// Copyright 2020 The Android Open Source Project // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package cc // This file contains singletons to capture vendor and recovery snapshot. They consist of prebuilt // modules under AOSP so older vendor and recovery can be built with a newer system in a single // source tree. import ( "encoding/json" "path/filepath" "sort" "strings" "android/soong/android" ) var vendorSnapshotSingleton = snapshotSingleton{ "vendor", "SOONG_VENDOR_SNAPSHOT_ZIP", android.OptionalPath{}, true, VendorSnapshotImageSingleton, false, /* fake */ } var vendorFakeSnapshotSingleton = snapshotSingleton{ "vendor", "SOONG_VENDOR_FAKE_SNAPSHOT_ZIP", android.OptionalPath{}, true, VendorSnapshotImageSingleton, true, /* fake */ } var recoverySnapshotSingleton = snapshotSingleton{ "recovery", "SOONG_RECOVERY_SNAPSHOT_ZIP", android.OptionalPath{}, false, recoverySnapshotImageSingleton, false, /* fake */ } func VendorSnapshotSingleton() android.Singleton { return &vendorSnapshotSingleton } func VendorFakeSnapshotSingleton() android.Singleton { return &vendorFakeSnapshotSingleton } func RecoverySnapshotSingleton() android.Singleton { return &recoverySnapshotSingleton } type snapshotSingleton struct { // Name, e.g., "vendor", "recovery", "ramdisk". name string // Make variable that points to the snapshot file, e.g., // "SOONG_RECOVERY_SNAPSHOT_ZIP". makeVar string // Path to the snapshot zip file. snapshotZipFile android.OptionalPath // Whether the image supports VNDK extension modules. supportsVndkExt bool // Implementation of the image interface specific to the image // associated with this snapshot (e.g., specific to the vendor image, // recovery image, etc.). image SnapshotImage // Whether this singleton is for fake snapshot or not. // Fake snapshot is a snapshot whose prebuilt binaries and headers are empty. // It is much faster to generate, and can be used to inspect dependencies. fake bool } // Determine if a dir under source tree is an SoC-owned proprietary directory based // on vendor snapshot configuration // Examples: device/, vendor/ func isVendorProprietaryPath(dir string, deviceConfig android.DeviceConfig) bool { return VendorSnapshotSingleton().(*snapshotSingleton).image.isProprietaryPath(dir, deviceConfig) } // Determine if a dir under source tree is an SoC-owned proprietary directory based // on recovery snapshot configuration // Examples: device/, vendor/ func isRecoveryProprietaryPath(dir string, deviceConfig android.DeviceConfig) bool { return RecoverySnapshotSingleton().(*snapshotSingleton).image.isProprietaryPath(dir, deviceConfig) } func IsVendorProprietaryModule(ctx android.BaseModuleContext) bool { // Any module in a vendor proprietary path is a vendor proprietary // module. if isVendorProprietaryPath(ctx.ModuleDir(), ctx.DeviceConfig()) { return true } // However if the module is not in a vendor proprietary path, it may // still be a vendor proprietary module. This happens for cc modules // that are excluded from the vendor snapshot, and it means that the // vendor has assumed control of the framework-provided module. if c, ok := ctx.Module().(LinkableInterface); ok { if c.ExcludeFromVendorSnapshot() { return true } } return false } func isRecoveryProprietaryModule(ctx android.BaseModuleContext) bool { // Any module in a recovery proprietary path is a recovery proprietary // module. if isRecoveryProprietaryPath(ctx.ModuleDir(), ctx.DeviceConfig()) { return true } // However if the module is not in a recovery proprietary path, it may // still be a recovery proprietary module. This happens for cc modules // that are excluded from the recovery snapshot, and it means that the // vendor has assumed control of the framework-provided module. if c, ok := ctx.Module().(LinkableInterface); ok { if c.ExcludeFromRecoverySnapshot() { return true } } return false } // Determines if the module is a candidate for snapshot. func isSnapshotAware(cfg android.DeviceConfig, m LinkableInterface, inProprietaryPath bool, apexInfo android.ApexInfo, image SnapshotImage) bool { if !m.Enabled() || m.HiddenFromMake() { return false } // When android/prebuilt.go selects between source and prebuilt, it sets // HideFromMake on the other one to avoid duplicate install rules in make. if m.IsHideFromMake() { return false } // skip proprietary modules, but (for the vendor snapshot only) // include all VNDK (static) if inProprietaryPath && (!image.includeVndk() || !m.IsVndk()) { return false } // If the module would be included based on its path, check to see if // the module is marked to be excluded. If so, skip it. if image.excludeFromSnapshot(m) { return false } if m.Target().Os.Class != android.Device { return false } if m.Target().NativeBridge == android.NativeBridgeEnabled { return false } // the module must be installed in target image if !apexInfo.IsForPlatform() || m.IsSnapshotPrebuilt() || !image.inImage(m)() { return false } // skip kernel_headers which always depend on vendor if m.KernelHeadersDecorator() { return false } if m.IsLlndk() { return false } // Libraries if sanitizable, ok := m.(PlatformSanitizeable); ok && sanitizable.IsSnapshotLibrary() { if sanitizable.SanitizePropDefined() { // scs and hwasan export both sanitized and unsanitized variants for static and header // Always use unsanitized variants of them. for _, t := range []SanitizerType{scs, Hwasan} { if !sanitizable.Shared() && sanitizable.IsSanitizerEnabled(t) { return false } } // cfi also exports both variants. But for static, we capture both. // This is because cfi static libraries can't be linked from non-cfi modules, // and vice versa. This isn't the case for scs and hwasan sanitizers. if !sanitizable.Static() && !sanitizable.Shared() && sanitizable.IsSanitizerEnabled(cfi) { return false } } if sanitizable.Static() { return sanitizable.OutputFile().Valid() && !image.private(m) } if sanitizable.Shared() || sanitizable.Rlib() { if !sanitizable.OutputFile().Valid() { return false } if image.includeVndk() { if !sanitizable.IsVndk() { return true } return sanitizable.IsVndkExt() } } return true } // Binaries and Objects if m.Binary() || m.Object() { return m.OutputFile().Valid() } return false } // This is to be saved as .json files, which is for development/vendor_snapshot/update.py. // These flags become Android.bp snapshot module properties. type snapshotJsonFlags struct { ModuleName string `json:",omitempty"` RelativeInstallPath string `json:",omitempty"` // library flags ExportedDirs []string `json:",omitempty"` ExportedSystemDirs []string `json:",omitempty"` ExportedFlags []string `json:",omitempty"` Sanitize string `json:",omitempty"` SanitizeMinimalDep bool `json:",omitempty"` SanitizeUbsanDep bool `json:",omitempty"` // binary flags Symlinks []string `json:",omitempty"` StaticExecutable bool `json:",omitempty"` // dependencies SharedLibs []string `json:",omitempty"` StaticLibs []string `json:",omitempty"` RuntimeLibs []string `json:",omitempty"` Required []string `json:",omitempty"` // extra config files InitRc []string `json:",omitempty"` VintfFragments []string `json:",omitempty"` } func (c *snapshotSingleton) GenerateBuildActions(ctx android.SingletonContext) { if !c.image.shouldGenerateSnapshot(ctx) { return } var snapshotOutputs android.Paths /* Vendor snapshot zipped artifacts directory structure: {SNAPSHOT_ARCH}/ arch-{TARGET_ARCH}-{TARGET_ARCH_VARIANT}/ shared/ (.so shared libraries) static/ (.a static libraries) header/ (header only libraries) binary/ (executable binaries) object/ (.o object files) arch-{TARGET_2ND_ARCH}-{TARGET_2ND_ARCH_VARIANT}/ shared/ (.so shared libraries) static/ (.a static libraries) header/ (header only libraries) binary/ (executable binaries) object/ (.o object files) NOTICE_FILES/ (notice files, e.g. libbase.txt) configs/ (config files, e.g. init.rc files, vintf_fragments.xml files, etc.) include/ (header files of same directory structure with source tree) */ snapshotDir := c.name + "-snapshot" if c.fake { // If this is a fake snapshot singleton, place all files under fake/ subdirectory to avoid // collision with real snapshot files snapshotDir = filepath.Join("fake", snapshotDir) } snapshotArchDir := filepath.Join(snapshotDir, ctx.DeviceConfig().DeviceArch()) includeDir := filepath.Join(snapshotArchDir, "include") configsDir := filepath.Join(snapshotArchDir, "configs") noticeDir := filepath.Join(snapshotArchDir, "NOTICE_FILES") installedNotices := make(map[string]bool) installedConfigs := make(map[string]bool) var headers android.Paths copyFile := func(ctx android.SingletonContext, path android.Path, out string, fake bool) android.OutputPath { if fake { // All prebuilt binaries and headers are installed by copyFile function. This makes a fake // snapshot just touch prebuilts and headers, rather than installing real files. return writeStringToFileRule(ctx, "", out) } else { return copyFileRule(ctx, path, out) } } // installSnapshot function copies prebuilt file (.so, .a, or executable) and json flag file. // For executables, init_rc and vintf_fragments files are also copied. installSnapshot := func(m LinkableInterface, fake bool) android.Paths { targetArch := "arch-" + m.Target().Arch.ArchType.String() if m.Target().Arch.ArchVariant != "" { targetArch += "-" + m.Target().Arch.ArchVariant } var ret android.Paths prop := snapshotJsonFlags{} // Common properties among snapshots. prop.ModuleName = ctx.ModuleName(m) if c.supportsVndkExt && m.IsVndkExt() { // vndk exts are installed to /vendor/lib(64)?/vndk(-sp)? if m.IsVndkSp() { prop.RelativeInstallPath = "vndk-sp" } else { prop.RelativeInstallPath = "vndk" } } else { prop.RelativeInstallPath = m.RelativeInstallPath() } prop.RuntimeLibs = m.SnapshotRuntimeLibs() prop.Required = m.RequiredModuleNames() for _, path := range m.InitRc() { prop.InitRc = append(prop.InitRc, filepath.Join("configs", path.Base())) } for _, path := range m.VintfFragments() { prop.VintfFragments = append(prop.VintfFragments, filepath.Join("configs", path.Base())) } // install config files. ignores any duplicates. for _, path := range append(m.InitRc(), m.VintfFragments()...) { out := filepath.Join(configsDir, path.Base()) if !installedConfigs[out] { installedConfigs[out] = true ret = append(ret, copyFile(ctx, path, out, fake)) } } var propOut string if m.IsSnapshotLibrary() { exporterInfo := ctx.ModuleProvider(m.Module(), FlagExporterInfoProvider).(FlagExporterInfo) // library flags prop.ExportedFlags = exporterInfo.Flags for _, dir := range exporterInfo.IncludeDirs { prop.ExportedDirs = append(prop.ExportedDirs, filepath.Join("include", dir.String())) } for _, dir := range exporterInfo.SystemIncludeDirs { prop.ExportedSystemDirs = append(prop.ExportedSystemDirs, filepath.Join("include", dir.String())) } // shared libs dependencies aren't meaningful on static or header libs if m.Shared() { prop.SharedLibs = m.SnapshotSharedLibs() } // static libs dependencies are required to collect the NOTICE files. prop.StaticLibs = m.SnapshotStaticLibs() if sanitizable, ok := m.(PlatformSanitizeable); ok { if sanitizable.Static() && sanitizable.SanitizePropDefined() { prop.SanitizeMinimalDep = sanitizable.MinimalRuntimeDep() || sanitizable.MinimalRuntimeNeeded() prop.SanitizeUbsanDep = sanitizable.UbsanRuntimeDep() || sanitizable.UbsanRuntimeNeeded() } } var libType string if m.Static() { libType = "static" } else if m.Shared() { libType = "shared" } else if m.Rlib() { libType = "rlib" } else { libType = "header" } var stem string // install .a or .so if libType != "header" { libPath := m.OutputFile().Path() stem = libPath.Base() if sanitizable, ok := m.(PlatformSanitizeable); ok { if (sanitizable.Static() || sanitizable.Rlib()) && sanitizable.SanitizePropDefined() && sanitizable.IsSanitizerEnabled(cfi) { // both cfi and non-cfi variant for static libraries can exist. // attach .cfi to distinguish between cfi and non-cfi. // e.g. libbase.a -> libbase.cfi.a ext := filepath.Ext(stem) stem = strings.TrimSuffix(stem, ext) + ".cfi" + ext prop.Sanitize = "cfi" prop.ModuleName += ".cfi" } } snapshotLibOut := filepath.Join(snapshotArchDir, targetArch, libType, stem) ret = append(ret, copyFile(ctx, libPath, snapshotLibOut, fake)) } else { stem = ctx.ModuleName(m) } propOut = filepath.Join(snapshotArchDir, targetArch, libType, stem+".json") } else if m.Binary() { // binary flags prop.Symlinks = m.Symlinks() prop.StaticExecutable = m.StaticExecutable() prop.SharedLibs = m.SnapshotSharedLibs() // static libs dependencies are required to collect the NOTICE files. prop.StaticLibs = m.SnapshotStaticLibs() // install bin binPath := m.OutputFile().Path() snapshotBinOut := filepath.Join(snapshotArchDir, targetArch, "binary", binPath.Base()) ret = append(ret, copyFile(ctx, binPath, snapshotBinOut, fake)) propOut = snapshotBinOut + ".json" } else if m.Object() { // object files aren't installed to the device, so their names can conflict. // Use module name as stem. objPath := m.OutputFile().Path() snapshotObjOut := filepath.Join(snapshotArchDir, targetArch, "object", ctx.ModuleName(m)+filepath.Ext(objPath.Base())) ret = append(ret, copyFile(ctx, objPath, snapshotObjOut, fake)) propOut = snapshotObjOut + ".json" } else { ctx.Errorf("unknown module %q in vendor snapshot", m.String()) return nil } j, err := json.Marshal(prop) if err != nil { ctx.Errorf("json marshal to %q failed: %#v", propOut, err) return nil } ret = append(ret, writeStringToFileRule(ctx, string(j), propOut)) return ret } ctx.VisitAllModules(func(module android.Module) { m, ok := module.(LinkableInterface) if !ok { return } moduleDir := ctx.ModuleDir(module) inProprietaryPath := c.image.isProprietaryPath(moduleDir, ctx.DeviceConfig()) apexInfo := ctx.ModuleProvider(module, android.ApexInfoProvider).(android.ApexInfo) if c.image.excludeFromSnapshot(m) { if inProprietaryPath { // Error: exclude_from_vendor_snapshot applies // to framework-path modules only. ctx.Errorf("module %q in vendor proprietary path %q may not use \"exclude_from_vendor_snapshot: true\"", m.String(), moduleDir) return } } if !isSnapshotAware(ctx.DeviceConfig(), m, inProprietaryPath, apexInfo, c.image) { return } // If we are using directed snapshot and a module is not included in the // list, we will still include the module as if it was a fake module. // The reason is that soong needs all the dependencies to be present, even // if they are not using during the build. installAsFake := c.fake if c.image.excludeFromDirectedSnapshot(ctx.DeviceConfig(), m.BaseModuleName()) { installAsFake = true } // installSnapshot installs prebuilts and json flag files snapshotOutputs = append(snapshotOutputs, installSnapshot(m, installAsFake)...) // just gather headers and notice files here, because they are to be deduplicated if m.IsSnapshotLibrary() { headers = append(headers, m.SnapshotHeaders()...) } if len(m.EffectiveLicenseFiles()) > 0 { noticeName := ctx.ModuleName(m) + ".txt" noticeOut := filepath.Join(noticeDir, noticeName) // skip already copied notice file if !installedNotices[noticeOut] { installedNotices[noticeOut] = true snapshotOutputs = append(snapshotOutputs, combineNoticesRule(ctx, m.EffectiveLicenseFiles(), noticeOut)) } } }) // install all headers after removing duplicates for _, header := range android.FirstUniquePaths(headers) { snapshotOutputs = append(snapshotOutputs, copyFile(ctx, header, filepath.Join(includeDir, header.String()), c.fake)) } // All artifacts are ready. Sort them to normalize ninja and then zip. sort.Slice(snapshotOutputs, func(i, j int) bool { return snapshotOutputs[i].String() < snapshotOutputs[j].String() }) zipPath := android.PathForOutput( ctx, snapshotDir, c.name+"-"+ctx.Config().DeviceName()+".zip") zipRule := android.NewRuleBuilder(pctx, ctx) // filenames in rspfile from FlagWithRspFileInputList might be single-quoted. Remove it with tr snapshotOutputList := android.PathForOutput( ctx, snapshotDir, c.name+"-"+ctx.Config().DeviceName()+"_list") rspFile := snapshotOutputList.ReplaceExtension(ctx, "rsp") zipRule.Command(). Text("tr"). FlagWithArg("-d ", "\\'"). FlagWithRspFileInputList("< ", rspFile, snapshotOutputs). FlagWithOutput("> ", snapshotOutputList) zipRule.Temporary(snapshotOutputList) zipRule.Command(). BuiltTool("soong_zip"). FlagWithOutput("-o ", zipPath). FlagWithArg("-C ", android.PathForOutput(ctx, snapshotDir).String()). FlagWithInput("-l ", snapshotOutputList) zipRule.Build(zipPath.String(), c.name+" snapshot "+zipPath.String()) zipRule.DeleteTemporaryFiles() c.snapshotZipFile = android.OptionalPathForPath(zipPath) } func (c *snapshotSingleton) MakeVars(ctx android.MakeVarsContext) { ctx.Strict( c.makeVar, c.snapshotZipFile.String()) }