
|
|
fi
|
|
endef
|
|
|
|
check-all-partition-sizes check-all-partition-sizes-nodeps:
|
|
$(call check-all-partition-sizes-target)
|
|
$(call check-super-partition-size)
|
|
|
|
endif # PRODUCT_BUILD_SUPER_PARTITION
|
|
|
|
endif # TARGET_BUILD_APPS
|
|
|
|
# -----------------------------------------------------------------
|
|
# bring in the installer image generation defines if necessary
|
|
ifeq ($(TARGET_USE_DISKINSTALLER),true)
|
|
include bootable/diskinstaller/config.mk
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# host tools needed to build dist and OTA packages
|
|
|
|
ifeq ($(BUILD_OS),darwin)
|
|
build_ota_package := false
|
|
build_otatools_package := false
|
|
else
|
|
# set build_ota_package, and allow opt-out below
|
|
build_ota_package := true
|
|
ifeq ($(TARGET_SKIP_OTA_PACKAGE),true)
|
|
build_ota_package := false
|
|
endif
|
|
ifneq (,$(filter address, $(SANITIZE_TARGET)))
|
|
build_ota_package := false
|
|
endif
|
|
ifeq ($(TARGET_PRODUCT),sdk)
|
|
build_ota_package := false
|
|
endif
|
|
ifneq ($(filter generic%,$(TARGET_DEVICE)),)
|
|
build_ota_package := false
|
|
endif
|
|
ifeq ($(TARGET_NO_KERNEL),true)
|
|
build_ota_package := false
|
|
endif
|
|
ifeq ($(recovery_fstab),)
|
|
build_ota_package := false
|
|
endif
|
|
ifeq ($(TARGET_BUILD_PDK),true)
|
|
build_ota_package := false
|
|
endif
|
|
|
|
# set build_otatools_package, and allow opt-out below
|
|
build_otatools_package := true
|
|
ifeq ($(TARGET_SKIP_OTATOOLS_PACKAGE),true)
|
|
build_otatools_package := false
|
|
endif
|
|
endif
|
|
|
|
ifeq ($(build_otatools_package),true)
|
|
OTATOOLS := $(HOST_OUT_EXECUTABLES)/minigzip \
|
|
$(HOST_OUT_EXECUTABLES)/aapt \
|
|
$(HOST_OUT_EXECUTABLES)/checkvintf \
|
|
$(HOST_OUT_EXECUTABLES)/mkbootfs \
|
|
$(HOST_OUT_EXECUTABLES)/mkbootimg \
|
|
$(HOST_OUT_EXECUTABLES)/fs_config \
|
|
$(HOST_OUT_EXECUTABLES)/zipalign \
|
|
$(HOST_OUT_EXECUTABLES)/bsdiff \
|
|
$(HOST_OUT_EXECUTABLES)/imgdiff \
|
|
$(HOST_OUT_JAVA_LIBRARIES)/signapk.jar \
|
|
$(HOST_OUT_JAVA_LIBRARIES)/BootSignature.jar \
|
|
$(HOST_OUT_JAVA_LIBRARIES)/VeritySigner.jar \
|
|
$(HOST_OUT_EXECUTABLES)/mke2fs \
|
|
$(HOST_OUT_EXECUTABLES)/mkuserimg_mke2fs \
|
|
$(HOST_OUT_EXECUTABLES)/e2fsdroid \
|
|
$(HOST_OUT_EXECUTABLES)/tune2fs \
|
|
$(HOST_OUT_EXECUTABLES)/mksquashfsimage.sh \
|
|
$(HOST_OUT_EXECUTABLES)/mksquashfs \
|
|
$(HOST_OUT_EXECUTABLES)/mkf2fsuserimg.sh \
|
|
$(HOST_OUT_EXECUTABLES)/make_f2fs \
|
|
$(HOST_OUT_EXECUTABLES)/sload_f2fs \
|
|
$(HOST_OUT_EXECUTABLES)/simg2img \
|
|
$(HOST_OUT_EXECUTABLES)/e2fsck \
|
|
$(HOST_OUT_EXECUTABLES)/generate_verity_key \
|
|
$(HOST_OUT_EXECUTABLES)/verity_signer \
|
|
$(HOST_OUT_EXECUTABLES)/verity_verifier \
|
|
$(HOST_OUT_EXECUTABLES)/append2simg \
|
|
$(HOST_OUT_EXECUTABLES)/img2simg \
|
|
$(HOST_OUT_EXECUTABLES)/boot_signer \
|
|
$(HOST_OUT_EXECUTABLES)/fec \
|
|
$(HOST_OUT_EXECUTABLES)/brillo_update_payload \
|
|
$(HOST_OUT_EXECUTABLES)/lib/shflags/shflags \
|
|
$(HOST_OUT_EXECUTABLES)/delta_generator \
|
|
$(HOST_OUT_EXECUTABLES)/care_map_generator \
|
|
$(HOST_OUT_EXECUTABLES)/fc_sort \
|
|
$(HOST_OUT_EXECUTABLES)/sefcontext_compile \
|
|
$(LPMAKE) \
|
|
$(AVBTOOL) \
|
|
$(BLK_ALLOC_TO_BASE_FS) \
|
|
$(BROTLI) \
|
|
$(BUILD_VERITY_METADATA) \
|
|
$(BUILD_VERITY_TREE)
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT))
|
|
OTATOOLS += \
|
|
$(FUTILITY) \
|
|
$(VBOOT_SIGNER)
|
|
endif
|
|
|
|
# Shared libraries.
|
|
OTATOOLS += \
|
|
$(HOST_LIBRARY_PATH)/libc++$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/liblog$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libcutils$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libselinux$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libcrypto_utils$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libcrypto-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2fs-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_blkid-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_com_err-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_e2p-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_misc$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_profile-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_quota-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext2_uuid-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libconscrypt_openjdk_jni$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libbrillo$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libbrillo-stream$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libchrome$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libcurl-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libevent-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libprotobuf-cpp-lite$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libssl-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libz-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libsparse-host$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libbase$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libpcre2$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libbrotli$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/liblp$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libext4_utils$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libfec$(HOST_SHLIB_SUFFIX) \
|
|
$(HOST_LIBRARY_PATH)/libsquashfs_utils$(HOST_SHLIB_SUFFIX)
|
|
|
|
|
|
.PHONY: otatools
|
|
otatools: $(OTATOOLS)
|
|
|
|
BUILT_OTATOOLS_PACKAGE := $(PRODUCT_OUT)/otatools.zip
|
|
$(BUILT_OTATOOLS_PACKAGE): zip_root := $(call intermediates-dir-for,PACKAGING,otatools)/otatools
|
|
|
|
OTATOOLS_DEPS := \
|
|
system/extras/ext4_utils/mke2fs.conf \
|
|
$(sort $(shell find build/target/product/security -type f -name "*.x509.pem" -o -name "*.pk8" -o \
|
|
-name verity_key))
|
|
|
|
ifneq (,$(wildcard device))
|
|
OTATOOLS_DEPS += \
|
|
$(sort $(shell find device $(wildcard vendor) -type f -name "*.pk8" -o -name "verifiedboot*" -o \
|
|
-name "*.x509.pem" -o -name "oem*.prop"))
|
|
endif
|
|
ifneq (,$(wildcard external/avb))
|
|
OTATOOLS_DEPS += \
|
|
$(sort $(shell find external/avb/test/data -type f -name "testkey_*.pem" -o \
|
|
-name "atx_metadata.bin"))
|
|
endif
|
|
ifneq (,$(wildcard system/update_engine))
|
|
OTATOOLS_DEPS += \
|
|
$(sort $(shell find system/update_engine/scripts -name "*.pyc" -prune -o -type f -print))
|
|
endif
|
|
|
|
OTATOOLS_RELEASETOOLS := \
|
|
$(sort $(shell find build/make/tools/releasetools -name "*.pyc" -prune -o -type f))
|
|
|
|
ifeq (true,$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SUPPORTS_VBOOT))
|
|
OTATOOLS_DEPS += \
|
|
$(sort $(shell find external/vboot_reference/tests/devkeys -type f))
|
|
endif
|
|
|
|
$(BUILT_OTATOOLS_PACKAGE): $(OTATOOLS) $(OTATOOLS_DEPS) $(OTATOOLS_RELEASETOOLS) $(SOONG_ZIP)
|
|
@echo "Package OTA tools: $@"
|
|
$(hide) rm -rf $@ $(zip_root)
|
|
$(hide) mkdir -p $(dir $@) $(zip_root)/bin $(zip_root)/framework $(zip_root)/releasetools
|
|
$(call copy-files-with-structure,$(OTATOOLS),$(HOST_OUT)/,$(zip_root))
|
|
$(hide) cp $(SOONG_ZIP) $(zip_root)/bin/
|
|
$(hide) cp -r -d -p build/make/tools/releasetools/* $(zip_root)/releasetools
|
|
$(hide) rm -rf $@ $(zip_root)/releasetools/*.pyc
|
|
$(hide) $(SOONG_ZIP) -o $@ -C $(zip_root) -D $(zip_root) \
|
|
-C . $(addprefix -f ,$(OTATOOLS_DEPS))
|
|
|
|
.PHONY: otatools-package
|
|
otatools-package: $(BUILT_OTATOOLS_PACKAGE)
|
|
|
|
endif # build_otatools_package
|
|
|
|
# -----------------------------------------------------------------
|
|
# A zip of the directories that map to the target filesystem.
|
|
# This zip can be used to create an OTA package or filesystem image
|
|
# as a post-build step.
|
|
#
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-target_files-$(FILE_NAME_TAG)
|
|
|
|
intermediates := $(call intermediates-dir-for,PACKAGING,target_files)
|
|
BUILT_TARGET_FILES_PACKAGE := $(intermediates)/$(name).zip
|
|
$(BUILT_TARGET_FILES_PACKAGE): intermediates := $(intermediates)
|
|
$(BUILT_TARGET_FILES_PACKAGE): \
|
|
zip_root := $(intermediates)/$(name)
|
|
|
|
# $(1): Directory to copy
|
|
# $(2): Location to copy it to
|
|
# The "ls -A" is to prevent "acp s/* d" from failing if s is empty.
|
|
define package_files-copy-root
|
|
if [ -d "$(strip $(1))" -a "$$(ls -A $(1))" ]; then \
|
|
mkdir -p $(2) && \
|
|
$(ACP) -rd $(strip $(1))/* $(2); \
|
|
fi
|
|
endef
|
|
|
|
built_ota_tools :=
|
|
|
|
# We can't build static executables when SANITIZE_TARGET=address
|
|
ifeq (,$(filter address, $(SANITIZE_TARGET)))
|
|
built_ota_tools += \
|
|
$(call intermediates-dir-for,EXECUTABLES,updater,,,$(TARGET_PREFER_32_BIT))/updater
|
|
endif
|
|
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_OTA_TOOLS := $(built_ota_tools)
|
|
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_RECOVERY_API_VERSION := $(RECOVERY_API_VERSION)
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_RECOVERY_FSTAB_VERSION := $(RECOVERY_FSTAB_VERSION)
|
|
|
|
ifeq ($(TARGET_RELEASETOOLS_EXTENSIONS),)
|
|
# default to common dir for device vendor
|
|
tool_extensions := $(TARGET_DEVICE_DIR)/../common
|
|
else
|
|
tool_extensions := $(TARGET_RELEASETOOLS_EXTENSIONS)
|
|
endif
|
|
tool_extension := $(wildcard $(tool_extensions)/releasetools.py)
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_TOOL_EXTENSIONS := $(tool_extensions)
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_TOOL_EXTENSION := $(tool_extension)
|
|
|
|
ifeq ($(AB_OTA_UPDATER),true)
|
|
updater_dep := system/update_engine/update_engine.conf
|
|
else
|
|
# Build OTA tools if not using the AB Updater.
|
|
updater_dep := $(built_ota_tools)
|
|
endif
|
|
$(BUILT_TARGET_FILES_PACKAGE): $(updater_dep)
|
|
|
|
# If we are using recovery as boot, output recovery files to BOOT/.
|
|
ifeq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_RECOVERY_OUT := BOOT
|
|
else
|
|
$(BUILT_TARGET_FILES_PACKAGE): PRIVATE_RECOVERY_OUT := RECOVERY
|
|
endif
|
|
|
|
ifeq ($(AB_OTA_UPDATER),true)
|
|
ifdef OSRELEASED_DIRECTORY
|
|
$(BUILT_TARGET_FILES_PACKAGE): $(TARGET_OUT_OEM)/$(OSRELEASED_DIRECTORY)/product_id
|
|
$(BUILT_TARGET_FILES_PACKAGE): $(TARGET_OUT_OEM)/$(OSRELEASED_DIRECTORY)/product_version
|
|
$(BUILT_TARGET_FILES_PACKAGE): $(TARGET_OUT_ETC)/$(OSRELEASED_DIRECTORY)/system_version
|
|
endif
|
|
endif
|
|
|
|
# Run fs_config while creating the target files package
|
|
# $1: root directory
|
|
# $2: add prefix
|
|
define fs_config
|
|
(cd $(1); find . -type d | sed 's,$$,/,'; find . \! -type d) | cut -c 3- | sort | sed 's,^,$(2),' | $(HOST_OUT_EXECUTABLES)/fs_config -C -D $(TARGET_OUT) -S $(SELINUX_FC) -R "$(2)"
|
|
endef
|
|
|
|
# $(1): file
|
|
define dump-dynamic-partitions-info
|
|
$(if $(filter true,$(PRODUCT_USE_DYNAMIC_PARTITIONS)), \
|
|
echo "use_dynamic_partitions=true" >> $(1))
|
|
$(if $(filter true,$(PRODUCT_RETROFIT_DYNAMIC_PARTITIONS)), \
|
|
echo "dynamic_partition_retrofit=true" >> $(1))
|
|
echo "lpmake=$(notdir $(LPMAKE))" >> $(1)
|
|
$(if $(filter true,$(PRODUCT_BUILD_SUPER_PARTITION)), $(if $(BOARD_SUPER_PARTITION_SIZE), \
|
|
echo "build_super_partition=true" >> $(1)))
|
|
$(if $(filter true,$(BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE)), \
|
|
echo "build_retrofit_dynamic_partitions_ota_package=true" >> $(1))
|
|
echo "super_metadata_device=$(BOARD_SUPER_PARTITION_METADATA_DEVICE)" >> $(1)
|
|
$(if $(BOARD_SUPER_PARTITION_BLOCK_DEVICES), \
|
|
echo "super_block_devices=$(BOARD_SUPER_PARTITION_BLOCK_DEVICES)" >> $(1))
|
|
$(foreach device,$(BOARD_SUPER_PARTITION_BLOCK_DEVICES), \
|
|
echo "super_$(device)_device_size=$(BOARD_SUPER_PARTITION_$(call to-upper,$(device))_DEVICE_SIZE)" >> $(1);)
|
|
$(if $(BOARD_SUPER_PARTITION_PARTITION_LIST), \
|
|
echo "dynamic_partition_list=$(BOARD_SUPER_PARTITION_PARTITION_LIST)" >> $(1))
|
|
$(if $(BOARD_SUPER_PARTITION_GROUPS),
|
|
echo "super_partition_groups=$(BOARD_SUPER_PARTITION_GROUPS)" >> $(1))
|
|
$(foreach group,$(BOARD_SUPER_PARTITION_GROUPS), \
|
|
echo "super_$(group)_group_size=$(BOARD_$(call to-upper,$(group))_SIZE)" >> $(1); \
|
|
$(if $(BOARD_$(call to-upper,$(group))_PARTITION_LIST), \
|
|
echo "super_$(group)_partition_list=$(BOARD_$(call to-upper,$(group))_PARTITION_LIST)" >> $(1);))
|
|
endef
|
|
|
|
# Depending on the various images guarantees that the underlying
|
|
# directories are up-to-date.
|
|
$(BUILT_TARGET_FILES_PACKAGE): \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(INSTALLED_RADIOIMAGE_TARGET) \
|
|
$(INSTALLED_RECOVERYIMAGE_TARGET) \
|
|
$(FULL_SYSTEMIMAGE_DEPS) \
|
|
$(INSTALLED_USERDATAIMAGE_TARGET) \
|
|
$(INSTALLED_CACHEIMAGE_TARGET) \
|
|
$(INSTALLED_VENDORIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCTIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) \
|
|
$(INSTALLED_VBMETAIMAGE_TARGET) \
|
|
$(INSTALLED_ODMIMAGE_TARGET) \
|
|
$(INSTALLED_DTBOIMAGE_TARGET) \
|
|
$(INTERNAL_SYSTEMOTHERIMAGE_FILES) \
|
|
$(INSTALLED_ANDROID_INFO_TXT_TARGET) \
|
|
$(INSTALLED_KERNEL_TARGET) \
|
|
$(INSTALLED_2NDBOOTLOADER_TARGET) \
|
|
$(BOARD_PREBUILT_DTBOIMAGE) \
|
|
$(BOARD_PREBUILT_RECOVERY_DTBOIMAGE) \
|
|
$(BOARD_RECOVERY_ACPIO) \
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH) \
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH) \
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH) \
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH) \
|
|
$(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH) \
|
|
$(LPMAKE) \
|
|
$(SELINUX_FC) \
|
|
$(APKCERTS_FILE) \
|
|
$(SOONG_APEX_KEYS_FILE) \
|
|
$(SOONG_ZIP) \
|
|
$(HOST_OUT_EXECUTABLES)/fs_config \
|
|
$(HOST_OUT_EXECUTABLES)/imgdiff \
|
|
$(HOST_OUT_EXECUTABLES)/bsdiff \
|
|
$(HOST_OUT_EXECUTABLES)/care_map_generator \
|
|
$(BUILD_IMAGE_SRCS) \
|
|
$(BUILT_ASSEMBLED_SYSTEM_MANIFEST) \
|
|
$(BUILT_ASSEMBLED_VENDOR_MANIFEST) \
|
|
$(BUILT_SYSTEM_MATRIX) \
|
|
$(BUILT_VENDOR_MATRIX) \
|
|
| $(ACP)
|
|
@echo "Package target files: $@"
|
|
$(call create-system-vendor-symlink)
|
|
$(call create-system-product-symlink)
|
|
$(call create-system-product_services-symlink)
|
|
$(call create-vendor-odm-symlink)
|
|
$(hide) rm -rf $@ $@.list $(zip_root)
|
|
$(hide) mkdir -p $(dir $@) $(zip_root)
|
|
ifneq (,$(INSTALLED_RECOVERYIMAGE_TARGET)$(filter true,$(BOARD_USES_RECOVERY_AS_BOOT)))
|
|
@# Components of the recovery image
|
|
$(hide) mkdir -p $(zip_root)/$(PRIVATE_RECOVERY_OUT)
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_RECOVERY_ROOT_OUT),$(zip_root)/$(PRIVATE_RECOVERY_OUT)/RAMDISK)
|
|
ifdef INSTALLED_KERNEL_TARGET
|
|
$(hide) cp $(INSTALLED_KERNEL_TARGET) $(zip_root)/$(PRIVATE_RECOVERY_OUT)/kernel
|
|
endif
|
|
ifdef INSTALLED_2NDBOOTLOADER_TARGET
|
|
$(hide) cp $(INSTALLED_2NDBOOTLOADER_TARGET) $(zip_root)/$(PRIVATE_RECOVERY_OUT)/second
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_DTBO
|
|
ifdef BOARD_PREBUILT_RECOVERY_DTBOIMAGE
|
|
$(hide) cp $(BOARD_PREBUILT_RECOVERY_DTBOIMAGE) $(zip_root)/$(PRIVATE_RECOVERY_OUT)/recovery_dtbo
|
|
else
|
|
$(hide) cp $(BOARD_PREBUILT_DTBOIMAGE) $(zip_root)/$(PRIVATE_RECOVERY_OUT)/recovery_dtbo
|
|
endif
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_ACPIO
|
|
$(hide) cp $(BOARD_RECOVERY_ACPIO) $(zip_root)/$(PRIVATE_RECOVERY_OUT)/recovery_acpio
|
|
endif
|
|
ifdef BOARD_INCLUDE_DTB_IN_BOOTIMG
|
|
$(hide) cp $(INSTALLED_DTBIMAGE_TARGET) $(zip_root)/$(PRIVATE_RECOVERY_OUT)/dtb
|
|
endif
|
|
ifdef INTERNAL_KERNEL_CMDLINE
|
|
$(hide) echo "$(INTERNAL_KERNEL_CMDLINE)" > $(zip_root)/$(PRIVATE_RECOVERY_OUT)/cmdline
|
|
endif
|
|
ifdef BOARD_KERNEL_BASE
|
|
$(hide) echo "$(BOARD_KERNEL_BASE)" > $(zip_root)/$(PRIVATE_RECOVERY_OUT)/base
|
|
endif
|
|
ifdef BOARD_KERNEL_PAGESIZE
|
|
$(hide) echo "$(BOARD_KERNEL_PAGESIZE)" > $(zip_root)/$(PRIVATE_RECOVERY_OUT)/pagesize
|
|
endif
|
|
endif # INSTALLED_RECOVERYIMAGE_TARGET defined or BOARD_USES_RECOVERY_AS_BOOT is true
|
|
@# Components of the boot image
|
|
$(hide) mkdir -p $(zip_root)/BOOT
|
|
$(hide) mkdir -p $(zip_root)/ROOT
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_ROOT_OUT),$(zip_root)/ROOT)
|
|
@# If we are using recovery as boot, this is already done when processing recovery.
|
|
ifneq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
ifneq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_RAMDISK_OUT),$(zip_root)/BOOT/RAMDISK)
|
|
endif
|
|
ifdef INSTALLED_KERNEL_TARGET
|
|
$(hide) cp $(INSTALLED_KERNEL_TARGET) $(zip_root)/BOOT/kernel
|
|
endif
|
|
ifdef INSTALLED_2NDBOOTLOADER_TARGET
|
|
$(hide) cp $(INSTALLED_2NDBOOTLOADER_TARGET) $(zip_root)/BOOT/second
|
|
endif
|
|
ifdef INSTALLED_DTBIMAGE_TARGET
|
|
$(hide) cp $(INSTALLED_DTBIMAGE_TARGET) $(zip_root)/BOOT/dtb
|
|
endif
|
|
ifdef INTERNAL_KERNEL_CMDLINE
|
|
$(hide) echo "$(INTERNAL_KERNEL_CMDLINE)" > $(zip_root)/BOOT/cmdline
|
|
endif
|
|
ifdef BOARD_KERNEL_BASE
|
|
$(hide) echo "$(BOARD_KERNEL_BASE)" > $(zip_root)/BOOT/base
|
|
endif
|
|
ifdef BOARD_KERNEL_PAGESIZE
|
|
$(hide) echo "$(BOARD_KERNEL_PAGESIZE)" > $(zip_root)/BOOT/pagesize
|
|
endif
|
|
endif # BOARD_USES_RECOVERY_AS_BOOT
|
|
$(hide) $(foreach t,$(INSTALLED_RADIOIMAGE_TARGET),\
|
|
mkdir -p $(zip_root)/RADIO; \
|
|
cp $(t) $(zip_root)/RADIO/$(notdir $(t));)
|
|
ifdef BUILDING_SYSTEM_IMAGE
|
|
@# Contents of the system image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(SYSTEMIMAGE_SOURCE_DIR),$(zip_root)/SYSTEM)
|
|
endif
|
|
ifdef BUILDING_USERDATA_IMAGE
|
|
@# Contents of the data image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_OUT_DATA),$(zip_root)/DATA)
|
|
endif
|
|
ifdef BUILDING_VENDOR_IMAGE
|
|
@# Contents of the vendor image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_OUT_VENDOR),$(zip_root)/VENDOR)
|
|
endif
|
|
ifdef BUILDING_PRODUCT_IMAGE
|
|
@# Contents of the product image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_OUT_PRODUCT),$(zip_root)/PRODUCT)
|
|
endif
|
|
ifdef BUILDING_PRODUCT_SERVICES_IMAGE
|
|
@# Contents of the product_services image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_OUT_PRODUCT_SERVICES),$(zip_root)/PRODUCT_SERVICES)
|
|
endif
|
|
ifdef BUILDING_ODM_IMAGE
|
|
@# Contents of the odm image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_OUT_ODM),$(zip_root)/ODM)
|
|
endif
|
|
ifdef BUILDING_SYSTEM_OTHER_IMAGE
|
|
@# Contents of the system_other image
|
|
$(hide) $(call package_files-copy-root, \
|
|
$(TARGET_OUT_SYSTEM_OTHER),$(zip_root)/SYSTEM_OTHER)
|
|
endif
|
|
@# Extra contents of the OTA package
|
|
$(hide) mkdir -p $(zip_root)/OTA
|
|
$(hide) cp $(INSTALLED_ANDROID_INFO_TXT_TARGET) $(zip_root)/OTA/
|
|
ifneq ($(AB_OTA_UPDATER),true)
|
|
ifneq ($(built_ota_tools),)
|
|
$(hide) mkdir -p $(zip_root)/OTA/bin
|
|
$(hide) cp $(PRIVATE_OTA_TOOLS) $(zip_root)/OTA/bin/
|
|
endif
|
|
endif
|
|
@# Files that do not end up in any images, but are necessary to
|
|
@# build them.
|
|
$(hide) mkdir -p $(zip_root)/META
|
|
$(hide) cp $(APKCERTS_FILE) $(zip_root)/META/apkcerts.txt
|
|
$(hide) cp $(SOONG_APEX_KEYS_FILE) $(zip_root)/META/apexkeys.txt
|
|
ifneq ($(tool_extension),)
|
|
$(hide) cp $(PRIVATE_TOOL_EXTENSION) $(zip_root)/META/
|
|
endif
|
|
$(hide) echo "$(PRODUCT_OTA_PUBLIC_KEYS)" > $(zip_root)/META/otakeys.txt
|
|
$(hide) cp $(SELINUX_FC) $(zip_root)/META/file_contexts.bin
|
|
$(hide) echo "recovery_api_version=$(PRIVATE_RECOVERY_API_VERSION)" > $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "fstab_version=$(PRIVATE_RECOVERY_FSTAB_VERSION)" >> $(zip_root)/META/misc_info.txt
|
|
ifdef BOARD_FLASH_BLOCK_SIZE
|
|
$(hide) echo "blocksize=$(BOARD_FLASH_BLOCK_SIZE)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifdef BOARD_BOOTIMAGE_PARTITION_SIZE
|
|
$(hide) echo "boot_size=$(BOARD_BOOTIMAGE_PARTITION_SIZE)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifeq ($(INSTALLED_RECOVERYIMAGE_TARGET),)
|
|
$(hide) echo "no_recovery=true" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_DTBO
|
|
$(hide) echo "include_recovery_dtbo=true" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifdef BOARD_INCLUDE_RECOVERY_ACPIO
|
|
$(hide) echo "include_recovery_acpio=true" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifdef BOARD_RECOVERYIMAGE_PARTITION_SIZE
|
|
$(hide) echo "recovery_size=$(BOARD_RECOVERYIMAGE_PARTITION_SIZE)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifdef TARGET_RECOVERY_FSTYPE_MOUNT_OPTIONS
|
|
@# TARGET_RECOVERY_FSTYPE_MOUNT_OPTIONS can be empty to indicate that nothing but defaults should be used.
|
|
$(hide) echo "recovery_mount_options=$(TARGET_RECOVERY_FSTYPE_MOUNT_OPTIONS)" >> $(zip_root)/META/misc_info.txt
|
|
else
|
|
$(hide) echo "recovery_mount_options=$(DEFAULT_TARGET_RECOVERY_FSTYPE_MOUNT_OPTIONS)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
$(hide) echo "tool_extensions=$(PRIVATE_TOOL_EXTENSIONS)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "default_system_dev_certificate=$(DEFAULT_SYSTEM_DEV_CERTIFICATE)" >> $(zip_root)/META/misc_info.txt
|
|
ifdef PRODUCT_EXTRA_RECOVERY_KEYS
|
|
$(hide) echo "extra_recovery_keys=$(PRODUCT_EXTRA_RECOVERY_KEYS)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
$(hide) echo 'mkbootimg_args=$(BOARD_MKBOOTIMG_ARGS)' >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo 'mkbootimg_version_args=$(INTERNAL_MKBOOTIMG_VERSION_ARGS)' >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "multistage_support=1" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "blockimgdiff_versions=3,4" >> $(zip_root)/META/misc_info.txt
|
|
ifneq ($(OEM_THUMBPRINT_PROPERTIES),)
|
|
# OTA scripts are only interested in fingerprint related properties
|
|
$(hide) echo "oem_fingerprint_properties=$(OEM_THUMBPRINT_PROPERTIES)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH),)
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH) \
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SYSTEM_BASE_FS_PATH))
|
|
endif
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH),)
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH) \
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_VENDOR_BASE_FS_PATH))
|
|
endif
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH),)
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH) \
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_BASE_FS_PATH))
|
|
endif
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH),)
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH) \
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_PRODUCT_SERVICES_BASE_FS_PATH))
|
|
endif
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH),)
|
|
$(hide) cp $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH) \
|
|
$(zip_root)/META/$(notdir $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_ODM_BASE_FS_PATH))
|
|
endif
|
|
ifneq (,$(filter address, $(SANITIZE_TARGET)))
|
|
# We need to create userdata.img with real data because the instrumented libraries are in userdata.img.
|
|
$(hide) echo "userdata_img_with_data=true" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifeq ($(BOARD_USES_FULL_RECOVERY_IMAGE),true)
|
|
$(hide) echo "full_recovery_image=true" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
$(hide) echo "avb_enable=true" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_key_path=$(BOARD_AVB_KEY_PATH)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_algorithm=$(BOARD_AVB_ALGORITHM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_args=$(BOARD_AVB_MAKE_VBMETA_IMAGE_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_boot_add_hash_footer_args=$(BOARD_AVB_BOOT_ADD_HASH_FOOTER_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
ifdef BOARD_AVB_BOOT_KEY_PATH
|
|
$(hide) echo "avb_boot_key_path=$(BOARD_AVB_BOOT_KEY_PATH)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_boot_algorithm=$(BOARD_AVB_BOOT_ALGORITHM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_boot_rollback_index_location=$(BOARD_AVB_BOOT_ROLLBACK_INDEX_LOCATION)" >> $(zip_root)/META/misc_info.txt
|
|
endif # BOARD_AVB_BOOT_KEY_PATH
|
|
$(hide) echo "avb_recovery_add_hash_footer_args=$(BOARD_AVB_RECOVERY_ADD_HASH_FOOTER_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
ifdef BOARD_AVB_RECOVERY_KEY_PATH
|
|
$(hide) echo "avb_recovery_key_path=$(BOARD_AVB_RECOVERY_KEY_PATH)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_recovery_algorithm=$(BOARD_AVB_RECOVERY_ALGORITHM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_recovery_rollback_index_location=$(BOARD_AVB_RECOVERY_ROLLBACK_INDEX_LOCATION)" >> $(zip_root)/META/misc_info.txt
|
|
endif # BOARD_AVB_RECOVERY_KEY_PATH
|
|
ifneq (,$(strip $(BOARD_AVB_VBMETA_SYSTEM)))
|
|
$(hide) echo "avb_vbmeta_system=$(BOARD_AVB_VBMETA_SYSTEM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_system_args=$(BOARD_AVB_MAKE_VBMETA_SYSTEM_IMAGE_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_system_key_path=$(BOARD_AVB_VBMETA_SYSTEM_KEY_PATH)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_system_algorithm=$(BOARD_AVB_VBMETA_SYSTEM_ALGORITHM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_system_rollback_index_location=$(BOARD_AVB_VBMETA_SYSTEM_ROLLBACK_INDEX_LOCATION)" >> $(zip_root)/META/misc_info.txt
|
|
endif # BOARD_AVB_VBMETA_SYSTEM
|
|
ifneq (,$(strip $(BOARD_AVB_VBMETA_VENDOR)))
|
|
$(hide) echo "avb_vbmeta_vendor=$(BOARD_AVB_VBMETA_VENDOR)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_vendor_args=$(BOARD_AVB_MAKE_VBMETA_SYSTEM_IMAGE_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_vendor_key_path=$(BOARD_AVB_VBMETA_VENDOR_KEY_PATH)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_vendor_algorithm=$(BOARD_AVB_VBMETA_VENDOR_ALGORITHM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_vbmeta_vendor_rollback_index_location=$(BOARD_AVB_VBMETA_VENDOR_ROLLBACK_INDEX_LOCATION)" >> $(zip_root)/META/misc_info.txt
|
|
endif # BOARD_AVB_VBMETA_VENDOR_KEY_PATH
|
|
endif # BOARD_AVB_ENABLE
|
|
ifdef BOARD_BPT_INPUT_FILES
|
|
$(hide) echo "board_bpt_enable=true" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "board_bpt_make_table_args=$(BOARD_BPT_MAKE_TABLE_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "board_bpt_input_files=$(BOARD_BPT_INPUT_FILES)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
ifdef BOARD_BPT_DISK_SIZE
|
|
$(hide) echo "board_bpt_disk_size=$(BOARD_BPT_DISK_SIZE)" >> $(zip_root)/META/misc_info.txt
|
|
endif
|
|
$(call generate-userimage-prop-dictionary, $(zip_root)/META/misc_info.txt)
|
|
ifneq ($(INSTALLED_RECOVERYIMAGE_TARGET),)
|
|
ifdef BUILDING_SYSTEM_IMAGE
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH MKBOOTIMG=$(MKBOOTIMG) \
|
|
build/make/tools/releasetools/make_recovery_patch $(zip_root) $(zip_root)
|
|
endif # BUILDING_SYSTEM_IMAGE
|
|
endif
|
|
ifeq ($(AB_OTA_UPDATER),true)
|
|
@# When using the A/B updater, include the updater config files in the zip.
|
|
$(hide) cp $(TOPDIR)system/update_engine/update_engine.conf $(zip_root)/META/update_engine_config.txt
|
|
$(hide) for part in $(AB_OTA_PARTITIONS); do \
|
|
echo "$${part}" >> $(zip_root)/META/ab_partitions.txt; \
|
|
done
|
|
$(hide) for conf in $(AB_OTA_POSTINSTALL_CONFIG); do \
|
|
echo "$${conf}" >> $(zip_root)/META/postinstall_config.txt; \
|
|
done
|
|
@# Include the build type in META/misc_info.txt so the server can easily differentiate production builds.
|
|
$(hide) echo "build_type=$(TARGET_BUILD_VARIANT)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "ab_update=true" >> $(zip_root)/META/misc_info.txt
|
|
ifdef OSRELEASED_DIRECTORY
|
|
$(hide) cp $(TARGET_OUT_OEM)/$(OSRELEASED_DIRECTORY)/product_id $(zip_root)/META/product_id.txt
|
|
$(hide) cp $(TARGET_OUT_OEM)/$(OSRELEASED_DIRECTORY)/product_version $(zip_root)/META/product_version.txt
|
|
$(hide) cp $(TARGET_OUT_ETC)/$(OSRELEASED_DIRECTORY)/system_version $(zip_root)/META/system_version.txt
|
|
endif
|
|
endif
|
|
ifeq ($(BREAKPAD_GENERATE_SYMBOLS),true)
|
|
@# If breakpad symbols have been generated, add them to the zip.
|
|
$(hide) $(ACP) -r $(TARGET_OUT_BREAKPAD) $(zip_root)/BREAKPAD
|
|
endif
|
|
ifdef BOARD_PREBUILT_VENDORIMAGE
|
|
$(hide) mkdir -p $(zip_root)/IMAGES
|
|
$(hide) cp $(INSTALLED_VENDORIMAGE_TARGET) $(zip_root)/IMAGES/
|
|
endif
|
|
ifdef BOARD_PREBUILT_PRODUCTIMAGE
|
|
$(hide) mkdir -p $(zip_root)/IMAGES
|
|
$(hide) cp $(INSTALLED_PRODUCTIMAGE_TARGET) $(zip_root)/IMAGES/
|
|
endif
|
|
ifdef BOARD_PREBUILT_PRODUCT_SERVICESIMAGE
|
|
$(hide) mkdir -p $(zip_root)/IMAGES
|
|
$(hide) cp $(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) $(zip_root)/IMAGES/
|
|
endif
|
|
ifdef BOARD_PREBUILT_BOOTIMAGE
|
|
$(hide) mkdir -p $(zip_root)/IMAGES
|
|
$(hide) cp $(INSTALLED_BOOTIMAGE_TARGET) $(zip_root)/IMAGES/
|
|
endif
|
|
ifdef BOARD_PREBUILT_ODMIMAGE
|
|
$(hide) mkdir -p $(zip_root)/IMAGES
|
|
$(hide) cp $(INSTALLED_ODMIMAGE_TARGET) $(zip_root)/IMAGES/
|
|
endif
|
|
ifdef BOARD_PREBUILT_DTBOIMAGE
|
|
$(hide) mkdir -p $(zip_root)/PREBUILT_IMAGES
|
|
$(hide) cp $(INSTALLED_DTBOIMAGE_TARGET) $(zip_root)/PREBUILT_IMAGES/
|
|
$(hide) echo "has_dtbo=true" >> $(zip_root)/META/misc_info.txt
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
$(hide) echo "dtbo_size=$(BOARD_DTBOIMG_PARTITION_SIZE)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_dtbo_add_hash_footer_args=$(BOARD_AVB_DTBO_ADD_HASH_FOOTER_ARGS)" >> $(zip_root)/META/misc_info.txt
|
|
ifdef BOARD_AVB_DTBO_KEY_PATH
|
|
$(hide) echo "avb_dtbo_key_path=$(BOARD_AVB_DTBO_KEY_PATH)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_dtbo_algorithm=$(BOARD_AVB_DTBO_ALGORITHM)" >> $(zip_root)/META/misc_info.txt
|
|
$(hide) echo "avb_dtbo_rollback_index_location=$(BOARD_AVB_DTBO_ROLLBACK_INDEX_LOCATION)" \
|
|
>> $(zip_root)/META/misc_info.txt
|
|
endif # BOARD_AVB_DTBO_KEY_PATH
|
|
endif # BOARD_AVB_ENABLE
|
|
endif # BOARD_PREBUILT_DTBOIMAGE
|
|
$(call dump-dynamic-partitions-info,$(zip_root)/META/misc_info.txt)
|
|
@# The radio images in BOARD_PACK_RADIOIMAGES will be additionally copied from RADIO/ into
|
|
@# IMAGES/, which then will be added into <product>-img.zip. Such images must be listed in
|
|
@# INSTALLED_RADIOIMAGE_TARGET.
|
|
$(hide) $(foreach part,$(BOARD_PACK_RADIOIMAGES), \
|
|
echo $(part) >> $(zip_root)/META/pack_radioimages.txt;)
|
|
@# Run fs_config on all the system, vendor, boot ramdisk,
|
|
@# and recovery ramdisk files in the zip, and save the output
|
|
ifdef BUILDING_SYSTEM_IMAGE
|
|
$(hide) $(call fs_config,$(zip_root)/SYSTEM,system/) > $(zip_root)/META/filesystem_config.txt
|
|
endif
|
|
ifdef BUILDING_VENDOR_IMAGE
|
|
$(hide) $(call fs_config,$(zip_root)/VENDOR,vendor/) > $(zip_root)/META/vendor_filesystem_config.txt
|
|
endif
|
|
ifdef BUILDING_PRODUCT_IMAGE
|
|
$(hide) $(call fs_config,$(zip_root)/PRODUCT,product/) > $(zip_root)/META/product_filesystem_config.txt
|
|
endif
|
|
ifdef BUILDING_PRODUCT_SERVICES_IMAGE
|
|
$(hide) $(call fs_config,$(zip_root)/PRODUCT_SERVICES,product_services/) > $(zip_root)/META/product_services_filesystem_config.txt
|
|
endif
|
|
ifdef BUILDING_ODM_IMAGE
|
|
$(hide) $(call fs_config,$(zip_root)/ODM,odm/) > $(zip_root)/META/odm_filesystem_config.txt
|
|
endif
|
|
@# ROOT always contains the files for the root under normal boot.
|
|
$(hide) $(call fs_config,$(zip_root)/ROOT,) > $(zip_root)/META/root_filesystem_config.txt
|
|
ifeq ($(BOARD_USES_RECOVERY_AS_BOOT),true)
|
|
@# BOOT/RAMDISK exists and contains the ramdisk for recovery if using BOARD_USES_RECOVERY_AS_BOOT.
|
|
$(hide) $(call fs_config,$(zip_root)/BOOT/RAMDISK,) > $(zip_root)/META/boot_filesystem_config.txt
|
|
endif
|
|
ifneq ($(BOARD_BUILD_SYSTEM_ROOT_IMAGE),true)
|
|
@# BOOT/RAMDISK also exists and contains the first stage ramdisk if not using BOARD_BUILD_SYSTEM_ROOT_IMAGE.
|
|
$(hide) $(call fs_config,$(zip_root)/BOOT/RAMDISK,) > $(zip_root)/META/boot_filesystem_config.txt
|
|
endif
|
|
ifneq ($(INSTALLED_RECOVERYIMAGE_TARGET),)
|
|
$(hide) $(call fs_config,$(zip_root)/RECOVERY/RAMDISK,) > $(zip_root)/META/recovery_filesystem_config.txt
|
|
endif
|
|
ifdef BUILDING_SYSTEM_OTHER_IMAGE
|
|
$(hide) $(call fs_config,$(zip_root)/SYSTEM_OTHER,system/) > $(zip_root)/META/system_other_filesystem_config.txt
|
|
endif
|
|
@# Metadata for compatibility verification.
|
|
$(hide) cp $(BUILT_SYSTEM_MATRIX) $(zip_root)/META/system_matrix.xml
|
|
$(hide) cp $(BUILT_ASSEMBLED_SYSTEM_MANIFEST) $(zip_root)/META/system_manifest.xml
|
|
ifdef BUILT_ASSEMBLED_VENDOR_MANIFEST
|
|
$(hide) cp $(BUILT_ASSEMBLED_VENDOR_MANIFEST) $(zip_root)/META/vendor_manifest.xml
|
|
endif
|
|
ifdef BUILT_VENDOR_MATRIX
|
|
$(hide) cp $(BUILT_VENDOR_MATRIX) $(zip_root)/META/vendor_matrix.xml
|
|
endif
|
|
ifneq ($(BOARD_SUPER_PARTITION_GROUPS),)
|
|
$(hide) echo "super_partition_groups=$(BOARD_SUPER_PARTITION_GROUPS)" > $(zip_root)/META/dynamic_partitions_info.txt
|
|
@# Remove 'vendor' from the group partition list if the image is not available. This should only
|
|
@# happen to AOSP targets built without vendor.img. We can't remove the partition from the
|
|
@# BoardConfig file, as it's still needed elsewhere (e.g. when creating super_empty.img).
|
|
$(foreach group,$(BOARD_SUPER_PARTITION_GROUPS), \
|
|
$(eval _group_partition_list := $(BOARD_$(call to-upper,$(group))_PARTITION_LIST)) \
|
|
$(if $(INSTALLED_VENDORIMAGE_TARGET),,$(eval _group_partition_list := $(filter-out vendor,$(_group_partition_list)))) \
|
|
echo "$(group)_size=$(BOARD_$(call to-upper,$(group))_SIZE)" >> $(zip_root)/META/dynamic_partitions_info.txt; \
|
|
$(if $(_group_partition_list), \
|
|
echo "$(group)_partition_list=$(_group_partition_list)" >> $(zip_root)/META/dynamic_partitions_info.txt;))
|
|
endif # BOARD_SUPER_PARTITION_GROUPS
|
|
$(hide) PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH MKBOOTIMG=$(MKBOOTIMG) \
|
|
build/make/tools/releasetools/add_img_to_target_files -a -v -p $(HOST_OUT) $(zip_root)
|
|
@# Zip everything up, preserving symlinks and placing META/ files first to
|
|
@# help early validation of the .zip file while uploading it.
|
|
$(hide) find $(zip_root)/META | sort >$@.list
|
|
$(hide) find $(zip_root) -path $(zip_root)/META -prune -o -print | sort >>$@.list
|
|
$(hide) $(SOONG_ZIP) -d -o $@ -C $(zip_root) -l $@.list
|
|
|
|
.PHONY: target-files-package
|
|
target-files-package: $(BUILT_TARGET_FILES_PACKAGE)
|
|
|
|
ifneq ($(filter $(MAKECMDGOALS),target-files-package),)
|
|
$(call dist-for-goals, target-files-package, $(BUILT_TARGET_FILES_PACKAGE))
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# NDK Sysroot Package
|
|
NDK_SYSROOT_TARGET := $(PRODUCT_OUT)/ndk_sysroot.tar.bz2
|
|
$(NDK_SYSROOT_TARGET): $(SOONG_OUT_DIR)/ndk.timestamp
|
|
@echo Package NDK sysroot...
|
|
$(hide) tar cjf $@ -C $(SOONG_OUT_DIR) ndk
|
|
|
|
$(call dist-for-goals,sdk,$(NDK_SYSROOT_TARGET))
|
|
|
|
ifeq ($(build_ota_package),true)
|
|
# -----------------------------------------------------------------
|
|
# OTA update package
|
|
|
|
# $(1): output file
|
|
# $(2): additional args
|
|
define build-ota-package-target
|
|
PATH=$(foreach p,$(INTERNAL_USERIMAGES_BINARY_PATHS),$(p):)$$PATH MKBOOTIMG=$(MKBOOTIMG) \
|
|
build/make/tools/releasetools/ota_from_target_files -v \
|
|
--block \
|
|
--extracted_input_target_files $(patsubst %.zip,%,$(BUILT_TARGET_FILES_PACKAGE)) \
|
|
-p $(HOST_OUT) \
|
|
$(if $(OEM_OTA_CONFIG), -o $(OEM_OTA_CONFIG)) \
|
|
$(2) \
|
|
$(BUILT_TARGET_FILES_PACKAGE) $(1)
|
|
endef
|
|
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-ota-$(FILE_NAME_TAG)
|
|
|
|
INTERNAL_OTA_PACKAGE_TARGET := $(PRODUCT_OUT)/$(name).zip
|
|
|
|
INTERNAL_OTA_METADATA := $(PRODUCT_OUT)/ota_metadata
|
|
|
|
$(INTERNAL_OTA_PACKAGE_TARGET): KEY_CERT_PAIR := $(DEFAULT_KEY_CERT_PAIR)
|
|
|
|
ifeq ($(AB_OTA_UPDATER),true)
|
|
$(INTERNAL_OTA_PACKAGE_TARGET): $(BRILLO_UPDATE_PAYLOAD)
|
|
else
|
|
$(INTERNAL_OTA_PACKAGE_TARGET): $(BROTLI)
|
|
endif
|
|
|
|
$(INTERNAL_OTA_PACKAGE_TARGET): .KATI_IMPLICIT_OUTPUTS := $(INTERNAL_OTA_METADATA)
|
|
|
|
$(INTERNAL_OTA_PACKAGE_TARGET): $(BUILT_TARGET_FILES_PACKAGE) \
|
|
build/make/tools/releasetools/ota_from_target_files
|
|
@echo "Package OTA: $@"
|
|
$(call build-ota-package-target,$@,-k $(KEY_CERT_PAIR) --output_metadata_path $(INTERNAL_OTA_METADATA))
|
|
|
|
.PHONY: otapackage
|
|
otapackage: $(INTERNAL_OTA_PACKAGE_TARGET)
|
|
|
|
ifeq ($(BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE),true)
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-ota-retrofit-$(FILE_NAME_TAG)
|
|
|
|
INTERNAL_OTA_RETROFIT_DYNAMIC_PARTITIONS_PACKAGE_TARGET := $(PRODUCT_OUT)/$(name).zip
|
|
|
|
$(INTERNAL_OTA_RETROFIT_DYNAMIC_PARTITIONS_PACKAGE_TARGET): KEY_CERT_PAIR := $(DEFAULT_KEY_CERT_PAIR)
|
|
|
|
ifeq ($(AB_OTA_UPDATER),true)
|
|
$(INTERNAL_OTA_RETROFIT_DYNAMIC_PARTITIONS_PACKAGE_TARGET): $(BRILLO_UPDATE_PAYLOAD)
|
|
else
|
|
$(INTERNAL_OTA_RETROFIT_DYNAMIC_PARTITIONS_PACKAGE_TARGET): $(BROTLI)
|
|
endif
|
|
|
|
$(INTERNAL_OTA_RETROFIT_DYNAMIC_PARTITIONS_PACKAGE_TARGET): $(BUILT_TARGET_FILES_PACKAGE) \
|
|
build/make/tools/releasetools/ota_from_target_files
|
|
@echo "Package OTA (retrofit dynamic partitions): $@"
|
|
$(call build-ota-package-target,$@,-k $(KEY_CERT_PAIR) --retrofit_dynamic_partitions)
|
|
|
|
.PHONY: otardppackage
|
|
|
|
otapackage otardppackage: $(INTERNAL_OTA_RETROFIT_DYNAMIC_PARTITIONS_PACKAGE_TARGET)
|
|
|
|
endif # BOARD_BUILD_RETROFIT_DYNAMIC_PARTITIONS_OTA_PACKAGE
|
|
|
|
endif # build_ota_package
|
|
|
|
# -----------------------------------------------------------------
|
|
# The update package
|
|
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-img-$(FILE_NAME_TAG)
|
|
|
|
INTERNAL_UPDATE_PACKAGE_TARGET := $(PRODUCT_OUT)/$(name).zip
|
|
|
|
$(INTERNAL_UPDATE_PACKAGE_TARGET): $(BUILT_TARGET_FILES_PACKAGE) $(ZIP2ZIP)
|
|
@echo "Package: $@"
|
|
$(hide) $(ZIP2ZIP) -i $(BUILT_TARGET_FILES_PACKAGE) -o $@ \
|
|
OTA/android-info.txt:android-info.txt "IMAGES/*.img:."
|
|
|
|
.PHONY: updatepackage
|
|
updatepackage: $(INTERNAL_UPDATE_PACKAGE_TARGET)
|
|
|
|
# -----------------------------------------------------------------
|
|
# A zip of the appcompat directory containing logs
|
|
APPCOMPAT_ZIP := $(PRODUCT_OUT)/appcompat.zip
|
|
# For apps_only build we'll establish the dependency later in build/make/core/main.mk.
|
|
ifndef TARGET_BUILD_APPS
|
|
$(APPCOMPAT_ZIP): $(INSTALLED_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(INSTALLED_USERDATAIMAGE_TARGET) \
|
|
$(INSTALLED_VENDORIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCTIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET)
|
|
endif
|
|
$(APPCOMPAT_ZIP): PRIVATE_LIST_FILE := $(call intermediates-dir-for,PACKAGING,appcompat)/filelist
|
|
$(APPCOMPAT_ZIP): $(SOONG_ZIP)
|
|
@echo "appcompat logs: $@"
|
|
$(hide) rm -rf $@ $(PRIVATE_LIST_FILE)
|
|
$(hide) mkdir -p $(dir $@) $(PRODUCT_OUT)/appcompat $(dir $(PRIVATE_LIST_FILE))
|
|
$(hide) find $(PRODUCT_OUT)/appcompat | sort >$(PRIVATE_LIST_FILE)
|
|
$(hide) $(SOONG_ZIP) -d -o $@ -C $(PRODUCT_OUT)/appcompat -l $(PRIVATE_LIST_FILE)
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
# A zip of the symbols directory. Keep the full paths to make it
|
|
# more obvious where these files came from.
|
|
#
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-symbols-$(FILE_NAME_TAG)
|
|
|
|
SYMBOLS_ZIP := $(PRODUCT_OUT)/$(name).zip
|
|
# For apps_only build we'll establish the dependency later in build/make/core/main.mk.
|
|
ifndef TARGET_BUILD_APPS
|
|
$(SYMBOLS_ZIP): $(INSTALLED_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(INSTALLED_USERDATAIMAGE_TARGET) \
|
|
$(INSTALLED_VENDORIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCTIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) \
|
|
$(INSTALLED_ODMIMAGE_TARGET) \
|
|
$(updater_dep)
|
|
endif
|
|
$(SYMBOLS_ZIP): PRIVATE_LIST_FILE := $(call intermediates-dir-for,PACKAGING,symbols)/filelist
|
|
$(SYMBOLS_ZIP): $(SOONG_ZIP)
|
|
@echo "Package symbols: $@"
|
|
$(hide) rm -rf $@ $(PRIVATE_LIST_FILE)
|
|
$(hide) mkdir -p $(dir $@) $(TARGET_OUT_UNSTRIPPED) $(dir $(PRIVATE_LIST_FILE))
|
|
$(hide) find -L $(TARGET_OUT_UNSTRIPPED) -type f | sort >$(PRIVATE_LIST_FILE)
|
|
$(hide) $(SOONG_ZIP) -d -o $@ -C $(OUT_DIR)/.. -l $(PRIVATE_LIST_FILE)
|
|
# -----------------------------------------------------------------
|
|
# A zip of the coverage directory.
|
|
#
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-coverage-$(FILE_NAME_TAG)
|
|
COVERAGE_ZIP := $(PRODUCT_OUT)/$(name).zip
|
|
ifndef TARGET_BUILD_APPS
|
|
$(COVERAGE_ZIP): $(INSTALLED_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_BOOTIMAGE_TARGET) \
|
|
$(INSTALLED_USERDATAIMAGE_TARGET) \
|
|
$(INSTALLED_VENDORIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCTIMAGE_TARGET) \
|
|
$(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) \
|
|
$(INSTALLED_ODMIMAGE_TARGET)
|
|
endif
|
|
$(COVERAGE_ZIP): PRIVATE_LIST_FILE := $(call intermediates-dir-for,PACKAGING,coverage)/filelist
|
|
$(COVERAGE_ZIP): $(SOONG_ZIP)
|
|
@echo "Package coverage: $@"
|
|
$(hide) rm -rf $@ $(PRIVATE_LIST_FILE)
|
|
$(hide) mkdir -p $(dir $@) $(TARGET_OUT_COVERAGE) $(dir $(PRIVATE_LIST_FILE))
|
|
$(hide) find $(TARGET_OUT_COVERAGE) | sort >$(PRIVATE_LIST_FILE)
|
|
$(hide) $(SOONG_ZIP) -d -o $@ -C $(TARGET_OUT_COVERAGE) -l $(PRIVATE_LIST_FILE)
|
|
|
|
# -----------------------------------------------------------------
|
|
# A zip of the Android Apps. Not keeping full path so that we don't
|
|
# include product names when distributing
|
|
#
|
|
name := $(TARGET_PRODUCT)
|
|
ifeq ($(TARGET_BUILD_TYPE),debug)
|
|
name := $(name)_debug
|
|
endif
|
|
name := $(name)-apps-$(FILE_NAME_TAG)
|
|
|
|
APPS_ZIP := $(PRODUCT_OUT)/$(name).zip
|
|
$(APPS_ZIP): $(INSTALLED_SYSTEMIMAGE_TARGET)
|
|
@echo "Package apps: $@"
|
|
$(hide) rm -rf $@
|
|
$(hide) mkdir -p $(dir $@)
|
|
$(hide) apps_to_zip=`find $(TARGET_OUT_APPS) $(TARGET_OUT_APPS_PRIVILEGED) -mindepth 2 -maxdepth 3 -name "*.apk"`; \
|
|
if [ -z "$$apps_to_zip" ]; then \
|
|
echo "No apps to zip up. Generating empty apps archive." ; \
|
|
a=$$(mktemp /tmp/XXXXXXX) && touch $$a && zip $@ $$a && zip -d $@ $$a; \
|
|
else \
|
|
zip -qjX $@ $$apps_to_zip; \
|
|
fi
|
|
|
|
ifeq (true,$(EMMA_INSTRUMENT))
|
|
#------------------------------------------------------------------
|
|
# An archive of classes for use in generating code-coverage reports
|
|
# These are the uninstrumented versions of any classes that were
|
|
# to be instrumented.
|
|
# Any dependencies are set up later in build/make/core/main.mk.
|
|
|
|
JACOCO_REPORT_CLASSES_ALL := $(PRODUCT_OUT)/jacoco-report-classes-all.jar
|
|
$(JACOCO_REPORT_CLASSES_ALL) :
|
|
@echo "Collecting uninstrumented classes"
|
|
$(hide) find $(TARGET_COMMON_OUT_ROOT) $(HOST_COMMON_OUT_ROOT) -name "jacoco-report-classes.jar" | \
|
|
zip -@ -0 -q -X $@
|
|
# Meaning of these options:
|
|
# -@ scan stdin for file paths to add to the zip
|
|
# -0 don't do any compression
|
|
# -q supress most output
|
|
# -X skip storing extended file attributes
|
|
|
|
endif # EMMA_INSTRUMENT=true
|
|
|
|
|
|
#------------------------------------------------------------------
|
|
# A zip of Proguard obfuscation dictionary files.
|
|
# Only for apps_only build.
|
|
#
|
|
ifdef TARGET_BUILD_APPS
|
|
PROGUARD_DICT_ZIP := $(PRODUCT_OUT)/$(TARGET_PRODUCT)-proguard-dict-$(FILE_NAME_TAG).zip
|
|
# the dependency will be set up later in build/make/core/main.mk.
|
|
$(PROGUARD_DICT_ZIP) :
|
|
@echo "Packaging Proguard obfuscation dictionary files."
|
|
$(hide) dict_files=`find $(TARGET_OUT_COMMON_INTERMEDIATES)/APPS -name proguard_dictionary`; \
|
|
if [ -n "$$dict_files" ]; then \
|
|
unobfuscated_jars=$${dict_files//proguard_dictionary/classes.jar}; \
|
|
zip -qX $@ $$dict_files $$unobfuscated_jars; \
|
|
else \
|
|
touch $(dir $@)/zipdummy; \
|
|
(cd $(dir $@) && zip -q $(notdir $@) zipdummy); \
|
|
zip -qd $@ zipdummy; \
|
|
rm $(dir $@)/zipdummy; \
|
|
fi
|
|
|
|
endif # TARGET_BUILD_APPS
|
|
|
|
# -----------------------------------------------------------------
|
|
# super partition image
|
|
|
|
ifeq (true,$(PRODUCT_BUILD_SUPER_PARTITION))
|
|
|
|
# BOARD_SUPER_PARTITION_SIZE must be defined to build super image.
|
|
ifneq ($(BOARD_SUPER_PARTITION_SIZE),)
|
|
|
|
# Dump variables used by build_super_image.py.
|
|
define dump-super-image-info
|
|
$(call dump-dynamic-partitions-info,$(1))
|
|
$(if $(filter true,$(AB_OTA_UPDATER)), \
|
|
echo "ab_update=true" >> $(1))
|
|
endef
|
|
|
|
ifneq (true,$(PRODUCT_RETROFIT_DYNAMIC_PARTITIONS))
|
|
INSTALLED_SUPERIMAGE_TARGET := $(PRODUCT_OUT)/super.img
|
|
$(INSTALLED_SUPERIMAGE_TARGET): extracted_input_target_files := $(patsubst %.zip,%,$(BUILT_TARGET_FILES_PACKAGE))
|
|
$(INSTALLED_SUPERIMAGE_TARGET): $(LPMAKE) $(BUILT_TARGET_FILES_PACKAGE) $(BUILD_SUPER_IMAGE)
|
|
$(call pretty,"Target super fs image: $@")
|
|
PATH=$(dir $(LPMAKE)):$$PATH \
|
|
$(BUILD_SUPER_IMAGE) -v $(extracted_input_target_files) $@
|
|
|
|
# supernod uses images in the $(PRODUCT_OUT) directory instead of images from target files package.
|
|
.PHONY: superimage-nodeps supernod
|
|
superimage-nodeps supernod: intermediates := $(call intermediates-dir-for,PACKAGING,superimage-nodeps)
|
|
superimage-nodeps supernod: | $(LPMAKE) $(BUILD_SUPER_IMAGE) \
|
|
$(foreach p, $(BOARD_SUPER_PARTITION_PARTITION_LIST), $(INSTALLED_$(call to-upper,$(p))IMAGE_TARGET))
|
|
$(call pretty,"make $(INSTALLED_SUPERIMAGE_TARGET): ignoring dependencies")
|
|
mkdir -p $(intermediates)
|
|
rm -rf $(intermediates)/misc_info.txt
|
|
$(call dump-super-image-info,$(intermediates)/misc_info.txt)
|
|
$(foreach p,$(BOARD_SUPER_PARTITION_PARTITION_LIST), \
|
|
echo "$(p)_image=$(INSTALLED_$(call to-upper,$(p))IMAGE_TARGET)" >> $(intermediates)/misc_info.txt;)
|
|
PATH=$(dir $(LPMAKE)):$$PATH \
|
|
$(BUILD_SUPER_IMAGE) -v $(intermediates)/misc_info.txt $(INSTALLED_SUPERIMAGE_TARGET)
|
|
|
|
endif # PRODUCT_RETROFIT_DYNAMIC_PARTITIONS != "true"
|
|
|
|
$(call dist-for-goals,dist_files,$(INSTALLED_SUPERIMAGE_TARGET))
|
|
|
|
INSTALLED_SUPERIMAGE_EMPTY_TARGET := $(PRODUCT_OUT)/super_empty.img
|
|
$(INSTALLED_SUPERIMAGE_EMPTY_TARGET): intermediates := $(call intermediates-dir-for,PACKAGING,super_empty)
|
|
$(INSTALLED_SUPERIMAGE_EMPTY_TARGET): $(LPMAKE) $(BUILD_SUPER_IMAGE)
|
|
$(call pretty,"Target empty super fs image: $@")
|
|
mkdir -p $(intermediates)
|
|
rm -rf $(intermediates)/misc_info.txt
|
|
$(call dump-super-image-info,$(intermediates)/misc_info.txt)
|
|
PATH=$(dir $(LPMAKE)):$$PATH \
|
|
$(BUILD_SUPER_IMAGE) -v $(intermediates)/misc_info.txt $@
|
|
|
|
$(call dist-for-goals,dist_files,$(INSTALLED_SUPERIMAGE_EMPTY_TARGET))
|
|
|
|
endif # BOARD_SUPER_PARTITION_SIZE != ""
|
|
endif # PRODUCT_BUILD_SUPER_PARTITION == "true"
|
|
|
|
# -----------------------------------------------------------------
|
|
# dalvik something
|
|
.PHONY: dalvikfiles
|
|
dalvikfiles: $(INTERNAL_DALVIK_MODULES)
|
|
|
|
ifeq ($(BUILD_QEMU_IMAGES),true)
|
|
MK_QEMU_IMAGE_SH := device/generic/goldfish/tools/mk_qemu_image.sh
|
|
SGDISK_HOST := $(HOST_OUT_EXECUTABLES)/sgdisk
|
|
|
|
ifdef INSTALLED_SYSTEMIMAGE_TARGET
|
|
INSTALLED_QEMU_SYSTEMIMAGE := $(PRODUCT_OUT)/system-qemu.img
|
|
$(INSTALLED_QEMU_SYSTEMIMAGE): $(INSTALLED_SYSTEMIMAGE_TARGET) $(MK_QEMU_IMAGE_SH) $(SGDISK_HOST) $(SIMG2IMG)
|
|
@echo Create system-qemu.img
|
|
(export SGDISK=$(SGDISK_HOST) SIMG2IMG=$(SIMG2IMG); $(MK_QEMU_IMAGE_SH) $(INSTALLED_SYSTEMIMAGE_TARGET))
|
|
|
|
systemimage: $(INSTALLED_QEMU_SYSTEMIMAGE)
|
|
droidcore: $(INSTALLED_QEMU_SYSTEMIMAGE)
|
|
endif
|
|
ifdef INSTALLED_VENDORIMAGE_TARGET
|
|
INSTALLED_QEMU_VENDORIMAGE := $(PRODUCT_OUT)/vendor-qemu.img
|
|
$(INSTALLED_QEMU_VENDORIMAGE): $(INSTALLED_VENDORIMAGE_TARGET) $(MK_QEMU_IMAGE_SH) $(SGDISK_HOST) $(SIMG2IMG)
|
|
@echo Create vendor-qemu.img
|
|
(export SGDISK=$(SGDISK_HOST) SIMG2IMG=$(SIMG2IMG); $(MK_QEMU_IMAGE_SH) $(INSTALLED_VENDORIMAGE_TARGET))
|
|
|
|
vendorimage: $(INSTALLED_QEMU_VENDORIMAGE)
|
|
droidcore: $(INSTALLED_QEMU_VENDORIMAGE)
|
|
endif
|
|
ifdef INSTALLED_PRODUCTIMAGE_TARGET
|
|
INSTALLED_QEMU_PRODUCTIMAGE := $(PRODUCT_OUT)/product-qemu.img
|
|
$(INSTALLED_QEMU_PRODUCTIMAGE): $(INSTALLED_PRODUCTIMAGE_TARGET) $(MK_QEMU_IMAGE_SH) $(SGDISK_HOST) $(SIMG2IMG)
|
|
@echo Create product-qemu.img
|
|
(export SGDISK=$(SGDISK_HOST) SIMG2IMG=$(SIMG2IMG); $(MK_QEMU_IMAGE_SH) $(INSTALLED_PRODUCTIMAGE_TARGET))
|
|
|
|
productimage: $(INSTALLED_QEMU_PRODUCTIMAGE)
|
|
droidcore: $(INSTALLED_QEMU_PRODUCTIMAGE)
|
|
endif
|
|
ifdef INSTALLED_PRODUCT_SERVICESIMAGE_TARGET
|
|
INSTALLED_QEMU_PRODUCT_SERVICESIMAGE := $(PRODUCT_OUT)/product_services-qemu.img
|
|
$(INSTALLED_QEMU_PRODUCT_SERVICESIMAGE): $(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET) $(MK_QEMU_IMAGE_SH) $(SGDISK_HOST) $(SIMG2IMG)
|
|
@echo Create product_services-qemu.img
|
|
(export SGDISK=$(SGDISK_HOST) SIMG2IMG=$(SIMG2IMG); $(MK_QEMU_IMAGE_SH) $(INSTALLED_PRODUCT_SERVICESIMAGE_TARGET))
|
|
|
|
productservicesimage: $(INSTALLED_QEMU_PRODUCT_SERVICESIMAGE)
|
|
droidcore: $(INSTALLED_QEMU_PRODUCT_SERVICESIMAGE)
|
|
endif
|
|
ifdef INSTALLED_ODMIMAGE_TARGET
|
|
INSTALLED_QEMU_ODMIMAGE := $(PRODUCT_OUT)/odm-qemu.img
|
|
$(INSTALLED_QEMU_ODMIMAGE): $(INSTALLED_ODMIMAGE_TARGET) $(MK_QEMU_IMAGE_SH) $(SGDISK_HOST)
|
|
@echo Create odm-qemu.img
|
|
(export SGDISK=$(SGDISK_HOST); $(MK_QEMU_IMAGE_SH) $(INSTALLED_ODMIMAGE_TARGET))
|
|
|
|
odmimage: $(INSTALLED_QEMU_ODMIMAGE)
|
|
droidcore: $(INSTALLED_QEMU_ODMIMAGE)
|
|
endif
|
|
|
|
ifeq ($(BOARD_AVB_ENABLE),true)
|
|
QEMU_VERIFIED_BOOT_PARAMS := $(PRODUCT_OUT)/VerifiedBootParams.textproto
|
|
MK_VERIFIED_BOOT_KERNEL_CMDLINE_SH := device/generic/goldfish/tools/mk_verified_boot_params.sh
|
|
$(QEMU_VERIFIED_BOOT_PARAMS): $(INSTALLED_QEMU_SYSTEMIMAGE) $(MK_VERIFIED_BOOT_KERNEL_CMDLINE_SH) $(INSTALLED_VBMETAIMAGE_TARGET) $(SGDISK_HOST) $(AVBTOOL)
|
|
@echo Creating $@
|
|
(export SGDISK=$(SGDISK_HOST) AVBTOOL=$(AVBTOOL); $(MK_VERIFIED_BOOT_KERNEL_CMDLINE_SH) $(INSTALLED_VBMETAIMAGE_TARGET) $(INSTALLED_QEMU_SYSTEMIMAGE) $(QEMU_VERIFIED_BOOT_PARAMS))
|
|
|
|
|
|
systemimage: $(QEMU_VERIFIED_BOOT_PARAMS)
|
|
droidcore: $(QEMU_VERIFIED_BOOT_PARAMS)
|
|
endif
|
|
endif
|
|
# -----------------------------------------------------------------
|
|
# The emulator package
|
|
ifeq ($(BUILD_EMULATOR),true)
|
|
INTERNAL_EMULATOR_PACKAGE_FILES += \
|
|
$(HOST_OUT_EXECUTABLES)/emulator$(HOST_EXECUTABLE_SUFFIX) \
|
|
prebuilts/qemu-kernel/$(TARGET_ARCH)/kernel-qemu \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_USERDATAIMAGE_TARGET)
|
|
|
|
name := $(TARGET_PRODUCT)-emulator-$(FILE_NAME_TAG)
|
|
|
|
INTERNAL_EMULATOR_PACKAGE_TARGET := $(PRODUCT_OUT)/$(name).zip
|
|
|
|
$(INTERNAL_EMULATOR_PACKAGE_TARGET): $(INTERNAL_EMULATOR_PACKAGE_FILES)
|
|
@echo "Package: $@"
|
|
$(hide) zip -qjX $@ $(INTERNAL_EMULATOR_PACKAGE_FILES)
|
|
|
|
endif
|
|
# -----------------------------------------------------------------
|
|
# Old PDK stuffs, retired
|
|
# The pdk package (Platform Development Kit)
|
|
|
|
#ifneq (,$(filter pdk,$(MAKECMDGOALS)))
|
|
# include development/pdk/Pdk.mk
|
|
#endif
|
|
|
|
|
|
# -----------------------------------------------------------------
|
|
# The SDK
|
|
|
|
# The SDK includes host-specific components, so it belongs under HOST_OUT.
|
|
sdk_dir := $(HOST_OUT)/sdk/$(TARGET_PRODUCT)
|
|
|
|
# Build a name that looks like:
|
|
#
|
|
# linux-x86 --> android-sdk_12345_linux-x86
|
|
# darwin-x86 --> android-sdk_12345_mac-x86
|
|
# windows-x86 --> android-sdk_12345_windows
|
|
#
|
|
sdk_name := android-sdk_$(FILE_NAME_TAG)
|
|
ifeq ($(HOST_OS),darwin)
|
|
INTERNAL_SDK_HOST_OS_NAME := mac
|
|
else
|
|
INTERNAL_SDK_HOST_OS_NAME := $(HOST_OS)
|
|
endif
|
|
ifneq ($(HOST_OS),windows)
|
|
INTERNAL_SDK_HOST_OS_NAME := $(INTERNAL_SDK_HOST_OS_NAME)-$(SDK_HOST_ARCH)
|
|
endif
|
|
sdk_name := $(sdk_name)_$(INTERNAL_SDK_HOST_OS_NAME)
|
|
|
|
sdk_dep_file := $(sdk_dir)/sdk_deps.mk
|
|
|
|
ATREE_FILES :=
|
|
-include $(sdk_dep_file)
|
|
|
|
# if we don't have a real list, then use "everything"
|
|
ifeq ($(strip $(ATREE_FILES)),)
|
|
ATREE_FILES := \
|
|
$(ALL_DEFAULT_INSTALLED_MODULES) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(ALL_DOCS) \
|
|
$(TARGET_OUT_COMMON_INTERMEDIATES)/PACKAGING/api-stubs-docs_annotations.zip \
|
|
$(ALL_SDK_FILES)
|
|
endif
|
|
|
|
atree_dir := development/build
|
|
|
|
|
|
sdk_atree_files := \
|
|
$(atree_dir)/sdk.exclude.atree \
|
|
$(atree_dir)/sdk-$(HOST_OS)-$(SDK_HOST_ARCH).atree
|
|
|
|
# development/build/sdk-android-<abi>.atree is used to differentiate
|
|
# between architecture models (e.g. ARMv5TE versus ARMv7) when copying
|
|
# files like the kernel image. We use TARGET_CPU_ABI because we don't
|
|
# have a better way to distinguish between CPU models.
|
|
ifneq (,$(strip $(wildcard $(atree_dir)/sdk-android-$(TARGET_CPU_ABI).atree)))
|
|
sdk_atree_files += $(atree_dir)/sdk-android-$(TARGET_CPU_ABI).atree
|
|
endif
|
|
|
|
ifneq ($(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SDK_ATREE_FILES),)
|
|
sdk_atree_files += $(PRODUCTS.$(INTERNAL_PRODUCT).PRODUCT_SDK_ATREE_FILES)
|
|
else
|
|
sdk_atree_files += $(atree_dir)/sdk.atree
|
|
endif
|
|
|
|
include $(BUILD_SYSTEM)/sdk_font.mk
|
|
|
|
deps := \
|
|
$(target_notice_file_txt) \
|
|
$(tools_notice_file_txt) \
|
|
$(OUT_DOCS)/offline-sdk-timestamp \
|
|
$(SYMBOLS_ZIP) \
|
|
$(COVERAGE_ZIP) \
|
|
$(APPCOMPAT_ZIP) \
|
|
$(INSTALLED_SYSTEMIMAGE_TARGET) \
|
|
$(INSTALLED_QEMU_SYSTEMIMAGE) \
|
|
$(INSTALLED_QEMU_VENDORIMAGE) \
|
|
$(QEMU_VERIFIED_BOOT_PARAMS) \
|
|
$(INSTALLED_USERDATAIMAGE_TARGET) \
|
|
$(INSTALLED_RAMDISK_TARGET) \
|
|
$(INSTALLED_SDK_BUILD_PROP_TARGET) \
|
|
$(INSTALLED_BUILD_PROP_TARGET) \
|
|
$(ATREE_FILES) \
|
|
$(sdk_atree_files) \
|
|
$(HOST_OUT_EXECUTABLES)/atree \
|
|
$(HOST_OUT_EXECUTABLES)/line_endings \
|
|
$(SDK_FONT_DEPS)
|
|
|
|
INTERNAL_SDK_TARGET := $(sdk_dir)/$(sdk_name).zip
|
|
$(INTERNAL_SDK_TARGET): PRIVATE_NAME := $(sdk_name)
|
|
$(INTERNAL_SDK_TARGET): PRIVATE_DIR := $(sdk_dir)/$(sdk_name)
|
|
$(INTERNAL_SDK_TARGET): PRIVATE_DEP_FILE := $(sdk_dep_file)
|
|
$(INTERNAL_SDK_TARGET): PRIVATE_INPUT_FILES := $(sdk_atree_files)
|
|
|
|
# Set SDK_GNU_ERROR to non-empty to fail when a GNU target is built.
|
|
#
|
|
#SDK_GNU_ERROR := true
|
|
|
|
$(INTERNAL_SDK_TARGET): $(deps)
|
|
@echo "Package SDK: $@"
|
|
$(hide) rm -rf $(PRIVATE_DIR) $@
|
|
$(hide) for f in $(target_gnu_MODULES); do \
|
|
if [ -f $$f ]; then \
|
|
echo SDK: $(if $(SDK_GNU_ERROR),ERROR:,warning:) \
|
|
including GNU target $$f >&2; \
|
|
FAIL=$(SDK_GNU_ERROR); \
|
|
fi; \
|
|
done; \
|
|
if [ $$FAIL ]; then exit 1; fi
|
|
$(hide) echo $(notdir $(SDK_FONT_DEPS)) | tr " " "\n" > $(SDK_FONT_TEMP)/fontsInSdk.txt
|
|
$(hide) ( \
|
|
ATREE_STRIP="$(HOST_STRIP) -x" \
|
|
$(HOST_OUT_EXECUTABLES)/atree \
|
|
$(addprefix -f ,$(PRIVATE_INPUT_FILES)) \
|
|
-m $(PRIVATE_DEP_FILE) \
|
|
-I . \
|
|
-I $(PRODUCT_OUT) \
|
|
-I $(HOST_OUT) \
|
|
-I $(TARGET_COMMON_OUT_ROOT) \
|
|
-v "PLATFORM_NAME=android-$(PLATFORM_VERSION)" \
|
|
-v "OUT_DIR=$(OUT_DIR)" \
|
|
-v "HOST_OUT=$(HOST_OUT)" \
|
|
-v "TARGET_ARCH=$(TARGET_ARCH)" \
|
|
-v "TARGET_CPU_ABI=$(TARGET_CPU_ABI)" \
|
|
-v "DLL_EXTENSION=$(HOST_SHLIB_SUFFIX)" \
|
|
-v "FONT_OUT=$(SDK_FONT_TEMP)" \
|
|
-o $(PRIVATE_DIR) && \
|
|
cp -f $(target_notice_file_txt) \
|
|
$(PRIVATE_DIR)/system-images/android-$(PLATFORM_VERSION)/$(TARGET_CPU_ABI)/NOTICE.txt && \
|
|
cp -f $(tools_notice_file_txt) $(PRIVATE_DIR)/platform-tools/NOTICE.txt && \
|
|
HOST_OUT_EXECUTABLES=$(HOST_OUT_EXECUTABLES) HOST_OS=$(HOST_OS) \
|
|
development/build/tools/sdk_clean.sh $(PRIVATE_DIR) && \
|
|
chmod -R ug+rwX $(PRIVATE_DIR) && \
|
|
cd $(dir $@) && zip -rqX $(notdir $@) $(PRIVATE_NAME) \
|
|
) || ( rm -rf $(PRIVATE_DIR) $@ && exit 44 )
|
|
|
|
|
|
# Is a Windows SDK requested? If so, we need some definitions from here
|
|
# in order to find the Linux SDK used to create the Windows one.
|
|
MAIN_SDK_NAME := $(sdk_name)
|
|
MAIN_SDK_DIR := $(sdk_dir)
|
|
MAIN_SDK_ZIP := $(INTERNAL_SDK_TARGET)
|
|
ifneq ($(filter win_sdk winsdk-tools,$(MAKECMDGOALS)),)
|
|
include $(TOPDIR)development/build/tools/windows_sdk.mk
|
|
endif
|
|
|
|
# -----------------------------------------------------------------
|
|
# Findbugs
|
|
INTERNAL_FINDBUGS_XML_TARGET := $(PRODUCT_OUT)/findbugs.xml
|
|
INTERNAL_FINDBUGS_HTML_TARGET := $(PRODUCT_OUT)/findbugs.html
|
|
$(INTERNAL_FINDBUGS_XML_TARGET): $(ALL_FINDBUGS_FILES)
|
|
@echo UnionBugs: $@
|
|
$(hide) $(FINDBUGS_DIR)/unionBugs $(ALL_FINDBUGS_FILES) \
|
|
> $@
|
|
$(INTERNAL_FINDBUGS_HTML_TARGET): $(INTERNAL_FINDBUGS_XML_TARGET)
|
|
@echo ConvertXmlToText: $@
|
|
$(hide) $(FINDBUGS_DIR)/convertXmlToText -html:fancy.xsl \
|
|
$(INTERNAL_FINDBUGS_XML_TARGET) > $@
|
|
|
|
# -----------------------------------------------------------------
|
|
# Findbugs
|
|
|
|
# -----------------------------------------------------------------
|
|
# These are some additional build tasks that need to be run.
|
|
ifneq ($(dont_bother),true)
|
|
include $(sort $(wildcard $(BUILD_SYSTEM)/tasks/*.mk))
|
|
-include $(sort $(wildcard vendor/*/build/tasks/*.mk))
|
|
-include $(sort $(wildcard device/*/build/tasks/*.mk))
|
|
-include $(sort $(wildcard product/*/build/tasks/*.mk))
|
|
# Also the project-specific tasks
|
|
-include $(sort $(wildcard vendor/*/*/build/tasks/*.mk))
|
|
-include $(sort $(wildcard device/*/*/build/tasks/*.mk))
|
|
-include $(sort $(wildcard product/*/*/build/tasks/*.mk))
|
|
# Also add test specifc tasks
|
|
include $(sort $(wildcard platform_testing/build/tasks/*.mk))
|
|
include $(sort $(wildcard test/vts/tools/build/tasks/*.mk))
|
|
endif
|
|
|
|
include $(BUILD_SYSTEM)/product-graph.mk
|
|
|
|
# -----------------------------------------------------------------
|
|
# Create SDK repository packages. Must be done after tasks/* since
|
|
# we need the addon rules defined.
|
|
ifneq ($(sdk_repo_goal),)
|
|
include $(TOPDIR)development/build/tools/sdk_repo.mk
|
|
endif
|