blob: d8fdb11585dc2624eefee21c5fa40bf8435e006b [file] [log] [blame]
Ryan Prichard80e40f02019-10-31 19:54:46 -07001// ========================================================
2// linker_wrapper - Linux Bionic (on the host)
3// ========================================================
Colin Cross97f0aef2016-07-14 16:05:46 -07004
Dan Willemsen7ccc50d2017-09-18 21:28:14 -07005// This is used for bionic on (host) Linux to bootstrap our linker embedded into
6// a binary.
7//
8// Host bionic binaries do not have a PT_INTERP section, instead this gets
9// embedded as the entry point, and the linker is embedded as ELF sections in
10// each binary. There's a linker script that sets all of that up (generated by
11// extract_linker), and defines the extern symbols used in this file.
Bob Badouraa7d8352021-02-19 13:06:22 -080012package {
Aditya Choudharyd9d37c02024-02-02 13:57:12 +000013 default_team: "trendy_team_native_tools_libraries",
Bob Badouraa7d8352021-02-19 13:06:22 -080014 default_applicable_licenses: ["bionic_linker_license"],
15}
16
17license {
18 name: "bionic_linker_license",
19 visibility: [":__subpackages__"],
20 license_kinds: [
21 "SPDX-license-identifier-BSD",
22 ],
23 license_text: [
24 "NOTICE",
25 ],
26}
27
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070028cc_object {
29 name: "linker_wrapper",
30 host_supported: true,
31 device_supported: false,
Colin Crossda446cc2022-03-08 15:07:57 -080032 enabled: false,
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070033 target: {
Elliott Hughesd50a1de2018-02-05 17:30:57 -080034 linux_bionic: {
35 enabled: true,
36 },
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070037 },
38
39 cflags: [
40 "-fno-stack-protector",
41 "-Wstrict-overflow=5",
42 "-fvisibility=hidden",
43 "-Wall",
44 "-Wextra",
45 "-Wno-unused",
46 "-Werror",
47 ],
48
49 srcs: [
50 "linker_wrapper.cpp",
51 ],
52 arch: {
Jiyong Park3b47d602020-09-18 16:15:53 +090053 arm64: {
Colin Crossa0a591a2021-06-11 12:46:45 -070054 srcs: ["arch/arm64/linker_wrapper_begin.S"],
Jiyong Park3b47d602020-09-18 16:15:53 +090055 },
Elliott Hughes3e4f6032022-10-22 03:54:59 +000056 riscv64: {
57 srcs: ["arch/riscv64/linker_wrapper_begin.S"],
58 },
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070059 x86_64: {
Colin Crossa0a591a2021-06-11 12:46:45 -070060 srcs: ["arch/x86_64/linker_wrapper_begin.S"],
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070061 },
62 },
63
Martin Stjernholm82d84bc2020-04-06 20:32:09 +010064 header_libs: ["libc_headers"],
65
Dan Willemsen7ccc50d2017-09-18 21:28:14 -070066 // We need to access Bionic private headers in the linker.
67 include_dirs: ["bionic/libc"],
68}
69
Ryan Prichard80e40f02019-10-31 19:54:46 -070070// ========================================================
71// linker default configuration
72// ========================================================
73
74// Configuration for the linker binary and any of its static libraries.
75cc_defaults {
76 name: "linker_defaults",
77 arch: {
78 arm: {
79 cflags: ["-D__work_around_b_24465209__"],
80 },
81 x86: {
82 cflags: ["-D__work_around_b_24465209__"],
83 },
84 },
85
86 cflags: [
87 "-fno-stack-protector",
88 "-Wstrict-overflow=5",
89 "-fvisibility=hidden",
90 "-Wall",
91 "-Wextra",
92 "-Wunused",
93 "-Werror",
94 ],
95
96 // TODO: split out the asflags.
97 asflags: [
98 "-fno-stack-protector",
99 "-Wstrict-overflow=5",
100 "-fvisibility=hidden",
101 "-Wall",
102 "-Wextra",
103 "-Wunused",
104 "-Werror",
105 ],
106
107 product_variables: {
108 debuggable: {
109 cppflags: ["-DUSE_LD_CONFIG_FILE"],
110 },
111 },
112
113 cppflags: ["-Wold-style-cast"],
114
115 static_libs: [
116 "libziparchive",
117 "libbase",
118 "libz",
119
120 "libasync_safe",
121
Jiyong Park7157dfb2022-08-19 13:09:18 +0900122 "liblog_for_runtime_apex",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700123 ],
124
125 // We need to access Bionic private headers in the linker.
126 include_dirs: ["bionic/libc"],
127}
128
129// ========================================================
130// linker components
131// ========================================================
132
133// Enable a module on all targets the linker runs on (ordinary Android targets, Linux Bionic, and
134// native bridge implementations).
135cc_defaults {
136 name: "linker_all_targets",
137 defaults: ["linux_bionic_supported"],
138 recovery_available: true,
Yifan Hongb04490d2020-10-21 18:36:36 -0700139 vendor_ramdisk_available: true,
Ryan Prichard80e40f02019-10-31 19:54:46 -0700140 native_bridge_supported: true,
141}
142
143cc_library_static {
Ryan Prichard249757b2019-11-01 17:18:28 -0700144 name: "liblinker_main",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000145 defaults: [
146 "linker_defaults",
147 "linker_all_targets",
148 ],
Ryan Prichard249757b2019-11-01 17:18:28 -0700149 srcs: ["linker_main.cpp"],
150
151 // Ensure that the compiler won't insert string function calls before ifuncs are resolved.
152 cflags: ["-ffreestanding"],
Spandan Das0a6cfe92024-01-04 18:06:50 +0000153 apex_available: [
154 "com.android.runtime",
155 ],
Ryan Prichard249757b2019-11-01 17:18:28 -0700156}
157
158cc_library_static {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700159 name: "liblinker_malloc",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000160 defaults: [
161 "linker_defaults",
162 "linker_all_targets",
163 ],
Ryan Prichard80e40f02019-10-31 19:54:46 -0700164 srcs: ["linker_memory.cpp"],
Spandan Das0a6cfe92024-01-04 18:06:50 +0000165 apex_available: [
166 "com.android.runtime",
167 ],
Ryan Prichard80e40f02019-10-31 19:54:46 -0700168}
169
170cc_library_static {
171 name: "liblinker_debuggerd_stub",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000172 defaults: [
173 "linker_defaults",
174 "linker_all_targets",
175 ],
Ryan Prichard80e40f02019-10-31 19:54:46 -0700176 srcs: ["linker_debuggerd_stub.cpp"],
177}
178
179// ========================================================
180// template for the linker binary
181// ========================================================
182
dimitryb8b3a762018-09-25 12:31:11 +0200183filegroup {
184 name: "linker_sources",
Colin Cross97f0aef2016-07-14 16:05:46 -0700185 srcs: [
186 "dlfcn.cpp",
187 "linker.cpp",
Elliott Hughes838dbac2023-08-22 14:07:48 -0700188 "linker_auxv.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700189 "linker_block_allocator.cpp",
Dimitry Ivanov769b33f2016-07-21 11:33:40 -0700190 "linker_dlwarning.cpp",
Evgenii Stepanov0a3637d2016-07-06 13:20:59 -0700191 "linker_cfi.cpp",
Dimitry Ivanov4cabfaa2017-03-07 11:19:05 -0800192 "linker_config.cpp",
Ryan Prichard551565e2019-12-23 16:03:14 -0800193 "linker_debug.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700194 "linker_gdb_support.cpp",
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700195 "linker_globals.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700196 "linker_libc_support.c",
Dimitry Ivanov451909d2017-01-26 16:52:59 -0800197 "linker_libcxx_support.cpp",
Dimitry Ivanovb943f302016-08-03 16:00:10 -0700198 "linker_namespaces.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700199 "linker_logger.cpp",
200 "linker_mapped_file_fragment.cpp",
Tamas Petz8d55d182020-02-24 14:15:25 +0100201 "linker_note_gnu_property.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700202 "linker_phdr.cpp",
Ryan Prichard339ecef2020-01-02 16:36:06 -0800203 "linker_relocate.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700204 "linker_sdk_versions.cpp",
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700205 "linker_soinfo.cpp",
Collin Fijalkovich47d27aa2021-03-24 10:17:39 -0700206 "linker_transparent_hugepage_support.cpp",
Ryan Prichard45d13492019-01-03 02:51:30 -0800207 "linker_tls.cpp",
Colin Cross97f0aef2016-07-14 16:05:46 -0700208 "linker_utils.cpp",
209 "rt.cpp",
210 ],
dimitryb8b3a762018-09-25 12:31:11 +0200211}
Colin Cross97f0aef2016-07-14 16:05:46 -0700212
dimitryb8b3a762018-09-25 12:31:11 +0200213filegroup {
214 name: "linker_sources_arm",
215 srcs: [
216 "arch/arm/begin.S",
Ryan Prichard129f7a12019-12-23 16:45:47 -0800217 "arch/arm_neon/linker_gnu_hash_neon.cpp",
dimitryb8b3a762018-09-25 12:31:11 +0200218 ],
219}
220
221filegroup {
222 name: "linker_sources_arm64",
223 srcs: [
224 "arch/arm64/begin.S",
Ryan Prichardffaae702019-01-23 17:47:10 -0800225 "arch/arm64/tlsdesc_resolver.S",
Ryan Prichard129f7a12019-12-23 16:45:47 -0800226 "arch/arm_neon/linker_gnu_hash_neon.cpp",
dimitryb8b3a762018-09-25 12:31:11 +0200227 ],
228}
229
230filegroup {
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000231 name: "linker_sources_riscv64",
232 srcs: [
233 "arch/riscv64/begin.S",
Paul Kirth4d437782024-01-30 23:03:14 +0000234 "arch/riscv64/tlsdesc_resolver.S",
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000235 ],
236}
237
238filegroup {
dimitryb8b3a762018-09-25 12:31:11 +0200239 name: "linker_sources_x86",
240 srcs: [
241 "arch/x86/begin.S",
242 ],
243}
244
245filegroup {
246 name: "linker_sources_x86_64",
247 srcs: [
248 "arch/x86_64/begin.S",
249 ],
250}
251
dimitryb8b3a762018-09-25 12:31:11 +0200252cc_defaults {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700253 name: "linker_version_script_overlay",
254 arch: {
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000255 arm: {
256 version_script: "linker.arm.map",
257 },
258 arm64: {
259 version_script: "linker.generic.map",
260 },
261 riscv64: {
262 version_script: "linker.generic.map",
263 },
264 x86: {
265 version_script: "linker.generic.map",
266 },
267 x86_64: {
268 version_script: "linker.generic.map",
269 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700270 },
271}
272
273// A template for the linker binary. May be inherited by native bridge implementations.
274cc_defaults {
275 name: "linker_bin_template",
276 defaults: ["linker_defaults"],
277
278 srcs: [":linker_sources"],
279
Colin Cross97f0aef2016-07-14 16:05:46 -0700280 arch: {
281 arm: {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700282 srcs: [":linker_sources_arm"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700283
284 // Arm 32 bit does not produce complete exidx unwind information
285 // so keep the .debug_frame which is relatively small and does
286 // include needed unwind information.
287 // See b/242162222 for details.
288 strip: {
289 keep_symbols_and_debug_frame: true,
290 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700291 },
292 arm64: {
293 srcs: [":linker_sources_arm64"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700294
295 // Leave the symbols in the shared library so that stack unwinders can produce
296 // meaningful name resolution.
297 strip: {
298 keep_symbols: true,
299 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700300 },
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000301 riscv64: {
302 srcs: [":linker_sources_riscv64"],
303
304 // Leave the symbols in the shared library so that stack unwinders can produce
305 // meaningful name resolution.
306 strip: {
307 keep_symbols: true,
308 },
309 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700310 x86: {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700311 srcs: [":linker_sources_x86"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700312
313 // Leave the symbols in the shared library so that stack unwinders can produce
314 // meaningful name resolution.
315 strip: {
316 keep_symbols: true,
317 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700318 },
319 x86_64: {
320 srcs: [":linker_sources_x86_64"],
Christopher Ferrisd37df2b2022-08-11 17:27:50 -0700321
322 // Leave the symbols in the shared library so that stack unwinders can produce
323 // meaningful name resolution.
324 strip: {
325 keep_symbols: true,
326 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700327 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700328 },
329
Ryan Prichard80e40f02019-10-31 19:54:46 -0700330 // -shared is used to overwrite the -Bstatic and -static flags triggered by enabling
331 // static_executable. This dynamic linker is actually a shared object linked with static
332 // libraries.
Colin Cross97f0aef2016-07-14 16:05:46 -0700333 ldflags: [
334 "-shared",
335 "-Wl,-Bsymbolic",
336 "-Wl,--exclude-libs,ALL",
dimitry8e8c2c02018-01-04 12:08:32 +0100337 "-Wl,-soname,ld-android.so",
Peter Collingbournec630da52024-03-26 13:24:06 -0700338 // When the linker applies its own IRELATIVE relocations, it will only read DT_REL[A] and
339 // DT_JMPREL, not DT_ANDROID_REL[A], which can also theoretically contain IRELATIVE
340 // relocations. lld has been taught to not store them there as a bug workaround (see
341 // https://llvm.org/pr86751) but the workaround could be removed at some point in the
342 // future. So we explicitly prevent it from doing so by disabling DT_ANDROID_REL[A] when
343 // linking the linker (DT_RELR cannot encode IRELATIVE relocations).
344 "-Wl,--pack-dyn-relocs=relr",
Colin Cross97f0aef2016-07-14 16:05:46 -0700345 ],
346
Dimitry Ivanovfc0d4802016-12-06 11:10:09 -0800347 // we are going to link libc++_static manually because
348 // when stl is not set to "none" build system adds libdl
349 // to the list of static libraries which needs to be
350 // avoided in the case of building loader.
351 stl: "none",
352
Colin Cross97f0aef2016-07-14 16:05:46 -0700353 // we don't want crtbegin.o (because we have begin.o), so unset it
354 // just for this module
355 nocrt: true,
356
dimitryb8b3a762018-09-25 12:31:11 +0200357 static_executable: true,
358
dimitryb8b3a762018-09-25 12:31:11 +0200359 // Insert an extra objcopy step to add prefix to symbols. This is needed to prevent gdb
360 // looking up symbols in the linker by mistake.
361 prefix_symbols: "__dl_",
362
363 sanitize: {
364 hwaddress: false,
365 },
dimitryb8b3a762018-09-25 12:31:11 +0200366
Colin Cross97f0aef2016-07-14 16:05:46 -0700367 static_libs: [
Ryan Prichard249757b2019-11-01 17:18:28 -0700368 "liblinker_main",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700369 "liblinker_malloc",
370
Ryan Prichard0bac1cb2024-05-03 01:15:00 +0000371 // Use a version of libc++ built without exceptions, because accessing EH globals uses
372 // ELF TLS, which is not supported in the loader.
373 "libc++_static_noexcept",
Colin Cross97f0aef2016-07-14 16:05:46 -0700374 "libc_nomalloc",
Ryan Prichard249757b2019-11-01 17:18:28 -0700375 "libc_dynamic_dispatch",
Dimitry Ivanov451909d2017-01-26 16:52:59 -0800376 "libm",
Ryan Prichardcdf71752020-12-16 03:37:22 -0800377 "libunwind",
Colin Cross97f0aef2016-07-14 16:05:46 -0700378 ],
Colin Cross97f0aef2016-07-14 16:05:46 -0700379
Ryan Prichardd9a41152019-10-14 16:58:53 -0700380 // Ensure that if the linker needs __gnu_Unwind_Find_exidx, then the linker will have a
381 // definition of the symbol. The linker links against libgcc.a, whose arm32 unwinder has a weak
382 // reference to __gnu_Unwind_Find_exidx, which isn't sufficient to pull in the strong definition
383 // of __gnu_Unwind_Find_exidx from libc. An unresolved weak reference would create a
384 // non-relative dynamic relocation in the linker binary, which complicates linker startup.
385 //
386 // This line should be unnecessary because the linker's dependency on libunwind_llvm.a should
387 // override libgcc.a, but this line provides a simpler guarantee. It can be removed once the
388 // linker stops linking against libgcc.a's arm32 unwinder.
389 whole_static_libs: ["libc_unwind_static"],
390
Ryan Prichard80e40f02019-10-31 19:54:46 -0700391 system_shared_libs: [],
392
393 // Opt out of native_coverage when opting out of system_shared_libs
394 native_coverage: false,
395}
396
397// ========================================================
398// linker[_asan][64] binary
399// ========================================================
400
401cc_binary {
Colin Cross97f0aef2016-07-14 16:05:46 -0700402 name: "linker",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700403 defaults: [
404 "linker_bin_template",
405 "linux_bionic_supported",
406 "linker_version_script_overlay",
407 ],
408
Victor Khimenkod15229d2020-05-14 22:14:45 +0200409 srcs: [
410 "linker_translate_path.cpp",
411 ],
412
Colin Cross10fffb42016-12-08 09:57:35 -0800413 symlinks: ["linker_asan"],
Florian Mayerc10d0642023-03-22 16:12:49 -0700414 arch: {
415 arm64: {
416 symlinks: ["linker_hwasan"],
417 },
418 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700419 multilib: {
Colin Cross97f0aef2016-07-14 16:05:46 -0700420 lib64: {
421 suffix: "64",
Colin Cross10fffb42016-12-08 09:57:35 -0800422 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700423 },
Pirama Arumuga Nainarfcd35382019-02-14 13:48:01 -0800424
Ryan Prichard80e40f02019-10-31 19:54:46 -0700425 compile_multilib: "both",
Ryan Prichard80e40f02019-10-31 19:54:46 -0700426
427 recovery_available: true,
Yifan Hongb04490d2020-10-21 18:36:36 -0700428 vendor_ramdisk_available: true,
Ryan Prichard80e40f02019-10-31 19:54:46 -0700429 apex_available: [
430 "//apex_available:platform",
431 "com.android.runtime",
432 ],
Pirama Arumuga Nainarfcd35382019-02-14 13:48:01 -0800433
Colin Cross97f0aef2016-07-14 16:05:46 -0700434 target: {
Dan Willemsen7ec52b12016-11-28 17:02:25 -0800435 android: {
Ryan Prichard80e40f02019-10-31 19:54:46 -0700436 srcs: [
437 "linker_debuggerd_android.cpp",
438 ],
Dan Albert4ea19212019-07-23 13:31:14 -0700439 static_libs: [
Ryan Prichard0bac1cb2024-05-03 01:15:00 +0000440 "libc++demangle_noexcept",
Dan Albert4ea19212019-07-23 13:31:14 -0700441 "libdebuggerd_handler_fallback",
442 ],
Dan Willemsen7ec52b12016-11-28 17:02:25 -0800443 },
Ryan Prichard80e40f02019-10-31 19:54:46 -0700444 linux_bionic: {
445 static_libs: [
446 "liblinker_debuggerd_stub",
447 ],
Yi Kong6f6daaa2020-12-10 01:27:44 +0800448 },
Colin Cross97f0aef2016-07-14 16:05:46 -0700449 },
Yi Konga7e363f2020-10-01 04:10:01 +0800450
Yi Konge20a1d92022-01-25 03:19:58 +0800451 afdo: true,
Yi Konga78c33a2024-07-16 17:35:31 +0900452
453 // FIXME: Workaround compat issue with obfuscation libraries.
454 // http://b/352456802
455 lto_O0: true,
Colin Cross97f0aef2016-07-14 16:05:46 -0700456}
dimitry11da1dc2018-01-05 13:35:43 +0100457
Ryan Prichard80e40f02019-10-31 19:54:46 -0700458// ========================================================
459// assorted modules
460// ========================================================
461
Elliott Hughes90f96b92019-05-09 15:56:39 -0700462sh_binary {
463 name: "ldd",
Rupert Shuttlewortha7e29a82021-02-18 13:35:22 +0000464 src: "ldd.sh",
Elliott Hughes90f96b92019-05-09 15:56:39 -0700465}
466
Collin Fijalkovichc9521e02021-04-29 11:31:50 -0700467// Used to generate binaries that can be backed by transparent hugepages.
468cc_defaults {
469 name: "linker_hugepage_aligned",
470 arch: {
471 arm64: {
472 ldflags: ["-z max-page-size=0x200000"],
473 },
474 x86_64: {
475 ldflags: ["-z max-page-size=0x200000"],
476 },
477 },
478}
479
dimitry11da1dc2018-01-05 13:35:43 +0100480cc_library {
481 // NOTE: --exclude-libs=libgcc.a makes sure that any symbols ld-android.so pulls from
482 // libgcc.a are made static to ld-android.so. This in turn ensures that libraries that
483 // a) pull symbols from libgcc.a and b) depend on ld-android.so will not rely on ld-android.so
484 // to provide those symbols, but will instead pull them from libgcc.a. Specifically,
485 // we use this property to make sure libc.so has its own copy of the code from
486 // libgcc.a it uses.
487 //
488 // DO NOT REMOVE --exclude-libs!
489
Yi Kong7786a342018-08-31 19:01:56 -0700490 ldflags: [
491 "-Wl,--exclude-libs=libgcc.a",
Yi Kong7ac2afb2019-05-06 16:23:10 -0700492 "-Wl,--exclude-libs=libgcc_stripped.a",
Yi Kong7786a342018-08-31 19:01:56 -0700493 "-Wl,--exclude-libs=libclang_rt.builtins-arm-android.a",
494 "-Wl,--exclude-libs=libclang_rt.builtins-aarch64-android.a",
Elliott Hughes3e4f6032022-10-22 03:54:59 +0000495 "-Wl,--exclude-libs=libclang_rt.builtins-riscv64-android.a",
Ryan Prichardef147872021-01-28 14:06:52 -0800496 "-Wl,--exclude-libs=libclang_rt.builtins-i686-android.a",
Yi Kong7786a342018-08-31 19:01:56 -0700497 "-Wl,--exclude-libs=libclang_rt.builtins-x86_64-android.a",
498 ],
dimitry11da1dc2018-01-05 13:35:43 +0100499
500 // for x86, exclude libgcc_eh.a for the same reasons as above
501 arch: {
502 x86: {
503 ldflags: ["-Wl,--exclude-libs=libgcc_eh.a"],
504 },
505 x86_64: {
506 ldflags: ["-Wl,--exclude-libs=libgcc_eh.a"],
507 },
508 },
dimitry581723e2018-01-05 14:31:44 +0100509
510 srcs: ["ld_android.cpp"],
dimitry11da1dc2018-01-05 13:35:43 +0100511 cflags: [
512 "-Wall",
513 "-Wextra",
514 "-Wunused",
515 "-Werror",
516 ],
517 stl: "none",
518
519 name: "ld-android",
Elliott Hughes1eacc0e2024-01-19 19:05:36 +0000520 defaults: [
521 "linux_bionic_supported",
522 "linker_version_script_overlay",
523 ],
Yifan Hong5a39cee2020-01-21 16:43:56 -0800524 ramdisk_available: true,
Yifan Hongb04490d2020-10-21 18:36:36 -0700525 vendor_ramdisk_available: true,
Jiyong Park5603c6e2018-04-27 21:53:11 +0900526 recovery_available: true,
dimitry7f048802019-05-03 15:57:34 +0200527 native_bridge_supported: true,
dimitry11da1dc2018-01-05 13:35:43 +0100528
Ryan Prichard470b6662018-03-27 22:10:55 -0700529 nocrt: true,
dimitry11da1dc2018-01-05 13:35:43 +0100530 system_shared_libs: [],
Martin Stjernholm82d84bc2020-04-06 20:32:09 +0100531 header_libs: ["libc_headers"],
dimitry11da1dc2018-01-05 13:35:43 +0100532
Pirama Arumuga Nainarfcd35382019-02-14 13:48:01 -0800533 // Opt out of native_coverage when opting out of system_shared_libs
534 native_coverage: false,
535
dimitry11da1dc2018-01-05 13:35:43 +0100536 sanitize: {
537 never: true,
538 },
Jiyong Parke87e0dc2019-10-02 17:09:33 +0900539
540 apex_available: [
541 "//apex_available:platform",
542 "com.android.runtime",
543 ],
dimitry11da1dc2018-01-05 13:35:43 +0100544}
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800545
546cc_test {
547 name: "linker-unit-tests",
Colin Cross0cc60af2021-09-30 14:04:39 -0700548 test_suites: ["device-tests"],
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800549
550 cflags: [
551 "-g",
552 "-Wall",
553 "-Wextra",
554 "-Wunused",
555 "-Werror",
556 ],
557
558 // We need to access Bionic private headers in the linker.
559 include_dirs: ["bionic/libc"],
560
561 srcs: [
562 // Tests.
563 "linker_block_allocator_test.cpp",
564 "linker_config_test.cpp",
565 "linked_list_test.cpp",
Tamas Petz8d55d182020-02-24 14:15:25 +0100566 "linker_note_gnu_property_test.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800567 "linker_sleb128_test.cpp",
568 "linker_utils_test.cpp",
Ryan Prichard129f7a12019-12-23 16:45:47 -0800569 "linker_gnu_hash_test.cpp",
Kalesh Singh0396f872024-02-02 22:11:08 -0800570 "linker_crt_pad_segment_test.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800571
572 // Parts of the linker that we're testing.
Kalesh Singh0396f872024-02-02 22:11:08 -0800573 ":elf_note_sources",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800574 "linker_block_allocator.cpp",
575 "linker_config.cpp",
Ryan Prichard551565e2019-12-23 16:03:14 -0800576 "linker_debug.cpp",
Tamas Petz8d55d182020-02-24 14:15:25 +0100577 "linker_note_gnu_property.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800578 "linker_test_globals.cpp",
579 "linker_utils.cpp",
Kalesh Singh0396f872024-02-02 22:11:08 -0800580 "linker_phdr.cpp",
581 "linker_mapped_file_fragment.cpp",
582 "linker_sdk_versions.cpp",
583 "linker_dlwarning.cpp",
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800584 ],
585
586 static_libs: [
587 "libasync_safe",
588 "libbase",
Jiyong Park7157dfb2022-08-19 13:09:18 +0900589 "liblog_for_runtime_apex",
Kalesh Singh4084b552024-03-13 13:35:49 -0700590 "libprocinfo", // For procinfo::MappedFileSize()
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800591 ],
Ryan Prichard129f7a12019-12-23 16:45:47 -0800592
Kalesh Singh0396f872024-02-02 22:11:08 -0800593 data_libs: [
594 "crt_pad_segment_disabled",
595 "crt_pad_segment_enabled",
596 "no_crt_pad_segment",
597 ],
598
Ryan Prichard129f7a12019-12-23 16:45:47 -0800599 arch: {
600 arm: {
601 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
602 },
603 arm64: {
604 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
605 },
606 },
607}
608
609cc_benchmark {
610 name: "linker-benchmarks",
611
612 srcs: [
613 "linker_gnu_hash_benchmark.cpp",
614 ],
615
616 arch: {
617 arm: {
618 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
619 },
620 arm64: {
621 srcs: ["arch/arm_neon/linker_gnu_hash_neon.cpp"],
622 },
623 },
Elliott Hughes15a2b7b2019-02-15 13:48:38 -0800624}