d48fe734cd
There were multiple stacked issues with prebuilt library stubs that cancelled eachother out. Prebuilts were never considered to be DirectlyInAnyApex by the AndroidMk logic to handle stubs libraries because it looked it up in the global list of modules in apexes using the name with the "prebuilt_" prefix. Fixing that to use ctx.BaseModuleName() exposed a second issue, that stubs variants for prebuilt libraries were never created, so there was no latest version to expose to Make. Making the *prebuiltLibraryLinker type work with all of the methods that handle stubs should really be done with an interface and methods implemented on *libraryDecorator, but that would also cause other types like that embed libraryDecorator to participate in stubs that may trigger more issues. I'd like to replace those methods anyways, so just manually handle *prebuiltLibraryLinker for now. Test: m checkbuild Change-Id: I1267ee01659ad9ab11d75318c6c6bdbf8f72a061
623 lines
23 KiB
Go
623 lines
23 KiB
Go
// Copyright 2015 Google Inc. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package cc
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"android/soong/android"
|
|
)
|
|
|
|
var (
|
|
nativeBridgeSuffix = ".native_bridge"
|
|
productSuffix = ".product"
|
|
vendorSuffix = ".vendor"
|
|
ramdiskSuffix = ".ramdisk"
|
|
recoverySuffix = ".recovery"
|
|
sdkSuffix = ".sdk"
|
|
)
|
|
|
|
type AndroidMkContext interface {
|
|
BaseModuleName() string
|
|
Target() android.Target
|
|
subAndroidMk(*android.AndroidMkEntries, interface{})
|
|
Arch() android.Arch
|
|
Os() android.OsType
|
|
Host() bool
|
|
UseVndk() bool
|
|
VndkVersion() string
|
|
static() bool
|
|
InRamdisk() bool
|
|
InRecovery() bool
|
|
}
|
|
|
|
type subAndroidMkProvider interface {
|
|
AndroidMkEntries(AndroidMkContext, *android.AndroidMkEntries)
|
|
}
|
|
|
|
func (c *Module) subAndroidMk(entries *android.AndroidMkEntries, obj interface{}) {
|
|
if c.subAndroidMkOnce == nil {
|
|
c.subAndroidMkOnce = make(map[subAndroidMkProvider]bool)
|
|
}
|
|
if androidmk, ok := obj.(subAndroidMkProvider); ok {
|
|
if !c.subAndroidMkOnce[androidmk] {
|
|
c.subAndroidMkOnce[androidmk] = true
|
|
androidmk.AndroidMkEntries(c, entries)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *Module) AndroidMkEntries() []android.AndroidMkEntries {
|
|
if c.Properties.HideFromMake || !c.IsForPlatform() {
|
|
return []android.AndroidMkEntries{{
|
|
Disabled: true,
|
|
}}
|
|
}
|
|
|
|
entries := android.AndroidMkEntries{
|
|
OutputFile: c.outputFile,
|
|
// TODO(jiyong): add the APEXes providing shared libs to the required modules
|
|
// Currently, adding c.Properties.ApexesProvidingSharedLibs is causing multiple
|
|
// ART APEXes (com.android.art.debug|release) to be installed. And this
|
|
// is breaking some older devices (like marlin) where system.img is small.
|
|
Required: c.Properties.AndroidMkRuntimeLibs,
|
|
Include: "$(BUILD_SYSTEM)/soong_cc_prebuilt.mk",
|
|
|
|
ExtraEntries: []android.AndroidMkExtraEntriesFunc{
|
|
func(entries *android.AndroidMkEntries) {
|
|
if len(c.Properties.Logtags) > 0 {
|
|
entries.AddStrings("LOCAL_LOGTAGS_FILES", c.Properties.Logtags...)
|
|
}
|
|
// Note: Pass the exact value of AndroidMkSystemSharedLibs to the Make
|
|
// world, even if it is an empty list. In the Make world,
|
|
// LOCAL_SYSTEM_SHARED_LIBRARIES defaults to "none", which is expanded
|
|
// to the default list of system shared libs by the build system.
|
|
// Soong computes the exact list of system shared libs, so we have to
|
|
// override the default value when the list of libs is actually empty.
|
|
entries.SetString("LOCAL_SYSTEM_SHARED_LIBRARIES", strings.Join(c.Properties.AndroidMkSystemSharedLibs, " "))
|
|
if len(c.Properties.AndroidMkSharedLibs) > 0 {
|
|
entries.AddStrings("LOCAL_SHARED_LIBRARIES", c.Properties.AndroidMkSharedLibs...)
|
|
}
|
|
if len(c.Properties.AndroidMkStaticLibs) > 0 {
|
|
entries.AddStrings("LOCAL_STATIC_LIBRARIES", c.Properties.AndroidMkStaticLibs...)
|
|
}
|
|
if len(c.Properties.AndroidMkWholeStaticLibs) > 0 {
|
|
entries.AddStrings("LOCAL_WHOLE_STATIC_LIBRARIES", c.Properties.AndroidMkWholeStaticLibs...)
|
|
}
|
|
if len(c.Properties.AndroidMkHeaderLibs) > 0 {
|
|
entries.AddStrings("LOCAL_HEADER_LIBRARIES", c.Properties.AndroidMkHeaderLibs...)
|
|
}
|
|
entries.SetString("LOCAL_SOONG_LINK_TYPE", c.makeLinkType)
|
|
if c.UseVndk() {
|
|
entries.SetBool("LOCAL_USE_VNDK", true)
|
|
if c.IsVndk() && !c.static() {
|
|
entries.SetString("LOCAL_SOONG_VNDK_VERSION", c.VndkVersion())
|
|
// VNDK libraries available to vendor are not installed because
|
|
// they are packaged in VNDK APEX and installed by APEX packages (apex/apex.go)
|
|
if !c.isVndkExt() {
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
}
|
|
}
|
|
}
|
|
if c.Properties.IsSdkVariant && c.Properties.SdkAndPlatformVariantVisibleToMake {
|
|
// Make the SDK variant uninstallable so that there are not two rules to install
|
|
// to the same location.
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
// Add the unsuffixed name to SOONG_SDK_VARIANT_MODULES so that Make can rewrite
|
|
// dependencies to the .sdk suffix when building a module that uses the SDK.
|
|
entries.SetString("SOONG_SDK_VARIANT_MODULES",
|
|
"$(SOONG_SDK_VARIANT_MODULES) $(patsubst %.sdk,%,$(LOCAL_MODULE))")
|
|
}
|
|
},
|
|
},
|
|
ExtraFooters: []android.AndroidMkExtraFootersFunc{
|
|
func(w io.Writer, name, prefix, moduleDir string, entries *android.AndroidMkEntries) {
|
|
if c.Properties.IsSdkVariant && c.Properties.SdkAndPlatformVariantVisibleToMake &&
|
|
c.CcLibraryInterface() && c.Shared() {
|
|
// Using the SDK variant as a JNI library needs a copy of the .so that
|
|
// is not named .sdk.so so that it can be packaged into the APK with
|
|
// the right name.
|
|
fmt.Fprintln(w, "$(eval $(call copy-one-file,",
|
|
"$(LOCAL_BUILT_MODULE),",
|
|
"$(patsubst %.sdk.so,%.so,$(LOCAL_BUILT_MODULE))))")
|
|
}
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, feature := range c.features {
|
|
c.subAndroidMk(&entries, feature)
|
|
}
|
|
|
|
c.subAndroidMk(&entries, c.compiler)
|
|
c.subAndroidMk(&entries, c.linker)
|
|
if c.sanitize != nil {
|
|
c.subAndroidMk(&entries, c.sanitize)
|
|
}
|
|
c.subAndroidMk(&entries, c.installer)
|
|
|
|
entries.SubName += c.Properties.SubName
|
|
|
|
return []android.AndroidMkEntries{entries}
|
|
}
|
|
|
|
func androidMkWriteExtraTestConfigs(extraTestConfigs android.Paths, entries *android.AndroidMkEntries) {
|
|
if len(extraTestConfigs) > 0 {
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.AddStrings("LOCAL_EXTRA_FULL_TEST_CONFIGS", extraTestConfigs.Strings()...)
|
|
})
|
|
}
|
|
}
|
|
|
|
func androidMkWriteTestData(data []android.DataPath, ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
testFiles := android.AndroidMkDataPaths(data)
|
|
if len(testFiles) > 0 {
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.AddStrings("LOCAL_TEST_DATA", testFiles...)
|
|
})
|
|
}
|
|
}
|
|
|
|
func makeOverrideModuleNames(ctx AndroidMkContext, overrides []string) []string {
|
|
if ctx.Target().NativeBridge == android.NativeBridgeEnabled {
|
|
var result []string
|
|
for _, override := range overrides {
|
|
result = append(result, override+nativeBridgeSuffix)
|
|
}
|
|
return result
|
|
}
|
|
|
|
return overrides
|
|
}
|
|
|
|
func (library *libraryDecorator) androidMkWriteExportedFlags(entries *android.AndroidMkEntries) {
|
|
exportedFlags := library.exportedFlags()
|
|
for _, dir := range library.exportedDirs() {
|
|
exportedFlags = append(exportedFlags, "-I"+dir.String())
|
|
}
|
|
for _, dir := range library.exportedSystemDirs() {
|
|
exportedFlags = append(exportedFlags, "-isystem "+dir.String())
|
|
}
|
|
if len(exportedFlags) > 0 {
|
|
entries.AddStrings("LOCAL_EXPORT_CFLAGS", exportedFlags...)
|
|
}
|
|
exportedDeps := library.exportedDeps()
|
|
if len(exportedDeps) > 0 {
|
|
entries.AddStrings("LOCAL_EXPORT_C_INCLUDE_DEPS", exportedDeps.Strings()...)
|
|
}
|
|
}
|
|
|
|
func (library *libraryDecorator) androidMkEntriesWriteAdditionalDependenciesForSourceAbiDiff(entries *android.AndroidMkEntries) {
|
|
if library.sAbiDiff.Valid() && !library.static() {
|
|
entries.AddStrings("LOCAL_ADDITIONAL_DEPENDENCIES", library.sAbiDiff.String())
|
|
}
|
|
}
|
|
|
|
// TODO(ccross): remove this once apex/androidmk.go is converted to AndroidMkEntries
|
|
func (library *libraryDecorator) androidMkWriteAdditionalDependenciesForSourceAbiDiff(w io.Writer) {
|
|
if library.sAbiDiff.Valid() && !library.static() {
|
|
fmt.Fprintln(w, "LOCAL_ADDITIONAL_DEPENDENCIES +=", library.sAbiDiff.String())
|
|
}
|
|
}
|
|
|
|
func (library *libraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
if library.static() {
|
|
entries.Class = "STATIC_LIBRARIES"
|
|
} else if library.shared() {
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.SetString("LOCAL_SOONG_TOC", library.toc().String())
|
|
if !library.buildStubs() {
|
|
entries.SetString("LOCAL_SOONG_UNSTRIPPED_BINARY", library.unstrippedOutputFile.String())
|
|
}
|
|
if len(library.Properties.Overrides) > 0 {
|
|
entries.SetString("LOCAL_OVERRIDES_MODULES", strings.Join(makeOverrideModuleNames(ctx, library.Properties.Overrides), " "))
|
|
}
|
|
if len(library.post_install_cmds) > 0 {
|
|
entries.SetString("LOCAL_POST_INSTALL_CMD", strings.Join(library.post_install_cmds, "&& "))
|
|
}
|
|
})
|
|
} else if library.header() {
|
|
entries.Class = "HEADER_LIBRARIES"
|
|
}
|
|
|
|
if library.distFile != nil {
|
|
entries.DistFiles = android.MakeDefaultDistFiles(library.distFile)
|
|
}
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
library.androidMkWriteExportedFlags(entries)
|
|
library.androidMkEntriesWriteAdditionalDependenciesForSourceAbiDiff(entries)
|
|
|
|
_, _, ext := android.SplitFileExt(entries.OutputFile.Path().Base())
|
|
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
|
|
if library.coverageOutputFile.Valid() {
|
|
entries.SetString("LOCAL_PREBUILT_COVERAGE_ARCHIVE", library.coverageOutputFile.String())
|
|
}
|
|
|
|
if library.useCoreVariant {
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
|
entries.SetBool("LOCAL_VNDK_DEPEND_ON_CORE_VARIANT", true)
|
|
}
|
|
if library.checkSameCoreVariant {
|
|
entries.SetBool("LOCAL_CHECK_SAME_VNDK_VARIANTS", true)
|
|
}
|
|
})
|
|
|
|
if library.shared() && !library.buildStubs() {
|
|
ctx.subAndroidMk(entries, library.baseInstaller)
|
|
} else {
|
|
if library.buildStubs() {
|
|
entries.SubName = "." + library.stubsVersion()
|
|
}
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
// library.makeUninstallable() depends on this to bypass SkipInstall() for
|
|
// static libraries.
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
if library.buildStubs() {
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
|
}
|
|
})
|
|
}
|
|
if len(library.Properties.Stubs.Versions) > 0 &&
|
|
android.DirectlyInAnyApex(ctx, ctx.BaseModuleName()) && !ctx.InRamdisk() && !ctx.InRecovery() && !ctx.UseVndk() &&
|
|
!ctx.static() {
|
|
if library.buildStubs() && library.isLatestStubVersion() {
|
|
// reference the latest version via its name without suffix when it is provided by apex
|
|
entries.SubName = ""
|
|
}
|
|
if !library.buildStubs() {
|
|
entries.SubName = ".bootstrap"
|
|
}
|
|
}
|
|
}
|
|
|
|
func (object *objectLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "STATIC_LIBRARIES"
|
|
entries.ExtraFooters = append(entries.ExtraFooters,
|
|
func(w io.Writer, name, prefix, moduleDir string, entries *android.AndroidMkEntries) {
|
|
out := entries.OutputFile.Path()
|
|
varname := fmt.Sprintf("SOONG_%sOBJECT_%s%s", prefix, name, entries.SubName)
|
|
|
|
fmt.Fprintf(w, "\n%s := %s\n", varname, out.String())
|
|
fmt.Fprintln(w, ".KATI_READONLY: "+varname)
|
|
})
|
|
}
|
|
|
|
func (binary *binaryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, binary.baseInstaller)
|
|
|
|
entries.Class = "EXECUTABLES"
|
|
entries.DistFiles = binary.distFiles
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.SetString("LOCAL_SOONG_UNSTRIPPED_BINARY", binary.unstrippedOutputFile.String())
|
|
if len(binary.symlinks) > 0 {
|
|
entries.AddStrings("LOCAL_MODULE_SYMLINKS", binary.symlinks...)
|
|
}
|
|
|
|
if binary.coverageOutputFile.Valid() {
|
|
entries.SetString("LOCAL_PREBUILT_COVERAGE_ARCHIVE", binary.coverageOutputFile.String())
|
|
}
|
|
|
|
if len(binary.Properties.Overrides) > 0 {
|
|
entries.SetString("LOCAL_OVERRIDES_MODULES", strings.Join(makeOverrideModuleNames(ctx, binary.Properties.Overrides), " "))
|
|
}
|
|
if len(binary.post_install_cmds) > 0 {
|
|
entries.SetString("LOCAL_POST_INSTALL_CMD", strings.Join(binary.post_install_cmds, "&& "))
|
|
}
|
|
})
|
|
}
|
|
|
|
func (benchmark *benchmarkDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, benchmark.binaryDecorator)
|
|
entries.Class = "NATIVE_TESTS"
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
if len(benchmark.Properties.Test_suites) > 0 {
|
|
entries.SetString("LOCAL_COMPATIBILITY_SUITE",
|
|
strings.Join(benchmark.Properties.Test_suites, " "))
|
|
}
|
|
if benchmark.testConfig != nil {
|
|
entries.SetString("LOCAL_FULL_TEST_CONFIG", benchmark.testConfig.String())
|
|
}
|
|
entries.SetBool("LOCAL_NATIVE_BENCHMARK", true)
|
|
if !BoolDefault(benchmark.Properties.Auto_gen_config, true) {
|
|
entries.SetBool("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", true)
|
|
}
|
|
})
|
|
dataPaths := []android.DataPath{}
|
|
for _, srcPath := range benchmark.data {
|
|
dataPaths = append(dataPaths, android.DataPath{SrcPath: srcPath})
|
|
}
|
|
androidMkWriteTestData(dataPaths, ctx, entries)
|
|
}
|
|
|
|
func (test *testBinary) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, test.binaryDecorator)
|
|
entries.Class = "NATIVE_TESTS"
|
|
if Bool(test.Properties.Test_per_src) {
|
|
entries.SubName = "_" + String(test.binaryDecorator.Properties.Stem)
|
|
}
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
if len(test.Properties.Test_suites) > 0 {
|
|
entries.SetString("LOCAL_COMPATIBILITY_SUITE",
|
|
strings.Join(test.Properties.Test_suites, " "))
|
|
}
|
|
if test.testConfig != nil {
|
|
entries.SetString("LOCAL_FULL_TEST_CONFIG", test.testConfig.String())
|
|
}
|
|
if !BoolDefault(test.Properties.Auto_gen_config, true) {
|
|
entries.SetBool("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", true)
|
|
}
|
|
entries.AddStrings("LOCAL_TEST_MAINLINE_MODULES", test.Properties.Test_mainline_modules...)
|
|
})
|
|
|
|
androidMkWriteTestData(test.data, ctx, entries)
|
|
androidMkWriteExtraTestConfigs(test.extraTestConfigs, entries)
|
|
}
|
|
|
|
func (fuzz *fuzzBinary) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, fuzz.binaryDecorator)
|
|
|
|
var fuzzFiles []string
|
|
for _, d := range fuzz.corpus {
|
|
fuzzFiles = append(fuzzFiles,
|
|
filepath.Dir(fuzz.corpusIntermediateDir.String())+":corpus/"+d.Base())
|
|
}
|
|
|
|
for _, d := range fuzz.data {
|
|
fuzzFiles = append(fuzzFiles,
|
|
filepath.Dir(fuzz.dataIntermediateDir.String())+":data/"+d.Rel())
|
|
}
|
|
|
|
if fuzz.dictionary != nil {
|
|
fuzzFiles = append(fuzzFiles,
|
|
filepath.Dir(fuzz.dictionary.String())+":"+fuzz.dictionary.Base())
|
|
}
|
|
|
|
if fuzz.config != nil {
|
|
fuzzFiles = append(fuzzFiles,
|
|
filepath.Dir(fuzz.config.String())+":config.json")
|
|
}
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.SetBool("LOCAL_IS_FUZZ_TARGET", true)
|
|
if len(fuzzFiles) > 0 {
|
|
entries.AddStrings("LOCAL_TEST_DATA", fuzzFiles...)
|
|
}
|
|
if fuzz.installedSharedDeps != nil {
|
|
entries.AddStrings("LOCAL_FUZZ_INSTALLED_SHARED_DEPS", fuzz.installedSharedDeps...)
|
|
}
|
|
})
|
|
}
|
|
|
|
func (test *testLibrary) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, test.libraryDecorator)
|
|
}
|
|
|
|
func (library *toolchainLibraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "STATIC_LIBRARIES"
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
_, suffix, _ := android.SplitFileExt(entries.OutputFile.Path().Base())
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
})
|
|
}
|
|
|
|
func (installer *baseInstaller) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
if installer.path == (android.InstallPath{}) {
|
|
return
|
|
}
|
|
// Soong installation is only supported for host modules. Have Make
|
|
// installation trigger Soong installation.
|
|
if ctx.Target().Os.Class == android.Host {
|
|
entries.OutputFile = android.OptionalPathForPath(installer.path)
|
|
}
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
path, file := filepath.Split(installer.path.ToMakePath().String())
|
|
stem, suffix, _ := android.SplitFileExt(file)
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
|
})
|
|
}
|
|
|
|
func (c *stubDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.SubName = ndkLibrarySuffix + "." + c.apiLevel.String()
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
path, file := filepath.Split(c.installPath.String())
|
|
stem, suffix, _ := android.SplitFileExt(file)
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
|
if c.parsedCoverageXmlPath.String() != "" {
|
|
entries.SetString("SOONG_NDK_API_XML", "$(SOONG_NDK_API_XML) "+c.parsedCoverageXmlPath.String())
|
|
}
|
|
})
|
|
}
|
|
|
|
func (c *llndkStubDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
c.libraryDecorator.androidMkWriteExportedFlags(entries)
|
|
_, _, ext := android.SplitFileExt(entries.OutputFile.Path().Base())
|
|
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
|
entries.SetString("LOCAL_SOONG_TOC", c.toc().String())
|
|
})
|
|
}
|
|
|
|
func (c *vndkPrebuiltLibraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
|
|
entries.SubName = c.androidMkSuffix
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
c.libraryDecorator.androidMkWriteExportedFlags(entries)
|
|
|
|
path, file := filepath.Split(c.path.ToMakePath().String())
|
|
stem, suffix, ext := android.SplitFileExt(file)
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
|
if c.tocFile.Valid() {
|
|
entries.SetString("LOCAL_SOONG_TOC", c.tocFile.String())
|
|
}
|
|
})
|
|
}
|
|
|
|
func (c *vendorSnapshotLibraryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
// Each vendor snapshot is exported to androidMk only when BOARD_VNDK_VERSION != current
|
|
// and the version of the prebuilt is same as BOARD_VNDK_VERSION.
|
|
if c.shared() {
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
} else if c.static() {
|
|
entries.Class = "STATIC_LIBRARIES"
|
|
} else if c.header() {
|
|
entries.Class = "HEADER_LIBRARIES"
|
|
}
|
|
|
|
entries.SubName = ""
|
|
|
|
if c.sanitizerProperties.CfiEnabled {
|
|
entries.SubName += ".cfi"
|
|
}
|
|
|
|
if c.androidMkVendorSuffix {
|
|
entries.SubName += vendorSuffix
|
|
}
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
c.libraryDecorator.androidMkWriteExportedFlags(entries)
|
|
|
|
if c.shared() || c.static() {
|
|
path, file := filepath.Split(c.path.ToMakePath().String())
|
|
stem, suffix, ext := android.SplitFileExt(file)
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
|
|
entries.SetString("LOCAL_MODULE_STEM", stem)
|
|
if c.shared() {
|
|
entries.SetString("LOCAL_MODULE_PATH", path)
|
|
}
|
|
if c.tocFile.Valid() {
|
|
entries.SetString("LOCAL_SOONG_TOC", c.tocFile.String())
|
|
}
|
|
}
|
|
|
|
if !c.shared() { // static or header
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
}
|
|
})
|
|
}
|
|
|
|
func (c *vendorSnapshotBinaryDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "EXECUTABLES"
|
|
|
|
if c.androidMkVendorSuffix {
|
|
entries.SubName = vendorSuffix
|
|
} else {
|
|
entries.SubName = ""
|
|
}
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.AddStrings("LOCAL_MODULE_SYMLINKS", c.Properties.Symlinks...)
|
|
})
|
|
}
|
|
|
|
func (c *vendorSnapshotObjectLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "STATIC_LIBRARIES"
|
|
|
|
if c.androidMkVendorSuffix {
|
|
entries.SubName = vendorSuffix
|
|
} else {
|
|
entries.SubName = ""
|
|
}
|
|
|
|
entries.ExtraFooters = append(entries.ExtraFooters,
|
|
func(w io.Writer, name, prefix, moduleDir string, entries *android.AndroidMkEntries) {
|
|
out := entries.OutputFile.Path()
|
|
varname := fmt.Sprintf("SOONG_%sOBJECT_%s%s", prefix, name, entries.SubName)
|
|
|
|
fmt.Fprintf(w, "\n%s := %s\n", varname, out.String())
|
|
fmt.Fprintln(w, ".KATI_READONLY: "+varname)
|
|
})
|
|
}
|
|
|
|
func (c *ndkPrebuiltStlLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
}
|
|
|
|
func (c *vendorPublicLibraryStubDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.Class = "SHARED_LIBRARIES"
|
|
entries.SubName = vendorPublicLibrarySuffix
|
|
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
c.libraryDecorator.androidMkWriteExportedFlags(entries)
|
|
_, _, ext := android.SplitFileExt(entries.OutputFile.Path().Base())
|
|
|
|
entries.SetString("LOCAL_BUILT_MODULE_STEM", "$(LOCAL_MODULE)"+ext)
|
|
entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
|
|
entries.SetBool("LOCAL_NO_NOTICE_FILE", true)
|
|
})
|
|
}
|
|
|
|
func (p *prebuiltLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
if p.properties.Check_elf_files != nil {
|
|
entries.SetBool("LOCAL_CHECK_ELF_FILES", *p.properties.Check_elf_files)
|
|
} else {
|
|
// soong_cc_prebuilt.mk does not include check_elf_file.mk by default
|
|
// because cc_library_shared and cc_binary use soong_cc_prebuilt.mk as well.
|
|
// In order to turn on prebuilt ABI checker, set `LOCAL_CHECK_ELF_FILES` to
|
|
// true if `p.properties.Check_elf_files` is not specified.
|
|
entries.SetBool("LOCAL_CHECK_ELF_FILES", true)
|
|
}
|
|
})
|
|
}
|
|
|
|
func (p *prebuiltLibraryLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, p.libraryDecorator)
|
|
if p.shared() {
|
|
ctx.subAndroidMk(entries, &p.prebuiltLinker)
|
|
androidMkWriteAllowUndefinedSymbols(p.baseLinker, entries)
|
|
}
|
|
}
|
|
|
|
func (p *prebuiltBinaryLinker) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
|
ctx.subAndroidMk(entries, p.binaryDecorator)
|
|
ctx.subAndroidMk(entries, &p.prebuiltLinker)
|
|
androidMkWriteAllowUndefinedSymbols(p.baseLinker, entries)
|
|
}
|
|
|
|
func androidMkWriteAllowUndefinedSymbols(linker *baseLinker, entries *android.AndroidMkEntries) {
|
|
allow := linker.Properties.Allow_undefined_symbols
|
|
if allow != nil {
|
|
entries.ExtraEntries = append(entries.ExtraEntries, func(entries *android.AndroidMkEntries) {
|
|
entries.SetBool("LOCAL_ALLOW_UNDEFINED_SYMBOLS", *allow)
|
|
})
|
|
}
|
|
}
|