blob: b1af9d1c0dbb0b5840466a9cfdf149dade00c8a6 [file] [log] [blame]
Colin Cross800fe132019-02-11 14:21:24 -08001// Copyright 2019 Google Inc. All rights reserved.
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15package java
16
17import (
18 "path/filepath"
Vladimir Marko205e6c22020-04-01 13:52:27 +010019 "sort"
Colin Cross800fe132019-02-11 14:21:24 -080020 "strings"
21
22 "android/soong/android"
23 "android/soong/dexpreopt"
24
Colin Cross800fe132019-02-11 14:21:24 -080025 "github.com/google/blueprint/proptools"
26)
27
Paul Duffin1ab61862021-01-20 17:44:53 +000028// =================================================================================================
29// WIP - see http://b/177892522 for details
30//
31// The build support for boot images is currently being migrated away from singleton to modules so
32// the documentation may not be strictly accurate. Rather than update the documentation at every
33// step which will create a lot of churn the changes that have been made will be listed here and the
34// documentation will be updated once it is closer to the final result.
35//
36// Changes:
37// 1) dex_bootjars is now a singleton module and not a plain singleton.
Paul Duffin3451e162021-01-20 15:16:56 +000038// 2) Boot images are now represented by the boot_image module type.
39// 3) The art boot image is called "art-boot-image", the framework boot image is called
40// "framework-boot-image".
41// 4) They are defined in art/build/boot/Android.bp and frameworks/base/boot/Android.bp
42// respectively.
43// 5) Each boot_image retrieves the appropriate boot image configuration from the map returned by
44// genBootImageConfigs() using the image_name specified in the boot_image module.
Paul Duffin1ab61862021-01-20 17:44:53 +000045// =================================================================================================
46
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +000047// This comment describes:
48// 1. ART boot images in general (their types, structure, file layout, etc.)
49// 2. build system support for boot images
50//
51// 1. ART boot images
52// ------------------
53//
54// A boot image in ART is a set of files that contain AOT-compiled native code and a heap snapshot
55// of AOT-initialized classes for the bootclasspath Java libraries. A boot image is compiled from a
56// set of DEX jars by the dex2oat compiler. A boot image is used for two purposes: 1) it is
57// installed on device and loaded at runtime, and 2) other Java libraries and apps are compiled
58// against it (compilation may take place either on host, known as "dexpreopt", or on device, known
59// as "dexopt").
60//
61// A boot image is not a single file, but a collection of interrelated files. Each boot image has a
62// number of components that correspond to the Java libraries that constitute it. For each component
63// there are multiple files:
64// - *.oat or *.odex file with native code (architecture-specific, one per instruction set)
65// - *.art file with pre-initialized Java classes (architecture-specific, one per instruction set)
66// - *.vdex file with verification metadata for the DEX bytecode (architecture independent)
67//
68// *.vdex files for the boot images do not contain the DEX bytecode itself, because the
69// bootclasspath DEX files are stored on disk in uncompressed and aligned form. Consequently a boot
70// image is not self-contained and cannot be used without its DEX files. To simplify the management
71// of boot image files, ART uses a certain naming scheme and associates the following metadata with
72// each boot image:
73// - A stem, which is a symbolic name that is prepended to boot image file names.
74// - A location (on-device path to the boot image files).
75// - A list of boot image locations (on-device paths to dependency boot images).
76// - A set of DEX locations (on-device paths to the DEX files, one location for one DEX file used
77// to compile the boot image).
78//
79// There are two kinds of boot images:
80// - primary boot images
81// - boot image extensions
82//
83// 1.1. Primary boot images
84// ------------------------
85//
86// A primary boot image is compiled for a core subset of bootclasspath Java libraries. It does not
87// depend on any other images, and other boot images may depend on it.
88//
89// For example, assuming that the stem is "boot", the location is /apex/com.android.art/javalib/,
90// the set of core bootclasspath libraries is A B C, and the boot image is compiled for ARM targets
91// (32 and 64 bits), it will have three components with the following files:
92// - /apex/com.android.art/javalib/{arm,arm64}/boot.{art,oat,vdex}
93// - /apex/com.android.art/javalib/{arm,arm64}/boot-B.{art,oat,vdex}
94// - /apex/com.android.art/javalib/{arm,arm64}/boot-C.{art,oat,vdex}
95//
96// The files of the first component are special: they do not have the component name appended after
97// the stem. This naming convention dates back to the times when the boot image was not split into
98// components, and there were just boot.oat and boot.art. The decision to split was motivated by
99// licensing reasons for one of the bootclasspath libraries.
100//
101// As of November 2020 the only primary boot image in Android is the image in the ART APEX
102// com.android.art. The primary ART boot image contains the Core libraries that are part of the ART
103// module. When the ART module gets updated, the primary boot image will be updated with it, and all
104// dependent images will get invalidated (the checksum of the primary image stored in dependent
105// images will not match), unless they are updated in sync with the ART module.
106//
107// 1.2. Boot image extensions
108// --------------------------
109//
110// A boot image extension is compiled for a subset of bootclasspath Java libraries (in particular,
111// this subset does not include the Core bootclasspath libraries that go into the primary boot
112// image). A boot image extension depends on the primary boot image and optionally some other boot
113// image extensions. Other images may depend on it. In other words, boot image extensions can form
114// acyclic dependency graphs.
115//
116// The motivation for boot image extensions comes from the Mainline project. Consider a situation
117// when the list of bootclasspath libraries is A B C, and both A and B are parts of the Android
118// platform, but C is part of an updatable APEX com.android.C. When the APEX is updated, the Java
119// code for C might have changed compared to the code that was used to compile the boot image.
120// Consequently, the whole boot image is obsolete and invalidated (even though the code for A and B
121// that does not depend on C is up to date). To avoid this, the original monolithic boot image is
122// split in two parts: the primary boot image that contains A B, and the boot image extension that
123// contains C and depends on the primary boot image (extends it).
124//
125// For example, assuming that the stem is "boot", the location is /system/framework, the set of
126// bootclasspath libraries is D E (where D is part of the platform and is located in
127// /system/framework, and E is part of a non-updatable APEX com.android.E and is located in
128// /apex/com.android.E/javalib), and the boot image is compiled for ARM targets (32 and 64 bits),
129// it will have two components with the following files:
130// - /system/framework/{arm,arm64}/boot-D.{art,oat,vdex}
131// - /system/framework/{arm,arm64}/boot-E.{art,oat,vdex}
132//
133// As of November 2020 the only boot image extension in Android is the Framework boot image
134// extension. It extends the primary ART boot image and contains Framework libraries and other
135// bootclasspath libraries from the platform and non-updatable APEXes that are not included in the
136// ART image. The Framework boot image extension is updated together with the platform. In the
137// future other boot image extensions may be added for some updatable modules.
138//
139//
140// 2. Build system support for boot images
141// ---------------------------------------
142//
143// The primary ART boot image needs to be compiled with one dex2oat invocation that depends on DEX
144// jars for the core libraries. Framework boot image extension needs to be compiled with one dex2oat
145// invocation that depends on the primary ART boot image and all bootclasspath DEX jars except the
Paul Duffin1ab61862021-01-20 17:44:53 +0000146// core libraries as they are already part of the primary ART boot image.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000147//
148// 2.1. Libraries that go in the boot images
149// -----------------------------------------
150//
151// The contents of each boot image are determined by the PRODUCT variables. The primary ART APEX
152// boot image contains libraries listed in the ART_APEX_JARS variable in the AOSP makefiles. The
153// Framework boot image extension contains libraries specified in the PRODUCT_BOOT_JARS and
154// PRODUCT_BOOT_JARS_EXTRA variables. The AOSP makefiles specify some common Framework libraries,
155// but more product-specific libraries can be added in the product makefiles.
156//
Martin Stjernholm1d51ea92021-07-05 20:33:42 +0100157// Each component of the PRODUCT_BOOT_JARS and PRODUCT_BOOT_JARS_EXTRA variables is a
158// colon-separated pair <apex>:<library>, where <apex> is the variant name of a non-updatable APEX,
159// "platform" if the library is a part of the platform in the system partition, or "system_ext" if
160// it's in the system_ext partition.
161//
162// In these variables APEXes are identified by their "variant names", i.e. the names they get
163// mounted as in /apex on device. In Soong modules that is the name set in the "apex_name"
164// properties, which default to the "name" values. For example, many APEXes have both
165// com.android.xxx and com.google.android.xxx modules in Soong, but take the same place
166// /apex/com.android.xxx at runtime. In these cases the variant name is always com.android.xxx,
167// regardless which APEX goes into the product. See also android.ApexInfo.ApexVariationName and
168// apex.apexBundleProperties.Apex_name.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000169//
170// A related variable PRODUCT_UPDATABLE_BOOT_JARS contains bootclasspath libraries that are in
171// updatable APEXes. They are not included in the boot image.
172//
173// One exception to the above rules are "coverage" builds (a special build flavor which requires
174// setting environment variable EMMA_INSTRUMENT_FRAMEWORK=true). In coverage builds the Java code in
175// boot image libraries is instrumented, which means that the instrumentation library (jacocoagent)
176// needs to be added to the list of bootclasspath DEX jars.
177//
178// In general, there is a requirement that the source code for a boot image library must be
179// available at build time (e.g. it cannot be a stub that has a separate implementation library).
180//
181// 2.2. Static configs
182// -------------------
183//
184// Because boot images are used to dexpreopt other Java modules, the paths to boot image files must
185// be known by the time dexpreopt build rules for the dependent modules are generated. Boot image
186// configs are constructed very early during the build, before build rule generation. The configs
187// provide predefined paths to boot image files (these paths depend only on static build
188// configuration, such as PRODUCT variables, and use hard-coded directory names).
189//
190// 2.3. Singleton
191// --------------
192//
193// Build rules for the boot images are generated with a Soong singleton. Because a singleton has no
194// dependencies on other modules, it has to find the modules for the DEX jars using VisitAllModules.
195// Soong loops through all modules and compares each module against a list of bootclasspath library
196// names. Then it generates build rules that copy DEX jars from their intermediate module-specific
197// locations to the hard-coded locations predefined in the boot image configs.
198//
199// It would be possible to use a module with proper dependencies instead, but that would require
200// changes in the way Soong generates variables for Make: a singleton can use one MakeVars() method
201// that writes variables to out/soong/make_vars-*.mk, which is included early by the main makefile,
202// but module(s) would have to use out/soong/Android-*.mk which has a group of LOCAL_* variables
203// for each module, and is included later.
204//
205// 2.4. Install rules
206// ------------------
207//
208// The primary boot image and the Framework extension are installed in different ways. The primary
209// boot image is part of the ART APEX: it is copied into the APEX intermediate files, packaged
210// together with other APEX contents, extracted and mounted on device. The Framework boot image
211// extension is installed by the rules defined in makefiles (make/core/dex_preopt_libart.mk). Soong
212// writes out a few DEXPREOPT_IMAGE_* variables for Make; these variables contain boot image names,
213// paths and so on.
214//
215// 2.5. JIT-Zygote configuration
216// -----------------------------
217//
218// One special configuration is JIT-Zygote build, when the primary ART image is used for compiling
219// apps instead of the Framework boot image extension (see DEXPREOPT_USE_ART_IMAGE and UseArtImage).
220//
221
Martin Stjernholmdb513822021-02-16 19:55:58 +0000222var artApexNames = []string{
223 "com.android.art",
224 "com.android.art.debug",
Roland Levillaind603c7d2021-03-24 14:23:57 +0000225 "com.android.art.testing",
Martin Stjernholmdb513822021-02-16 19:55:58 +0000226 "com.google.android.art",
227 "com.google.android.art.debug",
228 "com.google.android.art.testing",
229}
230
Colin Cross800fe132019-02-11 14:21:24 -0800231func init() {
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000232 RegisterDexpreoptBootJarsComponents(android.InitRegistrationContext)
Colin Cross800fe132019-02-11 14:21:24 -0800233}
234
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000235// Target-independent description of a boot image.
Colin Cross44df5812019-02-15 23:06:46 -0800236type bootImageConfig struct {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000237 // If this image is an extension, the image that it extends.
238 extends *bootImageConfig
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000239
240 // Image name (used in directory names and ninja rule names).
241 name string
242
243 // Basename of the image: the resulting filenames are <stem>[-<jar>].{art,oat,vdex}.
244 stem string
245
246 // Output directory for the image files.
247 dir android.OutputPath
248
249 // Output directory for the image files with debug symbols.
250 symbolsDir android.OutputPath
251
252 // Subdirectory where the image files are installed.
Jeongik Chaa5969092021-05-07 18:53:21 +0900253 installDirOnHost string
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000254
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900255 // Subdirectory where the image files on device are installed.
256 installDirOnDevice string
257
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100258 // A list of (location, jar) pairs for the Java modules in this image.
259 modules android.ConfiguredJarList
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000260
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000261 // File paths to jars.
262 dexPaths android.WritablePaths // for this image
263 dexPathsDeps android.WritablePaths // for the dependency images and in this image
264
Paul Duffin5f148ca2021-06-02 17:24:22 +0100265 // Map from module name (without prebuilt_ prefix) to the predefined build path.
266 dexPathsByModule map[string]android.WritablePath
267
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000268 // File path to a zip archive with all image files (or nil, if not needed).
269 zip android.WritablePath
David Srbeckyc177ebe2020-02-18 20:43:06 +0000270
271 // Rules which should be used in make to install the outputs.
272 profileInstalls android.RuleBuilderInstalls
273
274 // Target-dependent fields.
275 variants []*bootImageVariant
276}
277
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000278// Target-dependent description of a boot image.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000279type bootImageVariant struct {
280 *bootImageConfig
281
282 // Target for which the image is generated.
283 target android.Target
284
David Srbeckyab994982020-03-30 17:24:13 +0100285 // The "locations" of jars.
286 dexLocations []string // for this image
287 dexLocationsDeps []string // for the dependency images and in this image
288
David Srbeckyc177ebe2020-02-18 20:43:06 +0000289 // Paths to image files.
Paul Duffinbff50e22021-06-04 17:25:28 +0100290 imagePathOnHost android.OutputPath // first image file path on host
291 imagePathOnDevice string // first image file path on device
David Srbeckyc177ebe2020-02-18 20:43:06 +0000292
Paul Duffinbff50e22021-06-04 17:25:28 +0100293 // All the files that constitute this image variant, i.e. .art, .oat and .vdex files.
294 imagesDeps android.OutputPaths
295
296 // The path to the primary image variant's imagePathOnHost field, where primary image variant
297 // means the image variant that this extends.
298 //
299 // This is only set for a variant of an image that extends another image.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000300 primaryImages android.OutputPath
301
Paul Duffinbff50e22021-06-04 17:25:28 +0100302 // The paths to the primary image variant's imagesDeps field, where primary image variant
303 // means the image variant that this extends.
304 //
305 // This is only set for a variant of an image that extends another image.
306 primaryImagesDeps android.Paths
307
David Srbeckyc177ebe2020-02-18 20:43:06 +0000308 // Rules which should be used in make to install the outputs.
309 installs android.RuleBuilderInstalls
310 vdexInstalls android.RuleBuilderInstalls
311 unstrippedInstalls android.RuleBuilderInstalls
312}
313
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000314// Get target-specific boot image variant for the given boot image config and target.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000315func (image bootImageConfig) getVariant(target android.Target) *bootImageVariant {
316 for _, variant := range image.variants {
317 if variant.target.Os == target.Os && variant.target.Arch.ArchType == target.Arch.ArchType {
318 return variant
319 }
320 }
321 return nil
Colin Cross800fe132019-02-11 14:21:24 -0800322}
323
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000324// Return any (the first) variant which is for the device (as opposed to for the host).
David Srbeckyab994982020-03-30 17:24:13 +0100325func (image bootImageConfig) getAnyAndroidVariant() *bootImageVariant {
326 for _, variant := range image.variants {
327 if variant.target.Os == android.Android {
328 return variant
329 }
330 }
331 return nil
332}
333
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000334// Return the name of a boot image module given a boot image config and a component (module) index.
335// A module name is a combination of the Java library name, and the boot image stem (that is stored
336// in the config).
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100337func (image bootImageConfig) moduleName(ctx android.PathContext, idx int) string {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000338 // The first module of the primary boot image is special: its module name has only the stem, but
339 // not the library name. All other module names are of the form <stem>-<library name>
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100340 m := image.modules.Jar(idx)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000341 name := image.stem
David Srbecky1aacc6c2020-03-26 11:10:45 +0000342 if idx != 0 || image.extends != nil {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100343 name += "-" + android.ModuleStem(m)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000344 }
345 return name
346}
Dan Willemsen0f416782019-06-13 21:44:53 +0000347
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000348// Return the name of the first boot image module, or stem if the list of modules is empty.
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100349func (image bootImageConfig) firstModuleNameOrStem(ctx android.PathContext) string {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100350 if image.modules.Len() > 0 {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100351 return image.moduleName(ctx, 0)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000352 } else {
353 return image.stem
354 }
355}
356
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000357// Return filenames for the given boot image component, given the output directory and a list of
358// extensions.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000359func (image bootImageConfig) moduleFiles(ctx android.PathContext, dir android.OutputPath, exts ...string) android.OutputPaths {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100360 ret := make(android.OutputPaths, 0, image.modules.Len()*len(exts))
361 for i := 0; i < image.modules.Len(); i++ {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100362 name := image.moduleName(ctx, i)
Dan Willemsen0f416782019-06-13 21:44:53 +0000363 for _, ext := range exts {
364 ret = append(ret, dir.Join(ctx, name+ext))
365 }
366 }
Dan Willemsen0f416782019-06-13 21:44:53 +0000367 return ret
368}
369
Paul Duffin5466a362021-06-07 10:25:31 +0100370// apexVariants returns a list of all *bootImageVariant that could be included in an apex.
371func (image *bootImageConfig) apexVariants() []*bootImageVariant {
372 variants := []*bootImageVariant{}
373 for _, variant := range image.variants {
374 // We also generate boot images for host (for testing), but we don't need those in the apex.
375 // TODO(b/177892522) - consider changing this to check Os.OsClass = android.Device
376 if variant.target.Os == android.Android {
377 variants = append(variants, variant)
378 }
379 }
380 return variants
381}
382
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000383// Return boot image locations (as a list of symbolic paths).
384//
David Srbecky1aacc6c2020-03-26 11:10:45 +0000385// The image "location" is a symbolic path that, with multiarchitecture support, doesn't really
386// exist on the device. Typically it is /apex/com.android.art/javalib/boot.art and should be the
387// same for all supported architectures on the device. The concrete architecture specific files
388// actually end up in architecture-specific sub-directory such as arm, arm64, x86, or x86_64.
389//
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000390// For example a physical file /apex/com.android.art/javalib/x86/boot.art has "image location"
391// /apex/com.android.art/javalib/boot.art (which is not an actual file).
392//
393// For a primary boot image the list of locations has a single element.
394//
395// For a boot image extension the list of locations contains a location for all dependency images
396// (including the primary image) and the location of the extension itself. For example, for the
397// Framework boot image extension that depends on the primary ART boot image the list contains two
398// elements.
David Srbecky1aacc6c2020-03-26 11:10:45 +0000399//
400// The location is passed as an argument to the ART tools like dex2oat instead of the real path.
401// ART tools will then reconstruct the architecture-specific real path.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000402//
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900403func (image *bootImageVariant) imageLocations() (imageLocationsOnHost []string, imageLocationsOnDevice []string) {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000404 if image.extends != nil {
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900405 imageLocationsOnHost, imageLocationsOnDevice = image.extends.getVariant(image.target).imageLocations()
David Srbecky1aacc6c2020-03-26 11:10:45 +0000406 }
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900407 return append(imageLocationsOnHost, dexpreopt.PathToLocation(image.imagePathOnHost, image.target.Arch.ArchType)),
408 append(imageLocationsOnDevice, dexpreopt.PathStringToLocation(image.imagePathOnDevice, image.target.Arch.ArchType))
David Srbecky1aacc6c2020-03-26 11:10:45 +0000409}
410
Paul Duffin1ab61862021-01-20 17:44:53 +0000411func dexpreoptBootJarsFactory() android.SingletonModule {
412 m := &dexpreoptBootJars{}
413 android.InitAndroidModule(m)
414 return m
Colin Cross800fe132019-02-11 14:21:24 -0800415}
416
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000417func RegisterDexpreoptBootJarsComponents(ctx android.RegistrationContext) {
Paul Duffin1ab61862021-01-20 17:44:53 +0000418 ctx.RegisterSingletonModuleType("dex_bootjars", dexpreoptBootJarsFactory)
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000419}
420
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000421func SkipDexpreoptBootJars(ctx android.PathContext) bool {
422 return dexpreopt.GetGlobalConfig(ctx).DisablePreoptBootImages
Colin Cross800fe132019-02-11 14:21:24 -0800423}
424
Paul Duffin1ab61862021-01-20 17:44:53 +0000425// Singleton module for generating boot image build rules.
Colin Cross44df5812019-02-15 23:06:46 -0800426type dexpreoptBootJars struct {
Paul Duffin1ab61862021-01-20 17:44:53 +0000427 android.SingletonModuleBase
428
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000429 // Default boot image config (currently always the Framework boot image extension). It should be
430 // noted that JIT-Zygote builds use ART APEX image instead of the Framework boot image extension,
431 // but the switch is handled not here, but in the makefiles (triggered with
432 // DEXPREOPT_USE_ART_IMAGE=true).
David Srbeckyc177ebe2020-02-18 20:43:06 +0000433 defaultBootImage *bootImageConfig
Colin Cross2d00f0d2019-05-09 21:50:00 -0700434
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000435 // Other boot image configs (currently the list contains only the primary ART APEX image. It
436 // used to contain an experimental JIT-Zygote image (now replaced with the ART APEX image). In
437 // the future other boot image extensions may be added.
438 otherImages []*bootImageConfig
439
440 // Build path to a config file that Soong writes for Make (to be used in makefiles that install
441 // the default boot image).
Colin Cross2d00f0d2019-05-09 21:50:00 -0700442 dexpreoptConfigForMake android.WritablePath
Colin Cross44df5812019-02-15 23:06:46 -0800443}
Colin Cross800fe132019-02-11 14:21:24 -0800444
Paul Duffin1ab61862021-01-20 17:44:53 +0000445// Provide paths to boot images for use by modules that depend upon them.
446//
447// The build rules are created in GenerateSingletonBuildActions().
448func (d *dexpreoptBootJars) GenerateAndroidBuildActions(ctx android.ModuleContext) {
449 // Placeholder for now.
450}
451
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000452// Generate build rules for boot images.
Paul Duffin1ab61862021-01-20 17:44:53 +0000453func (d *dexpreoptBootJars) GenerateSingletonBuildActions(ctx android.SingletonContext) {
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000454 if SkipDexpreoptBootJars(ctx) {
Colin Cross800fe132019-02-11 14:21:24 -0800455 return
456 }
Martin Stjernholm6d415272020-01-31 17:10:36 +0000457 if dexpreopt.GetCachedGlobalSoongConfig(ctx) == nil {
458 // No module has enabled dexpreopting, so we assume there will be no boot image to make.
459 return
460 }
Colin Cross800fe132019-02-11 14:21:24 -0800461
Colin Cross2d00f0d2019-05-09 21:50:00 -0700462 d.dexpreoptConfigForMake = android.PathForOutput(ctx, ctx.Config().DeviceName(), "dexpreopt.config")
463 writeGlobalConfigForMake(ctx, d.dexpreoptConfigForMake)
464
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000465 global := dexpreopt.GetGlobalConfig(ctx)
Paul Duffinad19d382021-04-26 16:44:00 +0100466 if !shouldBuildBootImages(ctx.Config(), global) {
Colin Cross800fe132019-02-11 14:21:24 -0800467 return
468 }
469
Paul Duffin58612422021-04-26 12:51:07 +0100470 defaultImageConfig := defaultBootImageConfig(ctx)
Paul Duffin47932932021-04-29 11:46:29 +0100471 d.defaultBootImage = defaultImageConfig
472 artBootImageConfig := artBootImageConfig(ctx)
473 d.otherImages = []*bootImageConfig{artBootImageConfig}
Colin Cross44df5812019-02-15 23:06:46 -0800474}
475
Paul Duffinad19d382021-04-26 16:44:00 +0100476// shouldBuildBootImages determines whether boot images should be built.
477func shouldBuildBootImages(config android.Config, global *dexpreopt.GlobalConfig) bool {
478 // Skip recompiling the boot image for the second sanitization phase. We'll get separate paths
479 // and invalidate first-stage artifacts which are crucial to SANITIZE_LITE builds.
480 // Note: this is technically incorrect. Compiled code contains stack checks which may depend
481 // on ASAN settings.
482 if len(config.SanitizeDevice()) == 1 && config.SanitizeDevice()[0] == "address" && global.SanitizeLite {
483 return false
484 }
485 return true
486}
487
Paul Duffin5f148ca2021-06-02 17:24:22 +0100488// copyBootJarsToPredefinedLocations generates commands that will copy boot jars to predefined
489// paths in the global config.
490func copyBootJarsToPredefinedLocations(ctx android.ModuleContext, srcBootDexJarsByModule bootDexJarByModule, dstBootJarsByModule map[string]android.WritablePath) {
491 // Create the super set of module names.
492 names := []string{}
493 names = append(names, android.SortedStringKeys(srcBootDexJarsByModule)...)
494 names = append(names, android.SortedStringKeys(dstBootJarsByModule)...)
495 names = android.SortedUniqueStrings(names)
496 for _, name := range names {
497 src := srcBootDexJarsByModule[name]
498 dst := dstBootJarsByModule[name]
Paul Duffin7ebebfd2021-04-27 19:36:57 +0100499
Paul Duffin5f148ca2021-06-02 17:24:22 +0100500 if src == nil {
501 ctx.ModuleErrorf("module %s does not provide a dex boot jar", name)
502 } else if dst == nil {
503 ctx.ModuleErrorf("module %s is not part of the boot configuration", name)
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100504 } else {
505 ctx.Build(pctx, android.BuildParams{
506 Rule: android.Cp,
Paul Duffin5f148ca2021-06-02 17:24:22 +0100507 Input: src,
508 Output: dst,
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100509 })
510 }
511 }
Ulya Trafimovichfa2b1cf2021-03-22 12:37:10 +0000512}
513
Paul Duffina56be7d2021-07-02 13:00:43 +0100514// buildBootImageVariantsForAndroidOs generates rules to build the boot image variants for the
515// android.Android OsType and returns a map from the architectures to the paths of the generated
516// boot image files.
517//
518// The paths are returned because they are needed elsewhere in Soong, e.g. for populating an APEX.
519func buildBootImageVariantsForAndroidOs(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath) bootImageFilesByArch {
520 return buildBootImageForOsType(ctx, image, profile, android.Android)
521}
522
523// buildBootImageVariantsForBuildOs generates rules to build the boot image variants for the
524// android.BuildOs OsType, i.e. the type of OS on which the build is being running.
525//
526// The files need to be generated into their predefined location because they are used from there
527// both within Soong and outside, e.g. for ART based host side testing and also for use by some
528// cloud based tools. However, they are not needed by callers of this function and so the paths do
529// not need to be returned from this func, unlike the buildBootImageVariantsForAndroidOs func.
530func buildBootImageVariantsForBuildOs(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath) {
531 buildBootImageForOsType(ctx, image, profile, android.BuildOs)
532}
533
534// buildBootImageForOsType takes a bootImageConfig, a profile file and an android.OsType
535// boot image files are required for and it creates rules to build the boot image
536// files for all the required architectures for them.
Paul Duffin56afb272021-07-01 22:04:22 +0100537//
538// It returns a map from android.ArchType to the predefined paths of the boot image files.
Paul Duffina56be7d2021-07-02 13:00:43 +0100539func buildBootImageForOsType(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath, requiredOsType android.OsType) bootImageFilesByArch {
Paul Duffin56afb272021-07-01 22:04:22 +0100540 filesByArch := bootImageFilesByArch{}
David Srbeckyc177ebe2020-02-18 20:43:06 +0000541 for _, variant := range image.variants {
Paul Duffina56be7d2021-07-02 13:00:43 +0100542 if variant.target.Os == requiredOsType {
543 buildBootImageVariant(ctx, variant, profile)
Paul Duffin56afb272021-07-01 22:04:22 +0100544 filesByArch[variant.target.Arch.ArchType] = variant.imagesDeps.Paths()
Ulya Trafimovich9ab49332020-06-10 15:44:25 +0100545 }
Colin Cross800fe132019-02-11 14:21:24 -0800546 }
Colin Cross44df5812019-02-15 23:06:46 -0800547
Paul Duffin56afb272021-07-01 22:04:22 +0100548 return filesByArch
549}
Colin Crossdf8eebe2019-04-09 15:29:41 -0700550
Paul Duffin56afb272021-07-01 22:04:22 +0100551// buildBootImageZipInPredefinedLocation generates a zip file containing all the boot image files.
552//
553// The supplied filesByArch is nil when the boot image files have not been generated. Otherwise, it
554// is a map from android.ArchType to the predefined locations.
555func buildBootImageZipInPredefinedLocation(ctx android.ModuleContext, image *bootImageConfig, filesByArch bootImageFilesByArch) {
556 if filesByArch == nil {
557 return
Colin Crossdf8eebe2019-04-09 15:29:41 -0700558 }
Paul Duffin56afb272021-07-01 22:04:22 +0100559
560 // Compute the list of files from all the architectures.
561 zipFiles := android.Paths{}
562 for _, archType := range android.ArchTypeList() {
563 zipFiles = append(zipFiles, filesByArch[archType]...)
564 }
565
566 rule := android.NewRuleBuilder(pctx, ctx)
567 rule.Command().
568 BuiltTool("soong_zip").
569 FlagWithOutput("-o ", image.zip).
570 FlagWithArg("-C ", image.dir.Join(ctx, android.Android.String()).String()).
571 FlagWithInputList("-f ", zipFiles, " -f ")
572
573 rule.Build("zip_"+image.name, "zip "+image.name+" image")
Colin Cross800fe132019-02-11 14:21:24 -0800574}
575
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000576// Generate boot image build rules for a specific target.
Paul Duffin56afb272021-07-01 22:04:22 +0100577func buildBootImageVariant(ctx android.ModuleContext, image *bootImageVariant, profile android.Path) {
Colin Cross800fe132019-02-11 14:21:24 -0800578
Paul Duffin8fc51a82021-07-06 10:55:35 +0100579 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000580 global := dexpreopt.GetGlobalConfig(ctx)
Colin Cross44df5812019-02-15 23:06:46 -0800581
David Srbeckyc177ebe2020-02-18 20:43:06 +0000582 arch := image.target.Arch.ArchType
David Srbecky7f8dac12020-02-13 16:00:45 +0000583 os := image.target.Os.String() // We need to distinguish host-x86 and device-x86.
Jeongik Chaa5969092021-05-07 18:53:21 +0900584 symbolsDir := image.symbolsDir.Join(ctx, os, image.installDirOnHost, arch.String())
Ulyana Trafimovichde534412019-11-08 10:51:01 +0000585 symbolsFile := symbolsDir.Join(ctx, image.stem+".oat")
Jeongik Chaa5969092021-05-07 18:53:21 +0900586 outputDir := image.dir.Join(ctx, os, image.installDirOnHost, arch.String())
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000587 outputPath := outputDir.Join(ctx, image.stem+".oat")
588 oatLocation := dexpreopt.PathToLocation(outputPath, arch)
589 imagePath := outputPath.ReplaceExtension(ctx, "art")
Colin Cross800fe132019-02-11 14:21:24 -0800590
Colin Crossf1a035e2020-11-16 17:32:30 -0800591 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -0800592
593 rule.Command().Text("mkdir").Flag("-p").Flag(symbolsDir.String())
594 rule.Command().Text("rm").Flag("-f").
595 Flag(symbolsDir.Join(ctx, "*.art").String()).
596 Flag(symbolsDir.Join(ctx, "*.oat").String()).
597 Flag(symbolsDir.Join(ctx, "*.invocation").String())
598 rule.Command().Text("rm").Flag("-f").
599 Flag(outputDir.Join(ctx, "*.art").String()).
600 Flag(outputDir.Join(ctx, "*.oat").String()).
601 Flag(outputDir.Join(ctx, "*.invocation").String())
602
603 cmd := rule.Command()
604
605 extraFlags := ctx.Config().Getenv("ART_BOOT_IMAGE_EXTRA_ARGS")
606 if extraFlags == "" {
607 // Use ANDROID_LOG_TAGS to suppress most logging by default...
608 cmd.Text(`ANDROID_LOG_TAGS="*:e"`)
609 } else {
610 // ...unless the boot image is generated specifically for testing, then allow all logging.
611 cmd.Text(`ANDROID_LOG_TAGS="*:v"`)
612 }
613
614 invocationPath := outputPath.ReplaceExtension(ctx, "invocation")
615
Martin Stjernholm75a48d82020-01-10 20:32:59 +0000616 cmd.Tool(globalSoong.Dex2oat).
Colin Cross800fe132019-02-11 14:21:24 -0800617 Flag("--avoid-storing-invocation").
Colin Cross69f59a32019-02-15 10:39:37 -0800618 FlagWithOutput("--write-invocation-to=", invocationPath).ImplicitOutput(invocationPath).
Colin Cross44df5812019-02-15 23:06:46 -0800619 Flag("--runtime-arg").FlagWithArg("-Xms", global.Dex2oatImageXms).
620 Flag("--runtime-arg").FlagWithArg("-Xmx", global.Dex2oatImageXmx)
Colin Cross800fe132019-02-11 14:21:24 -0800621
Colin Cross69f59a32019-02-15 10:39:37 -0800622 if profile != nil {
Colin Cross800fe132019-02-11 14:21:24 -0800623 cmd.FlagWithArg("--compiler-filter=", "speed-profile")
Colin Cross69f59a32019-02-15 10:39:37 -0800624 cmd.FlagWithInput("--profile-file=", profile)
Colin Cross800fe132019-02-11 14:21:24 -0800625 }
626
Nicolas Geoffray1086e602021-01-20 14:30:40 +0000627 dirtyImageFile := "frameworks/base/config/dirty-image-objects"
628 dirtyImagePath := android.ExistentPathForSource(ctx, dirtyImageFile)
629 if dirtyImagePath.Valid() {
630 cmd.FlagWithInput("--dirty-image-objects=", dirtyImagePath.Path())
Colin Cross800fe132019-02-11 14:21:24 -0800631 }
632
David Srbecky1aacc6c2020-03-26 11:10:45 +0000633 if image.extends != nil {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000634 // It is a boot image extension, so it needs the boot image it depends on (in this case the
635 // primary ART APEX image).
David Srbeckyc177ebe2020-02-18 20:43:06 +0000636 artImage := image.primaryImages
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000637 cmd.
638 Flag("--runtime-arg").FlagWithInputList("-Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
639 Flag("--runtime-arg").FlagWithList("-Xbootclasspath-locations:", image.dexLocationsDeps, ":").
Paul Duffinbff50e22021-06-04 17:25:28 +0100640 // Add the path to the first file in the boot image with the arch specific directory removed,
641 // dex2oat will reconstruct the path to the actual file when it needs it. As the actual path
642 // to the file cannot be passed to the command make sure to add the actual path as an Implicit
643 // dependency to ensure that it is built before the command runs.
644 FlagWithArg("--boot-image=", dexpreopt.PathToLocation(artImage, arch)).Implicit(artImage).
645 // Similarly, the dex2oat tool will automatically find the paths to other files in the base
646 // boot image so make sure to add them as implicit dependencies to ensure that they are built
647 // before this command is run.
648 Implicits(image.primaryImagesDeps)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000649 } else {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000650 // It is a primary image, so it needs a base address.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000651 cmd.FlagWithArg("--base=", ctx.Config().LibartImgDeviceBaseAddress())
652 }
653
Colin Cross800fe132019-02-11 14:21:24 -0800654 cmd.
Colin Cross44df5812019-02-15 23:06:46 -0800655 FlagForEachInput("--dex-file=", image.dexPaths.Paths()).
656 FlagForEachArg("--dex-location=", image.dexLocations).
Colin Cross800fe132019-02-11 14:21:24 -0800657 Flag("--generate-debug-info").
658 Flag("--generate-build-id").
Mathieu Chartier54fd8072019-07-26 13:50:04 -0700659 Flag("--image-format=lz4hc").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000660 FlagWithArg("--oat-symbols=", symbolsFile.String()).
Colin Cross800fe132019-02-11 14:21:24 -0800661 Flag("--strip").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000662 FlagWithArg("--oat-file=", outputPath.String()).
Colin Cross800fe132019-02-11 14:21:24 -0800663 FlagWithArg("--oat-location=", oatLocation).
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000664 FlagWithArg("--image=", imagePath.String()).
Colin Cross800fe132019-02-11 14:21:24 -0800665 FlagWithArg("--instruction-set=", arch.String()).
Colin Cross44df5812019-02-15 23:06:46 -0800666 FlagWithArg("--android-root=", global.EmptyDirectory).
Colin Cross800fe132019-02-11 14:21:24 -0800667 FlagWithArg("--no-inline-from=", "core-oj.jar").
Ulya Trafimovichc0c98d52020-03-09 12:46:06 +0000668 Flag("--force-determinism").
Colin Cross800fe132019-02-11 14:21:24 -0800669 Flag("--abort-on-hard-verifier-error")
670
David Srbecky7f8dac12020-02-13 16:00:45 +0000671 // Use the default variant/features for host builds.
672 // The map below contains only device CPU info (which might be x86 on some devices).
673 if image.target.Os == android.Android {
674 cmd.FlagWithArg("--instruction-set-variant=", global.CpuVariant[arch])
675 cmd.FlagWithArg("--instruction-set-features=", global.InstructionSetFeatures[arch])
676 }
677
Colin Cross44df5812019-02-15 23:06:46 -0800678 if global.BootFlags != "" {
679 cmd.Flag(global.BootFlags)
Colin Cross800fe132019-02-11 14:21:24 -0800680 }
681
682 if extraFlags != "" {
683 cmd.Flag(extraFlags)
684 }
685
Colin Cross0b9f31f2019-02-28 11:00:01 -0800686 cmd.Textf(`|| ( echo %s ; false )`, proptools.ShellEscape(failureMessage))
Colin Cross800fe132019-02-11 14:21:24 -0800687
Jeongik Chaa5969092021-05-07 18:53:21 +0900688 installDir := filepath.Join("/", image.installDirOnHost, arch.String())
Colin Cross800fe132019-02-11 14:21:24 -0800689
Colin Cross800fe132019-02-11 14:21:24 -0800690 var vdexInstalls android.RuleBuilderInstalls
691 var unstrippedInstalls android.RuleBuilderInstalls
692
Dan Willemsen0f416782019-06-13 21:44:53 +0000693 for _, artOrOat := range image.moduleFiles(ctx, outputDir, ".art", ".oat") {
694 cmd.ImplicitOutput(artOrOat)
Colin Cross800fe132019-02-11 14:21:24 -0800695
Dan Willemsen0f416782019-06-13 21:44:53 +0000696 // Install the .oat and .art files
697 rule.Install(artOrOat, filepath.Join(installDir, artOrOat.Base()))
698 }
Colin Cross800fe132019-02-11 14:21:24 -0800699
Dan Willemsen0f416782019-06-13 21:44:53 +0000700 for _, vdex := range image.moduleFiles(ctx, outputDir, ".vdex") {
701 cmd.ImplicitOutput(vdex)
Colin Cross800fe132019-02-11 14:21:24 -0800702
David Srbecky7f8dac12020-02-13 16:00:45 +0000703 // Note that the vdex files are identical between architectures.
704 // Make rules will create symlinks to share them between architectures.
Colin Cross800fe132019-02-11 14:21:24 -0800705 vdexInstalls = append(vdexInstalls,
David Srbecky7f8dac12020-02-13 16:00:45 +0000706 android.RuleBuilderInstall{vdex, filepath.Join(installDir, vdex.Base())})
Dan Willemsen0f416782019-06-13 21:44:53 +0000707 }
708
709 for _, unstrippedOat := range image.moduleFiles(ctx, symbolsDir, ".oat") {
710 cmd.ImplicitOutput(unstrippedOat)
Colin Cross800fe132019-02-11 14:21:24 -0800711
712 // Install the unstripped oat files. The Make rules will put these in $(TARGET_OUT_UNSTRIPPED)
713 unstrippedInstalls = append(unstrippedInstalls,
Colin Cross69f59a32019-02-15 10:39:37 -0800714 android.RuleBuilderInstall{unstrippedOat, filepath.Join(installDir, unstrippedOat.Base())})
Colin Cross800fe132019-02-11 14:21:24 -0800715 }
716
Colin Crossf1a035e2020-11-16 17:32:30 -0800717 rule.Build(image.name+"JarsDexpreopt_"+image.target.String(), "dexpreopt "+image.name+" jars "+arch.String())
Colin Cross800fe132019-02-11 14:21:24 -0800718
719 // save output and installed files for makevars
David Srbeckyc177ebe2020-02-18 20:43:06 +0000720 image.installs = rule.Installs()
721 image.vdexInstalls = vdexInstalls
722 image.unstrippedInstalls = unstrippedInstalls
Colin Cross800fe132019-02-11 14:21:24 -0800723}
724
725const failureMessage = `ERROR: Dex2oat failed to compile a boot image.
726It is likely that the boot classpath is inconsistent.
727Rebuild with ART_BOOT_IMAGE_EXTRA_ARGS="--runtime-arg -verbose:verifier" to see verification errors.`
728
Paul Duffin2fc82ad2021-04-29 23:36:12 +0100729func bootImageProfileRule(ctx android.ModuleContext, image *bootImageConfig) android.WritablePath {
Paul Duffin8fc51a82021-07-06 10:55:35 +0100730 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000731 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +0000732
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000733 if global.DisableGenerateProfile {
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +0000734 return nil
735 }
Colin Cross800fe132019-02-11 14:21:24 -0800736
Paul Duffin58612422021-04-26 12:51:07 +0100737 defaultProfile := "frameworks/base/config/boot-image-profile.txt"
Colin Cross800fe132019-02-11 14:21:24 -0800738
Paul Duffin58612422021-04-26 12:51:07 +0100739 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -0800740
Paul Duffin58612422021-04-26 12:51:07 +0100741 var bootImageProfile android.Path
742 if len(global.BootImageProfiles) > 1 {
743 combinedBootImageProfile := image.dir.Join(ctx, "boot-image-profile.txt")
744 rule.Command().Text("cat").Inputs(global.BootImageProfiles).Text(">").Output(combinedBootImageProfile)
745 bootImageProfile = combinedBootImageProfile
746 } else if len(global.BootImageProfiles) == 1 {
747 bootImageProfile = global.BootImageProfiles[0]
748 } else if path := android.ExistentPathForSource(ctx, defaultProfile); path.Valid() {
749 bootImageProfile = path.Path()
750 } else {
751 // No profile (not even a default one, which is the case on some branches
752 // like master-art-host that don't have frameworks/base).
753 // Return nil and continue without profile.
754 return nil
Ulyana Trafimovichde534412019-11-08 10:51:01 +0000755 }
Colin Cross800fe132019-02-11 14:21:24 -0800756
Paul Duffin58612422021-04-26 12:51:07 +0100757 profile := image.dir.Join(ctx, "boot.prof")
758
759 rule.Command().
760 Text(`ANDROID_LOG_TAGS="*:e"`).
761 Tool(globalSoong.Profman).
762 Flag("--output-profile-type=boot").
763 FlagWithInput("--create-profile-from=", bootImageProfile).
764 FlagForEachInput("--apk=", image.dexPathsDeps.Paths()).
765 FlagForEachArg("--dex-location=", image.getAnyAndroidVariant().dexLocationsDeps).
766 FlagWithOutput("--reference-profile-file=", profile)
767
768 rule.Install(profile, "/system/etc/boot-image.prof")
769
770 rule.Build("bootJarsProfile", "profile boot jars")
771
Paul Duffinbe007d12021-05-07 13:02:07 +0100772 image.profileInstalls = append(image.profileInstalls, rule.Installs()...)
Paul Duffin58612422021-04-26 12:51:07 +0100773
774 return profile
775}
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000776
Paul Duffinad19d382021-04-26 16:44:00 +0100777// bootFrameworkProfileRule generates the rule to create the boot framework profile and
778// returns a path to the generated file.
779func bootFrameworkProfileRule(ctx android.ModuleContext, image *bootImageConfig) android.WritablePath {
780 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000781 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100782
Dan Willemsen9f435972020-05-28 15:28:00 -0700783 if global.DisableGenerateProfile || ctx.Config().UnbundledBuild() {
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100784 return nil
785 }
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100786
Paul Duffin58612422021-04-26 12:51:07 +0100787 defaultProfile := "frameworks/base/config/boot-profile.txt"
Paul Duffin2ac45f02021-04-26 17:08:38 +0100788 bootFrameworkProfile := android.PathForSource(ctx, defaultProfile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100789
Paul Duffin58612422021-04-26 12:51:07 +0100790 profile := image.dir.Join(ctx, "boot.bprof")
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100791
Paul Duffin58612422021-04-26 12:51:07 +0100792 rule := android.NewRuleBuilder(pctx, ctx)
Paul Duffin58612422021-04-26 12:51:07 +0100793 rule.Command().
794 Text(`ANDROID_LOG_TAGS="*:e"`).
795 Tool(globalSoong.Profman).
796 Flag("--output-profile-type=bprof").
797 FlagWithInput("--create-profile-from=", bootFrameworkProfile).
798 FlagForEachInput("--apk=", image.dexPathsDeps.Paths()).
799 FlagForEachArg("--dex-location=", image.getAnyAndroidVariant().dexLocationsDeps).
800 FlagWithOutput("--reference-profile-file=", profile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100801
Paul Duffin58612422021-04-26 12:51:07 +0100802 rule.Install(profile, "/system/etc/boot-image.bprof")
803 rule.Build("bootFrameworkProfile", "profile boot framework jars")
804 image.profileInstalls = append(image.profileInstalls, rule.Installs()...)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100805
Paul Duffin58612422021-04-26 12:51:07 +0100806 return profile
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100807}
808
Paul Duffin44d15942021-04-26 19:45:11 +0100809// generateUpdatableBcpPackagesRule generates the rule to create the updatable-bcp-packages.txt file
810// and returns a path to the generated file.
Paul Duffin4c094422021-04-26 20:10:48 +0100811func generateUpdatableBcpPackagesRule(ctx android.ModuleContext, image *bootImageConfig, updatableModules []android.Module) android.WritablePath {
Paul Duffin44d15942021-04-26 19:45:11 +0100812 // Collect `permitted_packages` for updatable boot jars.
813 var updatablePackages []string
814 for _, module := range updatableModules {
815 if j, ok := module.(PermittedPackagesForUpdatableBootJars); ok {
816 pp := j.PermittedPackagesForUpdatableBootJars()
817 if len(pp) > 0 {
818 updatablePackages = append(updatablePackages, pp...)
819 } else {
Paul Duffin7487a7a2021-05-19 09:36:09 +0100820 ctx.OtherModuleErrorf(module, "Missing permitted_packages")
Paul Duffin44d15942021-04-26 19:45:11 +0100821 }
822 }
823 }
824
Paul Duffin58612422021-04-26 12:51:07 +0100825 // Sort updatable packages to ensure deterministic ordering.
826 sort.Strings(updatablePackages)
Vladimir Marko205e6c22020-04-01 13:52:27 +0100827
Paul Duffin58612422021-04-26 12:51:07 +0100828 updatableBcpPackagesName := "updatable-bcp-packages.txt"
829 updatableBcpPackages := image.dir.Join(ctx, updatableBcpPackagesName)
Vladimir Marko205e6c22020-04-01 13:52:27 +0100830
Paul Duffin58612422021-04-26 12:51:07 +0100831 // WriteFileRule automatically adds the last end-of-line.
832 android.WriteFileRule(ctx, updatableBcpPackages, strings.Join(updatablePackages, "\n"))
Vladimir Marko205e6c22020-04-01 13:52:27 +0100833
Paul Duffin58612422021-04-26 12:51:07 +0100834 rule := android.NewRuleBuilder(pctx, ctx)
835 rule.Install(updatableBcpPackages, "/system/etc/"+updatableBcpPackagesName)
836 // TODO: Rename `profileInstalls` to `extraInstalls`?
837 // Maybe even move the field out of the bootImageConfig into some higher level type?
838 image.profileInstalls = append(image.profileInstalls, rule.Installs()...)
Vladimir Marko205e6c22020-04-01 13:52:27 +0100839
Paul Duffin58612422021-04-26 12:51:07 +0100840 return updatableBcpPackages
Vladimir Marko205e6c22020-04-01 13:52:27 +0100841}
842
Paul Duffinf7a55922021-04-26 23:09:15 +0100843func dumpOatRules(ctx android.ModuleContext, image *bootImageConfig) {
Colin Crossc9a4c362019-02-26 21:13:48 -0800844 var allPhonies android.Paths
David Srbeckyc177ebe2020-02-18 20:43:06 +0000845 for _, image := range image.variants {
846 arch := image.target.Arch.ArchType
David Srbecky46672322020-03-16 13:27:55 +0000847 suffix := arch.String()
848 // Host and target might both use x86 arch. We need to ensure the names are unique.
849 if image.target.Os.Class == android.Host {
850 suffix = "host-" + suffix
851 }
Colin Crossc9a4c362019-02-26 21:13:48 -0800852 // Create a rule to call oatdump.
David Srbecky7f8dac12020-02-13 16:00:45 +0000853 output := android.PathForOutput(ctx, "boot."+suffix+".oatdump.txt")
Colin Crossf1a035e2020-11-16 17:32:30 -0800854 rule := android.NewRuleBuilder(pctx, ctx)
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900855 imageLocationsOnHost, _ := image.imageLocations()
Colin Crossc9a4c362019-02-26 21:13:48 -0800856 rule.Command().
Martin Stjernholm07803722021-05-18 17:39:56 +0100857 BuiltTool("oatdump").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000858 FlagWithInputList("--runtime-arg -Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
859 FlagWithList("--runtime-arg -Xbootclasspath-locations:", image.dexLocationsDeps, ":").
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900860 FlagWithArg("--image=", strings.Join(imageLocationsOnHost, ":")).Implicits(image.imagesDeps.Paths()).
Colin Crossc9a4c362019-02-26 21:13:48 -0800861 FlagWithOutput("--output=", output).
862 FlagWithArg("--instruction-set=", arch.String())
Colin Crossf1a035e2020-11-16 17:32:30 -0800863 rule.Build("dump-oat-boot-"+suffix, "dump oat boot "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -0800864
865 // Create a phony rule that depends on the output file and prints the path.
David Srbecky7f8dac12020-02-13 16:00:45 +0000866 phony := android.PathForPhony(ctx, "dump-oat-boot-"+suffix)
Colin Crossf1a035e2020-11-16 17:32:30 -0800867 rule = android.NewRuleBuilder(pctx, ctx)
Colin Crossc9a4c362019-02-26 21:13:48 -0800868 rule.Command().
869 Implicit(output).
870 ImplicitOutput(phony).
871 Text("echo").FlagWithArg("Output in ", output.String())
Colin Crossf1a035e2020-11-16 17:32:30 -0800872 rule.Build("phony-dump-oat-boot-"+suffix, "dump oat boot "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -0800873
David Srbecky1aacc6c2020-03-26 11:10:45 +0000874 allPhonies = append(allPhonies, phony)
Colin Crossc9a4c362019-02-26 21:13:48 -0800875 }
876
877 phony := android.PathForPhony(ctx, "dump-oat-boot")
878 ctx.Build(pctx, android.BuildParams{
879 Rule: android.Phony,
880 Output: phony,
881 Inputs: allPhonies,
882 Description: "dump-oat-boot",
883 })
Colin Crossc9a4c362019-02-26 21:13:48 -0800884}
885
Colin Cross2d00f0d2019-05-09 21:50:00 -0700886func writeGlobalConfigForMake(ctx android.SingletonContext, path android.WritablePath) {
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000887 data := dexpreopt.GetGlobalConfigRawData(ctx)
Colin Cross2d00f0d2019-05-09 21:50:00 -0700888
Colin Crosscf371cc2020-11-13 11:48:42 -0800889 android.WriteFileRule(ctx, path, string(data))
Colin Cross2d00f0d2019-05-09 21:50:00 -0700890}
891
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000892// Define Make variables for boot image names, paths, etc. These variables are used in makefiles
893// (make/core/dex_preopt_libart.mk) to generate install rules that copy boot image files to the
894// correct output directories.
Colin Cross44df5812019-02-15 23:06:46 -0800895func (d *dexpreoptBootJars) MakeVars(ctx android.MakeVarsContext) {
Colin Cross2d00f0d2019-05-09 21:50:00 -0700896 if d.dexpreoptConfigForMake != nil {
897 ctx.Strict("DEX_PREOPT_CONFIG_FOR_MAKE", d.dexpreoptConfigForMake.String())
Martin Stjernholmc52aaf12020-01-06 23:11:37 +0000898 ctx.Strict("DEX_PREOPT_SOONG_CONFIG_FOR_MAKE", android.PathForOutput(ctx, "dexpreopt_soong.config").String())
Colin Cross2d00f0d2019-05-09 21:50:00 -0700899 }
900
Colin Cross44df5812019-02-15 23:06:46 -0800901 image := d.defaultBootImage
902 if image != nil {
Colin Cross44df5812019-02-15 23:06:46 -0800903 ctx.Strict("DEXPREOPT_IMAGE_PROFILE_BUILT_INSTALLED", image.profileInstalls.String())
Ulya Trafimovich9023b022021-03-22 16:02:28 +0000904
905 global := dexpreopt.GetGlobalConfig(ctx)
906 dexPaths, dexLocations := bcpForDexpreopt(ctx, global.PreoptWithUpdatableBcp)
907 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_FILES", strings.Join(dexPaths.Strings(), " "))
908 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_LOCATIONS", strings.Join(dexLocations, " "))
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000909
910 var imageNames []string
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000911 // TODO: the primary ART boot image should not be exposed to Make, as it is installed in a
912 // different way as a part of the ART APEX. However, there is a special JIT-Zygote build
913 // configuration which uses the primary ART image instead of the Framework boot image
914 // extension, and it relies on the ART image being exposed to Make. To fix this, it is
915 // necessary to rework the logic in makefiles.
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000916 for _, current := range append(d.otherImages, image) {
917 imageNames = append(imageNames, current.name)
David Srbecky1aacc6c2020-03-26 11:10:45 +0000918 for _, variant := range current.variants {
David Srbecky7f8dac12020-02-13 16:00:45 +0000919 suffix := ""
David Srbecky1aacc6c2020-03-26 11:10:45 +0000920 if variant.target.Os.Class == android.Host {
David Srbecky7f8dac12020-02-13 16:00:45 +0000921 suffix = "_host"
922 }
David Srbecky1aacc6c2020-03-26 11:10:45 +0000923 sfx := variant.name + suffix + "_" + variant.target.Arch.ArchType.String()
924 ctx.Strict("DEXPREOPT_IMAGE_VDEX_BUILT_INSTALLED_"+sfx, variant.vdexInstalls.String())
Jeongik Chaa5969092021-05-07 18:53:21 +0900925 ctx.Strict("DEXPREOPT_IMAGE_"+sfx, variant.imagePathOnHost.String())
David Srbecky1aacc6c2020-03-26 11:10:45 +0000926 ctx.Strict("DEXPREOPT_IMAGE_DEPS_"+sfx, strings.Join(variant.imagesDeps.Strings(), " "))
927 ctx.Strict("DEXPREOPT_IMAGE_BUILT_INSTALLED_"+sfx, variant.installs.String())
928 ctx.Strict("DEXPREOPT_IMAGE_UNSTRIPPED_BUILT_INSTALLED_"+sfx, variant.unstrippedInstalls.String())
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000929 }
Jeongik Chae3165c82021-06-23 23:18:50 +0900930 imageLocationsOnHost, imageLocationsOnDevice := current.getAnyAndroidVariant().imageLocations()
931 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_ON_HOST"+current.name, strings.Join(imageLocationsOnHost, ":"))
932 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_ON_DEVICE"+current.name, strings.Join(imageLocationsOnDevice, ":"))
Colin Cross31bf00d2019-12-04 13:16:01 -0800933 ctx.Strict("DEXPREOPT_IMAGE_ZIP_"+current.name, current.zip.String())
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000934 }
935 ctx.Strict("DEXPREOPT_IMAGE_NAMES", strings.Join(imageNames, " "))
Colin Cross800fe132019-02-11 14:21:24 -0800936 }
Colin Cross800fe132019-02-11 14:21:24 -0800937}