2 * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the License);
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an AS IS BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include <pkgmgr-info.h>
18 #include <pkgmgr_installer_info.h>
20 #include <tzplatform_config.h>
24 #include "pkgmgr_parser_plugin_interface.h"
43 #include "ni_common.h"
44 #include "db_manager.h"
45 #include "tac_common.h"
46 #include "path_manager.h"
47 #include "plugin_manager.h"
48 #include "r2r_checker.h"
53 #define LOG_TAG "DOTNET_INSTALLER_PLUGIN"
56 #define __STR(x) __XSTR(x)
57 #if defined(__arm__) || defined(__aarch64__)
58 static const char* __NATIVE_LIB_DIR = __STR(NATIVE_LIB_DIR);
60 static const char* __DOTNET_DIR = __STR(DOTNET_DIR);
61 static const char* __READ_ONLY_APP_UPDATE_DIR = __STR(READ_ONLY_APP_UPDATE_DIR);
63 #ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
64 static const char* __SYSTEM_BASE_FILE = __STR(SYSTEM_BASE_FILE);
70 static std::string CORERUN_CMD = "/usr/share/dotnet.tizen/netcoreapp/corerun";
71 static std::string CROSSGEN2_PATH = "/usr/share/dotnet.tizen/netcoreapp/crossgen2/crossgen2.dll";
72 static std::string CLRJIT_PATH = "/usr/share/dotnet.tizen/netcoreapp/libclrjit.so";
73 static const char* CROSSGEN_OPT_JITPATH = "--jitpath";
74 static const char* CROSSGEN_OPT_TARGET_ARCH = "--targetarch";
75 static const char* CROSSGEN_OPT_OUT_NEAR_INPUT = "--out-near-input";
76 static const char* CROSSGEN_OPT_SINGLE_FILE_COMPILATION = "--single-file-compilation";
77 //static const char* CROSSGEN_OPT_PARALLELISM = "--parallelism";
78 //static const char* CROSSGEN_OPT_PARALLELISM_COUNT = "5";
79 static const char* CROSSGEN_OPT_RESILIENT = "--resilient";
80 static const char* CROSSGEN_OPT_OPTIMIZE = "-O";
81 static const char* CROSSGEN_OPT_INPUTBUBBLE = "--inputbubble";
82 static const char* CROSSGEN_OPT_COMPILE_BUBBLE_GENERICS = "--compilebubblegenerics";
83 static const char* CROSSGEN_OPT_VERBOSE = "--verbose";
84 static std::vector<std::string> REF_VECTOR;
85 static std::vector<std::string> INPUTBUBBLE_REF_VECTOR;
86 static std::vector<std::string> MIBC_VECTOR;
88 static int __interval = 0;
89 static PathManager* __pm = nullptr;
91 static NIOption* __ni_option = nullptr;
94 NIOption* getNIOption()
96 if (__ni_option == nullptr) {
97 __ni_option = (NIOption*)calloc(sizeof(NIOption), 1);
98 if (__ni_option == nullptr) {
99 _SERR("Fail to create NIOption");
105 static void waitInterval()
107 // by the recommand, ignore small value for performance.
108 if (__interval > 10000) {
109 _SOUT("sleep %d usec", __interval);
115 * @brief create the directory including parents directory, and
116 * copy ownership and smack labels to the created directory.
117 * @param[in] target directory path
118 * @param[in] source directory path to get ownership and smack label
119 * @return if directory created successfully, return true otherwise false
121 static bool createDirsAndCopyOwnerShip(std::string& target_path, const std::string& source)
124 mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
126 for (std::string::iterator iter = target_path.begin(); iter != target_path.end();) {
127 std::string::iterator newIter = std::find(iter, target_path.end(), '/');
128 std::string newPath = std::string(target_path.begin(), newIter);
130 if (!newPath.empty()) {
131 if (stat(newPath.c_str(), &st) != 0) {
132 if (mkdir(newPath.c_str(), mode) != 0 && errno != EEXIST) {
133 _SERR("Fail to create app ni directory (%s)", newPath.c_str());
136 if (!source.empty()) {
137 copySmackAndOwnership(source, newPath);
140 if (!S_ISDIR(st.st_mode)) {
141 _SERR("Fail. path is not a dir (%s)", newPath.c_str());
147 if(newIter != target_path.end()) {
155 static std::string getNIFilePath(const std::string& dllPath)
157 size_t index = dllPath.find_last_of(".");
158 if (index == std::string::npos) {
159 _SERR("File doesnot contain extension. fail to get NI file name");
162 std::string fName = dllPath.substr(0, index);
163 std::string fExt = dllPath.substr(index, dllPath.length());
165 // crossgen generate file with lower case extension only
166 std::transform(fExt.begin(), fExt.end(), fExt.begin(), ::tolower);
167 std::string niPath = fName + ".ni" + fExt;
172 static std::string getAppNIFilePath(const std::string& absDllPath, NIOption* opt)
174 std::string niDirPath;
175 std::string prevPath;
177 prevPath = getBaseName(absDllPath);
178 niDirPath = concatPath(prevPath, APP_NI_SUB_DIR);
180 if (opt->flags & NI_FLAGS_APP_UNDER_RO_AREA) {
181 niDirPath = replaceAll(niDirPath, getBaseName(__pm->getAppRootPath()), __READ_ONLY_APP_UPDATE_DIR);
182 _SERR("App is installed in RO area. Change NI path to RW area(%s).", niDirPath.c_str());
183 _ERR("App is installed in RO area. Change NI path to RW area(%s).", niDirPath.c_str());
186 if (!isDirectory(niDirPath)) {
187 if (!createDirsAndCopyOwnerShip(niDirPath, prevPath)) {
188 niDirPath = prevPath;
189 _SERR("fail to create dir (%s)", niDirPath.c_str());
193 return getNIFilePath(concatPath(niDirPath, getFileName(absDllPath)));
196 static bool checkNIExistence(const std::string& absDllPath)
198 std::string absNIPath = getNIFilePath(absDllPath);
199 if (absNIPath.empty()) {
203 if (isFile(absNIPath)) {
207 // native image of System.Private.CoreLib.dll should have to overwrite
208 // original file to support new coreclr
209 if (absDllPath.find("System.Private.CoreLib.dll") != std::string::npos) {
210 return isR2RImage(absDllPath);
216 static bool checkAppNIExistence(const std::string& absDllPath, NIOption* opt)
218 std::string absNIPath = getAppNIFilePath(absDllPath, opt);
219 if (absNIPath.empty()) {
223 if (isFile(absNIPath)) {
230 static bool checkDllExistInDir(const std::string& path)
233 auto func = [&ret](const std::string& f_path, const std::string& f_name) {
234 if (isManagedAssembly(f_name) || isNativeImage(f_name)) {
239 scanFilesInDirectory(path, func, 0);
245 * Get the list of managed files in the specific directory
246 * Absolute paths of managed files are stored at the result list.
247 * If native image already exist in the same directory, managed file is ignored.
249 static ni_error_e getTargetDllList(const std::string& path, std::vector<std::string>& fileList)
251 if (!isDirectory(path)) {
252 return NI_ERROR_INVALID_PARAMETER;
255 auto func = [&fileList](const std::string& f_path, const std::string& f_name) {
256 if (isManagedAssembly(f_path) && !checkNIExistence(f_path)) {
257 fileList.push_back(getAbsolutePath(f_path));
261 scanFilesInDirectory(path, func, 0);
263 return NI_ERROR_NONE;
267 * Get the list of managed files in the specific directory of Application
268 * Absolute paths of managed files are stored at the result list.
269 * If native image already exist in the .native_image directory, managed file is ignored.
272 static ni_error_e getAppTargetDllList(const std::string& path, std::vector<std::string>& fileList, NIOption *opt)
274 if (!isDirectory(path)) {
275 return NI_ERROR_INVALID_PARAMETER;
278 auto func = [&fileList, opt](const std::string& f_path, const std::string& f_name) {
279 if (isManagedAssembly(f_path) && !checkAppNIExistence(f_path, opt)) {
280 fileList.push_back(getAbsolutePath(f_path));
284 scanFilesInDirectory(path, func, 0);
286 return NI_ERROR_NONE;
289 static void makeArgs(std::vector<const char*>& args, const std::vector<std::string>& refPaths, NIOption* opt)
291 args.push_back(CORERUN_CMD.c_str());
292 if (CROSSGEN2_PATH != "") {
293 args.push_back(CROSSGEN2_PATH.c_str());
295 args.push_back(CROSSGEN_OPT_JITPATH);
296 args.push_back(CLRJIT_PATH.c_str());
297 args.push_back(CROSSGEN_OPT_TARGET_ARCH);
298 args.push_back(ARCHITECTURE_IDENTIFIER);
299 if (!(opt->flags & NI_FLAGS_NO_PIPELINE)) {
300 args.push_back(CROSSGEN_OPT_OUT_NEAR_INPUT);
301 args.push_back(CROSSGEN_OPT_SINGLE_FILE_COMPILATION);
303 //args.push_back(OPT_PARALLELISM);
304 //args.push_back(OPT_PARALLELISM_COUNT);
305 args.push_back(CROSSGEN_OPT_RESILIENT);
307 args.push_back(CROSSGEN_OPT_OPTIMIZE);
309 if (opt->flags & NI_FLAGS_INPUT_BUBBLE) {
310 args.push_back(CROSSGEN_OPT_INPUTBUBBLE);
311 args.push_back(CROSSGEN_OPT_COMPILE_BUBBLE_GENERICS);
313 if (opt->flags & NI_FLAGS_INPUT_BUBBLE_REF) {
314 INPUTBUBBLE_REF_VECTOR.clear();
315 // check inputbubbleref format.
316 for (const auto &path : opt->inputBubbleRefPath) {
317 if (checkDllExistInDir(path)) {
318 INPUTBUBBLE_REF_VECTOR.push_back("--inputbubbleref:" + path + "/*.dll");
321 // add ref path to inputbubble ref
322 for (const auto &path : refPaths) {
323 if (checkDllExistInDir(path)) {
324 INPUTBUBBLE_REF_VECTOR.push_back("--inputbubbleref:" + path + "/*.dll");
327 for (const auto &path : INPUTBUBBLE_REF_VECTOR) {
328 args.push_back(path.c_str());
333 if (opt->flags & NI_FLAGS_MIBC) {
335 for (const auto &path : opt->mibcPath) {
336 MIBC_VECTOR.push_back("--mibc:" + path);
338 for (const auto &path : MIBC_VECTOR) {
339 args.push_back(path.c_str());
343 if (opt->flags & NI_FLAGS_VERBOSE) {
344 args.push_back(CROSSGEN_OPT_VERBOSE);
349 // set reference path
350 if (opt->flags & NI_FLAGS_REF) {
351 for (const auto &path : opt->refPath) {
352 REF_VECTOR.push_back("-r:" + path + "/*.dll");
355 std::vector<std::string> paths = __pm->getPlatformAssembliesPaths();
356 for (const auto &path : paths) {
357 if (checkDllExistInDir(path)) {
358 REF_VECTOR.push_back("-r:" + path + "/*.dll");
363 for (const auto &path : refPaths) {
364 if (checkDllExistInDir(path)) {
365 REF_VECTOR.push_back("-r:" + path + "/*.dll");
369 for (const auto &path : REF_VECTOR) {
370 args.push_back(path.c_str());
374 static void clearArgs(std::vector<const char*>& args)
380 static ni_error_e makePdbSymlinkForNI(std::string dllPath, std::string niPath)
382 std::string pdbPath = changeExtension(dllPath, ".dll", ".pdb");
384 if (exist(pdbPath)) {
385 std::string targetPDBPath = changeExtension(niPath, ".ni.dll", ".pdb");
386 if (!exist(targetPDBPath)) {
387 bf::create_symlink(pdbPath, targetPDBPath);
388 copySmackAndOwnership(pdbPath, targetPDBPath, true);
391 } catch (const bf::filesystem_error& error) {
392 _SERR("Fail to create symlink for %s", pdbPath.c_str());
393 return NI_ERROR_UNKNOWN;
396 return NI_ERROR_NONE;
399 static ni_error_e crossgen2PostAction(const std::string& dllPath, const std::string& niPath, NIOption* opt) {
400 if (!exist(niPath)) {
401 removeFile(changeExtension(niPath, ".ni.dll", ".ni.dll.tmp"));
402 _SERR("Fail to create native image for %s", dllPath.c_str());
403 return NI_ERROR_NO_SUCH_FILE;
405 copySmackAndOwnership(dllPath, niPath);
406 // if AppNI then move ni.dll file to .native_image and copy pdb to .native_image
407 if (opt->flags & NI_FLAGS_APPNI) {
408 std::string appNIPath = getAppNIFilePath(dllPath, opt);
409 moveFile(niPath, appNIPath);
410 makePdbSymlinkForNI(dllPath, niPath);
411 _SOUT("Native image %s generated successfully.", appNIPath.c_str());
413 _SOUT("Native image %s generated successfully.", niPath.c_str());
415 return NI_ERROR_NONE;
418 static ni_error_e crossgen2PipeLine(const std::vector<std::string>& dllList, const std::vector<std::string>& refPaths, NIOption* opt)
423 return NI_ERROR_UNKNOWN;
427 waitpid(pid, &status, 0);
428 if (WIFEXITED(status)) {
429 for (auto& dllPath: dllList) {
430 ni_error_e ret = crossgen2PostAction(dllPath, changeExtension(dllPath, ".dll", ".ni.dll"), opt);
431 if (ret != NI_ERROR_NONE) {
436 _SERR("Failed. Forked process terminated abnormally");
437 return NI_ERROR_ABNORMAL_PROCESS_TERMINATION;
440 std::vector<const char*> argv;
441 makeArgs(argv, refPaths, opt);
443 // add input files at the end of parameter
444 for (const auto &input : dllList) {
445 argv.push_back(input.c_str());
446 _SOUT("+ %s", input.c_str());
450 argv.push_back(nullptr);
453 if (opt->flags & NI_FLAGS_PRINT_CMD) {
454 _SOUT("==================== NI Commands =========================");
455 for (auto &arg: argv) _SOUT("+ %s", arg);
458 execv(CORERUN_CMD.c_str(), const_cast<char* const*>(argv.data()));
464 return NI_ERROR_NONE;
467 static ni_error_e crossgen2NoPipeLine(const std::vector<std::string>& dllList, const std::vector<std::string>& refPaths, NIOption* opt)
469 for (auto& dllPath : dllList) {
471 if (opt->flags & NI_FLAGS_APPNI) {
472 niPath = getAppNIFilePath(dllPath, opt);
474 niPath = getNIFilePath(dllPath);
480 return NI_ERROR_UNKNOWN;
484 waitpid(pid, &status, 0);
485 if (WIFEXITED(status)) {
486 ni_error_e ret = crossgen2PostAction(dllPath, niPath, opt);
487 if (ret != NI_ERROR_NONE) {
491 _SERR("Failed. Forked process terminated abnormally");
492 _SERR("Crossgen2 was terminated by the OOM killer. Please check the system.");
493 removeFile(changeExtension(niPath, ".ni.dll", ".ni.dll.tmp"));
494 return NI_ERROR_ABNORMAL_PROCESS_TERMINATION;
497 std::vector<const char*> argv;
498 makeArgs(argv, refPaths, opt);
500 argv.push_back("-o");
501 argv.push_back(niPath.c_str());
503 argv.push_back(dllPath.c_str());
504 _SOUT("+ %s", dllPath.c_str());
507 argv.push_back(nullptr);
510 if (opt->flags & NI_FLAGS_PRINT_CMD) {
511 _SOUT("==================== NI Commands =========================");
512 for (auto &arg: argv) _SOUT("+ %s", arg);
515 execv(CORERUN_CMD.c_str(), const_cast<char* const*>(argv.data()));
524 return NI_ERROR_NONE;
527 static ni_error_e createCoreLibNI(NIOption* opt)
529 std::string coreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll");
530 std::string niCoreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.ni.dll");
531 std::string coreLibBackup = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll.Backup");
533 std::vector<std::string> dllList;
534 std::vector<std::string> refPaths;
535 dllList.push_back(getAbsolutePath(coreLib));
537 if (!isFile(coreLibBackup) && !isR2RImage(coreLib)) {
538 if (crossgen2NoPipeLine(dllList, refPaths, opt) == NI_ERROR_NONE && exist(niCoreLib)) {
539 if (rename(coreLib.c_str(), coreLibBackup.c_str())) {
540 _SERR("Failed to rename System.Private.CoreLib.dll");
541 return NI_ERROR_CORE_NI_FILE;
543 if (rename(niCoreLib.c_str(), coreLib.c_str())) {
544 _SERR("Failed to rename System.Private.CoreLib.ni.dll");
545 return NI_ERROR_CORE_NI_FILE;
548 _SERR("Failed to create native image for %s", coreLib.c_str());
549 return NI_ERROR_CORE_NI_FILE;
552 return NI_ERROR_NONE;
555 static ni_error_e doAOTList(std::vector<std::string>& dllList, const std::string& refPaths, NIOption* opt)
557 ni_error_e ret = NI_ERROR_NONE;
559 if (dllList.empty()) {
560 return NI_ERROR_INVALID_PARAMETER;
562 // When performing AOT for one Dll, an error is returned when an error occurs.
563 // However, when processing multiple dlls at once, only the log for errors is output and skipped.
565 std::string coreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll");
568 std::vector<std::string> niList;
569 for (auto it = dllList.begin(); it != dllList.end(); it++) {
572 _SERR("dll file is not exist : %s", f.c_str());
575 if (!isManagedAssembly(f)) {
576 _SERR("Input file is not a dll file : %s", f.c_str());
579 // handle System.Private.CoreLib.dll separately.
580 // dllList and path manager contain absolute path. So, there is no need to change path to absolute path
585 niList.push_back(changeExtension(f, ".dll", ".ni.dll"));
589 // In the case of SPC, post-processing is required to change the name of the native image.
590 // In order to avoid repeatedly checking whether the generated native image is an SPC,
591 // the SPC native image generation is performed separately.
593 ret = createCoreLibNI(opt);
594 if (ret != NI_ERROR_NONE) {
599 // if there is no proper input after processing dll list
600 if (dllList.empty()) {
604 return NI_ERROR_INVALID_PARAMETER;
608 std::vector<std::string> paths;
609 splitPath(refPaths, paths);
611 if (opt->flags & NI_FLAGS_NO_PIPELINE) {
612 ret = crossgen2NoPipeLine(dllList, paths, opt);
614 // When the forked process in the pipeline state is terminated(WIFSIGNALED(status)),
615 // retry the generation of the native image
616 // if the number of .dll files and the number of .ni.dll files are different.
617 for (int callCnt = 0; callCnt < 2; callCnt++) {
618 // If an error occurs, perform it twice with the same option.
619 ret = crossgen2PipeLine(dllList, paths, opt);
620 if (ret != NI_ERROR_NONE) {
621 _SERR("Crossgen2 is abnormally terminated. Regenerate native images that failed while running crossgen2.");
623 for (auto it = niList.begin(); it != niList.end(); it++) {
624 std::string niPath = *it;
625 std::string dllPath = changeExtension(niPath, ".ni.dll", ".dll");
626 if (crossgen2PostAction(dllPath, niPath, opt) != NI_ERROR_NONE) {
627 dllList.push_back(dllPath);
636 // If an error occurs after two crossgen2PipeLine() attempts,
637 // try crossgen2NoPipeLine() for the last time.
638 if (ret != NI_ERROR_NONE) {
639 _SERR("Retry running crossgen2 with --no-pipeline mode to avoid termination by OOM.");
640 ret = crossgen2NoPipeLine(dllList, paths, opt);
647 static ni_error_e doAOTFile(const std::string& dllFile, const std::string& refPaths, NIOption* opt)
649 if (!isFile(dllFile)) {
650 _SERR("dll file is not exist : %s", dllFile.c_str());
651 return NI_ERROR_NO_SUCH_FILE;
654 if (!isManagedAssembly(dllFile)) {
655 _SERR("Failed. Input parameter is not managed dll (%s)\n", dllFile.c_str());
656 return NI_ERROR_INVALID_PARAMETER;
659 if (checkNIExistence(dllFile)) {
660 _SERR("Native image file is already exist : %s", dllFile.c_str());
661 return NI_ERROR_ALREADY_EXIST;
664 std::vector<std::string> dllList;
665 dllList.push_back(getAbsolutePath(dllFile));
666 return doAOTList(dllList, refPaths, opt);
669 // callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
670 static int appAotCb(pkgmgrinfo_appinfo_h handle, void *userData)
674 NIOption **pOptions = (NIOption**)userData;
676 ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
677 if (ret != PMINFO_R_OK) {
678 _SERR("Failed to get pkgid");
682 if (removeNIUnderPkgRoot(pkgId) != NI_ERROR_NONE) {
683 _SERR("Failed to remove previous dlls from [%s]", pkgId);
687 if (createNIUnderPkgRoot(pkgId, *pOptions) != NI_ERROR_NONE) {
688 _SERR("Failed to generate NI file [%s]", pkgId);
691 _SOUT("Complete make application to native image");
697 ni_error_e initNICommon()
699 #if defined(__arm__) || defined(__aarch64__)
702 env = getenv("MIC_CROSSGEN2_ENABLED");
703 if (env != nullptr && !strcmp(env, "1")) {
704 CORERUN_CMD = std::string("/opt/usr/dotnet/mic/crossgen2");
706 CLRJIT_PATH = std::string("/opt/usr/dotnet/mic/libclrjit_unix_") + ARCHITECTURE_IDENTIFIER + std::string("_x64.so");
709 // get interval value
710 const static std::string intervalFile = concatPath(__NATIVE_LIB_DIR, "crossgen_interval.txt");
711 std::ifstream inFile(intervalFile);
713 _SOUT("crossgen_interval.txt is found");
714 inFile >> __interval;
717 if (initializePluginManager("normal")) {
718 _SERR("Fail to initialize PluginManager");
719 return NI_ERROR_UNKNOWN;
723 __pm = new PathManager();
724 } catch (const std::exception& e) {
725 _SERR("Failed to create PathManager");
726 return NI_ERROR_UNKNOWN;
729 char* pluginDllPaths = pluginGetDllPath();
730 if (pluginDllPaths && pluginDllPaths[0] != '\0') {
731 __pm->addPlatformAssembliesPaths(pluginDllPaths, true);
734 char* pluginNativePaths = pluginGetNativeDllSearchingPath();
735 if (pluginNativePaths && pluginNativePaths[0] != '\0') {
736 __pm->addNativeDllSearchingPaths(pluginNativePaths, true);
739 return NI_ERROR_NONE;
741 _SERR("crossgen supports arm/arm64 architecture only. skip ni file generation");
742 return NI_ERROR_NOT_SUPPORTED;
746 void finalizeNICommon()
750 finalizePluginManager();
757 __ni_option = nullptr;
761 ni_error_e createNIPlatform(NIOption* opt)
763 ni_error_e ret = createNIUnderDirs(__pm->getRuntimePath(), opt);
764 if (ret != NI_ERROR_NONE) {
768 return createNIUnderDirs(__pm->getTizenFXPath(), opt);
771 ni_error_e createNIDll(const std::string& dllPath, NIOption* opt)
773 return doAOTFile(dllPath, std::string(), opt);
776 ni_error_e createNIUnderTAC(const std::string& targetPath, const std::string& refPaths, NIOption* opt)
780 // get managed file list from targetPath
781 std::vector<std::string> dllList;
782 ret = getTargetDllList(targetPath, dllList);
783 if (ret != NI_ERROR_NONE) {
787 std::vector<std::string> needNIList;
788 std::vector<std::string> niList;
790 for (auto &dll : dllList) {
791 if (!checkNIExistence(dll)) {
792 needNIList.push_back(dll);
794 niList.push_back(getNIFilePath(dll));
797 if (!needNIList.empty()) {
798 // NI fils of TAC-related dlls under /opt/usr/dotnet should not be created under .native_image directory.
799 // So, unset NI_FLAGS_APPNI temporally and restore it after running AOT.
800 opt->flags &= ~NI_FLAGS_APPNI;
801 ret = doAOTList(needNIList, refPaths, opt);
802 opt->flags |= NI_FLAGS_APPNI;
803 if (ret != NI_ERROR_NONE) {
808 for (auto &niPath : niList) {
810 std::string symNIPath = concatPath(targetPath, getFileName(niPath));
811 if (!exist(symNIPath)) {
812 bf::create_symlink(niPath, symNIPath);
813 copySmackAndOwnership(targetPath.c_str(), symNIPath.c_str(), true);
814 _SOUT("%s symbolic link file generated successfully.", symNIPath.c_str());
815 _INFO("%s symbolic link file generated successfully.", symNIPath.c_str());
820 return NI_ERROR_NONE;
824 ni_error_e createNIUnderDirs(const std::string& rootPaths, NIOption* opt)
826 ni_error_e ret = NI_ERROR_NONE;
828 std::vector<std::string> fileList;
829 std::vector<std::string> paths;
830 splitPath(rootPaths, paths);
832 for (const auto &path : paths) {
837 if (path.find(TAC_SYMLINK_SUB_DIR) != std::string::npos) {
838 ret = createNIUnderTAC(path, rootPaths, opt);
839 if (ret != NI_ERROR_NONE) {
842 } else if (opt->flags & NI_FLAGS_APPNI) {
843 ret = getAppTargetDllList(path, fileList, opt);
844 if (ret != NI_ERROR_NONE) {
848 ret = getTargetDllList(path, fileList);
849 if (ret != NI_ERROR_NONE) {
855 if (fileList.empty()) {
856 return NI_ERROR_NONE;
859 return doAOTList(fileList, rootPaths, opt);
862 ni_error_e createNIUnderPkgRoot(const std::string& pkgId, NIOption* opt)
864 if (!isR2RImage(concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll"))) {
865 _SERR("The native image of System.Private.CoreLib does not exist.\n"
866 "Run the command to create the native image\n"
867 "# dotnettool --ni-dll /usr/share/dotnet.tizen/netcoreapp/System.Private.CoreLib.dll");
868 return NI_ERROR_CORE_NI_FILE;
871 std::string rootPath = getRootPath(pkgId);
872 if (rootPath.empty()) {
873 _SERR("Failed to get root path from [%s]", pkgId.c_str());
874 return NI_ERROR_INVALID_PACKAGE;
877 __pm->setAppRootPath(rootPath);
879 char* extraDllPaths = pluginGetExtraDllPath();
880 if (extraDllPaths && extraDllPaths[0] != '\0') {
881 __pm->setExtraDllPaths(extraDllPaths);
884 opt->flags |= NI_FLAGS_APPNI;
886 if (isReadOnlyArea(rootPath)) {
887 opt->flags |= NI_FLAGS_APP_UNDER_RO_AREA;
888 opt->flags |= NI_FLAGS_NO_PIPELINE;
889 _SERR("Only no-pipeline mode supported for RO app. Set no-pipeline option forcibly");
891 opt->flags &= ~NI_FLAGS_APP_UNDER_RO_AREA;
894 // create native image under bin and lib directory
895 // tac directory is skipped in the createNIUnderDirs.
896 return createNIUnderDirs(__pm->getAppPaths(), opt);
899 void removeNIPlatform()
901 std::string coreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll");
902 std::string coreLibBackup = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll.Backup");
904 if (isR2RImage(coreLib)) {
905 if (!isFile(coreLibBackup)) {
909 if (remove(coreLib.c_str())) {
910 _SERR("Failed to remove System.Private.CoreLib native image file");
912 if (rename(coreLibBackup.c_str(), coreLib.c_str())) {
913 _SERR("Failed to rename System.Private.CoreLib.Backup to origin");
917 #ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
918 if (isFile(__SYSTEM_BASE_FILE)) {
919 if (remove(__SYSTEM_BASE_FILE)) {
920 _SERR("Failed to remove %s", __SYSTEM_BASE_FILE);
925 removeNIUnderDirs(__pm->getRuntimePath() + ":" + __pm->getTizenFXPath());
928 void removeNIUnderDirs(const std::string& rootPaths)
930 auto convert = [](const std::string& path, const std::string& filename) {
931 if (isNativeImage(path)) {
932 if (remove(path.c_str())) {
933 _SERR("Failed to remove %s", path.c_str());
938 std::vector<std::string> paths;
939 splitPath(rootPaths, paths);
940 for (const auto &path : paths) {
941 scanFilesInDirectory(path, convert, -1);
945 ni_error_e removeNIUnderPkgRoot(const std::string& pkgId)
947 std::string rootPath = getRootPath(pkgId);
948 if (rootPath.empty()) {
949 _SERR("Failed to get root path from [%s]", pkgId.c_str());
950 return NI_ERROR_INVALID_PACKAGE;
953 __pm->setAppRootPath(rootPath);
955 // getAppNIPaths returns bin/.native_image, lib/.native_image and .tac_symlink.
956 std::string appNIPaths = __pm->getAppNIPaths();
957 std::vector<std::string> paths;
958 splitPath(appNIPaths, paths);
959 for (const auto &path : paths) {
960 if (!isReadOnlyArea(path)) {
961 // Only the native image inside the TAC should be removed.
962 if (strstr(path.c_str(), TAC_SYMLINK_SUB_DIR) != NULL) {
963 removeNIUnderDirs(path);
965 if (isDirectory(path)) {
966 if (!removeAll(path.c_str())) {
967 _SERR("Failed to remove app ni dir [%s]", path.c_str());
974 // In special cases, the ni file may exist in the dll location.
975 // The code below is to avoid this exceptional case.
976 std::string appPaths = __pm->getAppPaths();
977 splitPath(appPaths, paths);
978 for (const auto &path : paths) {
979 if (isDirectory(path)) {
980 removeNIUnderDirs(path);
984 return NI_ERROR_NONE;
987 ni_error_e regenerateAppNI(NIOption* opt)
990 pkgmgrinfo_appinfo_metadata_filter_h handle;
992 ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
993 if (ret != PMINFO_R_OK)
994 return NI_ERROR_UNKNOWN;
996 ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, AOT_METADATA_KEY, METADATA_VALUE);
997 if (ret != PMINFO_R_OK) {
998 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
999 return NI_ERROR_UNKNOWN;
1002 ret = pkgmgrMDFilterForeach(handle, appAotCb, &opt);
1004 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
1005 return NI_ERROR_UNKNOWN;
1008 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
1009 return NI_ERROR_NONE;
1012 // callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
1013 static int regenTacCb(pkgmgrinfo_appinfo_h handle, void *userData)
1016 NIOption **pOpt = (NIOption**)userData;
1018 int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
1019 if (ret != PMINFO_R_OK || pkgId == NULL) {
1020 _SERR("Failed to get pkgid");
1024 sqlite3 *tac_db = openDB(TAC_APP_LIST_DB);
1026 _SERR("Sqlite open error");
1029 sqlite3_exec(tac_db, "BEGIN;", NULL, NULL, NULL);
1031 char *sql = sqlite3_mprintf("SELECT * FROM TAC WHERE PKGID = %Q;", pkgId);
1032 std::vector<std::string> nugets = selectDB(tac_db, sql);
1040 std::string nugetPaths;
1041 for (const auto &nuget : nugets) {
1042 if (!nugetPaths.empty()) {
1045 nugetPaths += concatPath(__DOTNET_DIR, nuget);
1048 for (auto& nuget : nugets) {
1049 createNIUnderTAC(concatPath(__DOTNET_DIR, nuget), nugetPaths, *pOpt);
1055 ni_error_e regenerateTACNI(NIOption* opt)
1057 removeNIUnderDirs(__DOTNET_DIR);
1059 pkgmgrinfo_appinfo_metadata_filter_h handle;
1060 int ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
1061 if (ret != PMINFO_R_OK) {
1062 return NI_ERROR_UNKNOWN;
1065 ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE);
1066 if (ret != PMINFO_R_OK) {
1067 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
1068 return NI_ERROR_UNKNOWN;
1071 ret = pkgmgrMDFilterForeach(handle, regenTacCb, &opt);
1073 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
1074 return NI_ERROR_UNKNOWN;
1077 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
1079 return NI_ERROR_NONE;
1082 static std::vector<uid_t> getUserIds()
1084 std::vector<uid_t> list;
1087 errno = 0; // so we can distinguish errors from no more entries
1088 passwd* entry = getpwent();
1091 _SERR("Error while getting userIDs");
1097 list.push_back(entry->pw_uid);
1104 static std::string getAppDataPath(const std::string& pkgId, uid_t uid)
1106 std::string pDataFile;
1108 tzplatform_set_user(uid);
1110 const char* tzUserApp = tzplatform_getenv(TZ_USER_APP);
1111 if (tzUserApp != NULL) {
1112 pDataFile = std::string(tzUserApp) + "/" + pkgId + "/data/";
1115 tzplatform_reset_user();
1120 ni_error_e removeAppProfileData(const std::string& pkgId)
1122 if (pkgId.empty()) {
1123 return NI_ERROR_INVALID_PARAMETER;
1126 std::vector<uid_t> uidList = getUserIds();
1127 for (auto& uid : uidList) {
1128 // get data path from pkgid
1129 std::string dataPath = getAppDataPath(pkgId, uid);
1130 if (!dataPath.empty() && exist(dataPath)) {
1131 std::string pDataFile = dataPath + PROFILE_BASENAME;
1133 if (exist(pDataFile)) {
1134 if (!removeFile(pDataFile)) {
1135 _SERR("Fail to remove profile data file (%s).", pDataFile.c_str());
1136 return NI_ERROR_UNKNOWN;
1138 _SOUT("Profile data (%s) is removed successfully", pDataFile.c_str());
1143 return NI_ERROR_NONE;
1146 static int appTypeListCb(pkgmgrinfo_appinfo_h handle, void *user_data)
1149 int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
1150 if (ret != PMINFO_R_OK || pkgId == NULL) {
1151 _SERR("Fail to get pkgid");
1155 if (removeAppProfileData(pkgId) != NI_ERROR_NONE) {
1156 _SERR("Fail to remove profile data for (%s)", pkgId);
1162 static ni_error_e removeAppProfileByAppType(const char* type)
1166 pkgmgrinfo_appinfo_filter_h filter;
1168 ret = pkgmgrinfo_appinfo_filter_create(&filter);
1169 if (ret != PMINFO_R_OK) {
1170 _SERR("Fail to create appinfo filter");
1171 return NI_ERROR_UNKNOWN;
1174 ret = pkgmgrinfo_appinfo_filter_add_string(filter, PMINFO_APPINFO_PROP_APP_TYPE, type);
1175 if (ret != PMINFO_R_OK) {
1176 pkgmgrinfo_appinfo_filter_destroy(filter);
1177 _SERR("Fail to add appinfo filter (%s)", type);
1178 return NI_ERROR_UNKNOWN;
1181 ret = pkgmgrinfo_appinfo_filter_foreach_appinfo(filter, appTypeListCb, NULL);
1182 if (ret != PMINFO_R_OK) {
1183 _SERR("Fail to pkgmgrinfo_pkginfo_filter_foreach_pkginfo");
1184 pkgmgrinfo_appinfo_filter_destroy(filter);
1185 return NI_ERROR_UNKNOWN;
1188 pkgmgrinfo_appinfo_filter_destroy(filter);
1190 return NI_ERROR_NONE;
1193 void removeAllAppProfileData()
1195 std::vector<const char*> appTypeList = {"dotnet", "dotnet-nui", "dotnet-inhouse"};
1197 for (auto& type : appTypeList) {
1198 if (removeAppProfileByAppType(type) != NI_ERROR_NONE) {
1199 _SERR("Fail to removeAppProfileByAppType for type (%s)", type);