#include <pkgmgr-info.h>
#include <pkgmgr_installer_info.h>
#include <aul.h>
+#include <tzplatform_config.h>
#include "log.h"
#include "utils.h"
#include <algorithm>
#include <string>
#include <fstream>
+#include <sstream>
#include <pwd.h>
#include <grp.h>
#include <unistd.h>
#include <string.h>
#include <sqlite3.h>
+#include <inttypes.h>
+#include <errno.h>
#include "ni_common.h"
#include "db_manager.h"
#include "tac_common.h"
#include "path_manager.h"
#include "plugin_manager.h"
+#include "r2r_checker.h"
#ifdef LOG_TAG
#undef LOG_TAG
#endif
#define LOG_TAG "DOTNET_INSTALLER_PLUGIN"
-#ifndef CROSSGEN_PATH
-#error "CROSSGEN_PATH is missed"
-#endif
-
#define __XSTR(x) #x
#define __STR(x) __XSTR(x)
+#if defined(__arm__) || defined(__aarch64__)
static const char* __NATIVE_LIB_DIR = __STR(NATIVE_LIB_DIR);
-static const char* __CROSSGEN_PATH = __STR(CROSSGEN_PATH);
-static const char* __TAC_DIR = __STR(TAC_DIR);
+#endif
+static const char* __DOTNET_DIR = __STR(DOTNET_DIR);
+static const char* __READ_ONLY_APP_UPDATE_DIR = __STR(READ_ONLY_APP_UPDATE_DIR);
#ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
static const char* __SYSTEM_BASE_FILE = __STR(SYSTEM_BASE_FILE);
#undef __STR
#undef __XSTR
+static std::string CORERUN_CMD = "/usr/share/dotnet.tizen/netcoreapp/corerun";
+static std::string CROSSGEN2_PATH = "/usr/share/dotnet.tizen/netcoreapp/crossgen2/crossgen2.dll";
+static std::string CLRJIT_PATH = "/usr/share/dotnet.tizen/netcoreapp/libclrjit.so";
+static const char* CROSSGEN_OPT_JITPATH = "--jitpath";
+static const char* CROSSGEN_OPT_TARGET_ARCH = "--targetarch";
+static const char* CROSSGEN_OPT_OUT_NEAR_INPUT = "--out-near-input";
+static const char* CROSSGEN_OPT_SINGLE_FILE_COMPILATION = "--single-file-compilation";
+//static const char* CROSSGEN_OPT_PARALLELISM = "--parallelism";
+//static const char* CROSSGEN_OPT_PARALLELISM_COUNT = "5";
+static const char* CROSSGEN_OPT_RESILIENT = "--resilient";
+static const char* CROSSGEN_OPT_OPTIMIZE = "-O";
+static const char* CROSSGEN_OPT_INPUTBUBBLE = "--inputbubble";
+static const char* CROSSGEN_OPT_COMPILE_BUBBLE_GENERICS = "--compilebubblegenerics";
+static const char* CROSSGEN_OPT_VERBOSE = "--verbose";
+static std::vector<std::string> REF_VECTOR;
+static std::vector<std::string> INPUTBUBBLE_REF_VECTOR;
+static std::vector<std::string> MIBC_VECTOR;
+
static int __interval = 0;
-static std::string __tpa;
+static PathManager* __pm = nullptr;
+
+static NIOption* __ni_option = nullptr;
+
+// singleton
+NIOption* getNIOption()
+{
+ if (__ni_option == nullptr) {
+ __ni_option = (NIOption*)calloc(sizeof(NIOption), 1);
+ if (__ni_option == nullptr) {
+ _SERR("Fail to create NIOption");
+ }
+ }
+ return __ni_option;
+}
static void waitInterval()
{
// by the recommand, ignore small value for performance.
if (__interval > 10000) {
- fprintf(stderr, "sleep %d usec\n", __interval);
+ _SOUT("sleep %d usec", __interval);
usleep(__interval);
}
}
-static std::string getNiFilePath(const std::string& dllPath)
+/**
+ * @brief create the directory including parents directory, and
+ * copy ownership and smack labels to the created directory.
+ * @param[in] target directory path
+ * @param[in] source directory path to get ownership and smack label
+ * @return if directory created successfully, return true otherwise false
+ */
+static bool createDirsAndCopyOwnerShip(std::string& target_path, const std::string& source)
+{
+ struct stat st;
+ mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
+
+ for (std::string::iterator iter = target_path.begin(); iter != target_path.end();) {
+ std::string::iterator newIter = std::find(iter, target_path.end(), '/');
+ std::string newPath = std::string(target_path.begin(), newIter);
+
+ if (!newPath.empty()) {
+ if (stat(newPath.c_str(), &st) != 0) {
+ if (mkdir(newPath.c_str(), mode) != 0 && errno != EEXIST) {
+ _SERR("Fail to create app ni directory (%s)", newPath.c_str());
+ return false;
+ }
+ if (!source.empty()) {
+ copySmackAndOwnership(source, newPath);
+ }
+ } else {
+ if (!S_ISDIR(st.st_mode)) {
+ _SERR("Fail. path is not a dir (%s)", newPath.c_str());
+ return false;
+ }
+ }
+ }
+ iter = newIter;
+ if(newIter != target_path.end()) {
+ ++iter;
+ }
+ }
+
+ return true;
+}
+
+static std::string getNIFilePath(const std::string& dllPath)
{
size_t index = dllPath.find_last_of(".");
if (index == std::string::npos) {
- fprintf(stderr, "File doesnot contain extension. fail to get NI file name\n");
+ _SERR("File doesnot contain extension. fail to get NI file name");
return "";
}
std::string fName = dllPath.substr(0, index);
return niPath;
}
-static std::string getAppNIPath(const std::string& niPath)
+static std::string getAppNIFilePath(const std::string& absDllPath, NIOption* opt)
{
- std::string fileName;
std::string niDirPath;
std::string prevPath;
- size_t index = niPath.find_last_of("/");
- if (index != std::string::npos) {
- prevPath = niPath.substr(0, index);
- fileName = niPath.substr(index + 1, niPath.length());
- } else {
- prevPath = ".";
- fileName = niPath;
- }
-
+ prevPath = getBaseName(absDllPath);
niDirPath = concatPath(prevPath, APP_NI_SUB_DIR);
- if (!isFileExist(niDirPath)) {
- if (mkdir(niDirPath.c_str(), 0755) == 0) {
- copySmackAndOwnership(prevPath, niDirPath);
- } else {
- fprintf(stderr, "Fail to create app ni directory (%s)\n", niDirPath.c_str());
+ if (opt->flags & NI_FLAGS_APP_UNDER_RO_AREA) {
+ niDirPath = replaceAll(niDirPath, getBaseName(__pm->getAppRootPath()), __READ_ONLY_APP_UPDATE_DIR);
+ _SERR("App is installed in RO area. Change NI path to RW area(%s).", niDirPath.c_str());
+ _ERR("App is installed in RO area. Change NI path to RW area(%s).", niDirPath.c_str());
+ }
+
+ if (!isDirectory(niDirPath)) {
+ if (!createDirsAndCopyOwnerShip(niDirPath, prevPath)) {
+ niDirPath = prevPath;
+ _SERR("fail to create dir (%s)", niDirPath.c_str());
}
}
- return concatPath(niDirPath, fileName);
+ return getNIFilePath(concatPath(niDirPath, getFileName(absDllPath)));
}
-static bool niExist(const std::string& path)
+static bool checkNIExistence(const std::string& absDllPath)
{
- std::string f = getNiFilePath(path);
- if (f.empty()) {
+ std::string absNIPath = getNIFilePath(absDllPath);
+ if (absNIPath.empty()) {
return false;
}
- if (isFileExist(f)) {
+ if (isFile(absNIPath)) {
return true;
}
// native image of System.Private.CoreLib.dll should have to overwrite
// original file to support new coreclr
- if (path.find("System.Private.CoreLib.dll") != std::string::npos) {
- std::string coreLibBackup = path + ".Backup";
- if (isFileExist(coreLibBackup)) {
- return true;
- }
+ if (absDllPath.find("System.Private.CoreLib.dll") != std::string::npos) {
+ return isR2RImage(absDllPath);
}
return false;
}
-#ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
-// Get next base address to be used for system ni image from file
-// __SYSTEM_BASE_FILE should be checked for existance before calling this function
-static uintptr_t getNextBaseAddrFromFile()
+static bool checkAppNIExistence(const std::string& absDllPath, NIOption* opt)
{
- FILE *pFile = fopen(__SYSTEM_BASE_FILE, "r");
- if (pFile == NULL) {
- fprintf(stderr, "Failed to open %s\n", __SYSTEM_BASE_FILE);
- return 0;
+ std::string absNIPath = getAppNIFilePath(absDllPath, opt);
+ if (absNIPath.empty()) {
+ return false;
}
- uintptr_t addr = 0;
- uintptr_t size = 0;
-
- while (fscanf(pFile, "%u %u", &addr, &size) != EOF) {
+ if (isFile(absNIPath)) {
+ return true;
}
- fclose(pFile);
-
- return addr + size;
+ return false;
}
-// Get next base address to be used for system ni image
-static uintptr_t getNextBaseAddr()
+static bool checkDllExistInDir(const std::string& path)
{
- uintptr_t baseAddr = 0;
-
- if (!isFileExist(__SYSTEM_BASE_FILE)) {
- // This is the starting address for all default base addresses
- baseAddr = DEFAULT_BASE_ADDR_START;
- } else {
- baseAddr = getNextBaseAddrFromFile();
+ bool ret = false;
+ auto func = [&ret](const std::string& f_path, const std::string& f_name) {
+ if (isManagedAssembly(f_name) || isNativeImage(f_name)) {
+ ret = true;
+ }
+ };
- // Round to a multple of 64K (see ZapImage::CalculateZapBaseAddress in CoreCLR)
- uintptr_t BASE_ADDRESS_ALIGNMENT = 0xffff;
- baseAddr = (baseAddr + BASE_ADDRESS_ALIGNMENT) & ~BASE_ADDRESS_ALIGNMENT;
- }
+ scanFilesInDirectory(path, func, 0);
- return baseAddr;
+ return ret;
}
-// Save base address of system ni image to file
-static void updateBaseAddrFile(const std::string &absNiPath, uintptr_t baseAddr)
+/*
+ * Get the list of managed files in the specific directory
+ * Absolute paths of managed files are stored at the result list.
+ * If native image already exist in the same directory, managed file is ignored.
+ */
+static ni_error_e getTargetDllList(const std::string& path, std::vector<std::string>& fileList)
{
- uintptr_t niSize = getFileSize(absNiPath);
- if (niSize == 0) {
- fprintf(stderr, "File %s doesn't exist\n", absNiPath.c_str());
- return;
+ if (!isDirectory(path)) {
+ return NI_ERROR_INVALID_PARAMETER;
}
- // Write new entry to the file
- FILE *pFile = fopen(__SYSTEM_BASE_FILE, "a");
- if (pFile == NULL) {
- fprintf(stderr, "Failed to open %s\n", __SYSTEM_BASE_FILE);
- return;
- }
+ auto func = [&fileList](const std::string& f_path, const std::string& f_name) {
+ if (isManagedAssembly(f_path) && !checkNIExistence(f_path)) {
+ fileList.push_back(getAbsolutePath(f_path));
+ }
+ };
+
+ scanFilesInDirectory(path, func, 0);
- fprintf(pFile, "%u %u\n", baseAddr, niSize);
- fclose(pFile);
+ return NI_ERROR_NONE;
}
-// check if dll is listed in TPA
-static bool isTPADll(const std::string &dllPath)
+/*
+ * Get the list of managed files in the specific directory of Application
+ * Absolute paths of managed files are stored at the result list.
+ * If native image already exist in the .native_image directory, managed file is ignored.
+ *
+ */
+static ni_error_e getAppTargetDllList(const std::string& path, std::vector<std::string>& fileList, NIOption *opt)
{
- std::string absDllPath = absolutePath(dllPath);
-
- if (__tpa.find(absDllPath) != std::string::npos) {
- return true;
+ if (!isDirectory(path)) {
+ return NI_ERROR_INVALID_PARAMETER;
}
- return false;
+ auto func = [&fileList, opt](const std::string& f_path, const std::string& f_name) {
+ if (isManagedAssembly(f_path) && !checkAppNIExistence(f_path, opt)) {
+ fileList.push_back(getAbsolutePath(f_path));
+ }
+ };
+
+ scanFilesInDirectory(path, func, 0);
+
+ return NI_ERROR_NONE;
}
-#endif
-// baseAddr should be checked in file before getting here
-static ni_error_e crossgen(const std::string& dllPath, const std::string& appPath, DWORD flags)
+static void makeArgs(std::vector<const char*>& args, const std::vector<std::string>& refPaths, NIOption* opt)
{
- if (!isFileExist(dllPath)) {
- fprintf(stderr, "dll file is not exist : %s\n", dllPath.c_str());
- return NI_ERROR_NO_SUCH_FILE;
+ args.push_back(CORERUN_CMD.c_str());
+ if (CROSSGEN2_PATH != "") {
+ args.push_back(CROSSGEN2_PATH.c_str());
+ }
+ args.push_back(CROSSGEN_OPT_JITPATH);
+ args.push_back(CLRJIT_PATH.c_str());
+ args.push_back(CROSSGEN_OPT_TARGET_ARCH);
+ args.push_back(ARCHITECTURE_IDENTIFIER);
+ if (!(opt->flags & NI_FLAGS_NO_PIPELINE)) {
+ args.push_back(CROSSGEN_OPT_OUT_NEAR_INPUT);
+ args.push_back(CROSSGEN_OPT_SINGLE_FILE_COMPILATION);
+ }
+ //args.push_back(OPT_PARALLELISM);
+ //args.push_back(OPT_PARALLELISM_COUNT);
+ args.push_back(CROSSGEN_OPT_RESILIENT);
+
+ args.push_back(CROSSGEN_OPT_OPTIMIZE);
+
+ if (opt->flags & NI_FLAGS_INPUT_BUBBLE) {
+ args.push_back(CROSSGEN_OPT_INPUTBUBBLE);
+ args.push_back(CROSSGEN_OPT_COMPILE_BUBBLE_GENERICS);
+
+ if (opt->flags & NI_FLAGS_INPUT_BUBBLE_REF) {
+ INPUTBUBBLE_REF_VECTOR.clear();
+ // check inputbubbleref format.
+ for (const auto &path : opt->inputBubbleRefPath) {
+ if (checkDllExistInDir(path)) {
+ INPUTBUBBLE_REF_VECTOR.push_back("--inputbubbleref:" + path + "/*.dll");
+ }
+ }
+ // add ref path to inputbubble ref
+ for (const auto &path : refPaths) {
+ if (checkDllExistInDir(path)) {
+ INPUTBUBBLE_REF_VECTOR.push_back("--inputbubbleref:" + path + "/*.dll");
+ }
+ }
+ for (const auto &path : INPUTBUBBLE_REF_VECTOR) {
+ args.push_back(path.c_str());
+ }
+ }
}
- if (!isManagedAssembly(dllPath)) {
- //fprintf(stderr, "Input file is not a dll file : %s\n", dllPath.c_str());
- return NI_ERROR_INVALID_PARAMETER;
+ if (opt->flags & NI_FLAGS_MIBC) {
+ MIBC_VECTOR.clear();
+ for (const auto &path : opt->mibcPath) {
+ MIBC_VECTOR.push_back("--mibc:" + path);
+ }
+ for (const auto &path : MIBC_VECTOR) {
+ args.push_back(path.c_str());
+ }
}
- if (niExist(dllPath)) {
- fprintf(stderr, "Already ni file is exist for %s\n", dllPath.c_str());
- return NI_ERROR_ALREADY_EXIST;
+ if (opt->flags & NI_FLAGS_VERBOSE) {
+ args.push_back(CROSSGEN_OPT_VERBOSE);
}
- std::string absDllPath = absolutePath(dllPath);
- std::string absNiPath = getNiFilePath(dllPath);
+ REF_VECTOR.clear();
+ // set reference path
+ if (opt->flags & NI_FLAGS_REF) {
+ for (const auto &path : opt->refPath) {
+ REF_VECTOR.push_back("-r:" + path + "/*.dll");
+ }
+ } else {
+ std::vector<std::string> paths = __pm->getPlatformAssembliesPaths();
+ for (const auto &path : paths) {
+ if (checkDllExistInDir(path)) {
+ REF_VECTOR.push_back("-r:" + path + "/*.dll");
+ }
+ }
+ }
- if (absNiPath.empty()) {
- fprintf(stderr, "Fail to get ni file name\n");
- return NI_ERROR_UNKNOWN;
+ for (const auto &path : refPaths) {
+ if (checkDllExistInDir(path)) {
+ REF_VECTOR.push_back("-r:" + path + "/*.dll");
+ }
}
- bool isAppNI = flags & NI_FLAGS_APPNI;
- if (isAppNI && strstr(absNiPath.c_str(), __TAC_DIR) == NULL) {
- absNiPath = getAppNIPath(absNiPath);
+ for (const auto &path : REF_VECTOR) {
+ args.push_back(path.c_str());
}
+}
-#ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
- uintptr_t baseAddr = 0;
+static void clearArgs(std::vector<const char*>& args)
+{
+ REF_VECTOR.clear();
+ args.clear();
+}
- if (isTPADll(dllPath)) {
- baseAddr = getNextBaseAddr();
+static ni_error_e makePdbSymlinkForNI(std::string dllPath, std::string niPath)
+{
+ std::string pdbPath = changeExtension(dllPath, ".dll", ".pdb");
+ try {
+ if (exist(pdbPath)) {
+ std::string targetPDBPath = changeExtension(niPath, ".ni.dll", ".pdb");
+ if (!exist(targetPDBPath)) {
+ bf::create_symlink(pdbPath, targetPDBPath);
+ copySmackAndOwnership(pdbPath, targetPDBPath, true);
+ }
+ }
+ } catch (const bf::filesystem_error& error) {
+ _SERR("Fail to create symlink for %s", pdbPath.c_str());
+ return NI_ERROR_UNKNOWN;
}
-#endif
+ return NI_ERROR_NONE;
+}
+
+static ni_error_e crossgen2PostAction(const std::string& dllPath, const std::string& niPath, NIOption* opt) {
+ if (!exist(niPath)) {
+ removeFile(changeExtension(niPath, ".ni.dll", ".ni.dll.tmp"));
+ _SERR("Fail to create native image for %s", dllPath.c_str());
+ return NI_ERROR_NO_SUCH_FILE;
+ }
+ copySmackAndOwnership(dllPath, niPath);
+ // if AppNI then move ni.dll file to .native_image and copy pdb to .native_image
+ if (opt->flags & NI_FLAGS_APPNI) {
+ std::string appNIPath = getAppNIFilePath(dllPath, opt);
+ moveFile(niPath, appNIPath);
+ makePdbSymlinkForNI(dllPath, niPath);
+ _SOUT("Native image %s generated successfully.", appNIPath.c_str());
+ } else {
+ _SOUT("Native image %s generated successfully.", niPath.c_str());
+ }
+ return NI_ERROR_NONE;
+}
+
+static ni_error_e crossgen2PipeLine(const std::vector<std::string>& dllList, const std::vector<std::string>& refPaths, NIOption* opt)
+{
+ // fork crossgen2
pid_t pid = fork();
if (pid == -1)
return NI_ERROR_UNKNOWN;
int status;
waitpid(pid, &status, 0);
if (WIFEXITED(status)) {
- // Do not use niExist() function to check whether ni file created or not.
- // niEixst() return false for System.Private.Corelib.dll
- if (isFileExist(absNiPath)) {
- copySmackAndOwnership(absDllPath, absNiPath);
- std::string absPdbPath = replaceAll(absDllPath, ".dll", ".pdb");
- std::string pdbFilePath = replaceAll(absNiPath, ".ni.dll", ".pdb");
- if (isFileExist(absPdbPath) && (absPdbPath != pdbFilePath)) {
- if (!copyFile(absPdbPath, pdbFilePath)) {
- fprintf(stderr, "Failed to copy a .pdb file\n");
- }
+ for (auto& dllPath: dllList) {
+ ni_error_e ret = crossgen2PostAction(dllPath, changeExtension(dllPath, ".dll", ".ni.dll"), opt);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
}
-#ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
- if (baseAddr != 0) {
- updateBaseAddrFile(absNiPath, baseAddr);
- }
-#endif
- return NI_ERROR_NONE;
- } else {
- fprintf(stderr, "Fail to create native image for %s\n", dllPath.c_str());
- return NI_ERROR_NO_SUCH_FILE;
}
+ } else {
+ _SERR("Failed. Forked process terminated abnormally");
+ return NI_ERROR_ABNORMAL_PROCESS_TERMINATION;
}
} else {
- std::string jitPath = getRuntimeDir() + "/libclrjit.so";
- std::vector<const char*> argv = {
- __CROSSGEN_PATH,
- "/nologo",
- "/JITPath", jitPath.c_str()
- };
+ std::vector<const char*> argv;
+ makeArgs(argv, refPaths, opt);
- bool compat = flags & NI_FLAGS_COMPATIBILITY;
- argv.push_back(compat ? "/Trusted_Platform_Assemblies" : "/r");
- argv.push_back(__tpa.c_str());
+ // add input files at the end of parameter
+ for (const auto &input : dllList) {
+ argv.push_back(input.c_str());
+ _SOUT("+ %s", input.c_str());
+ }
+
+ // end param
+ argv.push_back(nullptr);
- bool enableR2R = flags & NI_FLAGS_ENABLER2R;
- if (!enableR2R) {
- argv.push_back("/FragileNonVersionable");
+ // print cmd
+ if (opt->flags & NI_FLAGS_PRINT_CMD) {
+ _SOUT("==================== NI Commands =========================");
+ for (auto &arg: argv) _SOUT("+ %s", arg);
}
- if (flags & NI_FLAGS_VERBOSE) {
- argv.push_back("/verbose");
+ execv(CORERUN_CMD.c_str(), const_cast<char* const*>(argv.data()));
+
+ clearArgs(argv);
+ exit(0);
+ }
+
+ return NI_ERROR_NONE;
+}
+
+static ni_error_e crossgen2NoPipeLine(const std::vector<std::string>& dllList, const std::vector<std::string>& refPaths, NIOption* opt)
+{
+ for (auto& dllPath : dllList) {
+ std::string niPath;
+ if (opt->flags & NI_FLAGS_APPNI) {
+ niPath = getAppNIFilePath(dllPath, opt);
+ } else {
+ niPath = getNIFilePath(dllPath);
}
- if (flags & NI_FLAGS_INSTRUMENT) {
- argv.push_back("/Tuning");
+ // fork crossgen2
+ pid_t pid = fork();
+ if (pid == -1)
+ return NI_ERROR_UNKNOWN;
+
+ if (pid > 0) {
+ int status;
+ waitpid(pid, &status, 0);
+ if (WIFEXITED(status)) {
+ ni_error_e ret = crossgen2PostAction(dllPath, niPath, opt);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
+ }
+ } else {
+ _SERR("Failed. Forked process terminated abnormally");
+ _SERR("Crossgen2 was terminated by the OOM killer. Please check the system.");
+ removeFile(changeExtension(niPath, ".ni.dll", ".ni.dll.tmp"));
+ return NI_ERROR_ABNORMAL_PROCESS_TERMINATION;
+ }
+ } else {
+ std::vector<const char*> argv;
+ makeArgs(argv, refPaths, opt);
+
+ argv.push_back("-o");
+ argv.push_back(niPath.c_str());
+
+ argv.push_back(dllPath.c_str());
+ _SOUT("+ %s", dllPath.c_str());
+
+ // end param
+ argv.push_back(nullptr);
+
+ // print cmd
+ if (opt->flags & NI_FLAGS_PRINT_CMD) {
+ _SOUT("==================== NI Commands =========================");
+ for (auto &arg: argv) _SOUT("+ %s", arg);
+ }
+
+ execv(CORERUN_CMD.c_str(), const_cast<char* const*>(argv.data()));
+
+ clearArgs(argv);
+ exit(0);
}
-#ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
- if (baseAddr != 0) {
- argv.push_back("/BaseAddress");
- argv.push_back(std::to_string(baseAddr).c_str());
+ waitInterval();
+ }
+
+ return NI_ERROR_NONE;
+}
+
+static ni_error_e createCoreLibNI(NIOption* opt)
+{
+ std::string coreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll");
+ std::string niCoreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.ni.dll");
+ std::string coreLibBackup = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll.Backup");
+
+ std::vector<std::string> dllList;
+ std::vector<std::string> refPaths;
+ dllList.push_back(getAbsolutePath(coreLib));
+
+ if (!isFile(coreLibBackup) && !isR2RImage(coreLib)) {
+ if (crossgen2NoPipeLine(dllList, refPaths, opt) == NI_ERROR_NONE && exist(niCoreLib)) {
+ if (rename(coreLib.c_str(), coreLibBackup.c_str())) {
+ _SERR("Failed to rename System.Private.CoreLib.dll");
+ return NI_ERROR_CORE_NI_FILE;
+ }
+ if (rename(niCoreLib.c_str(), coreLib.c_str())) {
+ _SERR("Failed to rename System.Private.CoreLib.ni.dll");
+ return NI_ERROR_CORE_NI_FILE;
+ }
+ } else {
+ _SERR("Failed to create native image for %s", coreLib.c_str());
+ return NI_ERROR_CORE_NI_FILE;
}
-#endif
+ }
+ return NI_ERROR_NONE;
+}
- argv.push_back("/App_Paths");
- std::string absAppPath;
- if (!appPath.empty()) {
- absAppPath = appPath;
+static ni_error_e doAOTList(std::vector<std::string>& dllList, const std::string& refPaths, NIOption* opt)
+{
+ ni_error_e ret = NI_ERROR_NONE;
+
+ if (dllList.empty()) {
+ return NI_ERROR_INVALID_PARAMETER;
+ }
+ // When performing AOT for one Dll, an error is returned when an error occurs.
+ // However, when processing multiple dlls at once, only the log for errors is output and skipped.
+
+ std::string coreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll");
+ bool hasSPC = false;
+
+ std::vector<std::string> niList;
+ for (auto it = dllList.begin(); it != dllList.end(); it++) {
+ std::string f = *it;
+ if (!isFile(f)) {
+ _SERR("dll file is not exist : %s", f.c_str());
+ dllList.erase(it--);
+ }
+ if (!isManagedAssembly(f)) {
+ _SERR("Input file is not a dll file : %s", f.c_str());
+ dllList.erase(it--);
+ }
+ // handle System.Private.CoreLib.dll separately.
+ // dllList and path manager contain absolute path. So, there is no need to change path to absolute path
+ if (f == coreLib) {
+ hasSPC = true;
+ dllList.erase(it--);
} else {
- absAppPath = baseName(absDllPath);
+ niList.push_back(changeExtension(f, ".dll", ".ni.dll"));
}
- argv.push_back(absAppPath.c_str());
+ }
- argv.push_back("/out");
- argv.push_back(absNiPath.c_str());
+ // In the case of SPC, post-processing is required to change the name of the native image.
+ // In order to avoid repeatedly checking whether the generated native image is an SPC,
+ // the SPC native image generation is performed separately.
+ if (hasSPC) {
+ ret = createCoreLibNI(opt);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
+ }
+ }
- argv.push_back(absDllPath.c_str());
- argv.push_back(nullptr);
+ // if there is no proper input after processing dll list
+ if (dllList.empty()) {
+ if (hasSPC) {
+ return ret;
+ } else {
+ return NI_ERROR_INVALID_PARAMETER;
+ }
+ }
- fprintf(stderr, "+ %s (%s)\n", absDllPath.c_str(), enableR2R ? "R2R" : "FNV");
+ std::vector<std::string> paths;
+ splitPath(refPaths, paths);
- execv(__CROSSGEN_PATH, const_cast<char* const*>(argv.data()));
- exit(0);
+ if (opt->flags & NI_FLAGS_NO_PIPELINE) {
+ ret = crossgen2NoPipeLine(dllList, paths, opt);
+ } else {
+ // When the forked process in the pipeline state is terminated(WIFSIGNALED(status)),
+ // retry the generation of the native image
+ // if the number of .dll files and the number of .ni.dll files are different.
+ for (int callCnt = 0; callCnt < 2; callCnt++) {
+ // If an error occurs, perform it twice with the same option.
+ ret = crossgen2PipeLine(dllList, paths, opt);
+ if (ret != NI_ERROR_NONE) {
+ _SERR("Crossgen2 is abnormally terminated. Regenerate native images that failed while running crossgen2.");
+ dllList.clear();
+ for (auto it = niList.begin(); it != niList.end(); it++) {
+ std::string niPath = *it;
+ std::string dllPath = changeExtension(niPath, ".ni.dll", ".dll");
+ if (crossgen2PostAction(dllPath, niPath, opt) != NI_ERROR_NONE) {
+ dllList.push_back(dllPath);
+ } else {
+ niList.erase(it--);
+ }
+ }
+ } else {
+ break;
+ }
+ }
+ // If an error occurs after two crossgen2PipeLine() attempts,
+ // try crossgen2NoPipeLine() for the last time.
+ if (ret != NI_ERROR_NONE) {
+ _SERR("Retry running crossgen2 with --no-pipeline mode to avoid termination by OOM.");
+ ret = crossgen2NoPipeLine(dllList, paths, opt);
+ }
}
- return NI_ERROR_NONE;
+ return ret;
+}
+
+static ni_error_e doAOTFile(const std::string& dllFile, const std::string& refPaths, NIOption* opt)
+{
+ if (!isFile(dllFile)) {
+ _SERR("dll file is not exist : %s", dllFile.c_str());
+ return NI_ERROR_NO_SUCH_FILE;
+ }
+
+ if (!isManagedAssembly(dllFile)) {
+ _SERR("Failed. Input parameter is not managed dll (%s)\n", dllFile.c_str());
+ return NI_ERROR_INVALID_PARAMETER;
+ }
+
+ if (checkNIExistence(dllFile)) {
+ _SERR("Native image file is already exist : %s", dllFile.c_str());
+ return NI_ERROR_ALREADY_EXIST;
+ }
+
+ std::vector<std::string> dllList;
+ dllList.push_back(getAbsolutePath(dllFile));
+ return doAOTList(dllList, refPaths, opt);
}
// callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
{
char *pkgId = NULL;
int ret = 0;
- DWORD *pFlags = (DWORD*)userData;
+ NIOption **pOptions = (NIOption**)userData;
ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get pkgid\n");
- return -1;
- }
-
- if (removeNiUnderPkgRoot(pkgId) != NI_ERROR_NONE) {
- fprintf(stderr, "Failed to remove previous dlls from [%s]\n", pkgId);
+ _SERR("Failed to get pkgid");
return -1;
}
- if (resetTACPackage(pkgId) != TAC_ERROR_NONE) {
- fprintf(stderr, "Failed to remove symlink for given package [%s]\n", pkgId);
+ if (removeNIUnderPkgRoot(pkgId) != NI_ERROR_NONE) {
+ _SERR("Failed to remove previous dlls from [%s]", pkgId);
return -1;
}
- // Regenerate ni files with R2R mode forcibiliy. (there is no way to now which option is used)
- if (createNiUnderPkgRoot(pkgId, *pFlags) != NI_ERROR_NONE) {
- fprintf(stderr, "Failed to generate NI file [%s]\n", pkgId);
+ if (createNIUnderPkgRoot(pkgId, *pOptions) != NI_ERROR_NONE) {
+ _SERR("Failed to generate NI file [%s]", pkgId);
return -1;
} else {
- fprintf(stderr, "Complete make application to native image\n");
- }
-
- if (createTACPkgRoot(pkgId, *pFlags) != NI_ERROR_NONE) {
- fprintf(stderr, "Failed to generate symbolic link file [%s]\n", pkgId);
- return -1;
- }else {
- fprintf(stderr, "Complete make symbolic link file to tac\n");
+ _SOUT("Complete make application to native image");
}
return 0;
}
-static void createCoreLibNI(DWORD flags)
+ni_error_e initNICommon()
{
- std::string coreLib = concatPath(getRuntimeDir(), "System.Private.CoreLib.dll");
- std::string niCoreLib = concatPath(getRuntimeDir(), "System.Private.CoreLib.ni.dll");
- std::string coreLibBackup = concatPath(getRuntimeDir(), "System.Private.CoreLib.dll.Backup");
-
- if (!isFileExist(coreLibBackup)) {
-
- if (!crossgen(coreLib, std::string(), flags)) {
- if (rename(coreLib.c_str(), coreLibBackup.c_str())) {
- fprintf(stderr, "Failed to rename System.Private.CoreLib.dll\n");
- }
- if (rename(niCoreLib.c_str(), coreLib.c_str())) {
- fprintf(stderr, "Failed to rename System.Private.CoreLib.ni.dll\n");
- }
- } else {
- fprintf(stderr, "Failed to create native image for %s\n", coreLib.c_str());
- }
+#if defined(__arm__) || defined(__aarch64__)
+
+ char *env = nullptr;
+ env = getenv("MIC_CROSSGEN2_ENABLED");
+ if (env != nullptr && !strcmp(env, "1")) {
+ CORERUN_CMD = std::string("/opt/usr/dotnet/mic/crossgen2");
+ CROSSGEN2_PATH = "";
+ CLRJIT_PATH = std::string("/opt/usr/dotnet/mic/libclrjit_unix_") + ARCHITECTURE_IDENTIFIER + std::string("_x64.so");
}
-}
-ni_error_e initNICommon(NiCommonOption* option)
-{
-#if defined(__arm__)
// get interval value
const static std::string intervalFile = concatPath(__NATIVE_LIB_DIR, "crossgen_interval.txt");
std::ifstream inFile(intervalFile);
if (inFile) {
- fprintf(stderr, "crossgen_interval.txt is found\n");
+ _SOUT("crossgen_interval.txt is found");
inFile >> __interval;
}
if (initializePluginManager("normal")) {
- fprintf(stderr, "Fail to initialize PluginManager\n");
+ _SERR("Fail to initialize PluginManager");
return NI_ERROR_UNKNOWN;
}
- if (initializePathManager(option->runtimeDir, option->tizenFXDir, option->extraDirs)) {
- fprintf(stderr, "Fail to initialize PathManager\n");
+
+ try {
+ __pm = new PathManager();
+ } catch (const std::exception& e) {
+ _SERR("Failed to create PathManager");
return NI_ERROR_UNKNOWN;
}
- __tpa = getTPA();
+ char* pluginDllPaths = pluginGetDllPath();
+ if (pluginDllPaths && pluginDllPaths[0] != '\0') {
+ __pm->addPlatformAssembliesPaths(pluginDllPaths, true);
+ }
+
+ char* pluginNativePaths = pluginGetNativeDllSearchingPath();
+ if (pluginNativePaths && pluginNativePaths[0] != '\0') {
+ __pm->addNativeDllSearchingPaths(pluginNativePaths, true);
+ }
return NI_ERROR_NONE;
#else
- fprintf(stderr, "crossgen supports arm architecture only. skip ni file generation\n");
+ _SERR("crossgen supports arm/arm64 architecture only. skip ni file generation");
return NI_ERROR_NOT_SUPPORTED;
#endif
}
__interval = 0;
finalizePluginManager();
- finalizePathManager();
-
- __tpa.clear();
-}
+ delete(__pm);
+ __pm = nullptr;
-void createNiPlatform(DWORD flags)
-{
- const std::string platformDirs[] = {getRuntimeDir(), getTizenFXDir()};
- createNiUnderDirs(platformDirs, 2, flags);
+ if (__ni_option) {
+ free(__ni_option);
+ __ni_option = nullptr;
+ }
}
-ni_error_e createNiDll(const std::string& dllPath, DWORD flags)
+ni_error_e createNIPlatform(NIOption* opt)
{
- createCoreLibNI(flags);
- // System.Private.CoreLib.dll is generated in the createCoreLibNI function.
- // Skip if input dll is System.Private.CoreLib.dll
- if (dllPath.find("System.Private.CoreLib.dll") != std::string::npos) {
- return NI_ERROR_NONE;
+ ni_error_e ret = createNIUnderDirs(__pm->getRuntimePath(), opt);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
}
- return crossgen(dllPath, std::string(), flags);
+ return createNIUnderDirs(__pm->getTizenFXPath(), opt);
}
-void createNiUnderTAC(std::vector<std::string> nugets, DWORD flags)
+ni_error_e createNIDll(const std::string& dllPath, NIOption* opt)
{
- std::string appPaths;
- for (auto& nuget : nugets) {
- appPaths += concatPath(__TAC_DIR, nuget);
- appPaths += ':';
- }
- if (appPaths.back() == ':') {
- appPaths.pop_back();
+ return doAOTFile(dllPath, std::string(), opt);
+}
+
+ni_error_e createNIUnderTAC(const std::string& targetPath, const std::string& refPaths, NIOption* opt)
+{
+ ni_error_e ret;
+
+ // get managed file list from targetPath
+ std::vector<std::string> dllList;
+ ret = getTargetDllList(targetPath, dllList);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
}
- auto convert = [&appPaths, flags](const std::string& path, const char* name) {
- if (strstr(path.c_str(), TAC_SHA_256_INFO) != NULL)
- return;
- if (!crossgen(path, appPaths.c_str(), flags)) {
- waitInterval();
+ std::vector<std::string> needNIList;
+ std::vector<std::string> niList;
+
+ for (auto &dll : dllList) {
+ if (!checkNIExistence(dll)) {
+ needNIList.push_back(dll);
}
- };
- for (auto& nuget : nugets) {
- scanFilesInDir(concatPath(__TAC_DIR, nuget), convert, -1);
+ niList.push_back(getNIFilePath(dll));
}
-}
-ni_error_e createTACPkgRoot(const std::string& pkgId, DWORD flags)
-{
- std::string pkgRoot;
- if (getRootPath(pkgId, pkgRoot) < 0) {
- return NI_ERROR_INVALID_PACKAGE;
+ if (!needNIList.empty()) {
+ // NI fils of TAC-related dlls under /opt/usr/dotnet should not be created under .native_image directory.
+ // So, unset NI_FLAGS_APPNI temporally and restore it after running AOT.
+ opt->flags &= ~NI_FLAGS_APPNI;
+ ret = doAOTList(needNIList, refPaths, opt);
+ opt->flags |= NI_FLAGS_APPNI;
+ if (ret != NI_ERROR_NONE) {
+ return ret;
+ }
}
- std::string binDir = concatPath(pkgRoot, "bin");
- std::string libDir = concatPath(pkgRoot, "lib");
- std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
- std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
- std::string paths = binDir + ":" + libDir + ":" + tacDir;
- if (bf::exists(tacDir)) {
- try {
- for (auto& symlinkAssembly : bf::recursive_directory_iterator(tacDir)) {
- std::string symPath = symlinkAssembly.path().string();
- if (bf::is_symlink(symPath)) {
- if (!isNativeImage(symPath)) {
- std::string originPath = bf::read_symlink(symPath).string();
- std::string originNiPath = originPath.substr(0, originPath.rfind(".dll")) + ".ni.dll";
- if (!bf::exists(originNiPath)) {
- flags |= NI_FLAGS_APPNI;
- if(crossgen(originPath, paths, flags) != NI_ERROR_NONE) {
- fprintf(stderr, "Failed to create NI file [%s]\n", originPath.c_str());
- return NI_ERROR_UNKNOWN;
- }
- }
- std::string symNIPath = symPath.substr(0, symPath.rfind(".dll")) + ".ni.dll";
- if (!bf::exists(symNIPath)) {
- bf::create_symlink(originNiPath, symNIPath);
- fprintf(stderr, "%s symbolic link file generated successfully.\n", symNIPath.c_str());
- copySmackAndOwnership(tacDir.c_str(), symNIPath.c_str(), true);
-
- std::string niFileName = symNIPath.substr(symNIPath.rfind('/') + 1);
- if (!removeFile(concatPath(binNIDir, niFileName))) {
- fprintf(stderr, "Failed to remove of %s\n", concatPath(binNIDir, niFileName).c_str());
- }
- }
- }
- }
+ for (auto &niPath : niList) {
+ if (exist(niPath)) {
+ std::string symNIPath = concatPath(targetPath, getFileName(niPath));
+ if (!exist(symNIPath)) {
+ bf::create_symlink(niPath, symNIPath);
+ copySmackAndOwnership(targetPath.c_str(), symNIPath.c_str(), true);
+ _SOUT("%s symbolic link file generated successfully.", symNIPath.c_str());
+ _INFO("%s symbolic link file generated successfully.", symNIPath.c_str());
}
- } catch (const bf::filesystem_error& error) {
- fprintf(stderr, "Failed to recursive directory: %s\n", error.what());
- return NI_ERROR_UNKNOWN;
}
}
+
return NI_ERROR_NONE;
}
-void createNiUnderDirs(const std::string rootPaths[], int count, DWORD flags)
-{
- createCoreLibNI(flags);
- std::string appPaths;
- for (int i = 0; i < count; i++) {
- appPaths += rootPaths[i];
- appPaths += ':';
- }
+ni_error_e createNIUnderDirs(const std::string& rootPaths, NIOption* opt)
+{
+ ni_error_e ret = NI_ERROR_NONE;
- if (appPaths.back() == ':')
- appPaths.pop_back();
+ std::vector<std::string> fileList;
+ std::vector<std::string> paths;
+ splitPath(rootPaths, paths);
- std::vector<std::string> tpaAssemblies;
- splitPath(__tpa, tpaAssemblies);
+ for (const auto &path : paths) {
+ if (!exist(path)) {
+ continue;
+ }
- auto convert = [&appPaths, flags, tpaAssemblies](const std::string& path, const char* name) {
- bool isAppNI = flags & NI_FLAGS_APPNI;
- if (isAppNI) {
- for (auto& tpa : tpaAssemblies) {
- if (!strcmp(replaceAll(tpa.substr(tpa.rfind('/') + 1), ".ni.dll", ".dll").c_str(), name)) {
- fprintf(stderr, "%s present in the TPA list skips generation of NI file.\n", name);
- return;
- }
+ if (path.find(TAC_SYMLINK_SUB_DIR) != std::string::npos) {
+ ret = createNIUnderTAC(path, rootPaths, opt);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
+ }
+ } else if (opt->flags & NI_FLAGS_APPNI) {
+ ret = getAppTargetDllList(path, fileList, opt);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
+ }
+ } else {
+ ret = getTargetDllList(path, fileList);
+ if (ret != NI_ERROR_NONE) {
+ return ret;
}
}
- if (!crossgen(path, appPaths.c_str(), flags)) {
- waitInterval();
- }
- };
+ }
- for (int i = 0; i < count; i++) {
- scanFilesInDir(rootPaths[i], convert, 1);
+ if (fileList.empty()) {
+ return NI_ERROR_NONE;
}
- tpaAssemblies.clear();
+ return doAOTList(fileList, rootPaths, opt);
}
-ni_error_e createNiUnderPkgRoot(const std::string& pkgId, DWORD flags)
+ni_error_e createNIUnderPkgRoot(const std::string& pkgId, NIOption* opt)
{
- std::string pkgRoot;
- if (getRootPath(pkgId, pkgRoot) < 0) {
- return NI_ERROR_INVALID_PACKAGE;
+ if (!isR2RImage(concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll"))) {
+ _SERR("The native image of System.Private.CoreLib does not exist.\n"
+ "Run the command to create the native image\n"
+ "# dotnettool --ni-dll /usr/share/dotnet.tizen/netcoreapp/System.Private.CoreLib.dll");
+ return NI_ERROR_CORE_NI_FILE;
}
- std::string binDir = concatPath(pkgRoot, "bin");
- std::string libDir = concatPath(pkgRoot, "lib");
- std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
- std::string paths[] = {binDir, libDir, tacDir};
+ std::string rootPath = getRootPath(pkgId);
+ if (rootPath.empty()) {
+ _SERR("Failed to get root path from [%s]", pkgId.c_str());
+ return NI_ERROR_INVALID_PACKAGE;
+ }
- flags |= NI_FLAGS_APPNI;
- createNiUnderDirs(paths, 3, flags);
+ __pm->setAppRootPath(rootPath);
- return NI_ERROR_NONE;
-}
-
-ni_error_e createNiDllUnderPkgRoot(const std::string& pkgId, const std::string& dllPath, DWORD flags)
-{
- std::string pkgRoot;
- if (getRootPath(pkgId, pkgRoot) < 0) {
- return NI_ERROR_INVALID_PACKAGE;
+ char* extraDllPaths = pluginGetExtraDllPath();
+ if (extraDllPaths && extraDllPaths[0] != '\0') {
+ __pm->setExtraDllPaths(extraDllPaths);
}
- std::string binDir = concatPath(pkgRoot, "bin");
- std::string libDir = concatPath(pkgRoot, "lib");
- std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
- std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
- std::string paths = binDir + ":" + libDir + ":" + tacDir;
-
- if (bf::is_symlink(dllPath)) {
- if (bf::exists(tacDir)) {
- if (!isNativeImage(dllPath)) {
- std::string originPath = bf::read_symlink(dllPath).string();
- std::string originNiPath = originPath.substr(0, originPath.rfind(".dll")) + ".ni.dll";
- if (!bf::exists(originNiPath)) {
- flags |= NI_FLAGS_APPNI;
- if(crossgen(originPath, paths, flags) != NI_ERROR_NONE) {
- fprintf(stderr, "Failed to create NI file [%s]\n", originPath.c_str());
- return NI_ERROR_UNKNOWN;
- }
- }
- std::string setNiPath = dllPath.substr(0, dllPath.rfind(".dll")) + ".ni.dll";
- if (!bf::exists(setNiPath)) {
- bf::create_symlink(originNiPath, setNiPath);
- fprintf(stderr, "%s symbolic link file generated successfully.\n", setNiPath.c_str());
- copySmackAndOwnership(tacDir.c_str(), setNiPath.c_str(), true);
- }
- std::string niFileName = setNiPath.substr(setNiPath.rfind('/') + 1);
- if (!removeFile(concatPath(binNIDir, niFileName))) {
- fprintf(stderr, "Failed to remove of %s\n", concatPath(binNIDir, niFileName).c_str());
- }
- }
- }
- return NI_ERROR_NONE;
+ opt->flags |= NI_FLAGS_APPNI;
+
+ if (isReadOnlyArea(rootPath)) {
+ opt->flags |= NI_FLAGS_APP_UNDER_RO_AREA;
+ opt->flags |= NI_FLAGS_NO_PIPELINE;
+ _SERR("Only no-pipeline mode supported for RO app. Set no-pipeline option forcibly");
} else {
- std::string assembly = dllPath.substr(dllPath.rfind('/') + 1);
- std::vector<std::string> tpaAssemblies;
- splitPath(__tpa, tpaAssemblies);
- for (auto& tpa : tpaAssemblies) {
- if (!strcmp(replaceAll(tpa.substr(tpa.rfind('/') + 1), ".ni.dll", ".dll").c_str(), assembly.c_str())) {
- fprintf(stderr, "%s present in the TPA list skips generation of NI file.\n", assembly.c_str());
- return NI_ERROR_NONE;
- }
- }
- tpaAssemblies.clear();
- flags |= NI_FLAGS_APPNI;
- return crossgen(dllPath, paths, flags);
+ opt->flags &= ~NI_FLAGS_APP_UNDER_RO_AREA;
}
+
+ // create native image under bin and lib directory
+ // tac directory is skipped in the createNIUnderDirs.
+ return createNIUnderDirs(__pm->getAppPaths(), opt);
}
-void removeNiPlatform()
+void removeNIPlatform()
{
- std::string coreLib = concatPath(getRuntimeDir(), "System.Private.CoreLib.dll");
- std::string coreLibBackup = concatPath(getRuntimeDir(), "System.Private.CoreLib.dll.Backup");
+ std::string coreLib = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll");
+ std::string coreLibBackup = concatPath(__pm->getRuntimePath(), "System.Private.CoreLib.dll.Backup");
+
+ if (isR2RImage(coreLib)) {
+ if (!isFile(coreLibBackup)) {
+ return;
+ }
- if (!isFileExist(coreLibBackup)) {
- return;
+ if (remove(coreLib.c_str())) {
+ _SERR("Failed to remove System.Private.CoreLib native image file");
+ }
+ if (rename(coreLibBackup.c_str(), coreLib.c_str())) {
+ _SERR("Failed to rename System.Private.CoreLib.Backup to origin");
+ }
}
#ifdef UNIQUE_DEFAULT_BASE_ADDR_SUPPORT
- if (isFileExist(__SYSTEM_BASE_FILE)) {
+ if (isFile(__SYSTEM_BASE_FILE)) {
if (remove(__SYSTEM_BASE_FILE)) {
- fprintf(stderr, "Failed to remove %s\n", __SYSTEM_BASE_FILE);
+ _SERR("Failed to remove %s", __SYSTEM_BASE_FILE);
}
}
#endif
- if (remove(coreLib.c_str())) {
- fprintf(stderr, "Failed to remove System.Private.CoreLib native image file\n");
- }
-
- if (rename(coreLibBackup.c_str(), coreLib.c_str())) {
- fprintf(stderr, "Failed to rename System.Private.CoreLib.Backup to origin\n");
- }
-
- const std::string platformDirs[] = {getRuntimeDir(), getTizenFXDir()};
-
- removeNiUnderDirs(platformDirs, 2);
+ removeNIUnderDirs(__pm->getRuntimePath() + ":" + __pm->getTizenFXPath());
}
-void removeNiUnderDirs(const std::string rootPaths[], int count)
+void removeNIUnderDirs(const std::string& rootPaths)
{
- auto convert = [](const std::string& path, std::string name) {
+ auto convert = [](const std::string& path, const std::string& filename) {
if (isNativeImage(path)) {
if (remove(path.c_str())) {
- fprintf(stderr, "Failed to remove %s\n", path.c_str());
+ _SERR("Failed to remove %s", path.c_str());
}
}
};
- for (int i = 0; i < count; i++) {
- scanFilesInDir(rootPaths[i], convert, -1);
+ std::vector<std::string> paths;
+ splitPath(rootPaths, paths);
+ for (const auto &path : paths) {
+ scanFilesInDirectory(path, convert, -1);
}
}
-ni_error_e removeNiUnderPkgRoot(const std::string& pkgId)
+ni_error_e removeNIUnderPkgRoot(const std::string& pkgId)
{
- std::string pkgRoot;
- if (getRootPath(pkgId, pkgRoot) < 0) {
+ std::string rootPath = getRootPath(pkgId);
+ if (rootPath.empty()) {
+ _SERR("Failed to get root path from [%s]", pkgId.c_str());
return NI_ERROR_INVALID_PACKAGE;
}
- std::string binDir = concatPath(pkgRoot, "bin");
- std::string libDir = concatPath(pkgRoot, "lib");
- std::string paths[] = {binDir, libDir};
-
- removeNiUnderDirs(paths, 2);
-
- std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
- if (isFileExist(binNIDir)) {
- if (!removeAll(binNIDir.c_str())) {
- fprintf(stderr, "Failed to remove app ni dir [%s]\n", binNIDir.c_str());
+ __pm->setAppRootPath(rootPath);
+
+ // getAppNIPaths returns bin/.native_image, lib/.native_image and .tac_symlink.
+ std::string appNIPaths = __pm->getAppNIPaths();
+ std::vector<std::string> paths;
+ splitPath(appNIPaths, paths);
+ for (const auto &path : paths) {
+ if (!isReadOnlyArea(path)) {
+ // Only the native image inside the TAC should be removed.
+ if (strstr(path.c_str(), TAC_SYMLINK_SUB_DIR) != NULL) {
+ removeNIUnderDirs(path);
+ } else {
+ if (isDirectory(path)) {
+ if (!removeAll(path.c_str())) {
+ _SERR("Failed to remove app ni dir [%s]", path.c_str());
+ }
+ }
+ }
}
}
- std::string libNIDir = concatPath(libDir, APP_NI_SUB_DIR);
- if (isFileExist(libNIDir)) {
- if (!removeAll(libNIDir.c_str())) {
- fprintf(stderr, "Failed to remove app ni dir [%s]\n", libNIDir.c_str());
+ // In special cases, the ni file may exist in the dll location.
+ // The code below is to avoid this exceptional case.
+ std::string appPaths = __pm->getAppPaths();
+ splitPath(appPaths, paths);
+ for (const auto &path : paths) {
+ if (isDirectory(path)) {
+ removeNIUnderDirs(path);
}
}
return NI_ERROR_NONE;
}
-ni_error_e regenerateAppNI(DWORD flags)
+ni_error_e regenerateAppNI(NIOption* opt)
{
int ret = 0;
pkgmgrinfo_appinfo_metadata_filter_h handle;
return NI_ERROR_UNKNOWN;
}
- ret = pkgmgrinfo_appinfo_metadata_filter_foreach(handle, appAotCb, &flags);
- if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed pkgmgrinfo_appinfo_metadata_filter_foreach\n");
+ ret = pkgmgrMDFilterForeach(handle, appAotCb, &opt);
+ if (ret != 0) {
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return NI_ERROR_UNKNOWN;
}
- fprintf(stderr, "Success pkgmgrinfo_appinfo_metadata_filter_foreach\n");
-
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return NI_ERROR_NONE;
}
static int regenTacCb(pkgmgrinfo_appinfo_h handle, void *userData)
{
char *pkgId = NULL;
- DWORD *pFlags = (DWORD*)userData;
+ NIOption **pOpt = (NIOption**)userData;
int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
- if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get pkgid\n");
+ if (ret != PMINFO_R_OK || pkgId == NULL) {
+ _SERR("Failed to get pkgid");
return -1;
}
- sqlite3 *tac_db = dbOpen(TAC_APP_LIST_DB);
+ sqlite3 *tac_db = openDB(TAC_APP_LIST_DB);
if (!tac_db) {
- fprintf(stderr, "Sqlite open error\n");
+ _SERR("Sqlite open error");
return -1;
}
+ sqlite3_exec(tac_db, "BEGIN;", NULL, NULL, NULL);
char *sql = sqlite3_mprintf("SELECT * FROM TAC WHERE PKGID = %Q;", pkgId);
- std::vector<std::string> nugets = dbSelect(tac_db, TAC_APP_LIST_DB, sql);
+ std::vector<std::string> nugets = selectDB(tac_db, sql);
sqlite3_free(sql);
if (tac_db) {
- dbClose(tac_db);
+ closeDB(tac_db);
tac_db = NULL;
}
- createNiUnderTAC(nugets, *pFlags);
+ std::string nugetPaths;
+ for (const auto &nuget : nugets) {
+ if (!nugetPaths.empty()) {
+ nugetPaths += ":";
+ }
+ nugetPaths += concatPath(__DOTNET_DIR, nuget);
+ }
+
+ for (auto& nuget : nugets) {
+ createNIUnderTAC(concatPath(__DOTNET_DIR, nuget), nugetPaths, *pOpt);
+ }
return 0;
}
-ni_error_e regenerateTACNI(DWORD flags)
+ni_error_e regenerateTACNI(NIOption* opt)
{
- const std::string tacDir[] = {__TAC_DIR};
- removeNiUnderDirs(tacDir, 1);
+ removeNIUnderDirs(__DOTNET_DIR);
pkgmgrinfo_appinfo_metadata_filter_h handle;
int ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
return NI_ERROR_UNKNOWN;
}
- ret = pkgmgrinfo_appinfo_metadata_filter_foreach(handle, regenTacCb, &flags);
- if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed pkgmgrinfo_appinfo_metadata_filter_foreach\n");
+ ret = pkgmgrMDFilterForeach(handle, regenTacCb, &opt);
+ if (ret != 0) {
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return NI_ERROR_UNKNOWN;
}
- fprintf(stderr, "Success pkgmgrinfo_appinfo_metadata_filter_foreach\n");
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return NI_ERROR_NONE;
}
+
+static std::vector<uid_t> getUserIds()
+{
+ std::vector<uid_t> list;
+
+ while (true) {
+ errno = 0; // so we can distinguish errors from no more entries
+ passwd* entry = getpwent();
+ if (!entry) {
+ if (errno) {
+ _SERR("Error while getting userIDs");
+ list.clear();
+ return list;
+ }
+ break;
+ }
+ list.push_back(entry->pw_uid);
+ }
+ endpwent();
+
+ return list;
+}
+
+static std::string getAppDataPath(const std::string& pkgId, uid_t uid)
+{
+ std::string pDataFile;
+
+ tzplatform_set_user(uid);
+
+ const char* tzUserApp = tzplatform_getenv(TZ_USER_APP);
+ if (tzUserApp != NULL) {
+ pDataFile = std::string(tzUserApp) + "/" + pkgId + "/data/";
+ }
+
+ tzplatform_reset_user();
+
+ return pDataFile;
+}
+
+ni_error_e removeAppProfileData(const std::string& pkgId)
+{
+ if (pkgId.empty()) {
+ return NI_ERROR_INVALID_PARAMETER;
+ }
+
+ std::vector<uid_t> uidList = getUserIds();
+ for (auto& uid : uidList) {
+ // get data path from pkgid
+ std::string dataPath = getAppDataPath(pkgId, uid);
+ if (!dataPath.empty() && exist(dataPath)) {
+ std::string pDataFile = dataPath + PROFILE_BASENAME;
+
+ if (exist(pDataFile)) {
+ if (!removeFile(pDataFile)) {
+ _SERR("Fail to remove profile data file (%s).", pDataFile.c_str());
+ return NI_ERROR_UNKNOWN;
+ }
+ _SOUT("Profile data (%s) is removed successfully", pDataFile.c_str());
+ }
+ }
+ }
+
+ return NI_ERROR_NONE;
+}
+
+static int appTypeListCb(pkgmgrinfo_appinfo_h handle, void *user_data)
+{
+ char *pkgId = NULL;
+ int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
+ if (ret != PMINFO_R_OK || pkgId == NULL) {
+ _SERR("Fail to get pkgid");
+ return 0;
+ }
+
+ if (removeAppProfileData(pkgId) != NI_ERROR_NONE) {
+ _SERR("Fail to remove profile data for (%s)", pkgId);
+ }
+
+ return 0;
+}
+
+static ni_error_e removeAppProfileByAppType(const char* type)
+{
+ int ret;
+
+ pkgmgrinfo_appinfo_filter_h filter;
+
+ ret = pkgmgrinfo_appinfo_filter_create(&filter);
+ if (ret != PMINFO_R_OK) {
+ _SERR("Fail to create appinfo filter");
+ return NI_ERROR_UNKNOWN;
+ }
+
+ ret = pkgmgrinfo_appinfo_filter_add_string(filter, PMINFO_APPINFO_PROP_APP_TYPE, type);
+ if (ret != PMINFO_R_OK) {
+ pkgmgrinfo_appinfo_filter_destroy(filter);
+ _SERR("Fail to add appinfo filter (%s)", type);
+ return NI_ERROR_UNKNOWN;
+ }
+
+ ret = pkgmgrinfo_appinfo_filter_foreach_appinfo(filter, appTypeListCb, NULL);
+ if (ret != PMINFO_R_OK) {
+ _SERR("Fail to pkgmgrinfo_pkginfo_filter_foreach_pkginfo");
+ pkgmgrinfo_appinfo_filter_destroy(filter);
+ return NI_ERROR_UNKNOWN;
+ }
+
+ pkgmgrinfo_appinfo_filter_destroy(filter);
+
+ return NI_ERROR_NONE;
+}
+
+void removeAllAppProfileData()
+{
+ std::vector<const char*> appTypeList = {"dotnet", "dotnet-nui", "dotnet-inhouse"};
+
+ for (auto& type : appTypeList) {
+ if (removeAppProfileByAppType(type) != NI_ERROR_NONE) {
+ _SERR("Fail to removeAppProfileByAppType for type (%s)", type);
+ }
+ }
+}