blob: a81ab8316d5ceff438c0a11445c99de5b784c837 [file] [log] [blame]
Colin Cross800fe132019-02-11 14:21:24 -08001// Copyright 2019 Google Inc. All rights reserved.
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15package java
16
17import (
18 "path/filepath"
19 "strings"
20
21 "android/soong/android"
22 "android/soong/dexpreopt"
23
Spandan Dasda739a32023-12-13 00:06:32 +000024 "github.com/google/blueprint"
Colin Cross800fe132019-02-11 14:21:24 -080025 "github.com/google/blueprint/proptools"
26)
27
Paul Duffin1ab61862021-01-20 17:44:53 +000028// =================================================================================================
29// WIP - see http://b/177892522 for details
30//
31// The build support for boot images is currently being migrated away from singleton to modules so
32// the documentation may not be strictly accurate. Rather than update the documentation at every
33// step which will create a lot of churn the changes that have been made will be listed here and the
34// documentation will be updated once it is closer to the final result.
35//
36// Changes:
37// 1) dex_bootjars is now a singleton module and not a plain singleton.
Paul Duffin3451e162021-01-20 15:16:56 +000038// 2) Boot images are now represented by the boot_image module type.
39// 3) The art boot image is called "art-boot-image", the framework boot image is called
40// "framework-boot-image".
41// 4) They are defined in art/build/boot/Android.bp and frameworks/base/boot/Android.bp
42// respectively.
43// 5) Each boot_image retrieves the appropriate boot image configuration from the map returned by
44// genBootImageConfigs() using the image_name specified in the boot_image module.
Paul Duffin1ab61862021-01-20 17:44:53 +000045// =================================================================================================
46
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +000047// This comment describes:
48// 1. ART boot images in general (their types, structure, file layout, etc.)
49// 2. build system support for boot images
50//
51// 1. ART boot images
52// ------------------
53//
54// A boot image in ART is a set of files that contain AOT-compiled native code and a heap snapshot
55// of AOT-initialized classes for the bootclasspath Java libraries. A boot image is compiled from a
56// set of DEX jars by the dex2oat compiler. A boot image is used for two purposes: 1) it is
57// installed on device and loaded at runtime, and 2) other Java libraries and apps are compiled
58// against it (compilation may take place either on host, known as "dexpreopt", or on device, known
59// as "dexopt").
60//
61// A boot image is not a single file, but a collection of interrelated files. Each boot image has a
62// number of components that correspond to the Java libraries that constitute it. For each component
63// there are multiple files:
64// - *.oat or *.odex file with native code (architecture-specific, one per instruction set)
65// - *.art file with pre-initialized Java classes (architecture-specific, one per instruction set)
66// - *.vdex file with verification metadata for the DEX bytecode (architecture independent)
67//
68// *.vdex files for the boot images do not contain the DEX bytecode itself, because the
69// bootclasspath DEX files are stored on disk in uncompressed and aligned form. Consequently a boot
70// image is not self-contained and cannot be used without its DEX files. To simplify the management
71// of boot image files, ART uses a certain naming scheme and associates the following metadata with
72// each boot image:
73// - A stem, which is a symbolic name that is prepended to boot image file names.
74// - A location (on-device path to the boot image files).
75// - A list of boot image locations (on-device paths to dependency boot images).
76// - A set of DEX locations (on-device paths to the DEX files, one location for one DEX file used
77// to compile the boot image).
78//
79// There are two kinds of boot images:
80// - primary boot images
81// - boot image extensions
82//
83// 1.1. Primary boot images
84// ------------------------
85//
86// A primary boot image is compiled for a core subset of bootclasspath Java libraries. It does not
87// depend on any other images, and other boot images may depend on it.
88//
89// For example, assuming that the stem is "boot", the location is /apex/com.android.art/javalib/,
90// the set of core bootclasspath libraries is A B C, and the boot image is compiled for ARM targets
91// (32 and 64 bits), it will have three components with the following files:
92// - /apex/com.android.art/javalib/{arm,arm64}/boot.{art,oat,vdex}
93// - /apex/com.android.art/javalib/{arm,arm64}/boot-B.{art,oat,vdex}
94// - /apex/com.android.art/javalib/{arm,arm64}/boot-C.{art,oat,vdex}
95//
96// The files of the first component are special: they do not have the component name appended after
97// the stem. This naming convention dates back to the times when the boot image was not split into
98// components, and there were just boot.oat and boot.art. The decision to split was motivated by
99// licensing reasons for one of the bootclasspath libraries.
100//
101// As of November 2020 the only primary boot image in Android is the image in the ART APEX
102// com.android.art. The primary ART boot image contains the Core libraries that are part of the ART
103// module. When the ART module gets updated, the primary boot image will be updated with it, and all
104// dependent images will get invalidated (the checksum of the primary image stored in dependent
105// images will not match), unless they are updated in sync with the ART module.
106//
107// 1.2. Boot image extensions
108// --------------------------
109//
110// A boot image extension is compiled for a subset of bootclasspath Java libraries (in particular,
111// this subset does not include the Core bootclasspath libraries that go into the primary boot
112// image). A boot image extension depends on the primary boot image and optionally some other boot
113// image extensions. Other images may depend on it. In other words, boot image extensions can form
114// acyclic dependency graphs.
115//
116// The motivation for boot image extensions comes from the Mainline project. Consider a situation
117// when the list of bootclasspath libraries is A B C, and both A and B are parts of the Android
118// platform, but C is part of an updatable APEX com.android.C. When the APEX is updated, the Java
119// code for C might have changed compared to the code that was used to compile the boot image.
120// Consequently, the whole boot image is obsolete and invalidated (even though the code for A and B
121// that does not depend on C is up to date). To avoid this, the original monolithic boot image is
122// split in two parts: the primary boot image that contains A B, and the boot image extension that
123// contains C and depends on the primary boot image (extends it).
124//
125// For example, assuming that the stem is "boot", the location is /system/framework, the set of
126// bootclasspath libraries is D E (where D is part of the platform and is located in
127// /system/framework, and E is part of a non-updatable APEX com.android.E and is located in
128// /apex/com.android.E/javalib), and the boot image is compiled for ARM targets (32 and 64 bits),
129// it will have two components with the following files:
130// - /system/framework/{arm,arm64}/boot-D.{art,oat,vdex}
131// - /system/framework/{arm,arm64}/boot-E.{art,oat,vdex}
132//
133// As of November 2020 the only boot image extension in Android is the Framework boot image
134// extension. It extends the primary ART boot image and contains Framework libraries and other
135// bootclasspath libraries from the platform and non-updatable APEXes that are not included in the
136// ART image. The Framework boot image extension is updated together with the platform. In the
137// future other boot image extensions may be added for some updatable modules.
138//
139//
140// 2. Build system support for boot images
141// ---------------------------------------
142//
143// The primary ART boot image needs to be compiled with one dex2oat invocation that depends on DEX
144// jars for the core libraries. Framework boot image extension needs to be compiled with one dex2oat
145// invocation that depends on the primary ART boot image and all bootclasspath DEX jars except the
Paul Duffin1ab61862021-01-20 17:44:53 +0000146// core libraries as they are already part of the primary ART boot image.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000147//
148// 2.1. Libraries that go in the boot images
149// -----------------------------------------
150//
151// The contents of each boot image are determined by the PRODUCT variables. The primary ART APEX
152// boot image contains libraries listed in the ART_APEX_JARS variable in the AOSP makefiles. The
153// Framework boot image extension contains libraries specified in the PRODUCT_BOOT_JARS and
154// PRODUCT_BOOT_JARS_EXTRA variables. The AOSP makefiles specify some common Framework libraries,
155// but more product-specific libraries can be added in the product makefiles.
156//
Martin Stjernholm1d51ea92021-07-05 20:33:42 +0100157// Each component of the PRODUCT_BOOT_JARS and PRODUCT_BOOT_JARS_EXTRA variables is a
158// colon-separated pair <apex>:<library>, where <apex> is the variant name of a non-updatable APEX,
159// "platform" if the library is a part of the platform in the system partition, or "system_ext" if
160// it's in the system_ext partition.
161//
162// In these variables APEXes are identified by their "variant names", i.e. the names they get
163// mounted as in /apex on device. In Soong modules that is the name set in the "apex_name"
164// properties, which default to the "name" values. For example, many APEXes have both
165// com.android.xxx and com.google.android.xxx modules in Soong, but take the same place
166// /apex/com.android.xxx at runtime. In these cases the variant name is always com.android.xxx,
167// regardless which APEX goes into the product. See also android.ApexInfo.ApexVariationName and
168// apex.apexBundleProperties.Apex_name.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000169//
satayevd604b212021-07-21 14:23:52 +0100170// A related variable PRODUCT_APEX_BOOT_JARS contains bootclasspath libraries that are in APEXes.
171// They are not included in the boot image. The only exception here are ART jars and core-icu4j.jar
172// that have been historically part of the boot image and are now in apexes; they are in boot images
173// and core-icu4j.jar is generally treated as being part of PRODUCT_BOOT_JARS.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000174//
175// One exception to the above rules are "coverage" builds (a special build flavor which requires
176// setting environment variable EMMA_INSTRUMENT_FRAMEWORK=true). In coverage builds the Java code in
177// boot image libraries is instrumented, which means that the instrumentation library (jacocoagent)
178// needs to be added to the list of bootclasspath DEX jars.
179//
180// In general, there is a requirement that the source code for a boot image library must be
181// available at build time (e.g. it cannot be a stub that has a separate implementation library).
182//
183// 2.2. Static configs
184// -------------------
185//
186// Because boot images are used to dexpreopt other Java modules, the paths to boot image files must
187// be known by the time dexpreopt build rules for the dependent modules are generated. Boot image
188// configs are constructed very early during the build, before build rule generation. The configs
189// provide predefined paths to boot image files (these paths depend only on static build
190// configuration, such as PRODUCT variables, and use hard-coded directory names).
191//
192// 2.3. Singleton
193// --------------
194//
195// Build rules for the boot images are generated with a Soong singleton. Because a singleton has no
196// dependencies on other modules, it has to find the modules for the DEX jars using VisitAllModules.
197// Soong loops through all modules and compares each module against a list of bootclasspath library
198// names. Then it generates build rules that copy DEX jars from their intermediate module-specific
199// locations to the hard-coded locations predefined in the boot image configs.
200//
201// It would be possible to use a module with proper dependencies instead, but that would require
202// changes in the way Soong generates variables for Make: a singleton can use one MakeVars() method
203// that writes variables to out/soong/make_vars-*.mk, which is included early by the main makefile,
204// but module(s) would have to use out/soong/Android-*.mk which has a group of LOCAL_* variables
205// for each module, and is included later.
206//
207// 2.4. Install rules
208// ------------------
209//
210// The primary boot image and the Framework extension are installed in different ways. The primary
211// boot image is part of the ART APEX: it is copied into the APEX intermediate files, packaged
212// together with other APEX contents, extracted and mounted on device. The Framework boot image
213// extension is installed by the rules defined in makefiles (make/core/dex_preopt_libart.mk). Soong
214// writes out a few DEXPREOPT_IMAGE_* variables for Make; these variables contain boot image names,
215// paths and so on.
216//
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000217
Martin Stjernholmdb513822021-02-16 19:55:58 +0000218var artApexNames = []string{
219 "com.android.art",
220 "com.android.art.debug",
Roland Levillaind603c7d2021-03-24 14:23:57 +0000221 "com.android.art.testing",
Martin Stjernholmdb513822021-02-16 19:55:58 +0000222 "com.google.android.art",
223 "com.google.android.art.debug",
224 "com.google.android.art.testing",
225}
226
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100227var (
Spandan Dasda739a32023-12-13 00:06:32 +0000228 dexpreoptBootJarDepTag = bootclasspathDependencyTag{name: "dexpreopt-boot-jar"}
229 dexBootJarsFragmentsKey = android.NewOnceKey("dexBootJarsFragments")
230 apexContributionsMetadataDepTag = dependencyTag{name: "all_apex_contributions"}
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100231)
232
Colin Cross800fe132019-02-11 14:21:24 -0800233func init() {
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000234 RegisterDexpreoptBootJarsComponents(android.InitRegistrationContext)
Colin Cross800fe132019-02-11 14:21:24 -0800235}
236
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000237// Target-independent description of a boot image.
Paul Duffina8df7e12022-10-04 15:21:47 +0100238//
239// WARNING: All fields in this struct should be initialized in the genBootImageConfigs function.
240// Failure to do so can lead to data races if there is no synchronization enforced ordering between
Colin Cross84ed5112024-01-17 12:14:44 -0800241// the writer and the reader.
Colin Cross44df5812019-02-15 23:06:46 -0800242type bootImageConfig struct {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000243 // If this image is an extension, the image that it extends.
244 extends *bootImageConfig
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000245
246 // Image name (used in directory names and ninja rule names).
247 name string
248
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100249 // If the module with the given name exists, this config is enabled.
250 enabledIfExists string
251
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000252 // Basename of the image: the resulting filenames are <stem>[-<jar>].{art,oat,vdex}.
253 stem string
254
255 // Output directory for the image files.
256 dir android.OutputPath
257
258 // Output directory for the image files with debug symbols.
259 symbolsDir android.OutputPath
260
Jiakai Zhang09d88df2023-05-10 17:04:53 +0100261 // The relative location where the image files are installed. On host, the location is relative to
262 // $ANDROID_PRODUCT_OUT.
263 //
264 // Only the configs that are built by platform_bootclasspath are installable on device. On device,
265 // the location is relative to "/".
266 installDir string
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900267
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100268 // A list of (location, jar) pairs for the Java modules in this image.
269 modules android.ConfiguredJarList
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000270
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000271 // File paths to jars.
272 dexPaths android.WritablePaths // for this image
273 dexPathsDeps android.WritablePaths // for the dependency images and in this image
274
Paul Duffin5f148ca2021-06-02 17:24:22 +0100275 // Map from module name (without prebuilt_ prefix) to the predefined build path.
276 dexPathsByModule map[string]android.WritablePath
277
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000278 // File path to a zip archive with all image files (or nil, if not needed).
279 zip android.WritablePath
David Srbeckyc177ebe2020-02-18 20:43:06 +0000280
David Srbeckyc177ebe2020-02-18 20:43:06 +0000281 // Target-dependent fields.
282 variants []*bootImageVariant
Nicolas Geoffrayb9a46fb2022-03-14 15:31:47 +0000283
284 // Path of the preloaded classes file.
285 preloadedClassesFile string
Jiakai Zhang8e9ea8b2023-02-23 17:50:46 +0000286
287 // The "--compiler-filter" argument.
288 compilerFilter string
Jiakai Zhangb8796202023-03-06 19:16:48 +0000289
290 // The "--single-image" argument.
291 singleImage bool
Jiakai Zhangc08c1622023-05-10 18:38:34 +0100292
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100293 // Profiles imported from APEXes, in addition to the profile at the default path. Each entry must
294 // be the name of an APEX module.
295 profileImports []string
David Srbeckyc177ebe2020-02-18 20:43:06 +0000296}
297
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000298// Target-dependent description of a boot image.
Paul Duffina8df7e12022-10-04 15:21:47 +0100299//
300// WARNING: The warning comment on bootImageConfig applies here too.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000301type bootImageVariant struct {
302 *bootImageConfig
303
304 // Target for which the image is generated.
305 target android.Target
306
David Srbeckyab994982020-03-30 17:24:13 +0100307 // The "locations" of jars.
308 dexLocations []string // for this image
309 dexLocationsDeps []string // for the dependency images and in this image
310
David Srbeckyc177ebe2020-02-18 20:43:06 +0000311 // Paths to image files.
Paul Duffinbff50e22021-06-04 17:25:28 +0100312 imagePathOnHost android.OutputPath // first image file path on host
313 imagePathOnDevice string // first image file path on device
David Srbeckyc177ebe2020-02-18 20:43:06 +0000314
Paul Duffinbff50e22021-06-04 17:25:28 +0100315 // All the files that constitute this image variant, i.e. .art, .oat and .vdex files.
316 imagesDeps android.OutputPaths
317
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000318 // The path to the base image variant's imagePathOnHost field, where base image variant
Paul Duffinbff50e22021-06-04 17:25:28 +0100319 // means the image variant that this extends.
320 //
321 // This is only set for a variant of an image that extends another image.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000322 baseImages android.OutputPaths
David Srbeckyc177ebe2020-02-18 20:43:06 +0000323
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000324 // The paths to the base image variant's imagesDeps field, where base image variant
Paul Duffinbff50e22021-06-04 17:25:28 +0100325 // means the image variant that this extends.
326 //
327 // This is only set for a variant of an image that extends another image.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000328 baseImagesDeps android.Paths
Paul Duffinbff50e22021-06-04 17:25:28 +0100329
Jiakai Zhang6decef92022-01-12 17:56:19 +0000330 // Rules which should be used in make to install the outputs on host.
Paul Duffina8df7e12022-10-04 15:21:47 +0100331 //
332 // Deprecated: Not initialized correctly, see struct comment.
333 installs android.RuleBuilderInstalls
334
335 // Rules which should be used in make to install the vdex outputs on host.
336 //
337 // Deprecated: Not initialized correctly, see struct comment.
338 vdexInstalls android.RuleBuilderInstalls
339
340 // Rules which should be used in make to install the unstripped outputs on host.
341 //
342 // Deprecated: Not initialized correctly, see struct comment.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000343 unstrippedInstalls android.RuleBuilderInstalls
Jiakai Zhang6decef92022-01-12 17:56:19 +0000344
Colin Crosse7fe0962022-03-15 17:49:24 -0700345 // Path to the license metadata file for the module that built the image.
Paul Duffina8df7e12022-10-04 15:21:47 +0100346 //
347 // Deprecated: Not initialized correctly, see struct comment.
Colin Crosse7fe0962022-03-15 17:49:24 -0700348 licenseMetadataFile android.OptionalPath
David Srbeckyc177ebe2020-02-18 20:43:06 +0000349}
350
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000351// Get target-specific boot image variant for the given boot image config and target.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000352func (image bootImageConfig) getVariant(target android.Target) *bootImageVariant {
353 for _, variant := range image.variants {
354 if variant.target.Os == target.Os && variant.target.Arch.ArchType == target.Arch.ArchType {
355 return variant
356 }
357 }
358 return nil
Colin Cross800fe132019-02-11 14:21:24 -0800359}
360
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000361// Return any (the first) variant which is for the device (as opposed to for the host).
David Srbeckyab994982020-03-30 17:24:13 +0100362func (image bootImageConfig) getAnyAndroidVariant() *bootImageVariant {
363 for _, variant := range image.variants {
364 if variant.target.Os == android.Android {
365 return variant
366 }
367 }
368 return nil
369}
370
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000371// Return the name of a boot image module given a boot image config and a component (module) index.
372// A module name is a combination of the Java library name, and the boot image stem (that is stored
373// in the config).
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100374func (image bootImageConfig) moduleName(ctx android.PathContext, idx int) string {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000375 // The first module of the primary boot image is special: its module name has only the stem, but
376 // not the library name. All other module names are of the form <stem>-<library name>
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100377 m := image.modules.Jar(idx)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000378 name := image.stem
David Srbecky1aacc6c2020-03-26 11:10:45 +0000379 if idx != 0 || image.extends != nil {
Jiakai Zhang4d90da22023-07-12 16:51:48 +0100380 name += "-" + android.ModuleStem(ctx.Config(), image.modules.Apex(idx), m)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000381 }
382 return name
383}
Dan Willemsen0f416782019-06-13 21:44:53 +0000384
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000385// Return the name of the first boot image module, or stem if the list of modules is empty.
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100386func (image bootImageConfig) firstModuleNameOrStem(ctx android.PathContext) string {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100387 if image.modules.Len() > 0 {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100388 return image.moduleName(ctx, 0)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000389 } else {
390 return image.stem
391 }
392}
393
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000394// Return filenames for the given boot image component, given the output directory and a list of
395// extensions.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000396func (image bootImageConfig) moduleFiles(ctx android.PathContext, dir android.OutputPath, exts ...string) android.OutputPaths {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100397 ret := make(android.OutputPaths, 0, image.modules.Len()*len(exts))
398 for i := 0; i < image.modules.Len(); i++ {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100399 name := image.moduleName(ctx, i)
Dan Willemsen0f416782019-06-13 21:44:53 +0000400 for _, ext := range exts {
401 ret = append(ret, dir.Join(ctx, name+ext))
402 }
Jiakai Zhangb8796202023-03-06 19:16:48 +0000403 if image.singleImage {
404 break
405 }
Dan Willemsen0f416782019-06-13 21:44:53 +0000406 }
Dan Willemsen0f416782019-06-13 21:44:53 +0000407 return ret
408}
409
Paul Duffin5466a362021-06-07 10:25:31 +0100410// apexVariants returns a list of all *bootImageVariant that could be included in an apex.
411func (image *bootImageConfig) apexVariants() []*bootImageVariant {
412 variants := []*bootImageVariant{}
413 for _, variant := range image.variants {
414 // We also generate boot images for host (for testing), but we don't need those in the apex.
415 // TODO(b/177892522) - consider changing this to check Os.OsClass = android.Device
416 if variant.target.Os == android.Android {
417 variants = append(variants, variant)
418 }
419 }
420 return variants
421}
422
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000423// Return boot image locations (as a list of symbolic paths).
424//
David Srbecky1aacc6c2020-03-26 11:10:45 +0000425// The image "location" is a symbolic path that, with multiarchitecture support, doesn't really
426// exist on the device. Typically it is /apex/com.android.art/javalib/boot.art and should be the
427// same for all supported architectures on the device. The concrete architecture specific files
428// actually end up in architecture-specific sub-directory such as arm, arm64, x86, or x86_64.
429//
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000430// For example a physical file /apex/com.android.art/javalib/x86/boot.art has "image location"
431// /apex/com.android.art/javalib/boot.art (which is not an actual file).
432//
433// For a primary boot image the list of locations has a single element.
434//
435// For a boot image extension the list of locations contains a location for all dependency images
436// (including the primary image) and the location of the extension itself. For example, for the
437// Framework boot image extension that depends on the primary ART boot image the list contains two
438// elements.
David Srbecky1aacc6c2020-03-26 11:10:45 +0000439//
440// The location is passed as an argument to the ART tools like dex2oat instead of the real path.
441// ART tools will then reconstruct the architecture-specific real path.
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900442func (image *bootImageVariant) imageLocations() (imageLocationsOnHost []string, imageLocationsOnDevice []string) {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000443 if image.extends != nil {
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900444 imageLocationsOnHost, imageLocationsOnDevice = image.extends.getVariant(image.target).imageLocations()
David Srbecky1aacc6c2020-03-26 11:10:45 +0000445 }
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900446 return append(imageLocationsOnHost, dexpreopt.PathToLocation(image.imagePathOnHost, image.target.Arch.ArchType)),
447 append(imageLocationsOnDevice, dexpreopt.PathStringToLocation(image.imagePathOnDevice, image.target.Arch.ArchType))
David Srbecky1aacc6c2020-03-26 11:10:45 +0000448}
449
Jiakai Zhang8e9ea8b2023-02-23 17:50:46 +0000450func (image *bootImageConfig) isProfileGuided() bool {
451 return image.compilerFilter == "speed-profile"
452}
453
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100454func (image *bootImageConfig) isEnabled(ctx android.BaseModuleContext) bool {
455 return ctx.OtherModuleExists(image.enabledIfExists)
456}
457
Paul Duffin1ab61862021-01-20 17:44:53 +0000458func dexpreoptBootJarsFactory() android.SingletonModule {
459 m := &dexpreoptBootJars{}
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100460 android.InitAndroidArchModule(m, android.DeviceSupported, android.MultilibCommon)
Paul Duffin1ab61862021-01-20 17:44:53 +0000461 return m
Colin Cross800fe132019-02-11 14:21:24 -0800462}
463
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000464func RegisterDexpreoptBootJarsComponents(ctx android.RegistrationContext) {
LaMont Jones0c10e4d2023-05-16 00:58:37 +0000465 ctx.RegisterParallelSingletonModuleType("dex_bootjars", dexpreoptBootJarsFactory)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100466 ctx.FinalDepsMutators(func(ctx android.RegisterMutatorsContext) {
467 ctx.BottomUp("dex_bootjars_deps", DexpreoptBootJarsMutator).Parallel()
468 })
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000469}
470
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000471func SkipDexpreoptBootJars(ctx android.PathContext) bool {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100472 global := dexpreopt.GetGlobalConfig(ctx)
473 return global.DisablePreoptBootImages || !shouldBuildBootImages(ctx.Config(), global)
Colin Cross800fe132019-02-11 14:21:24 -0800474}
475
Paul Duffin1ab61862021-01-20 17:44:53 +0000476// Singleton module for generating boot image build rules.
Colin Cross44df5812019-02-15 23:06:46 -0800477type dexpreoptBootJars struct {
Paul Duffin1ab61862021-01-20 17:44:53 +0000478 android.SingletonModuleBase
479
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000480 // Default boot image config (currently always the Framework boot image extension). It should be
481 // noted that JIT-Zygote builds use ART APEX image instead of the Framework boot image extension,
482 // but the switch is handled not here, but in the makefiles (triggered with
483 // DEXPREOPT_USE_ART_IMAGE=true).
David Srbeckyc177ebe2020-02-18 20:43:06 +0000484 defaultBootImage *bootImageConfig
Colin Cross2d00f0d2019-05-09 21:50:00 -0700485
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000486 // Other boot image configs (currently the list contains only the primary ART APEX image. It
487 // used to contain an experimental JIT-Zygote image (now replaced with the ART APEX image). In
488 // the future other boot image extensions may be added.
489 otherImages []*bootImageConfig
490
491 // Build path to a config file that Soong writes for Make (to be used in makefiles that install
492 // the default boot image).
Colin Cross2d00f0d2019-05-09 21:50:00 -0700493 dexpreoptConfigForMake android.WritablePath
Spandan Das29207b52024-07-30 23:28:17 +0000494
495 // Build path to the boot framework profile.
496 // This is used as the `OutputFile` in `AndroidMkEntries`.
497 // A non-nil value ensures that this singleton module does not get skipped in AndroidMkEntries processing.
498 bootFrameworkProfile android.WritablePath
Colin Cross44df5812019-02-15 23:06:46 -0800499}
Colin Cross800fe132019-02-11 14:21:24 -0800500
Spandan Dasda739a32023-12-13 00:06:32 +0000501func (dbj *dexpreoptBootJars) DepsMutator(ctx android.BottomUpMutatorContext) {
502 // Create a dependency on all_apex_contributions to determine the selected mainline module
503 ctx.AddDependency(ctx.Module(), apexContributionsMetadataDepTag, "all_apex_contributions")
504}
505
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100506func DexpreoptBootJarsMutator(ctx android.BottomUpMutatorContext) {
507 if _, ok := ctx.Module().(*dexpreoptBootJars); !ok {
508 return
509 }
510
511 if dexpreopt.IsDex2oatNeeded(ctx) {
512 // Add a dependency onto the dex2oat tool which is needed for creating the boot image. The
513 // path is retrieved from the dependency by GetGlobalSoongConfig(ctx).
514 dexpreopt.RegisterToolDeps(ctx)
515 }
516
517 imageConfigs := genBootImageConfigs(ctx)
518 for _, config := range imageConfigs {
519 if !config.isEnabled(ctx) {
520 continue
521 }
522 // For accessing the boot jars.
523 addDependenciesOntoBootImageModules(ctx, config.modules, dexpreoptBootJarDepTag)
Spandan Dasda739a32023-12-13 00:06:32 +0000524 // Create a dependency on the apex selected using RELEASE_APEX_CONTRIBUTIONS_*
525 // TODO: b/308174306 - Remove the direct depedendency edge to the java_library (source/prebuilt) once all mainline modules
526 // have been flagged using RELEASE_APEX_CONTRIBUTIONS_*
527 apexes := []string{}
528 for i := 0; i < config.modules.Len(); i++ {
529 apexes = append(apexes, config.modules.Apex(i))
530 }
531 addDependenciesOntoSelectedBootImageApexes(ctx, android.FirstUniqueStrings(apexes)...)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100532 }
533
534 if ctx.OtherModuleExists("platform-bootclasspath") {
535 // For accessing all bootclasspath fragments.
536 addDependencyOntoApexModulePair(ctx, "platform", "platform-bootclasspath", platformBootclasspathDepTag)
537 } else if ctx.OtherModuleExists("art-bootclasspath-fragment") {
538 // For accessing the ART bootclasspath fragment on a thin manifest (e.g., master-art) where
539 // platform-bootclasspath doesn't exist.
540 addDependencyOntoApexModulePair(ctx, "com.android.art", "art-bootclasspath-fragment", bootclasspathFragmentDepTag)
541 }
Paul Duffin1ab61862021-01-20 17:44:53 +0000542}
543
Spandan Dasda739a32023-12-13 00:06:32 +0000544// Create a dependency from dex_bootjars to the specific apexes selected using all_apex_contributions
545// This dependency will be used to get the path to the deapexed dex boot jars and profile (via a provider)
546func addDependenciesOntoSelectedBootImageApexes(ctx android.BottomUpMutatorContext, apexes ...string) {
547 psi := android.PrebuiltSelectionInfoMap{}
548 ctx.VisitDirectDepsWithTag(apexContributionsMetadataDepTag, func(am android.Module) {
Spandan Dasbc114d22023-12-20 01:27:29 +0000549 if info, exists := android.OtherModuleProvider(ctx, am, android.PrebuiltSelectionInfoProvider); exists {
550 psi = info
Spandan Dasda739a32023-12-13 00:06:32 +0000551 }
552 })
553 for _, apex := range apexes {
554 for _, selected := range psi.GetSelectedModulesForApiDomain(apex) {
555 // We need to add a dep on only the apex listed in `contents` of the selected apex_contributions module
556 // This is not available in a structured format in `apex_contributions`, so this hack adds a dep on all `contents`
557 // (some modules like art.module.public.api do not have an apex variation since it is a pure stub module that does not get installed)
558 apexVariationOfSelected := append(ctx.Target().Variations(), blueprint.Variation{Mutator: "apex", Variation: apex})
559 if ctx.OtherModuleDependencyVariantExists(apexVariationOfSelected, selected) {
560 ctx.AddFarVariationDependencies(apexVariationOfSelected, dexpreoptBootJarDepTag, selected)
561 }
562 }
563 }
564}
565
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100566func gatherBootclasspathFragments(ctx android.ModuleContext) map[string]android.Module {
567 return ctx.Config().Once(dexBootJarsFragmentsKey, func() interface{} {
568 fragments := make(map[string]android.Module)
569 ctx.WalkDeps(func(child, parent android.Module) bool {
Cole Fausta963b942024-04-11 17:43:00 -0700570 if !isActiveModule(ctx, child) {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100571 return false
572 }
573 tag := ctx.OtherModuleDependencyTag(child)
574 if tag == platformBootclasspathDepTag {
575 return true
576 }
577 if tag == bootclasspathFragmentDepTag {
Colin Cross313aa542023-12-13 13:47:44 -0800578 apexInfo, _ := android.OtherModuleProvider(ctx, child, android.ApexInfoProvider)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100579 for _, apex := range apexInfo.InApexVariants {
580 fragments[apex] = child
581 }
582 return false
583 }
584 return false
585 })
586 return fragments
587 }).(map[string]android.Module)
588}
Colin Cross2d00f0d2019-05-09 21:50:00 -0700589
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100590func getBootclasspathFragmentByApex(ctx android.ModuleContext, apexName string) android.Module {
591 return gatherBootclasspathFragments(ctx)[apexName]
592}
Colin Cross800fe132019-02-11 14:21:24 -0800593
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100594// GenerateAndroidBuildActions generates the build rules for boot images.
595func (d *dexpreoptBootJars) GenerateAndroidBuildActions(ctx android.ModuleContext) {
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000596 imageConfigs := genBootImageConfigs(ctx)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100597 d.defaultBootImage = defaultBootImageConfig(ctx)
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000598 d.otherImages = make([]*bootImageConfig, 0, len(imageConfigs)-1)
Colin Cross84ed5112024-01-17 12:14:44 -0800599 var profileInstalls android.RuleBuilderInstalls
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100600 for _, name := range getImageNames() {
601 config := imageConfigs[name]
602 if config != d.defaultBootImage {
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000603 d.otherImages = append(d.otherImages, config)
604 }
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100605 if !config.isEnabled(ctx) {
606 continue
607 }
Colin Cross84ed5112024-01-17 12:14:44 -0800608 installs := generateBootImage(ctx, config)
609 profileInstalls = append(profileInstalls, installs...)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100610 if config == d.defaultBootImage {
Spandan Das29207b52024-07-30 23:28:17 +0000611 bootProfile, installs := bootFrameworkProfileRule(ctx, config)
612 d.bootFrameworkProfile = bootProfile
Colin Cross84ed5112024-01-17 12:14:44 -0800613 profileInstalls = append(profileInstalls, installs...)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100614 }
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000615 }
Colin Cross84ed5112024-01-17 12:14:44 -0800616 if len(profileInstalls) > 0 {
617 android.SetProvider(ctx, profileInstallInfoProvider, profileInstallInfo{
618 profileInstalls: profileInstalls,
619 profileLicenseMetadataFile: android.OptionalPathForPath(ctx.LicenseMetadataFile()),
620 })
Justin Yun22c8aca2024-06-05 20:25:03 +0900621 for _, install := range profileInstalls {
Spandan Das29207b52024-07-30 23:28:17 +0000622 installFile(ctx, install)
Justin Yun22c8aca2024-06-05 20:25:03 +0900623 }
Colin Cross84ed5112024-01-17 12:14:44 -0800624 }
Colin Cross44df5812019-02-15 23:06:46 -0800625}
626
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100627// GenerateSingletonBuildActions generates build rules for the dexpreopt config for Make.
628func (d *dexpreoptBootJars) GenerateSingletonBuildActions(ctx android.SingletonContext) {
Jiakai Zhang7d292222024-01-18 17:27:42 +0000629 d.dexpreoptConfigForMake =
630 android.PathForOutput(ctx, dexpreopt.GetDexpreoptDirName(ctx), "dexpreopt.config")
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100631 writeGlobalConfigForMake(ctx, d.dexpreoptConfigForMake)
632}
633
Paul Duffinad19d382021-04-26 16:44:00 +0100634// shouldBuildBootImages determines whether boot images should be built.
635func shouldBuildBootImages(config android.Config, global *dexpreopt.GlobalConfig) bool {
636 // Skip recompiling the boot image for the second sanitization phase. We'll get separate paths
637 // and invalidate first-stage artifacts which are crucial to SANITIZE_LITE builds.
638 // Note: this is technically incorrect. Compiled code contains stack checks which may depend
639 // on ASAN settings.
640 if len(config.SanitizeDevice()) == 1 && config.SanitizeDevice()[0] == "address" && global.SanitizeLite {
641 return false
642 }
643 return true
644}
645
Colin Cross84ed5112024-01-17 12:14:44 -0800646func generateBootImage(ctx android.ModuleContext, imageConfig *bootImageConfig) android.RuleBuilderInstalls {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100647 apexJarModulePairs := getModulesForImage(ctx, imageConfig)
648
649 // Copy module dex jars to their predefined locations.
650 bootDexJarsByModule := extractEncodedDexJarsFromModulesOrBootclasspathFragments(ctx, apexJarModulePairs)
651 copyBootJarsToPredefinedLocations(ctx, bootDexJarsByModule, imageConfig.dexPathsByModule)
652
653 // Build a profile for the image config from the profile at the default path. The profile will
654 // then be used along with profiles imported from APEXes to build the boot image.
Colin Cross84ed5112024-01-17 12:14:44 -0800655 profile, profileInstalls := bootImageProfileRule(ctx, imageConfig)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100656
657 // If dexpreopt of boot image jars should be skipped, stop after generating a profile.
Jiakai Zhang23984422023-11-09 16:47:04 +0000658 global := dexpreopt.GetGlobalConfig(ctx)
659 if SkipDexpreoptBootJars(ctx) || (global.OnlyPreoptArtBootImage && imageConfig.name != "art") {
Colin Cross84ed5112024-01-17 12:14:44 -0800660 return profileInstalls
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100661 }
662
663 // Build boot image files for the android variants.
664 androidBootImageFiles := buildBootImageVariantsForAndroidOs(ctx, imageConfig, profile)
665
666 // Zip the android variant boot image files up.
667 buildBootImageZipInPredefinedLocation(ctx, imageConfig, androidBootImageFiles.byArch)
668
669 // Build boot image files for the host variants. There are use directly by ART host side tests.
670 buildBootImageVariantsForBuildOs(ctx, imageConfig, profile)
671
672 // Create a `dump-oat-<image-name>` rule that runs `oatdump` for debugging purposes.
673 dumpOatRules(ctx, imageConfig)
Colin Cross84ed5112024-01-17 12:14:44 -0800674
675 return profileInstalls
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100676}
677
678type apexJarModulePair struct {
Cole Faust06ea5312023-10-18 17:38:40 -0700679 apex string
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100680 jarModule android.Module
681}
682
683func getModulesForImage(ctx android.ModuleContext, imageConfig *bootImageConfig) []apexJarModulePair {
684 modules := make([]apexJarModulePair, 0, imageConfig.modules.Len())
685 for i := 0; i < imageConfig.modules.Len(); i++ {
686 found := false
687 for _, module := range gatherApexModulePairDepsWithTag(ctx, dexpreoptBootJarDepTag) {
688 name := android.RemoveOptionalPrebuiltPrefix(module.Name())
689 if name == imageConfig.modules.Jar(i) {
690 modules = append(modules, apexJarModulePair{
Cole Faust06ea5312023-10-18 17:38:40 -0700691 apex: imageConfig.modules.Apex(i),
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100692 jarModule: module,
693 })
694 found = true
695 break
696 }
697 }
698 if !found && !ctx.Config().AllowMissingDependencies() {
699 ctx.ModuleErrorf(
700 "Boot image '%s' module '%s' not added as a dependency of dex_bootjars",
701 imageConfig.name,
702 imageConfig.modules.Jar(i))
703 return []apexJarModulePair{}
704 }
705 }
706 return modules
707}
708
709// extractEncodedDexJarsFromModulesOrBootclasspathFragments gets the hidden API encoded dex jars for
710// the given modules.
711func extractEncodedDexJarsFromModulesOrBootclasspathFragments(ctx android.ModuleContext, apexJarModulePairs []apexJarModulePair) bootDexJarByModule {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000712 apexNameToApexExportInfoMap := getApexNameToApexExportsInfoMap(ctx)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100713 encodedDexJarsByModuleName := bootDexJarByModule{}
714 for _, pair := range apexJarModulePairs {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000715 dexJarPath := getDexJarForApex(ctx, pair, apexNameToApexExportInfoMap)
Spandan Das5be63332023-12-13 00:06:32 +0000716 encodedDexJarsByModuleName.addPath(pair.jarModule, dexJarPath)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100717 }
718 return encodedDexJarsByModuleName
719}
720
Spandan Das64c9e0c2023-12-20 20:13:34 +0000721type apexNameToApexExportsInfoMap map[string]android.ApexExportsInfo
722
723// javaLibraryPathOnHost returns the path to the java library which is exported by the apex for hiddenapi and dexpreopt and a boolean indicating whether the java library exists
724// For prebuilt apexes, this is created by deapexing the prebuilt apex
725func (m *apexNameToApexExportsInfoMap) javaLibraryDexPathOnHost(ctx android.ModuleContext, apex string, javalib string) (android.Path, bool) {
726 if info, exists := (*m)[apex]; exists {
727 if dex, exists := info.LibraryNameToDexJarPathOnHost[javalib]; exists {
728 return dex, true
729 } else {
730 ctx.ModuleErrorf("Apex %s does not provide a dex boot jar for library %s\n", apex, javalib)
731 }
732 }
733 // An apex entry could not be found. Return false.
734 // TODO: b/308174306 - When all the mainline modules have been flagged, make this a hard error
735 return nil, false
736}
737
Spandan Das161e4682024-01-19 00:22:22 +0000738// Returns the stem of an artifact inside a prebuilt apex
739func ModuleStemForDeapexing(m android.Module) string {
740 bmn, _ := m.(interface{ BaseModuleName() string })
741 return bmn.BaseModuleName()
742}
743
Spandan Das5be63332023-12-13 00:06:32 +0000744// Returns the java libraries exported by the apex for hiddenapi and dexpreopt
745// This information can come from two mechanisms
746// 1. New: Direct deps to _selected_ apexes. The apexes return a ApexExportsInfo
747// 2. Legacy: An edge to java_library or java_import (java_sdk_library) module. For prebuilt apexes, this serves as a hook and is populated by deapexers of prebuilt apxes
748// TODO: b/308174306 - Once all mainline modules have been flagged, drop (2)
Spandan Das64c9e0c2023-12-20 20:13:34 +0000749func getDexJarForApex(ctx android.ModuleContext, pair apexJarModulePair, apexNameToApexExportsInfoMap apexNameToApexExportsInfoMap) android.Path {
Spandan Das161e4682024-01-19 00:22:22 +0000750 if dex, found := apexNameToApexExportsInfoMap.javaLibraryDexPathOnHost(ctx, pair.apex, ModuleStemForDeapexing(pair.jarModule)); found {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000751 return dex
Spandan Das5be63332023-12-13 00:06:32 +0000752 }
753 // TODO: b/308174306 - Remove the legacy mechanism
754 if android.IsConfiguredJarForPlatform(pair.apex) || android.IsModulePrebuilt(pair.jarModule) {
755 // This gives us the dex jar with the hidden API flags encoded from the monolithic hidden API
756 // files or the dex jar extracted from a prebuilt APEX. We can't use this for a boot jar for
757 // a source APEX because there is no guarantee that it is the same as the jar packed into the
758 // APEX. In practice, they are the same when we are building from a full source tree, but they
759 // are different when we are building from a thin manifest (e.g., master-art), where there is
760 // no monolithic hidden API files at all.
761 return retrieveEncodedBootDexJarFromModule(ctx, pair.jarModule)
762 } else {
763 // Use exactly the same jar that is packed into the APEX.
764 fragment := getBootclasspathFragmentByApex(ctx, pair.apex)
765 if fragment == nil {
766 ctx.ModuleErrorf("Boot jar '%[1]s' is from APEX '%[2]s', but a bootclasspath_fragment for "+
767 "APEX '%[2]s' doesn't exist or is not added as a dependency of dex_bootjars",
768 pair.jarModule.Name(),
769 pair.apex)
770 }
771 bootclasspathFragmentInfo, _ := android.OtherModuleProvider(ctx, fragment, BootclasspathFragmentApexContentInfoProvider)
772 jar, err := bootclasspathFragmentInfo.DexBootJarPathForContentModule(pair.jarModule)
773 if err != nil {
774 ctx.ModuleErrorf("%s", err)
775 }
776 return jar
777 }
778 return nil
779}
780
Paul Duffin5f148ca2021-06-02 17:24:22 +0100781// copyBootJarsToPredefinedLocations generates commands that will copy boot jars to predefined
782// paths in the global config.
783func copyBootJarsToPredefinedLocations(ctx android.ModuleContext, srcBootDexJarsByModule bootDexJarByModule, dstBootJarsByModule map[string]android.WritablePath) {
784 // Create the super set of module names.
785 names := []string{}
Cole Faust18994c72023-02-28 16:02:16 -0800786 names = append(names, android.SortedKeys(srcBootDexJarsByModule)...)
787 names = append(names, android.SortedKeys(dstBootJarsByModule)...)
Paul Duffin5f148ca2021-06-02 17:24:22 +0100788 names = android.SortedUniqueStrings(names)
789 for _, name := range names {
790 src := srcBootDexJarsByModule[name]
791 dst := dstBootJarsByModule[name]
Paul Duffin7ebebfd2021-04-27 19:36:57 +0100792
Paul Duffin5f148ca2021-06-02 17:24:22 +0100793 if src == nil {
Martin Stjernholmed3df442021-12-08 16:26:07 +0000794 // A dex boot jar should be provided by the source java module. It needs to be installable or
795 // have compile_dex=true - cf. assignments to java.Module.dexJarFile.
796 //
797 // However, the source java module may be either replaced or overridden (using prefer:true) by
798 // a prebuilt java module with the same name. In that case the dex boot jar needs to be
799 // provided by the corresponding prebuilt APEX module. That APEX is the one that refers
800 // through a exported_(boot|systemserver)classpath_fragments property to a
801 // prebuilt_(boot|systemserver)classpath_fragment module, which in turn lists the prebuilt
802 // java module in the contents property. If that chain is broken then this dependency will
803 // fail.
Spandan Das10ea4bf2021-08-20 19:18:16 +0000804 if !ctx.Config().AllowMissingDependencies() {
Martin Stjernholmed3df442021-12-08 16:26:07 +0000805 ctx.ModuleErrorf("module %s does not provide a dex boot jar (see comment next to this message in Soong for details)", name)
Spandan Das10ea4bf2021-08-20 19:18:16 +0000806 } else {
807 ctx.AddMissingDependencies([]string{name})
808 }
Paul Duffin5f148ca2021-06-02 17:24:22 +0100809 } else if dst == nil {
810 ctx.ModuleErrorf("module %s is not part of the boot configuration", name)
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100811 } else {
812 ctx.Build(pctx, android.BuildParams{
813 Rule: android.Cp,
Paul Duffin5f148ca2021-06-02 17:24:22 +0100814 Input: src,
815 Output: dst,
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100816 })
817 }
818 }
Ulya Trafimovichfa2b1cf2021-03-22 12:37:10 +0000819}
820
Paul Duffina56be7d2021-07-02 13:00:43 +0100821// buildBootImageVariantsForAndroidOs generates rules to build the boot image variants for the
822// android.Android OsType and returns a map from the architectures to the paths of the generated
823// boot image files.
824//
825// The paths are returned because they are needed elsewhere in Soong, e.g. for populating an APEX.
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100826func buildBootImageVariantsForAndroidOs(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath) bootImageOutputs {
Paul Duffina56be7d2021-07-02 13:00:43 +0100827 return buildBootImageForOsType(ctx, image, profile, android.Android)
828}
829
830// buildBootImageVariantsForBuildOs generates rules to build the boot image variants for the
Colin Cross0c66bc62021-07-20 09:47:41 -0700831// config.BuildOS OsType, i.e. the type of OS on which the build is being running.
Paul Duffina56be7d2021-07-02 13:00:43 +0100832//
833// The files need to be generated into their predefined location because they are used from there
834// both within Soong and outside, e.g. for ART based host side testing and also for use by some
835// cloud based tools. However, they are not needed by callers of this function and so the paths do
836// not need to be returned from this func, unlike the buildBootImageVariantsForAndroidOs func.
837func buildBootImageVariantsForBuildOs(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath) {
Colin Cross0c66bc62021-07-20 09:47:41 -0700838 buildBootImageForOsType(ctx, image, profile, ctx.Config().BuildOS)
Paul Duffina56be7d2021-07-02 13:00:43 +0100839}
840
Jiakai Zhangb47cacc2023-05-10 16:40:18 +0100841// bootImageFilesByArch is a map from android.ArchType to the paths to the boot image files.
842//
843// The paths include the .art, .oat and .vdex files, one for each of the modules from which the boot
844// image is created.
845type bootImageFilesByArch map[android.ArchType]android.Paths
846
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100847// bootImageOutputs encapsulates information about boot images that were created/obtained by
848// commonBootclasspathFragment.produceBootImageFiles.
849type bootImageOutputs struct {
850 // Map from arch to the paths to the boot image files created/obtained for that arch.
851 byArch bootImageFilesByArch
852
Paul Duffine10a9f22022-10-04 16:39:18 +0100853 variants []bootImageVariantOutputs
854
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100855 // The path to the profile file created/obtained for the boot image.
856 profile android.WritablePath
857}
858
Paul Duffina56be7d2021-07-02 13:00:43 +0100859// buildBootImageForOsType takes a bootImageConfig, a profile file and an android.OsType
860// boot image files are required for and it creates rules to build the boot image
861// files for all the required architectures for them.
Paul Duffin56afb272021-07-01 22:04:22 +0100862//
863// It returns a map from android.ArchType to the predefined paths of the boot image files.
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100864func buildBootImageForOsType(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath, requiredOsType android.OsType) bootImageOutputs {
Paul Duffin56afb272021-07-01 22:04:22 +0100865 filesByArch := bootImageFilesByArch{}
Paul Duffine10a9f22022-10-04 16:39:18 +0100866 imageOutputs := bootImageOutputs{
867 byArch: filesByArch,
868 profile: profile,
869 }
David Srbeckyc177ebe2020-02-18 20:43:06 +0000870 for _, variant := range image.variants {
Paul Duffina56be7d2021-07-02 13:00:43 +0100871 if variant.target.Os == requiredOsType {
Paul Duffine10a9f22022-10-04 16:39:18 +0100872 variantOutputs := buildBootImageVariant(ctx, variant, profile)
873 imageOutputs.variants = append(imageOutputs.variants, variantOutputs)
Paul Duffin56afb272021-07-01 22:04:22 +0100874 filesByArch[variant.target.Arch.ArchType] = variant.imagesDeps.Paths()
Ulya Trafimovich9ab49332020-06-10 15:44:25 +0100875 }
Colin Cross800fe132019-02-11 14:21:24 -0800876 }
Colin Cross44df5812019-02-15 23:06:46 -0800877
Paul Duffine10a9f22022-10-04 16:39:18 +0100878 return imageOutputs
Paul Duffin56afb272021-07-01 22:04:22 +0100879}
Colin Crossdf8eebe2019-04-09 15:29:41 -0700880
Paul Duffin56afb272021-07-01 22:04:22 +0100881// buildBootImageZipInPredefinedLocation generates a zip file containing all the boot image files.
882//
883// The supplied filesByArch is nil when the boot image files have not been generated. Otherwise, it
884// is a map from android.ArchType to the predefined locations.
885func buildBootImageZipInPredefinedLocation(ctx android.ModuleContext, image *bootImageConfig, filesByArch bootImageFilesByArch) {
886 if filesByArch == nil {
887 return
Colin Crossdf8eebe2019-04-09 15:29:41 -0700888 }
Paul Duffin56afb272021-07-01 22:04:22 +0100889
890 // Compute the list of files from all the architectures.
891 zipFiles := android.Paths{}
892 for _, archType := range android.ArchTypeList() {
893 zipFiles = append(zipFiles, filesByArch[archType]...)
894 }
895
896 rule := android.NewRuleBuilder(pctx, ctx)
897 rule.Command().
898 BuiltTool("soong_zip").
899 FlagWithOutput("-o ", image.zip).
900 FlagWithArg("-C ", image.dir.Join(ctx, android.Android.String()).String()).
901 FlagWithInputList("-f ", zipFiles, " -f ")
902
903 rule.Build("zip_"+image.name, "zip "+image.name+" image")
Colin Cross800fe132019-02-11 14:21:24 -0800904}
905
Paul Duffine10a9f22022-10-04 16:39:18 +0100906type bootImageVariantOutputs struct {
Jiakai Zhangb47cacc2023-05-10 16:40:18 +0100907 config *bootImageVariant
Paul Duffine10a9f22022-10-04 16:39:18 +0100908}
909
Spandan Dasda739a32023-12-13 00:06:32 +0000910// Returns the profile file for an apex
911// This information can come from two mechanisms
912// 1. New: Direct deps to _selected_ apexes. The apexes return a BootclasspathFragmentApexContentInfo
913// 2. Legacy: An edge to bootclasspath_fragment module. For prebuilt apexes, this serves as a hook and is populated by deapexers of prebuilt apxes
914// TODO: b/308174306 - Once all mainline modules have been flagged, drop (2)
915func getProfilePathForApex(ctx android.ModuleContext, apexName string, apexNameToBcpInfoMap map[string]android.ApexExportsInfo) android.Path {
916 if info, exists := apexNameToBcpInfoMap[apexName]; exists {
917 return info.ProfilePathOnHost
918 }
919 // TODO: b/308174306 - Remove the legacy mechanism
920 fragment := getBootclasspathFragmentByApex(ctx, apexName)
921 if fragment == nil {
922 ctx.ModuleErrorf("Boot image config imports profile from '%[2]s', but a "+
923 "bootclasspath_fragment for APEX '%[2]s' doesn't exist or is not added as a "+
924 "dependency of dex_bootjars",
925 apexName)
926 return nil
927 }
928 return fragment.(commonBootclasspathFragment).getProfilePath()
929}
930
Spandan Das64c9e0c2023-12-20 20:13:34 +0000931func getApexNameToApexExportsInfoMap(ctx android.ModuleContext) apexNameToApexExportsInfoMap {
932 apexNameToApexExportsInfoMap := apexNameToApexExportsInfoMap{}
Spandan Das5be63332023-12-13 00:06:32 +0000933 ctx.VisitDirectDepsWithTag(dexpreoptBootJarDepTag, func(am android.Module) {
934 if info, exists := android.OtherModuleProvider(ctx, am, android.ApexExportsInfoProvider); exists {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000935 apexNameToApexExportsInfoMap[info.ApexName] = info
Spandan Das5be63332023-12-13 00:06:32 +0000936 }
937 })
Spandan Das64c9e0c2023-12-20 20:13:34 +0000938 return apexNameToApexExportsInfoMap
Spandan Das5be63332023-12-13 00:06:32 +0000939}
940
Justin Yun22c8aca2024-06-05 20:25:03 +0900941func packageFileForTargetImage(ctx android.ModuleContext, image *bootImageVariant) {
942 if image.target.Os != ctx.Os() {
943 // This is not for the target device.
944 return
945 }
946
947 for _, install := range image.installs {
Spandan Das29207b52024-07-30 23:28:17 +0000948 installFile(ctx, install)
Justin Yun22c8aca2024-06-05 20:25:03 +0900949 }
950
951 for _, install := range image.vdexInstalls {
Spandan Das71559432024-07-30 23:28:17 +0000952 installPath, relDir, name := getModuleInstallPathInfo(ctx, install.To)
953 if name == "" {
954 continue
955 }
956 // Note that the vdex files are identical between architectures. Copy the vdex to a no arch directory
957 // and create symlinks for both the primary and secondary arches.
958 ctx.InstallSymlink(installPath.Join(ctx, relDir), name, installPath.Join(ctx, "framework", name))
959 if image.target.Arch.ArchType.Name == ctx.DeviceConfig().DeviceArch() {
960 // Copy the vdex from the primary arch to the no-arch directory
961 // e.g. /system/framework/$bootjar.vdex
962 ctx.InstallFile(installPath.Join(ctx, "framework"), name, install.From)
Justin Yun22c8aca2024-06-05 20:25:03 +0900963 }
964 }
965}
966
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000967// Generate boot image build rules for a specific target.
Paul Duffine10a9f22022-10-04 16:39:18 +0100968func buildBootImageVariant(ctx android.ModuleContext, image *bootImageVariant, profile android.Path) bootImageVariantOutputs {
Colin Cross800fe132019-02-11 14:21:24 -0800969
Paul Duffin8fc51a82021-07-06 10:55:35 +0100970 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000971 global := dexpreopt.GetGlobalConfig(ctx)
Colin Cross44df5812019-02-15 23:06:46 -0800972
David Srbeckyc177ebe2020-02-18 20:43:06 +0000973 arch := image.target.Arch.ArchType
David Srbecky7f8dac12020-02-13 16:00:45 +0000974 os := image.target.Os.String() // We need to distinguish host-x86 and device-x86.
Jiakai Zhang09d88df2023-05-10 17:04:53 +0100975 symbolsDir := image.symbolsDir.Join(ctx, os, image.installDir, arch.String())
Ulyana Trafimovichde534412019-11-08 10:51:01 +0000976 symbolsFile := symbolsDir.Join(ctx, image.stem+".oat")
Jiakai Zhang09d88df2023-05-10 17:04:53 +0100977 outputDir := image.dir.Join(ctx, os, image.installDir, arch.String())
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000978 outputPath := outputDir.Join(ctx, image.stem+".oat")
979 oatLocation := dexpreopt.PathToLocation(outputPath, arch)
980 imagePath := outputPath.ReplaceExtension(ctx, "art")
Colin Cross800fe132019-02-11 14:21:24 -0800981
Colin Crossf1a035e2020-11-16 17:32:30 -0800982 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -0800983
984 rule.Command().Text("mkdir").Flag("-p").Flag(symbolsDir.String())
985 rule.Command().Text("rm").Flag("-f").
986 Flag(symbolsDir.Join(ctx, "*.art").String()).
987 Flag(symbolsDir.Join(ctx, "*.oat").String()).
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100988 Flag(symbolsDir.Join(ctx, "*.vdex").String()).
Colin Cross800fe132019-02-11 14:21:24 -0800989 Flag(symbolsDir.Join(ctx, "*.invocation").String())
990 rule.Command().Text("rm").Flag("-f").
991 Flag(outputDir.Join(ctx, "*.art").String()).
992 Flag(outputDir.Join(ctx, "*.oat").String()).
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100993 Flag(outputDir.Join(ctx, "*.vdex").String()).
Colin Cross800fe132019-02-11 14:21:24 -0800994 Flag(outputDir.Join(ctx, "*.invocation").String())
995
996 cmd := rule.Command()
997
998 extraFlags := ctx.Config().Getenv("ART_BOOT_IMAGE_EXTRA_ARGS")
999 if extraFlags == "" {
1000 // Use ANDROID_LOG_TAGS to suppress most logging by default...
1001 cmd.Text(`ANDROID_LOG_TAGS="*:e"`)
1002 } else {
1003 // ...unless the boot image is generated specifically for testing, then allow all logging.
1004 cmd.Text(`ANDROID_LOG_TAGS="*:v"`)
1005 }
1006
1007 invocationPath := outputPath.ReplaceExtension(ctx, "invocation")
1008
Spandan Das64c9e0c2023-12-20 20:13:34 +00001009 apexNameToApexExportsInfoMap := getApexNameToApexExportsInfoMap(ctx)
Spandan Dasda739a32023-12-13 00:06:32 +00001010
Martin Stjernholm75a48d82020-01-10 20:32:59 +00001011 cmd.Tool(globalSoong.Dex2oat).
Colin Cross800fe132019-02-11 14:21:24 -08001012 Flag("--avoid-storing-invocation").
Colin Cross69f59a32019-02-15 10:39:37 -08001013 FlagWithOutput("--write-invocation-to=", invocationPath).ImplicitOutput(invocationPath).
Colin Cross44df5812019-02-15 23:06:46 -08001014 Flag("--runtime-arg").FlagWithArg("-Xms", global.Dex2oatImageXms).
1015 Flag("--runtime-arg").FlagWithArg("-Xmx", global.Dex2oatImageXmx)
Colin Cross800fe132019-02-11 14:21:24 -08001016
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001017 if image.isProfileGuided() && !global.DisableGenerateProfile {
1018 if profile != nil {
1019 cmd.FlagWithInput("--profile-file=", profile)
1020 }
Colin Cross800fe132019-02-11 14:21:24 -08001021
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001022 for _, apex := range image.profileImports {
Spandan Das64c9e0c2023-12-20 20:13:34 +00001023 importedProfile := getProfilePathForApex(ctx, apex, apexNameToApexExportsInfoMap)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001024 if importedProfile == nil {
1025 ctx.ModuleErrorf("Boot image config '%[1]s' imports profile from '%[2]s', but '%[2]s' "+
1026 "doesn't provide a profile",
1027 image.name,
1028 apex)
1029 return bootImageVariantOutputs{}
1030 }
1031 cmd.FlagWithInput("--profile-file=", importedProfile)
Jiakai Zhangc08c1622023-05-10 18:38:34 +01001032 }
Jiakai Zhangc08c1622023-05-10 18:38:34 +01001033 }
1034
Nicolas Geoffray1086e602021-01-20 14:30:40 +00001035 dirtyImageFile := "frameworks/base/config/dirty-image-objects"
1036 dirtyImagePath := android.ExistentPathForSource(ctx, dirtyImageFile)
1037 if dirtyImagePath.Valid() {
1038 cmd.FlagWithInput("--dirty-image-objects=", dirtyImagePath.Path())
Colin Cross800fe132019-02-11 14:21:24 -08001039 }
1040
David Srbecky1aacc6c2020-03-26 11:10:45 +00001041 if image.extends != nil {
Jiakai Zhang8fe3a412023-02-23 17:37:16 +00001042 // It is a boot image extension, so it needs the boot images that it depends on.
1043 baseImageLocations := make([]string, 0, len(image.baseImages))
1044 for _, image := range image.baseImages {
1045 baseImageLocations = append(baseImageLocations, dexpreopt.PathToLocation(image, arch))
1046 }
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001047 cmd.
1048 Flag("--runtime-arg").FlagWithInputList("-Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
1049 Flag("--runtime-arg").FlagWithList("-Xbootclasspath-locations:", image.dexLocationsDeps, ":").
Paul Duffinbff50e22021-06-04 17:25:28 +01001050 // Add the path to the first file in the boot image with the arch specific directory removed,
1051 // dex2oat will reconstruct the path to the actual file when it needs it. As the actual path
1052 // to the file cannot be passed to the command make sure to add the actual path as an Implicit
1053 // dependency to ensure that it is built before the command runs.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +00001054 FlagWithList("--boot-image=", baseImageLocations, ":").Implicits(image.baseImages.Paths()).
Paul Duffinbff50e22021-06-04 17:25:28 +01001055 // Similarly, the dex2oat tool will automatically find the paths to other files in the base
1056 // boot image so make sure to add them as implicit dependencies to ensure that they are built
1057 // before this command is run.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +00001058 Implicits(image.baseImagesDeps)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001059 } else {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +00001060 // It is a primary image, so it needs a base address.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001061 cmd.FlagWithArg("--base=", ctx.Config().LibartImgDeviceBaseAddress())
1062 }
1063
Jiakai Zhang8e9ea8b2023-02-23 17:50:46 +00001064 if len(image.preloadedClassesFile) > 0 {
1065 // We always expect a preloaded classes file to be available. However, if we cannot find it, it's
1066 // OK to not pass the flag to dex2oat.
1067 preloadedClassesPath := android.ExistentPathForSource(ctx, image.preloadedClassesFile)
1068 if preloadedClassesPath.Valid() {
1069 cmd.FlagWithInput("--preloaded-classes=", preloadedClassesPath.Path())
1070 }
Nicolas Geoffrayb9a46fb2022-03-14 15:31:47 +00001071 }
1072
Colin Cross800fe132019-02-11 14:21:24 -08001073 cmd.
Colin Cross44df5812019-02-15 23:06:46 -08001074 FlagForEachInput("--dex-file=", image.dexPaths.Paths()).
1075 FlagForEachArg("--dex-location=", image.dexLocations).
Colin Cross800fe132019-02-11 14:21:24 -08001076 Flag("--generate-debug-info").
1077 Flag("--generate-build-id").
Mathieu Chartier54fd8072019-07-26 13:50:04 -07001078 Flag("--image-format=lz4hc").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001079 FlagWithArg("--oat-symbols=", symbolsFile.String()).
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001080 FlagWithArg("--oat-file=", outputPath.String()).
Colin Cross800fe132019-02-11 14:21:24 -08001081 FlagWithArg("--oat-location=", oatLocation).
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001082 FlagWithArg("--image=", imagePath.String()).
Colin Cross800fe132019-02-11 14:21:24 -08001083 FlagWithArg("--instruction-set=", arch.String()).
Colin Cross44df5812019-02-15 23:06:46 -08001084 FlagWithArg("--android-root=", global.EmptyDirectory).
Colin Cross800fe132019-02-11 14:21:24 -08001085 FlagWithArg("--no-inline-from=", "core-oj.jar").
Ulya Trafimovichc0c98d52020-03-09 12:46:06 +00001086 Flag("--force-determinism").
Jiakai Zhang63086d72023-02-28 15:13:44 +00001087 Flag("--abort-on-hard-verifier-error")
1088
Nicolas Geoffray1ad8a132023-06-28 21:34:44 +01001089 // We don't strip on host to make perf tools work.
1090 if image.target.Os == android.Android {
1091 cmd.Flag("--strip")
1092 }
1093
Jiakai Zhang63086d72023-02-28 15:13:44 +00001094 // If the image is profile-guided but the profile is disabled, we omit "--compiler-filter" to
1095 // leave the decision to dex2oat to pick the compiler filter.
1096 if !(image.isProfileGuided() && global.DisableGenerateProfile) {
1097 cmd.FlagWithArg("--compiler-filter=", image.compilerFilter)
1098 }
Colin Cross800fe132019-02-11 14:21:24 -08001099
Jiakai Zhangb8796202023-03-06 19:16:48 +00001100 if image.singleImage {
1101 cmd.Flag("--single-image")
1102 }
1103
David Srbecky7f8dac12020-02-13 16:00:45 +00001104 // Use the default variant/features for host builds.
1105 // The map below contains only device CPU info (which might be x86 on some devices).
1106 if image.target.Os == android.Android {
1107 cmd.FlagWithArg("--instruction-set-variant=", global.CpuVariant[arch])
1108 cmd.FlagWithArg("--instruction-set-features=", global.InstructionSetFeatures[arch])
1109 }
1110
Jiakai Zhang7d292222024-01-18 17:27:42 +00001111 if image.target.Os == android.Android {
1112 cmd.Text("$(cat").Input(globalSoong.UffdGcFlag).Text(")")
Jiakai Zhang616be062022-11-16 11:50:59 +00001113 }
1114
Colin Cross44df5812019-02-15 23:06:46 -08001115 if global.BootFlags != "" {
1116 cmd.Flag(global.BootFlags)
Colin Cross800fe132019-02-11 14:21:24 -08001117 }
1118
1119 if extraFlags != "" {
1120 cmd.Flag(extraFlags)
1121 }
1122
Colin Cross0b9f31f2019-02-28 11:00:01 -08001123 cmd.Textf(`|| ( echo %s ; false )`, proptools.ShellEscape(failureMessage))
Colin Cross800fe132019-02-11 14:21:24 -08001124
Jiakai Zhang09d88df2023-05-10 17:04:53 +01001125 installDir := filepath.Dir(image.imagePathOnDevice)
Colin Cross800fe132019-02-11 14:21:24 -08001126
Colin Cross800fe132019-02-11 14:21:24 -08001127 var vdexInstalls android.RuleBuilderInstalls
1128 var unstrippedInstalls android.RuleBuilderInstalls
1129
Dan Willemsen0f416782019-06-13 21:44:53 +00001130 for _, artOrOat := range image.moduleFiles(ctx, outputDir, ".art", ".oat") {
1131 cmd.ImplicitOutput(artOrOat)
Colin Cross800fe132019-02-11 14:21:24 -08001132
Dan Willemsen0f416782019-06-13 21:44:53 +00001133 // Install the .oat and .art files
1134 rule.Install(artOrOat, filepath.Join(installDir, artOrOat.Base()))
1135 }
Colin Cross800fe132019-02-11 14:21:24 -08001136
Dan Willemsen0f416782019-06-13 21:44:53 +00001137 for _, vdex := range image.moduleFiles(ctx, outputDir, ".vdex") {
1138 cmd.ImplicitOutput(vdex)
Colin Cross800fe132019-02-11 14:21:24 -08001139
David Srbecky7f8dac12020-02-13 16:00:45 +00001140 // Note that the vdex files are identical between architectures.
1141 // Make rules will create symlinks to share them between architectures.
Colin Cross800fe132019-02-11 14:21:24 -08001142 vdexInstalls = append(vdexInstalls,
David Srbecky7f8dac12020-02-13 16:00:45 +00001143 android.RuleBuilderInstall{vdex, filepath.Join(installDir, vdex.Base())})
Dan Willemsen0f416782019-06-13 21:44:53 +00001144 }
1145
1146 for _, unstrippedOat := range image.moduleFiles(ctx, symbolsDir, ".oat") {
1147 cmd.ImplicitOutput(unstrippedOat)
Colin Cross800fe132019-02-11 14:21:24 -08001148
1149 // Install the unstripped oat files. The Make rules will put these in $(TARGET_OUT_UNSTRIPPED)
1150 unstrippedInstalls = append(unstrippedInstalls,
Colin Cross69f59a32019-02-15 10:39:37 -08001151 android.RuleBuilderInstall{unstrippedOat, filepath.Join(installDir, unstrippedOat.Base())})
Colin Cross800fe132019-02-11 14:21:24 -08001152 }
1153
Colin Crossf1a035e2020-11-16 17:32:30 -08001154 rule.Build(image.name+"JarsDexpreopt_"+image.target.String(), "dexpreopt "+image.name+" jars "+arch.String())
Colin Cross800fe132019-02-11 14:21:24 -08001155
1156 // save output and installed files for makevars
Paul Duffin20d90e32022-10-04 20:01:04 +01001157 // TODO - these are always the same and so should be initialized in genBootImageConfigs
David Srbeckyc177ebe2020-02-18 20:43:06 +00001158 image.installs = rule.Installs()
1159 image.vdexInstalls = vdexInstalls
1160 image.unstrippedInstalls = unstrippedInstalls
Justin Yun22c8aca2024-06-05 20:25:03 +09001161 packageFileForTargetImage(ctx, image)
Paul Duffin20d90e32022-10-04 20:01:04 +01001162
1163 // Only set the licenseMetadataFile from the active module.
Cole Fausta963b942024-04-11 17:43:00 -07001164 if isActiveModule(ctx, ctx.Module()) {
Paul Duffin20d90e32022-10-04 20:01:04 +01001165 image.licenseMetadataFile = android.OptionalPathForPath(ctx.LicenseMetadataFile())
1166 }
Paul Duffine10a9f22022-10-04 16:39:18 +01001167
1168 return bootImageVariantOutputs{
1169 image,
Paul Duffine10a9f22022-10-04 16:39:18 +01001170 }
Colin Cross800fe132019-02-11 14:21:24 -08001171}
1172
1173const failureMessage = `ERROR: Dex2oat failed to compile a boot image.
1174It is likely that the boot classpath is inconsistent.
1175Rebuild with ART_BOOT_IMAGE_EXTRA_ARGS="--runtime-arg -verbose:verifier" to see verification errors.`
1176
Jiakai Zhang3444e562023-07-11 15:13:35 +01001177func bootImageProfileRuleCommon(ctx android.ModuleContext, name string, dexFiles android.Paths, dexLocations []string) android.WritablePath {
Paul Duffin8fc51a82021-07-06 10:55:35 +01001178 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001179 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +00001180
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +00001181 if global.DisableGenerateProfile {
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +00001182 return nil
1183 }
Colin Cross800fe132019-02-11 14:21:24 -08001184
Paul Duffin58612422021-04-26 12:51:07 +01001185 defaultProfile := "frameworks/base/config/boot-image-profile.txt"
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001186 extraProfile := "frameworks/base/config/boot-image-profile-extra.txt"
Colin Cross800fe132019-02-11 14:21:24 -08001187
Paul Duffin58612422021-04-26 12:51:07 +01001188 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -08001189
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001190 var profiles android.Paths
1191 if len(global.BootImageProfiles) > 0 {
1192 profiles = append(profiles, global.BootImageProfiles...)
Paul Duffin58612422021-04-26 12:51:07 +01001193 } else if path := android.ExistentPathForSource(ctx, defaultProfile); path.Valid() {
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001194 profiles = append(profiles, path.Path())
Paul Duffin58612422021-04-26 12:51:07 +01001195 } else {
1196 // No profile (not even a default one, which is the case on some branches
1197 // like master-art-host that don't have frameworks/base).
1198 // Return nil and continue without profile.
1199 return nil
Ulyana Trafimovichde534412019-11-08 10:51:01 +00001200 }
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001201 if path := android.ExistentPathForSource(ctx, extraProfile); path.Valid() {
1202 profiles = append(profiles, path.Path())
1203 }
Jiakai Zhang3444e562023-07-11 15:13:35 +01001204 bootImageProfile := android.PathForModuleOut(ctx, name, "boot-image-profile.txt")
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001205 rule.Command().Text("cat").Inputs(profiles).Text(">").Output(bootImageProfile)
Colin Cross800fe132019-02-11 14:21:24 -08001206
Jiakai Zhang3444e562023-07-11 15:13:35 +01001207 profile := android.PathForModuleOut(ctx, name, "boot.prof")
Paul Duffin58612422021-04-26 12:51:07 +01001208
1209 rule.Command().
1210 Text(`ANDROID_LOG_TAGS="*:e"`).
1211 Tool(globalSoong.Profman).
1212 Flag("--output-profile-type=boot").
1213 FlagWithInput("--create-profile-from=", bootImageProfile).
Jiakai Zhang3444e562023-07-11 15:13:35 +01001214 FlagForEachInput("--apk=", dexFiles).
1215 FlagForEachArg("--dex-location=", dexLocations).
Paul Duffin58612422021-04-26 12:51:07 +01001216 FlagWithOutput("--reference-profile-file=", profile)
1217
Jiakai Zhang3444e562023-07-11 15:13:35 +01001218 rule.Build("bootJarsProfile_"+name, "profile boot jars "+name)
1219
1220 return profile
1221}
1222
Colin Cross84ed5112024-01-17 12:14:44 -08001223type profileInstallInfo struct {
1224 // Rules which should be used in make to install the outputs.
1225 profileInstalls android.RuleBuilderInstalls
1226
1227 // Path to the license metadata file for the module that built the profile.
1228 profileLicenseMetadataFile android.OptionalPath
1229}
1230
1231var profileInstallInfoProvider = blueprint.NewProvider[profileInstallInfo]()
1232
1233func bootImageProfileRule(ctx android.ModuleContext, image *bootImageConfig) (android.WritablePath, android.RuleBuilderInstalls) {
Jiakai Zhang3444e562023-07-11 15:13:35 +01001234 if !image.isProfileGuided() {
Colin Cross84ed5112024-01-17 12:14:44 -08001235 return nil, nil
Jiakai Zhang3444e562023-07-11 15:13:35 +01001236 }
1237
1238 profile := bootImageProfileRuleCommon(ctx, image.name, image.dexPathsDeps.Paths(), image.getAnyAndroidVariant().dexLocationsDeps)
1239
Spandan Das29207b52024-07-30 23:28:17 +00001240 if image == defaultBootImageConfig(ctx) && profile != nil {
Jiakai Zhang3444e562023-07-11 15:13:35 +01001241 rule := android.NewRuleBuilder(pctx, ctx)
Jiakai Zhang49b1eb62021-11-26 18:09:27 +00001242 rule.Install(profile, "/system/etc/boot-image.prof")
Colin Cross84ed5112024-01-17 12:14:44 -08001243 return profile, rule.Installs()
Jiakai Zhang49b1eb62021-11-26 18:09:27 +00001244 }
Colin Cross84ed5112024-01-17 12:14:44 -08001245 return profile, nil
Paul Duffin58612422021-04-26 12:51:07 +01001246}
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001247
Paul Duffinad19d382021-04-26 16:44:00 +01001248// bootFrameworkProfileRule generates the rule to create the boot framework profile and
1249// returns a path to the generated file.
Colin Cross84ed5112024-01-17 12:14:44 -08001250func bootFrameworkProfileRule(ctx android.ModuleContext, image *bootImageConfig) (android.WritablePath, android.RuleBuilderInstalls) {
Paul Duffinad19d382021-04-26 16:44:00 +01001251 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001252 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001253
Dan Willemsen9f435972020-05-28 15:28:00 -07001254 if global.DisableGenerateProfile || ctx.Config().UnbundledBuild() {
Colin Cross84ed5112024-01-17 12:14:44 -08001255 return nil, nil
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001256 }
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001257
Paul Duffin58612422021-04-26 12:51:07 +01001258 defaultProfile := "frameworks/base/config/boot-profile.txt"
Paul Duffin2ac45f02021-04-26 17:08:38 +01001259 bootFrameworkProfile := android.PathForSource(ctx, defaultProfile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001260
Paul Duffin58612422021-04-26 12:51:07 +01001261 profile := image.dir.Join(ctx, "boot.bprof")
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001262
Paul Duffin58612422021-04-26 12:51:07 +01001263 rule := android.NewRuleBuilder(pctx, ctx)
Paul Duffin58612422021-04-26 12:51:07 +01001264 rule.Command().
1265 Text(`ANDROID_LOG_TAGS="*:e"`).
1266 Tool(globalSoong.Profman).
1267 Flag("--output-profile-type=bprof").
1268 FlagWithInput("--create-profile-from=", bootFrameworkProfile).
1269 FlagForEachInput("--apk=", image.dexPathsDeps.Paths()).
1270 FlagForEachArg("--dex-location=", image.getAnyAndroidVariant().dexLocationsDeps).
1271 FlagWithOutput("--reference-profile-file=", profile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001272
Paul Duffin58612422021-04-26 12:51:07 +01001273 rule.Install(profile, "/system/etc/boot-image.bprof")
1274 rule.Build("bootFrameworkProfile", "profile boot framework jars")
Colin Cross84ed5112024-01-17 12:14:44 -08001275 return profile, rule.Installs()
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001276}
1277
Paul Duffinf7a55922021-04-26 23:09:15 +01001278func dumpOatRules(ctx android.ModuleContext, image *bootImageConfig) {
Colin Crossc9a4c362019-02-26 21:13:48 -08001279 var allPhonies android.Paths
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001280 name := image.name
Jiakai Zhang7d292222024-01-18 17:27:42 +00001281 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
David Srbeckyc177ebe2020-02-18 20:43:06 +00001282 for _, image := range image.variants {
1283 arch := image.target.Arch.ArchType
David Srbecky46672322020-03-16 13:27:55 +00001284 suffix := arch.String()
1285 // Host and target might both use x86 arch. We need to ensure the names are unique.
1286 if image.target.Os.Class == android.Host {
1287 suffix = "host-" + suffix
1288 }
Colin Crossc9a4c362019-02-26 21:13:48 -08001289 // Create a rule to call oatdump.
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001290 output := android.PathForOutput(ctx, name+"."+suffix+".oatdump.txt")
Colin Crossf1a035e2020-11-16 17:32:30 -08001291 rule := android.NewRuleBuilder(pctx, ctx)
Jeongik Cha4dda75e2021-04-27 23:56:44 +09001292 imageLocationsOnHost, _ := image.imageLocations()
Jiakai Zhang7d292222024-01-18 17:27:42 +00001293
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001294 cmd := rule.Command().
Martin Stjernholm07803722021-05-18 17:39:56 +01001295 BuiltTool("oatdump").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001296 FlagWithInputList("--runtime-arg -Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
1297 FlagWithList("--runtime-arg -Xbootclasspath-locations:", image.dexLocationsDeps, ":").
Jeongik Cha4dda75e2021-04-27 23:56:44 +09001298 FlagWithArg("--image=", strings.Join(imageLocationsOnHost, ":")).Implicits(image.imagesDeps.Paths()).
Colin Crossc9a4c362019-02-26 21:13:48 -08001299 FlagWithOutput("--output=", output).
1300 FlagWithArg("--instruction-set=", arch.String())
Jiakai Zhang7d292222024-01-18 17:27:42 +00001301 if image.target.Os == android.Android {
1302 cmd.Text("$(cat").Input(globalSoong.UffdGcFlag).Text(")")
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001303 }
1304 rule.Build("dump-oat-"+name+"-"+suffix, "dump oat "+name+" "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -08001305
1306 // Create a phony rule that depends on the output file and prints the path.
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001307 phony := android.PathForPhony(ctx, "dump-oat-"+name+"-"+suffix)
Colin Crossf1a035e2020-11-16 17:32:30 -08001308 rule = android.NewRuleBuilder(pctx, ctx)
Colin Crossc9a4c362019-02-26 21:13:48 -08001309 rule.Command().
1310 Implicit(output).
1311 ImplicitOutput(phony).
1312 Text("echo").FlagWithArg("Output in ", output.String())
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001313 rule.Build("phony-dump-oat-"+name+"-"+suffix, "dump oat "+name+" "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -08001314
David Srbecky1aacc6c2020-03-26 11:10:45 +00001315 allPhonies = append(allPhonies, phony)
Colin Crossc9a4c362019-02-26 21:13:48 -08001316 }
1317
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001318 phony := android.PathForPhony(ctx, "dump-oat-"+name)
Colin Crossc9a4c362019-02-26 21:13:48 -08001319 ctx.Build(pctx, android.BuildParams{
1320 Rule: android.Phony,
1321 Output: phony,
1322 Inputs: allPhonies,
Cole Faust06ea5312023-10-18 17:38:40 -07001323 Description: "dump-oat-" + name,
Colin Crossc9a4c362019-02-26 21:13:48 -08001324 })
Colin Crossc9a4c362019-02-26 21:13:48 -08001325}
1326
Colin Cross2d00f0d2019-05-09 21:50:00 -07001327func writeGlobalConfigForMake(ctx android.SingletonContext, path android.WritablePath) {
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001328 data := dexpreopt.GetGlobalConfigRawData(ctx)
Colin Cross2d00f0d2019-05-09 21:50:00 -07001329
Colin Crosscf371cc2020-11-13 11:48:42 -08001330 android.WriteFileRule(ctx, path, string(data))
Colin Cross2d00f0d2019-05-09 21:50:00 -07001331}
1332
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +00001333// Define Make variables for boot image names, paths, etc. These variables are used in makefiles
1334// (make/core/dex_preopt_libart.mk) to generate install rules that copy boot image files to the
1335// correct output directories.
Colin Cross44df5812019-02-15 23:06:46 -08001336func (d *dexpreoptBootJars) MakeVars(ctx android.MakeVarsContext) {
Jiakai Zhangbc698cd2023-05-08 16:28:38 +00001337 if d.dexpreoptConfigForMake != nil && !SkipDexpreoptBootJars(ctx) {
Colin Cross2d00f0d2019-05-09 21:50:00 -07001338 ctx.Strict("DEX_PREOPT_CONFIG_FOR_MAKE", d.dexpreoptConfigForMake.String())
Martin Stjernholmc52aaf12020-01-06 23:11:37 +00001339 ctx.Strict("DEX_PREOPT_SOONG_CONFIG_FOR_MAKE", android.PathForOutput(ctx, "dexpreopt_soong.config").String())
Colin Cross2d00f0d2019-05-09 21:50:00 -07001340 }
1341
Colin Cross44df5812019-02-15 23:06:46 -08001342 image := d.defaultBootImage
1343 if image != nil {
Yu Liu663e4502024-08-12 18:23:59 +00001344 if profileInstallInfo, ok := android.OtherModuleProvider(ctx, d, profileInstallInfoProvider); ok {
Colin Cross84ed5112024-01-17 12:14:44 -08001345 ctx.Strict("DEXPREOPT_IMAGE_PROFILE_BUILT_INSTALLED", profileInstallInfo.profileInstalls.String())
1346 if profileInstallInfo.profileLicenseMetadataFile.Valid() {
1347 ctx.Strict("DEXPREOPT_IMAGE_PROFILE_LICENSE_METADATA", profileInstallInfo.profileLicenseMetadataFile.String())
1348 }
Colin Crosse7fe0962022-03-15 17:49:24 -07001349 }
Ulya Trafimovich9023b022021-03-22 16:02:28 +00001350
Jiakai Zhangbc698cd2023-05-08 16:28:38 +00001351 if SkipDexpreoptBootJars(ctx) {
1352 return
1353 }
1354
Ulya Trafimovich9023b022021-03-22 16:02:28 +00001355 global := dexpreopt.GetGlobalConfig(ctx)
1356 dexPaths, dexLocations := bcpForDexpreopt(ctx, global.PreoptWithUpdatableBcp)
1357 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_FILES", strings.Join(dexPaths.Strings(), " "))
1358 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_LOCATIONS", strings.Join(dexLocations, " "))
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001359
Ulya Trafimovich442ec7f2022-04-20 10:53:26 +01001360 // The primary ART boot image is exposed to Make for testing (gtests) and benchmarking
1361 // (golem) purposes.
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001362 for _, current := range append(d.otherImages, image) {
David Srbecky1aacc6c2020-03-26 11:10:45 +00001363 for _, variant := range current.variants {
David Srbecky7f8dac12020-02-13 16:00:45 +00001364 suffix := ""
David Srbecky1aacc6c2020-03-26 11:10:45 +00001365 if variant.target.Os.Class == android.Host {
David Srbecky7f8dac12020-02-13 16:00:45 +00001366 suffix = "_host"
1367 }
David Srbecky1aacc6c2020-03-26 11:10:45 +00001368 sfx := variant.name + suffix + "_" + variant.target.Arch.ArchType.String()
1369 ctx.Strict("DEXPREOPT_IMAGE_VDEX_BUILT_INSTALLED_"+sfx, variant.vdexInstalls.String())
Jeongik Chaa5969092021-05-07 18:53:21 +09001370 ctx.Strict("DEXPREOPT_IMAGE_"+sfx, variant.imagePathOnHost.String())
David Srbecky1aacc6c2020-03-26 11:10:45 +00001371 ctx.Strict("DEXPREOPT_IMAGE_DEPS_"+sfx, strings.Join(variant.imagesDeps.Strings(), " "))
1372 ctx.Strict("DEXPREOPT_IMAGE_BUILT_INSTALLED_"+sfx, variant.installs.String())
1373 ctx.Strict("DEXPREOPT_IMAGE_UNSTRIPPED_BUILT_INSTALLED_"+sfx, variant.unstrippedInstalls.String())
Colin Crosse7fe0962022-03-15 17:49:24 -07001374 if variant.licenseMetadataFile.Valid() {
1375 ctx.Strict("DEXPREOPT_IMAGE_LICENSE_METADATA_"+sfx, variant.licenseMetadataFile.String())
1376 }
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001377 }
Jeongik Chae3165c82021-06-23 23:18:50 +09001378 imageLocationsOnHost, imageLocationsOnDevice := current.getAnyAndroidVariant().imageLocations()
1379 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_ON_HOST"+current.name, strings.Join(imageLocationsOnHost, ":"))
1380 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_ON_DEVICE"+current.name, strings.Join(imageLocationsOnDevice, ":"))
Colin Cross31bf00d2019-12-04 13:16:01 -08001381 ctx.Strict("DEXPREOPT_IMAGE_ZIP_"+current.name, current.zip.String())
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001382 }
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001383 ctx.Strict("DEXPREOPT_IMAGE_NAMES", strings.Join(getImageNames(), " "))
Colin Cross800fe132019-02-11 14:21:24 -08001384 }
Colin Cross800fe132019-02-11 14:21:24 -08001385}
Spandan Das29207b52024-07-30 23:28:17 +00001386
1387// Add one of the outputs in `OutputFile`
1388// This ensures that this singleton module does not get skipped when writing out/soong/Android-*.mk
1389func (d *dexpreoptBootJars) AndroidMkEntries() []android.AndroidMkEntries {
1390 return []android.AndroidMkEntries{{
1391 Class: "ETC",
1392 OutputFile: android.OptionalPathForPath(d.bootFrameworkProfile),
1393 }}
1394}