blob: 1ede380dea63cdb51d3c35213604eaaef4a31297 [file] [log] [blame]
Ryan Prichard80e40f02019-10-31 19:54:46 -07001// ========================================================
2// linker_wrapper - Linux Bionic (on the host)
3// ========================================================
Colin Cross97f0aef2016-07-14 16:05:46 -07004
Dan Willemsen7ccc50d2017-09-18 21:28:14 -07005// This is used for bionic on (host) Linux to bootstrap our linker embedded into
6// a binary.
7//
8// Host bionic binaries do not have a PT_INTERP section, instead this gets
9// embedded as the entry point, and the linker is embedded as ELF sections in
10// each binary. There's a linker script that sets all of that up (generated by
11// extract_linker), and defines the extern symbols used in this file.
Bob Badouraa7d8352021-02-19 13:06:22 -080012package {
Aditya Choudharyd9d37c02024-02-02 13:57:12 +000013 default_team: "trendy_team_native_tools_libraries",
Bob Badouraa7d8352021-02-19 13:06:22 -080014 default_applicable_licenses: ["bionic_linker_license"],
15}
16
17license {
18 name: "bionic_linker_license",
19 visibility: [":__subpackages__"],
20 license_kinds: [
21 "SPDX-license-identifier-BSD",
22 ],
23 license_text: [
24 "NOTICE",
25 ],
26}
27
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070028cc_object {
29 name: "linker_wrapper",
30 host_supported: true,
31 device_supported: false,
Colin Crossda446cc2022-03-08 15:07:57 -080032 enabled: false,
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070033 target: {
Elliott Hughesd50a1de2018-02-05 17:30:57 -080034 linux_bionic: {
35 enabled: true,
36 },
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070037 },
38
39 cflags: [
40 "-fno-stack-protector",
41 "-Wstrict-overflow=5",
42 "-fvisibility=hidden",
43 "-Wall",
44 "-Wextra",
45 "-Wno-unused",
46 "-Werror",
47 ],
48
49 srcs: [
50 "linker_wrapper.cpp",
51 ],
52 arch: {
Jiyong Park3b47d602020-09-18 16:15:53 +090053 arm64: {
Colin Crossa0a591a2021-06-11 12:46:45 -070054 srcs: ["arch/arm64/linker_wrapper_begin.S"],
Jiyong Park3b47d602020-09-18 16:15:53 +090055 },
Elliott Hughes3e4f6032022-10-22 03:54:59 +000056 riscv64: {
57 srcs: ["arch/riscv64/linker_wrapper_begin.S"],
58 },
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070059 x86_64: {
Colin Crossa0a591a2021-06-11 12:46:45 -070060 srcs: ["arch/x86_64/linker_wrapper_begin.S"],
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070061 },
62 },
63
Martin Stjernholm82d84bc2020-04-06 20:32:09 +010064 header_libs: ["libc_headers"],
65
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070066 // We need to access Bionic private headers in the linker.
67 include_dirs: ["bionic/libc"],
68}
69
Ryan Prichard80e40f02019-10-31 19:54:46 -070070// ========================================================
71// linker default configuration
72// ========================================================
73
74// Configuration for the linker binary and any of its static libraries.
75cc_defaults {
76 name: "linker_defaults",
77 arch: {
78 arm: {
79 cflags: ["-D__work_around_b_24465209__"],
80 },
81 x86: {
82 cflags: ["-D__work_around_b_24465209__"],
83 },
84 },
85
86 cflags: [
87 "-fno-stack-protector",
88 "-Wstrict-overflow=5",
89 "-fvisibility=hidden",
90 "-Wall",
91 "-Wextra",
92 "-Wunused",
93 "-Werror",
94 ],
95
96 // TODO: split out the asflags.
97 asflags: [
98 "-fno-stack-protector",
99 "-Wstrict-overflow=5",
100 "-fvisibility=hidden",
101 "-Wall",
102 "-Wextra",
103 "-Wunused",
104 "-Werror",
105 ],
106
107 product_variables: {
108 debuggable: {
109 cppflags: ["-DUSE_LD_CONFIG_FILE"],
110 },
111 },
112
113 cppflags: ["-Wold-style-cast"],
114
115 static_libs: [
116 "libziparchive",
117 "libbase",
118 "libz",
119
120 "libasync_safe",
121
Jiyong Park7157dfb2022-08-19 13:09:18 +0900122 "liblog_for_runtime_apex",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700123 ],
124
125 // We need to access Bionic private headers in the linker.
126 include_dirs: ["bionic/libc"],
127}
128
129// ========================================================
130// linker components
131// ========================================================
132
133// Enable a module on all targets the linker runs on (ordinary Android targets, Linux Bionic, and
134// native bridge implementations).
135cc_defaults {
136 name: "linker_all_targets",
137 defaults: ["linux_bionic_supported"],
138 recovery_available: true,
Yifan Hongb04490d2020-10-21 18:36:36 -0700139 vendor_ramdisk_available: true,
Ryan Prichard80e40f02019-10-31 19:54:46 -0700140 native_bridge_supported: true,
141}
142
143cc_library_static {
Ryan Prichard249757b2019-11-01 17:18:28 -0700144 name: "liblinker_main",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000145 defaults: [
146 "linker_defaults",
147 "linker_all_targets",
148 ],
Ryan Prichard249757b2019-11-01 17:18:28 -0700149 srcs: ["linker_main.cpp"],
150
151 // Ensure that the compiler won't insert string function calls before ifuncs are resolved.
152 cflags: ["-ffreestanding"],
Spandan Das0a6cfe92024-01-04 18:06:50 +0000153 apex_available: [
154 "com.android.runtime",
155 ],
Ryan Prichard249757b2019-11-01 17:18:28 -0700156}
157
158cc_library_static {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700159 name: "liblinker_malloc",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000160 defaults: [
161 "linker_defaults",
162 "linker_all_targets",
163 ],
Ryan Prichard80e40f02019-10-31 19:54:46 -0700164 srcs: ["linker_memory.cpp"],
Spandan Das0a6cfe92024-01-04 18:06:50 +0000165 apex_available: [
166 "com.android.runtime",
167 ],
Ryan Prichard80e40f02019-10-31 19:54:46 -0700168}
169
170cc_library_static {
171 name: "liblinker_debuggerd_stub",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000172 defaults: [
173 "linker_defaults",
174 "linker_all_targets",
175 ],
Ryan Prichard80e40f02019-10-31 19:54:46 -0700176 srcs: ["linker_debuggerd_stub.cpp"],
177}
178
179// ========================================================
180// template for the linker binary
181// ========================================================
182
dimitryb8b3a762018-09-25 12:31:11 +0200183filegroup {
184 name: "linker_sources",
Colin Cross97f0aef2016-07-14 16:05:46 -0700185 srcs: [
186 "dlfcn.cpp",
187 "linker.cpp",
Elliott Hughes838dbac2023-08-22 14:07:48 -0700188 "linker_auxv.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700189 "linker_block_allocator.cpp",
Dimitry Ivanov769b33f2016-07-21 11:33:40 -0700190 "linker_dlwarning.cpp",
Evgenii Stepanov0a3637d2016-07-06 13:20:59 -0700191 "linker_cfi.cpp",
Dimitry Ivanov4cabfaa2017-03-07 11:19:05 -0800192 "linker_config.cpp",
Ryan Prichard551565e2019-12-23 16:03:14 -0800193 "linker_debug.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700194 "linker_gdb_support.cpp",
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700195 "linker_globals.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700196 "linker_libc_support.c",
Dimitry Ivanov451909d2017-01-26 16:52:59 -0800197 "linker_libcxx_support.cpp",
Dimitry Ivanovb943f302016-08-03 16:00:10 -0700198 "linker_namespaces.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700199 "linker_logger.cpp",
200 "linker_mapped_file_fragment.cpp",
Tamas Petz8d55d182020-02-24 14:15:25 +0100201 "linker_note_gnu_property.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700202 "linker_phdr.cpp",
Ryan Prichard339ecef2020-01-02 16:36:06 -0800203 "linker_relocate.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700204 "linker_sdk_versions.cpp",
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700205 "linker_soinfo.cpp",
Collin Fijalkovich47d27aa2021-03-24 10:17:39 -0700206 "linker_transparent_hugepage_support.cpp",
Ryan Prichard45d13492019-01-03 02:51:30 -0800207 "linker_tls.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700208 "linker_utils.cpp",
209 "rt.cpp",
210 ],
dimitryb8b3a762018-09-25 12:31:11 +0200211}
Colin Cross97f0aef2016-07-14 16:05:46 -0700212
dimitryb8b3a762018-09-25 12:31:11 +0200213filegroup {
214 name: "linker_sources_arm",
215 srcs: [
216 "arch/arm/begin.S",
Ryan Prichard129f7a12019-12-23 16:45:47 -0800217 "arch/arm_neon/linker_gnu_hash_neon.cpp",
dimitryb8b3a762018-09-25 12:31:11 +0200218 ],
219}
220
221filegroup {
222 name: "linker_sources_arm64",
223 srcs: [
224 "arch/arm64/begin.S",
Ryan Prichardffaae702019-01-23 17:47:10 -0800225 "arch/arm64/tlsdesc_resolver.S",
Ryan Prichard129f7a12019-12-23 16:45:47 -0800226 "arch/arm_neon/linker_gnu_hash_neon.cpp",
dimitryb8b3a762018-09-25 12:31:11 +0200227 ],
228}
229
230filegroup {
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000231 name: "linker_sources_riscv64",
232 srcs: [
233 "arch/riscv64/begin.S",
234 ],
235}
236
237filegroup {
dimitryb8b3a762018-09-25 12:31:11 +0200238 name: "linker_sources_x86",
239 srcs: [
240 "arch/x86/begin.S",
241 ],
242}
243
244filegroup {
245 name: "linker_sources_x86_64",
246 srcs: [
247 "arch/x86_64/begin.S",
248 ],
249}
250
dimitryb8b3a762018-09-25 12:31:11 +0200251cc_defaults {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700252 name: "linker_version_script_overlay",
253 arch: {
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000254 arm: {
255 version_script: "linker.arm.map",
256 },
257 arm64: {
258 version_script: "linker.generic.map",
259 },
260 riscv64: {
261 version_script: "linker.generic.map",
262 },
263 x86: {
264 version_script: "linker.generic.map",
265 },
266 x86_64: {
267 version_script: "linker.generic.map",
268 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700269 },
270}
271
272// A template for the linker binary. May be inherited by native bridge implementations.
273cc_defaults {
274 name: "linker_bin_template",
275 defaults: ["linker_defaults"],
276
277 srcs: [":linker_sources"],
278
Colin Cross97f0aef2016-07-14 16:05:46 -0700279 arch: {
280 arm: {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700281 srcs: [":linker_sources_arm"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700282
283 // Arm 32 bit does not produce complete exidx unwind information
284 // so keep the .debug_frame which is relatively small and does
285 // include needed unwind information.
286 // See b/242162222 for details.
287 strip: {
288 keep_symbols_and_debug_frame: true,
289 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700290 },
291 arm64: {
292 srcs: [":linker_sources_arm64"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700293
294 // Leave the symbols in the shared library so that stack unwinders can produce
295 // meaningful name resolution.
296 strip: {
297 keep_symbols: true,
298 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700299 },
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000300 riscv64: {
301 srcs: [":linker_sources_riscv64"],
302
303 // Leave the symbols in the shared library so that stack unwinders can produce
304 // meaningful name resolution.
305 strip: {
306 keep_symbols: true,
307 },
308 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700309 x86: {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700310 srcs: [":linker_sources_x86"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700311
312 // Leave the symbols in the shared library so that stack unwinders can produce
313 // meaningful name resolution.
314 strip: {
315 keep_symbols: true,
316 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700317 },
318 x86_64: {
319 srcs: [":linker_sources_x86_64"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700320
321 // Leave the symbols in the shared library so that stack unwinders can produce
322 // meaningful name resolution.
323 strip: {
324 keep_symbols: true,
325 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700326 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700327 },
328
Ryan Prichard80e40f02019-10-31 19:54:46 -0700329 // -shared is used to overwrite the -Bstatic and -static flags triggered by enabling
330 // static_executable. This dynamic linker is actually a shared object linked with static
331 // libraries.
Colin Cross97f0aef2016-07-14 16:05:46 -0700332 ldflags: [
333 "-shared",
334 "-Wl,-Bsymbolic",
335 "-Wl,--exclude-libs,ALL",
dimitry8e8c2c02018-01-04 12:08:32 +0100336 "-Wl,-soname,ld-android.so",
Peter Collingbournec630da52024-03-26 13:24:06 -0700337 // When the linker applies its own IRELATIVE relocations, it will only read DT_REL[A] and
338 // DT_JMPREL, not DT_ANDROID_REL[A], which can also theoretically contain IRELATIVE
339 // relocations. lld has been taught to not store them there as a bug workaround (see
340 // https://llvm.org/pr86751) but the workaround could be removed at some point in the
341 // future. So we explicitly prevent it from doing so by disabling DT_ANDROID_REL[A] when
342 // linking the linker (DT_RELR cannot encode IRELATIVE relocations).
343 "-Wl,--pack-dyn-relocs=relr",
Colin Cross97f0aef2016-07-14 16:05:46 -0700344 ],
345
Dimitry Ivanovfc0d4802016-12-06 11:10:09 -0800346 // we are going to link libc++_static manually because
347 // when stl is not set to "none" build system adds libdl
348 // to the list of static libraries which needs to be
349 // avoided in the case of building loader.
350 stl: "none",
351
Colin Cross97f0aef2016-07-14 16:05:46 -0700352 // we don't want crtbegin.o (because we have begin.o), so unset it
353 // just for this module
354 nocrt: true,
355
dimitryb8b3a762018-09-25 12:31:11 +0200356 static_executable: true,
357
dimitryb8b3a762018-09-25 12:31:11 +0200358 // Insert an extra objcopy step to add prefix to symbols. This is needed to prevent gdb
359 // looking up symbols in the linker by mistake.
360 prefix_symbols: "__dl_",
361
362 sanitize: {
363 hwaddress: false,
364 },
dimitryb8b3a762018-09-25 12:31:11 +0200365
Colin Cross97f0aef2016-07-14 16:05:46 -0700366 static_libs: [
Ryan Prichard249757b2019-11-01 17:18:28 -0700367 "liblinker_main",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700368 "liblinker_malloc",
369
Ryan Prichard0bac1cb2024-05-03 01:15:00 +0000370 // Use a version of libc++ built without exceptions, because accessing EH globals uses
371 // ELF TLS, which is not supported in the loader.
372 "libc++_static_noexcept",
Colin Cross97f0aef2016-07-14 16:05:46 -0700373 "libc_nomalloc",
Ryan Prichard249757b2019-11-01 17:18:28 -0700374 "libc_dynamic_dispatch",
Dimitry Ivanov451909d2017-01-26 16:52:59 -0800375 "libm",
Ryan Prichardcdf71752020-12-16 03:37:22 -0800376 "libunwind",
Colin Cross97f0aef2016-07-14 16:05:46 -0700377 ],
Colin Cross97f0aef2016-07-14 16:05:46 -0700378
Ryan Prichardd9a41152019-10-14 16:58:53 -0700379 // Ensure that if the linker needs __gnu_Unwind_Find_exidx, then the linker will have a
380 // definition of the symbol. The linker links against libgcc.a, whose arm32 unwinder has a weak
381 // reference to __gnu_Unwind_Find_exidx, which isn't sufficient to pull in the strong definition
382 // of __gnu_Unwind_Find_exidx from libc. An unresolved weak reference would create a
383 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
384 //
385 // This line should be unnecessary because the linker's dependency on libunwind_llvm.a should
386 // override libgcc.a, but this line provides a simpler guarantee. It can be removed once the
387 // linker stops linking against libgcc.a's arm32 unwinder.
388 whole_static_libs: ["libc_unwind_static"],
389
Ryan Prichard80e40f02019-10-31 19:54:46 -0700390 system_shared_libs: [],
391
392 // Opt out of native_coverage when opting out of system_shared_libs
393 native_coverage: false,
394}
395
396// ========================================================
397// linker[_asan][64] binary
398// ========================================================
399
400cc_binary {
Colin Cross97f0aef2016-07-14 16:05:46 -0700401 name: "linker",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700402 defaults: [
403 "linker_bin_template",
404 "linux_bionic_supported",
405 "linker_version_script_overlay",
406 ],
407
Victor Khimenkod15229d2020-05-14 22:14:45 +0200408 srcs: [
409 "linker_translate_path.cpp",
410 ],
411
Colin Cross10fffb42016-12-08 09:57:35 -0800412 symlinks: ["linker_asan"],
Florian Mayerc10d0642023-03-22 16:12:49 -0700413 arch: {
414 arm64: {
415 symlinks: ["linker_hwasan"],
416 },
417 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700418 multilib: {
Colin Cross97f0aef2016-07-14 16:05:46 -0700419 lib64: {
420 suffix: "64",
Colin Cross10fffb42016-12-08 09:57:35 -0800421 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700422 },
Pirama Arumuga Nainarfcd35382019-02-14 13:48:01 -0800423
Ryan Prichard80e40f02019-10-31 19:54:46 -0700424 compile_multilib: "both",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700425
426 recovery_available: true,
Yifan Hongb04490d2020-10-21 18:36:36 -0700427 vendor_ramdisk_available: true,
Ryan Prichard80e40f02019-10-31 19:54:46 -0700428 apex_available: [
429 "//apex_available:platform",
430 "com.android.runtime",
431 ],
Pirama Arumuga Nainarfcd35382019-02-14 13:48:01 -0800432
Colin Cross97f0aef2016-07-14 16:05:46 -0700433 target: {
Dan Willemsen7ec52b12016-11-28 17:02:25 -0800434 android: {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700435 srcs: [
436 "linker_debuggerd_android.cpp",
437 ],
Dan Albert4ea19212019-07-23 13:31:14 -0700438 static_libs: [
Ryan Prichard0bac1cb2024-05-03 01:15:00 +0000439 "libc++demangle_noexcept",
Dan Albert4ea19212019-07-23 13:31:14 -0700440 "libdebuggerd_handler_fallback",
441 ],
Dan Willemsen7ec52b12016-11-28 17:02:25 -0800442 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700443 linux_bionic: {
444 static_libs: [
445 "liblinker_debuggerd_stub",
446 ],
Yi Kong6f6daaa2020-12-10 01:27:44 +0800447 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700448 },
Yi Konga7e363f2020-10-01 04:10:01 +0800449
Yi Konge20a1d92022-01-25 03:19:58 +0800450 afdo: true,
Colin Cross97f0aef2016-07-14 16:05:46 -0700451}
dimitry11da1dc2018-01-05 13:35:43 +0100452
Ryan Prichard80e40f02019-10-31 19:54:46 -0700453// ========================================================
454// assorted modules
455// ========================================================
456
Elliott Hughes90f96b92019-05-09 15:56:39 -0700457sh_binary {
458 name: "ldd",
Rupert Shuttlewortha7e29a82021-02-18 13:35:22 +0000459 src: "ldd.sh",
Elliott Hughes90f96b92019-05-09 15:56:39 -0700460}
461
Collin Fijalkovichc9521e02021-04-29 11:31:50 -0700462// Used to generate binaries that can be backed by transparent hugepages.
463cc_defaults {
464 name: "linker_hugepage_aligned",
465 arch: {
466 arm64: {
467 ldflags: ["-z max-page-size=0x200000"],
468 },
469 x86_64: {
470 ldflags: ["-z max-page-size=0x200000"],
471 },
472 },
473}
474
dimitry11da1dc2018-01-05 13:35:43 +0100475cc_library {
476 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from
477 // libgcc.a are made static to ld-android.so. This in turn ensures that libraries that
478 // a) pull symbols from libgcc.a and b) depend on ld-android.so will not rely on ld-android.so
479 // to provide those symbols, but will instead pull them from libgcc.a. Specifically,
480 // we use this property to make sure libc.so has its own copy of the code from
481 // libgcc.a it uses.
482 //
483 // DO NOT REMOVE --exclude-libs!
484
Yi Kong7786a342018-08-31 19:01:56 -0700485 ldflags: [
486 "-Wl,--exclude-libs=libgcc.a",
Yi Kong7ac2afb2019-05-06 16:23:10 -0700487 "-Wl,--exclude-libs=libgcc_stripped.a",
Yi Kong7786a342018-08-31 19:01:56 -0700488 "-Wl,--exclude-libs=libclang_rt.builtins-arm-android.a",
489 "-Wl,--exclude-libs=libclang_rt.builtins-aarch64-android.a",
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000490 "-Wl,--exclude-libs=libclang_rt.builtins-riscv64-android.a",
Ryan Prichardef147872021-01-28 14:06:52 -0800491 "-Wl,--exclude-libs=libclang_rt.builtins-i686-android.a",
Yi Kong7786a342018-08-31 19:01:56 -0700492 "-Wl,--exclude-libs=libclang_rt.builtins-x86_64-android.a",
493 ],
dimitry11da1dc2018-01-05 13:35:43 +0100494
495 // for x86, exclude libgcc_eh.a for the same reasons as above
496 arch: {
497 x86: {
498 ldflags: ["-Wl,--exclude-libs=libgcc_eh.a"],
499 },
500 x86_64: {
501 ldflags: ["-Wl,--exclude-libs=libgcc_eh.a"],
502 },
503 },
dimitry581723e2018-01-05 14:31:44 +0100504
505 srcs: ["ld_android.cpp"],
dimitry11da1dc2018-01-05 13:35:43 +0100506 cflags: [
507 "-Wall",
508 "-Wextra",
509 "-Wunused",
510 "-Werror",
511 ],
512 stl: "none",
513
514 name: "ld-android",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000515 defaults: [
516 "linux_bionic_supported",
517 "linker_version_script_overlay",
518 ],
Yifan Hong5a39cee2020-01-21 16:43:56 -0800519 ramdisk_available: true,
Yifan Hongb04490d2020-10-21 18:36:36 -0700520 vendor_ramdisk_available: true,
Jiyong Park5603c6e2018-04-27 21:53:11 +0900521 recovery_available: true,
dimitry7f048802019-05-03 15:57:34 +0200522 native_bridge_supported: true,
dimitry11da1dc2018-01-05 13:35:43 +0100523
Ryan Prichard470b6662018-03-27 22:10:55 -0700524 nocrt: true,
dimitry11da1dc2018-01-05 13:35:43 +0100525 system_shared_libs: [],
Martin Stjernholm82d84bc2020-04-06 20:32:09 +0100526 header_libs: ["libc_headers"],
dimitry11da1dc2018-01-05 13:35:43 +0100527
Pirama Arumuga Nainarfcd35382019-02-14 13:48:01 -0800528 // Opt out of native_coverage when opting out of system_shared_libs
529 native_coverage: false,
530
dimitry11da1dc2018-01-05 13:35:43 +0100531 sanitize: {
532 never: true,
533 },
Jiyong Parke87e0dc2019-10-02 17:09:33 +0900534
535 apex_available: [
536 "//apex_available:platform",
537 "com.android.runtime",
538 ],
dimitry11da1dc2018-01-05 13:35:43 +0100539}
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800540
541cc_test {
542 name: "linker-unit-tests",
Colin Cross0cc60af2021-09-30 14:04:39 -0700543 test_suites: ["device-tests"],
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800544
545 cflags: [
546 "-g",
547 "-Wall",
548 "-Wextra",
549 "-Wunused",
550 "-Werror",
551 ],
552
553 // We need to access Bionic private headers in the linker.
554 include_dirs: ["bionic/libc"],
555
556 srcs: [
557 // Tests.
558 "linker_block_allocator_test.cpp",
559 "linker_config_test.cpp",
560 "linked_list_test.cpp",
Tamas Petz8d55d182020-02-24 14:15:25 +0100561 "linker_note_gnu_property_test.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800562 "linker_sleb128_test.cpp",
563 "linker_utils_test.cpp",
Ryan Prichard129f7a12019-12-23 16:45:47 -0800564 "linker_gnu_hash_test.cpp",
Kalesh Singh0396f872024-02-02 22:11:08 -0800565 "linker_crt_pad_segment_test.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800566
567 // Parts of the linker that we're testing.
Kalesh Singh0396f872024-02-02 22:11:08 -0800568 ":elf_note_sources",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800569 "linker_block_allocator.cpp",
570 "linker_config.cpp",
Ryan Prichard551565e2019-12-23 16:03:14 -0800571 "linker_debug.cpp",
Tamas Petz8d55d182020-02-24 14:15:25 +0100572 "linker_note_gnu_property.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800573 "linker_test_globals.cpp",
574 "linker_utils.cpp",
Kalesh Singh0396f872024-02-02 22:11:08 -0800575 "linker_phdr.cpp",
576 "linker_mapped_file_fragment.cpp",
577 "linker_sdk_versions.cpp",
578 "linker_dlwarning.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800579 ],
580
581 static_libs: [
582 "libasync_safe",
583 "libbase",
Jiyong Park7157dfb2022-08-19 13:09:18 +0900584 "liblog_for_runtime_apex",
Kalesh Singh4084b552024-03-13 13:35:49 -0700585 "libprocinfo", // For procinfo::MappedFileSize()
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800586 ],
Ryan Prichard129f7a12019-12-23 16:45:47 -0800587
Kalesh Singh0396f872024-02-02 22:11:08 -0800588 data_libs: [
589 "crt_pad_segment_disabled",
590 "crt_pad_segment_enabled",
591 "no_crt_pad_segment",
592 ],
593
Ryan Prichard129f7a12019-12-23 16:45:47 -0800594 arch: {
595 arm: {
596 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
597 },
598 arm64: {
599 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
600 },
601 },
602}
603
604cc_benchmark {
605 name: "linker-benchmarks",
606
607 srcs: [
608 "linker_gnu_hash_benchmark.cpp",
609 ],
610
611 arch: {
612 arm: {
613 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
614 },
615 arm64: {
616 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
617 },
618 },
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800619}