docs: update BUILD.md

This commit is contained in:
Leonid Pliushch 2019-06-08 14:38:45 +03:00
parent 5479081abe
commit 6ca91e5ff5
1 changed files with 81 additions and 33 deletions

View File

@ -6,25 +6,34 @@ This document is intended to describe how to build a package.
### Basics
Package build flow is controlled by script [build-package.sh](../build-package.sh) and is split into the following stages:
Package build flow is controlled by script [build-package.sh](../build-package.sh)
and is split into the following stages:
1. Read `packages/$PKG/build.sh` to obtain package metadata (e.g. version, description, dependencies), URLs for source code and steps to build package.
1. Read `packages/$PKG/build.sh` to obtain package metadata (e.g. version,
description, dependencies), URLs for source code and steps to build package.
2. Extract the archives with source code into `$HOME/.termux-build/$PKG/src`. This step is not performed when `TERMUX_PKG_SKIP_SRC_EXTRACT` is set.
2. Extract the archives with source code into `$HOME/.termux-build/$PKG/src`.
This step is not performed when `TERMUX_PKG_SKIP_SRC_EXTRACT` is set.
3. Build package for the host. This step is performed only when `TERMUX_PKG_HOSTBUILD` is set.
3. Build package for the host. This step is performed only when
`TERMUX_PKG_HOSTBUILD` is set.
4. Set up a standalone Android NDK toolchain and patch NDK sysroot from patches located in [ndk-patches](../ndk-patches) directory. This step performed only one time per each architecture.
4. Set up a standalone Android NDK toolchain and patch NDK sysroot from patches
located in [ndk-patches](../ndk-patches) directory. This step performed only
one time per each architecture.
5. Search for patches in `packages/$TERMUX_PKG_NAME/*.patch` and apply them.
6. Build the package under directory `$HOME/.termux-build/$PKG/build`. If `TERMUX_PKG_BUILD_IN_SRC` is set, then build will be done in directory `$HOME/.termux-build/$PKG/src`.
6. Build the package under directory `$HOME/.termux-build/$PKG/build`. If
`TERMUX_PKG_BUILD_IN_SRC` is set, then build will be done in directory `$HOME/.termux-build/$PKG/src`.
7. Install built stuff into `$TERMUX_PREFIX`.
8. Find modified files in `$TERMUX_PREFIX` and extract them into `$HOME/.termux-build/$PKG/massage`.
8. Find modified files in `$TERMUX_PREFIX` and extract them into
`$HOME/.termux-build/$PKG/massage`.
9. Perform "massage" on files in `$HOME/.termux-build/$PKG/massage`. For example, split files between subpackages.
9. Perform "massage" on files in `$HOME/.termux-build/$PKG/massage`. For example,
split files between subpackages.
10. Create a debian archive file that is ready for distribution.
@ -74,15 +83,18 @@ Package build flow is controlled by script [build-package.sh](../build-package.s
Order specifies function sequence. 0 order specifies utility functions.
Suborder specifies a function triggered by the main function. Functions with different suborders are not executed simultaneously.
Suborder specifies a function triggered by the main function. Functions with
different suborders are not executed simultaneously.
For more detailed descriptiom on each step, you can read [build-package.sh](../build-package.sh)
## Normal Build Process
Remarks: Software Developers should provide build instructions either in README or INSTALL files. Otherwise good luck trying how to build :joy:.
Remarks: Software Developers should provide build instructions either in README
or INSTALL files. Otherwise good luck trying how to build :joy:.
Follow the instructions until you get a working build. If a build succeeds after any step, skip the remaining steps.
Follow the instructions until you get a working build. If a build succeeds after
any step, skip the remaining steps.
1. Create a `build.sh` file using the [sample package template](sample/build.sh).
@ -90,45 +102,66 @@ Follow the instructions until you get a working build. If a build succeeds after
3. Run `./build-package.sh $PKG` to see what errors are found.
4. If any steps complain about an error line, first copy the file to another directory.
4. If any steps complain about an error line, first copy the file to another
directory.
5. Edit the original file.
6. When tests succeed for the file, create a patch by `diff -u <original> <new> > packages/<pkg>/<filename>.patch`
6. When tests succeed for the file, create a patch by
`diff -u <original> <new> > packages/<pkg>/<filename>.patch`
7. Repeat steps 4-6 for each error file.
8. If extra configuration or make arguments are needed, specify in `build.sh` as shown in sample package.
8. If extra configuration or make arguments are needed, specify in `build.sh`
as shown in sample package.
9. (optional but appreciated) Test the package by yourself.
## Common Porting Problems
- Most programs expect that target is [FHS](https://uk.wikipedia.org/wiki/Filesystem_Hierarchy_Standard) compliant. They have hardcoded paths like `/etc`, `/bin`, `/usr/share`, `/tmp` which are not available in Termux at standard locations but only in `$TERMUX_PREFIX`.
- Most programs expect that target is [FHS](https://uk.wikipedia.org/wiki/Filesystem_Hierarchy_Standard)
compliant. They have hardcoded paths like `/etc`, `/bin`, `/usr/share`, `/tmp`
which are not available in Termux at standard locations but only in `$TERMUX_PREFIX`.
- The Android bionic libc does not have iconv and gettext/libintl functionality built in. A `libandroid-support` package contains these and may be used by all packages.
- The Android bionic libc does not have iconv and gettext/libintl functionality
built in. A `libandroid-support` package contains these and may be used by all
packages.
- "error: z: no archive symbol table (run ranlib)" usually means that the build machine's libz is used instead of the one for cross-compilation due to the builder library -L path being setup incorrectly.
- "error: z: no archive symbol table (run ranlib)" usually means that the build
machine's libz is used instead of the one for cross-compilation due to the
builder library -L path being setup incorrectly.
- rindex(3) does not exist, but strrchr(3) is preferred anyway.
- &lt;sys/termios.h&gt; does not exist, but &lt;termios.h&gt; is the standard location.
- &lt;sys/termios.h&gt; does not exist, but &lt;termios.h&gt; is the standard
location.
- &lt;sys/fcntl.h&gt; does not exist, but &lt;fcntl.h&gt; is the standard location.
- &lt;sys/fcntl.h&gt; does not exist, but &lt;fcntl.h&gt; is the standard
location.
- &lt;sys/timeb.h&gt; does not exist (removed in POSIX 2008), but ftime(3) can be replaced with gettimeofday(2).
- &lt;sys/timeb.h&gt; does not exist (removed in POSIX 2008), but ftime(3) can
be replaced with gettimeofday(2).
- &lt;glob.h&gt; does not exist, but is available through the `libandroid-glob` package.
- &lt;glob.h&gt; does not exist, but is available through the `libandroid-glob`
package.
- SYSV shared memory is not supported by the kernel. A `libandroid-shmem` package, which emulates SYSV shared memory on top of the [ashmem](http://elinux.org/Android_Kernel_Features#ashmem) shared memory system, is available. Use it with `LDFLAGS+=" -landroid-shmem`.
- SYSV shared memory is not supported by the kernel. A `libandroid-shmem`
package, which emulates SYSV shared memory on top of the [ashmem](http://elinux.org/Android_Kernel_Features#ashmem)
shared memory system, is available. Use it with `LDFLAGS+=" -landroid-shmem`.
- SYSV semaphores is not supported by the kernel. Use unnamed POSIX semaphores instead (named semaphores are unimplemented).
- SYSV semaphores are not supported by the kernel. Use unnamed POSIX semaphores
instead (named semaphores are unimplemented).
- Starting from Android 8, a [Seccomp](https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html) was enabled for applications. Seccomp forbids usage of some system calls which results in crash with `Bad system call` errors.
- Starting from Android 8, a [Seccomp](https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html)
was enabled for applications. Seccomp forbids usage of some system calls
which results in crash with `Bad system call` errors.
- Starting from Android 8, programs cannot use `tcsetattr()` with `TCSAFLUSH` parameter due to SELinux. Use `TCSANOW` instead.
- Starting from Android 8, programs cannot use `tcsetattr()` with `TCSAFLUSH`
parameter due to SELinux. Use `TCSANOW` instead.
- Starting from Android 9, [Seccomp](https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html) began to block `setuid()`-related system calls. Since Termux is primarily for single-user non-root usage, setuid/setgid functionality is discouraged anyway.
- Starting from Android 9, [Seccomp](https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html)
began to block `setuid()`-related system calls. Since Termux is primarily for
single-user non-root usage, setuid/setgid functionality is discouraged anyway.
### dlopen() and RTLD&#95;&#42; flags
@ -139,13 +172,15 @@ RTLD_NOW=2; RTLD_LAZY=1; RTLD_LOCAL=0; RTLD_GLOBAL=0x00100; RTLD_NOLOAD=4; // 64
```
These differs from glibc ones in that
1. They differ in value from glibc ones, so cannot be hardcoded in files (DLFCN.py in python does this)
1. They differ in value from glibc ones, so cannot be hardcoded in files
(DLFCN.py in python does this)
2. They are missing some values (`RTLD_BINDING_MASK`, ...)
### Android Dynamic Linker
The Android dynamic linker is located at `/system/bin/linker` (32-bit) or `/system/bin/linker64` (64-bit). Here are source links to different versions of the linker:
The Android dynamic linker is located at `/system/bin/linker` (32-bit) or
`/system/bin/linker64` (64-bit). Here are source links to different versions of the linker:
- [Android 5.0 linker](https://android.googlesource.com/platform/bionic/+/lollipop-mr1-release/linker/linker.cpp)
@ -155,16 +190,29 @@ The Android dynamic linker is located at `/system/bin/linker` (32-bit) or `/syst
Some notes about the linker:
- The linker warns about unused [dynamic section entries](https://docs.oracle.com/cd/E23824_01/html/819-0690/chapter6-42444.html) with a `WARNING: linker: $BINARY: unused DT entry: type ${VALUE_OF_d_tag}` message.
- The linker warns about unused [dynamic section entries](https://docs.oracle.com/cd/E23824_01/html/819-0690/chapter6-42444.html)
with a `WARNING: linker: $BINARY: unused DT entry: type ${VALUE_OF_d_tag}`
message.
- The supported types of dynamic section entries have increased over time.
- The Termux build system uses [termux-elf-cleaner](https://github.com/termux/termux-elf-cleaner) to strip away unused ELF entries causing the above mentioned linker warnings.
- The Termux build system uses [termux-elf-cleaner](https://github.com/termux/termux-elf-cleaner)
to strip away unused ELF entries causing the above mentioned linker warnings.
- Symbol versioning is supported only as of Android 6.0, so is stripped away.
- `DT_RPATH`, the list of directories where the linker should look for shared libraries is not supported, so is stripped away.
- `DT_RPATH`, the list of directories where the linker should look for shared
libraries is not supported, so is stripped away.
- `DT_RUNPATH`, the same as above but looked at after `LD_LIBRARY_PATH`, is supported only from Android 7.0, so is stripped away.
- `DT_RUNPATH`, the same as above but looked at after `LD_LIBRARY_PATH`, is
supported only from Android 7.0, so is stripped away.
- Symbol visibility when opening shared libraries using `dlopen()` works differently. On a normal linker, when an executable linking against a shared library libA dlopen():s another shared library libB, the symbols of libA are exposed to libB without libB needing to link against libA explicitly. This does not work with the Android linker, which can break plug-in systems where the main executable dlopen():s a plug-in which doesn't explicitly link against some shared libraries already linked to by the executable. See [the relevant NDK issue](https://github.com/android-ndk/ndk/issues/201) for more information.
- Symbol visibility when opening shared libraries using `dlopen()` works
differently. On a normal linker, when an executable linking against a shared
library libA dlopen():s another shared library libB, the symbols of libA are
exposed to libB without libB needing to link against libA explicitly. This
does not work with the Android linker, which can break plug-in systems where
the main executable dlopen():s a plug-in which doesn't explicitly link against
some shared libraries already linked to by the executable.
See [the relevant NDK issue](https://github.com/android-ndk/ndk/issues/201)
for more information.